<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1166 to 1180.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/tech-2-in-com-ne-exodus"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/navigating-reconsideration-quagmire-a-personal-journey-of-acute-confusion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/national-stakeholders-consultation-on-the-national-digital-health-blueprint"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/national-privacy-workshop-at-india-international-centre"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/national-ig-mechanisms"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/bloomberg-quint-murali-neelakantan-swaraj-barooah-swagam-dasgupta-torsha-sarkar-august-14-2018-national-health-stack-data-for-datas-sake-a-manmade-health-hazard"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/national-elections-2014-how-technology-powered-campaigns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/national-cyber-defence-summit-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/national-consultation-on-media-law"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/asian-age-january-7-2016-shadma-shaikh-nasscom-wants-board-to-protect-net-neutrality-regulate-pricing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/first-post-march-16-nimish-sawant-nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-january-5-2016-nasscom-against-differential-pricing-for-data-services"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/financial-times-march-28-2018-narendra-modi-personal-app-sparks-india-data-privacy-row"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-times-of-india-august-4-2015-anahita-mukherji-nanny-state-rules-porn-bad-for-you"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/tech-2-in-com-ne-exodus">
    <title>NE exodus: List containing 309 blocked URLs leaks online </title>
    <link>https://cis-india.org/news/tech-2-in-com-ne-exodus</link>
    <description>
        &lt;b&gt;Latest reports coming in have confirmed that a list containing 309 URLs, whose ban the government had sought in light of the Assam violence and the subsequent NE exodus, has been leaked online.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Published in &lt;a class="external-link" href="http://tech2.in.com/news/general/ne-exodus-list-containing-309-blocked-urls-leaks-online/387722"&gt;tech2&lt;/a&gt;. Pranesh Prakash's analysis is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The aforementioned URLs comprise URLs, Twitter accounts, img tags, blog posts, blogs and a handful of websites, and were blocked between August 18, 2012 till August 21, 2012. In an analysis that Pranesh Prakash, programme manager at the Centre for Internet and Society (CIS), carried of the leaked items, among other things in his post, he wrote that, "It is clear that the list was not compiled with sufficient care."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In his post, he further noted that the censorship process itself has been riddled with egregious mistakes. Giving instances of the egregious mistakes, he added that even some people and posts debunking the rumours were blocked as part of the censorship. Further, he wrote that some of the items that were blocked were not even web addresses (e.g., a few HTML img tags were included). In his findings, Prakash also found that despite there having been a clear warning issued by the DIT pertaining to the blocking of "above URLs only" and not that of main websites, like www.facebook.com, www.youtube.com, some ISPs (like Airtel) went "overboard in their blocking". This incident,  in particular pertains to yesterday's reports, wherein it had been revealed that Airtel had blocked the entire YouTube short URL youtu.be in some cities.&lt;/p&gt;
&lt;p&gt;On account of the sensitivity of the issue, he writes that it &lt;i&gt;"would be premature to share the whole list&lt;/i&gt;." He, however, writes that CIS plans to make the entire list public soon. The list that CIS has released, however includes -&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;ABC.net.au&lt;/li&gt;
&lt;li&gt;AlJazeera.com&lt;/li&gt;
&lt;li&gt;AllVoices.com&lt;/li&gt;
&lt;li&gt;WN.com&lt;/li&gt;
&lt;li&gt;AtjehCyber.net&lt;/li&gt;
&lt;li&gt;BDCBurma.org&lt;/li&gt;
&lt;li&gt;Bhaskar.com&lt;/li&gt;
&lt;li&gt;Blogspot.com&lt;/li&gt;
&lt;li&gt;Blogspot.in&lt;/li&gt;
&lt;li&gt;Catholic.org&lt;/li&gt;
&lt;li&gt;CentreRight.in&lt;/li&gt;
&lt;li&gt;ColumnPK.com&lt;/li&gt;
&lt;li&gt;Defence.pk&lt;/li&gt;
&lt;li&gt;EthioMuslimsMedia.com&lt;/li&gt;
&lt;li&gt;Facebook.com&lt;/li&gt;
&lt;li&gt;Farazahmed.com&lt;/li&gt;
&lt;li&gt;Firstpost.com&lt;/li&gt;
&lt;li&gt;HaindavaKerelam.com&lt;/li&gt;
&lt;li&gt;HiddenHarmonies.org&lt;/li&gt;
&lt;li&gt;HinduJagruti.org&lt;/li&gt;
&lt;li&gt;Hotklix.com&lt;/li&gt;
&lt;li&gt;HumanRights-Iran.ir&lt;/li&gt;
&lt;li&gt;Intichat.com&lt;/li&gt;
&lt;li&gt;Irrawady.org&lt;/li&gt;
&lt;li&gt;IslamabadTimesOnline.com&lt;/li&gt;
&lt;li&gt;Issuu.com&lt;/li&gt;
&lt;li&gt;JafriaNews.com&lt;/li&gt;
&lt;li&gt;JihadWatch.org&lt;/li&gt;
&lt;li&gt;KavkazCenter&lt;/li&gt;
&lt;li&gt;MwmJawan.com&lt;/li&gt;
&lt;li&gt;My.Opera.com&lt;/li&gt;
&lt;li&gt;Njuice.com&lt;/li&gt;
&lt;li&gt;OnIslam.net&lt;/li&gt;
&lt;li&gt;PakAlertPress.com&lt;/li&gt;
&lt;li&gt;Plus.Google.com&lt;/li&gt;
&lt;li&gt;Reddit.com&lt;/li&gt;
&lt;li&gt;Rina.in&lt;/li&gt;
&lt;li&gt;SandeepWeb.com&lt;/li&gt;
&lt;li&gt;SEAYouthSaySo.com&lt;/li&gt;
&lt;li&gt;Sheikyermami.com&lt;/li&gt;
&lt;li&gt;StormFront.org&lt;/li&gt;
&lt;li&gt;Telegraph.co.uk&lt;/li&gt;
&lt;li&gt;TheDailyNewsEgypt.com&lt;/li&gt;
&lt;li&gt;TheFaultLines.com&lt;/li&gt;
&lt;li&gt;ThePetitionSite.com&lt;/li&gt;
&lt;li&gt;TheUnity.org&lt;/li&gt;
&lt;li&gt;TimesofIndia.Indiatimes.com&lt;/li&gt;
&lt;li&gt;TimesOfUmmah.com&lt;/li&gt;
&lt;li&gt;Tribune.com.pk&lt;/li&gt;
&lt;li&gt;Twitter.com&lt;/li&gt;
&lt;li&gt;TwoCircles.net&lt;/li&gt;
&lt;li&gt;Typepad.com&lt;/li&gt;
&lt;li&gt;Vidiov.info&lt;/li&gt;
&lt;li&gt;Wikipedia.org&lt;/li&gt;
&lt;li&gt;Wordpress.com&lt;/li&gt;
&lt;li&gt;YouTube.com&lt;/li&gt;
&lt;li&gt;YouTu.be&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Further, in response to the question - as to why some items could still be accessed that were supposed to be blocked, he wrote that there are several errors in the list, making it difficult to apply. And the order has to be put into action by hundreds of ISPs. He adds that some ISPs may not have begun enforcing the blocks yet. &lt;i&gt;"This analysis is based on the orders sent around to ISPs, and not on the basis of actual testing of how many of these have actually been blocked by Airtel, BSNL, Tata, etc. Additionally, if you are using Twitter through a client (on your desktop, mobile, etc.) instead of the web interface, you will not notice any of the Twitter-related blocks," &lt;/i&gt;he elaborated further.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/tech-2-in-com-ne-exodus'&gt;https://cis-india.org/news/tech-2-in-com-ne-exodus&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-24T13:37:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/navigating-reconsideration-quagmire-a-personal-journey-of-acute-confusion">
    <title>Navigating the 'Reconsideration' Quagmire (A Personal Journey of Acute Confusion)</title>
    <link>https://cis-india.org/internet-governance/blog/navigating-reconsideration-quagmire-a-personal-journey-of-acute-confusion</link>
    <description>
        &lt;b&gt;An ​earlier analysis of ICANN’s Documentary Information Disclosure Policy already brought to light our concerns about the lack of transparency in ICANN’s internal mechanisms. Carrying my research forward, I sought to arrive at an understanding of the mechanisms used to appeal a denial of DIDP requests. In this post, I aim to provide a brief account of my experiences with the Reconsideration Request process that ICANN provides for as a tool for appeal.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Backdrop: What is the Reconsideration Request Process?&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Reconsideration Request process has been laid down in Article IV, Section 2 of the&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN Bylaws. Some of the key aspects of this provision have been outlined below&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;,&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;ICANN is obligated to institute a process by which a person ​&lt;i&gt;materially affected &lt;/i&gt;​by ICANN action/inaction can request review or reconsideration.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;To file this request, one must have been adversely affected by actions of the staff or the board that contradict ICANN’s policies, or actions of the Board taken up without the Board considering material information, or actions of the Board taken up by relying on false information.&lt;/li&gt;
&lt;li&gt;A separate Board Governance Committee was created with the specific mandate of reviewing Reconsideration requests, and conducting all the tasks related to the same.&lt;/li&gt;
&lt;li&gt;The Reconsideration Request must be made within 15 days of:  
&lt;ul&gt;
&lt;li&gt;FOR CHALLENGES TO BOARD ACTION: the date on which information about the challenged Board action is first published in a resolution, unless the posting of the resolution is not accompanied by a rationale, in which case the request must be submitted within 15 days from the initial posting of the rationale;&lt;/li&gt;
&lt;li&gt;FOR CHALLENGES TO STAFF ACTION: the date on which the party submitting the request became aware of, or reasonably should have become aware of, the challenged staff action, and&lt;/li&gt;
&lt;li&gt;FOR CHALLENGES TO BOARD OR STAFF INACTION: the date on which the affected person reasonably concluded, or reasonably should have concluded, that action would not be taken in a timely manner&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;.The Board Governance Committee is given the power to summarily dismiss a reconsideration request if:  
&lt;ul&gt;
&lt;li&gt;the requestor fails to meet the requirements for bringing a Reconsideration Request;&lt;/li&gt;
&lt;li&gt;it is frivolous, querulous or vexatious; or &lt;/li&gt;
&lt;li&gt;the requestor had notice and opportunity to, but did not, participate in the public comment period relating to the contested action, if applicable&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;If not summarily dismissed, the Board Governance Committee proceeds to review and reconsider.&lt;/li&gt;
&lt;li&gt;A requester may ask for an opportunity to be heard, and the decision of the Board Governance Committee in this regard is final.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The basis of the Board Governance Committee’s action is public written record ­ information submitted by the requester, by third parties, and so on.&lt;/li&gt;
&lt;li&gt;The Board Governance Committee is to take a decision on the matter and make a final determination or recommendation to the Board within 30 days of the receipt of the Reconsideration request, unless it is impractical to do so, and it is accountable to the Board to make an explanation of the circumstances that caused the delay.&lt;/li&gt;
&lt;li&gt;The determination is to be made public and posted on the ICANN website.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;ICANN has provided a neat infographic to explain this process in a simple fashion, and I am reproducing it here:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Reconsideration.jpg" alt="Reconsideration" class="image-inline" title="Reconsideration" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(Image taken from &lt;span&gt;​&lt;/span&gt;&lt;span&gt;https://www.icann.org/resources/pages/accountability/reconsideration­en&lt;/span&gt;​)&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Our Tryst with the Reconsideration Process&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Grievance&lt;/b&gt;&lt;br /&gt;Our engagement with the Reconsideration process began with the rejection of two of our requests (made on September 1, 2015) under ICANN’s Documentary Information Disclosure Policy. The requests sought information about the registry and registrar compliance audit process that ICANN maintains, and asked for various documents pertaining to the same&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Copies of the registry/registrar contractual compliance audit reports for all the audits carried out as well as external audit reports from the last year (2014­2015).&lt;/li&gt;
&lt;li&gt;A generic template of the notice served by ICANN before conducting such an audit.&lt;/li&gt;
&lt;li&gt;A list of the registrars/registries to whom such notices were served in the last year.&lt;/li&gt;
&lt;li&gt;An account of the expenditure incurred by ICANN in carrying out the audit process.&lt;/li&gt;
&lt;li&gt;A list of the registrars/registries that did not respond to the notice within a reasonable period of time.&lt;/li&gt;
&lt;li&gt;Reports of the site visits conducted by ICANN to ascertain compliance.&lt;/li&gt;
&lt;li&gt;Documents which identify the registries/registrars who had committed material discrepancies in the terms of the contract.&lt;/li&gt;
&lt;li&gt;Documents pertaining to the actions taken in the event that there was found to be some form of contractual non­compliance.&lt;/li&gt;
&lt;li&gt;A copy of the registrar self­assessment form which is to be submitted to ICANN.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;ICANN integrated both the requests and addressed them via one response on 1 October, 2015 (which can be found &lt;span&gt;​&lt;/span&gt;&lt;span&gt;here&lt;/span&gt;​). In their response, ICANN inundated us with already available links on their website explaining the compliance audit process, and the processes ancillary to it, as well as the broad goals of the programme ­ none of which was sought for by us in our request. ICANN then went on to provide us with information on their Three­Year Audit programme, and gave us access to some of the documents that we had sought, such as the pre­audit notification template, list of registries/registrars that received an audit notification, the expenditure incurred to some extent, and so on .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Individual contracted party reports were denied to us on the basis of their grounds for non­disclosure. Further, and more disturbingly, ICANN refused to provide us with the names of the contracted parties who had been found under the audit process to have committed discrepancies. Therefore, a large part of our understanding of the way in which the compliance audit process works remains unfinished.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What we did&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Dissatisfied with this response, I went on to file a Reconsideration request (number 15­22) as per their standard format on November 2, 2015. (The request filed can be accessed &lt;span&gt;​&lt;/span&gt;&lt;span&gt;here&lt;/span&gt;​).As grounds for reconsideration, I stated that “​&lt;i&gt;As a part of my research I was tracking the ICANN compliance audit process, and therefore required access to audit reports in cases where discrepancies where formally found in their actions. This is in the public interest and therefore requires to be disclosed...While providing us with an array of detailed links explaining the compliance audit process, the ICANN staff has not been able to satisfy our actual requests with respect to gaining an understanding of how the compliance audits help in regulating actions of the registrars, and how they are effective in preventing breaches and discrepancies.&lt;/i&gt;​” Therefore, I requested them to make the records in question publicly available ­ “​&lt;i&gt;We request ICANN to make the records in question, namely the audit reports for individual contracted parties that reflect discrepancies in contractual compliance, which have been formally recognised as a part of your enforcement process. We further request access to all documents that relate to the expenditure incurred by ICANN in the process, as we believe financial transparency is absolutely integral to the values that ICANN stands by.&lt;/i&gt;​”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Board Governance Committee’s response&lt;/b&gt;&lt;sup&gt;3&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The determination of the Board Governance Committee was that our claims did not merit reconsideration, as I was unable to identify any “​&lt;i&gt;misapplication of policy or procedure by the ICANN Staff&lt;/i&gt;​”, and my only issue was with the substance of the DIDP Response itself, and &lt;i&gt;substantial disagreements with a DIDP response are not proper bases for reconsideration &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(emphasis supplied).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The response of the Board Governance Committee was educative of the ways in which they determine Reconsideration Requests. Analysing the DIDP process, it held that ICANN was well within its powers to deny information under its defined Conditions for Non­Disclosure, and denial of substantive information did not amount to a procedural violation. Therefore, since the staff adhered to established procedure under the DIDP, there was no basis for our grievance, and our request was dismissed..&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, as a post­script, it is interesting to note that the Board Governance Committee delayed its response time by over a month, by its own admission ­ “​&lt;i&gt;In terms of the timing of the BGC’s recommendation, it notes that Section 2.16 of Article IV of the Bylaws provides that the BGC shall make a final determination or recommendation with respect to a reconsideration request within thirty days, unless impractical. To satisfy the thirty­day deadline, the BGC would have to have acted by 2 December 2015. However, due to the timing of the BGC’s meetings in November and December, the first practical opportunity for the BGC to consider Request 15­22 was 13 January 2016.&lt;/i&gt;​”&lt;sup&gt;4&lt;/sup&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Whither do I wander now?&lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To me, this entire process reflected the absurdity of the Reconsideration request structure as an appeal mechanism under the Documentary Information Disclosure Policy. As our experience indicated, there does not seem to be any way out if there is an issue with the substance of ICANN’s response. ICANN, commendably, is particular about following procedure with respect to the DIDP. However, what is the way forward for a party aggrieved by the flaws in the existing policy? As I had &lt;span&gt;​&lt;/span&gt;&lt;span&gt;analysed&lt;/span&gt; &lt;span&gt;earlier&lt;/span&gt;​, the grounds for ICANN to not disclose information are vast, and used to deny a large chunk of the  information requests that they receive. How is the hapless requester to  file a meaningful appeal against the outcome of a bad policy, if the  only ground for appeal is non­compliance with the procedure of said bad  policy? This is a serious challenge to transparency as there is no other  way for a requester to acquire information that ICANN may choose to  withold under one of its myriad clauses. It cannot be denied that a good  information disclosure law ought to balance the free  disclosure of  information with the holding back of information that truly needs to be  kept private.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, it is this writer’s firm opinion that even instances where  information is witheld, there has to be a stronger explanation for the  same, and moreover, an appeals process that does not take into account  substantive issues which might adversely affect the appellant falls  short of the desirable levels of transparency. Global standards dictate  that grounds for appeal need to be broad, so that all failures to apply  the information disclosure law/policy may be remedied.&lt;sup&gt;6&lt;/sup&gt; Various laws across the world relating to information disclosure often  have the following as grounds for appeal: an inability to lodge a  request, failure to respond to a request within the set time frame, a  refusal to disclose information, in whole or in part, excessive fees and  not providing information in the form sought, as well as a catch­all  clause for other failures.&lt;sup&gt;7&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, independent oversight is the heart of a proper appeal mechanism in such situations&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;;  the power to decide the appeal must not rest with those who also have  the discretion to disclose the information, as is clearly the case with  ICANN, where the Board Governance Committee is constituted and appointed  by the ICANN Board itself [one of the bodies against whom a grievance  may be raised].&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Suggestions&lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We believe ICANN, in keeping with its global, multistakeholder, accountable spirit, should adopt these standards as well, especially now that the transition looms around the corner. Only then will the standards of open, transparent and accountable governance of the Internet ­ upheld by ICANN itself as the ideal ­ be truly, meaningfully realised. Accordingly, the following standards ought to be met with:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Establishment of an independent appeals authority for information disclosure cases&lt;/li&gt;
&lt;li&gt;Broader grounds for appeal of DIDP requests&lt;/li&gt;
&lt;li&gt;Inclusion of disagreement with the substantive content of a DIDP response as a ground for appeal.&lt;/li&gt;
&lt;li&gt;Provision of proper reasoning for any justification of the witholding of information that is necessary in the public interest.&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr style="text-align: justify; " /&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Article IV, Section 2, ICANN Bylaws, 2014 ​&lt;i&gt;available at &lt;/i&gt;https://www.icann.org/resources/pages/governance/bylaws­en/#IV&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Copies of the request can be found ​ &lt;span&gt;​&lt;/span&gt;&lt;span&gt;here&lt;/span&gt;​ and &lt;span&gt;​&lt;/span&gt;&lt;span&gt;here&lt;/span&gt;​.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Katherine Chekouras, ​&lt;i&gt;Balancing National Security with a Community's Right­to­Know: Maintaining &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Public Access to Environmental Information Through EPCRA 's Non­Preemption Clause&lt;/i&gt;​, 34 B.C. Envtl. Aff. L. Rev 107, (2007).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Toby Mendel, &lt;i&gt;Freedom of Information: A Comparative Legal Study&lt;/i&gt;​ ​ 151 (2nd edn, 2008).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;​&lt;i&gt;Id&lt;/i&gt;​, at 152&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;sup&gt;3&lt;/sup&gt;4 Available &lt;span&gt;​&lt;/span&gt;&lt;span&gt;here&lt;/span&gt;​. https://www.icann.org/en/system/files/files/reconsideration­15­22­cis­final­determination­13jan16­en.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Mendel, ​&lt;i&gt;supra &lt;/i&gt;​note 6.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/navigating-reconsideration-quagmire-a-personal-journey-of-acute-confusion'&gt;https://cis-india.org/internet-governance/blog/navigating-reconsideration-quagmire-a-personal-journey-of-acute-confusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Padmini Baruah and Geetha Hariharan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-11-30T13:48:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/national-stakeholders-consultation-on-the-national-digital-health-blueprint">
    <title>National Stakeholders Consultation on the National Digital Health Blueprint</title>
    <link>https://cis-india.org/internet-governance/news/national-stakeholders-consultation-on-the-national-digital-health-blueprint</link>
    <description>
        &lt;b&gt;Ambika Tandon and Aayush Rathi attended the National Stakeholders Consultation on the National Digital Health Blueprint organised by the Ministry of Health and Family Welfare on 6 August 2019 at Constitution Club of India in New Delhi. &lt;/b&gt;
        &lt;p&gt; &lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;It was also attended by representatives from MeitY apart from industry and civil society. We raised questions about the provisions for privacy andinteroperability in the NDHB, in relation to provisions in the DISHA Act and the Srikrishna report. The public call for the event can be &lt;a class="external-link" href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=192436"&gt;found here&lt;/a&gt;.&lt;/div&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/national-stakeholders-consultation-on-the-national-digital-health-blueprint'&gt;https://cis-india.org/internet-governance/news/national-stakeholders-consultation-on-the-national-digital-health-blueprint&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-08-07T14:21:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws">
    <title>National Seminar on Cyber Security &amp; Cyber Laws - Issues and Concerns</title>
    <link>https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws</link>
    <description>
        &lt;b&gt;Sharath Chandra Ram was a panelist at this seminar organized by the Advanced Centre for Research, Development &amp; Training in Cyber Laws &amp; Forensics on December 27 and 28, 2014 at the National Law School of India University in Bangalore.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sharath was part of a plenary session on "Multi-Disciplinary Challenges in Ensuring Cyber Security". He  spoke about 'multi-stakeholderim in cyber security and CERT programs of nations'.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: center; "&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;PROGRAMME SCHEDULE &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="5"&gt;
&lt;p align="center"&gt;&lt;b&gt;Day 1 - 27&lt;sup&gt;th&lt;/sup&gt; December 2014 &lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;09:00- 10:00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;REGISTRATION&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;10:00- 11:00&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;INAUGURAL &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;SESSION&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;AT&lt;/p&gt;
&lt;p&gt;SHRI.&lt;/p&gt;
&lt;p&gt;KRISHNAPPA&lt;/p&gt;
&lt;p&gt;MEMORIAL HALL&lt;/p&gt;
&lt;p&gt;[ACADEMIC BLOCK]&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p&gt;Welcome &amp;amp; Introduction:&lt;b&gt; Dr. Nagarathna. A., &lt;/b&gt; Seminar Director&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Inaugural Address:&lt;b&gt; Shri. Pratap Reddy,&lt;/b&gt; IPS, IGP, Internal Security Division, Karnataka Police, Bangalore&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Key Note Address:&lt;b&gt; Dr. R. Venkata Rao, &lt;/b&gt;Vice Chancellor, NLSIU&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Vote of Thanks:&lt;b&gt; Dr. T. V. Subba Rao, &lt;/b&gt;Senior Professor, NLSIU&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;11:00-11:45&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;GROUP PHOTO &amp;amp; TEA BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;11:45-01:00&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;PLENARY&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;SESSION&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;AT&lt;/p&gt;
&lt;p&gt;SHRI.&lt;/p&gt;
&lt;p&gt;KRISHNAPPA&lt;/p&gt;
&lt;p&gt;MEMORIAL HALL&lt;/p&gt;
&lt;p&gt;[ACADEMIC BLOCK]&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;THEME: &lt;b&gt; &lt;/b&gt;&lt;b&gt;"MULTI-DISCIPLINARY CHALLENGES IN ENSURING CYBER SECURITY"&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Members of the Panel:&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Mr. Subrahmanya Boda, &lt;/b&gt; CISO, GMR&lt;/p&gt;
&lt;p&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Mr. Sunil Varkey, &lt;/b&gt; CISO, WIPRO&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Mr. Ramesh Kauta&lt;/b&gt; , CISO, GE [India]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Mr. T T Thomas, &lt;/b&gt; CTO Synergia Technologies,&lt;/p&gt;
&lt;p&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Mr. Rahul Matthan, &lt;/b&gt; Partner, Trilegal.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Sharath Chandra Ram (Sharathchandra Ramakrishnan), &lt;/b&gt; Researcher at Centre for Internet &amp;amp; Society&lt;/p&gt;
&lt;p&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Mr. Srinivas P, &lt;/b&gt; CISO, Infosys &amp;amp; Anchor, DSCI Bangalore Chapter [Moderator of the session]&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;01:00-02:00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;LUNCH BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;venue &lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Shri Krishnappa Memorial Hall (Academic Block)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;International Training Centre&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;02:00-03:30&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 1&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 2&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;03:30-04:00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;TEA BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;04:00-05:30&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 3&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 4&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;6:00 to 7. 00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;&lt;b&gt;CULTURAL EVENING &lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Venue: Quad, Academic Block &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="5"&gt;
&lt;p align="center"&gt;&lt;b&gt;Day 2 - 28&lt;sup&gt;th&lt;/sup&gt; December 2014&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;08:00-09:00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;BREAK FAST&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;venue&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Shri Krishnappa Memorial Hall (Academic Block)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;International Training Centre&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;MPP Class Room (Academic Block)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;09:30- 11:00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 5&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 6&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Technical Session 7&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;11:00- 11:30&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;TEA BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Shri Krishnappa Memorial Hall (Academic Block)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;International Training Centre&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;MPP Class Room (Academic Block)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;11:30-1:30&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 8&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 9&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 10&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;01:30-02:30&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;LUNCH BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;02:30-03. 45&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;PLENARY&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;SESSION&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;AT &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;SHRI. &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;KRISHNAPPA &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MEMORIAL HALL&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;[ACADEMIC BLOCK]&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;THEME: &lt;b&gt;"SECURING CYBER SPACE THROUGH INSTITUTIONAL INVOLVEMENT" &lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Members of the Panel:&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1. &lt;b&gt;Dr. Kamble, &lt;/b&gt;Director, Computer Emergency Response Team [CERT] India, Dept of Electronics &amp;amp; IT, Ministry of IT, 					Government of India&lt;/p&gt;
&lt;p&gt;2. &lt;b&gt;Dr. S.B.N. Prakash, &lt;/b&gt;Senior Professor of Law, NLSIU&lt;/p&gt;
&lt;p&gt;3. &lt;b&gt;Mr. Naa Vijay Shankar,&lt;/b&gt; Cyber Law Consultant, Bangalore&lt;/p&gt;
&lt;p&gt;4. &lt;b&gt;Mr. Balasubramanya, &lt;/b&gt;Vice President, Tata Consultancy Services, Bangalore&lt;/p&gt;
&lt;p&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Mr. Ranganath,&lt;/b&gt; Delivery Project Executive, IBM, Bangalore&lt;/p&gt;
&lt;p&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Mr. Venkatesh Murthy, &lt;/b&gt; Senior Manager, Cyber Forensics, Data Security Council of India [DSCI], Bangalore.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;7. &lt;b&gt;Mr. M. D. Sharath, &lt;/b&gt;Dy. S. P., Cyber Police, Bangalore&lt;/p&gt;
&lt;p&gt;8. &lt;b&gt;Dr. Nagarathna. A.,&lt;/b&gt; Senior Assistant Prof of Law, NLSIU [Moderator]&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;3. 45 to 4. 00 &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p&gt;TEA BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;04:00-05:00 AT &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;SHRI. &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;KRISHNAPPA &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MEMORIAL HALL&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;[ACADEMIC BLOCK]&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;VALEDICTORY SESSION &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Seminar Resolutions:&lt;b&gt; Dr. T. V. Subba Rao, Senior Professor, NLSIU&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Valedictory Address &amp;amp; Distribution of Certificates: : &lt;b&gt;Dr. R. Venkata Rao,&lt;/b&gt; Vice Chancellor, NLSIU&lt;/p&gt;
&lt;p&gt;Vote of thanks:&lt;b&gt; Dr. Nagarathna. A., &lt;/b&gt;Seminar Director&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="center"&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws'&gt;https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-31T02:04:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/national-privacy-workshop-at-india-international-centre">
    <title>National Privacy Workshop</title>
    <link>https://cis-india.org/internet-governance/events/national-privacy-workshop-at-india-international-centre</link>
    <description>
        &lt;b&gt;Centre for Internet &amp; Society is organizing a round-table to discuss the potential impact of numerous policy developments with wide ranging implications for recognition and governance of privacy in India. The round-table will be held on December 9, 2017 at India International Centre in New Delhi, 10.30 a.m. to 5.00 p.m.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Background&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The recent past in India has seen numerous policy developments with wide ranging implications for recognition and governance of privacy in India. The emphatic and unanimous avowal of the right to privacy by the Supreme Court, the government’s stated commitment to a data protection law and the formation of the Sri Krishna Committee are developments which will continue to inform policymaking around privacy in India for a long time to come. The Supreme Court’s conception of a robust right to privacy encompassing different element - spatial, decisional and informational, and its guidance on strict limiting tests may have a wide impact on a range of issues. The impact of this judgment and a data protection law on informational privacy in India will be immense and it is important to delve in challenges and issues that it may throw up. In last year, we have also seen instances of purported conflict between the transparency instruments such as the right to information and the right to informational privacy. How these conflicts are resolved in law and practice will be key to these two essential human rights in the modern information society. Further, while these general consensus on privacy principles, the appropriate ways to govern and enforce privacy remains an open issue, and the success of any data protection framework will depend as much on what kind of privacy governance models are adopted.This roundtable will look to discuss the potential impact of these policy decisions, what theories should guide the data protection law in India, what models of privacy governance are workable and how privacy can co-exist with transparency principle and robust RTI regime.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Agenda&lt;/h2&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10.30 - 11.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.00 - 11.30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Welcome and setting the scene&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30 - 12.30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Session 1: Policy Developments around Informational Privacy in India&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What do different policy developments indicate about privacy in India?&lt;/li&gt;
&lt;li&gt;What are the (potential) impacts of these developments?&lt;/li&gt;
&lt;li&gt;What questions are being asked and are these the right questions to ask?&lt;/li&gt;
&lt;li&gt;How do we expect the ‘state of privacy’ to change in India in response to these policy developments?&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.30 - 13.30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Session 2: Approaches to Privacy and Data Protection for India&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What are different approaches to privacy and government the Indian government can take? What cultural/political etc. aspects should be taken into consideration when thinking through this question?&lt;/li&gt;
&lt;li&gt;What are the pros and cons to different approaches?&lt;/li&gt;
&lt;li&gt;What are the pros and cons to the below approaches:&lt;br /&gt; - Privacy as control&lt;br /&gt; - Data as property&lt;br /&gt; - Utilitarian approaches&lt;br /&gt; - Technological Solutions&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.30 - 14.30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.30 - 15.30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Session 3: Transparency and Privacy&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How can transparency from the private sector enable the right to privacy?&lt;/li&gt;
&lt;li&gt;What are key principles that can guide this relationship?&lt;/li&gt;
&lt;li&gt;Where is transparency from the private sector most needed with respect to privacy?&lt;/li&gt;
&lt;li&gt;What are incentives that governments can adopt to encourage privacy?&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.30 - 16.30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Governance Models for Data Protection&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What kind of institutional framework is required for governance of privacy in India?&lt;/li&gt;
&lt;li&gt;How do we address questions of liability, penalties and enforcement?&lt;/li&gt;
&lt;li&gt;What role do sectoral players have in a data governance framework?&lt;/li&gt;
&lt;li&gt;What is best way for other stakeholders like industry, civil society and academia in collaborative governance of privacy?&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.30 - 17.00&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Tea and snacks&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Speakers&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Usha Ramanathan&lt;/li&gt;
&lt;li&gt;Rahul Sharma&lt;/li&gt;
&lt;li&gt;Apar Gupta&lt;/li&gt;
&lt;li&gt;Malavika Raghavan&lt;/li&gt;
&lt;li&gt;Shankar Narayanan&lt;/li&gt;
&lt;li&gt;Ujwala Uppaluri&lt;/li&gt;
&lt;li&gt;Rebecca MacKinnon&lt;/li&gt;
&lt;li&gt;Nikhil Pahwa&lt;/li&gt;
&lt;li&gt;Kamlesh Bajaj&lt;/li&gt;
&lt;li&gt;Manasa Venkatraman&lt;/li&gt;
&lt;li&gt;Smitha K Prasad&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/national-privacy-workshop-at-iic.pdf"&gt;&lt;b&gt;Download the Agenda&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/national-privacy-workshop-at-india-international-centre'&gt;https://cis-india.org/internet-governance/events/national-privacy-workshop-at-india-international-centre&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-12-05T14:24:16Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/national-ig-mechanisms">
    <title>National IG Mechanisms – Looking at Some Key Design Issues</title>
    <link>https://cis-india.org/internet-governance/national-ig-mechanisms</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society is coorganizing this workshop along with Brazilian Internet Steering Committee, Institute for System Analysis, Russian Academy of Sciences, et.al., at the seventh Internet Governance Forum 2012 in Azerbaijan. The workshop will be held in Conference Room 4, from 2.30 p.m. to 4.00 p.m. Pranesh Prakash is a panelist for this workshop. 

&lt;/b&gt;
        &lt;p&gt;&lt;b&gt;Workshop Theme: &lt;/b&gt;&lt;br /&gt;Other &lt;br /&gt;&lt;b&gt;Theme Question: &lt;/b&gt;&lt;br /&gt;It is a workshop on national level IG mechanisms, and does not directly address any main theme questions&lt;/p&gt;
&lt;h3&gt;Concise Description of Workshop:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Such is the unique nature of the Internet that its governance often calls for institutional innovations. The proposed workshop will look at a range of national level IG mechanisms across the world. While the discussion will refer to good models and practices in different countries, it will not be organized around simple show-casing of different national IG mechanisms. The discussion will centre around key contexts, requirements, challenges and possibilities. It will be directed towards examining key institutional design issues, functions and outcomes with regard to national level IG mechanisms with the purpose to help countries make appropriate decisions in their specific contexts. Some of these are; - How should the national commons of Internet resources be managed?- What kinds of mechanisms are appropriate for technical matters, what for those that are partly technical and partly social, and what for larger public policy matters, requiring more political responses? - Should there be a common single mechanism to address all the above kinds of issues, or different ones? How to coordinate different mechanisms, and different parts of the national governance machinery dealing with different aspects or kinds of IG issues? - How to ensure meaningful participation of all stakeholders in a manner that focuses on public interest?- How can the surplus from domain name registration fees etc collected by national IG agencies be employed for public interest purposes, especially, for taking up Internet related research.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Organiser(s) Name:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Centre for Internet and Society, Bangalore - Civil SocietyBrazilian Internet Steering Committee - National level governance bodyInstitute for System Analysis, Russian Academy of Sciences - Academic InsitutionCentre for Community Informatics Research, Development and Training (CCIRDT), Vancouver, BC CANADA - Civil Society Instituto NUPEF , Rio de Janeiro - Civil SocietyIT for Change, Bangalore - Civil Society.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Previous Workshop(s):&lt;/h3&gt;
&lt;p&gt;See in the workshops section in IGF 2011IG4D Workshop 183: A Possible Framework for Global Net Neutrality.&lt;/p&gt;
&lt;h3&gt;Submitted Workshop Panelists:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Carlos Afonso, Insituto NUPEF, Board Member, Brazilian Steering CommiteeEmily Taylor, Independent Consultant, Formerly with NOMINETAlice Munya, Chairperson, Kenya Internet Steering CommiteeVictor Tishchenko, Institute of Advanced Systems, Russian Academy of Sciences,Sunil Abraham, Centre for Internet and Society,Moderator, Micheal Gurstein, Centre for Community Informatics Research, Development and Training, Canada.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Name of Remote Moderator(s):&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Ginger Paque&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Read the original published on the IGF website &lt;a class="external-link" href="http://www.intgovforum.org/cms/w2012/proposals"&gt;here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/national-ig-mechanisms'&gt;https://cis-india.org/internet-governance/national-ig-mechanisms&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-09T00:50:46Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/bloomberg-quint-murali-neelakantan-swaraj-barooah-swagam-dasgupta-torsha-sarkar-august-14-2018-national-health-stack-data-for-datas-sake-a-manmade-health-hazard">
    <title>National Health Stack: Data For Data’s Sake, A Manmade Health Hazard</title>
    <link>https://cis-india.org/internet-governance/blog/bloomberg-quint-murali-neelakantan-swaraj-barooah-swagam-dasgupta-torsha-sarkar-august-14-2018-national-health-stack-data-for-datas-sake-a-manmade-health-hazard</link>
    <description>
        &lt;b&gt;On Oct. 5, 2017, an HIV positive woman was denied admission in Hyderabad’s Osmania General Hospital even though she was entitled to free treatment under India’s National AIDS Control Organisation programme. Another incident around the same time witnessed a 24-year-old pregnant woman at Tikamgarh district hospital in Madhya Pradesh being denied treatment by hospital doctors once she tested positive for HIV. The patient reportedly delivered the twins outside the maternity ward after she was turned away by the hospital, but her newborn twin girls died soon after.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The op-ed was &lt;a class="external-link" href="https://www.bloombergquint.com/opinion/2018/08/14/data-for-datas-sake-a-manmade-health-hazard#gs.bT20zK4"&gt;published in Bloomberg Quint&lt;/a&gt; on August 14, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Apart  from facing the severity of their condition, patients afflicted with  diseases such as HIV, tuberculosis, and mental illnesses, are often  subject to social stigma, sometimes even leading to the denial of  medical treatment. Given this grim reality would patients want their  full medical history in a database?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  ‘National Health Stack’ as described by the NITI Aayog in its  consultation paper, is an ambitious attempt to build a digital  infrastructure with a “deep understanding of the incentive structures  prevalent in the Indian healthcare ecosystem”. If the government is to  create a database of individuals’ health records, then it should  appreciate the differential impact that it could have on the patients.&lt;/p&gt;
&lt;blockquote&gt;The collection of health data, without sensitisation and  accountability, has the potential to deny healthcare to the vulnerable.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;We  have innumerable instances of denial of services due to Aadhaar and  there is a real risk that another database will lead to more denial of  access to the most vulnerable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier,  we had outlined some key aspects of the NHS, the ‘world’s largest’  government-funded national healthcare scheme. Here we discuss some of  the core technical issues surrounding the question of data collection,  updating, quality, and utilisation.&lt;/p&gt;
&lt;h3&gt;Resting On A Flimsy Foundation: The Unique Health ID&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  National Health Stack envisages the creation of a unique ID for  registered beneficiaries in the system — a ‘Digital Health ID’. Upon the  submission of a ‘national identifier’ and completion of the Know Your  Customer process, the patient would be registered in the system, and a  unique health ID generated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This  seemingly straightforward process rests on a very flimsy foundation.  The base entry in the beneficiary registry would be linked to a ‘strong  foundational ID’. Extreme care needs to be taken to ensure that this is  not limited to an Aadhaar number. Currently, the unavailability of  Aadhaar would not be a ground for denial of treatment to a patient only  for their first visit; the patient must provide Aadhaar or an Aadhaar  enrolment slip to avail treatment thereafter. This suggests that the  national healthcare infrastructure will be geared towards increasing  Aadhaar enrollment, with the unstated implication that healthcare is a  benefit or subsidy — a largess of government, and not, as the courts  have confirmed, a fundamental right.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;Not  only is this project using government-funded infrastructure to deny its  citizens the fundamental right to healthcare, it is using the desperate  need of the vulnerable for healthcare to push the ‘Aadhaar’ agenda.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Any pretence that Aadhaar is voluntary is slowly fading with the government mandating it at every step of our lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="Aadhaar Seva kendra. (Source: Aadhaar Official Account/Facebook)&amp;amp;nbsp;" class="qt-image" src="https://images.assettype.com/bloombergquint%2F2018-01%2Fd7f4b53a-b069-484d-8c28-511c516aa4d5%2F3a192ed0-8a18-4518-95be-ac5234239e94.jpg?w=480&amp;amp;auto=format%2Ccompress" /&gt;&lt;/p&gt;
&lt;div class="visualClear" style="text-align: justify; "&gt;Aadhaar Seva kendra. (Source: Aadhaar Official Account/Facebook&lt;/div&gt;
&lt;div class="visualClear" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;h3&gt;Is The Health ID An Effective And Unique Identifier?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Even  if we choose to look past the fact that the validity of Aadhaar is  still pending the test of legality before the apex court, a foundational  ID would mean that the data contained within that ID is unique,  accurate, incorruptible, and cannot be misused. These principles,  unfortunately, have been compromised by the UIDAI in the Aadhaar project  with its lack of uniqueness of identity (i.e, fake IDs and duplicity),  failure to authenticate identity, numerous alleged data leaks (‘alleged’  because UIDAI maintains that there haven’t been any leaks), lack of  connectivity to be able to authenticate identity and numerous instances  of inaccurate information which cannot be corrected.&lt;/p&gt;
&lt;p&gt;Linking something as crucial and basic as healthcare data with such a database is a potential disaster.&lt;/p&gt;
&lt;p&gt;There is a real risk that incorrect linking could cause deaths or inappropriate medical care.&lt;/p&gt;
&lt;h3&gt;The High Risk Of Poor Quality Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  NITI Aayog paper envisages several expansive databases that are capable  of being updated by different entities. It includes enrollment and  updating processes but seems to assume that all these extra steps will  be taken by all the relevant stakeholders and does not explain the  motivation for stakeholders to do so.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  a country where government doctors, hospitals, wellness centres, etc  are overburdened and understaffed, this reliance is simply not credible.  For instance, all attributes within the registries are to be digitally  signed by an authorised updater, there must be an audit trail for all  changes made to the registries, and surveyors will be tasked with  visiting providers in person to validate the data. Identifying these  precautions as measures to assure accurate data is a great step towards  building a national health database, but this seems an impossible task.&lt;/p&gt;
&lt;blockquote&gt;Who are these actors and what will incentivise them to ensure the accuracy and integrity of data?&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;In  other words, what incentive and accountability structures will ensure  that data entry and updating is accurate, and not approached from a more  ‘&lt;i&gt;jugaad&lt;/i&gt;’ ‘let’s just get this done for the sake of it’  attitude that permeates much of the country. How will patients have  access to the database to be able to check its accuracy? Is it possible  for a patient (who will presumably be ill) to gain easy access to an  updater to change their data? If so, how? It is worth noting that the  patient’s ‘right’ to check her data assumes that they have access to a  computer that is connected to the internet as well as a good level of  digital literacy, which is not the case in India for a significant  section of the population. Even data portability loses its potential  benefits if the quality of data on these registries is not reliable. In  this case, healthcare providers will need to verify their patients’  health history using physical records instead, rendering the stack  redundant.&lt;/p&gt;
&lt;p&gt;Who will be liable to the patient for misdiagnosis based on the database?&lt;/p&gt;
&lt;p&gt;&lt;img alt="A sonographic image is displayed on a monitor as a patient undergoes an ultrasound scan in Bikaner, Rajasthan, India. (Photographer: Prashanth Vishwanathan/Bloomberg)" class="qt-image" src="https://images.assettype.com/bloombergquint%2F2018-08%2Fe1659408-49ba-4188-b57e-aef377c69eb0%2Fm1291107.jpg?w=480&amp;amp;auto=format%2Ccompress" /&gt;&lt;/p&gt;
&lt;div class="visualClear"&gt;A sonographic image is displayed on a monitor as a patient undergoes an  ultrasound scan in Bikaner, Rajasthan, India. (Photographer: Prashanth  Vishwanathan/Bloomberg)&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Leaving  the question of accountability vague opens updaters to the possibility  of facing dangerous and unnecessarily punitive measures in the future.  The NITI Aayog paper fails to address this key issue which arose  recently. Despite being a notifiable disease, there are reports that  numerous doctors from the private sector failed to notify or update TB  cases to the Ministry of Health and Family Welfare ostensibly on the  grounds that they did not receive consent from their patients to share  their information with the government. This was met with a harsh  response from the government which stated that clinical establishment  that failed to notify tuberculosis patients would face jail time.  According to a few doctors, the government’s new move would coerce  patients to go to ‘underground clinics’ to receive treatment discreetly  and hence, would not solve the issue of TB.&lt;/p&gt;
&lt;blockquote&gt;The document also offers no specific recommended procedures regarding how inaccurate entries will be corrected or deleted.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;It  is then perhaps not a stretch to imagine that these scenarios would  affect the quality of the data stored; defeating NITI Aayog’s objective  of researchers using the stack for high-quality medical data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  reason why the quality and integrity of data is at the head of the  table is that all the proposed applications of the NHS (analytics, fraud  detection etc.) assume a high quality, accurate dataset. At the same  time, the enrolment process, updating process and disclosed measures to  ensure data quality will effectively lead to poor quality data. If this  is the case, then applications derived from the NHS dataset should  assume an imperfect data, rather than an accurate dataset, which should  make one wonder if no data is better than data that is certainly  inaccurate.&lt;/p&gt;
&lt;h3&gt;Lack Of Data Utilisation Guidelines&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Issues  with data quality are exacerbated depending on how and where it is  used, and who uses it. The paper has identified some users to be  health-sector stakeholders such as healthcare providers (hospitals,  clinics, labs etc), beneficiaries, doctors, insurers and accredited  social health activists but misses laying down utilisation guidelines.  The foresight to create a dataset that can be utilised by multiple  actors for numerous applications is commendable, but potentially  problematic -- especially if guidelines on how this data is to be used  by stakeholders (especially the private sector) are ignored.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  order to bridge this knowledge gap, India has the opportunity to learn  from the legal precedent set by foreign institutions. As an example, one  could examine the Health Information Technology for Economic and  Clinical Health Act (HITECH) and the Health Insurance Portability and  Accountability Act (HIPAA) in the U.S. which sets out strict guidelines  for how businesses are to handle sensitive health data in order to  maintain the individual’s privacy and security. It goes one step further  to also lay down incentive and accountability structures in order that  business associates necessarily report security breaches to their  respective covered entities.&lt;/p&gt;
&lt;blockquote&gt;If  we do not take necessary precautions now, we not only run the risk of  poor security and breach of privacy but of inaccurate data that renders  the national health data repository a health risk for the whole patient  population.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;There’s  also the lack of clarity on who is meant to benefit from using such a  database or whether the benefits are equal to all stakeholders, but more  on that in a subsequent piece.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="A medical team uses a glucometer to check the blood glucose level of a patient at a mobile clinic in Pancharala, on the outskirts of Bengaluru, India. (Photographer: Dhiraj Singh/Bloomberg)" class="qt-image" src="https://images.assettype.com/bloombergquint%2F2018-08%2F5e7e7b41-1513-4161-b195-5b8a77c6e4f1%2F314780590_1_20.jpg?w=480&amp;amp;auto=format%2Ccompress" /&gt;&lt;/p&gt;
&lt;div class="visualClear" style="text-align: justify; "&gt;A medical team uses a glucometer to check the blood glucose level of a  patient at a mobile clinic in Pancharala, on the outskirts of Bengaluru,  India. (Photographer: Dhiraj Singh/Bloomberg)&lt;/div&gt;
&lt;div class="visualClear" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;h3&gt;It’s Your Recipe, You Try It First!&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;If  the NITI Aayog and the government are sure that there is a need for a  national healthcare database, perhaps they can start using the Central  Government Health Scheme (which includes all current and retired  government employees and their families) as a pilot scheme for this.  Once the software, database and the various apps built on it are found  to be good value for money and patients benefit from excellent treatment  all over the country, it could be expanded to those who use the  Employees’ State Insurance system, and then perhaps to the armed forces.  After all, these three groups already have a unique identifier and  would benefit from the portability of healthcare records since they are  likely to be transferred and posted all over the country. If, and only  if, it works for these groups and the claimed benefits are observed,  then perhaps it can be expanded to the rest of the country’s healthcare  systems.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Murali  Neelakantan is an expert in healthcare laws. Swaraj Barooah is Policy  Director at The Centre for Internet and Society. Swagam Dasgupta and  Torsha Sarkar are interns at The Centre for Internet and Society.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/bloomberg-quint-murali-neelakantan-swaraj-barooah-swagam-dasgupta-torsha-sarkar-august-14-2018-national-health-stack-data-for-datas-sake-a-manmade-health-hazard'&gt;https://cis-india.org/internet-governance/blog/bloomberg-quint-murali-neelakantan-swaraj-barooah-swagam-dasgupta-torsha-sarkar-august-14-2018-national-health-stack-data-for-datas-sake-a-manmade-health-hazard&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Murali Neelakantan, Swaraj Barooah, Swagam Dasgupta and Torsha Sarkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Healthcare</dc:subject>
    

   <dc:date>2018-09-16T05:01:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/national-elections-2014-how-technology-powered-campaigns">
    <title>National Elections 2014: How Technology Powered Campaigns</title>
    <link>https://cis-india.org/events/national-elections-2014-how-technology-powered-campaigns</link>
    <description>
        &lt;b&gt;HasGeek and the Centre for Internet and Society (CIS) welcome you to a presentation on how technology powered politicial campaigns in the recently concluded 2014 national elections. Developers, advocacy organizations and the general public are invited to participate. The event will be held at CIS on May 23, 2014, 6.00 p.m. to 8.30 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;During the 2014 Indian general elections, technology was widely used for candidate and party campaigns. The purpose of these technology-driven campaigns was to help voters make more informed decisions before casting their votes. Voter responses to these campaigns continuously helped individual candidates and political parties (via their technology teams and consultants) to rework messaging till the very end.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;HasGeek and CIS are organizing three presentations followed by an interactive Q&amp;amp;A session to understand how technology spurred campaigns during the 2014 elections, and how voters will have to get smarter just as parties are becoming smart in reaching out to them.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Sessions&lt;/h2&gt;
&lt;h3&gt;Campaigning in the pre-Internet and Internet Era (Talk)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Vijay Grover, founder of Bangalore Media Foundation and television journalist since 17 years, will compare the past and present to explain how internet technologies have changed campaigning stratgies. Grover will argue that voters need to get smart in sifting information and making choices as more and more parties use social media and information technologies in reaching out to them.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Technology-driven campaigns (Talk)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Viral Shah, part of Nandan Nilekani's campaign management team, will talk about how India is placed in the global scene with respect to technology-driven political campaigns. Viral will also discuss how to design a campaign with technology and how technology was used to power Nilekani's campaign.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Tools used for powering campaigns and attracting volunteers (Talk)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;BG Mahesh, founder and managing director at Oneindia.in, will talk about the tools used during Narendra Modi's campaign. Apart from informing voters about the candidate, volunteers were also enlisted through the drives. BG Mahesh will throw light on how technology made this possible.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Schedule&lt;/h2&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Sessions&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18.00&lt;br /&gt;18.15&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;Introductions: HasGeek, CIS, The Fifth Elephant &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18.15&lt;br /&gt;18.45&lt;/td&gt;
&lt;td&gt;Vijay Grover: Campaigning in the pre-Internet and Internet Era&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18.45&lt;br /&gt;19.15&lt;/td&gt;
&lt;td&gt;Viral Shah: Technology-driven campaigning&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19.15&lt;br /&gt;19.45&lt;/td&gt;
&lt;td&gt;B.G.Mahesh: Tools used for powering campaigns and attracting volunteers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19.45&lt;br /&gt;20.15&lt;/td&gt;
&lt;td&gt;Q &amp;amp; A Session&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20.15&lt;br /&gt;20.30&lt;/td&gt;
&lt;td&gt;Snacks&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/national-elections-2014-how-technology-powered-campaigns'&gt;https://cis-india.org/events/national-elections-2014-how-technology-powered-campaigns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-05-20T07:03:51Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/national-cyber-defence-summit-2016">
    <title>National Cyber Defence Summit 2016 </title>
    <link>https://cis-india.org/internet-governance/news/national-cyber-defence-summit-2016</link>
    <description>
        &lt;b&gt;National Cyber Defence Summit – 2016 was organized by the National Cyber Safety and Security Standards in association with State &amp; Central Governments, Ministry of Defence, Government of India, AICTE &amp; Anna University on 30 September and 1 October 2016 in Chennai. Vanya Rakesh attended the summit.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Summit focused on multiple issues linked with the current use of cyberspace by the various stake holders and creating awareness of the responsibility associated with the judicious use of this significant and powerful tool, without endangering the fragile security and social framework. The mission of the Summit is to establish a multi-stakeholder consortium that brings together Industry, Government, and Academic interests in an effort to improve the state of Cyber Security on both a domestic and international level. Primarily, the Summit focuses on multiple issues linked with the current use of cyberspace by the various stake holders and creating awareness of the responsibility associated with the judicious use of this significant and powerful tool, without endangering the fragile security and social framework.&lt;br /&gt;&lt;br /&gt;In fact this is the one and only High Level Summit which gathers the presence of Multi-Stakeholders from State/Central Governments, Defence, MNCs, PSUs, Academics, PSBs, Intelligence Agencies, Enforcement Agencies and etc. For more info see the website &lt;a class="external-link" href="http://ncdrc.res.in/summit/"&gt;here&lt;/a&gt;. Agenda can be &lt;a class="external-link" href="http://www.ncdrc.res.in/summit/docs/national-cyber-defence-summit-invitation.pdf"&gt;viewed here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/national-cyber-defence-summit-2016'&gt;https://cis-india.org/internet-governance/news/national-cyber-defence-summit-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-10-10T12:54:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/national-consultation-on-media-law">
    <title>National Consultation on Media Law</title>
    <link>https://cis-india.org/internet-governance/news/national-consultation-on-media-law</link>
    <description>
        &lt;b&gt;The Law Commission of India and the National University, Delhi have joined hands to organize the National Consultation on Media Law at the India Habitat Centre in New Delhi on September 27 and 28, 2014. Nehaa Chaudhari participated in this event. &lt;/b&gt;
        &lt;p&gt;Click to view the:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/national-consultation-on-media-law-schedule.pdf" class="internal-link"&gt;Schedule&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/consultation-paper-media-law.pdf" class="internal-link"&gt;Consultation Paper on Media Law&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/overview-of-responses.pdf" class="internal-link"&gt;Overview of Responses&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/list-of-useful-sources.pdf" class="internal-link"&gt;List of Useful Sources&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/national-consultation-on-media-law'&gt;https://cis-india.org/internet-governance/news/national-consultation-on-media-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-30T06:52:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/asian-age-january-7-2016-shadma-shaikh-nasscom-wants-board-to-protect-net-neutrality-regulate-pricing">
    <title>Nasscom wants board to protect Net neutrality, regulate pricing </title>
    <link>https://cis-india.org/internet-governance/news/asian-age-january-7-2016-shadma-shaikh-nasscom-wants-board-to-protect-net-neutrality-regulate-pricing</link>
    <description>
        &lt;b&gt;The debate against differential pricing of data services at the cost of net neutrality doesn’t seem to be getting over yet. While internet activists have gone out on streets in Bengaluru and Hyderabad to protest in favour of net neutrality, industry experts believe that differential pricing, when regulated could be tailored for public interest.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shadma Shaikh was &lt;a class="external-link" href="http://www.asianage.com/technomics/nasscom-wants-board-protect-net-neutrality-regulate-pricing-454"&gt;published in Asian Age&lt;/a&gt; on January 7, 2016. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Given the current situation of low internet and broadband penetration along with lower levels of digital literacy and limited local language support in the country, IT industry body Nasscom said that protection of net neutrality is essential to fight these monumental challenges that require continuous innovation, both in technology solutions and business models.&lt;br /&gt;&lt;br /&gt;“We strongly oppose any model where TSPs or their partners have a say or discretion in choosing content that is made available at favourable rates, speed,” Nasscom President R. Chandrashekhar said in a statement.&lt;br /&gt;&lt;br /&gt;However, Nasscom also suggested a suitable oversight mechanism in the form of “an independent not-for-profit entity with an independent board to manage proposed differential pricing programs that are deemed to be in the public interest and are philanthropic in nature.”&lt;br /&gt;&lt;br /&gt;In view of regulator Trai’s proposal to question the fairness of zero-rating—a practice of not counting certain traffic towards a subscriber's regular Internet usage, Pranesh Prakash, Centre for Internet and Society said, all forms of zero-rating result in some form of discrimination, but not all zero-rating is harmful, nor does all zero-rating need to be prohibited.&lt;br /&gt;&lt;br /&gt;Prakash says that Trai’s paper has been inappropriately reduced to a referendum, by both parties—supporters of differential pricing programme as well as internet activists fighting zero-rating. Content-agnostic zero-rating models are not harmful, he says, adding “some traffic, such as government or public interest sites could be made free.”&lt;br /&gt;&lt;br /&gt;Facebook’s Free Basics app that aims to provide ‘free Internet access’ to users who cannot afford data packs, has run into trouble for being against net neutrality principle. Trai, while evaluating the zero-rating proposal has asked Reliance Communications, the official telecom partner for Free Basics to put the service on hold.&lt;br /&gt;&lt;br /&gt;After drawing flak from critics and citizens over its Free Basics program and its extensive advertisement in the media and on Facebook itself to influence the decision of Trai in favour of zero-rating program, Zuckerberg reached out to Indian readers through an opinion piece he published in an Indian daily newspaper.&lt;br /&gt;&lt;br /&gt;Facebook’s justification for Free Basics lies in comparing internet as a service similar to education and healthcare. Free schools, free libraries and public hospitals may not provide the best of services, but their existence is essential to cater to a large set of audience who cannot afford expensive healthcare or education. In the same way, says Facebook founder Mark Zuckerberg, everyone deserves access to free basic internet service.&lt;br /&gt;&lt;br /&gt;Calling Facebook’s Free Basics programme as an illusion, Nikhil Pahwa, founder MediaNama and volunteer at savetheinternet.in said “Facebook’s Free Basics is not free internet.” The choice to determine what data or content to browse should be left to the internet users, he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/asian-age-january-7-2016-shadma-shaikh-nasscom-wants-board-to-protect-net-neutrality-regulate-pricing'&gt;https://cis-india.org/internet-governance/news/asian-age-january-7-2016-shadma-shaikh-nasscom-wants-board-to-protect-net-neutrality-regulate-pricing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-31T09:25:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/first-post-march-16-nimish-sawant-nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber">
    <title>Nasscom chief saying full data protection isn’t possible should wake us from our digital slumber</title>
    <link>https://cis-india.org/internet-governance/news/first-post-march-16-nimish-sawant-nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber</link>
    <description>
        &lt;b&gt;Considering India is rapidly moving towards a digital economy, the hurdles not withstanding, data and identity security are topics which have to be taken very seriously. Since the demonetisation, a large part of the population who would never bother with digital transactions has suddenly come online. But there is no such thing as complete security of personal data, according to Nasscom chief R Chandrashekhar.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published by &lt;a class="external-link" href="http://tech.firstpost.com/news-analysis/nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber-367183.html"&gt;First Post&lt;/a&gt; on March 16, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Attending the World Consumer Rights Day, R Chandrashekhar  said that personal data of online consumers cannot be completely secure  and stressed on the need to have strict enforcement of consumer  protection laws. Speaking to &lt;i&gt;PTI,&lt;/i&gt; Chandrashekhar said, “More  than 3 million credit card data details were misused recently. Let us  face it, these kind of security breaches will take place. There is  nothing called fully perfect security in IT.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;It’s high time we call a spade, a spade&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;img alt="Image: PIB" class="wp-image-367245 size-full" height="360" src="http://tech.firstpost.com/wp-content/uploads/2017/03/RChandrasekhar_PIB380.jpg" width="640" /&gt;&lt;br /&gt;&lt;/b&gt;R Chandrashekhar, President Nasscom. Image: PIB&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Coming from the head of Nasscom, this announcement pertaining to security is very important. According to Chandrashekhar one cannot expect complete cyber security, but there are definitely ways in which such attacks and incidents can be minimised. He very rightly said that that protecting the online consumer data, specially looking at how rapidly e-commerce is growing in the country, is of prime importance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One cannot help but agree with Chandrashekhar, specially considering the fact India &lt;a href="http://tech.firstpost.com/news-analysis/demonetisation-privacy-laws-need-to-be-in-place-before-giving-the-biggest-push-to-digital-transactions-348478.html"&gt;&lt;b&gt;does not have a privacy law ecosystem&lt;/b&gt;&lt;/a&gt; that is present in countries such as the US and the UK, where online consumer protection is taken very seriously. &lt;a href="http://tech.firstpost.com/news-analysis/facebook-asked-to-delete-whatsapp-user-data-in-germany-over-data-protection-law-infringement-337708.html"&gt;&lt;b&gt;Germany&lt;/b&gt;&lt;/a&gt; and &lt;a href="https://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=5&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0ahUKEwjljYHpzNrSAhUkSI8KHa6oB_MQFgg2MAQ&amp;amp;url=http%3A%2F%2Ftech.firstpost.com%2Fnews-analysis%2Ffrance-fines-google-150000-euros-over-data-privacy-216266.html&amp;amp;usg=AFQjCNE15FPlAi9rR5yCXNzS_hnua81QAw&amp;amp;sig2=GVGgF_cxGNhXo-SJhLo4Gg&amp;amp;bvm=bv.149397726,d.c2I" rel="nofollow"&gt;&lt;b&gt;other EU nations&lt;/b&gt;&lt;/a&gt; have always been at the forefront, when it comes to protecting data  privacy, and it has ensured that consumer-facing technology companies do  not run roughshod when it comes to protecting user data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chandrashekhar stated that there was no need for separate  regulations for e-commerce sites, but the priority was ensuring means to  enforce consumer laws in the digital world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Lack of dedicated privacy laws&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to cyberlaw and cybersecurity expert, Pavan  Duggal, “Going forward, there is an urgent need for India to take a  strong view on privacy in terms of legislative frameworks.  Unfortunately, at the time of writing, &lt;a href="http://tech.firstpost.com/news-analysis/privacy-protection-need-for-proactive-cyber-legal-approaches-in-india-357248.html"&gt;&lt;b&gt;India does not have a dedicated law on privacy&lt;/b&gt;&lt;/a&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="Image: Foamy Media" class="wp-image-353936 size-full" height="360" src="http://tech.firstpost.com/wp-content/uploads/2016/12/social-media.jpeg" width="640" /&gt;&lt;br /&gt;Image: Foamy Media&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media websites for instance have a lot of user data. But what happens when they suddenly change their privacy policies? For instance, a lot of users signed on to WhatsApp when it was an independent company. But post the Facebook acquisition, there have been a lot of instances where WhatsApp has updated its terms and conditions to suit its parent Facebook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That’s not completely illegal one may say. Loss of privacy  is a price you pay for free services. But what if, I as a consumer of  WhatsApp &lt;a href="http://tech.firstpost.com/news-analysis/german-consumer-rights-group-accuses-whatsapp-of-illegally-sharing-user-data-with-facebook-359979.html"&gt;&lt;b&gt;do not want the app to share any of my data with Facebook&lt;/b&gt;&lt;/a&gt;?  The only option I am left with is to delete WhatsApp. But then again, I  do not know if my data is also deleted from WhatsApp servers or it has  already been shared. Social media apps, only let you know what updates  are being added. Consent is only required to update the app. You can  stall that, up to a point. But there will come a time when you will have  to update an app. Then by default you have given approval to all the  terms and conditions associated with the app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two students had challenged WhatsApp’s revision to its  privacy policy before Delhi High Court. The Court dismissed the petition  insisting that users could opt out by &lt;a href="http://www.thehindu.com/news/cities/Delhi/delete-or-share-high-court-tells-whatsapp-users/article9143285.ece" rel="nofollow"&gt;&lt;b&gt;deleting their accounts&lt;/b&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When a similar challenge was mounted before the authorities  in UK, Facebook had to put a pause on their data sharing – and this was  because of its strong data protection policy. Under the UK data  protection law, the company has to inform the authority established  under the Act of any changes in the use of user data. In the case of  WhatsApp, the &lt;a href="http://tech.firstpost.com/news-analysis/why-india-failed-to-prevent-whatsapp-data-sharing-with-facebook-while-uk-succeeded-346115.html"&gt;&lt;b&gt;UK authority objected to such sharing.&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Aadhaar – the 12-digit biometric storehouse&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://tech.firstpost.com/wp-content/uploads/2016/03/aadhar_251002219381.jpg"&gt;&lt;img alt="aadhaar_251002219381" class="wp-image-303751 size-full aligncenter" height="360" src="http://tech.firstpost.com/wp-content/uploads/2016/03/aadhar_251002219381.jpg" width="640" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar card is being used for many financial and non  financial transactions. Also the Aadhaar number associated with an  individual also holds a lot of personal and biometric data. So when  recently, there was news about a possible Aadhaar data breach when &lt;a href="http://tech.firstpost.com/news-analysis/aadhaar-data-breach-uidai-finds-multiple-transactions-done-with-the-same-fingerprint-364155.html"&gt;&lt;b&gt;UIDAI filed a police complaint&lt;/b&gt;&lt;/a&gt; against Axis Bank, business correspondent Suvidhaa Infoserve and e-sign provider eMudhra, it was naturally a shock to many.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike a password which can be changed, with biometric  information there is no scope to do that if it is compromised. Although  UIDAI claims that there are &lt;a href="http://tech.firstpost.com/news-analysis/aadhaar-is-being-used-by-few-corporates-for-salary-disbursements-but-the-potential-is-immense-361749.html"&gt;&lt;b&gt;multiple levels of security and firewalls&lt;/b&gt;&lt;/a&gt; to ensure there is no breach of Aadhaar information of an individual,  one can only hope that it is robust enough to withstand any attack.  Collection of biometric data by the government to form a database, for  instance, was debated and ultimately not used in the UK.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy director of the Centre for Internet  and Society, expressed concern about the pace at which we are  progressing when it comes to having a legal and regulatory framework  when it comes to the Digital India push. “While the security  architecture of Aadhaar Enabled Payment Systems (AEPS) might in itself  be good, the idea of providing your fingerprints to merchants for  financial transactions is a terrible idea since that is like asking you  to give your bank password to a merchant, and the merchant can reuse  that password, and you can’t ever change the password,” said Prakash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Enforcing the correct processes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last year, a malware affected the systems of Hitachi Payment  Services, which provides back end services to ATM machines and Point of  Sale nodes across India. As a result of this, around &lt;b&gt;&lt;a href="http://tech.firstpost.com/news-analysis/32-lakh-debit-cards-compromised-affected-banks-include-sbi-hdfc-yes-axis-bob-and-icici-342220.html" target="_blank"&gt;32 lakh debit cards were compromised&lt;/a&gt;&lt;/b&gt; including those issued by SBI, HDFC, Yes Bank, Axis, BOB and ICICI. Security experts and consultants have pointed out &lt;b&gt;&lt;a href="http://tech.firstpost.com/news-analysis/banks-need-to-switch-to-fully-encrypted-security-solutions-to-avoid-security-breaches-343696.html" target="_blank"&gt;various holes in the electronic transaction systems&lt;/a&gt;&lt;/b&gt; in place in India. Intel has also warned that &lt;b&gt;&lt;a href="http://tech.firstpost.com/news-analysis/demonetisation-security-experts-warn-that-atms-are-easy-targets-for-hackers-351182.html" target="_blank"&gt;ATM machines in India&lt;/a&gt;&lt;/b&gt; are vulnerable to malicious attacks. Intel points out that countries in  the Asia Pacific region are developing and are particularly vulnerable  because of old systems and machines being used.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://tech.firstpost.com/wp-content/uploads/2016/12/atm-queue-demonetisation.jpg"&gt;&lt;img alt="Image: REUTERS/Amit Dave " class="wp-image-353328" height="360" src="http://tech.firstpost.com/wp-content/uploads/2016/12/atm-queue-demonetisation.jpg" width="640" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;div class="prodtxtinf" style="text-align: justify; "&gt;Image: REUTERS/Amit Dave&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;According to Mahesh Patel, president and group CTO, AGS  Transact Technologies this was more of a governance issue of the data  centre than any technical error. “It is not about the software, but it  is about the processes and procedures you put in place to ensure that  the system is secure. Everything from physical security to computing  security to admin management, etc should be process driven. So somewhere  there could have been a weak link there. Cloud has to be secure and  encrypted which suffices the use case of payments. This cloud is  different from the ones used by e-commerce sites to display all their  products,” said Patel.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We may have the best of software and security measures, but  ensuring that they are implemented the right way is equally important.  Plugging the loopholes in current regulations is also important.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Existing laws and regulations, not enough&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Duggal, “The Information Technology Act, 2000  hardly has effective provisions to protect any data and personal privacy  in the digital ecosystem. The Indian Government needs to come up with  strong privacy law which can protect both personal privacy and data  privacy in an effective manner.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One may find it really shocking to hear the head of Nasscom  saying something to the extent that full data protection for online  consumers is not possible, but there is definitely truth to the matter.  It will require concerted efforts from not only regulators, governments,  digital wallet players and banking industry to come up with these  privacy laws, but also you the consumer has to ensure that you are aware  of the dangers lurking in the digital world. Educating oneself of the  various ways in which your data can be compromised is a good way to  protect your online self.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Because, let’s face it, for all practical purposes if you are online, your &lt;a href="http://tech.firstpost.com/news-analysis/privacy-is-dead-stop-whining-and-get-some-real-work-done-357090.html"&gt;&lt;b&gt;privacy is dead&lt;/b&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="tags"&gt; &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/first-post-march-16-nimish-sawant-nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber'&gt;https://cis-india.org/internet-governance/news/first-post-march-16-nimish-sawant-nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-17T01:47:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-january-5-2016-nasscom-against-differential-pricing-for-data-services">
    <title>Nasscom against differential pricing for data services</title>
    <link>https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-january-5-2016-nasscom-against-differential-pricing-for-data-services</link>
    <description>
        &lt;b&gt;The National Association of Software and Services Companies says it should be the regulator that decides on such content, not firms.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Moulishree Srivastava was &lt;a class="external-link" href="http://www.livemint.com/Consumer/j1P4yZ3brS4Ttk6kUqy1QJ/Nasscom-against-differential-pricing-for-data-services.html"&gt;published in Livemint &lt;/a&gt;on January 5, 2016. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;India’s top software lobby on Monday said if select web content needs  to be provided cheaper for some Indians, it must be the regulator that  decides on such content, not companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its response to a consultation paper by the Telecom Regulatory  Authority of India (Trai) on differential pricing for data usage, the  National Association of Software and Services Companies (Nasscom)  objected to plans such as Free Basics and Airtel Zero where companies  choose content to be provided at different speeds and prices, but backed  powers for the regulator to allow such a model if the regulator deems  they are in “public interest”, while adhering to principles of net  neutrality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We strongly oppose any model where telecom service providers (TSPs)  or their partners have a say or discretion in choosing content that is  made available at favourable rates, speed... any differential pricing by  TSP either directly such as Airtel Zero or indirectly as in the case of  Free Basics through a platform provider which limits access to the  internet services or websites (selected by the TSP or by the partners)  violate the idea of net neutrality,” said R. Chandrashekhar, president,  Nasscom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“But when we recognize the reality of India as a country which has  low internet penetration and even lower broadband penetration, apart  from low levels of digital literacy and limited local language  content... there may be a need to provide certain services in public  interest at differential or lower prices which the regulator feels are  necessary,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Therefore, it is important that the regulator should have the power  to allow differential pricing for certain types or classes of services  that are deemed to be in public interest and based on mandatory prior  approvals,” he said. “Any such programmes should abide by the principles  of net neutrality and not constrain innovation in any way and not  constrain innovation in any way.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Differential pricing for data usage means offering services at  different price points to different users. However, analysts say it  could lead to an anti-competitive environment, hurting small companies  and start-ups, while giving the TSPs and their partner platforms  near-monopolistic access to the vast amount of user data that has  potential commercial value in a country such as India where privacy laws  are not strong.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Differential pricing is a significant aspect of the net neutrality  debate that erupted in India in 2015, when Trai released a consultation  paper in April. Soon, telecom operator Bharti Airtel Ltd launched Zero, a  marketing platform that allows customers to access mobile applications  for free but charges the application providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook’s Free Basics service (the new name for Internet.org) aims  to offer people without the Internet free access to a handful of  websites and a range of services through mobile phones, which net  neutrality activists say will violate the core principle that everyone  should have unrestricted access to Internet and it should not be  regulated by a company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following the outrage, Trai put Free Basics on hold, asking Reliance  Communications Ltd to furnish the detailed terms and conditions of its  Free Basics service. The next step will be announced later this month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an op-ed in the &lt;i&gt;Times of India&lt;/i&gt; last week, Nandan Nilekani,  co-founder of Infosys Ltd. and former chairman of Unique Identification  Authority of India, publicly criticized Facebook’s Free Basics, calling  it a walled garden.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The walled garden of Free Basics goes against the spirit of openness  on the internet, and in the guise of being pro-poor, balkanises it.  Only Free Basics-approved websites will be accessible for free,” he said  in the article which he co-authored with Viral Shah who led the design  of government’s subsidy platforms using Aadhaar. “In theory, anyone  meeting the technical guidelines today can participate. However,  services that may potentially compete with telco offerings may not join  Free Basics. Since Facebook does not currently subsidise free usage,  telcos will have to foot the bill by raising prices.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He said schemes such as direct benefit transfer for Internet data  packs would be better compared to programmes such as Free Basics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nasscom, in its response, recommended “mandatory prior approval of  such services by the regulator and sharing of periodic information on  tariff plans seek to lower the price as well as zero rating services,”  adding that these programmes should abide by the principle of net  neutrality, meaning it should not limit consumers access to pre-defined  set of services or websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Any such differential pricing programs should have explicit approval  of the regulator—and should be deemed to be in the public interest and  the onus of proving it to be in the public interest in the first  instance would be on service provider and before Trai arrives at a final  decision a public consultation is also advised because of the dangers  involved,” Nasscom said. “Even after the approval, suitable oversight  mechanism should be maintained by the regulator in all such case.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy director at the Centre for Internet and  Society (CIS), said Nasscom’s approach to make differential pricing  plans and options as an exception rather than the rule was quite  reasonable. “It says that if differential pricing services adhere to the  guidelines of being non-discriminatory, non-anti-competitive,  non-predatory, non-ambiguous and transparent, they can be allowed under  the supervision of the regulator, which is similar to the position  adopted by CIS,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Though some of their positions are ambiguous—for instance what they  mean by non-discriminatory, and whether they are okay with differential  pricing between classes of applications, are unclear—and some of their  recommendations increase regulatory complexity, such as their proposal  for independent not-for-profit entities with independent boards to own  and manage such differential pricing programs, by and large it is a  useful submission,” Prakash added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-january-5-2016-nasscom-against-differential-pricing-for-data-services'&gt;https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-january-5-2016-nasscom-against-differential-pricing-for-data-services&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Free Basics</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    

   <dc:date>2016-01-06T15:12:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/financial-times-march-28-2018-narendra-modi-personal-app-sparks-india-data-privacy-row">
    <title>Narendra Modi’s personal app sparks India data privacy row</title>
    <link>https://cis-india.org/internet-governance/news/financial-times-march-28-2018-narendra-modi-personal-app-sparks-india-data-privacy-row</link>
    <description>
        &lt;b&gt;PM’s NaMo app sends user data to third party in US, says researcher.&lt;/b&gt;
        &lt;p&gt;&lt;span style="text-align: justify; "&gt;Sunil Abraham was quoted in the article published by &lt;/span&gt;&lt;a class="external-link" href="https://www.ft.com/content/896cf574-31c0-11e8-b5bf-23cb17fd1498" style="text-align: justify; "&gt;Financial Times&lt;/a&gt;&lt;span style="text-align: justify; "&gt; on March 28, 2018.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“People are outraged that there is a peephole,” says Sunil Abraham, executive director &lt;span&gt;of the Bangalore-based Centre for Internet and Society, a non-profit research &lt;/span&gt;&lt;span&gt;organisation. “They are not outraged that anyone has looked into the peephole — &lt;/span&gt;&lt;span&gt;because there is no evidence of that yet.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For Mr Abraham, however, the controversy demonstrates that “Indian political parties have a voracious appetite for political data. If unchecked by law or public outrage, they &lt;span&gt;will continue to hoover up as much data as they can from our devices.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;span&gt;“Privacy is definitely a political issue,” says Mr. Abraham. “Political parties are reacting not because they will get into trouble under the law. They are reacting because they areafraid their supporters may not like it.”&lt;/span&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/financial-times-march-28-2018-narendra-modi-personal-app-sparks-india-data-privacy-row'&gt;https://cis-india.org/internet-governance/news/financial-times-march-28-2018-narendra-modi-personal-app-sparks-india-data-privacy-row&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-03-28T16:17:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-times-of-india-august-4-2015-anahita-mukherji-nanny-state-rules-porn-bad-for-you">
    <title>Nanny state rules porn bad for you</title>
    <link>https://cis-india.org/internet-governance/news/the-times-of-india-august-4-2015-anahita-mukherji-nanny-state-rules-porn-bad-for-you</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Anahita Mukherji was published in the Times of India on August 4, 2015. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT" style="float: left; "&gt;Half  a century ago, India banned the DH Lawrence classic, Lady Chatterley's  Lover. The ban, though lambasted for its Victorian view of modesty and  obscenity, was fair and square; the matter was debated in the Supreme  Court, which upheld the ban. Over 50 years later, a diverse spectrum of  civil society has slammed a much more insidious and far less transparent  ban on internet pornography.&lt;br /&gt;&lt;br /&gt;For starters, the 857 sites that  vanished from India's internet sphere haven't been officially banned,  they just don't show up when you type the url. The order blocking them  isn't public. For a list of the 857 sites, one must rely on leaked  documents put out on Twitter by Pranesh Prakash, policy director, Centre  for Internet and Society. "The ban on Lady Chatterley's Lover was  public. As for the blocked websites, the government has gone out of its  way to hide the list of sites pulled down. A secret order banning  material violates all principles of transparency in a democracy," says  Prakash.&lt;br /&gt; &lt;br /&gt; The document, with 'Restricted' written on it, is a  letter from the department of telecom asking ISPs to disable 857 sites  as they bear content related to "morality" and "decency," violating  Article 19 (2).&lt;br /&gt; &lt;br /&gt; Strangely, the order's been issued under Sec 79  (3)(b) of the IT Act dealing with intermediaries having to remove  material used to commit unlawful acts. "Watching porn isn't illegal in  India. Disseminating 'obscene' content can be illegal, but for that, the  government must file a case against the sites, and they must be allowed  a representation," says Prakash.&lt;br /&gt; &lt;br /&gt; "Sec 79 (3)(b) of the IT act  isn't the section under which governments can block sites. It should use  Sec 69 that has a review process," says Nikhil Pahwa, a champion of  internet freedom.&lt;br /&gt; &lt;br /&gt; The government drew up its list of 857 sites  even as SC is in the process of hearing a petition to ban porn and is  yet to pass an order. It includes playboy.com that, says Prakash, is a  legitimate adult site. Pahwa points to the ban's "bizarrely moralistic  undertones".&lt;br /&gt; &lt;br /&gt; "As society evolves, government and regulatory  regime are stuck in medieval ages," he says, adding a ban on websites  will be rendered ineffective, pushing users to VPNs, a black hole for  government monitoring mechanisms.&lt;br /&gt; &lt;br /&gt; "A government that hasn't  succeeded with Make in India is trying to prevent Make out in India,"  says venture capitalist Mahesh Murthy, who earlier backed net  neutrality.&lt;br /&gt; &lt;br /&gt; "The government is blocking websites to keep  Rightwing lunatic fringes happy after its unsuccessful bid to pass the  land bill," says Murthy.&lt;br /&gt; &lt;br /&gt; "It isn't merely looking at blocking  porn, but is trying to bring back Sec 66A (IT Act), ruled  unconstitutional by the SC," he adds. "It's part of the bid to restrict  individual freedom, create an artificial separation between Indian  culture and anything erotic, driven by a diktat from Hindutva forces.  It's ironic as Modi came to power as someone looking to activate  individual agency. Now he's wary about where that leads to," says Subir  Sinha, professor at the School of Oriental and African Studies (London).  Murthy and Sinha believe the issue stems from a refusal to accept  Indian culture in totality. "Victorian morality is considered Hindu,  Khajuraho isn't," says Murthy.&lt;br /&gt; &lt;br /&gt; "The government seems to be  acting in a more high-handed manner than previous ones. The press and  public opinion should wake up to this," says sociologist Andre Beteille.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-times-of-india-august-4-2015-anahita-mukherji-nanny-state-rules-porn-bad-for-you'&gt;https://cis-india.org/internet-governance/news/the-times-of-india-august-4-2015-anahita-mukherji-nanny-state-rules-porn-bad-for-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-08-05T01:39:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
