<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1111 to 1125.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/big-data-in-india-benefits-harms-and-human-rights-oct-01-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-alnoor-peermohammed-september-14-2016-indias-aadhaar-mandate-for-smartphone-makers-may-rile-global-firms"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/mint-pressnews-september-13-2016-kit-o-connell-spacex-explosion-slows-facebook-israeli-efforts-to-control-online-content"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-september-13-2016-shreeja-sen-how-does-govt-track-all-its-legal-cases"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/scroll.in-mayank-jain-september-12-2016-the-digilocker-was-supposed-to-cut-down-paperwork"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-september-7-2016-despite-sc-order-thousands-booked-under-scrapped-sec-66a-of-it-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/global-voices-september-5-2016-subhashish-panigrahi-indians-ask-is-visiting-a-torrent-site-really-a-crime"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/talking-point-futile-battle-against-torrents"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindustan-times-vidushi-marda-august-31-2016-we-truly-are-the-product-being-sold"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-telegraph-august-26-2016-festival-scan-on-social-media"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/first-post-august-23-2016-seetha-extending-aadhaar-to-more-areas-is-a-hare-brained-idea-it-should-be-dropped"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/policy-brief-on-the-report-of-the-un-group-of-governmental-experts-on-ict"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/events/big-data-in-india-benefits-harms-and-human-rights-oct-01-2016">
    <title>Workshop on Big Data in India: Benefits, Harms, and Human Rights (Delhi, October 01)</title>
    <link>https://cis-india.org/internet-governance/events/big-data-in-india-benefits-harms-and-human-rights-oct-01-2016</link>
    <description>
        &lt;b&gt;CIS welcomes you to participate in the workshop we are organising on Saturday, October 01 at India Habitat Centre, Delhi, to discuss benefits, harms, and human rights implications of big data technologies, and explore potential research questions. A quick RSVP will be much appreciated.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Workshop invitation: &lt;a href="http://cis-india.org/internet-governance/files/big-data-in-india-invitatation-to-workshop/at_download/file"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;h4&gt;Workshop agenda: &lt;a href="http://cis-india.org/internet-governance/files/big-data-in-india-workshop-agenda/at_download/file"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;p&gt;In the last few years, there has been an emergence of the discourse of big data viewing it as an instrument not just for ensuring efficient, targeted and personalised services in the private sector, but also for development, social and policy research, and formalising and monetising various sections of the economy. This possibility is premised upon the idea that there is great knowledge that resides in both traditional and new forms of data made possible by our digital selves, and that we may now have the capability to tap into that knowledge for insights across diverse sectors like healthcare, finance, e-governance, education, law enforcement and disaster management, to name but a few. Alongside, various commentators have also pointed to the new problems and risks that big data could create for privacy of individuals through greater profiling, for free speech and economic choice by strengthening monopolistic tendencies, and for socio-economic inequalities by making existing disparities more acute and facilitating algorithmic bias and exclusion.&lt;/p&gt;
&lt;p&gt;From a regulatory perspective, big data technologies pose fundamental challenges to the national data regulatory frameworks that have existed since many years. The nature of collection and utilisation of big data, which is often not driven by immediate purpose of the collected data, conflict with the principles of data minimisation and collection limitation that have been integral to data protection laws globally. This compels us to revisit existing theories of data governance. Additionally, use of big data in public decision-making highlights the question of how algorithmic control and governance must be regulated. This raises concerns around taking determining a balanced position that recognises the importance of big data, including for development actions, and ensures unhindered innovation with simultaneous focus on greater transparency and anonymisation to protect individual privacy, and various big data risks faced by population groups. In order to answer these questions, we need to begin with identifying the different harms and benefits of big data that could arise through its use across sectors and disciplines, especially in the context of human rights.&lt;/p&gt;
&lt;p&gt;This workshop is designed around an extensive study of current and potential future uses of big data for governance in India that CIS has undertaken over the last year. The study focused on key central government projects and initiatives like the UID project, the Digital India programme, the Smart Cities Challenge, etc.&lt;/p&gt;
&lt;p&gt;We will initiate the workshop with a detailed presentation of our findings and key concerns, which will then shape the discussion agenda of the workshop. We look forward to discuss aspects of big data technologies through the entry points of harms, opportunities, and human rights.&lt;/p&gt;
&lt;p&gt;The final session of the workshop will focus on identifying key research questions on the topic, and exploring potential alliances of scholars and organisations that can drive such research activities.&lt;/p&gt;
&lt;p&gt;We look forward to making this a forum for knowledge exchange for our friends and colleagues attending the discussion and discuss the opportunity to for potential collaboration.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;RSVP:&lt;/strong&gt; Please send an email to Ajoy Kumar at &amp;lt;&lt;a href="mailto:ajoy@cis-india.org"&gt;ajoy@cis-india.org&lt;/a&gt;&amp;gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Organisers:&lt;/strong&gt; Amber Sinha &amp;lt;&lt;a href="mailto:amber@cis-india.org"&gt;amber@cis-india.org&lt;/a&gt;&amp;gt; and Sumandro Chattapadhyay &amp;lt;&lt;a href="mailto:sumandro@cis-india.org"&gt;sumandro@cis-india.org&lt;/a&gt;&amp;gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/big-data-in-india-benefits-harms-and-human-rights-oct-01-2016'&gt;https://cis-india.org/internet-governance/events/big-data-in-india-benefits-harms-and-human-rights-oct-01-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Development</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Security</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Digitisation</dc:subject>
    
    
        <dc:subject>Digital subjectivities</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    
    
        <dc:subject>Digital Rights</dc:subject>
    

   <dc:date>2016-09-28T05:53:55Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw">
    <title>Glaring Errors in UIDAI's Rebuttal</title>
    <link>https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw</link>
    <description>
        &lt;b&gt;This response note by Pranesh Prakash questions Unique Identification Authority of India’s reply to Hans Verghese Mathews' article titled “Flaws in the UIDAI Process” (EPW, March 12, 2016), which found “serious mathematical errors” in the article.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The article was &lt;a class="external-link" href="http://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebuttal.html"&gt;published in Economic &amp;amp; Political Weekly&lt;/a&gt; Vol. 51, Issue No. 36, September 3, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;While I am not a statistician, I have followed the technical debate between Hans Verghese Mathews and the UIDAI closely, and see a number of glaring errors in the latter’s so-called rebuttal in EPW (March 12, 2016).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The UIDAI alleges Mathews to have ignored the evidence that the Receiver Operating Characteristic (ROC) "flattens" with more factors. However, Mathews cannot be accused of ignorance if the flattening of the ROC is not relevant to his argument. To explain this in simple terms, the ROC curve is used to choose the appropriate "threshold distance" which determines false positives and false negatives, and belongs to a stage which precedes the estimation of the false positive identification rates (FPIR).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, Mathews has used the FPIR estimates provided by the UIDAI (based on evidence from the enrolment of 84 million persons), and calculated how the FPIR changes when extrapolated for a population of 1.2 billion persons. In other words, he did not need to look at the ROC curve as that factor is not relevant to his argument, since he has used UIDAI data (which has presumably been estimated on the basis of all 12 factors : 10 fingerprints and 2 irises). &lt;br /&gt;&lt;br /&gt;Further, UIDAI asks why Mathews has assumed a linear curve for his extrapolation. Mathews has done no such thing. In fact, in their paper "Role of Biometric Technology in Aadhaar Enrollment," the UIDAI states: "FPIR rate grows linearly with the database size" (nd, 19). Thus, this is an assumption formerly made by them (without providing rationale for it to be a linear curve as opposed to anything else).&amp;nbsp; Mathews mathematically derives bounds for the FPIR in his paper, that is, the range within which the FPIR lies. One gets a linear curve only if they use the upper bound and not on the usage of anything else. So while Mathews does, as he explains, provide the results of the calculation based on the upper bound for the sake of simplicity, he nowhere asserts nor assumes a linear curve.&lt;br /&gt;&lt;br /&gt;If, as the UIDAI claims, one cannot perform such an extrapolation and needs to depend on “empirical evidence” instead, the question arises as to how the UIDAI decided to scale up the programme to 1.3 billion people given the error rates. One could also ask if the machines being used to capture biometrics are good enough for the enlargement. Surely they would have performed some extrapolations to decide this.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In their paper they note that "although it [FPIR] is expected to grow as the database size increases, it is not expected to exceed manageable values even at full enrolment of 120 crores" (UIDAI nd, 13). They do not illustrate the extent to which the FPIR is expected to grow—neither in their initial paper, nor in their rebuttal to Mathews—whereas Mathews provides a method of estimating the increase of FPIR. Even if UIDAI is correct in its appraisal of FPIR and that it will not exceed "manageable values," they need to either exemplify their calculations or release the latest data. They have done neither, and that is quite unfortunate.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;/p&gt;
&lt;div id="stcpDiv" style="text-align: justify;"&gt;UIDAI  (nd): “Role of Biometric Technology in Aadhaar Enrollment,” Unique  Identification Authority of India, Government of India, New Delhi,  viewed on 18 August 2016,  &lt;a class="external-link" href="https://uidai.gov.in/images/FrontPageUpdates/role_of_biometric_technology"&gt;https://uidai.gov.in/images/FrontPageUpdates/role_of_biometric_technology&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Related Links&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div id="stcpDiv"&gt;
&lt;ol&gt;
&lt;li&gt;Flaws in the UIDAI Process &lt;a href="http://www.epw.in/journal/2016/9/special-articles/flaws-uidai-process.html"&gt;http://www.epw.in/journal/2016/9/special-articles/flaws-uidai-process.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Erring on Aadhaar &lt;a href="http://www.epw.in/journal/2016/11/discussion/erring-aadhaar.html"&gt;http://www.epw.in/journal/2016/11/discussion/erring-aadhaar.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Request for Specifics &lt;a href="http://www.epw.in/journal/2016/36/documents/request-specifics-rebuttal-uidai.html"&gt;http://www.epw.in/journal/2016/36/documents/request-specifics-rebuttal-u...&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Glaring Errors in UIDAI's Rebuttal &lt;a href="http://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebuttal.html"&gt;http://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebutt...&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Overlooking the UIDAI Process &lt;a href="http://www.epw.in/journal/2016/36/documents/response-hans-verghese-mathews-and-pranesh-prakashs-rebuttal.html"&gt;http://www.epw.in/journal/2016/36/documents/response-hans-verghese-mathe...&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw'&gt;https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-09-18T03:22:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-alnoor-peermohammed-september-14-2016-indias-aadhaar-mandate-for-smartphone-makers-may-rile-global-firms">
    <title>India's Aadhaar mandate for smartphone makers may rile global firms</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-alnoor-peermohammed-september-14-2016-indias-aadhaar-mandate-for-smartphone-makers-may-rile-global-firms</link>
    <description>
        &lt;b&gt;They are unlikely to oblige to request to make changes in their operating system and devices to ensure Aadhaar authentication is done securely on smartphones. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Alnoor Peermohammed was &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/india-s-aadhaar-mandate-for-smartphone-makers-may-rile-global-firms-116091401083_1.html"&gt;published in the Business Standard&lt;/a&gt; on September 14, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;India is asking global&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Smartphone" target="_blank"&gt;smartphone&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;makers         such as&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Apple" target="_blank"&gt;Apple&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;and&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Google" target="_blank"&gt;Google&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;to         adopt locally designed standards on their devices or operating         systems that would allow use of biometric scanners for&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar&lt;/a&gt;authentication, a move that could face         resistance from global firms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apple, the world’s largest&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Smartphone" target="_blank"&gt;smartphone&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;maker         runs its own&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Ios" target="_blank"&gt;iOS&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;closed         ecosystem and mandates apps built by developers to be certified         by the company. Its closest rival Google, which owns the Android         operating software that runs on nine out of ten smartphones in         India, has directives for device makers to comply with. Firms         such as Samsung, Lenovo and Micromax build smartphones on the         Android OS that are sold in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most global companies are         unlikely to oblige India’s request that would require to make         changes in their operating system and devices to ensure&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar&lt;/a&gt;authentication is done securely on         smartphones, say analysts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There is no clarity so far.         As of now, it is impossible that they (global&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Smartphone" target="_blank"&gt;smartphone&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;makers)         would oblige for a hardware safe zone baked on the sensors,”         says Sunil Abraham, executive director at Centre for Internet         and Society, a Bengaluru-based  researcher that works on         emerging technologies. “Because the biometrics contain sensitive         personal information, they (UIDAI)  don’t want anybody —         vmobile  manufacturer, OS vendor, telco or ISP — to intercept         it”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is hoping that global         firms would accept the country’s plea considering that most of         India’s population use a mobile phone as their only computing         device and need them to authenticate on&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;for         using government and banking services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Right now we’re in         consultation with all these device manufacturers as well as the         operating system vendors,” said Ajay Bhushan Pandey, Director         General of the Unique Identification Authority of India (UIDAI)         in a phone interview. “Basically we’re trying to evolve our         system wherein a manufacturer or the devices where those         operating systems are being used will have a facility where&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;authentication         can be made possible in a secure manner.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has over 105 crore         people or 98% of adult population with Aadhaar. Most government         and private organisations use&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;authentication         to issue services or products such as opening a bank account,         getting a ration card or buying a mobile connection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reliance plans to reduce         paperwork and issue connections in less than an hour using&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;and         try to get its 100 million target market sooner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over a fifth of India’s one         billion users own smartphones and as the country sees better         mobile internet access, more people are expected to upgrade to         smartphones and use apps to access their banks to transfer         funds, do online shopping and access government services.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-alnoor-peermohammed-september-14-2016-indias-aadhaar-mandate-for-smartphone-makers-may-rile-global-firms'&gt;https://cis-india.org/internet-governance/news/business-standard-alnoor-peermohammed-september-14-2016-indias-aadhaar-mandate-for-smartphone-makers-may-rile-global-firms&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-09-15T02:25:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/mint-pressnews-september-13-2016-kit-o-connell-spacex-explosion-slows-facebook-israeli-efforts-to-control-online-content">
    <title>SpaceX Explosion Slows Facebook &amp; Israeli Efforts To Control Online Content</title>
    <link>https://cis-india.org/internet-governance/news/mint-pressnews-september-13-2016-kit-o-connell-spacex-explosion-slows-facebook-israeli-efforts-to-control-online-content</link>
    <description>
        &lt;b&gt;In their ‘space race’ to expand internet access to remote, impoverished areas of the world, Facebook and Google are actually vying for control o fthe online experiences of millions of people. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Kit O' Connell &lt;a href="https://www.mintpressnews.com/spacex-explosion-slows-facebook-israeli-efforts-control-content-online/220289/"&gt;published by Mint Press News&lt;/a&gt; on September 13, 2016 has quoted Pranesh Prakash.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;When a rocket operated           by space startup SpaceX burned up on the launch pad, it was a           setback to the prospects of commercial space travel, as well           as efforts by Facebook to control the online experiences of           millions of rural internet users.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Facebook’s project,           Internet.org, is described by founder Mark Zuckerberg in           charitable terms, but critics have accused it of spreading           “techno-colonialism.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The &lt;/span&gt;&lt;a href="https://youtu.be/UKUz5ZUPqM8" target="_blank"&gt;&lt;span&gt;Sept. 1 fire&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in Cape Canaveral, Florida,           destroyed &lt;/span&gt;&lt;a href="http://www.orlandosentinel.com/news/space/go-for-launch/os-spacex-spacecom-answers-20160906-story.html" target="_blank"&gt;&lt;span&gt;a $200 million satellite owned by             SpaceCom&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, an           Israeli communications satellite firm, and co-leased by           Facebook. The satellite, Amos-6, was built by &lt;/span&gt;&lt;a href="http://www.haaretz.com/israel-news/business/1.740167" target="_blank"&gt;&lt;span&gt;Israel Aerospace Industries&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, a government-owned aviation and           aerospace manufacturer.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Facebook’s partnership           with SpaceCom is another sign of the corporation’s deepening           ties with Israel. In June, Facebook appointed &lt;/span&gt;&lt;a href="http://www.mintpressnews.com/amid-anti-bds-pressure-facebook-israel-appoints-long-time-netanyahu-advisor-policy-post/217631/"&gt;&lt;span&gt;Jordana Cutler&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, a close advisor to Israeli Prime           Minister Benjamin Netanyahu, as head of policy and           communications at Facebook’s Israeli office.&lt;/span&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Another setback for Facebook’s Internet.org&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;“Facebook was counting           on [the satellite] to beam internet service to sub-Saharan           Africa as part of its ambitious Internet.org project,” noted &lt;/span&gt;&lt;a href="http://www.slate.com/blogs/future_tense/2016/09/01/spacex_blew_up_facebook_s_first_internet_satellite.html" target="_blank"&gt;&lt;span&gt;Will Oremus&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, Slate’s senior technology writer. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The &lt;/span&gt;&lt;a href="http://www.latimes.com/business/la-fi-spacex-explosion-live-total-loss-is-a-blow-to-satellite-1472749648-htmlstory.html" target="_blank"&gt;&lt;span&gt;Los             Angeles Times&lt;/span&gt;&lt;/a&gt;&lt;span&gt; reported that SpaceCom’s stock fell 9 percent on the Tel Aviv           Stock Exchange after the explosion. &lt;/span&gt;&lt;a href="https://www.facebook.com/zuck/posts/10103074463098101" target="_blank"&gt;&lt;span&gt;Zuckerberg&lt;/span&gt;&lt;/a&gt;&lt;span&gt; shared his dismay in a post on his           facebook page, writing: &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;“As I’m here in Africa, I’m deeply             disappointed to hear that SpaceX’s launch failure destroyed             our satellite that would have provided connectivity to so             many entrepreneurs and everyone else across the continent.”&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Internet.org would           help users get online in areas lacking conventional internet           access, and the service, which works in partnership with local           mobile phone companies, has launched, at least provisionally,           in &lt;/span&gt;&lt;a href="https://info.internet.org/en/story/where-weve-launched/" target="_blank"&gt;&lt;span&gt;48 countries&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in Africa, Asia, and Latin America.           In addition to satellites, Internet.org plans to use &lt;/span&gt;&lt;a href="https://www.facebook.com/notes/mark-zuckerberg/the-technology-behind-aquila/10153916136506634/" target="_blank"&gt;&lt;span&gt;cutting edge solar-powered drones&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to expand internet access in remote           parts of the world. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The service is not           without controversy, though. An offering called “Free Basics”           would provide users who can’t afford full internet access with           a curated selection of websites, tailored for use on low           bandwidth devices such as older smartphones. &lt;/span&gt;&lt;a href="http://www.bbc.com/news/technology-32795270" target="_blank"&gt;&lt;span&gt;Free Basics generated international protests&lt;/span&gt;&lt;/a&gt;&lt;span&gt; after it was rolled out in India,           and was eventually blocked by the Telecom Regulatory Authority           of India in March 2015 for violating the principle of &lt;/span&gt;&lt;a href="https://www.aclu.org/feature/what-net-neutrality" target="_blank"&gt;&lt;span&gt;net neutrality&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In a May 12 analysis           for The Guardian, Mumbai-based journalist &lt;/span&gt;&lt;a href="https://www.theguardian.com/technology/2016/may/12/facebook-free-basics-india-zuckerberg" target="_blank"&gt;&lt;span&gt;Rahul Bhatia&lt;/span&gt;&lt;/a&gt;&lt;span&gt; suggested the failure of Free           Basics was also due to Zuckerberg’s dismissive attitude toward           the Indian government and people.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;An unnamed Facebook           executive told Bhatia that Zuckerberg made the “mistake of           thinking that a third-world country is a banana republic. So           institutions, the public, the press — they can be bypassed.” &lt;/span&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Colonialism or philanthropy?&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_FB.jpg/@@images/fc86d0fb-84fb-4a34-b73e-a6e129d5ca25.jpeg" alt="FB" class="image-inline" title="FB" /&gt;&lt;/p&gt;
&lt;div class="alignnone wp-caption" id="attachment_220294" style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Indian  students gather for a protest against Facebook’s “Free Basics” in  Hyderabad, India. A central element of Facebook’s Internet.org campaign  was controversial even before it was shut down in a key market this  month. Indian regulators banned one of the pillars of the campaign, a  service known as Free Basics, because it provided access only to certain  pre-approved services – including Facebook – rather than the full  Internet&lt;/i&gt;&lt;/b&gt;.&lt;/div&gt;
&lt;div class="alignnone wp-caption" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Google and its parent company,  Alphabet, also intend to spread internet to rural, underserved areas  through the unique balloon-based &lt;/span&gt;&lt;a href="https://www.solveforx.com/loon/" target="_blank"&gt;&lt;span&gt;Project Loon&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Tech site &lt;/span&gt;&lt;a href="http://www.pocket-lint.com/news/131699-the-internet-space-race-is-on-google-loon-vs-facebook-drones-vs-spacex-satellites" target="_blank"&gt;&lt;span&gt;Pocket-Lint&lt;/span&gt;&lt;/a&gt;&lt;span&gt; reported in March 2015 that SpaceX hoped to offer internet service  through its satellites, in what reporter Luke Edwards called an  “internet space race.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Pranesh Prakash, a representative of the &lt;/span&gt;&lt;a href="http://cis-india.org/" target="_blank"&gt;&lt;span&gt;Centre for Internet &amp;amp; Society&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, an NGO based in Bangalore, India, questioned the company’s motivation in a June 2015 interview with &lt;/span&gt;&lt;a href="http://www.aljazeera.com/news/2015/06/critics-fear-tech-giant-dominance-airborne-internet-150610095035742.html" target="_blank"&gt;&lt;span&gt;Al-Jazeera&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;“They’re doing it out of their self-interest,” Prakash told Tarek Bazley, Al-Jazeera’s science and technology editor. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;“They are not doing it because they  are charities, because they believe in altruism etc. They’re doing it  because having more people online benefits them.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;And Aral Balkan, a human rights activist, told Bazley, “I wouldn’t call it philanthropy I would call it colonialism.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In an August 2013 post on his homepage, &lt;/span&gt;&lt;a href="https://ar.al/notes/beware-of-geeks-bearing-gifts/" target="_blank"&gt;&lt;span&gt;Balkan went into more detail&lt;/span&gt;&lt;/a&gt;&lt;span&gt; about his “strong reservations about why Google and Facebook want to be the ones providing this service.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Noting that both tech corporations profit primarily from collecting and selling information about their users, he continued:&lt;/span&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;“Google  and Facebook want to give everyone access to the Internet because they  need more raw materials. More data. Your data. So they can cultivate  more Digital Serfs to sell to their customers.”&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/mint-pressnews-september-13-2016-kit-o-connell-spacex-explosion-slows-facebook-israeli-efforts-to-control-online-content'&gt;https://cis-india.org/internet-governance/news/mint-pressnews-september-13-2016-kit-o-connell-spacex-explosion-slows-facebook-israeli-efforts-to-control-online-content&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-14T11:24:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-september-13-2016-shreeja-sen-how-does-govt-track-all-its-legal-cases">
    <title>How does the government track all its legal cases?</title>
    <link>https://cis-india.org/internet-governance/news/livemint-september-13-2016-shreeja-sen-how-does-govt-track-all-its-legal-cases</link>
    <description>
        &lt;b&gt;The Legal Information Management and Briefing System , an integral part of the digital India initiative, aims to be a database of all the ongoing cases with the government. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shreeja Sen &lt;a href="http://www.livemint.com/Politics/e8NH6lBlIFbBss0cP54hrJ/How-does-the-government-track-all-its-legal-cases.html"&gt;published by Livemint&lt;/a&gt; on September 13, 2016 has quoted Sunil         Abraham.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;More than one lakh cases         currently exist on a law ministry platform curated in the last         13 months.The Legal Information Management and Briefing System         (LIMBS), aimed to be a database of all the ongoing cases with         the government as a party, is part of the government’s push         towards digital India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Law secretary Suresh Chandra         said this is a big step under the Digital India project,         intended to monitor and ultimately reduce spending on government         litigation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The aim is to conduct cases         properly. If our system works, along with the national         litigation policy, we will be able to prevent 50% cases before         they are even filed,” Chandra said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the government, the         project will help reduce delays in filing responses in cases ,         contempt notices because of such delays and consequent monetary         penalties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The website has also undergone         the required security audit under the NIC (national informatics         centre), to ensure the data is safe and protected. However, a database like this on         the internet comes with its challenges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“To ensure client         confidentiality, communication should be bilateral between         lawyer and client and should be encrypted and even watermarked.         If this project allows access to documents by multiple         stakeholders without encrypting it for the recipient, then if         there is any leak, the documents cannot be traced back to the         person who was responsible,” said Sunil Abraham, executive         director at Centre for Internet and Society, a non-profit         research organisation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The LIMBS project began         internally at the ministry of railway sometime in 2013, but was         soon expanded as a single platform across ministries. In July         2015, it was hosted on the NIC server. The law ministry, by a         gazette notification on 8 February, formally launched LIMBS to         monitor cases filed against the Union government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As of now, there is no special         budget allocated for this project, which is being handled in         house with a team of eight people – four developers on the         technology side and four implementers for the case details. The         development of the website is being handled by Ajay Gupta,         deputy chief vigilance officer, northern railway. From the law         ministry, Spriha Johari is the project director responsible for         the website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As of 12 September, the five         ministries with the most uploads on the website were railways         (69,469 cases), communications and information technology         (7,830), finance (4452), environment (3,189) and defence         (2,565).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Every day, nearly 400-500 cases         are added to the portal. In all 58 ministries and their 202         departments have been brought under the LIMBS project.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-september-13-2016-shreeja-sen-how-does-govt-track-all-its-legal-cases'&gt;https://cis-india.org/internet-governance/news/livemint-september-13-2016-shreeja-sen-how-does-govt-track-all-its-legal-cases&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-14T10:17:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition">
    <title>CYFY 2016 - The India Conference on Cyber Security and Internet Governance</title>
    <link>https://cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition</link>
    <description>
        &lt;b&gt;Sunil Abraham will participate as a panelist at CYFY 2016 event organized by Observer Research Foundation in New Delhi from September 28 to 30, 2016. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Into  its  fourth  edition  this  year,  CyFy:  The  India  Conference  on  Cyber  Security  and  Internet Governance  has  emerged  as  a global platform to discuss, debate and  deliver digital policy solutions. CyFy  2015   featured  nearly   110  participants  from  over  33  countries,  with  nearly  800   delegates  in attendance.  Prominently,  the  conference  sessions  featured  several  experts  from Africa  and  the  Asia Pacific, who addressed  the  policy  priority of connecting  the next  billion. The 2016 iteration of CyFy will highlight the political, economic and strategic questions that underpin this imperative.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cyfy-2016-agenda/view"&gt;Download the Agenda &lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;See the announcement on &lt;a class="external-link" href="http://cyfy.org/"&gt;CYFY website&lt;/a&gt; or write to Samir Saran at &lt;a class="mail-link" href="mailto:ssaran@orfonline.org?subject=CyFy 2016"&gt;ssaran@orfonline.org&lt;/a&gt; or Arun at &lt;a class="mail-link" href="mailto:arun.sukumar@orfonline.org?subject=CyFy 2016"&gt;arun.sukumar@orfonline.org&lt;/a&gt; for more details on the conference.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition'&gt;https://cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-13T15:23:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/scroll.in-mayank-jain-september-12-2016-the-digilocker-was-supposed-to-cut-down-paperwork">
    <title>The DigiLocker was supposed to cut down paperwork but less than 0.1% of Indians are using it</title>
    <link>https://cis-india.org/internet-governance/news/scroll.in-mayank-jain-september-12-2016-the-digilocker-was-supposed-to-cut-down-paperwork</link>
    <description>
        &lt;b&gt;The official data shows that the platform has not enthused as many users as the government expected. &lt;/b&gt;
        &lt;div class="article-body" style="text-align: justify; "&gt;
&lt;p&gt;The blog post by Mayank Jain was &lt;a class="external-link" href="http://scroll.in/article/816076/the-digilocker-was-supposed-to-cut-down-paperwork-but-less-than-0-1-of-indians-are-using-it"&gt;published by Scroll.in&lt;/a&gt; on September 12, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The government has  been working hard to make all of India go digital – but its initiatives  don't seem to be having the desired effect. Not yet anyway.&lt;/p&gt;
&lt;p&gt;DigiLocker  was launched in July last year as a secure platform for Indian citizens  to store and access their documents on an electronic repository  provided by the government of India. This is one of the major planks of  the Digital India programme – which aims to take government services  online and make the entire country digitally literate – but it does not  seem to have enthused too many so far.&lt;/p&gt;
&lt;p&gt;To popularise it further, the government on Wednesday &lt;a class="link-external" href="http://economictimes.indiatimes.com/magazines/panache/with-digilocker-app-spare-yourself-the-horror-of-carrying-licences-vehicle-papers-on-the-go/articleshow/54168368.cms" rel="nofollow" target="_blank"&gt;integrated it&lt;/a&gt; with the Ministry of Road Transport and Highways to allow people to  store a digital version of their driving licence and vehicle documents  on the DigiLocker, sparing them the trouble of having to keep the hard  copies on them at all times.&lt;/p&gt;
&lt;p&gt;More than a year since its release,  the platform has about 1.1 million people signed up as users, according  to the official statistics on the DigiLocker website.&lt;/p&gt;
&lt;p&gt;This might  seem like an impressive number – but compare it to the country’s  population of about 1.21 billion, or even its internet-using population  of 350 million – and it becomes a drop in the ocean.&lt;/p&gt;
&lt;figure class="cms-block-image cms-block"&gt;&lt;img src="http://d1u4oo4rb13yy8.cloudfront.net/bonpfhvhxg-1473530052.png" /&gt;&lt;/figure&gt;
&lt;p&gt;As  this chart shows, only 0.09% of Indians are on DigiLocker – this is  less than one user per 1,000 people in the country. DigiLocker is being  used by 0.33% of the online population in the country, which implies  that there are 33 users per 10,000 people on the internet from India.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;Digital dreams&lt;/h3&gt;
&lt;p&gt;When  it was launched by the Department of Electronics and Information  Technology, the government had envisaged a cloud-based and secure  storage platform that would cover the entire population, make it easier  to procure and access important documents – including mark sheets,  degrees and tax papers – and reduce paperwork as well as save time.&lt;/p&gt;
&lt;p&gt;“In  effect Digital Locker will touch every citizen's life by bringing in  lot of convenience and therefore fulfilling the government's vision of a  citizen centric governance model of providing services at the door-step  of citizens,” the government &lt;a class="link-external" href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=122091" rel="nofollow" target="_blank"&gt;said&lt;/a&gt; in a press release when the locker reached one lakh users in the first 100 days of its launch.&lt;/p&gt;
&lt;p&gt;While the &lt;a class="link-external" href="https://digilocker.gov.in/" rel="nofollow" target="_blank"&gt;official website&lt;/a&gt; claims that the number of users is now about 2.1 million, the &lt;a class="link-external" href="https://digilocker.gov.in/public/dashboard" rel="nofollow" target="_blank"&gt;state-wise&lt;/a&gt; figures add up to only 1.1 million people on the platform.&lt;/p&gt;
&lt;p&gt;Among  the states, Maharashtra has most DigiLocker users in absolute numbers  (more than 1 lakh), while Arunachal, Nagaland and Mizoram have less than  1,000 users each.&lt;/p&gt;
&lt;figure class="cms-block-image cms-block"&gt;&lt;img src="http://d1u4oo4rb13yy8.cloudfront.net/ypegwtfpnx-1473418789.png" /&gt;&lt;/figure&gt;
&lt;p&gt;When  the population of each state is taken into account, however, the  picture changes. When adjusted for population, a mere 0.7% Sikkim’s  population uses the service – and this is the highest percentage among  Indian states. Maharashtra, with the highest number of DigiLocker users,  has a much lower percentage of those on the service – 0.12%. The  national capital, meanwhile, has just 0.17% of its population on the  service.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;Lock up&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Citizens can use DigiLocker to store up to 10 megabytes of personal documents online.&lt;/p&gt;
&lt;p&gt;Since  the 10MB storage isn’t enticing enough, considering that internet users  can avail themselves of at least 1GB of storage for free through  private services such as Google Drive or Dropbox, the government is  trying to push usage by integrating several departments with the service  and allowing users to access more documents in real time from anywhere.&lt;/p&gt;
&lt;p&gt;Among  those enrolled so far include the road transport ministry,  Maharashtra’s department of registry and stamps and educational bodies  such as the Central Board of Secondary Education, which is now trying to  release mark sheets and results of competitive exams online.&lt;/p&gt;
&lt;p&gt;Though  the government hoped that these initiatives would increase its usage,  technical glitches have prevented several people from using the service.&lt;/p&gt;
&lt;figure class="cms-block-image cms-block"&gt;&lt;img src="http://d1u4oo4rb13yy8.cloudfront.net/ftfomdrrld-1473418804.png" /&gt;&lt;/figure&gt;
&lt;p&gt;A student who gave her National Engineering Entrance Exam this year spoke to &lt;i&gt;Scroll.in &lt;/i&gt;about why she didn't sign up for DigiLocker even though her results were released on the platform.&lt;/p&gt;
&lt;p&gt;“They  allowed us to access results instantly on the platform but it required a  sign up using the Aadhaar number,” a student, said on the condition of  anonymity. “I tried signing up thrice using my phone number but never  received the one-time password and then my Aadhaar verification didn’t  go through so I could never sign up.”&lt;/p&gt;
&lt;p&gt;The service is linked to the  government's biometric-based Aadhaar identification system, but it is  not mandatory to have an Aadhaar number, according to the website.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;Privacy concerns&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Another  reason why people are hesitant to sign up for the service are privacy  concerns about storing important and private documents on a central  repository.&lt;/p&gt;
&lt;p&gt;“Any large linked database with personal information  is a serious threat to citizen’s data,” G Nagarjuna, a researcher at the  Homi Bhabha Centre for Science Education in Mumbai told &lt;i&gt;Scroll.in&lt;/i&gt; earlier. “There exists no agency that could secure their data till date without any possibilities of data theft.”&lt;/p&gt;
&lt;p&gt;Experts  said storing private information, such as biometric and passport data,  on the service could pose security and privacy concerns.&lt;/p&gt;
&lt;p&gt;Sunil Abraham, Executive Director of the Bangalore-based Centre for Internet and Society told &lt;i&gt;Scroll.in&lt;/i&gt; over email that the project can have serious consequences if it is not encrypted well.&lt;/p&gt;
&lt;p&gt;“Unless  the cryptography and architecture is organised in such a manner that  only the citizens will have access, there can be very serious  consequences for the individual’s right to privacy,” he said.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;Internal resistance&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Those  working for the project said the usage of the locker is going to go up  if more government departments start issuing documents digitally to the  locker, instead of handing over hard copies, as this will prompt users  to sign up.&lt;/p&gt;
&lt;figure class="cms-block-image cms-block"&gt;&lt;img src="http://d1u4oo4rb13yy8.cloudfront.net/amgwlpowce-1473418827.png" /&gt;&lt;/figure&gt;
&lt;p&gt;If  the usage has to be increased, more departments need to come on board  and start releasing documents digitally, said Debabrata Nayak,  additional director of the National E-Governance Division, which  implemented the project.&lt;/p&gt;
&lt;p&gt;“It’s only when more departments start  implementing digitisation and issuing digital documents that we will see  a jump in the number of users because Digital Locker is pushed like  that,” Nayak said, adding that National E-Governance Division is facing a  fair bit of resistance from the departments.&lt;/p&gt;
&lt;p&gt;“But not all  departments are doing it yet because it requires a massive change in  their work processes and we are trying to get them on board.”&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;Aadhaar woes&lt;/h3&gt;
&lt;p&gt;DigiLocker  is designed as a push as well as pull service, which means that it  should allow departments to issue as well as request documents from  users. For this, users need to link their Aadhaar numbers to the locker.  This is proving to be a problem, because most departments are not  linking the documents they release to Aadhaar just yet, and not all  users are registered with the unique identification system.&lt;/p&gt;
&lt;p&gt;Moreover, the validity of Aadhaar is under question in the Supreme Court over &lt;a class="link-external" href="http://www.rediff.com/money/report/uid-an-assault-on-individual-liberty/20100906.htm" rel="nofollow" target="_blank"&gt;privacy concerns&lt;/a&gt; voiced by the civil society.&lt;/p&gt;
&lt;p&gt;An  activist had moved the Supreme Court last year over the government  making the Aadhaar number mandatory to sign up for DigiLocker. While the  petition was &lt;a class="link-external" href="http://www.telegraphindia.com/1150929/jsp/nation/story_45159.jsp#.V8_v6_l97IU" rel="nofollow" target="_blank"&gt;quashed &lt;/a&gt;on  procedural grounds, the government quickly moved to allow users to sign  up without their Aadhaar numbers. However, the usability of the locker  is restricted for such users.&lt;/p&gt;
&lt;p&gt;Nayak said that non-Aadhaar-linked  users can only upload their own documents on the system, without being  able to use any other facility that DigiLocker claims to provide.&lt;/p&gt;
&lt;p&gt;“Earlier  Aadhaar was necessary but we changed it because people demanded access,  but for most services, like getting government documents or requesting  documents, it’s [Aadhaar] necessary,” he said. Nayak said this is  because Aadhaar is the only way the government can identify the person  who is being issued documents.&lt;/p&gt;
&lt;p&gt;So what can one do without an Aadhaar on the DigiLocker?&lt;/p&gt;
&lt;p&gt;“Without  Aadhaar you can dump your garbage in it, which means you can upload  your own files on the digital locker system,” Nayak said, “but why would  you do that if you have Google Drive and Dropbox-like services?”&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/scroll.in-mayank-jain-september-12-2016-the-digilocker-was-supposed-to-cut-down-paperwork'&gt;https://cis-india.org/internet-governance/news/scroll.in-mayank-jain-september-12-2016-the-digilocker-was-supposed-to-cut-down-paperwork&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>DIGILocker</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-12T01:59:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-september-7-2016-despite-sc-order-thousands-booked-under-scrapped-sec-66a-of-it-act">
    <title>Despite SC order, thousands booked under scrapped Sec 66A of IT Act</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-september-7-2016-despite-sc-order-thousands-booked-under-scrapped-sec-66a-of-it-act</link>
    <description>
        &lt;b&gt;College student Danish Mohammed’s arrest this March under the scrapped Section 66A of the Information Technology Act for allegedly sharing a morphed picture of RSS chief Mohan Bhagwat wasn’t an exception.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aloke Tikku was published in the &lt;a href="http://www.hindustantimes.com/india-news/despite-sc-order-thousands-booked-under-scrapped-section-66a-of-it-act/story-DisRxFDBJTXvkz6ZW4fRHK.html"&gt;Hindustan         Times&lt;/a&gt; on September 7, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Police arrested more than 3,000 people under the section in 2015, triggering concerns that the law was abused well after it was struck down by the Supreme Court in March last year. The top court had ruled Section 66A violated the constitutional freedom of speech and expression.&lt;br /&gt;&lt;br /&gt;The exact number of people arrested after it was scrapped is not available. But the National Crime Records Bureau’s (NCRB) Crime in India report released last month shows 3,137 arrests under the section in 2015 against 2,423 the previous year.&lt;br /&gt;&lt;br /&gt;On an average, four people were arrested every 12 hours in 2015 as compared to three in 2014.&lt;br /&gt;&lt;br /&gt;“I am shocked,” said Supreme Court lawyer Karuna Nundy, who represented the People’s Union for Civil Liberties, among the petitioners in Supreme Court seeking removal of Section 66A.&lt;br /&gt;&lt;br /&gt;“Making sure that our guardians of law know their law is absolutely basic... Whether it is training or notifying every police officer, we need action on it immediately,” she said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="http://www.hindustantimes.com/rf/image_size_800x600/HT/p2/2016/09/07/Pictures/_7befc902-7467-11e6-86aa-b218fe1cd668.jpg" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is unlikely that all 3,000-plus arrests were made before the provision was struck down in March. Sunil Abraham, executive director of the Bengaluru-headquartered advocacy group Centre for Internet and Society, said it was obvious that the police had not made these arrests before the SC ruling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lawyer Manali Singhal said once the Supreme Court struck off a provision of law, “any arrest under that provision would be per se illegal and void”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Police also appeared to be on an overdrive to file charge sheets against people booked before the SC verdict – in 1,500 cases last year, almost twice the 2014 figure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;NCRB statistics suggest that trials too did not end.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There were 575 people still in jail on January 1, 2016, twice as many as the 275 in prison when the law was in force a year earlier. In 2015, the courts also convicted accused in 143 cases.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-september-7-2016-despite-sc-order-thousands-booked-under-scrapped-sec-66a-of-it-act'&gt;https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-september-7-2016-despite-sc-order-thousands-booked-under-scrapped-sec-66a-of-it-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-07T15:31:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/global-voices-september-5-2016-subhashish-panigrahi-indians-ask-is-visiting-a-torrent-site-really-a-crime">
    <title>Indians Ask: Is Visiting a Torrent Site Really A Crime? </title>
    <link>https://cis-india.org/internet-governance/blog/global-voices-september-5-2016-subhashish-panigrahi-indians-ask-is-visiting-a-torrent-site-really-a-crime</link>
    <description>
        &lt;b&gt;India has banned various large-scale torrent sites for a long time — this is old news. But under a new federal policy in India, one can be jailed for three years and fined 300,000 Indian Rupees (~US $4464) for downloading content on any of these blocked websites.&lt;/b&gt;
        &lt;p&gt;The blog post was first published in &lt;a class="external-link" href="https://globalvoices.org/2016/09/05/indians-ask-is-visiting-a-torrent-site-really-a-crime/"&gt;Global Voices&lt;/a&gt; on September 5, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="Screenshot of a Bittorent client. Image by Carl Sagan via Wikimedia Commons. CC BY-SA 3.0" class="wp-image-584603 size-featured_image_large" height="444" src="https://globalvoices.org/wp-content/uploads/2016/08/bittorent-800x444.jpg" width="800" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Netizens who regularly use these and similar services have become anxious about what the rule may mean for them. Last week, a new legal notice concerning copyright violations sparked widespread rumors that users could be penalized for simply viewing torrent sites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The notice now appears when one visits any of the banned websites. It reads:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;This URL has been blocked under the instructions of the Competent Government Authority or in compliance with the orders of a Court of competent jurisdiction. Viewing, downloading, exhibiting or duplicating an illicit copy of the contents under this URL is punishable as an offence under the laws of India, including but not limited to under Sections 63, 63-A, 65 and 65-A of the Copyright Act, 1957 which prescribe imprisonment for 3 years and also fine of upto Rs. 3,00,000/-. Any person aggrieved by any such blocking of this URL may contact at urlblock@tatacommunications.com who will, within 48 hours, provide you the details of relevant proceedings under which you can approach the relevant High Court or Authority for redressal of your grievance.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Soon after news of the notice began to circulate, the &lt;a href="https://en.wikipedia.org/wiki/Chennai_High_Court"&gt;Chennai High Court &lt;/a&gt;– one of the oldest courts in India — issued a John Doe &lt;a href="http://indiatoday.intoday.in/technology/story/830-more-websites-blocked-in-india-many-torrent-links-in-list/1/748565.html"&gt;order&lt;/a&gt; to block as many as 830 websites, including several &lt;a href="http://delhihighcourt.nic.in/dhcqrydisp_o.asp?pn=119642&amp;amp;yr=2014"&gt;torrent websites &lt;/a&gt;such as thepiratebay.se, torrenthound.com, and kickasstorrents.come.in.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Indian  tech news portal Medianama published a blog post arguing that it is the  downloading of pirated content from certain banned websites and not  accessing those website that should lead to the legal issues. The  problem, it seems, lies in the poor wording of the notice. Medianama  described this as “bizarre by any rational standard” and noted that,  taken literally, it does not comply with the Indian Copyright Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://mhrd.gov.in/sites/upload_files/mhrd/files/upload_document/CprAct.pdf"&gt;Digital piracy legislation&lt;/a&gt; in India has been modified quite a lot in the recent times in general and over &lt;a href="http://indianexpress.com/article/blogs/torrent-ban-long-term-anti-piracy-strategy-or-just-scare-tactics-2990790/"&gt;last five years&lt;/a&gt; in particular (Sections 63, 63A and 65 of the &lt;a href="http://mhrd.gov.in/sites/upload_files/mhrd/files/upload_document/CprAct.pdf"&gt;Indian Copyright Act of 1957&lt;/a&gt; in particular.) But it has not been implemented with such force in the past.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;
&lt;h3&gt;What is a torrent?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A &lt;a href="https://en.wikipedia.org/wiki/Torrent_file"&gt;torrent&lt;/a&gt; is part of a system that enables &lt;a href="https://en.wikipedia.org/wiki/Peer-to-peer_file_sharing" title="Peer-to-peer file sharing"&gt;peer-to-peer file sharing&lt;/a&gt; (“P2P”) that is used to distribute data and electronic files over the &lt;a href="https://en.wikipedia.org/wiki/Internet" title="Internet"&gt;Internet&lt;/a&gt;. Known as &lt;a href="http://www.bittorrent.org/beps/bep_0003.html"&gt;BitTorrent&lt;/a&gt;, this file distribution system is one of the most common technical protocols for transferring large files, such as &lt;a href="https://en.wikipedia.org/wiki/Digital_audio" title="Digital audio"&gt;digital audio&lt;/a&gt; files containing &lt;a class="mw-redirect" href="https://en.wikipedia.org/wiki/TV_show" title="TV show"&gt;TV shows&lt;/a&gt; or &lt;a href="https://en.wikipedia.org/wiki/Video_clip" title="Video clip"&gt;video clips&lt;/a&gt; or &lt;a href="https://en.wikipedia.org/wiki/Digital_audio" title="Digital audio"&gt;digital audio&lt;/a&gt; files containing &lt;a href="https://en.wikipedia.org/wiki/Song" title="Song"&gt;songs&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within this system, files labeled with the .torrent extension contain  meta data about files — e.g. file names, their sizes, folder structure  and cryptographic hash value for integrity verification. They do not  contain the content to be distributed, but without them, the system does  not work. (via &lt;a href="https://en.wikipedia.org/wiki/Torrent_file"&gt;Wikipedia&lt;/a&gt;)&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This is not the first time India has put a blanket ban on such sites. In  December 2014, 32 websites — including including code repository &lt;a href="http://github.com" target="_blank"&gt;Github&lt;/a&gt;, video streaming sites &lt;a href="http://vimeo.com" target="_blank"&gt;Vimeo &lt;/a&gt;and &lt;a href="http://dailymotion.com" target="_blank"&gt;Dailymotion&lt;/a&gt;, online archive &lt;a href="http://archive.org" target="_blank"&gt;Internet Archive&lt;/a&gt;, free software hosting site &lt;a href="http://sourceforge.net" target="_blank"&gt;Sourceforge&lt;/a&gt; — were &lt;a href="https://globalvoices.org/2015/01/06/indian-netizens-criticize-online-censorship-of-jihadi-content/"&gt;banned&lt;/a&gt; in India. They were later unblocked after agreeing to remove some ISIS-related content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As they have in the past, tech-savvy netizens began &lt;a href="http://www.best-bittorrent-vpn.com/torrents-in-india-2.html?utm_expid=67369992-5.J37bjQyhR4O_JO3YAkii3g.1&amp;amp;utm_referrer=https%3A%2F%2Fwww.google.co.in%2F"&gt;suggesting hacks&lt;/a&gt; to mask or fake one's IP address. Sumiteshwar Choudhary, a practicing  criminal and matrimony lawyer, described on Quora how the law had  existed for quite some time but the government had never fully enforced  it:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;[..] The only reason that India has not been able to successfully ban these services is because the servers rest outside India and we don’t have any law to extend our jurisdiction to that extent today. As an end user if you download a pirated version of things you are not entitled to, you can be booked criminally under this Act and can face prison for up to 2 years…&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Twitter user Prisma Mama Thakur criticized the ban, arguing that it  should be a low priority in a moment when India has many other important  problems to solve:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Tweet.jpg" alt="Tweet" class="image-inline" title="Tweet" /&gt;&lt;/p&gt;
&lt;div class="alignright factbox"&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/global-voices-september-5-2016-subhashish-panigrahi-indians-ask-is-visiting-a-torrent-site-really-a-crime'&gt;https://cis-india.org/internet-governance/blog/global-voices-september-5-2016-subhashish-panigrahi-indians-ask-is-visiting-a-torrent-site-really-a-crime&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-06T14:09:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/talking-point-futile-battle-against-torrents">
    <title>Talking Point: Futile Battle Against Torrents</title>
    <link>https://cis-india.org/internet-governance/news/talking-point-futile-battle-against-torrents</link>
    <description>
        &lt;b&gt;Sunil Abraham spoke to Deccan Herald to clear the air about rumours surrounding a jail threat for those logging on to Torrent sites. &lt;/b&gt;
        &lt;h2&gt;Video&lt;/h2&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/kdFsAXkbOxE" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;This was originally published by Deccan Herald on August 30, 2016&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/talking-point-futile-battle-against-torrents'&gt;https://cis-india.org/internet-governance/news/talking-point-futile-battle-against-torrents&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-01T14:36:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges">
    <title>Report on Understanding Aadhaar and its New Challenges</title>
    <link>https://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges</link>
    <description>
        &lt;b&gt;The Trans-disciplinary Research Cluster on Sustainability Studies at Jawaharlal Nehru University collaborated with the Centre for Internet and Society, and other individuals and organisations to organise a two day workshop on “Understanding Aadhaar and its New Challenges” at the Centre for Studies in Science Policy, JNU on May 26 and 27, 2016. The objective of the workshop was to bring together experts from various fields, who have been rigorously following the developments in the Unique Identification (UID) Project and align their perspectives and develop a shared understanding of the status of the UID Project and its impact. Through this exercise, it was also sought to develop a plan of action to address the welfare exclusion issues that have arisen due to implementation of the UID Project.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Report: &lt;a href="https://cis-india.org/internet-governance/files/report-on-understanding-aadhaar-and-its-new-challenges/at_download/file"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;This Report is a compilation of the observations made by participants at the workshop relating to myriad issues under the UID Project and various strategies that could be pursued to address these issues. In this Report we have classified the observations and discussions into following themes:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1.&lt;/strong&gt; &lt;a href="#1"&gt;Brief Background of the UID Project&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.&lt;/strong&gt; &lt;a href="#2"&gt;Legal Status of the UIDAI Project&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#21"&gt;Procedural issues with passage of the Act&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#22"&gt;Status of related litigation&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;3.&lt;/strong&gt; &lt;a href="#3"&gt;National Identity Projects in Other Jurisdictions&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#31"&gt;Pakistan&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#32"&gt;United Kingdom&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#33"&gt;Estonia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#34"&gt;France&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#35"&gt;Argentina&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;4.&lt;/strong&gt; &lt;a href="#4"&gt;Technologies of Identification and Authentication&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#41"&gt;Use of Biometric Information for Identification and Authentication&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#42"&gt;Architectures of Identification&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#43"&gt;Security Infrastructure of CIDR&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;5.&lt;/strong&gt; &lt;a href="#5"&gt;Aadhaar for Welfare?&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#51"&gt;Social Welfare: Modes of Access and Exclusion&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#52"&gt;Financial Inclusion and Direct Benefits Transfer&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;6.&lt;/strong&gt; &lt;a href="#6"&gt;Surveillance and UIDAI&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;7.&lt;/strong&gt; &lt;a href="#7"&gt;Strategies for Future Action&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Annexure A&lt;/strong&gt; &lt;a href="#AA"&gt;Workshop Agenda&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Annexure B&lt;/strong&gt; &lt;a href="#AB"&gt;Workshop Participants&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 id="1" style="text-align: justify;"&gt;&lt;strong&gt;1. Brief Background of the UID Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;In the year 2009, the UIDAI was established and the UID project was conceived by the Planning Commission under the UPA government to provide unique identification for each resident in India and to be used for delivery of welfare government services in an efficient and transparent manner, along with using it as a tool to monitor government schemes.&amp;nbsp; The objective of the scheme has been to issue a unique identification number by the Unique Identification Authority of India, which can be authenticated and verified online. It was conceptualized and implemented as a platform to facilitate identification and avoid fake identity issues and delivery of government benefits based on the demographic and biometric data available with the Authority.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016 (the “&lt;strong&gt;Act&lt;/strong&gt;”) was passed as a money bill on March 16, 2016 and was notified in the gazette March 25, 2016 upon receiving the assent of the President. However, the enforceability date has not been mentioned due to which the bill has not come into force.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Act provides that the Aadhaar number can be used to validate a person’s identity, but it cannot be used as a proof of citizenship. Also, the government can make it mandatory for a person to authenticate her/his identity using Aadhaar number before receiving any government subsidy, benefit, or service. At the time of enrolment, the enrolling agency is required to provide notice to the individual regarding how the information will be used, the type of entities the information will be shared with and their right to access their information. Consent of an individual would be obtained for using his/her identity information during enrolment as well as authentication, and would be informed of the nature of information that may be shared. The Act clearly lays that the identity information of a resident shall not be sued for any purpose other than specified at the time of authentication and disclosure of information can be made only pursuant to an order of a court not inferior to that of a District Judge and/or disclosure made in the interest of national security.&lt;/p&gt;
&lt;h3 id="2" style="text-align: justify;"&gt;&lt;strong&gt;2. Legal Status of the UIDAI Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;In this section, we have summarised the discussions on the procedural issues with the passage of the Act. The participants had criticised the passage of the Act as a money bill in the Parliament. The participants also assessed the litigation pending in the Supreme Court of India that would be affected by this law. These discussions took place in the session titled, ‘Current Status of Aadhaar’ and have been summarised below.&lt;/p&gt;
&lt;h3 id="21" style="text-align: justify;"&gt;Procedural Issues with Passage of the Act&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The participants contested the introduction of the Act in the form of a money bill. The rationale behind this was explained at the session and is briefly explained here. Article 110 (1) of the Constitution of India defines a money bill as one containing provisions only regarding the matters enumerated or any matters incidental to the following: a) imposition, regulation and abolition of any tax, b) borrowing or other financial obligations of the Government of India, c) custody, withdrawal from or payment into the Consolidated Fund of India (CFI) or Contingent Fund of India, d) appropriation of money out of CFI, e) expenditure charged on the CFI or f) receipt or custody or audit of money into CFI or public account of India. The Act makes references to benefits, subsidies and services which are funded by the Consolidated Fund of India (CFI), however the main objectives of the Act is to create a right to obtain a unique identification number and provide for a statutory mechanism to regulate this process. The Act only establishes an identification mechanism which facilitates distribution of benefits and subsidies funded by the CFI and this identification mechanism (Aadhaar number) does not give it the character of a money bill. Further, money bills can be introduced only in the Lok Sabha, and the Rajya Sabha cannot make amendments to such bills passed by the Lok Sabha. The Rajya Sabha can suggest amendments, but it is the Lok Sabha’s choice to accept or reject them. This leaves the Rajya Sabha with no effective role to play in the passage of the bill.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants also briefly examined the writ petition that has been filed by former Union minister Jairam Ramesh challenging the constitutionality and legality of the treatment of this Act as a money bill which has raised the question of judiciary’s power to review the decisions of the speaker. Article 122 of the Constitution of India provides that this power of judicial review can be exercised to look into procedural irregularities. The question remains whether the Supreme Court will rule that it can determine the constitutionality of the decision made by the speaker relating to the manner in which the Act was introduced in the Lok Sabha. A few participants mentioned that similar circumstances had arisen in the case of Mohd. Saeed Siddiqui v. State of U.P. &lt;a href="#ftn1"&gt;[1]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;where the Supreme Court refused to interfere with the decision of the Uttar Pradesh legislative assembly speaker certifying an amendment bill to increase the tenure of the Lokayukta as a money bill, despite the fact that the bill amended the Uttar Pradesh Lokayukta and Up-Lokayuktas Act, 1975, which was passed as an ordinary bill by both houses. The Court in this case held that the decision of the speaker was final and that the proceedings of the legislature being important legislative privilege could not be inquired into by courts. The Court added, “the question whether a bill is a money bill or not can be raised only in the state legislative assembly by a member thereof when the bill is pending in the state legislature and before it becomes an Act.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, it is necessary to carve a distinction between Rajya Sabha and State Legislature. Unlike the State Legislature, constitution of Rajya Sabha is not optional therefore significance of the two bodies in the parliamentary process cannot be considered the same. Participants also made another significant observation about a similar bill on the UID project (National Identification Authority of India (NIDAI) Bill) that was introduced before by the UPA government in 2010 and was deemed unacceptable by the standing committee on finance, headed by Yashwant Sinha. This bill was subsequently withdrawn.&lt;/p&gt;
&lt;h3 id="22" style="text-align: justify;"&gt;Status of Related Litigation&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;A panellist in this session briefly summarised all the litigation that was related to or would be affected by the Act. The panellist also highlighted several Supreme Court orders in the case of &lt;em&gt;KS Puttuswamy v. Union of India&lt;/em&gt; &lt;a href="#ftn2"&gt;[2]&lt;/a&gt; which limited the use of Aadhaar. We have reproduced the presentation below.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;KS Puttuswamy v. Union of India&lt;/em&gt; - This petition was filed in 2012 with primary concern about providing Aadhaar numbers to illegal immigrants in India. It was contended that this could not be done without a law establishing the UIDAI and amendment to the Citizenship laws. The petitioner raised concerns about privacy and fallibility of biometrics.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Sudhir Vombatkere &amp;amp; Bezwada Wilson &lt;a href="#ftn3"&gt;[3]&lt;/a&gt; - This petition was filed in 2013 on grounds of infringement of right to privacy guaranteed under Article 21 of the Constitution of India and the security threat on account of data convergence.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Aruna Roy &amp;amp; Nikhil Dey &lt;a href="#ftn4"&gt;[4]&lt;/a&gt; - This petition was filed in 2013 on the grounds of large scale exclusion of people from access to basic welfare services caused by UID. After their petition, no. of intervention applications were filed. These were the following:&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Col. Mathew Thomas &lt;a href="#ftn5"&gt;[5]&lt;/a&gt; - This petition was filed on the grounds of threat to national security posed by the UID project particularly in relation to arrangements for data sharing with foreign companies (with links to foreign intelligence agencies).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Nagrik Chetna Manch &lt;a href="#ftn6"&gt;[6]&lt;/a&gt; - This petition was filed in 2013 and led by Dr. Anupam Saraph on the grounds that the UID project was detrimental to financial service regulation and financial &lt;em&gt;inclusion.&lt;/em&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;S. Raju &lt;a href="#ftn7"&gt;[7] &lt;/a&gt; - This petition was filed on the grounds that the UID project had implications on the federal structure of the State and was detrimental to financial inclusion.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Beghar Foundation&lt;/em&gt; - This petition was filed in 2013 in the Delhi High Court on the grounds invasion of privacy and exclusion specifically in relation to the homeless. It subsequently joined the petition filed by Aruna Roy and Nikhil Dey as an intervener.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Vickram Crishna – This petition was originally filed in the Bombay High Court in 2013 on the grounds of surveillance and invasion of privacy. It was later transferred to the Supreme Court.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Somasekhar – This petition was filed on the grounds of procedural unreasonableness of the UID project and also exclusion &amp;amp; privacy. The petitioner later intervened in the petition filed by Aruna Roy and Nikhil Dey in 2013.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Rajeev Chandrashekhar– This petition was filed on the ground of lack of legal sanction for the UID project. He later intervened in the petition filed by Aruna Roy and Nikhil Dey in 2013. His position has changed now.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Further, a petition was filed by Mr. Jairam Ramesh initially challenging the passage of the Act as a money bill but subsequently, it has been amended to include issues of violation of right to privacy and exclusion of the poor and has advocated for five amendments that were suggested to the Aadhaar Bill by the Rajya Sabha.&lt;/li&gt;&lt;/ul&gt;
&lt;h3 id="23" style="text-align: justify;"&gt;Relevant Orders of the Supreme Court&lt;/h3&gt;
&lt;p&gt;There are six orders of the Supreme Court which are noteworthy.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Order of Sept. 23, 2013 - The Supreme court directed that: 1) no person shall suffer for not having an aadhaar number despite the fact that a circular by an authority makes it mandatory; 2) it should be checked if a person applying for aadhaar number voluntarily is entitled to it under the law; and 3) precaution should be taken that it is not be issued to illegal immigrants.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Order of 26th November, 2013 – Applications were filed by UIDAI, Ministry of Petroleum &amp;amp; Natural Gas, Govt of India, Indian Oil Corporation, BPCL and HPCL for modifying the September 23rd order and sought permission from the Supreme Court to make aadhaar number mandatory. The Supreme Court held that the order of September 23rd would continue to be effective.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Order of 24th March, 2014 – This order was passed by the Supreme Court in a special leave petition filed in the case of &lt;em&gt;UIDAI v CBI&lt;/em&gt; &lt;a href="#ftn8"&gt;[8] &lt;/a&gt; wherein UIDAI was asked to UIDAI to share biometric information of all residents of a particular place in Goa to facilitate a criminal investigation involving charges of rape and sexual assault. The Supreme Court restrained UIDAI from transferring any biometric information of an individual without to any other agency without his consent in writing. The Supreme Court also directed all the authorities to modify their forms/circulars/likes so as to not make aadhaar number mandatory.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Order of 16th March, 2015 - The SC took notice of widespread violations of the order passed on September 23rd, 2013 and directed the Centre and the states to adhere to these orders to not make aadhaar compulsory.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Orders of August 11, 2015 – In the first order, the Central Government was directed to publicise the fact that aadhaar was voluntary. The Supreme Court further held that provision of benefits due to a citizen of India would not be made conditional upon obtaining an aadhaar number and restricted the use of aadhaar to the PDS Scheme and in particular for the purpose of distribution of foodgrains, etc. and cooking fuel, such as kerosene and&amp;nbsp; the LPG Distribution Scheme. The Supreme Court also held that information of an individual that was collected in order to issue an aadhaar number would not be used for any purpose except when directed by the Court for criminal investigations. Separately, the status of fundamental right to privacy was contested and accordingly the Supreme Court directed that the issue be taken up before the Chief Justice of India.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Orders of October 16, 2015 – The Union of India, the states of Gujarat, Maharashtra, Himachal Pradesh and Rajasthan, and authorities including SEBI, TRAI,&amp;nbsp; CBDT, IRDA , RBI applied for a hearing before the Constitution Bench for modification of&amp;nbsp; the order passed by the Supreme Court on August 11 and allow use of aadhaar number schemes like The Mahatma Gandhi National Rural Employment Guarantee Scheme MGNREGS), National Social Assistance Programme (Old Age Pensions, Widow Pensions, Disability Pensions) Prime Minister's Jan Dhan Yojana (PMJDY) and Employees' Providend Fund Organisation (EPFO). The Bench allowed the use of aadhaar number for these schemes but stressed upon the need to keep aadhaar scheme voluntary until the matter was finally decided.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Status of these orders&lt;br /&gt;The participants discussed the possible impact of the law on the operation of these orders. A participant pointed out that matters in the Supreme Court had not become infructuous because fundamental issues that were being heard in the Supreme Court had not been resolved by the passage of the Act. Several participants believed that the aforementioned orders were effective because the law had not come into force. Therefore, aadhaar number could only be used for purposes specified by the Supreme Court and it could not be made mandatory.&amp;nbsp; Participants also highlighted that when the Act was implemented, it would not nullify the orders of the Supreme Court unless Union of India asked the Supreme Court for it specifically and the Supreme Court sanctioned that.&lt;/p&gt;
&lt;h3 id="3" style="text-align: justify;"&gt;&lt;strong&gt;3. National Identity Projects in Other Jurisdictions&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;A panellist had provided a brief overview of similar programs on identification that have been launched in other jurisdictions including Pakistan, United Kingdom, France, Estonia and Argentina in the recent past in the session titled ‘Aadhaar - International Dimensions’. This presentation mainly sought to assess the incentives that drove the governments in these jurisdictions to formulate these projects, mandatory nature of their adoption and their popularity. The Report has reproduced the presentation here.&lt;/p&gt;
&lt;h3 id="31" style="text-align: justify;"&gt;Pakistan&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Second Amendment to the Constitution of Pakistan in 2000 established the National Database and Regulation Authority in the country, which regulates government databases and statistically manages the sensitive registration database of the citizens of Pakistan. It is also responsible for issuing national identity cards to the citizens of Pakistan. Although the card is not legally compulsory for a Pakistani citizen, it is mandatory for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Voting&lt;/li&gt;
&lt;li&gt;Obtaining a passport&lt;/li&gt;
&lt;li&gt;Purchasing vehicles and land&lt;/li&gt;
&lt;li&gt;Obtaining a driver licence&lt;/li&gt;
&lt;li&gt;Purchasing a plane or train ticket&lt;/li&gt;
&lt;li&gt;Obtaining a mobile phone SIM card&lt;/li&gt;
&lt;li&gt;Obtaining electricity, gas, and water&lt;/li&gt;
&lt;li&gt;Securing admission to college and other post-graduate institutes&lt;/li&gt;
&lt;li&gt;Conducting major financial transactions&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Therefore, it is pretty much necessary for basic civic life in the country. In 2012, NADRA introduced the Smart National Identity Card, an electronic identity card, which implements 36 security features. The following information can be found on the card and subsequently the central database: Legal Name, Gender (male, female, or transgender), Father's name (Husband's name for married females), Identification Mark, Date of Birth, National Identity Card Number, Family Tree ID Number, Current Address, Permanent Address, Date of Issue, Date of Expiry, Signature, Photo, and Fingerprint (Thumbprint). NADRA also records the applicant's religion, but this is not noted on the card itself. (This system has not been removed yet and is still operational in Pakistan.)&lt;/p&gt;
&lt;h3 id="32" style="text-align: justify;"&gt;United Kingdom&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Identity Cards Act was introduced in the wake of the terrorist attacks on 11th September, 2001, amidst rising concerns about identity theft and the misuse of public services. The card was to be used to obtain social security services, but the ability to properly identify a person to their true identity was central to the proposal, with wider implications for prevention of crime and terrorism. The cards were linked to a central database (the National Identity Register), which would store information about all of the holders of the cards. The concerns raised by human rights lawyers, activists, security professionals and IT experts, as well as politicians were not to do with the cards as much as with the NIR. The Act specified 50 categories of information that the NIR could hold, including up to 10 fingerprints, digitised facial scan and iris scan, current and past UK and overseas places of residence of all residents of the UK throughout their lives. The central database was purported to be a prime target for cyber attacks, and was also said to be a violation of the right to privacy of UK citizens. The Act was passed by the Labour Government in 2006, and repealed by the Conservative-Liberal Democrat Coalition Government as part of their measures to “reverse the substantial erosion of civil liberties under the Labour Government and roll back state intrusion.”&lt;/p&gt;
&lt;h3 id="33" style="text-align: justify;"&gt;Estonia&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Estonian i-card is a smart card issued to Estonian citizens by the Police and Border Guard Board. All Estonian citizens and permanent residents are legally obliged to possess this card from the age of 15. The card stores data such as the user's full name, gender, national identification number, and cryptographic keys and public key certificates. The cryptographic signature in the card is legally equivalent to a manual signature, since 15 December 2000. The following are a few examples of what the card is used for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;As a national ID card for legal travel within the EU for Estonian citizens&lt;/li&gt;
&lt;li&gt;As the national health insurance card&lt;/li&gt;
&lt;li&gt;As proof of identification when logging into bank accounts from a home computer&lt;/li&gt;
&lt;li&gt;For digital signatures&lt;/li&gt;
&lt;li&gt;For i-voting&lt;/li&gt;
&lt;li&gt;For accessing government databases to check one’s medical records, file taxes, etc.&lt;/li&gt;
&lt;li&gt;For picking up e-Prescriptions&lt;/li&gt;
&lt;li&gt;(This system is also operational in the country and has not been removed)&lt;/li&gt;&lt;/ul&gt;
&lt;h3 id="34" style="text-align: justify;"&gt;France&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The biometric ID card was to include a compulsory chip containing personal information, such as fingerprints, a photograph, home address, height, and eye colour. A second, optional chip was to be implemented for online authentication and electronic signatures, to be used for e-government services and e-commerce. The law was passed with the purpose of combating “identity fraud”. It was referred to the Constitutional Council by more than 200 members of the French Parliament, who challenged the compatibility of the bill with the citizens’ fundamental rights, including the right to privacy and the presumption of innocence. The Council struck down the law, citing the issue of proportionality. “Regarding the nature of the recorded data, the range of the treatment, the technical characteristics and conditions of the consultation, the provisions of article 5 touch the right to privacy in a way that cannot be considered as proportional to the meant purpose”.&lt;/p&gt;
&lt;h3 id="35" style="text-align: justify;"&gt;Argentina&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Documento Nacional de Identidad or DNI (which means National Identity Document) is the main identity document for Argentine citizens, as well as temporary or permanent resident aliens. It is issued at a person's birth, and updated at 8 and 14 years of age simultaneously in one format: a card (DNI tarjeta); it's valid if identification is required, and is required for voting. The front side of the card states the name, sex, nationality, specimen issue, date of birth, date of issue, date of expiry, and transaction number along with the DNI number and portrait and signature of the card's bearer. The back side of the card shows the address of the card's bearer along with their right thumb fingerprint. The front side of the DNI also shows a barcode while the back shows machine-readable information. The DNI is a valid travel document for entering Argentina, Bolivia, Brazil, Chile, Colombia, Ecuador, Paraguay, Peru, Uruguay, and Venezuela. (System still operational in the country)&lt;/p&gt;
&lt;h3 id="4" style="text-align: justify;"&gt;&lt;strong&gt;4. Technologies of Identification and Authentication&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The panel in the session titled ‘Aadhaar: Science, Technology, and Security’ explained the technical aspects of use of biometrics and privacy concerns, technology architecture for identification and inadequacy of infrastructure for information security. In this section, we have summarised the presentation and the ensuing discussions on these issues.&lt;/p&gt;
&lt;h3 id="41" style="text-align: justify;"&gt;Use of Biometric Information for Identification and Authentication&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The panelists explained with examples that identification and authentication were different things. Identity provides an answer to the question “who are you?” while authentication is a challenge-response process that provides a proof of the claim of identity. Common examples of identity are User ID (Login ID), cryptographic public keys and ATM or Smart cards while common authenticators are passwords (including OTPs), PINs and cryptographic private keys. Identity is public information but an authenticator must be private and known only to the user. Authentication must necessarily be a conscious process and active participation by the user is a must. It should also always be possible to revoke an authenticator. After providing this understanding of the two processes the panellist then explained if biometric information could be used for identification or authentication under the UID Project. Biometric information is clearly public information and it is questionable if it can be revoked. Therefore it should never be used for authentication, but only for identity verification. There is a possibility of authentication by fingerprints under the UID Project, without conscious participation of the user. One could trace the fingerprints of an individual from any place the individual has been in contact with. Therefore, authentication must certainly be done by other means. The panellist pointed out that there were five kinds of authentication under the UID Project, out of which two-factor authentication and one time password were considered suitable but use of biometric information and demographic information was extremely threatening and must be withdrawn.&lt;/p&gt;
&lt;h3 id="42" style="text-align: justify;"&gt;Architectures of Identification&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The panelists explained the architecture of the UID Project that has been designed for identification purposes, highlighted its limitations and suggested alternatives. His explanations are reproduced below.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Under the UID Project, there is a centralised means of identification i.e. the aadhaar number and biometric information stored in one place, Central Identification Data Repository (CIDR). It is better to have multiple means of identification than one (as contemplated under the UID Project) for preservation of our civil liberties. The question is what the available alternatives are. Web of trust is a way for operationalizing distributed identification but the challenge is how one brings people from all social levels to participate in it. There is a need for registrars who will sign keys and public databases for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The aadhaar number functions as a common index and facilitates correlation of data across Government databases. While this is tremendously attractive it raises several privacy concerns as more and more information relating to an individual is available to others and is likely to be abused.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The aadhaar number is available in human readable form. This raises the risk of identification without consent and unauthorised profiling. It cannot be revoked. Potential for damage in case of identity theft increases manifold.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Under the UID Project, for the purpose of information security, Authentication User Agencies (“&lt;strong&gt;AUA&lt;/strong&gt;”) are required to use local identifiers instead of aadhaar numbers but they are also required to map these local identifiers to the aadhaar numbers. Aadhaar numbers are not cryptographically secured; in fact they are publicly available. Hence this exercise for securing information is useless. An alternative would be to issue different identifiers for different domains and cryptographically embed a “master identifier” (in this case, equivalent of aadhaar number) into each local identifier.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;All field devices (for example POS machines) should be registered and must communicate directly with UIDAI. In fact, UIDAI must verify the authenticity (tamper proof) of the field device during run time and a UIDAI approved authenticity certificate must be issued for field devices. This certificate must be made available to users on demand. Further, the security and privacy frameworks within which AUAs work must be appropriately defined by legal and technical means.&lt;/p&gt;
&lt;h3 id="43" style="text-align: justify;"&gt;Security Infrastructure of CIDR&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The panelists also enumerated the security features of the UID Project and highlighted the flaws in these features. These have been summarised below.&lt;/p&gt;
&lt;p&gt;The security and privacy infrastructure of UIDAI has the following main features:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;2048 bit PKI encryption of biometric data in transit&lt;/li&gt;
&lt;li&gt;End-to-end encryption from enrolment/POS to CIDR&lt;/li&gt;
&lt;li&gt;HMAC based tamper detection of PID blocks&lt;/li&gt;
&lt;li&gt;Registration and authentication of AUAs&lt;/li&gt;
&lt;li&gt;Within CIDR only a SHA 1 Hash of Aadhaar number is stored&lt;/li&gt;
&lt;li&gt;Audit trails are stored SHA 1 encrypted. Tamper detection?&lt;/li&gt;
&lt;li&gt;Only hashes of passwords and PINs are stored. (biometric data stored in original form though!)&lt;/li&gt;
&lt;li&gt;Authentication requests have unique session keys and HMAC&lt;/li&gt;
&lt;li&gt;Resident data stored using 100 way sharding (vertical partitioning). First two digits of Aadhaar number as shard keys&lt;/li&gt;
&lt;li&gt;All enrolment and update requests link to partitioned databases using Ref IDs (coded indices)&lt;/li&gt;
&lt;li&gt;All accesses through a hardware security module&lt;/li&gt;
&lt;li&gt;All analytics carried out on anonymised data&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;The panellists pointed out the concerns about information security on account of design flaws, lack of procedural safeguards, openness of the system and too much trust imposed on multiple players. All symmetric and private keys and hashes are stored somewhere within UIDAI.&amp;nbsp; This indicates that trust is implicitly assumed which is a glaring design flaw.&amp;nbsp; There is no well-defined approval procedure for data inspection, whether it is for the purpose of investigation or for data analytics. There is a likelihood of system hacks, insider leaks, and tampering of authentication records and audit trails. The ensuing discussions highlighted that the UIDAI had admitted to these security risks. The enrolment agencies and the enrolment devices cannot be trusted. AUAs cannot be trusted with biometric and demographic data; neither can they be trusted with sensitive user data of private nature. There is a need for an independent third party auditor for distributed key management, auditing and approving UIDAI programs, including those for data inspection and analytics, whitebox cryptographic compilation of critical parts of the UIDAI programs, issue of cryptographic keys to UIDAI programs for functional encryption, challenge-response for run-time authentication and certification of UIDAI programs. The panellist recommended that there was a need to to put a suitable legal framework to execute this.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants also discussed that information infrastructure must not be made of proprietary software (possibility for backdoors for US) and there must be a third party audit with a non-negotiable clause for public audit.&lt;/p&gt;
&lt;h3 id="5" style="text-align: justify;"&gt;&lt;strong&gt;5. Aadhaar for Welfare?&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Report has summarised the discussions that took place in the sessions on ‘Direct Benefits Transfers’ and ‘Aadhaar: Broad Issues - II’ where the panellists critically analysed the claims of benefits and inclusion of Aadhaar made by the government in light of the ground realities in states where Aadhaar has been adopted for social welfare schemes.&lt;/p&gt;
&lt;h3 id="51" style="text-align: justify;"&gt;Social Welfare: Modes of Access and Exclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Under the Act, a person may be required to authenticate or give proof of the aadhaar number in order to receive subsidy from the government (Section 7). A person is required to punch their fingerprints on POS machines in order to receive their entitlement under the social welfare schemes such as LPG and PDS. It was pointed out in the discussions that various states including Rajasthan and Delhi had witnessed fingerprint errors while doling out benefits at ration shops under the PDS scheme. People have failed to receive their entitled benefits because of these fingerprint errors thus resulting in exclusion of beneficiaries &lt;a href="#ftn9"&gt;[9]&lt;/a&gt;. A panellist pointed out that in Rajasthan, dysfunctional biometrics had led to further corruption in ration shops. Ration shop owners often lied to the beneficiaries about functioning of the biometric machines (POS Machines) and kept the ration for sale in the market therefore making a lot of money at the expense of uninformed beneficiaries and depriving them of their entitlements.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Another participant organisation also pointed out similar circumstances in the ration shops in Patparganj and New Delhi constituencies. Here, the dealers had maintained the records of beneficiaries who had been categorized as follows: beneficiaries whose biometrics did not match, beneficiaries whose biometrics matched and entitlements were provided, beneficiaries who never visited the ration shop. It had been observed that there were no entries in the category of beneficiaries whose biometrics did not match however, the beneficiaries had a different story to tell. They complained that their biometrics did not match despite trying several times and there was no mechanism for a manual override. Consequently, they had not been able to receive any entitlements for months. The discussions also pointed out that the food authorities had placed complete reliance on authenticity of the POS machines and claim that this system would weed out families who were not entitled to the benefits. The MIS was also running technical glitches as a result there was a problem with registering information about these transactions hence, no records had been created with the State authority about these problems. A participant also discussed the plight of 30,000 widows in Delhi, who were entitled to pension and used to collect their entitlement from post offices, faced exclusion due to transition problems under the Jan Dhan Yojana (after the Jandhan was launched the money was transferred to their bank accounts in order to resolve the problem of misappropriation of money at the hands of post office officials). These widows were asked to open bank accounts to receive their entitlements and those who did not open these accounts and did not inform the post office were considered bogus.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the discussions, the participants also noted that this unreliability of fingerprints as a means of authentication of an individual’s identity was highlighted at the meeting of Empowered Group of Ministers in 2011 by J Dsouza, a biometrics scientist. He used his wife’s fingerprints to demonstrate that fingerprints may change overtime and in such an event, one would not be able to use the POS machine anymore as the machine would continue to identify the impressions collected initially.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants who had been working in the field had contributed to the discussions by busting the myth that the UID Project helped to identify who was poor and resolve the problem of exclusion due to leakages in the social welfare programs. These discussions have been summarised below.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;It is important to understand that the UID Project is merely an identification and authentication system. It only helps in verifying if an individual is entitled to benefits under a social security scheme. It does not ensure plugging of leakages and reducing corruption in social security schemes as has been claimed by the Government. The reduction in leakage of PDS, for instance, should be attributed to digitization and not UID. The Government claims, that it has saved INR 15000 crore in provision of LPG on identification of 3.34 crore inactive accounts on account of the UID Project. This is untrue because the accounts were weeded by using mechanisms completely unrelated to the UID Project. Consequently, the savings on account of UID are only of INR 120 crore and not 15000 crore.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The UID Project has resulted in exclusion of people either because they do not have an aadhaar number, or they have a wrong identification, or there are errors of classification or wilful misclassification. About 99.7% people who were given aadhaar numbers already had an identification document. In fact, during enrolment a person is required to produce one of 14 identification documents listed under the law in order to get an aadhaar number which makes it very difficult for a person with no identity to become entitled to a social welfare scheme.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;A participant condemned the Government’s claim that the UID Project had helped in removing fake, bogus and duplicate cards and said that these terms could not be used synonymously and the authorities had no clarity about the difference between the meanings of these terms. The UID Project had only helped in removal of duplicate cards but had not helped in combating the use of fake and bogus cards.&lt;/p&gt;
&lt;h3 id="52" style="text-align: justify;"&gt;Financial Inclusion and Direct Benefits Transfer&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The participants also engaged in the discussions about the impact of the UID project on financial inclusion in India in the sessions titled ‘Aadhaar: Broad Issues - I &amp;amp; II’. We have summarised these discussions below.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The UID Project seeks to directly transfer money to a bank account in order to combat corruption. The discussions highlighted that this was nothing but introducing a neo liberal thrust in social policy and that it was not feasible for various reasons. First, 95% of rural India did not have functioning banks and banks are quite far away. Second, in order to combat this dearth of banks the idea of business correspondents, who handled banking transactions and helped in opening of bank accounts, had been introduced which had created various problems. The Reserve Bank of India reported that there was dearth of business correspondents as there was very little incentive to become one; their salary is merely INR 4000. Third, there were concerns about how an aadhaar number was considered a valid document for Know Your Customer (KYC) checks. There was a requirement for scrutiny and auditing of documents submitted during the time of enrolment which, in the present scheme of things, could not be verified. Fourth, there were no restrictions on number of bank accounts that could be opened with a single aadhaar number which gave rise to a possibility of opening multiple and shell accounts on a single aadhaar number. Therefore, records only showed transactions when money was transferred from an aadhaar number to another aadhaar number as opposed to an account-to-account transfer. The discussion relied on NPCI data which shows which bank an aadhaar number is associated with but does not show if a transaction by an aadhaar number is overwritten by another bank account belonging to the same aadhaar number.&lt;/p&gt;
&lt;h3 id="6" style="text-align: justify;"&gt;&lt;strong&gt;6. Surveillance and UIDAI&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The participants had discussed the possibility of an alternative purpose for enrolling Aadhaar in the session titled ‘Privacy, Surveillance, and Ethical Dimensions of Aadhaar’. The discussion traced the history of this project to gain insight on this issue. We have summarised below the key take aways from this discussion.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;There are claims that the main objective of launching the UID Project is not to facilitate implementation of social security schemes but to collect personal (financial and non-financial) information of the citizens and residents of the country to build a data monopoly. For this purpose, PDS was chosen as a suitable social security scheme as it has the largest coverage. Several participants suggested that numerous reports authored by FICCI, KPMG and ASSOCHAM contained proposals for establishing a national identity authority which threw some light on the commercial intentions behind information collection under the UID Project.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It was also pointed out that there was documented proof that information collected under the UID Project might have been shared with foreign companies. There are suggestions about links established between proponents of the UID Project and companies backed by CIA or the French Government which run security projects and deal in data sharing in several jurisdictions.&lt;/p&gt;
&lt;h3 id="7" style="text-align: justify;"&gt;&lt;strong&gt;7. Strategies for Future Action&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The participants laid down a list of measures that must be taken to take the discussions forward. We have enumerated these recommendations below.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Prepare and compile an anthology of articles as an output of this workshop. &lt;/li&gt;
&lt;li&gt;Prepare position papers on specific issues related to the UID Project &lt;/li&gt;
&lt;li&gt;Prepare pamphlets/brochures on issues with the UID Project for public consumption &lt;/li&gt;
&lt;li&gt;Prepare counter-advertisements for Aadhaar&lt;/li&gt;
&lt;li&gt;Publish existing empirical evidence on the flaws in Aadhaar.&lt;/li&gt;
&lt;li&gt;Set up an online portal dedicated to providing updates on the UID Project and allows discussions on specific issues related to Aadhaar.&lt;/li&gt;
&lt;li&gt;Use Social Media to reach out to the public. Regularly track and comment on social media pages of relevant departments of the government.&lt;/li&gt;
&lt;li&gt;Create groups dedicated to research and advocacy of specific aspects of the UID Project. &lt;/li&gt;
&lt;li&gt;Create a Coordination Committee preferably based in Delhi which would be responsible for regularly holding meetings and for preparing a coordinated plan of action. Employ permanent to staff to run the Committee.&lt;/li&gt;
&lt;li&gt;Organise an advocacy campaign against use of Aadhaar in collaboration with other organisations and build public domain acceptance. &lt;/li&gt;
&lt;li&gt;The campaign must specifically focus on the unfettered scope of UID and expanse, misrepresentation of the success of Aadhaar by highlighting real savings, technological flaws, status of pilot programs and increasing corruption on account of the UID Project&lt;/li&gt;
&lt;li&gt;Prepare a statement of public concern regarding the UID Project and collect signatures from eminent persons including academics, technical experts, civil society groups and members of parliament.&lt;/li&gt;
&lt;li&gt;Organise events and discussions on issues relating to Aadhaar and invite members og government departments to speak and discuss the issues. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Write to Members of Parliament and Members of Legislative Assemblies raising questions on their or their parties’ support for Aadhaar and silence on the problems created by the UID Project. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Organise public hearings in states like Rajasthan to observe and document ground realities of the UID Project and share these outcomes with the state government and media. &lt;/li&gt;
&lt;li&gt;Plan a national social audit and public hearing on the working of UID Project in the country. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;File Contempt Petitions in the Supreme Court and High Courts against mandatory use of Aadhaar number for services not allowed by the Supreme Court. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Reach out to and engage with various foreign citizens and organisations that have been fighting on similar issues. The organisations and individuals who could be approached would include EPIC, Electronic Frontier foundation, David Moss, UK, Roger Clarke, Australia, Prof. Ian Angel, Snowden, Assange and Chomsky.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Work towards increasing awareness about the UID Project and gaining support from the student and research community, student organisations, trade unions, and other associations and networks in the unorganised sector.&lt;/li&gt;&lt;/ul&gt;
&lt;h3 id="AA" style="text-align: justify;"&gt;&lt;strong&gt;Annexure A – Workshop Agenda&lt;/strong&gt;&lt;/h3&gt;
&lt;h4&gt;May 26, 2016&lt;/h4&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9:00-9:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Registration&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9:30-10:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Prof. Dinesh Abrol - &lt;em&gt;Welcome&lt;/em&gt;&lt;br /&gt; 
&lt;em&gt;Self-introduction and expectations of participants&lt;/em&gt;&lt;br /&gt;
Dr. Usha Ramanathan - &lt;em&gt;Overview of the Workshop&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10:00-11:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 1: Current Status of Aadhaar&lt;/strong&gt;&lt;br /&gt;
Dr. Usha Ramanathan, Legal Researcher, New Delhi - &lt;em&gt;What the 2016 Law Says, and How it Came into Being&lt;/em&gt;&lt;br /&gt;
S. Prasanna, Advocate, New Delhi - &lt;em&gt;Status and Force of Supreme Court Orders on Aadhaar&lt;/em&gt;&lt;br /&gt; &lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11:00-11:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11:30-13:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 2: Direct Benefits Transfers&lt;/strong&gt;&lt;br /&gt;
Prof. Reetika Khera, Indian Institute of Technology, Delhi - &lt;em&gt;Welfare Needs Aadhaar like a Fish Needs a   Bicycle&lt;/em&gt;&lt;br /&gt;
Prof. R. Ramakumar, Tata Institute of Social Sciences, Mumbai - &lt;em&gt;Aadhaar and the Social Sector: A critical   analysis of the claims of benefits and inclusion&lt;/em&gt;&lt;br /&gt;
Ashok Rao, Delhi Science Forum - &lt;em&gt;Cash Transfers Study&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13:30-14:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;14:30-16:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 3: Aadhaar: Science, Technology, and Security&lt;/strong&gt;&lt;br /&gt;
Prof. Subashis Banerjee, Dept of Computer Science &amp;amp; Engineering, IIT,   Delhi - &lt;em&gt;Privacy and Security   Issues Related to the Aadhaar Act&lt;/em&gt;&lt;br /&gt;
Pukhraj Singh, Former National Cyber Security Manager, Aadhaar, New Delhi - &lt;em&gt;Aadhaar: Security and   Surveillance Dimensions&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16:00-16:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16:30-17:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 4: Aadhaar - International Dimensions&lt;/strong&gt;&lt;br /&gt; 
Joshita Pai, Center for Communication Governance, National Law University, Delhi - &lt;em&gt;Biometrics and Mandatory IDs in Other Parts of the World&lt;/em&gt;&lt;br /&gt;
Dr. Gopal Krishna, Citizens Forum for Civil Liberties - &lt;em&gt;International Dimensions of Aadhaar&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;17:30-18:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;High Tea&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h4&gt;May 27, 2016&lt;/h4&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9:30-11:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 5: Privacy, Surveillance and Ethical Dimensions of Aadhaar&lt;/strong&gt;&lt;br /&gt;
Prabir Purkayastha, Free Software Movement of India, New Delhi - &lt;em&gt;Surveillance Capitalism and the Commodification of Personal Data&lt;/em&gt;&lt;br /&gt;
Arjun Jayakumar, SFLC - &lt;em&gt;Surveillance Projects Amalgamated&lt;/em&gt;&lt;br /&gt;
Col Mathew Thomas, Bengaluru - &lt;em&gt;The Deceit of Aadhaar&lt;em&gt;&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/em&gt;&lt;/p&gt;
&lt;em&gt;
&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11:00-11:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;11:30-13:00&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 6: Aadhaar - Broad Issues I&lt;/strong&gt;&lt;br /&gt;
Prof. G Nagarjuna, Homi Bhabha Center for Science Education, Tata Institute of Fundamental Research, Mumbai - &lt;em&gt;How to prevent linked data in the context of Aadhaar&lt;/em&gt;&lt;br /&gt;
Dr. Anupam Saraph, Pune - &lt;em&gt;Aadhaar and Moneylaundering&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13:00-14:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;14:00-15:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 7: Aadhaar - Broad Issues II&lt;/strong&gt;&lt;br /&gt;
Prof. MS Sriram, Visiting Faculty, Indian Institute of Management, Bangalore - &lt;em&gt;Financial lnclusion&lt;/em&gt;&lt;br /&gt;
Nikhil Dey, MKSS, Rajasthan - &lt;em&gt;Field witness: Technology on the Ground&lt;/em&gt;&lt;br /&gt;
Prof. Himanshu, Centre for Economic Studies &amp;amp; Planning, JNU - &lt;em&gt;UID Process and Financial Inclusion&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;15:30-16:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 8: Conclusion&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16:00-18:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Informal Meetings&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 id="AB" style="text-align: justify;"&gt;&lt;strong&gt;Annexure B – Workshop Participants&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Anjali Bhardwaj, Satark Nagrik Sangathan&lt;/p&gt;
&lt;p&gt;Dr. Anupam Saraph&lt;/p&gt;
&lt;p&gt;Arjun Jayakumar, Software Freedom Law Centre&lt;/p&gt;
&lt;p&gt;Ashok Rao, Delhi Science Forum&lt;/p&gt;
&lt;p&gt;Prof. Chinmayi Arun, National Law University, Delhi&lt;/p&gt;
&lt;p&gt;Prof. Dinesh Abrol, Jawaharlal Nehru University&lt;/p&gt;
&lt;p&gt;Prof. G Nagarjuna, Homi Bhabha Center for Science Education, Tata Institute of Fundamental Research, Mumbai&lt;/p&gt;
&lt;p&gt;Dr. Gopal Krishna, Citizens Forum for Civil Liberties&lt;/p&gt;
&lt;p&gt;Prof. Himanshu, Jawaharlal Nehru University&lt;/p&gt;
&lt;p&gt;Japreet Grewal, the Centre for Internet and Society&lt;/p&gt;
&lt;p&gt;Joshita Pai, National Law University, Delhi&lt;/p&gt;
&lt;p&gt;Malini Chakravarty, Centre for Budget and Governance Accountability&lt;/p&gt;
&lt;p&gt;Col. Mathew Thomas&lt;/p&gt;
&lt;p&gt;Prof. MS Sriram, Indian Institute of Management, Bangalore&lt;/p&gt;
&lt;p&gt;Nikhil Dey, Mazdoor Kisan Shakti Sangathan&lt;/p&gt;
&lt;p&gt;Prabir Purkayastha, Knowledge Commons and Free Software Movement of India&lt;/p&gt;
&lt;p&gt;Pukhraj Singh, Bhujang&lt;/p&gt;
&lt;p&gt;Rajiv Mishra, Jawaharlal Nehru University&lt;/p&gt;
&lt;p&gt;Prof. R Ramakumar, Tata Institute of Social Sciences, Mumbai&lt;/p&gt;
&lt;p&gt;Dr. Reetika Khera, Indian Institute of Technology, Delhi&lt;/p&gt;
&lt;p&gt;Dr. Ritajyoti Bandyopadhyay, Indian Institute of Science Education and Research, Mohali&lt;/p&gt;
&lt;p&gt;S. Prasanna, Advocate&lt;/p&gt;
&lt;p&gt;Sanjay Kumar, Science Journalist&lt;/p&gt;
&lt;p&gt;Sharath, Software Freedom Law Centre&lt;/p&gt;
&lt;p&gt;Shivangi Narayan, Jawaharlal Nehru University&lt;/p&gt;
&lt;p&gt;Prof. Subhashis Banerjee, Indian Institute of Technology, Delhi&lt;/p&gt;
&lt;p&gt;Sumandro Chattapadhyay, the Centre for Internet and Society&lt;/p&gt;
&lt;p&gt;Dr. Usha Ramanathan, Legal Researcher&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Note: This list is only indicative, and not exhaustive.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a name="ftn1"&gt;&lt;strong&gt;[1]&lt;/strong&gt;&lt;/a&gt; Civil Appeal No. 4853 of 2014&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn2"&gt;&lt;strong&gt;[2]&lt;/strong&gt;&lt;/a&gt; WP(C) 494/2012&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn3"&gt;&lt;strong&gt;[3]&lt;/strong&gt; &lt;/a&gt;. WP(C) 829/2013&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn4"&gt;&lt;strong&gt;[4]&lt;/strong&gt;&lt;/a&gt; WP(C) 833/2013&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn5"&gt;&lt;strong&gt;[5]&lt;/strong&gt;&lt;/a&gt; WP (C) 37/2015; (Earlier intervened in the Aruna Roy petition in 2013)&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn6"&gt;&lt;strong&gt;[6]&lt;/strong&gt;&lt;/a&gt; WP (C) 932/2015&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn7"&gt;&lt;strong&gt;[7]&lt;/strong&gt;&lt;/a&gt; Transferred from Madras HC 2013.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="ftn8"&gt;&lt;strong&gt;[8]&lt;/strong&gt;&lt;/a&gt; SLP (Crl) 2524/2014 filed against the order of the Goa Bench of the Bombay HC in CRLWP 10/2014 wherein the High Court had directed UIDAI to share biometric information held by them of all residents of a particular place in Goa to help with a criminal investigation in a case involving charges of rape and sexual assault.&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn9"&gt;&lt;strong&gt;[9]&lt;/strong&gt;&lt;/a&gt; See :http://scroll.in/article/806243/rajasthan-presses-on-with-aadhaar-after-fingerprint-readers-fail-well-buy-iris-scanners&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges'&gt;https://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Japreet Grewal, Vanya Rakesh, Sumandro Chattapadhyay, and Elonnai Hickock</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Welfare Governance</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    

   <dc:date>2019-03-16T04:42:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindustan-times-vidushi-marda-august-31-2016-we-truly-are-the-product-being-sold">
    <title>We Truly are the Product being Sold</title>
    <link>https://cis-india.org/internet-governance/blog/hindustan-times-vidushi-marda-august-31-2016-we-truly-are-the-product-being-sold</link>
    <description>
        &lt;b&gt;WhatsApp has announced it will begin sharing user data such as names, phone numbers, and other analytics with its parent company, Facebook, and with the Facebook family of companies. This change to its terms of service was effected in order to enable users to “communicate with businesses that matter” to them. How does this have anything to do with Facebook?

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.hindustantimes.com/analysis/we-truly-are-the-product-being-sold/story-fz6FN77xizMuxOBS3KBNtJ.html"&gt;published in the Hindustan Times&lt;/a&gt; on August 31, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;WhatsApp clarifies in its blog post, “... by coordinating more with  Facebook, we’ll be able to do things like track basic metrics about how  often people use our services and better fight spam on WhatsApp. And by  connecting your phone number with Facebook’s systems, Facebook can offer  better friend suggestions and show you more relevant ads if you have an  account with them.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;WhatsApp’s further clarifies that it will not post your number on  Facebook or share this data with advertisers. This means little because  it will share your number with Facebook for advertisement. It is simply  doing indirectly, what it has said it won’t do directly. This new  development also leads to the collapsing of different personae of a  user, even making public their private life that they have so far chosen  not to share online. Last week, &lt;a href="https://www.washingtonpost.com/news/the-intersect/wp/2016/08/19/98-personal-data-points-that-facebook-uses-to-target-ads-to-you/?tid=sm_tw" shape="rect" title="www.washingtonpost.com"&gt;Facebook published a list of 98 data points it collects on users&lt;/a&gt;.  These data points combined with your WhatsApp phone number, profile  picture, status message, last seen status, frequency of conversation  with other users, and the names of these users (and their data) could  lead to a severely uncomfortable invasion of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consider a situation where you have spoken to a divorce lawyer in  confidence over WhatsApp’s encrypted channel, and are then flooded with  advertisements for marriage counselling and divorce attorneys when you  next log in to Facebook at home. Or, you are desperately seeking loans  and get in touch with several loan officers; and when you log in to  Facebook at work, colleagues notice your News Feed flooded with ads for  loans, articles on financial management, and support groups for people  in debt.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is no secret that Facebook makes money off interactions on its  platform, and the more information that is shared and consumed, the more  Facebook is benefitted. However, the company’s complete disregard for  user consent in its efforts to grow is worrying, particularly because  Facebook is a monopoly. In order for one to talk to friends and family  and keep in touch, Facebook is the obvious, if not the only, choice. It  is also increasingly becoming the most accessible way to engage with  government agencies. For example, Indian embassies around the world have  recently set up Facebook portals, the Bangalore Traffic Police is most  easily contacted through Facebook, and heads of states are also turning  to the platform to engage with people. It is crucial that such private  and collective interactions of citizens with their respective government  agencies are protected from becoming data points to which market  researchers have access.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given Facebook’s proclivity for unilaterally compromising user  privacy, the Federal Trade Commission (FTC) in 2011 charged the company  for deceiving consumers by misleading them about the privacy of their  information. Following these charges, Facebook reached an agreement to  give consumers clear notice and obtain consumers’ express consent before  extending privacy settings that they had established. The latest  modification to WhatsApp’s terms of service seems to amount to a clear  violation of this agreement and brings out the grave need to treat user  consent more seriously.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is a way to opt out of sharing data for Facebook ads targeting &lt;a href="https://www.whatsapp.com/faq/general/26000016" shape="rect" title="www.whatsapp.com"&gt;that is outlined by WhatsApp on its blog&lt;/a&gt;,  which is the best example for a case of invasion-of-privacy-by-design.  WhatsApp plans to ask the users to untick a small green arrow, and then  click on a large green button that says “Agree” (which is the only  button) so as to indicate that they are opting-out. The interface of the  notice seems to be consciously designed to confuse users by using the  power of default option. For most users, agreeing to terms and  conditions is a hasty click on a box and the last part of an  installation process. Predictably, most users choose to go with default  options, and this specific design of the opt-out option is not  meaningful at all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2005, Facebook’s default profile settings were such that anyone on  Facebook could see your name, profile picture, gender and network. Your  photos, wall posts and friends list were viewable by people in your  network. Your contact information, birthday and other data could be seen  by friends and only you could view the posts that you liked. Fast  forward to 2010, and the entire internet, not just all Facebook users,  can see your name, profile picture, gender, network, wall posts, photos,  likes, friends list and other profile data. There hasn’t been a &lt;a href="http://mattmckeon.com/facebook-privacy/" shape="rect" title="mattmckeon.com"&gt;comprehensive study since 2010&lt;/a&gt;,  but one can safely assume that Facebook’s privacy settings will only  get progressively worse for users, and exponentially better for  Facebook’s revenues. The service is free and we truly are the product  being sold.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindustan-times-vidushi-marda-august-31-2016-we-truly-are-the-product-being-sold'&gt;https://cis-india.org/internet-governance/blog/hindustan-times-vidushi-marda-august-31-2016-we-truly-are-the-product-being-sold&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vidushi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-01T02:08:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-telegraph-august-26-2016-festival-scan-on-social-media">
    <title>Festival scan on social media</title>
    <link>https://cis-india.org/internet-governance/news/the-telegraph-august-26-2016-festival-scan-on-social-media</link>
    <description>
        &lt;b&gt;Authorities in a south Karnataka district have started keeping tighter watch on rumour-mongering and hate messages on social media platforms ahead of religious festivals.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published &lt;a class="external-link" href="http://www.telegraphindia.com/1160826/jsp/nation/story_104570.jsp#.V7-0ANeE3oM"&gt;in the Telegraph&lt;/a&gt; on August 26, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Police in the communally sensitive Dakshina Kannada district have cautioned people not to start or circulate any hate message or rumours that could affect law and order.&lt;br /&gt;&lt;br /&gt;"Anyone spreading rumours or hate messages can be charged under IPC Section 505 as we have all the technical capability to find out the origins of such messages," said Mangalore city police commissioner M. Chandra Sekhar.&lt;br /&gt;&lt;br /&gt;This section is applied in the event of any statement or rumour with the intent to cause alarm among the public. "We do get several messages that later turn out to be a hoax," the officer said, citing instances of false rumours.&lt;br /&gt;&lt;br /&gt;The officer exhorted citizens to alert the police the moment they get any such messages so that it could minimise or even prevent any damage, especially if the content is communally sensitive.&lt;br /&gt;&lt;br /&gt;The district authorities have already ramped up police presence to prevent anything untoward in view of the activities of cow vigilantes who recently lynched a BJP worker for transporting calves in neighbouring Udupi district.&lt;br /&gt;&lt;br /&gt;A source in the state police department hinted the measure could be replicated across the state, although other districts are not as communally sensitive like Dakshina Kannada.&lt;br /&gt;&lt;br /&gt;The district - Mangalore is its administrative headquarters - had been in the thick of communal tension for decades.&lt;br /&gt;&lt;br /&gt;Bhushan Gulabrao Borase, superintendent of police in charge of the Dakshina Kannada rural district, that is the rest of the district except Mangalore city, said keeping a watch on social media had become imperative. "Rural people may be using social media less frequently. But even then we need to be careful," he said.&lt;br /&gt;&lt;br /&gt;Cow vigilantism by Hindutva groups is a major concern.&lt;br /&gt;&lt;br /&gt;He said people could land in trouble for a seemingly harmless message if it causes some serious issue. "It is better not to start such messages. But it's also important not to forward if one receives them," said Borase.&lt;br /&gt;&lt;br /&gt;Sunil Abraham, executive director of The Centre for Internet and Society, had a word of caution, although he appreciated the intent behind the police move.&lt;br /&gt;&lt;br /&gt;"It's a reasonable approach if they stick to the scope of the law (Section 505). The problem is only if police overstep their limits, like we have seen on several occasions."&lt;br /&gt;&lt;br /&gt;But he agreed there was a need to keep an eye on what goes on in social media since many users abuse messaging platforms like WhatsApp.&lt;br /&gt;&lt;br /&gt;"What we don't want is a Nazi Germany where the wife is asked to spy on her husband and the son on the father. But we also don't want the opposite when citizens just ignore everything," he said, asserting that it was the duty of civil society to inform the police if they found anything dangerous being circulated.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-telegraph-august-26-2016-festival-scan-on-social-media'&gt;https://cis-india.org/internet-governance/news/the-telegraph-august-26-2016-festival-scan-on-social-media&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-08-26T03:20:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/first-post-august-23-2016-seetha-extending-aadhaar-to-more-areas-is-a-hare-brained-idea-it-should-be-dropped">
    <title>Extending Aadhaar to more areas is a hare-brained idea, it should be dropped</title>
    <link>https://cis-india.org/internet-governance/news/first-post-august-23-2016-seetha-extending-aadhaar-to-more-areas-is-a-hare-brained-idea-it-should-be-dropped</link>
    <description>
        &lt;b&gt;News reports that the mandatory use of Aadhaar could be extended to a host of new areas are extremely disturbing. According to these reports, the Unique Identification Authority of India (UIDAI) has identified 20 new areas for which Aadhaar can be made mandatory. This includes registration of companies and NGOs, insurance, competitive examinations and property and vehicle registration.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Seetha was published in &lt;a class="external-link" href="http://www.firstpost.com/business/extending-aadhaar-to-more-areas-is-a-hare-brained-idea-it-should-be-dropped-2972182.html"&gt;First Post&lt;/a&gt; on August 23, 2016. CIS article by Pranesh Prakash and Amber Sinha was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;If this happens, then it confirms the worst suspicions of all those who are opposed to Aadhaar – and this spans ideological divides – that it can be used to seriously compromise individual privacy.&lt;/p&gt;
&lt;div class="alignleft wp-caption" id="attachment_2972214" style="float: left; text-align: justify; "&gt;&lt;a href="http://s2.firstpost.in/wp-content/uploads/2016/08/Aadhaar-380.jpg"&gt;&lt;img alt="A villager scanning fingerprint for Aadhaar. Reuters file photo" class="wp-image-2972214 size-full" height="285" src="http://s2.firstpost.in/wp-content/uploads/2016/08/Aadhaar-380.jpg" width="380" /&gt;&lt;/a&gt;
&lt;p class="wp-caption-text"&gt;A villager scanning fingerprint for Aadhaar. Reuters file photo&lt;/p&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The defenders of Aadhaar – mainly the previous and current governments, the UIDAI and Nandan Nilekani, the father of the Aadhaar – have always argued that these concerns are exaggerated. They have pointed out that Aadhaar does not take any details that are not already in the public domain – name, date of birth and permanent address – and that the biometric data is not shared with any of the authorities that seek verification by Aadhaar. That data remains with the UIDAI and it only confirms that a person with a particular Aadhaar number is who he claims he is.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Aadhaar’s opponents have argued that the extensive use of Aadhaar allows disparate bits of information to be linked and this could become a genuine concern if this hare-brained idea gets official approval.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Now, there is certainly no doubt that Aadhaar is, in the absence of anything better, the best technological tool for establishing identity. It is not entirely fool-proof – there are issues relating to the fingerprints of manual labourers and iris scan of aged people or those with cataract – a solution needs to be found for this. According to&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="http://cis-india.org/internet-governance/blog/hindustan-times-amber-sinha-pranesh-prakash-march-12-2016-privacy-concerns-overshadow-monetary-benefits-of-aadhaar-scheme" rel="nofollow" target="_blank"&gt;this report&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;by the Centre for Internet and Society, there was fingerprint authentication failure in 290 of 790 ration card holders in Andhra Pradesh who did not lift rations, and there was an ID mismatch in 93 instances. These problems notwithstanding, there is no denying that Aadhaar has helped in significantly containing (perhaps not entirely eliminating) the problem of identity theft for diversion of government doles and other benefits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So making Aadhaar compulsory for such cases is perfectly justifiable. Indeed, the Act giving legal status to Aadhaar is called Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mandatory quoting of Aadhaar can even be justified in the cases where duplication or falsification of identity can be used by criminals or those who fall foul of the law. Passports, for example, can be brought under the ambit of Aadhaar. Or even driving licences. A person whose licence has been suspended for repeated traffic violations should not be allowed to get another one under the same name or an assumed name.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But why should it be mandatory for bank accounts, if an individual is not interested in getting government doles? The quoting of Aadhaar for property transactions also does not make sense. If the idea is to prevent fraudulent transactions, it will not be foolproof. A person intending to sell an already sold property or one he does not own can do so even with an Aadhaar number, since people are allowed to own more than one piece of property. What will prevent this from happening is compulsory registration and digitisation of records as well as mandatory property titling; there has been little progress on both.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When filing of income tax returns is not possible without a PAN, there is little rationale for making Aadhaar mandatory for filing returns and even for PAN. It is not clear how quoting of Aadhaar is going to help in ensuring that fly-by-night companies and NGOs do not get established.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The insistence of Aadhaar on purchase of vehicles, landline and mobile phone connections and demat accounts is seriously violative of individual privacy and has enormous potential for misuse. The Act does give the government unbridled power to access data in the name of national security. This itself is worrying, since it can allow security agencies to go an random fishing expeditions to access personal financial transactions. Making it mandatory for even buying cars and phone connections (even though it is not illegal to own more than one vehicle or telephone connection) makes it even riskier – private agencies get access to one’s Aadhaar number. Forget security agencies, even unscrupulous private persons can track an individual’s personal activities, especially financial transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As it is, investigating agencies want to tap Aadhaar and biometric data at the drop of a hat. The UIDAI had to approach the Supreme Court in 2014 against a Goa High Court order ordering it to share biometric details of everyone enrolled in the state for solving a gang rape case. Even after the Supreme Court ruled in favour of UIDAI, a Kerala special investigation team wanted it to share biometric details to solve another rape case. If Aadhaar now becomes mandatory for a host of financial and other transactions, the points of potential privacy breaches only increase.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move to extend the mandatory use of Aadhaar has to be stopped in its tracks. The mandatory use should be limited to delivery of government welfare benefits and doles (after ensuring that glitches are eliminated) and security-related services like passports. For everything else, it should be purely voluntary. There can be no compromise on this.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/first-post-august-23-2016-seetha-extending-aadhaar-to-more-areas-is-a-hare-brained-idea-it-should-be-dropped'&gt;https://cis-india.org/internet-governance/news/first-post-august-23-2016-seetha-extending-aadhaar-to-more-areas-is-a-hare-brained-idea-it-should-be-dropped&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-08-24T03:05:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/policy-brief-on-the-report-of-the-un-group-of-governmental-experts-on-ict">
    <title>Policy Brief on the Report of the UN Group of Governmental Experts on ICT</title>
    <link>https://cis-india.org/internet-governance/blog/policy-brief-on-the-report-of-the-un-group-of-governmental-experts-on-ict</link>
    <description>
        &lt;b&gt;In light of the complex challenges and threats posed to, and by, the field of information telecommunications in cyberspace, in 1998 the draft resolution in the First Committee of the UN General Assembly was introduced and adopted without a vote (A/RES/53/70) ]. Since then, the Secretary General to the General Assembly has invited annual reports on the issue.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The most recent report, Developments in the Field of Information and Telecommunications in the Context of International Security, was published in June 2015. The 2015 Report touches upon a number of issues, including international cooperation, norms and principles for responsible state behavior, confidence building measures cross border  exchange of information, and capacity building measures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Annual reports will continue to be accepted by the General Assembly, and the 2016/2017 Group of Governmental Experts will have it's first meeting in August 2016.  India was a member of the Group of Governmental Experts in 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society (CIS) has written an article analyzing India’s alignment with the recommendations of the report of the Group of Governmental Experts. This policy brief attempts to articulate the major policy actions that may be considered by India to further incorporate and implement the principles enunciated in the Report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS believes that the report of the Group of Governmental Experts provides important minimum standards that countries could adhere to in light of challenges to international security posed by ICT developments. Given the global nature of these challenges and the need for nations to holistically address such challenges from a human rights and security perspective, CIS believes that the Group of Governmental Experts and similar international forums are useful and important forums for India to continue to actively engage with.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Below are our specific recommendations:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(a) Consistent with the purposes of the United Nations, including to maintain international peace and security, States should cooperate in developing and applying measures to increase stability and security in the use of ICTs and to prevent ICT practices that are acknowledged to be harmful or that may pose threats to international peace and security;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has entered into treaties on ICT issues with countries such as Belarus, Canada, China, Egypt, and France. Additionally, India’s IT Act addresses a number of  the cyber crimes listed in the Budapest Convention. However, India is not yet a signatory to the Convention. This leaves scope for India to consider further forums and means of international cooperation to better realise this principle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has been invited to accede to the Budapest Convention in the past but for various tactical and political reasons has not yet agreed to do so. Although whether to accede to an International Convention or not is usually a well discussed and thought out policy decision of the diplomatic core of a country, the mutual assistance framework, however flawed it may be, would offer a better opportunity for India for international cooperation for increasing the stability and security of ICTs and prevent harmful ICT practices as envisaged in the Report of the Group of Governmental Experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(b) In case of ICT incidents, States should consider all relevant information, including the larger context of the event, the challenges of attribution [of cybercrime] in the ICT environment and the nature and extent of the consequences;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the Department of Electronics and Information Technology (DEITY) as well as the Computer Emergency Response Team, India (CERT-In) have a number of policies which talk about maintaining security and means of addressing threats in the ICT environment, most ICT incidents, crimes or illegal activities using ICT, unless they involve large or government institutions, are handled by the regular police establishment of the country. The lack of capacity, both in terms of infrastructure and skill, of the regular police to adequately address most cyber crimes is an area that needs to be strengthened. The need for cyber security capacity building in India was highlighted in 2015 by the Standing Committee on Information Technology.   It would be useful for dedicated cyber crime departments to be established in all districts. This would be a step in the right direction to provide the requisite capacity and resources to deal with the various technical issues such as attribution, jurisdiction, etc. arising out of ICT incidents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(d) States should consider how best to cooperate to exchange information, assist each other, prosecute terrorist and criminal use of ICTs and implement other cooperative measures to address such threats. States may need to consider whether new measures need to be developed in this respect;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Owing to the growing irrelevance of physical and political borders in the age of globally networked devices, one of the most important issues arising out of ICTs and cyber crimes is the need for greater and more efficient exchange of information between nations. It has been widely accepted that sharing of information on a regular and sustained basis between nation states would be a very important tool. Limitations in the traditional mechanisms (MLATs, Letters Rogatory, etc.) such as the delay in accessing the information as well as denial of access due to differences in legal standards, present  hurdles to the efficacy of law enforcement agencies only emphasize the urgency of developing a new mechanism of international information sharing that would be able to deal with ICT incidents, while at the same time protecting the freedoms and privacy rights of the citizens of the world. Exploration and participation in dialogues and solutions that are evolving at the international level around cross border sharing of information is key.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(i) States should take reasonable steps to ensure the integrity of the supply chain [of ICT equipment] so that end users can have confidence in the security of ICT products. States should seek to prevent the proliferation of malicious ICT tools and techniques and the use of harmful hidden functions; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the National Electronics Policy of 2012 states that the government should mandate technical and safety standards in order to curb the inflow of sub-standard and unsafe electronic products, the government is yet to mandate any broad standards in the Indian market for ICT equipment. Considering the enormous security implications of compromised ICT this is an area where the government should prioritize and must act immediately. Mandating standards may require the establishment of a monitoring or enforcement mechanism to ensure that the standards are being implemented. This should be done with the aim of ensuring security while not hindering innovation or the flow of business. To achieve such a balance, research and discussion is needed within the government to formulate a mechanism which would ensure the safety and quality of ICT tools while at the same time ensuring that industry is not hindered.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The suggestions given above are some of the major lessons from the analysis of the UN Report on ICT which CIS believe the government of India could adopt and pursue to strengthen its enlightenment with the recommendations of the Report. It is also imperative that the Government of India continues to realise the importance of the work being done by the Group of Governmental Experts and take measures to ensure that a representative from India is included in future Groups. Meanwhile, India can take positive steps by strengthening domestic privacy safeguards, improving transparency and efficiency of relevant policies and processes, and looking towards solutions that respect rights and strengthen security.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/policy-brief-on-the-report-of-the-un-group-of-governmental-experts-on-ict'&gt;https://cis-india.org/internet-governance/blog/policy-brief-on-the-report-of-the-un-group-of-governmental-experts-on-ict&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok and Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2016-08-23T15:37:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
