<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1196 to 1210.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/voice-of-america-may-27-2016-india-seeks-to-limit-use-of-maps-and-satellite-images"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-draft-electronic-health-records-standards"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/gender-it-rohini-lakshane-may-19-2016-womens-safety-there-is-an-app-for-that"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/draft-law-would-prohibit-showing-2018disputed-areas2019-on-maps-of-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-delhi-university"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/why-the-new-government-policy-mandating-panic-buttons-on-phones-isn2019t-going-to-protect-women"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindu-businessline-may-10-2016-varun-aggarwal-geospatial-info-regulation-bill-will-hurt-start-ups-small-firms"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/identity-of-the-aadhaar-act-supreme-court-and-the-money-bill-question"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-newsminute-may-6-2016-why-indias-attempt-to-polic-digital-maps-and-satellite-images-is-a-dumb-idea"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-may-8-2016-facebook-a-platform-with-little-less-sharing-of-personal-information"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-issues-with-drm"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/april-2016-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/panel-discussion-on-uid-aadhar-act-2016-and-its-impact-on-social-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/voice-of-america-may-27-2016-india-seeks-to-limit-use-of-maps-and-satellite-images">
    <title>India Seeks to Limit Use of Maps and Satellite Images </title>
    <link>https://cis-india.org/internet-governance/news/voice-of-america-may-27-2016-india-seeks-to-limit-use-of-maps-and-satellite-images</link>
    <description>
        &lt;b&gt;Indians are discussing a plan to ban use of maps or satellite images of the country without approval from the government.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The plan’s critics have launched an online campaign called “Save The Map.” They say the proposed ban could affect many new businesses and services that use technology. The Geospatial Information Regulation Bill would require anyone who wants to use, publish or own maps or geospatial data to seek official permission. A special security committee would consider such requests. Indian officials say the proposed law would help protect military bases from enemies and terrorists. They deny it would cause problems for businesses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Internet experts say the law would affect anyone who uses mobile phones, laptop computers and online companies, such as ride services. They also fear that the ban would affect computer software programs and Apple or Google Map products. The Center for Internet and Society (CIS) in Bangalore also has criticized the bill. It says the measure would return India to where it was more than 30 years ago -- when businesses were forced to get licenses from government officials before they could begin to operate. Pranesh Prakash works at the center.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“What it does (is) it puts in place a license raj for all use of mapping technologies. That just does not make sense. No other country in the world has this regressive mapping law.” Technology experts from Bangalore launched the “Save The Map” campaign. It is calling on Indians to demand that the government change the planned law. The campaign is hoping to copy a successful campaign called “Save The Internet,” which pressured the government to ensure equal access to the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian officials have sought to calm critics, saying the bill is not final. The government has asked people to give ideas on how it should be changed by June 4. Officials note the country is dealing with an increasing number of security issues, including an attack at an air base in northern India earlier this year. Terrorists based in Pakistan were said to have carried out the attack. Junior Home Minister Kiren Rijiju told a newspaper that the law is needed because India must have ways to “secure its boundary and territory.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Prakash notes that the measure would not stop terrorists from using geospatial data from sources outside India. “They need satellite imagery and they need maps, period. Now this law doesn’t actually prevent such maps from being created, it doesn’t actually prevent satellite images of India being captured. What it does is prevent Indians from doing so. So it actually won’t prevent foreign-based terrorists -- especially state-backed terrorists -- from attacking India.” Internet and policy experts say the government would not be able to stop others from creating maps or satellite images of sensitive locations in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I’m Anne Ball.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Anjana Pasricha reported this story from New Delhi for VOANews.com. Christopher Jones-Cruise adapted it for Learning English. George Grow was the editor. &lt;a class="external-link" href="http://learningenglish.voanews.com/a/india-seeks-to-limit-maps-and-satellite-images/3344303.html"&gt;Read the original published by Voice of America&lt;/a&gt; on May 27, 2016&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/voice-of-america-may-27-2016-india-seeks-to-limit-use-of-maps-and-satellite-images'&gt;https://cis-india.org/internet-governance/news/voice-of-america-may-27-2016-india-seeks-to-limit-use-of-maps-and-satellite-images&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-05-28T12:38:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-draft-electronic-health-records-standards">
    <title>Comments on Draft Electronic Health Records Standards</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-draft-electronic-health-records-standards</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society submitted its comments on the Draft Electronic Health Records Standards to the Ministry of Health and Family Welfare.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;To,&lt;br /&gt;Ministry of Health and Family Welfare,&lt;br /&gt;Room 307 D,&lt;br /&gt;Nirman Bhavan,&lt;br /&gt;New Delhi 110108&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Subject: Comments on the Electronic Health Record (EHR) Standards of India&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Electronic Health Record (EHR) Standards (hereinafter “EHR Standards”) were publicly circulated on March 18, 2016 seeking comments and views from stakeholders and the general public. Having reviewed the EHR Standards and referred to other robust standards dealing with the same subject matter, we wish to submit the following comments on the EHR Standards.&lt;/p&gt;
&lt;h4&gt;Standards and Interoperability&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;The EHR Standards state that the "primary aim of interoperability standards is to ensure syntactic (structural) and semantic (inherent meaning) 	interoperability of data amongst systems at all times" &lt;a name="_ftnref1"&gt;[1]&lt;/a&gt;. It is mentioned that set of standards outlined in this document represents an incremental approach to adopting standards and that they need to be flexible and modifiable to adapt to the demographic and resource diversity in India.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Comments:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;The EHR Standards make a reference to syntactic and semantic interoperability without really defining these terms or stipulating clear steps for how 	they may be achieved. It is suggested that these terms are clearly defined. Syntactic interoperability can be defined as ensuring the preservation of the 	clinical purpose of the data during transmission among healthcare systems. Similarly, semantic interoperability can defined as enabling multiple systems to interpret the information that has been exchanged in a similar way through pre-defined shared meaning of concepts &lt;a name="_ftnref2"&gt;[2]&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Inadequate human resource capacity remains a critical challenge to the adoption of e-health standards. The WHO and ITU eHealth Strategy Toolkit &lt;a name="_ftnref3"&gt;[3]&lt;/a&gt; recommends the development of effective health ICT workforce, capable of designing, building, operating and supporting e-health services. This workforce could participate in standards development, as well as the localization of international standards to fit a country's specific need. The EHR Standards 	should also include mechanisms and solutions to address these issues.&lt;/div&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h4&gt;Ownership of Data&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;The physical or electronic records, which are generated by the healthcare provider are held in trust by them on behalf of the patient &lt;a name="_ftnref4"&gt;[4]&lt;/a&gt;. It is stated that the contained data which is sensitive personal data or personal information of the patient as per the Information Technology Act, 2000 is owned by the patients, however the medium for storage or transmission of such data is owned by the healthcare provider.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Comments:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Currently, the EHR Standards state that the contained data which are the sensitive personal data of the patient is owned by the patient. While medical 	records and history is included within the scope of sensitive personal data under the Information Technology Act, 2000, the definition of "Personal Health 	Information" under the EHR Standards is more expansive. Therefore, it is recommended that all Personal Health Information is deemed to be owned by the patient.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Currently, the EHR Standards do not clearly specify the bodies and individuals who would be subject to the requirements under this document. A definition similar to that of "covered entities" under the US Health Insurance Portability and Accountability Act (HIPAA) could be used &lt;a name="_ftnref5"&gt;[5]&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h4&gt;Privileges of Patient&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;Currently, the privileges of the patient include the rights to inspect and view their medical records. Further, the patient can request a healthcare organization that stores/maintains their medical records, to withhold specific information that they do not want disclosed to other&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;organizations or individuals. Also, patients can demand information from a healthcare provider on the details of disclosures performed on the patient's medical records &lt;a name="_ftnref6"&gt;[6]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Comments:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Currently, the EHR Standards only refer to "medical records" as being available for inspection and review of the patients. This should be expanded to 	also include information about enrollment, payment, claims adjudication, case or medical management record systems maintained by or for a health plan; or 	Other records that are used, to make decisions about individuals by healthcare providers or other bodies &lt;a name="_ftnref7"&gt;[7]&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;The EHR standards do not currently stipulate that the upon request by a patient, healthcare providers must exercise timeliness in providing the 	information to them. A time-limit such 30 calendar days should be clearly stated within which the healthcare provider must process the request.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;The right of patients to request information from a healthcare provider on the details of disclosures should include within its scope the rights to 	receive the date of the disclosure; the name and address of the entity or person who received the information; a brief description of the medical 	information disclosed; and; a brief summary of the purpose of the disclosure &lt;a name="_ftnref8"&gt;[8]&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;A right to seek amendment of the one's medical records should also be provided to patients in cases where the information is incomplete.&lt;/div&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h4&gt;Patient Identifying Information&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;Under the Standards, Personal identifiers include the following: Name, Address (all geographic subdivisions smaller than street address, and PIN code) All 	elements (except years) of dates related to an individual (including date of birth, date of death, etc.), Telephone, cell (mobile) phone and/or Fax 	numbers, Email address, Bank Account and/or Credit Card Number, Medical record number, Health plan beneficiary number, Certificate/license number, Any vehicle or other any other device identifier or serial numbers, PAN number, Passport number, AADHAAR card, Voter ID card, Fingerprints/Biometrics, Voice 	recordings that are non-clinical in nature, Photographic images and that possibly can individually identify the person, Any other unique identifying number, characteristic, or code &lt;a name="_ftnref9"&gt;[9]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Comments:&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The above mentioned list is not adequate and exhaustive such as the definition and scope of Protected Health Information under the HIPAA &lt;a name="_ftnref10"&gt;[10]&lt;/a&gt;. The following identifiers must be included within the scope of Patient Identifying Information: Device identifiers and serial numbers, Web Universal Resource Locators (URLs), Internet Protocol (IP) address numbers.&lt;/p&gt;
&lt;h4&gt;Disclosure of Protected/Sensitive Information&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;The EHR Standards state that disclosure of protected/sensitive information for use in treatment, payments and other healthcare operations must be only done after obtaining a general consent of the patient. On the other hand, disclosures for for non-routine and most non-health care purposes must be done only 	after obtaining the specific consent of the patient. Only for certain specified national priority activities, such as notifiable/communicable diseases, it is stated that "the health information may be disclosed to appropriate authority as mandated by law without the patient's prior authorization."&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Comments:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;The terms "specific consent" and "general consent" need to be clearly defined.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;In cases of disclosures for for non-routine and most non-health care purposes, a written authorisation should be mandatory. It should be clearly specified that a healthcare provider may not condition treatment, payment, enrollment, or benefits eligibility on an individual granting an authorization.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;There is confusion due to the use of numerous terms such as "health information", "protected health information", "sensitive personal data", "personal information" and "protected/sensitive information" in the EHR Standards for the same purpose. Some of these above terms are defined while the others are not. In order to remove the ambiguity caused due to this, it is recommended that the term "protected health information" is used throughout the document.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;All bodies dealing with medical data should be required to abide by the principle of "data minimisation" in use and disclosure. They must take 	reasonable efforts to use, disclose, and request only the minimum amount of protected health information needed to accomplish the intended purpose of the 	use, disclosure, or request.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;For internal uses, healthcare providers and other entities must develop and implement policies and procedures that restrict access and uses of protected 	health information based on the specific roles of the members of their workforce.&lt;/div&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;&lt;br /&gt;Amber Sinha,&lt;br /&gt;Centre for Internet and Society,&lt;br /&gt;No. 194, 2nd 'C' Cross,&lt;br /&gt;Domlur, 2nd Stage,&lt;br /&gt;Bengaluru, 560071&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1"&gt;[1]&lt;/a&gt; Page 7 of the EHR Standards.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2"&gt;[2]&lt;/a&gt; Funmi Adebesin, Rosemary Foster, Paula Kotze, Darelle van Greunen, "A review of interoperability standards in e-Health and imperatives for their 			adoption in Africa", Research Article - SACJ No. 50, July 2013; L. E. Whitman and H. Panetto. "The missing link: Culture and language barriers to 			interoperability", Annual Reviews in Control, vol. 30, no. 2, 2006.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3"&gt;[3]&lt;/a&gt; WHO and ITU. "National eHealth Strategy Toolkit", available at &lt;a href="http://goo.gl/uxMvE"&gt;http://goo.gl/uxMvE&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;[4]&lt;/a&gt; Page 19 of the EHR Standards.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5"&gt;[5]&lt;/a&gt; Covered Entity includes a healthcare provider ( Doctors, Clinics, Psychologists, Dentists, Chiropractors, Nursing Homes, Pharmacies), a health plan 			(Insurance companies, HMOs, Company Health Plans, Government programs that pay for health care) and Healthcare Clearinghouse.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6"&gt;[6]&lt;/a&gt; Page 20 of the EHR Standards.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7"&gt;[7]&lt;/a&gt; Individuals' Right under HIPAA to Access their Health Information 45 CFR § 164.524, available at &lt;a href="http://www.hhs.gov/hipaa/for-professionals/privacy/guidance/access/"&gt; http://www.hhs.gov/hipaa/for-professionals/privacy/guidance/access/ &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a name="_ftn8"&gt;[8]&lt;/a&gt; Patient Rights Under HIPAA Accounting of Disclosures of Health Information, available at &lt;a href="http://uthscsa.edu/hipaa/patientrights/accountingofdisclosures.pdf"&gt;http://uthscsa.edu/hipaa/patientrights/accountingofdisclosures.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a name="_ftn9"&gt;[9]&lt;/a&gt; Page 21 of the EHR Standards.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a name="_ftn10"&gt;[10]&lt;/a&gt; See: &lt;a href="http://cphs.berkeley.edu/hipaa/hipaa18.html"&gt;http://cphs.berkeley.edu/hipaa/hipaa18.html&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-draft-electronic-health-records-standards'&gt;https://cis-india.org/internet-governance/blog/comments-on-draft-electronic-health-records-standards&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2016-12-15T08:45:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016">
    <title>Understanding Aadhaar and its New Challenges, May 26-27, 2016</title>
    <link>https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016</link>
    <description>
        &lt;b&gt;A workshop on “Understanding Aadhaar and its New Challenges” is being organised by the Centre for Studies in Science Policy, Jawaharlal Nehru University, and the Centre for Internet and Society, during May 26-27. It is also supported by the Centre for Communication Governance at NLU Delhi, Free Software Movement of India, Knowledge Commons, PEACE, and Center for Advancement of Public Understanding of Science &amp; Technology. This is a legal and technical workshop to be attended by various key researchers and practitioners to discuss the current status of the implementation of the project, in the context of the passing of the Act and the various ongoing cases.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h1&gt;Workshop Programme&lt;/h1&gt;
&lt;h3&gt;First Day, May 26&lt;/h3&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9:00-9:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Registration&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30-10:00&lt;/td&gt;
&lt;td&gt;Prof. Dinesh Abrol - &lt;em&gt;Welcome&lt;/em&gt;&lt;br /&gt;Self-introduction and expectations of participants&lt;br /&gt;Dr. Usha Ramanathan - &lt;em&gt;Overview of the Workshop&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00-11:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Current Status of Aadhaar&lt;/strong&gt;&lt;br /&gt;Dr. Usha Ramanathan, Legal Researcher, New Delhi - &lt;em&gt;What the 2016 Law Says, and How it Came into Being&lt;/em&gt;&lt;br /&gt;S. Prasanna, Advocate, New Delhi - &lt;em&gt;Status and Force of Supreme Court Orders on Aadhaar&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00-11:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30-13:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Direct Benefits Transfers&lt;/strong&gt;&lt;br /&gt;Prof. Reetika Khera, Indian Institute of Technology, Delhi - &lt;em&gt;Welfare Needs Aadhaar like a Fish Needs a Bicycle&lt;/em&gt;&lt;br /&gt;Prof. Ram Kumar, Tata Institute of Social Sciences, Mumbai - &lt;em&gt;Aadhaar and the Social Sector: A critical analysis of the claims of benefits and inclusion&lt;/em&gt;&lt;br /&gt;Ashok Rao, Delhi Science Forum - &lt;em&gt;Cash Transfers Study&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:30-14:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30-16:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Science, Technology, and Security&lt;/strong&gt;&lt;br /&gt;Prof. Subashis Banerjee, Deptt of Computer Science &amp;amp; Engineering, IIT, Delhi - &lt;em&gt;Privacy and Security Issues Related to the Aadhaar Act&lt;/em&gt;&lt;br /&gt;Pukhraj Singh, former National Cyber Security Manager, Aadhaar, New Delhi - &lt;em&gt;Aadhaar: Security and Surveillance Dimensions&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:00-16:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:30-17:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar - International Dimensions&lt;/strong&gt;&lt;br /&gt;Prof. Chinmayi Arun, Center for Communication Governance, National Law University, Delhi - &lt;em&gt;Biometrics and Mandatory IDs in other parts of the world&lt;/em&gt;&lt;br /&gt;Dr. Gopal Krishna, Citizens Forum for Civil Liberties - &lt;em&gt;International Dimensions of Aadhaar
&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17:30-18:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;High Tea&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18:00-19:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Video Presentations&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Second Day, May 27&lt;/h3&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30-11:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Privacy, Surveillance, and Ethical Dimensions of Aadhaar&lt;/strong&gt;&lt;br /&gt;Prabir Purkayastha, Free Software Movement of India, New Delhi - &lt;em&gt;Surveillance Capitalism and the Commodification of Personal Data&lt;/em&gt;&lt;br /&gt;Arjun Jayakumar, SFLC - &lt;em&gt;Surveillance Projects Amalgamated&lt;/em&gt;&lt;br /&gt;Col Mathew Thomas, Bengaluru
 - &lt;em&gt;The Deceit of Aadhaar&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00-11:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30-10:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Broad Issues - I&lt;/strong&gt;&lt;br /&gt;Prof. G Nagarjuna, Homi Bhabha Center for Science Education, Tata Institute of Fundamental Research, Mumbai - &lt;em&gt;How to prevent linked data in the context of Aadhaar&lt;/em&gt;&lt;br /&gt;Dr. Anupam Saraph, Pune - &lt;em&gt;Aadhaar and Moneylaundering&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00-13:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Video Presentations&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:30-14:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30-15:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Broad Issues - II&lt;/strong&gt;&lt;br /&gt;Prof. MS Sriram, Visiting Faculty, Indian Institute of Management, Bangalore - &lt;em&gt;Financial lnclusion&lt;/em&gt;&lt;br /&gt;Nikhil Dey, MKSS, Rajasthan (TBC) - &lt;em&gt;Field witness: Technology on the Ground&lt;/em&gt;&lt;br /&gt;Prof. Himanshu, Centre for Economic Studies &amp;amp; Planning, JNU - &lt;em&gt;UID Process and Financial Inclusion&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30-16:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016'&gt;https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-05-26T10:29:43Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/gender-it-rohini-lakshane-may-19-2016-womens-safety-there-is-an-app-for-that">
    <title>Women's Safety? There is an App for That</title>
    <link>https://cis-india.org/internet-governance/blog/gender-it-rohini-lakshane-may-19-2016-womens-safety-there-is-an-app-for-that</link>
    <description>
        &lt;b&gt;“After locking ourselves in a room for more than 6 days, this is what we came out [sic] with. Join us in helping make WOMEN feel SAFE,” read a gloating press release about a smartphone app for women to notify their near ones that they were in distress. It was one among many such PRs frequently landing in my mailbox after the rape and murder of a young student on board a private bus in Delhi in 2012. 
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Rohini Lakshané was &lt;a class="external-link" href="http://www.genderit.org/node/4744/"&gt;published in Gender IT.org&lt;/a&gt; on May 19, 2016. This was also mirrored by &lt;a class="external-link" href="http://feminisminindia.com/2017/01/09/womens-safety-mobile-apps/"&gt;Feminism in India&lt;/a&gt; on January 9, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The incident had spurred protests across the country and made international headlines. Along with all this came a slew of new “women’s safety” apps. Existing ones, many of which had fizzled out, were conveniently relaunched. My own experience of user-testing such apps in India back then was that they were unreliable at best and dangerously counterproductive at worst. Some of them were endorsed by governments and celebrities and ended up being glorified despite their flaws, their technical and systemic handicaps never acknowledged at all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are myriad mobile phone apps meant to be deployed for personal safety, but their basic functioning is more or less the same: the user activates the app (by pressing a button, shaking the device or similar cue), which sends a distress message containing the users’ location to pre-defined contacts. Some apps include additional artefacts such as a short audio or video recording of the situation. Some others augment this mechanism by alerting the police and other agencies best placed to respond to the emergency. For example, the Companion app for students living on campus notifies the university along with police. The &lt;a href="https://newsroom.uber.com/india/introducing-an-integrated-sos-alert-solution-for-law-enforcement/"&gt;&lt;span style="text-decoration: underline;"&gt;SOS buttons in taxi-hailing apps such as Uber&lt;/span&gt;&lt;/a&gt; enable the user’s contacts to follow the cab’s GPS trail and notify them and the cab company’s “incident response team” of emergencies. Apps such as Kitestring would treat the lack of the user’s response within a time-window as the trigger for a distress message. All their technical wizardry perhaps makes it easy to lose sight of the fact that technology is not a saviour but a tool or an enabler, that technology alone cannot be the panacea of a problem that is deeply complex and, in reality, rooted in society and governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government announced last month that every phone sold in the country from January 2017 should be equipped with a &lt;a href="http://www.bbc.com/news/technology-36139985"&gt;&lt;span style="text-decoration: underline;"&gt;panic button that sends distress flares to the police and a trusted set of contacts&lt;/span&gt;&lt;/a&gt;. Nearly half the phones sold in India &lt;a href="http://www.idc.com/getdoc.jsp?containerId=prSG25827215"&gt;&lt;span style="text-decoration: underline;"&gt;cost USD 100 or less&lt;/span&gt;&lt;/a&gt;. Prices are kept so low by sacrificing features and the quality of the hardware; there are a lot of phones with substandard GPS modules, poor touchscreens, slow processors, bad cameras, tiny memory, and dismal battery life. They run on different versions of different operating systems, some of them outdated. All of these factors would determine if someone is able to use the app at all and how quickly they and their phone would be able to respond to an emergency. Additionally, mobile phone signals become thin or shaky in areas with a high number of users and buildings located cheek-by-jowl. Even when the mobile hardware is good and the mobile signal usable, GPS accuracy can be spotty and constant location tracking would hog battery. These issues would affect the efficacy of any app. Besides, there is too much uncertainty for an app developer to factor in. (Two years ago, I learnt about an app called Pukar, then operational in collaboration with police departments in four cities in India. Pukar solved the problem of potential inaccuracy of the GPS location by getting the user’s contacts to tell the police where the person in distress might be.) Designing a one-size-fits-all safety app is almost impossible. The app that rings a loud alarm when triggered may save someone’s life or spoil the chances of someone who is trying to get help while hiding. Different people may be vulnerable to different kinds of distress situations and an app can at best be optimised for some target user groups.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;An app that does not work in tandem with existing machinery for law enforcement and public safety is a bad idea.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;In the end, the “technical” problems may actually be problems of economic disparity. Making it mandatory for people to own phones equipped with certain hardware or requiring them to upgrade to more reliable devices would drive the phones out of the financial reach of many. Indian manufacturers have expressed concerns that the proposed &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/Panic-button-GPS-feasible-within-the-deadline-but-will-raise-costs/articleshow/51998103.cms"&gt;&lt;span style="text-decoration: underline;"&gt;panic button would raise costs for them as well the end buyers&lt;/span&gt;&lt;/a&gt;. Popularising a downloadable app and informing its target users how to install and work it correctly needs a marketing blitzkrieg, which is something only the state or well-funded developers can afford. The New Delhi police department runs a dedicated control room for reports arriving from its safety app, Himmat (the word for courage in many Indian languages). It’s an expensive affair.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An app that does not work in tandem with existing machinery for law enforcement and public safety is a bad idea. It puts the onus of “keeping women safe” on members of their social circles or on intermediaries and private parties such as cab companies, while absolving law enforcement agencies of their failing to provide security. It opens doors to victim blaming in case someone is unable to use the app at the right time in the right way, or if the app fails.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the contrary, an app that does loop in the police raises concerns about surveillance and protection of data available to the police, which is especially problematic in places such as India where there is no law for privacy or data protection. Alwar, one of the cities where Pukar was implemented, is super-populated with a large geographical area and a high crime rate. Police departments in such places tend to be overworked and understaffed. Without significant policing reforms, it is questionable whether they will be able to respond in time. A sting operation done by two media outlets on 30 senior officials of the New Delhi police department in 2012 showed the &lt;a href="http://www.ndtv.com/india-news/in-and-around-delhi-cops-blame-rapes-on-women-tehelka-investigation-with-ndtv-475442"&gt;&lt;span style="text-decoration: underline;"&gt;cops blaming victims of sexual violence with gay abandon&lt;/span&gt;&lt;/a&gt;. “If girls don't stay within their boundaries, if they don't wear appropriate clothes, then naturally there is attraction. This attraction makes men aggressive, prompting them to just do it [sexual assault]," reads one of their nuggets. “It's never easy for the victim [to complain to the police]. Everyone is scared of humiliation. Everyone's wary of media and society. In reality, the ones who complain are only those who have turned rape into a business," goes another. An app that lets known people monitor someone’s location also poses the risk of abuse, coercion and surveillance by intimate partners or members of the family.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, there is no app for reforming a morass in law enforcement or dismantling patriarchy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/gender-it-rohini-lakshane-may-19-2016-womens-safety-there-is-an-app-for-that'&gt;https://cis-india.org/internet-governance/blog/gender-it-rohini-lakshane-may-19-2016-womens-safety-there-is-an-app-for-that&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rohini</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-01-10T02:48:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/draft-law-would-prohibit-showing-2018disputed-areas2019-on-maps-of-india">
    <title>Draft Law Would Prohibit Showing ‘Disputed Areas’ on Maps of India   </title>
    <link>https://cis-india.org/a2k/blogs/draft-law-would-prohibit-showing-2018disputed-areas2019-on-maps-of-india</link>
    <description>
        &lt;b&gt;Maps that label geographic areas of conflict as “disputed” territories in India could put one behind bars for seven years with 1B Indian Rupees (US$15M) penalty if a recently proposed bill becomes law.&lt;/b&gt;
        &lt;p&gt;The article was published in &lt;a class="external-link" href="https://globalvoices.org/2016/05/11/draft-law-would-prohibit-showing-disputed-areas-on-maps-of-india/"&gt;Global Voices&lt;/a&gt; on May 11, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Kisabur_Ohara_Europe_and_Asia_Octopus_Map_1904_Cornell_CUL_PJM_1145_01.jpg/@@images/6df7e103-7bad-43bd-9e15-5ff50cfb63ca.jpeg" alt="Map" class="image-inline" title="Map" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The controversial bill, also known as &lt;a href="http://mha.nic.in/sites/upload_files/mha/files/GeospatialBill_05052016_eve.pdf" target="_blank"&gt;Geospatial Information Regulation Bill 2016&lt;/a&gt; would make it illegal to “depict, disseminate, publish or distribute any wrong or false topographic information of India including international boundaries through internet platforms or online services or in any electronic or physical form.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If approved, it could put large corporations like Google (with its Google map), free and open source projects like Wikipedia and Open Street Map, and several other organizations in trouble for showing areas of conflict as disputed. Pakistan-Occupied Kashmir (PoK) and Arunachal Pradesh near the China border are two well-known examples of such areas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Map.jpg/@@images/42979426-5f02-49c7-9ce4-ac439490abe0.jpeg" alt="Map" class="image-inline" title="Map" /&gt;&lt;/p&gt;
&lt;p&gt;The Indian government ruled by &lt;a href="https://en.wikipedia.org/wiki/Bharatiya_Janata_Party"&gt;Bharatiya Janata Part&lt;/a&gt;y (BJP) under the leadership of Prime Minister Narendra Modi has been quite &lt;a href="http://economictimes.indiatimes.com/news/politics-and-nation/7-year-jail-rs-100-crore-fine-soon-for-showing-pok-arunachal-as-disputed/articleshow/52117889.cms?utm_source=facebook.com&amp;amp;utm_medium=referral&amp;amp;utm_campaign=ETFBMain&amp;amp;fb_action_ids=10207845600891648&amp;amp;fb_action_types=og.shares" target="_blank"&gt;critical&lt;/a&gt; of the depiction of the PoK and China border in Arunachal Pradesh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If passed in the parliament as law, it could prevent Indians and foreigners, government employees and people traveling in ships and aircrafts that are registered in India, to acquire geospatial imagery or data. To acquire such data, one needs to obtain &lt;a href="http://forum.openstreetmap.org/viewtopic.php?id=54512" target="_blank"&gt;permissions&lt;/a&gt; from the security vetting authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In recent years, the Indian government has targeted numerous foreign publications including &lt;a href="http://www.bbc.com/news/world-asia-india-32408547" target="_blank"&gt;Al Jazeera&lt;/a&gt; for showing distorted maps of India that excluded parts of the state of Jammu and Kashmir and even another state Arunachal Pradesh. While the bill does not explicitly mention these efforts, it seems to fall in line with these previous attempts to control the free flow of geospatial information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A &lt;a href="http://www.medianama.com/2016/05/223-india-draft-mapping-bill/" target="_blank"&gt;news article&lt;/a&gt; about the proposed bill published on the portal &lt;em&gt;MediaNama&lt;/em&gt; explains how the potential law could affect map portals like Open Street Map and Google Maps, taxi, e-commerce and public safety sites and many other services that allow marking and sharing coordinates. “Most digital photographs contain location meta-data, and by sharing your photos online, you’re adding to a repository of data related to man-made phenomenon,” suggests the same article. Open data advocates also have published list of 25 different services, seven major news portals, and 14 nonprofits that would be &lt;a href="https://datameet.hackpad.com/The-Geospatial-Information-Regulation-Bill-2016-zJwgcQaIvBq" target="_blank"&gt;affected&lt;/a&gt; if the bill is approved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Open Data community of India also has come up with a campaign “&lt;a href="http://savethemap.in/" target="_blank"&gt;SaveTheMap&lt;/a&gt;” to draft a &lt;a href="https://datameet.hackpad.com/The-Geospatial-Information-Regulation-Bill-2016-zJwgcQaIvBq" target="_blank"&gt;request&lt;/a&gt; to the government to not pass the bill. The draft request states:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;span class="i author-p-203738"&gt;Request for comments / suggestions on draft “The Geospatial Information Regulation Bill, 2016” To regulate the acquisition, dissemination, publication and distribution of geospatial information of India which is likely to affect the security, sovereignty and integrity of India, a draft “The Geospatial Information Regulation Bill, 2016” has been prepared. Copy of the draft “The Geospatial Information Regulation Bill, 2016” is attached herewith for comments/suggestions. The comments/suggestions on the draft Bill may be forwarded to the Joint Secretary (Internal Security-I), Ministry of Home Affairs, North Block, New Delhi at email id: jsis@nic.in within 30 days.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;There has been a lot of discussion with hashtag &lt;a href="https://twitter.com/hashtag/GeoSpatialBill?src=hash" target="_blank"&gt;#GeoSpatialBill&lt;/a&gt; and humorous comments on social media:&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Tweet.png/@@images/19beaa80-8798-4cdd-bac1-57e3d3902f76.png" alt="Tweet" class="image-inline" title="Tweet" /&gt;&lt;/p&gt;
&lt;p&gt;Many have already started tweeting with the hashtag &lt;a href="https://twitter.com/hashtag/savethemap?src=hash" target="_blank"&gt;#savethemap&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_Tweet.png/@@images/fdffb87a-15c9-4509-a6fd-3c679d104f12.png" alt="Tweet" class="image-inline" title="Tweet" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_Tweet.png/@@images/e8ac7b4c-2cf1-4f99-a7a9-59340749e155.png" alt="Tweet" class="image-inline" title="Tweet" /&gt;&lt;/p&gt;
&lt;p&gt;Twitter user Prasanto Roy explained the implications of geospatial bill for various companies including Google, Uber and Open street maps:&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy4_of_Tweet.png" alt="Tweet" class="image-inline" title="Tweet" /&gt;&lt;/p&gt;
&lt;p&gt;Here's what other experts have to say:&lt;/p&gt;
&lt;p&gt;Arup. R writes in &lt;a href="http://geospatialworld.net/Professional/ViewBlog.aspx?id=477&amp;amp;utm_content=bufferfeba5&amp;amp;utm_medium=social&amp;amp;utm_source=twitter.com&amp;amp;utm_campaign=buffer" target="_blank"&gt;Geospatial World&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;Arup. R writes in &lt;a href="http://geospatialworld.net/Professional/ViewBlog.aspx?id=477&amp;amp;utm_content=bufferfeba5&amp;amp;utm_medium=social&amp;amp;utm_source=twitter.com&amp;amp;utm_campaign=buffer" target="_blank"&gt;Geospatial World&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p style="text-align: justify; "&gt;This Act needs to be dropped. In its attempt to cover all bases it has been made so broadband and all encompassing that it may actually impede the progress of work on Geospatial systems and therefore on key Government programmes and projects. The Act does not take into account the fact that with the advent of the Cloud, Data as a Service, Software as a Service and Platform as a Service there is no need for ‘persons’ to possess data. They can just access data, do their work and retain only the final results. This Act does not, in fact cannot, even begin to comprehend the paradigm shift in geospatial technologies which makes it a non-starter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India does need a Geospatial Information Act, but it has to be an enabling and encouraging Act that makes for faster and better implementation of programmes, not a regressive and punitive Act as the proposed one.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Devdutta Tengshe writes about the overreaching ambit of Geospatial bill on &lt;a href="https://medium.com/@devdattat/problems-with-the-geospatial-information-regulation-bill-a19fa810983c#.8ivc9a2j8" target="_blank"&gt;Medium&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p style="text-align: justify; "&gt;Worst of all, it (the bill) is trying to implement Security by Obscurity, which is expecting the country to become secure by hiding information from its citizens. This is dangerous, because the real mischief creators, be they terrorists, Foreign government agencies, or domestic criminals, will most likely have access to kind of data from foreign sources, and will not even think about getting permits and licenses from these Indian Authorities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Cyber law expert Pavan Duggal told &lt;em&gt;&lt;a href="http://thewire.in/2016/05/08/draft-geospatial-bill-criticised-by-cyber-law-experts-34616/" target="_blank"&gt;The Wire&lt;/a&gt;&lt;/em&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The draft legislation has the intrinsic problem that it has been given extra-territorial applicability in terms of jurisdiction. It is applicable to any person anywhere in the world. We have historically seen that such jurisdiction does not work well in practical terms. What if global players do not want to take your licence or subject themselves to your jurisdiction?&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Duggal further spoke about how the law could impact the growth of e-commerce and m-commerce in India.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Under this law, Google Maps will be illegal without a licence, which means that all mobile or e-commerce applications working on Google Maps will also become illegal. The licence will also only be applicable to the concerned person. So if I am a taxi aggregator like Ola or Uber, I will have to get a separate licence over and above what Google Map has.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="http://indianexpress.com/article/opinion/editorials/india-map-100-crore-fine-7-years-jail-2790822/" target="_blank"&gt;&lt;em&gt;Indian Express&lt;/em&gt; &lt;/a&gt;calls the Geospatial bill a death note for Cartography:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p style="text-align: justify; "&gt;The draft Geospatial Information Regulation Bill of 2016 is so perfectly ridiculous that one can only hope that it falls off the map before it can be tabled in the House. Publishers the world over have learned, to their bewildered amusement, that India censors maps of itself. Now, to strike fear into their anti-national gizzards, the government has invoked an official map censor, a babu-led organisation whose prior permission will be required to publish geospatial information, which is newspeak for maps. Failure to correctly depict the borders of India could attract a fine of up to Rs 100 crore, before the poor offending bozo is dragged away to the cooler for seven years. With this draft, the government has embarked on a journey without maps, which must rapidly become directionless.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Not the first time around?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, this clearly isn't the first time that services such as Google Maps have come under the federal scanner in India. In 2014, India's prime investigation agency Central Bureau of Investigation (CBI) had launched a probe into Google Maps’ irregularities in &lt;em&gt;Mapathon 2013&lt;/em&gt; and had accused the company of running the competition without procuring proper governmental permissions. But the agency had called off the case citing lack of ‘adequate evidence to corroborate the allegations’.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/draft-law-would-prohibit-showing-2018disputed-areas2019-on-maps-of-india'&gt;https://cis-india.org/a2k/blogs/draft-law-would-prohibit-showing-2018disputed-areas2019-on-maps-of-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-05-15T13:05:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-delhi-university">
    <title>MHRD IPR Chair Series: Information Received from Delhi University</title>
    <link>https://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-delhi-university</link>
    <description>
        &lt;b&gt;This post provides a factual description about the operation of Ministry of Human Resource Development IPR Chair’s Intellectual Property Education, Research and Public Outreach (IPERPO) scheme in Delhi University.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The author has analysed all the data received through which, the author seeks to trace the presence of unjustified underutilisation of funds by the aforementioned university as provided by the MHRD during the period of 2013-2014. To collect the information for the given study, an RTI application was filed to Delhi University on 09/02/2015 by the Centre for Internet and Society. The reply to RTI application was received on 25/02/2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These are the documents received by CIS from Delhi University:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;For the response to the RTI application &lt;a href="https://cis-india.org/a2k/blogs/DU.pdf" class="external-link"&gt;click here&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Hereinafter, in order to receive any information about Delhi School of Economics, Delhi University’s RTI reply, kindly refer to the above mentioned links. Following are the queries mentioned in the RTI application along with their replies.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Reports on the implementation of the IPERPO scheme of the Ministry of Human Resource Development and the implementation of the MHRD IPR Chair funded under the scheme at the Delhi School of Economics.&lt;br /&gt;Reply: The University submitted that there are no reports on the implementation of the IPERPO scheme or the MHRD IPR Chair funded under the same. Additionally, the implementation of the scheme commended at Delhi University w.e.f 20th Feb., 2014. Dr. Rekha Chaturvedi joined as the IPR Chair (Technical) on the same date. &lt;/li&gt;
&lt;li&gt;Documents on the release of grants to the MHRD IPR Chairs under the IPERPO scheme at the Delhi University, Delhi School of Economics for the year 2013-14.&lt;br /&gt;Reply: The University submitted that there has been no release of grants by the Human Resource and Development Ministry under the IPERPO Scheme.&lt;/li&gt;
&lt;li&gt;Documents relating to receipts of utilization certificates and audited expenditure statements and matters related to all financial sanctions with regard to funds granted to the MHRD IPR Chair established under the IPERPO Scheme for the year 2013-14 at the Delhi University, Delhi School of Economics.&lt;br /&gt;Reply: The University replied that as there has been no release of grants under the IPERPO scheme, the question of utilization certificates and audited expenditure or any other matter related to financial sanctions with regard to the funds does not arise.&lt;/li&gt;
&lt;li&gt;Documents regarding all matters related to finance and budget related to the MHRD IPR Chair under the IPERPO scheme 2013-14 established at Delhi University, Delhi School of Economics.&lt;br /&gt;Reply: The University did not submit any documents in this regard and asserted that the information sought is not specific.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Comparative Analysis between University Response and the guidelines of MHRD Scheme Document&lt;/strong&gt;&lt;br /&gt;The Scheme Document of MHRD (http://copyright.gov.in/Documents/scheme.pdf) is a comprehensive document which consists of guidelines regarding Intellectual Property Education, Research and Public Outreach. It talks about a list of objectives, purposes, conditions and eligibility criteria for a University to ensure in order to implement IPERPO in a truest sense. This document provides the procedural as well as qualifying conditions for an Institute to ensure or fulfil before applying for the MHRD grant. Some of these conditions include maintenance of utilization certificates, audit reports, expenditure statements and event information which would be open to access on demand by MDHR or Comptroller and Auditor General of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A. Objectives &lt;br /&gt;The University has not provided any documents detailing any activities undertaken to further the objectives of the IPERPO scheme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;B. Eligibility &lt;br /&gt;Delhi School of Economics, Delhi University is recognized by the University Grants Commission. Therefore, it fulfils the eligibility criteria mentioned in the scheme document.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Financial Analysis&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The University has not provided any documents on this subject.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-delhi-university'&gt;https://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-delhi-university&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nehaa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-05-15T12:18:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/why-the-new-government-policy-mandating-panic-buttons-on-phones-isn2019t-going-to-protect-women">
    <title>Why The New Government Policy Mandating Panic Buttons On Phones Isn’t Going To Protect Women</title>
    <link>https://cis-india.org/internet-governance/news/why-the-new-government-policy-mandating-panic-buttons-on-phones-isn2019t-going-to-protect-women</link>
    <description>
        &lt;b&gt;Recently, the Union Minister for Communications and Information Technology Mr Ravi Shankar Prasad tweeted about new rules mandating a panic button in every cell phone sold in the country from January 2017. To keep ladies safe, of course.&lt;/b&gt;
        &lt;p&gt;The story by Madhura Kadaba was published in the &lt;a class="external-link" href="http://theladiesfinger.com/panic-buttons/"&gt;Ladies Finger&lt;/a&gt; on May 14, 2016. Rohini Lakshané was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/RaviShankarPrasad.png" alt="Ravi Shankar Prasad" class="image-inline" title="Ravi Shankar Prasad" /&gt;&lt;/p&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=142272"&gt;According to a statement released by the Telecommunications Ministry&lt;/a&gt;, the panic button will be activated by pressing a designated button on a smartphone or by holding down both ‘5’ and ‘9’ keys on a basic phone. Pressing the panic button is expected to alert police and designated friends or relatives, similar to apps launched previously by police departments like &lt;a href="https://play.google.com/store/apps/details?id=com.smartcloud.delhi&amp;amp;hl=en"&gt;Himmat&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It followed remarks from the Union Minister for Women and Child Development, Ms Maneka Gandhi, in the Lok Sabha in December 2015. “Every cell phone will have an in-built panic button. Now, all new cell phones will be made with panic buttons. But in case of all old cell phones, you can go to the person who owns the company or the dealer and they will adjust it for you. If a woman is in trouble, she can just press the button on the cell phone and she will immediately get help.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two days later, reacting to concerns that the mandate could increase mobile phone costs, Mr Ravi Shankar Prasad said, “&lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/Panic-button-Ravi-Shankar-Prasad-to-discuss-mobile-price-hike/articleshow/52028900.cms"&gt;Manufacturers… have given their support. My expectation is that they will render their support in social justice and women security&lt;/a&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After a point, it almost becomes a farce — the government’s continuous search for grand, one-stop solutions to dealing with sexual violence. We had the &lt;a href="https://in.news.yahoo.com/what-they-are-planning-to-do-with-the-rs-1-000-crore-nirbhaya-fund-050843333.html"&gt;vast coffers of the Nirbhaya fund&lt;/a&gt;, which went nowhere. It had tech solutions coming out of its 1000-crore ears. It included plans for setting up control rooms in 114 cities within 9 months back in 2014 and surveillance cameras in all public transport vehicles including autos! Who was going to be watching the feed of these cameras, if ever by some vast change in the face of humanity such a thing happened, you may wonder? Or as journalist Revati Laul wrote, “Given that police stations across the country are short staffed, given how many of them cannot even afford paper to file a first information report (FIR) or fuel for the police personnel’s motorbike, just how will the appearance of these control rooms change that? How will switchboards help if police stations in even big cities like Varanasi have too few vehicles to cater to the existing load of emergencies they have to deal with?” But hush, don’t interrupt when Daddy is talking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, we published an investigation into the &lt;a href="http://theladiesfinger.com/investigation-where-are-the-one-stop-centers-for-rape-victims-under-the-nirbhaya-fund/"&gt;one-stop centres&lt;/a&gt; promised by the Nirbhaya fund. These centres are supposed to provide services like assistance in lodging FIRs, medical assistance for medical examinations, and therapy. On paper, Delhi is supposed to have 6. Good luck locating them because they don’t exist. Most of the staff of the hospitals where the centers were to be located were clueless about the program.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But perhaps we should forget the tiresome past and move to the shiny button-filled future. We asked Rohini Lakshane, a technology expert and Program Officer at the Centre for Internet and Society what she thought of panic buttons. Recently she reviewed a &lt;a href="http://tech.firstpost.com/news-analysis/mobile-apps-for-personal-safety-64274.html"&gt;bunch&lt;/a&gt; of personal safety apps geared toward women and was very unimpressed. About the government’s new plan, she said, “GPS accuracy in India can sometimes be patchy and not very accurate, and continuous location tracking drains the battery, something that could be problematic for people with phones that do not have good GPS hardware or a long battery life.” Lakshane added, “The app would also enable tracking by family members, which can increase the chance of intimate partner abuse and violence. There have been instances in which apps that provide real-time location or periodic updates of the location of a person to a contact have enabled abuse by intimate partners or by members of the family.” In short, you are unlikely to get the help you need in case of stranger danger and continue to face whatever oppression you maybe facing from your ‘loved ones’.&lt;/p&gt;
&lt;p&gt;Which brings us to the biggest problem with panic buttons, the idea that what Indian women should live in fear of scary strangers outside the house.&lt;/p&gt;
The story by Madhura Kadaba was published in The Ladies Finger on May 14, 2016. Rohini Lakshane was quoted.  The story by Madhura Kadaba was published in the Ladies Finger on May 14, 2016. Rohini Lakshane was quoted.   
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In fact, carefully conducted research shows over and over again that Indian women are most likely to face violence from their families, within their homes. The Mumbai programme RAHAT’s report &lt;a href="http://theladiesfinger.com/whats-the-ratio-of-known-vs-stranger-rapists-take-a-wild-guess-that-and-other-highlights-from-the-2015-rahat-report-on-sexual-violence/"&gt;shows&lt;/a&gt; that 91 percent of the accused in reported cases of rape were by known persons. Add on the fact if you have even a fleeting acquaintance with a man who attacks you the police are additionally reluctant to &lt;span&gt;do anything&lt;/span&gt;.&lt;/p&gt;
&lt;p&gt;Not that the police like to file complaints if you have been raped by a &lt;a href="http://theladiesfinger.com/tag/ready-to-report/"&gt;stranger&lt;/a&gt;. That way they are quite equal opportunity about ignoring complaints.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Perhaps we should have a panic button in our phones after all. A daily reminder that you should fear rape, in case for a moment you had decided to stop worrying. A daily reminder that if you do get raped you must remember to press a button that goes nowhere. A great metaphor for how we deal with victims of sexual violence in India.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/why-the-new-government-policy-mandating-panic-buttons-on-phones-isn2019t-going-to-protect-women'&gt;https://cis-india.org/internet-governance/news/why-the-new-government-policy-mandating-panic-buttons-on-phones-isn2019t-going-to-protect-women&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-05-15T09:45:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindu-businessline-may-10-2016-varun-aggarwal-geospatial-info-regulation-bill-will-hurt-start-ups-small-firms">
    <title>Geospatial Info Regulation Bill will hurt start-ups, small firms </title>
    <link>https://cis-india.org/internet-governance/news/hindu-businessline-may-10-2016-varun-aggarwal-geospatial-info-regulation-bill-will-hurt-start-ups-small-firms</link>
    <description>
        &lt;b&gt;The Geospatial Information Regulation Bill, 2016, whose draft outlaws the acquisition of geospatial information without the government’s permission, is expected to impact smaller companies rather more than the large ones. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Varun Aggarwal was published in &lt;a class="external-link" href="http://www.thehindubusinessline.com/info-tech/geospatial-info-regulation-bill-will-hurt-startups-small-firms/article8580732.ece"&gt;Hindu BusinessLine&lt;/a&gt; on May 10, 2016. Sumandro Chattapadhyay was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Experts said that the law is being created to keep large corporates in check, but if implemented in its current form, its biggest impact would be on start-ups and smaller firms that use or create geospatial data.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“While companies such as Uber and Google can survive by getting all their maps vetted by the government, smaller companies will be impacted. This will act as a big entry barrier in favour of the dominant players such as Google and Microsoft,” said Sumandro Chattapadhyay, research director at Centre for Internet and Society.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Smaller companies have no means to know what kind of geospatial information they can store and what they cannot. Moreover, if a start-up requires three months to get approvals for your data before you can use it, it’ll be as good as dead,” Chattapadhyay said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Google declined to comment on the draft Bill.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;strong&gt;U-turn by Centre&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; Sanjay Kumar, president of the Association of Geospatial Industries, recalled that Prime Minister Narendra Modi had in a speech in September last highlighted the importance of geospatial data in everyday life of the common man. “But now, the government seems to be taking a U-turn,” he said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Association has hundreds of members, including Google, offering various geospatial services.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“The PM’s campaigns on skill development, digital India and enhancement of the transport sector are heavily dependent on geospatial data. There are several private sector companies that provide services for these projects. If this Bill is passed as drafted, all this development process will be stalled,” said Kumar.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindu-businessline-may-10-2016-varun-aggarwal-geospatial-info-regulation-bill-will-hurt-start-ups-small-firms'&gt;https://cis-india.org/internet-governance/news/hindu-businessline-may-10-2016-varun-aggarwal-geospatial-info-regulation-bill-will-hurt-start-ups-small-firms&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-05-13T15:46:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/identity-of-the-aadhaar-act-supreme-court-and-the-money-bill-question">
    <title>Identity of the Aadhaar Act: Supreme Court and the Money Bill Question</title>
    <link>https://cis-india.org/internet-governance/blog/identity-of-the-aadhaar-act-supreme-court-and-the-money-bill-question</link>
    <description>
        &lt;b&gt;A writ petition has been filed by former Union minister Jairam Ramesh on April 6 challenging the constitutionality and legality of the treatment of this Act as a money bill. The Supreme Court heard the matter on April 25 and invited the Union government to present its view. It is our view that the Supreme Court can not only review the Lok Sabha speaker’s decision, but should also ask the government to draft the Aadhaar Bill again, this time with greater parliamentary and public deliberation. Vanya Rakesh and Sumandro Chattapadhyay wrote this article on The Wire.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Published by and cross-posted from &lt;a href="http://thewire.in/2016/05/09/identity-of-the-aadhaar-act-supreme-court-and-the-money-bill-question-34721/"&gt;The Wire&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The Aadhaar Act 2016, passed in the Lok Sabha on March 16, 2016, &lt;a href="http://www.thehindu.com/news/national/opposition-picks-holes-in-aadhaar-bill/article8361213.ece"&gt;faced opposition&lt;/a&gt; ever since it was tabled in parliament. In particular, the move to introduce it as a money bill has been vehemently challenged on grounds of this being an attempt to bypass the Rajya Sabha completely. &lt;a href="http://www.thehindu.com/news/national/jairam-ramesh-moves-supreme-court-against-treating-aadhaar-bill-as-money-bill/article8446997.ece"&gt;A writ petition has been filed by former Union minister Jairam Ramesh on April 6&lt;/a&gt; challenging the constitutionality and legality of the treatment of this Act as a money bill. The Supreme Court heard the matter on April 25 and invited the Union government to present its view.&lt;/p&gt;
&lt;p&gt;It is our view that the Supreme Court can not only review the Lok Sabha speaker’s decision, but should also ask the government to draft the Aadhaar Bill again, this time with greater parliamentary and public deliberation.&lt;/p&gt;
&lt;h3&gt;The money bill question&lt;/h3&gt;
&lt;p&gt;M.R. Madhavan &lt;a href="http://indianexpress.com/article/opinion/columns/aadhaar-bill-money-bill-name-of-the-bill-2754080/"&gt;has argued&lt;/a&gt; that the Aadhaar Act contains matters other than “only” those incidental to expenditure from the consolidated fund, as it establishes a biometrics-based unique identification number for beneficiaries of government services and benefits, but also allows the number to be used for other purposes beyond service delivery. While Pratap Bhanu Mehta &lt;a href="http://indianexpress.com/article/opinion/columns/privacy-after-aadhaar-money-bill-rajya-sabha-upa/"&gt;calls this a subversion&lt;/a&gt; of “the spirit of the constitution”, P.D.T. Achary, former secretary general of the Lok Sabha, &lt;a href="http://indianexpress.com/article/opinion/columns/show-me-the-money-4/"&gt;expressed concern&lt;/a&gt; about the attempts to pass off financial bills like Aadhaar as money bills as a means to &lt;a href="http://www.thehindu.com/opinion/lead/circumventing-the-rajya-sabha/article7531467.ece"&gt;circumvent&lt;/a&gt; and erode the supervisory role of the Rajya Sabha. Arvind Datar has further emphasised that when the primary purpose of a bill is not governed by Article 110(1), then certifying it as a money bill is &lt;a href="http://indianexpress.com/article/opinion/columns/making-a-money-bill-of-it/"&gt;an unconstitutional act&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Article 110(1) of the Constitution identifies a bill as a money bill if it contains “only” provisions dealing with the following matters, or those incidental to them:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;imposition and regulation of any tax,&lt;/li&gt;
&lt;li&gt;financial obligations undertaken by Indian Government,&lt;/li&gt;
&lt;li&gt;payment into or withdrawal from the Consolidated Fund of India (CFI) or Contingent Fund of India,&lt;/li&gt;
&lt;li&gt;appropriation of money and expenditure charged on the CFI or receipt, and&lt;/li&gt;
&lt;li&gt;custody, issue or audit of money into CFI or public account of India.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;However, the link of the Act with the Consolidated Fund of India is rather tenuous, since it depends on the Union or state governments declaring a certain subsidy to be available upon verification of the Aadhaar number. The objectives and validity of the Act would not actually change if the Aadhaar number no longer was directly connected to the delivery of services. The use of the word “if” in section 7 explicitly leaves scope for a situation where the government does not declare an Aadhaar verification as necessary for accessing a subsidy. In such a scenario, the Act will still be valid but without any formal connection with any charges on the Consolidated Fund of India.&lt;/p&gt;
&lt;h3&gt;A case of procedural irregularity?&lt;/h3&gt;
&lt;p&gt;The constitution of India borrows the idea of providing the speaker with the authority to certify a bill as money bill from British law, but operationalises it differently. In the UK, though the speaker’s certificate on a money bill is &lt;a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/480476/Money_Bills__12_Nov_2015___accessible_PDF_.pdf"&gt;conclusive&lt;/a&gt; for all purposes under section 3 of the Parliament Act 1911, the speaker is &lt;a href="http://www.publications.parliament.uk/pa/ld201011/ldselect/ldconst/97/9703.htm"&gt;required to consult&lt;/a&gt; two senior members, usually one from either side of the house, appointed by the committee from amongst those senior MPs who chair general committees. In India, the speaker makes the decision on her own.&lt;/p&gt;
&lt;p&gt;Although article 110 (3) of the Indian constitution states that the decision of the speaker of the Lok Sabha shall be final in case a question arises regarding whether a bill is a money bill or not, this does not restrict the Supreme Court from entertaining and hearing a petition contesting the speaker’s decision. As the Aadhaar Act was introduced in the Lok Sabha as a money bill even though it does not meet the necessary criteria for such a classification, this treatment of the bill may be considered as an instance of &lt;em&gt;procedural irregularity&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;There is ample jurisprudence on what happens when the Supreme Court’s power of judicial review comes up against Article 122 – which states that the validity of any proceeding in the parliament can (only) be called into question on the grounds of procedural irregularities. In the crucial judgment of &lt;a href="https://indiankanoon.org/doc/1757390/"&gt;&lt;em&gt;Raja Ram Pal vs Hon’ble Speaker, Lok Sabha and Others&lt;/em&gt;&lt;/a&gt; (2007), the court evaluated the scope of judicial review and observed that although parliament is supreme, unlike Britain, proceedings which are found to suffer from substantive illegality or unconstitutionality, cannot be held protected from judicial scrutiny by article 122, as opposed to mere irregularity. Deciding upon the scope for judicial intervention in respect of exercise of power by the speaker, in &lt;a href="https://indiankanoon.org/doc/1686885/"&gt;&lt;em&gt;Kihoto Hollohan vs Zachillhu and Ors.&lt;/em&gt;&lt;/a&gt; (1992), the Supreme Court held that though the speaker of the house holds a pivotal position in a parliamentary democracy, the decision of the speaker (while adjudicating on disputed disqualification) is subject to judicial review that may look into the correctness of the decision.&lt;/p&gt;
&lt;p&gt;Several past decisions of the Supreme Court discuss how the tests of legality and constitutionality help decide whether parliamentary proceedings are immune from judicial review or not. In &lt;a href="https://indiankanoon.org/doc/1249806/"&gt;&lt;em&gt;Ramdas Athawale vs Union of India&lt;/em&gt;&lt;/a&gt; (2010), the case of &lt;a href="https://indiankanoon.org/doc/638013/"&gt;&lt;em&gt;Keshav Singh vs Speaker, Legislative Assembly&lt;/em&gt;&lt;/a&gt; (1964) was referred to, in which the judges had unequivocally upheld the judiciary’s power to scrutinise the actions of the speaker and the houses. It was observed that if the parliamentary procedure is illegal and unconstitutional, it would be open to scrutiny in a court of law and could be a ground for interference by courts under &lt;a href="https://indiankanoon.org/doc/981147/"&gt;Article 32&lt;/a&gt;, though the immunity from judicial interference under this article is confined to matters of irregularity of procedure. These observations were reiterated in &lt;a href="https://indiankanoon.org/docfragment/108219590/?formInput=lokayukta"&gt;&lt;em&gt;Mohd. Saeed Siddiqui vs State of Uttar Pradesh&lt;/em&gt;&lt;/a&gt; (2014) and &lt;a href="https://indiankanoon.org/doc/199851373/"&gt;&lt;em&gt;Yogendra Kumar Jaiswal vs State of Bihar&lt;/em&gt;&lt;/a&gt; (2016).&lt;/p&gt;
&lt;p&gt;Thus, the decision of the Lok Sabha speaker to pass and certify a bill as a money bill is definitely not immune from judicial review. Additionally, the Supreme Court has the power to issue directions, orders or writs for enforcement of rights under Article 32 of the constitution, therefore, allowing the judiciary to decide upon the manner of introducing the Aadhaar Act in parliament.&lt;/p&gt;
&lt;h3&gt;National implications demand public deliberation&lt;/h3&gt;
&lt;p&gt;As the provisions of the Aadhaar Act have &lt;a href="http://indianexpress.com/article/opinion/columns/privacy-after-aadhaar-money-bill-rajya-sabha-upa/"&gt;far reaching implications&lt;/a&gt; for the fundamental and constitutional rights of Indian citizens, the Supreme Court should look into the matter of its identification and treatment as a money bill and whether such decisions lead to the thwarting of legislative and procedural justice.&lt;/p&gt;
&lt;p&gt;The Supreme Court may also take this opportunity to reflect on the very decision making process for classification of bills in general. As &lt;a href="http://www.thehoot.org/media-watch/law-and-policy/aadhar-why-classification-matters-in-law-making-9281"&gt;Smarika Kumar argues&lt;/a&gt;, experience with the Aadhaar Act reveals a structural concern regarding this classification process, which may have substantial implications in terms of undermining public and parliamentary deliberative processes. This “trend,” as &lt;a href="http://indianexpress.com/article/opinion/columns/making-a-money-bill-of-it/"&gt;Arvind Datar notes&lt;/a&gt;, of limiting legislative discussions and decisions of national importance within the space of the Lok Sabha must be swiftly curtailed.&lt;/p&gt;
&lt;p&gt;Apart from deciding upon the legality of the nature of the bill, it is vital that the apex court ask the government to categorically respond to the concerns red-flagged by the &lt;a href="http://164.100.47.134/lsscommittee/Finance/15_Finance_42.pdf"&gt;Standing Committee on Finance&lt;/a&gt;, which had taken great exception to the continued collection of data and issuance of Aadhaar numbers in its report, and to the recommendations &lt;a href="http://thewire.in/2016/03/16/three-rajya-sabha-amendments-that-will-shape-the-aadhaar-debate-24993/"&gt;passed in the Rajya Sabha recently&lt;/a&gt;. Further, the repeated violation of the Supreme Court’s interim orders – that the Aadhaar number cannot be made mandatory for availing benefits and services – in contexts ranging from &lt;a href="http://www.caravanmagazine.in/vantage/how-get-married-without-aadhaar-number"&gt;marriages&lt;/a&gt; to the &lt;a href="http://www.thehindu.com/news/national/payment-denied-for-nrega-workers-without-uidai-cards-in-jharkhand/article5674969.ece"&gt;guaranteed work programme&lt;/a&gt; should also be addressed and responses sought from the Union government.&lt;/p&gt;
&lt;p&gt;Evidently, the substantial implications of the Aadhaar Act for national security and fundamental rights of citizens, primarily privacy and data security, make it imperative to conduct a duly balanced public deliberation process, both within and outside the houses of parliament, before enacting such a legislation.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/identity-of-the-aadhaar-act-supreme-court-and-the-money-bill-question'&gt;https://cis-india.org/internet-governance/blog/identity-of-the-aadhaar-act-supreme-court-and-the-money-bill-question&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vanya Rakesh and Sumandro Chattapadhyay</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2016-05-09T11:52:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-newsminute-may-6-2016-why-indias-attempt-to-polic-digital-maps-and-satellite-images-is-a-dumb-idea">
    <title>Why India’s attempt to police digital maps and satellite images is a ‘dumb’ idea </title>
    <link>https://cis-india.org/internet-governance/news/the-newsminute-may-6-2016-why-indias-attempt-to-polic-digital-maps-and-satellite-images-is-a-dumb-idea</link>
    <description>
        &lt;b&gt;Are we back to the license raj?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The story was published by &lt;a class="external-link" href="http://www.thenewsminute.com/article/why-indias-attempt-police-digital-maps-and-satellite-images-dumb-idea-42805"&gt;the News Minute&lt;/a&gt; on May 6, 2016. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In a move which is receiving widespread criticism from technology and policy experts, the Indian government has proposed the Geospatial Information Regulation Bill that seeks to regulate the use of ‘geospatial information’ of India. Any violation of the proposed act could attract a penalty of up to 7 years in prison and Rs. 1 crore in fines, and the extreme punishments proposed have also been criticised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So what is Geospatial information?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Geospatial Information has been defined in the act as&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;any imagery or data acquired through space or aerial platforms such as satellites, aircrafts, airships, balloons, unmanned aerial - vehicles or graphical or digital data depicting natural or man-made physical features, phenomenon or boundaries of the earth or any information including surveys, charts, maps and terrestrial photos.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;To put it simply, any imagery of anything on earth (in India) recorded using machines in the sky will be under the purview of the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The law forbids any ‘incorrect representation' of the Indian map. For instance, not showing Pakistan Occupied Kashmir as a part of India will now be illegal and attract a fine and jail-term.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here’s what the draft bill says,&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;"No person shall depict, disseminate, publish or distribute any wrong or false topographic information of India, including international boundaries through Internet platforms or online services or in any electronic or physical form."&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;And further states,&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;"Whoever acquires any geospatial information of India in contravention of the law shall be punished with a fine ranging from Rs 1 crore to Rs 100 crore and/or imprisonment for a period up to seven years."&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;And it doesn’t end here.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In what is reminiscent of India’s license raj era, the law also mandates that any person or institution acquiring or disseminating any geospatial imagery will have to first seek permission and license from a government authority. So Google Maps, Wikipedia, OpenStreetMap and others can operate in India only with a specific license from the Indian government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government authority will also run “sensitivity checks” on the imagery to protect India’s security and sovereignty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technology and policy experts are openly gunning for the bill and are holding no punches back.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This proposed bill is as dumb as the draft encryption bill of last year which would have made WhatsApp illegal. It is unenforceable and will only serve to make India look like a backward, despotic country,” says Kiran Jonalgadda, founder of HasGeek and a social technologist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Director of the Centre for Internet and Society, is of the view that this bill goes against the philosophy of Digital India and is regressive in nature. “It bears semblance to the conditions that prevailed in the License Raj. The bill is a clear over-reaction to legitimate security concerns. The government ought to encourage open mapping and should have limited the security restrictions to a set of officially declared security installations across India,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the government's motive may be in the best interest of maintaining national security in order to prevent the misuse of sensitive data, such stringent measures may hinder the operations of navigation services and other applications that rely on geospatial information, and it will be the smaller players who will be affected the most.  “Every map maker has to create different maps for different countries and hope they're not shown in the wrong country. Google Maps can afford to do this. OpenStreetMap and Wikipedia cannot. They will effectively become illegal,” adds Jonalgadda.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These stringent rules are not entirely unexpected and the government has cracked down on institutions in the past for ‘wrong’ geographical depiction of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government had taken harsh rebuke against Twitter earlier this year for showing parts of Jammu and Kashmir in Pakistan and China. In another such instance, Al Jazeera was &lt;a href="https://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=6&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0ahUKEwjM6KPHqcXMAhWCU44KHf8OA4IQFggyMAU&amp;amp;url=http%3A%2F%2Ftime.com%2F3832585%2Findia-al-jazeera-suspended-kashmir-dispute-maps%2F&amp;amp;usg=AFQjCNGPWa0itfyNDEj1z8povvwm_0CmqQ&amp;amp;bvm=bv.121421273,d.c2E"&gt;&lt;span&gt;banned &lt;/span&gt;&lt;/a&gt;from broadcasting by the Information and Broadcasting Ministry because of repeatedly using a wrong map of India and was accused of cartographic aggression. The RSS too carried an &lt;a href="http://timesofindia.indiatimes.com/india/RSS-mouthpiece-Organiser-apologizes-for-PoK-map-error/articleshow/46566185.cms" target="_blank"&gt;&lt;span&gt;inaccurate&lt;/span&gt;&lt;/a&gt; map of India (without some parts of Jammu and Kashmir) in its mouthpiece, Organiser and later apologised for its inadvertent error.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nikhil Pahwa of Medianama has an exhaustive explanation and critique of the bill, and tells you how you and your businesses will be affected if the law is enacted. Read his piece &lt;a href="http://www.medianama.com/2016/05/223-india-draft-mapping-bill/"&gt;&lt;span&gt;here&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here are his final comments from his piece, and they are pretty scathing.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;This looks like a policy made for policing Google maps that has ended up throwing out the baby with the bathwater.&lt;/p&gt;
&lt;p&gt;The people involved in drafting this have absolutely no clue about how users and businesses use geospatial data to make users lives easier, and how integral it is to every day life. Data is changing and increasing every single minute, and it is impossible to police it.&lt;/p&gt;
&lt;p&gt;Collection and dissemination of realtime data and its utility is what makes location information useful and special. This kills realtime information.&lt;/p&gt;
&lt;p&gt;It looks at location information from the myopic viewpoint of businesses and platforms, and ignores crowdsourced information, and indeed, independent crowdsourced maps.&lt;/p&gt;
&lt;p&gt;A separate policy regarding just security establishments and their removal from mapping information, as well as the depiction of national boundaries of India was all that is needed.&lt;/p&gt;
&lt;p&gt;It’s hypocritical of a government that promised “maximum governance, miminum governance” to try and enforce a License-raj.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, even as the government wishes to impose punitive measures on erring private bodies, government organisations will not be regulated by the Geospatial Information Regulation Bill.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-newsminute-may-6-2016-why-indias-attempt-to-polic-digital-maps-and-satellite-images-is-a-dumb-idea'&gt;https://cis-india.org/internet-governance/news/the-newsminute-may-6-2016-why-indias-attempt-to-polic-digital-maps-and-satellite-images-is-a-dumb-idea&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-05-08T13:05:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-may-8-2016-facebook-a-platform-with-little-less-sharing-of-personal-information">
    <title>Facebook: A Platform with Little Less Sharing of Personal Information</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-may-8-2016-facebook-a-platform-with-little-less-sharing-of-personal-information</link>
    <description>
        &lt;b&gt;As Facebook becomes less personal, what happens to digital friendship?&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/social/eye-2016-facebook-social-personal-information-digital-friendship-2789325/"&gt;published in the Indian Express&lt;/a&gt; on May 8, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://indianexpress.com/tag/facebook/"&gt;Facebook&lt;/a&gt; is worried. Even though usage is growing, something strange is happening on the social network. For the first time since it started its journey as a website to rate datable people on college campuses, to becoming the global reference point that defined friendship in the connected age, people are sharing less personal information on Facebook. For a social media network that positions itself largely as a space where our everyday, banal doings become newsworthy articulations, this is surprising news. But it is true. On Facebook, the traffic is high, but most of it is now sharing of external information. People are sharing links to news, to listicles, to videos, to blogs entries, to pictures and to information that they find interesting, but they are writing less and less about what it is that they are doing and feeling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ironically, this coincides with the latest change in Facebook’s “response” options, where the ubiquitous “Like” button can now expand to other emojis where you can also be appropriately angry, sad, surprised, or happy about the shared content. Even as Facebook is trying to get its users to qualify how they feel and give emotional value to their likes, people seem to be sharing even less of their private lives on Facebook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the key ways of understanding this drop in people sharing their personal information is through the concept of “context collapse”. It has been a concern since the first instances of disembodied digital communication. In our everyday life, we make sense of information based on the different contexts that surround us. The person who authors the information, the setting within which that information reaches us, the emotional state that we are in when encountering the information, our sense of where we are when processing it, and the preparedness we have for receiving this information are all crucial parameters by which we make sense of the meaning of the information and also our response to it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case of Facebook, the context within which information and transactions have made sense is “friendship”. The site’s USP was that you could bring in a variety of information, but you were always sharing it with friends. You could have a large audience, but this audience is formed of people you know, people you trust, people you add to your friend groups — there is a sense of intimacy, privacy, and casualness that marks the flow of information. You are able to talk, in an equal breath, about what you had for breakfast, your crush on a celebrity, your random acts of charity, and your strong political rant, one after the other, without requiring to think about what you are posting and how others will receive it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Facebook is not really a friendship platform. It is a company interested in selling our interactions and data to advertisers who can target us with content and information based on the patterns of our behaviour. To serve its advertisers better, Facebook started privileging “verified” information trying to ensure news and content producers higher attention and more eyeballs. This was further strengthened by their continued integration with third party vendors, who could push and pull information into the social world of Facebook, and is seen as one of the biggest reasons for this drop. Any newsfeed in the last few months has had equal amounts of professional and amateur content, leading to a context collapse, where you no longer feel like your Facebook feed is a private and intimate conversation with friends.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, Facebook’s expansive integration of its products —WhatsApp chats, Instagram updates, and Tumblr posts all can collapse into one — produced a confusing space where the personal information that you were once happy to share with your friends, is suddenly being shared along with news and information. Also, digital behaviour works on mirroring, and we often shape our updates to match what we see on our timelines. If we more and more see external content rather than personal statuses, we also start sharing more third party news and links, thus producing a domino effect of everybody shying away from extremely personal or intimate moments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook, for the millennials, has been the context within which friendship got structured. Its own transitions have now collapsed that context, leading people to think of it as a content aggregator. It is going to be interesting to see what happens to our digital friendships and networks if Facebook is no longer the space where they are housed.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-may-8-2016-facebook-a-platform-with-little-less-sharing-of-personal-information'&gt;https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-may-8-2016-facebook-a-platform-with-little-less-sharing-of-personal-information&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-06-05T02:38:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-issues-with-drm">
    <title>Privacy Issues with DRM</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-issues-with-drm</link>
    <description>
        &lt;b&gt;This post has been written by Jalaj Pandey interning at CIS. It elaborates upon the various privacy issues with the Digital Rights Management. The author talks about the various ways in which content producers use DRM as a tool to infringe the privacy of the end users. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Nehaa Chaudhari provided inputs and also edited the blog post. &lt;a href="https://cis-india.org/internet-governance/blog/privacy-issues-with-drm.docx" class="internal-link"&gt;Click to download the File&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p&gt;&lt;span&gt;The ubiquity of internet in today's world has made content and information sharing an easy task. &lt;/span&gt;&lt;a name="_ftnref1"&gt;&lt;/a&gt;&lt;span&gt; A certain media file can be shared and made public with hardly any technical obstacles. &lt;/span&gt;&lt;a name="_ftnref2"&gt;&lt;/a&gt;&lt;span&gt; Issues 	like hacking, unauthorized copying and publication, unlicensed usage have become concerns for content producers, who have employed Digital Rights 	Management (hereafter DRM) measures to address some of them.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Several instances of the online privacy intrusion by the content producers have been recorded.	&lt;a name="_ftnref3"&gt;&lt;/a&gt; In 	such a scenario the balancing the rights of the content producers and the end users becomes an important one. It is imperative to find a common ground to safeguard the interests of both the parties involved. In the recent past DRM has been receiving a lot of flak	&lt;a name="_ftnref4"&gt;&lt;/a&gt; because of the privacy issues contented by the users.	&lt;a name="_ftnref5"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the most rudimentary form privacy can be explained as any information about an individual which he/she does not want to be made public. It is important 	to mention that this information is seen from the perspective of an ordinary reasonable person. The UN Declaration of Human Rights, 1948, defines privacy as a fundamental right of every human.	&lt;a name="_ftnref6"&gt;&lt;/a&gt; The functioning of the DRM 	is based on restricting the usage or distribution of the content. Since this restriction is only possible after there is a formal identification of the end 	user,&lt;a name="_ftnref7"&gt;&lt;/a&gt; the content producers 	end up collecting information about the users. For example: a DRM for a music file might work in a manner where it can only be accessed by one computer from which the user accesses and registers for the first time.	&lt;a name="_ftnref8"&gt;&lt;/a&gt; DRMs initially identify the IP addresses of the system and make the file functioning on only that IP address.	&lt;a name="_ftnref9"&gt;&lt;/a&gt; In this way the producer ends up collecting information about the end user. Different DRM models take different ways to collect information of their user.	&lt;a name="_ftnref10"&gt;&lt;/a&gt; While collecting IP 	addresses&lt;a name="_ftnref11"&gt;&lt;/a&gt; in one of them the other way is tracking the user information via download,	&lt;a name="_ftnref12"&gt;&lt;/a&gt; browsing activities, 	subscription service,&lt;a name="_ftnref13"&gt;&lt;/a&gt; etc. 	The usage log of the users is generated and becomes a valuable asset to assess and predict the preferences of the users&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two contentions of privacy have been raised on the privacy issues of DRM -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a) What is the accountability of this process and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b) Whether it puts the content producers in a position where they can control the users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The information collected is under the control of content producers, who mostly store this information in the form database. BEUC (European Consumer 	Organization) claimed that the DRM systems technologically enable content providers to monitor private consumption of content, create reports of consumption, and profile users.	&lt;a name="_ftnref14"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The information is at the disposal of the content producers. An assessment of DRM applications under Canadian Privacy showed that the firms did not even recognise privacy issues of the customers as a priority.	&lt;a name="_ftnref15"&gt;&lt;/a&gt; In fact the firms failed to provide the information that was stored in their databases.	&lt;a name="_ftnref16"&gt;&lt;/a&gt; This gives an idea about 	the lack of transparency that exists in collecting the information about users. The question whether users are aware of what information is being collected 	and to what extent they are being tracked online remains unanswered. The CEN/ISSS (European Committee for Standardization/ Information Society Standardisation System) pointed out that DRMs have a large potential to transmit, generate personal information about users.	&lt;a name="_ftnref17"&gt;&lt;/a&gt; It has also been characterized by unprecedented levels of monitoring by various content producers.	&lt;a name="_ftnref18"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further the principled level argumentation to this is on lines of collection of information without any authentication from the user herself/himself. It is essential that if any information is collected or saved by the producers it should only be after taking consent of the user.	&lt;a name="_ftnref19"&gt;&lt;/a&gt; Surveillance and compelled disclosure of information about intellectual consumption threaten rights to personal integrity.	&lt;a name="_ftnref20"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;DRMs take away the anonymity of the consumption.	&lt;a name="_ftnref21"&gt;&lt;/a&gt; Since the producers can practically monitor the content usage of the user, this has led to wide scale of price discrimination.	&lt;a name="_ftnref22"&gt;&lt;/a&gt; This means that producers would monitor and assess the preferences	&lt;a name="_ftnref23"&gt;&lt;/a&gt; of the user and subsequently raise the prices of that particular class of products.	&lt;a name="_ftnref24"&gt;&lt;/a&gt; In the report of FIPR 	(Foundation of Information Policy and Research) it was found that Microsoft had been trying to implement their DRM systems in their products using a similar approach to gain a monopoly position as in their strategy of browser implementation.	&lt;a name="_ftnref25"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 	&lt;strong&gt; Sony BMG copy protection rootkit scandal		&lt;a name="_ftnref26"&gt;&lt;/a&gt; &lt;/strong&gt; in 2005 brought much criticism to DRM. It was found out that Sony BMG had introduced illegal and harmful copy protection measure in its CDs. The rootkit 	element of the software is used to hide virtually all traces of the copy protection software's presence on a PC, so that an ordinary computer user would 	have no way to find it. Further more than just the DRM part of it the software also made the user's system open to a number of malwares and created 	vulnerabilities in the system. Sony was eventually made to compensate consumer costs, etc on the same. However the question of whether the database in the hands of companies can be used in arbitrary manner was intensely discussed after this.	&lt;a name="_ftnref27"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is essential that an effective framework is brought into effect which caters to privacy interests of the users. Privacy is the basic human right and it 	is the onus of the State to protect and safeguard this right. It is essential that the State does not compromise and support mechanisms which promote the 	welfare of the content producers over the users. The balance of users and producers becomes all the more important in a developing country like ours. The 	lack the awareness and the knowledge coupled with increasing usage of internet can lead to the exploitation of many. It is essential that the States see 	through these problems and collectively find an all encompassing solution to it.&lt;/p&gt;
&lt;div&gt;&lt;br clear="all" /&gt; 
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1"&gt;&lt;/a&gt; K. G. Coffman and A. M. Odlyzko, Growth of the Internet, AT&amp;amp;T Labs - Research, July 6, 2001, available at, (			&lt;a href="http://www.dtc.umn.edu/~odlyzko/doc/oft.internet.growth.pdf"&gt;www.dtc.umn.edu/~odlyzko//doc/oft.internet.growth.pdf&lt;/a&gt;) (hereinafter 			Growth).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2"&gt;&lt;/a&gt; The Daily Source, The Growing Impact of the Internet, April 4, 2016, available at (https://www.dailysource.org/about/impact).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3"&gt;&lt;/a&gt; Corryne Mcsherry, Adobe Spyware Reveals (Again) The Price Of DRM: Your Privacy And Security, Electronic Frontier Foundation, October 17, 2014, 			available at,&lt;/p&gt;
&lt;p&gt;(https://www.eff.org/deeplinks/2014/10/adobe-spyware-reveals-again-price-drm-your-privacy-and-security).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;&lt;/a&gt; Digital Rights Management: A failure in the developed world, a danger to the developing world, Electronic Frontier Foundation, March 23, 2005, 			available at,&lt;/p&gt;
&lt;p&gt;(https://www.eff.org/wp/digital-rights-management-failure-developed-world-danger-developing-world).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5"&gt;&lt;/a&gt; R. Subramanya and Byung k. Yi, Digital Rights Management, available at, (			&lt;a href="https://www.academia.edu/8054608/Digital_Rights_Management"&gt;https://www.academia.edu/8054608/Digital_Rights_Management&lt;/a&gt;) (hereinafter 			Digital Rights Management).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6"&gt;&lt;/a&gt; Global internet liberty campaign, privacy and human rights, An International Survey of Privacy Laws and Practice, available at, 			(http://gilc.org/privacy/survey/intro.html).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7"&gt;&lt;/a&gt; Ann Cavoukian, Privacy and Digital Rights Management (DRM): An Oxymoron, Information and Privacy Commissioner Ontario, available at, (			&lt;cite&gt;https://www.ipc.on.ca/images/Resources/up-1&lt;/cite&gt;&lt;strong&gt;drm&lt;/strong&gt;&lt;cite&gt;.pdf&lt;/cite&gt; ) (hereinafter Oxymoron)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a name="_ftn8"&gt;&lt;/a&gt; Varian, H.R. (1985) 'Price discrimination and social welfare', American Economic Review, Vol. 75, available at, 			(http://www.economics-ejournal.org/economics/journalarticles/2007-1/references/Varian1985).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a name="_ftn9"&gt;&lt;/a&gt; Privacy and Digital Rights Management,A position paper for the W3C workshop on Digital Rights Management, January 2001, available at, (			&lt;cite&gt;www.w3.org/2000/12/drm-ws/pp/hp-poorvi.html&lt;/cite&gt;&lt;cite&gt;)&lt;/cite&gt;&lt;cite&gt;.&lt;/cite&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a name="_ftn10"&gt;&lt;/a&gt; Growth supra note, 1.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a name="_ftn11"&gt;&lt;/a&gt; Digital Rights Management supra note, 5.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a name="_ftn12"&gt;&lt;/a&gt; Thierry Rayna, Privacy or piracy, why choose? Two solutions to the issues of digital rights management and the protection of personal information, 			Intellectual Property Management, Vol. X, No. Y, available at,&lt;/p&gt;
&lt;p&gt;(www.inderscienceonline.com/doi/abs/10.1504/IJIPM.2008.021138).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a name="_ftn13"&gt;&lt;/a&gt; Oxymoron supra note, 7.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a name="_ftn14"&gt;&lt;/a&gt; BEUC, Consumentenbond, and CLCV at DRM Working Group 1 (2002), available at, (&lt;cite&gt;https://privacy.org.nz/assets/Files/4558510.pdf).&lt;/cite&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a name="_ftn15"&gt;&lt;/a&gt; Natali Helberger and Kristo´f Ker´enyi and Bettina Krings, Digital Rights Management and Consumer Acceptability: A Multi-Disciplinary 			Discussion of Consumer Concerns and Expectations, available at (citeseerx.ist.psu.edu/showciting?cid=733532).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a name="_ftn16"&gt;&lt;/a&gt; Knud Bohle, Indicare, Research into unfriendly DRM : A Review, December, 2004,available at, (citeseerx.ist.psu.edu/showciting?cid=733532) 			(hereinafter Indicare).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a name="_ftn17"&gt;&lt;/a&gt; European Committee for Standardization/Information Society Standardisation System (CEN/ISSS) DRM Report, 2003.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a name="_ftn18"&gt;&lt;/a&gt; Indicare supra note, 16.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a name="_ftn19"&gt;&lt;/a&gt; News Release, "Forrester Technographics Finds Online Consumers Fearful of Privacy Violations" (October 27, 1999 available at, 			(www.forrester.com/ER/Press/Release/0,1769,177,FF.html).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a name="_ftn20"&gt;&lt;/a&gt; Julia E. Cohen, Georgetown Law Faculty Publications, DRM and Privacy, January 2010, available at,&lt;/p&gt;
&lt;p&gt;(https://www.academia.edu/2164013/DRM_and_Privacy).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a name="_ftn21"&gt;&lt;/a&gt; Thierry Rayna, Privacy or piracy, why choose? Two solutions to the issues of digital rights management and the protection of personal information, Intellectual Property Management, available at, (			&lt;a href="http://www.inderscienceonline.com/doi/abs/10.1504/IJIPM.2008.021138"&gt;www.inderscienceonline.com/doi/abs/10.1504/IJIPM.2008.021138&lt;/a&gt;) 			(hereinafter Privacy or piracy).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a name="_ftn22"&gt;&lt;/a&gt; Moe, W. and Fader, P. (2004) 'Dynamic conversion behavior at e-commerce sites', Management Science, Vol. 50, available at,&lt;/p&gt;
&lt;p&gt;(https://www.researchgate.net/publication/227447618_Dynamic_Conversion_Behavior_at_E-Commerce_Sites).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a name="_ftn23"&gt;&lt;/a&gt; Privacy or piracy supra note, 21.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a name="_ftn24"&gt;&lt;/a&gt; Sismeiro, C. and Bucklin, R. (2004) 'Modeling purchase behavior at an e-commerce web site: a task completion approach', Journal of Marketing 			Research, available at, (&lt;cite&gt;citeseerx.ist.psu.edu/showciting?cid=906878&lt;/cite&gt;&lt;cite&gt;).&lt;/cite&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a name="_ftn25"&gt;&lt;/a&gt; Ross Anderson, Foundation of Information Policy and Research Consultation Response to DRM (2004), available at, (&lt;cite&gt;www.&lt;/cite&gt; &lt;strong&gt;fipr&lt;/strong&gt;&lt;cite&gt;.org/APIG_&lt;/cite&gt;&lt;strong&gt;DRM&lt;/strong&gt;&lt;cite&gt;_submission&lt;/cite&gt;&lt;cite&gt;.pdf&lt;/cite&gt;).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a name="_ftn26"&gt;&lt;/a&gt; Otto Helweg, Sony, Rootkits and Digital Rights Management Gone Too Far, Oct, Oct. 31, 2014, available at 			(https://blogs.technet.microsoft.com/markrussinovich/2005/10/31).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn27"&gt;&lt;/a&gt; Sony BMG Litigation Info, Electronic Frontier Foundation, available at, (https://www.eff.org/cases/sony-bmg-litigation-info).&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-issues-with-drm'&gt;https://cis-india.org/internet-governance/blog/privacy-issues-with-drm&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Jalaj Pandey</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-05-03T02:41:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/april-2016-newsletter">
    <title>April 2016 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/april-2016-newsletter</link>
    <description>
        &lt;b&gt;Welcome to the CIS newsletter for April 2016. The key issues we worked on this month included the Aadhaar Act 2016, Standard Essential Patents, cyber security of smart grids, and involvement of international agencies in the smart cities project in India.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;Early last year, thanks to the fund raising efforts of a friend of CIS - Suhail Kazi, we received Rs. 1.9 lakhs as donations from 19 individuals. In January this year, we set up an online giving feature on our website which would ease the donation process, but we haven’t got a single donation so far! This could be because many of you may be under a false impression that CIS is very wealthy and does not need more support. Unfortunately, this is no longer true. Today, we are unable to find a single donor who is interested in our Accessibility, Telecom, or RAW programmes. In other words, we need your support. Would you to consider making a small donation to CIS? &lt;strong&gt;Click &lt;a href="http://imojo.in/CISDonations"&gt;here&lt;/a&gt; to donate.&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Previous issues of the newsletters can be accessed here: &lt;a href="http://cis-india.org/about/newsletters"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify;" /&gt;
&lt;table style="text-align: justify;" class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;CIS prepared an &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq"&gt;FAQ on the Aadhaar / UIDAI project&lt;/a&gt; and the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. Further, two infographics were produced to highlight on the questions of "&lt;a href="http://cis-india.org/internet-governance/blog/can-the-aadhaar-act-2016-be-classified-as-a-money-bill"&gt;Can the Aadhaar Act 2016 be Classified as a Money Bill?&lt;/a&gt;" and "&lt;a href="http://cis-india.org/internet-governance/blog/can-matters-dealt-with-in-aadhaar-act-be-objects-of-money-bill"&gt;Can the Matters Dealt with in the Aadhaar Act be the Objects of a Money Bill?&lt;/a&gt;".&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;NVDA team &lt;a class="external-link" href="http://cis-india.org/accessibility/blog/april-2016-report/view"&gt;prepared a report&lt;/a&gt; on the progress of the project for the month of&amp;nbsp;April 2016.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;CIS submitted its &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/comments-on-department-of-industrial-policy-and-promotion-discussion-paper-on-standard-essential-patents-and-their-availability-on-frand-terms"&gt;comments to the Department of Industrial Policy and Promotion's Discussion Paper&lt;/a&gt; on Standard Essential Patents and their Availability on FRAND Terms. CIS has offered its assistance on other matters aimed at developing a suitable policy framework for SEPs and FRAND in India, and, working towards the sustained innovation, manufacture and availability of mobile technologies in India. A summary of the comments can be &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/summary-of-cis-comments-to-dipp2019s-discussion-paper-on-seps-and-their-availability-on-frand-terms"&gt;accessed here&lt;/a&gt;. Responses to the Discussion Paper is &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/responses-to-the-dipps-discussion-paper-on-seps-and-their-availability-on-frand-terms"&gt;available here&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Rohini Lakshané's paper titled &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/patents-and-mobile-devices-in-india-an-empirical-survey"&gt;Patents and Mobile Devices in India: An Empirical Survey&lt;/a&gt; has been accepted for publication by the Vanderbilt Journal of Transnational Law.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Kiran A.B. in a &lt;a class="external-link" href="http://cis-india.org/openness/monitoring-sustainable-development-goals-in-india-availability-and-openness-02"&gt;blog post has documented the availability and openness of data sets in India&lt;/a&gt; that are relevant for monitoring the targets under the SDGs.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Low-cost Aakash tablet and its previous iterations in India have gone through several phases of technological changes and ideological experiments wrote Sumandro Chattapadhyay and Jahnavi Phalkey &lt;a class="external-link" href="http://cis-india.org/raw/buying-into-the-aakash-dream"&gt;in an article published in the Economic and Political Weekly&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;-----------------------------------&amp;nbsp;&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/news"&gt;CIS in the News&lt;/a&gt;&lt;br /&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CIS gave inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/daily-mail-april-4-2016-afp-india-biometric-database-crosses-billion-member-mark"&gt;India's biometric database crosses billion-member mark&lt;/a&gt;&amp;nbsp;(AFP and Daily Mail, UK; April 4, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/big-news-network-april-6-2016-claire-lauterbach-panama-papers-and-question-of-privacy"&gt;The Panama Papers and the question of privacy&lt;/a&gt;&amp;nbsp;(Big News Network; April 6, 2016). This was originally published by Privacyinternational.org.&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/economic-times-april-8-2016-neha-alawadhi-daunting-task-ahead-for-investigative-agencies-with-whatsapp-end-to-end-encryption"&gt;Daunting task ahead for investigative agencies with WhatsApp's end-to-end encryption&lt;/a&gt;&amp;nbsp;(Neha Alawadhi; Economic Times; April 8, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-hindu-april-10-2016-somesh-jha-pmo-no-to-smart-cards-insists-aadhaar"&gt;PMO’s no to smart cards, insists on Aadhaar&lt;/a&gt;&amp;nbsp;(Somesh Jha; Hindu; April 10, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-telegraph-april-10-2016-2014-showed-the-power-of-twitter"&gt;2014 showed the power of Twitter, now every Indian politician wants a handle&lt;/a&gt;&amp;nbsp;(T.V. Jayan, Smitha Verma,Sonia Sarkar and V. Kumara Swamy; Telegraph; April 10, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-alnoor-peermohamed-april-13-2016-why-is-uidai-cracking-down-on-individuals-that-hoard-aadhaar-data"&gt;Why is the UIDAI cracking down on individuals that hoard Aadhaar data?&lt;/a&gt;&amp;nbsp;(Alnoor Peermohamed; Business Standard; April 13, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/governance-now-april-19-2016-you-will-need-a-license-to-create-whatsapp-group-in-kashmir"&gt;You will need a license to create a WhatsApp group in Kashmir&lt;/a&gt;&amp;nbsp;(Governance Now; April 19, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/governance-now-april-23-2016-taru-bhatia-will-facebook-twitter-relocate-servers-to-india"&gt;Will Facebook, Twitter relocate servers to India?&lt;/a&gt;&amp;nbsp;(Taru Bhatia; Governance Now; April 23, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/dna-amrita-madhukalya-april-23-2016-government-keeps-experts-out-of-cyber-security-discussions"&gt;Government keeps experts out of cyber security discussions&lt;/a&gt;&amp;nbsp;(Amrita Madhukalya; DNA; April 23, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-times-of-india-raj-shekhar-arun-dev-v-narayan-a-selvaraj-cctv-plays-sherlock"&gt;CCTV plays Sherlock&lt;/a&gt;&amp;nbsp;(Raj Shekhar, Arun Dev, V Narayan &amp;amp; A Selvaraj with inputs from Sindhu Kannan and Somreet Bhattacharya; The Times of India; April 24, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;CIS members wrote the following pieces:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;&lt;li style="text-align: justify;"&gt;Sunil Abraham wrote an&amp;nbsp;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/frontline-april-15-2016-sunil-abraham-surveillance-project"&gt;article in the July 15 edition of Frontline&lt;/a&gt;&amp;nbsp;arguing that the Aadhaar project’s technological design and architecture is an unmitigated disaster and no amount of legal fixes in the Act will make it any better.&amp;nbsp;&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Amber Sinha wrote an article in The Wire arguing that&amp;nbsp;&lt;a href="http://cis-india.org/internet-governance/blog/the-aadhaar-act-is-not-a-money-bill"&gt;the Aaddhaar Act is not a money bill&lt;/a&gt;, and the Supreme Court may very well question the decision by the Lok Sabha speaker to classify it as such.&amp;nbsp;&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Sumandro Chattapadhyay also wrote on The Wire arguing that "&lt;a href="http://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system"&gt;the last chance for a welfare state doesn’t rest in the Aadhaar system&lt;/a&gt;."&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Subhashish Panigrahi's article on the&amp;nbsp;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/global-voices-april-27-2016-subhashish-panigrahi-eight-challenges-indian-language-wikipedias-need-to-overcome"&gt;8 challenges that Indian language Wikipedias have to overcome was published by Global Voices&lt;/a&gt;. The article had&amp;nbsp;earlier been&amp;nbsp;published in the Wire.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Elonnai Hickok and Vanya Rakesh co-authored an article on&amp;nbsp;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india"&gt;Cyber Security of Smart Grids in India&lt;/a&gt;&amp;nbsp;that was published by Dataquest.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Shyam Ponappa&amp;nbsp;&lt;a class="external-link" href="http://cis-india.org/telecom/blog/business-standard-april-6-2016-shyam-ponappa-breakthroughs-needed-for-digital-india"&gt;in his monthly column&lt;/a&gt;&amp;nbsp;published in the Business Standard tell us that it's time the government accepts that current policies are not enough to bring about Digital India.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;-------------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility &amp;amp; Inclusion&lt;/a&gt; &lt;br /&gt; ------------------------------------- 	&lt;br /&gt; India has an estimated 70 million persons with disabilities who don't have access to read printed materials due to some form of physical, sensory, 	cognitive or other disability. As part of our endeavour to make available accessible content for persons with disabilities, we are developing a text-to-speech software in 15 languages with support from the Hans Foundation. The progress made so far in the project can be accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;►NVDA and eSpeak&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/march-2016-report.pdf/view"&gt;March 2016 Report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/april-2016-report" class="internal-link"&gt;April 2016 Report&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- 	&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- 	&lt;/strong&gt;&lt;br /&gt;Our Access to Knowledge programme currently consists of two projects. The Pervasive Technologies project, conducted under a grant from the International Development Research Centre (IDRC), aims to conduct research on the complex interplay between low-cost pervasive technologies and intellectual property, in order to encourage the proliferation and development of such technologies as a social good. The Wikipedia project, which is under a 	grant from the Wikimedia Foundation, is for the growth of Indic language communities and projects by designing community collaborations and partnerships 	that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;►Pervasive Technologies&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/comments-on-department-of-industrial-policy-and-promotion-discussion-paper-on-standard-essential-patents-and-their-availability-on-frand-terms"&gt;Comments on Department of Industrial Policy and Promotion Discussion Paper on Standard Essential Patents and their Availability on Frand Terms&lt;/a&gt; (Anubha Sinha, Nehaa Chaudhari and Rohini Lakshané; April 23, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/responses-to-the-dipps-discussion-paper-on-seps-and-their-availability-on-frand-terms"&gt;Responses to the DIPP's Discussion Paper on SEPs and their Availability on FRAND Terms&lt;/a&gt; (Anubha Sinha, Nehaa Chaudhari and Rohini Lakshané; April 23, 2016).&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste"&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/summary-of-cis-comments-to-dipp2019s-discussion-paper-on-seps-and-their-availability-on-frand-terms"&gt;Summary of CIS Comments to DIPP’s Discussion Paper on SEPs and their availability on FRAND terms&lt;/a&gt; (Anubha Sinha; April 26, 2016).&lt;/div&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/global-congress-2015"&gt;Global Congress 2015 - A Collection of Resources&lt;/a&gt; (Pervasive Technologies Team; April 1, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/compilation-of-mobile-phone-patent-litigation-cases-in-india"&gt;Compilation of Mobile Phone Patent Litigation Cases in India&lt;/a&gt; (Rohini Lakshané; updated on April 15, 2016). &lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/joining-the-dots-in-indias-big-ticket-mobile-phone-patent-litigation"&gt;Joining the Dots in India's Big-Ticket Mobile Phone Patent Litigation&lt;/a&gt; (Rohini Lakshané; updated on April 29, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-tezpur-university"&gt;MHRD IPR Chair Series: Information Received from Tezpur University&lt;/a&gt; (Karan Tripathi; April 26, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/sectoral-innovation-councils-on-intellectual-property-rights-2013-rti-requests-dipp-responses"&gt;National IPR Policy Series : Sectoral Innovation Councils on Intellectual Property Rights – RTI Requests + DIPP Responses&lt;/a&gt; (Nehaa Chaudhari and Saahil Dama; April 30, 2016). Nisha S. Kumar assisted in compilation of the document.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Participation in Events&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/fifth-annual-ip-teaching-workshop"&gt;Fifth Annual IP Teaching Workshop&lt;/a&gt; (Organised by the Centre for Innovation, Intellectual Property and Competition at National Law University Delhi in association with National Academy of Law Teaching, NLU-D; Delhi; March 31 and April 1, 2016). Nehaa Chaudhari was a speaker.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/first-round-table-on-innovation-ip-and-competition"&gt;First Round-table on Innovation, IP and Competition&lt;/a&gt; (Organized by the Centre for Innovation, Intellectual Property &amp;amp; Competition (CIIPC) at the National Law University, Delhi; India Habitat Centre; New Delhi; April 1-2, 2016). Nehaa Chaudhari and Anubha Sinha attended the round-table.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/brainstorming-workshop-on-pg-programme-on-media-studies-for-ugc-e-pathshala-programme"&gt;Brainstorming Workshop on PG Programme on Media Studies for UGC E-Pathshala Programme&lt;/a&gt; (Organized by Jamia Milla Islamia; New Delhi; April 5, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/sensitization-seminar-on-ipr-for-electronics-ict-sectors"&gt;Sensitization Seminar on IPR for Electronics &amp;amp; ICT Sectors&lt;/a&gt; (Organized by&amp;nbsp;Andhra Pradesh Technology Development &amp;amp; Promotion Centre (APTDC) of Confederation of Indian Industry (CII), in association with Department of Electronics and Information Technology (DeitY); Vishakhapatnam; April 21, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Work Plan&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017"&gt;CIS - A2K Work Plan: July 2016 - June 2017&lt;/a&gt; (CIS-A2K Team; April 2, 2016): We have revised the work plan template taking into account the changed proposal plan sent out by WMF and in light of the feedback that we have received from FDC assessment during last proposal application. The FDC feedback is taken into account at the level of design, RoI and ensuring quality for all our activities.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Article&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/global-voices-april-27-2016-subhashish-panigrahi-eight-challenges-indian-language-wikipedias-need-to-overcome"&gt;Eight Challenges Indian-Language Wikipedias Need to Overcome&lt;/a&gt; (Subhashish Panigrahi; Global Voices; April 21, 2016). &lt;strong&gt; &lt;/strong&gt;&lt;strong&gt;&lt;a href="http://thewire.in/2016/03/17/eight-challenges-that-indian-language-wikipedias-need-to-overcome-25062/" target="_blank"&gt;&lt;strong&gt;A version of this post&lt;/strong&gt;&lt;/a&gt;&lt;/strong&gt;&lt;strong&gt; was previously published on &lt;/strong&gt;&lt;strong&gt;&lt;a href="http://thewire.in/" target="_blank"&gt;&lt;strong&gt;The Wire&lt;/strong&gt;&lt;/a&gt;&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Media Coverage&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/the-telegraph-april-7-2016-anwesha-ambaly-odia-gets-more-space-in-e-world"&gt;Odia gets more space in e-world&lt;/a&gt; (Anwesha Ambaly; The Telegraph; April 7, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/exercise-to-correct-articles-in-tulu-wikipedia-begins"&gt;Exercise to Correct articles in Tulu Wikipedia begins&lt;/a&gt; (Raviprasad Kamila; The Hindu; April 28, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Event Organized&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/events/tulu-wikipedia-editathon-to-improve-quality-of-articles-in-tulu-wikipedia"&gt;Tulu Wikipedia Editathon to Improve Quality of Articles in Tulu Wikipedia&lt;/a&gt; (Shri Ramakrishna PU College; Mangaluru; April 26 - 30, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;span style="text-align: justify;"&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;a style="text-align: justify;" href="http://cis-india.org/openness"&gt;Openness&lt;br /&gt;&lt;/a&gt;&lt;span style="text-align: justify;"&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;Our work in the Openness programme focuses on open data, especially open government data, open access, open education resources, open knowledge in Indic languages, open media, and open technologies and standards - hardware and software. We approach openness as a cross-cutting principle for knowledge production and distribution, and not as a thing-in-itself.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/monitoring-sustainable-development-goals-in-india-availability-and-openness-02"&gt;Monitoring Sustainable Development Goals in India: Availability and Openness of Data&lt;/a&gt; (Part II) (Kiran A.B.; April 12, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- 	&lt;/strong&gt;&lt;br /&gt; &lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; -----------------------------------&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;►Cyber Security&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india"&gt;Cyber Security of Smart Grids in India&lt;/a&gt; (Elonnai Hickok and Vanya Rakesh; April 25, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;►Big Data&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;Blog Entry&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/rti-on-smart-cities-mission-in-india"&gt;RTI regarding Smart Cities Mission in India&lt;/a&gt; (Paul Thottan; April 21, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;►Privacy&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq"&gt;FAQ on the Aadhaar Project and the Bill&lt;/a&gt; (Elonnai Hickok, Vanya Rakesh, and Vipul Kharbanda; April 13, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india"&gt;Aadhaar Act and its Non-compliance with Data Protection Law in India&lt;/a&gt; (Vanya Rakesh; April 14, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/can-matters-dealt-with-in-aadhaar-act-be-objects-of-money-bill"&gt;Can the Matters Dealt with in the Aadhaar Act be the Objects of a Money Bill?&lt;/a&gt; (Pooja Saxena; April 24, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Articles&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-quint-march-31-2016-nehaa-chaudhari-will-aadhaar-act-address-indias-dire-need-for-a-privacy-law"&gt;Will Aadhaar Act Address India’s Dire Need For a Privacy Law?&lt;/a&gt; (Nehaa Chaudhari; Quint; March 31, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system"&gt;The Last Chance for a Welfare State Doesn’t Rest in the Aadhaar System&lt;/a&gt; (Sumandro Chattapadhyay; April 19, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-aadhaar-act-is-not-a-money-bill"&gt;The Aadhaar Act is Not a Money Bill&lt;/a&gt; (Amber Sinha; April 25, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Participation in Events&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/rightscon-silicon-valley-2016"&gt;RightsCon Silicon Valley 2016&lt;/a&gt; (Organized by RightsCon; March 31 and April 1, 2016). Elonnai Hickok attended the event.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/panel-discussion-on-uid-aadhar-act-2016-and-its-impact-on-social-security"&gt;Panel Discussion on UID/ Aadhar act 2016 and its impact on Social, Security&lt;/a&gt; (Organized by Students Christian Movement of India at SCM House; Bangalore; April 25, 2016). Sunil Abraham was a panelist.&lt;/li&gt;
&lt;li&gt;The Centre for the Study of Law and Governance (CSLG), Jawaharlal Nehru University (JNU), organised a &lt;a href="http://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016"&gt;roundtable discussion on Tuesday, April 26&lt;/a&gt;, to discuss the Aadhaar project and Act. Along with Prasanna S, Apar Gupta, and Dr. Chirashree Dasgupta, Sumandro Chattapadhyay was one of the discussants.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/aadhaar-by-numbers"&gt;Aadhaar by Numbers&lt;/a&gt; (Organized by National Institute of Public Finance and Policy; New Delhi; April 29, 2016). Sunil Abraham was a speaker.&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- 	&lt;br /&gt;&lt;/strong&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; CIS is involved in promoting access and accessibility to telecommunications services and resources, and has provided inputs to ongoing policy discussions 	and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities 	and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;Article&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/telecom/blog/business-standard-april-6-2016-shyam-ponappa-breakthroughs-needed-for-digital-india"&gt;Breakthroughs Needed For Digital India&lt;/a&gt; (Shyam Ponappa; Business Standard; April 6, 2016 and Organizing India BlogSpot; April 7, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- 	&lt;br /&gt;&lt;/strong&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of 	social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual 	accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Article&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/buying-into-the-aakash-dream"&gt;Buying into the Aakash Dream - A Tablet’s Tale of Mass Education&lt;/a&gt; (Sumandro Chattapadhyay and Jahnavi Phalkey; Economic &amp;amp; Political Weekly; April 23, 2016). &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;Announcement&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/jobs/call-for-proposal-big-data-for-development-field-studies"&gt;Call for Proposal: Big Data for Development – Initial Field Studies&lt;/a&gt; (Sumandro Chattapadhyay; April 29, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;----------------------------------- 	&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from 	policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual 	property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), 	internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations 	of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt; Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Support Us&lt;/p&gt;
&lt;div&gt;
&lt;div style="text-align: justify;"&gt;Please help us defend consumer and citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 	194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Request for Collaboration&lt;/p&gt;
&lt;div&gt;
&lt;div style="text-align: justify;"&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet 	and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at 	sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an 	indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, 	write to Tanveer Hasan, Programme Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;em&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and 	support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans 	Foundation, MacArthur Foundation, and IDRC for funding its various projects&lt;/em&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/april-2016-newsletter'&gt;https://cis-india.org/about/newsletters/april-2016-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2016-05-10T06:26:09Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/panel-discussion-on-uid-aadhar-act-2016-and-its-impact-on-social-security">
    <title>Panel Discussion on UID/ Aadhar act 2016 and its impact on Social, Security </title>
    <link>https://cis-india.org/internet-governance/news/panel-discussion-on-uid-aadhar-act-2016-and-its-impact-on-social-security</link>
    <description>
        &lt;b&gt;Sunil Abraham was a speaker at this event organized by Students Christian Movement of India at SCM House in Bangalore on April 25, 2016. Mathew Thomas and Usha Ramanathan also gave talks.&lt;/b&gt;
        &lt;p&gt;With the passage of the Aadhaar act 2016 is UID / Aadhar mandatory now? How do we understand the issue of Social Security in the context of the new law? What does it mean for those who need to access their senior citizen pension, rations, school and college scholarships, etc.&lt;/p&gt;
&lt;p&gt;How does one understand the money bill route for introducing the bill in Parliament? What are implications of this for the validity of the law?&lt;/p&gt;
&lt;p&gt;What will happen to the court cases challenging the UID now?&lt;/p&gt;
&lt;p&gt;Where are we now on the thorny issues of surveillance, tracking, profiling, biometrics, private and foreign companies and subsidy? What does the law say?&lt;/p&gt;
&lt;p&gt;This discussion will revisit the debates around the UID and examine the implications of the new law.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/panel-discussion-on-uid-aadhar-act-2016-and-its-impact-on-social-security'&gt;https://cis-india.org/internet-governance/news/panel-discussion-on-uid-aadhar-act-2016-and-its-impact-on-social-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-04-28T17:02:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india">
    <title>Cyber Security of Smart Grids in India</title>
    <link>https://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india</link>
    <description>
        &lt;b&gt;An integral component of the ambitious flagship programme of the Indian Government- Digital India, which paves way for a digital data avalanche in the country, is a well-designed digital infrastructure ensuring high connectivity and integration of services, the potential areas being smart cities, smart homes, smart energy and smart grids, to list a few. Likewise, the 100 Smart Cities Mission envisions changing the face of urbanization in India, to manage the exponential growth of population in the cities by creating smart cities with ICT driven solutions, along with big data analytics. Smart grid technologies are key for both these schemes.&lt;/b&gt;
        &lt;p&gt;The article by Elonnai Hickok and Vanya Rakesh was published by &lt;a class="external-link" href="http://www.dqindia.com/cyber-security-of-smart-grids-in-india/"&gt;Dataquest&lt;/a&gt; on April 25, 2016&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Smart grid is a promising power delivery infrastructure integrated with communication and information technologies which enables monitoring, prediction and management of energy usages. Establishment of smart grids becomes highly important for the Indian economy, as the present grid losses are one of the highest in the world at upto 50% and costing India upto 1.5% of its GDP. India operates one of the largest synchronous grids in the world – covering an area of over 3 million sq km, 260 GW capacity and over 200 million customers with the estimated demand of India increasing 4 times by the year 2032.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the year 2013, the Ministry of Power (MoP), in consultation with India Smart Grid Forum and India Smart Grid Task Force released a smart grid vision and roadmap for India, a key policy document aligned to MoP’s overarching objectives of “Access, Availability and Affordability of Power for All”. It lays plans for a framework to address cyber security concerns in smart grids as well. To achieve goals envisaged in the roadmap, the Government of India established the National Smart Grid Mission in the year 2015 for planning, monitoring and implementation of policies and programs related to Smart Grid activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A number of smart grid projects have been introduced, and are currently underway. KEPCO in Kerala has established smart meter/intelligent power transmission and distribution equipment system in the year 2011 and the smart grid operations focus on peak reduction, load standardization, reduction in power transmission/distribution loss, response to new/renewable energy and reduction in black-out time. Gujarat was introduced to India’s first modernized electrical grid in the year 2014, to study consumer behaviour of electricity usage and propose a tariff structure based on usage and load on the power utility by installing new meters embedded with SIM card to monitor the data. The Bangalore Electricity Supply Company Ltd. (BESCOM) project in Bangalore envisaged the Smart Grid Pilot Project for integration of renewable and distributed energy resources into the grid, which is vital to meet growing electricity demands of the country, curb power losses, and enhance accessibility to quality power.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Cybersecurity challenges&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;At the same time, the introduction of a smart grid brings with it certain security risks and concerns, particularly to a nation’s cyber security. Increased interconnection and integration may render the grids vulnerable to cyber threats, putting stored data and computers at great risk.With sufficient cyber security measures, policies and framework in place, a Smart Grid can be made more efficient, reliable and secure as failure to address these problems will hinder the modernization of the existing power system. Smart Grids, comprising of numerous communication, intelligent, monitoring and electrical elements employed in power grid, have a greater exposure to cyber-attacks that can potentially disrupt power supply in a city.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;Cyber security and data privacy are some of the key challenges for smart grids in India, as establishment of digital electricity infrastructure entails the challenge of communication security and data management. Digital network and systems are highly prone to malicious attacks from hackers which can lead to misutilisation of consumers’ data, making cyber security the key issue to be addressed. Vulnerabilities allow an attacker to break a system, corrupt user privacy, acquire unauthorized access to control the software, and modify load conditions to destabilize the grid. Hackers or attackers, who compromise a smart meter can immediately alter their energy costs or change generated energy meter readings to monetize it by help of remote PCs. Also, inserting false information could mislead the electric utility into making incorrect decisions about the local usage and capacity.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;h3 style="text-align: justify; "&gt;Initiatives in India&lt;/h3&gt;
&lt;div style="text-align: justify; "&gt;As cybersecurity is critical for Digital India and the Smart City Concept note highlights a smart grid to be resilient to cyber attacks, a National Cyber Coordination Centre is being established by the Indian Government. Also, National Cyber Safety and Security Standards has been started with a vision to safeguard the nation from the current threats in the cyberspace, undertaking research to understand the nature of cyber threats and Cyber Crimes by facilitating a common platform where experts shall provide an effective solution for the complex and alarming problems in the society towards cyber security domain. Innovative strategies and compliance procedures are being developed to curb the increasing complexity of the Global Cyber Threats faced by countries at large.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The National Cyber Security Policy 2013 was released with an umbrella framework for providing guidance for actions related to security of cyberspace, by the Department of Electronics and Information Technology (DeitY). The Working Group on Information Technology established under the Planning Commission has also published a 12 year plan on IT development in India with a road map for cyber security, stating six key priority and focus areas for cyber security including:Enabling Legal Framework ; Security Policy, Compliance and Assurance; Security R&amp;amp;D; Security Incident – Early Warning and Response ; Security awareness, skill development and training, and Collaboration.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;In case of Bangalore, to ensure smooth implementation of BESCOM’s vision, the company realised the need to put a cyber-security system in place to protect the smart grid installations in Bangalore city. To ensure security, BESCOM has come out with a separate IT security policy and dedicated trained IT cadre to safeguard its data and servers, becoming one of the few Discoms in India to take such measures for safeguarding the servers and data network from cyber crimes and threats.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Way forward&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;An electric system like Smart grids has enormous and far-reaching economic and social benefits. However, increased interconnection and integration tends to introduce cyber-vulnerabilities into the grid. With the evolution of cyber threats/attacks over time, it can be said that there are a lot of challenges for implementing cyber security in Indian smart grid. Considering importance of secure smart grid networks for flagship projects in India, the existing regulatory framework does not seem to adequately take into consideration the cyber security implications.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;In light of this, the government must aim to develop and adopt high level cybersecurity policy to withstand cyber-attacks. Also, India must focus on skills development in this domain and have a capable workforce to achieve the targets set by Indian Government. The country must look up to develop an overall intelligence framework that brings together industry, governments and individuals with specific capabilities for this purpose.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The National Cyber Security Policy 2013, protecting public and private infrastructure from cyber attacks, along with all kinds of information, such as personal information of web users, banking and financial information,etc. is yet to be implemented by the Government properly. In the Indian Power sector, the cyber security regulations or mandates are absent in the National Electricity Policy (NEP) as well as the Electricity Act 2003 and its amendment in 2007, with no reference to cyber security concerns. These key legislations must be amended to take into account the growing challenges due to increased use of ICT in the power sector.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;As the concept of smart grids is still evolving in India, professional intervention from various domains has pushed for adoption and development of standard process and products. Many international standard setting organisations like IEC, IEEE, NIST, CENELEC are engaged in standardization activities of Smart Grids and in India, the Bureau of Indian Standards (BIS) has been rolling out several varieties of standards targeting various technologies. Therefore, BIS must develop standards taking into account the security challenges in the cyberspace as well.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Apart from policy and regulatory measure, the system on which the smart grids are built and networked must be made architecturally strong and secure.One of the areas where due attention is required is making the Supervisory Control and Data Acquisition (SCADA) secure, a system that operates with coded signals to provide control of remote equipment and is entirely based on computer systems and network. Numerous systems also employ the Public Key Infrastructure (PKI) to secure the Smart Grids and address the security challenges by enabling identification, verification, validation and authentication of connected meters for network access. This can be leveraged for securing data integrity, revenue streams and service continuity. The key vulnerable areas prone to cyber attacks on information transmission are network information, data integrity and privacy of information. The information transmission networks must be well-designed as the network unavailability may result in the loss of real-time monitoring of critical smart grid infrastructures and power system disasters.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Addressing these fast growing challenges and cyber security needs of the country by adopting suitable regulatory, policy and architectural steps would help achieve the objectives of Digital India and Smart Cities enabling “Access, Availability and Affordability for All”.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india'&gt;https://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok and Vanya Rakesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-04-28T15:34:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
