<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1201 to 1215.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/kids-music-fashion-on-net"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-june-24-2015-malavika-murali-and-payal-ganguly-most-emerging-firms-low-on-cyber-security-experts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/more-urban-indian-women-are-acting-against-offensive-calls-and-text-messages"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/times-of-india-may-18-2018-u-sudhakar-reddy-more-errors-in-aadhaar-data-in-andhra-pradesh-than-in-voter-database"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/debate-on-uid"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/economic-times-december-30-2013-lison-joseph-mongo-db-startup-hired-by-aadhar-got-funds-from-cia-vc-arm"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/moldova-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-times-of-india-sujit-john-and-shilpa-phadnis-october-6-2015-modi-valley-hug-sparks-swadeshi-talk"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/united-news-of-india-march-26-2018-modi-govt-compromising-privacy-of-individuals-congress"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/mobilising-support-for-freedom-on-web"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/mobile-trust-and-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/mobile-tech-4-social-change"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/mobile-net-ban-during-peaceful-protest-leaves-farmers-confused"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/kids-music-fashion-on-net">
    <title>Mothers discuss kids, music, fashions, on Net</title>
    <link>https://cis-india.org/news/kids-music-fashion-on-net</link>
    <description>
        &lt;b&gt;Among the many conversations about behavioural problems seen among teenage children and the benefits of organic foods, there is one that raves about a baby-sitter who takes care of pets too, and one that reviews newly opened art classes in the city. These are not the usual face-to-face discussions among women at a gathering, but threads that run on parenting websites and ‘mommy' blogs that have captured the imagination of many mothers in Chennai.

&lt;/b&gt;
        
&lt;p&gt;Many parenting forums register more than a thousand threads of interaction each every day from the city alone, with a variety of localised pages on Yahoo, Facebook, and netlog dedicated to facilitate communication between mothers.&lt;/p&gt;
&lt;p&gt;Baby growth charts, immunisation schedules, home-made remedies, reviews of schools, summer camps, information on doctors and a collection of articles from the mothers themselves — these forums have it all.&lt;/p&gt;
&lt;p&gt;Many mothers feel that going through related threads on various parenting sites before attending the PTA meetings helps to know what rest of the parents feel about issues.&lt;/p&gt;
&lt;p&gt;“My daughter does not like me talking to her classmates' parents at meetings; discussing online helps to talk to parents without the interference of children,” says Shobana Mahadevan, a blogger and a mother.&lt;/p&gt;
&lt;p&gt;Discussing concerns, especially those regarding increase in fees, change in examination patterns, homework, and school announcements with hundreds of other mothers on the internet helps them understand matters at hand and form opinions, she says.&lt;/p&gt;
&lt;p&gt;Many of these forums have threads on car-pooling in selected areas where parents decide on turns to drop children at schools.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Subbiah Arunachalam, a distinguished fellow at the Centre for Internet and Society, says that with the computer finding its way into many urban households, an increasing number of mothers are focussing more on their children's performance in school.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;The social network they form on the net provides the mothers a platform to be “collectively enlightened” about everything from culinary innovations to popular music and fashion trends, he says.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;On “Babycentre”, a forum that monitors child's growth and gives regular inputs on expected child behaviour, Sangeetha Vijay (38), mother of a two-year-old says,&lt;/p&gt;
&lt;p&gt;“It is like an elderly person helping you get prepared for everything from teething problems to allergies in children.”&lt;br /&gt;&lt;br /&gt;Many mothers say that though communication on parenting forums starts out as a medium to interact with those who share similar concerns, it soon goes beyond the confines of the internet. “We have groups of ‘internet mothers' who often meet, hold competitions and spend time together,” says Penithia Selvi (32), mother of a five year old girl.&lt;/p&gt;
&lt;p&gt;“These sites and blogs give mothers a platform to write, discuss their interests and talk openly, which is a priceless experience,” she adds.&lt;/p&gt;
&lt;p&gt;“It is very much an urban phenomenon,” says Savithri. J., child counsellor with schools, “Since many working mothers have access to the internet for more hours, they try tracking their children's activities, and also explore the net in their own way,” she says. Many concerns such as addiction to gaming seen among children, are better discussed with mothers who experience similar problems, says Ranjitha Kumaran (32).&lt;/p&gt;
&lt;p&gt;“Since mothers as young as 23 to those in their sixties share their experiences on these sites, the issues are approached with a lot of sensitivity and understanding,” she says.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Read the original in the &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/internet/article979462.ece"&gt;Hindu&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/kids-music-fashion-on-net'&gt;https://cis-india.org/news/kids-music-fashion-on-net&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T01:25:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-june-24-2015-malavika-murali-and-payal-ganguly-most-emerging-firms-low-on-cyber-security-experts">
    <title>Most emerging firms low on cyber security: Experts</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-june-24-2015-malavika-murali-and-payal-ganguly-most-emerging-firms-low-on-cyber-security-experts</link>
    <description>
        &lt;b&gt;When Pavitra Badrinath saw that the upgrade to a shopping application on her smartphone asked access to her contacts and messages, she decided against it. "Laws on privacy are not clear in India. So I am doing what I can to protect my information," the 26-year-old technology firm employee said.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Malavika Murali and Payal Ganguly was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2015-06-24/news/63783278_1_cyber-security-data-security-council-google-india"&gt;published in the Economic Times&lt;/a&gt; on June 24, 2015. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Are users taking a risk by allowing applications to gain access to personal data shadowed by an upgrade? "Most definitely ," said Bikash Barai, cofounder and chief executive of security firm iViz Security .&lt;br /&gt;&lt;br /&gt;With at least 10 alleged breaches and hacks into the databases of startups such as Ola and Gaana this year, the alarm bells are going off.&lt;br /&gt;&lt;br /&gt;Experts warn that emerging businesses are lax with security frameworks, which is especially worrying as millions more Indians are shopping online, including on their phones, exposing crucial personal and financial data to fraud.&lt;br /&gt;&lt;br /&gt;More than 70 per cent of Indian companies are under-prepared when it comes to cyber security, according to a report by CISO Platform, a social platform for security experts where Barai is chief adviser.&lt;br /&gt;&lt;br /&gt;India's largest cab-hailing company, Ola denied hackers' claims in an email response to ET, stating that its data were not compromised.&lt;br /&gt;&lt;br /&gt;Music service Gaana.com, in response to being hacked by a person in Pakistan calling himself MakMan, said it had strengthened its security team and offerings in recent weeks. "In addition, we are working on a `bug bounty' program, which will allow individuals to point out any potential vulnerability in a safe way," said Pawan Agarwal, business head at Gaana.com.&lt;br /&gt;&lt;br /&gt;According to Google India, the number of online shoppers is expected to cross 100 million by the end of next year, from 35 million ear, from 35 million n 2014. But lack of roust regulations and ata privacy laws as ell as the fragmentd nature of the starup ecosystem, do not llow much scope for esearch on cyber seurity , said experts."Under the Indian "Under the Indian regime, there are no self-regulatory mechanisms for putting out breach notifications," said Sunil Abraham, executive director of the Centre for Internet and Society. "The numbers available with a central body like Data Security Council of India will be a gross underestimation of the cases of breach."&lt;br /&gt;&lt;br /&gt;"Most of the startups in India want to do everything in-house. This can lead to a potential compromise or lack of expertise on the security front, even if it is made priority," said Harshit Agarwal, founder and chief executive of Singapore-based Appknox, which provides security services to Paytm, Freecharge and Myntra among other clients.&lt;br /&gt;&lt;br /&gt;Jabong founder and managing director Praveen Sinha said the online fashion retailer spends 15-20 per cent of its revenue on cyber security. But other startups contended that budgets and teams sizes are not accurate indicators of security preparedness.&lt;br /&gt;&lt;br /&gt;"We do not work with any external security firms as we have realised that the average report is as good as our internal team can make," said Mukesh Singh, chief executive officer of online grocer ZopNow.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-june-24-2015-malavika-murali-and-payal-ganguly-most-emerging-firms-low-on-cyber-security-experts'&gt;https://cis-india.org/internet-governance/news/economic-times-june-24-2015-malavika-murali-and-payal-ganguly-most-emerging-firms-low-on-cyber-security-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-06-29T16:02:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/more-urban-indian-women-are-acting-against-offensive-calls-and-text-messages">
    <title>More urban Indian women are acting against offensive calls and text messages</title>
    <link>https://cis-india.org/internet-governance/news/more-urban-indian-women-are-acting-against-offensive-calls-and-text-messages</link>
    <description>
        &lt;b&gt;More Indian women are fighting back against sexual harassment they face over phone calls and text messages, a survey shows.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Aria Thaker was published in &lt;a class="external-link" href="https://qz.com/india/1567185/womens-day-metoo-led-more-indian-women-to-report-harassment/"&gt;&lt;span class="external-link"&gt;Quartz India&lt;/span&gt; &lt;/a&gt;on March 8, 2019. Ambika Tandon was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;In an India-based survey by the Swedish  phone-identification app Truecaller, nearly 40% of respondents who had  faced sexual harassment via calls and SMSes said they’d filed police  complaints against it in 2019—a sharp increase from 10% when the company  conducted the &lt;a href="https://qz.com/india/1221626/78-of-indian-women-say-theyre-sexually-harassed-by-phone-every-week/"&gt;same survey&lt;/a&gt; just one year ago.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Truecaller’s  survey, conducted with global market research firm Ipsos, asked  detailed questions to over 2,100 women from metro areas across India.  All respondents had to be users of the Truecaller app.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;The survey, published yesterday (March 07),  showed the staggering scale of phone-based harassment of women in India.  One in three respondents reported receiving “sexual and inappropriate”  calls or SMSes. This is the same figure as when Truecaller conducted the  survey last year.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Women’s responses to phone  harassment took various forms. While 62% of women reported having “taken  measures against” harassment in 2018, 74% did this year. Some of the  steps women took this year included blocking numbers, calling mobile  operators to request “do not disturb” activation, ignoring calls, and  changing one’s number.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Blocking numbers, the  most popular step women took, also saw a substantial increase in  popularity from last year. While 65% of women who experienced harassment  reported blocking offending numbers in 2018, 92% did so in 2019.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;&lt;img src="https://cms.qz.com/wp-content/uploads/2019/03/colorcorrected-2.jpeg?quality=75&amp;amp;strip=all&amp;amp;w=620" /&gt;&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Women who faced harassment also reported being more willing to “name and  shame” perpetrators on social media—with 7% reporting having done so  last year, and 16% this year. In a recent, high-profile instance of  this, when television journalist &lt;a href="https://qz.com/india/1555678/twitter-treated-nyts-maggie-haberman-different-than-barkha-dutt/"&gt;Barkha Dutt experienced a torrent&lt;/a&gt; of phone-based harassment, she published screenshots from her perpetrators’ messages on Twitter.&lt;/p&gt;
&lt;h3 class="india a1dbe" style="text-align: justify; "&gt;Why this increase?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some say that this increase in willingness among women to take action  may be in part due to the influence of the MeToo movement, which &lt;a href="https://qz.com/india/1425057/metoos-spread-across-india-according-to-a-google-trends-map/"&gt;took India by storm&lt;/a&gt; last year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“MeToo had a huge impact across India,” said Gayatri Sethi, the business  head of WhiteBalance, a Delhi-based creative studio that Truecaller  partnered with on &lt;a href="https://www.truecaller.com/against-harassment"&gt;an anti-harassment media campaign&lt;/a&gt; called #ItsNotOK. Now, Sethi said, “women can step up and can tell the  world about these issues, and understand that they should not just  ignore (harassment).”&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Truecaller believes that the Indian government’s  initiatives to tackle harassment may also be partly responsible for the  increased reports to police. “There’s been a major shift in the  approachability of the police, and there are several helplines for women  to call and report,” Lindsey LaMont, Truecaller’s global brand manager,  told Quartz. “I think this has made a big difference.” In October, as  #MeToo gripped India, the country’s National Commission for Women &lt;a href="https://www.newsx.com/national/metoo-movement-ncw-launches-special-email-id-to-report-cases-of-sexual-harassment-urges-women-to-send-their-metoo-stories"&gt;launched helplines&lt;/a&gt; and a dedicated email address to field harassment complaints.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;It is important to note, however, that Truecaller’s survey—of which around 97% of respondents come from the highest &lt;a href="https://en.wikipedia.org/wiki/SEC_Classification"&gt;socioeconomic classification group&lt;/a&gt; in India—cannot at all be considered nationally representative. “One of  their criteria for targeting respondents is that they need to be using  Truecaller, which is in itself a very limited sample set,” said Ambika  Tandon, a policy officer who researches gender and tech issues for the  think tank Centre for Internet and Society.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Indian women of lower socioeconomic strata, Tandon suggested, would be  more likely to respond to harassment “by going offline or not accessing  mobile phones at all, because they don’t have the kinds of support  structures that would exist for communities where there is a larger  level of access or skill.”&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Tandon also cautioned against the survey’s clubbing together of  different ways that women are taking action against harassment, for  example, by including steps like ignoring calls or blocking numbers next  to filing police complaints. This conflation, she said, could risk  being seen as similar to instances of law enforcement bias, in which  police sometimes tell women to simply block harassers’ numbers—while  “not dealing with (the complaint) as rigorously as they would with a  physical harassment complaint.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/more-urban-indian-women-are-acting-against-offensive-calls-and-text-messages'&gt;https://cis-india.org/internet-governance/news/more-urban-indian-women-are-acting-against-offensive-calls-and-text-messages&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aria Thaker</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-03-10T02:24:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance">
    <title>More than a Hundred Global Groups Make a Principled Stand against Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance</link>
    <description>
        &lt;b&gt;For some time now there has been a need to update understandings of existing human rights law to reflect modern surveillance technologies and techniques.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Nothing could demonstrate the urgency of this situation more than the &lt;a href="https://www.privacyinternational.org/blog/looking-at-prism-nsas-mass-surveillance-program"&gt;recent&lt;/a&gt; &lt;a href="https://www.eff.org/deeplinks/2013/06/spy-without-borders"&gt;revelations&lt;/a&gt; confirming the mass surveillance of innocent individuals around the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To move toward that goal, today we’re pleased to announce the formal launch of the &lt;a href="https://cis-india.org/internet-governance/blog/necessary-and-proportionate.pdf" class="internal-link"&gt;International Principles on the Application of Human Rights to Communications Surveillance&lt;/a&gt;. The principles articulate what international human rights law – which binds every country across the globe – require of governments in the digital age. They speak to a growing global consensus that modern surveillance has gone too far and needs to be restrained. They also give benchmarks that people around the world can use to evaluate and push for changes in their own legal systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The product of over a year of consultation among civil society, privacy and technology experts, including the Centre for Internet and Society (read &lt;a href="https://www.privacyinternational.org/blog/towards-international-principles-on-communications-surveillance"&gt;here&lt;/a&gt;, &lt;a href="https://www.eff.org/deeplinks/2012/12/tackling-state-surveillance-and-human-rights-protecting-universal-freedoms"&gt;here&lt;/a&gt;, &lt;a href="https://www.eff.org/issues/surveillance-human-rights"&gt;here&lt;/a&gt; and &lt;a href="https://www.privacyinternational.org/blog/pi-is-pleased-to-announce-a-public-consultation-on-the-international-principles-on"&gt;here&lt;/a&gt;), the principles have already been co-signed by over hundred organisations from around the world. The process was led by &lt;a href="https://www.privacyinternational.org/"&gt;Privacy International&lt;/a&gt;, &lt;a href="https://accessnow.org/"&gt;Access&lt;/a&gt;, and the &lt;a href="https://eff.org/"&gt;Electronic Frontier Foundation&lt;/a&gt;. The process was led by &lt;a href="https://www.privacyinternational.org/"&gt;Privacy International&lt;/a&gt;, &lt;a href="https://accessnow.org/"&gt;Access&lt;/a&gt;, and the &lt;a href="https://eff.org/"&gt;Electronic Frontier Foundation&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The release of the principles comes on the heels of a &lt;a href="https://www.privacyinternational.org/blog/un-report-the-link-between-state-surveillance-and-freedom-of-expression"&gt;landmark&lt;/a&gt; &lt;a href="https://www.eff.org/deeplinks/2013/06/internet-and-surveillance-UN-makes-the-connection"&gt;report&lt;/a&gt; from the United Nations Special Rapporteur on the right to Freedom of Opinion and Expression, which details the widespread use of state surveillance of communications, stating that such surveillance severely undermines citizens’ ability to enjoy a private life, freely express themselves and enjoy their other fundamental human rights. And recently, the UN High Commissioner for Human Rights, Nivay Pillay, &lt;a href="http://www.ohchr.org/EN/NewsEvents/Pages/Media.aspx?IsMediaPage=true&amp;amp;LangID=E"&gt;emphasised the importance&lt;/a&gt; of applying human right standards and democratic safeguards to surveillance and law enforcement activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"While concerns about national security and criminal activity may justify the exceptional and narrowly-tailored use of surveillance programmes, surveillance without adequate safeguards to protect the right to privacy actually risk impacting negatively on the enjoyment of human rights and fundamental freedoms," Pillay said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The principles, summarised below, can be found in full at &lt;a class="external-link" href="http://necessaryandproportionate.org"&gt;necessaryandproportionate.org&lt;/a&gt;. Over the next year and beyond, groups around the world will be using them to advocate for changes in how present laws are interpreted and how new laws are crafted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We encourage privacy advocates, rights organisations, scholars from legal and academic communities, and other members of civil society to support the principles by adding their signature.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To sign, please send an email to &lt;a class="mail-link" href="mailto:rights@eff.org"&gt;rights@eff.org&lt;/a&gt;, or visit &lt;a class="external-link" href="https://www.necessaryandproportionate.org/about"&gt;https://www.necessaryandproportionate.org/about&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Summary of the 13 principles&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Legality: Any limitation on the right to privacy must be prescribed by law.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Legitimate Aim: Laws should only permit communications surveillance by specified State authorities to achieve a legitimate aim that corresponds to a predominantly important legal interest that is necessary in a democratic society.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Necessity: Laws permitting communications surveillance by the State must limit surveillance to that which is strictly and demonstrably necessary to achieve a legitimate aim.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Adequacy: Any instance of communications surveillance authorised by law must be appropriate to fulfill the specific legitimate aim identified.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Proportionality: Decisions about communications surveillance must be made by weighing the benefit sought to be achieved against the harm that would be caused to users’ rights and to other competing interests.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Competent judicial authority: Determinations related to communications surveillance must be made by a competent judicial authority that is impartial and independent.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Due process: States must respect and guarantee individuals' human rights by ensuring that lawful procedures that govern any interference with human rights are properly enumerated in law, consistently practiced, and available to the general public.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;User notification: Individuals should be notified of a decision authorising communications surveillance with enough time and information to enable them to appeal the decision, and should have access to the materials presented in support of the application for authorisation.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Transparency: States should be transparent about the use and scope of communications surveillance techniques and powers.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Public oversight: States should establish independent oversight mechanisms to ensure transparency and accountability of communications surveillance.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Integrity of communications and systems: States should not compel service providers, or hardware or software vendors to build surveillance or monitoring capabilities into their systems, or to collect or retain information.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Safeguards for international cooperation: Mutual Legal Assistance Treaties (MLATs) entered into by States should ensure that, where the laws of more than one State could apply to communications surveillance, the available standard with the higher level of protection for users should apply.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Safeguards against illegitimate access: States should enact legislation criminalising illegal communications surveillance by public and private actors.&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance'&gt;https://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-31T14:26:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/times-of-india-may-18-2018-u-sudhakar-reddy-more-errors-in-aadhaar-data-in-andhra-pradesh-than-in-voter-database">
    <title>More errors in Aadhaar data in Andhra Pradesh than in voter database</title>
    <link>https://cis-india.org/internet-governance/news/times-of-india-may-18-2018-u-sudhakar-reddy-more-errors-in-aadhaar-data-in-andhra-pradesh-than-in-voter-database</link>
    <description>
        &lt;b&gt;As much as eight per cent of Aadhaar data collected in Andhra Pradesh has errors, mostly related to name, address and date of birth, which is more than the errors in the voter ID database. But still, 87% of rural residents approve mandatory linking of the unique ID with various schemes and services.&lt;/b&gt;
        &lt;p&gt;The article by U Sudhakar Reddy was published in the &lt;a class="external-link" href="https://timesofindia.indiatimes.com/city/hyderabad/more-errors-in-aadhaar-data-in-andhra-pradesh-than-in-voter-database/articleshow/64214534.cms"&gt;Times of India&lt;/a&gt; on May 18, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This was revealed in the &lt;a class="key_underline" href="https://timesofindia.indiatimes.com/topic/State-of-Aadhaar"&gt;State of Aadhaar&lt;/a&gt; report 2017-18 based on a survey carried out in three states — Andhra Pradesh, &lt;a class="key_underline" href="https://timesofindia.indiatimes.com/india/rajasthan"&gt;Rajasthan&lt;/a&gt; and West Bengal. The survey revealed that a majority of people in &lt;a class="key_underline" href="https://timesofindia.indiatimes.com/topic/Andhra-Pradesh"&gt;AP&lt;/a&gt; and Rajasthan preferred Aadhaar-based PDS delivery as they believed biometric authentication prevents identity fraud. On the flip side, at least 3 lakh people, which is 0.8% of PDS beneficiaries, were denied ration benefits due to Aadhaar issues, it found.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The survey found that among the three states, it was easiest to enrol for Aadhaar in AP. As many was 67% of people used Aadhaar as proof for opening bank accounts and 17% used it for Know Your Customer (KYC) verification. The survey also found that 96% of respondents valued privacy and wanted to know what the government will do with their data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The survey covered 2,947 rural households in 21 districts across the three states from Nov 2017 and Feb 2018,” the report by IDinsight, a development analytics firm, said. “Compared to voter IDs, the error-rate in Aadhaar was 1.5 times higher. While exclusion from PDS due to Aadhaar-related factors is significant, it is lower than exclusion explained by factors unrelated to Aadhaar,” said Ronald Abraham of IDinsight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reacting to the findings, Dr Ajay Bhushan Pandey, CEO of &lt;a class="key_underline" href="https://timesofindia.indiatimes.com/topic/UIDAI"&gt;UIDAI&lt;/a&gt;, said: “The report highlights that Aadhaar has wide-scale support from people. Exclusion from PDS is due to failure of the local administration and should be taken very seriously.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But critics found fault with the survey methodology. “If IDinsight asked respondents whether they preferred the UK system where you can get a SIM card without KYC or the Indian system with mandatory biometric authentication, then 100% of respondents would have opted for the UK approach. They have got an endorsement for use of biometrics due to their disingenuous survey design,” said &lt;a class="key_underline" href="https://timesofindia.indiatimes.com/topic/Sunil-Abraham"&gt;Sunil Abraham&lt;/a&gt;, executive director, Centre for Internet and Society.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/times-of-india-may-18-2018-u-sudhakar-reddy-more-errors-in-aadhaar-data-in-andhra-pradesh-than-in-voter-database'&gt;https://cis-india.org/internet-governance/news/times-of-india-may-18-2018-u-sudhakar-reddy-more-errors-in-aadhaar-data-in-andhra-pradesh-than-in-voter-database&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-05-20T14:04:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/debate-on-uid">
    <title>More Debate on UID Project Needed</title>
    <link>https://cis-india.org/news/debate-on-uid</link>
    <description>
        &lt;b&gt;A press conference on UID was held at the Press Club in Bangalore on 26 July, 2010. It was co-organised by Citizen's Action Forum, Alternate Law Forum and the Centre for Internet and Society. Mathew Thomas and Vinay Baindur spoke about the UID. Proceedings from the conference was covered in the Hindu on 27 July, 2010.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/publications/uid-coverage-hindu" class="internal-link" title="More Debate on UID"&gt;More Debate on UID&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/debate-on-uid'&gt;https://cis-india.org/news/debate-on-uid&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T11:13:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/economic-times-december-30-2013-lison-joseph-mongo-db-startup-hired-by-aadhar-got-funds-from-cia-vc-arm">
    <title>MongoDB startup hired by Aadhaar got funds from CIA VC arm</title>
    <link>https://cis-india.org/news/economic-times-december-30-2013-lison-joseph-mongo-db-startup-hired-by-aadhar-got-funds-from-cia-vc-arm</link>
    <description>
        &lt;b&gt;Two weeks ago, Max Schireson, chief executive of MongoDB, a New York-based technology startup, was in New Delhi to sew up a very important contract for his company — with the Unique Identification Authority of India (UIDAI).&lt;/b&gt;
        &lt;p&gt;The article by Lison Joseph was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2013-12-03/news/44710564_1_uidai-chairman-nandan-nilekani-uid-data-in-q-tel"&gt;published in the Economic Times&lt;/a&gt; on December 3, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The contract is yet to be announced but what could raise eyebrows is the fact that &lt;a href="http://economictimes.indiatimes.com/topic/MongoDB"&gt;MongoDB&lt;/a&gt; is part-funded by the US' &lt;a href="http://economictimes.indiatimes.com/topic/Central%20Intelligence%20Agency"&gt;Central Intelligence Agency&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The company is expected to help in capturing and analysing data related to the ambitious plan to issue a unique identity number — Aadhaar — to over a billion citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;MongoDB, which makes software that helps manage large databases, especially unstructured data, has raised $231 million (Rs1,400 crore) since being founded in 2007. Some of its funding is from In-Q-Tel, the not-for-profit venture capital arm of CIA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While MongoDB lists In-Q-Tel as one of its investors on its website, the company has not disclosed the quantum of funding received from it. The fund's stated mission is to identify, adapt and deliver innovative technology solutions to support the missions of CIA and the broader US intelligence community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides CIA, In-Q-Tel works with National Geospatial-Intelligence Agency, Defense Intelligence Agency and Department of Homeland Security Science and Technology Directorate.&lt;/p&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_crunchingdata.png" alt="crunching data" class="image-inline" title="crunching data" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;"Once an investment is made, IQT (the fund) works with the company and the intelligence community partner agency to complete a work program and facilitate solution delivery," the fund's website said. The quote describes IQT's relationship with any company in which it invests in and is not specific to MongoDB.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Neither &lt;a href="http://economictimes.indiatimes.com/topic/UIDAI"&gt;UIDAI&lt;/a&gt; nor MongoDB responded to queries from ET on whether the CIA link was considered before entering into a partnership. UIDAI Chairman &lt;a href="http://economictimes.indiatimes.com/topic/Nandan%20Nilekani"&gt;Nandan Nilekani&lt;/a&gt; did not respond to emails, messages and phone calls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A senior UIDAI official confirmed the agency has entered into an agreement with MongoDB and that the company's database software is already being used for analysing the pace at which registration of new beneficiaries is taking place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is not clear if MongoDB's vendor relationship would be with UID directly or with one of the system integrators that UID works with. Schireson, the CEO, was also one of the national co-chairs for Technology for Obama, an interest group that campaigned for the reelection of President &lt;a href="http://economictimes.indiatimes.com/topic/Barack%20Obama"&gt;Barack Obama&lt;/a&gt; after his first term.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no evidence in the public domain that the firm is controlled or significantly influenced by the CIA in any manner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the revelations of &lt;a href="http://economictimes.indiatimes.com/topic/Edward%20Snowden"&gt;Edward Snowden&lt;/a&gt;, a former NSA contractor-turned-whistleblower that US intelligence agencies routinely intercepted communication in Europe and Asia, including in India has raised concerns. Experts said the UID's centralised design could pose a risk, where even a single mistake can make the whole system disproportionately vulnerable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The risk exposure because of CIA involvement (could be that) if MongoDB is a data controller, then secret courts and secret court orders could be used to get access to the UID data," said Sunil Abraham, executive director at the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He added that even if UIDAI is only using the source code without getting into a commercial relationship with MongoDB, they should audit the source code to check if CIA has introduced any back doors. "This is because Snowden has told us that the army of mathematicians working for the US government has compromised some standards even though they were developed in an open, participatory and transparent fashion." MongoDB, whose name is a play on the word humongous, competes with Oracle, IBM and Microsoft. It has around 320 employees and some 600 customers. At its latest round of $150 million in fund-raising in October, the company was valued at about $1.2 billion, according to Bloomberg. Other investors include Intel Capital, Salesforce-.com, Red Hat and Sequoia.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/economic-times-december-30-2013-lison-joseph-mongo-db-startup-hired-by-aadhar-got-funds-from-cia-vc-arm'&gt;https://cis-india.org/news/economic-times-december-30-2013-lison-joseph-mongo-db-startup-hired-by-aadhar-got-funds-from-cia-vc-arm&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-12-13T11:53:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/moldova-online">
    <title>Moldova Online: An Interview with Victor Diaconu</title>
    <link>https://cis-india.org/internet-governance/blog/moldova-online</link>
    <description>
        &lt;b&gt;In this interview for Russian Cyberspace, set up with the help of Sunil Abraham (Executive Director at the Centre for Internet and Society in Bangalore, India), computer software professional Victor Diaconu explains the nature of Internet use, state control and the development of blogging and social media platforms in Moldova. Victor works at Computaris in Chisinau. He is Moldova educated, and has travelled to several western countries (including lengthy stays to US, UK) to learn about and understand what there is to be done in Moldova. Sudha Rajagopalan interviewed Victor Diaconu.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;SR&lt;/strong&gt;: After the 2009 elections, there was some talk of reform in Moldova and greater transparency, but now one also hears contradictory reports of increasing authoritarian tendencies. &amp;nbsp;Is this ambivalence evident in the way the internet is regulated and used here?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VD&lt;/strong&gt;: I would not say the tendencies are authoritarian. The constitution says that the President should be voted in by a majority of 61 out of 101 members of the Parliament. If not, Parliament should be dissolved and re-elected. Well, this should happen twice a year at the most, and as such, after a second failed attempt to vote the President the authority of the Parliament and Government is somewhat questionable. The current Parliament has tried to change the rules of voting in the President - to make it by popular vote, for instance, but this is met with resistance from the Communist Party.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As to transparency - I would say it has improved. Though, one should not expect too many changes from a Government with questionable authority and with so many systemic flaws inherited from the previous government. At the moment we've got a coalition government. As such, there are frictions and these are indeed visible. This gives a sense of comfort and truthfulness since it is normal to have frictions in any human endeavour. While the communist party was ruling - everything was "nice and dandy" both in media and in political affairs and one could not get anything but "fake" - fake news, fake results, fake improvements.&lt;/p&gt;
&lt;p&gt;Internet control and filtering do not happen. In fact, we did have a "small revolt" on April 7, 2009, when it seemed the communist party had tried to steal the vote for the parliament. At that moment a few .md sites were blocked by the national Telecom operator, but most other sites were still available. In fact, news about the event was best available on twitter (might still be available under "pman" tags). There also were a few attempts to stifle free speech when authorities requested names/IP addresses of commenters on some forums. However, this is no longer conceivable ...&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;SR&lt;/strong&gt;: Given that the press and television are largely in the hands of the state and criticism of the state is considered defamation (and leads to the arrest of press people), does the internet play a special role as a space for alternative media and political blogs? Are these prevalent and influential?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VD&lt;/strong&gt;: Yes, national TV is largely state owned and it was worse before the change in power. Now it seems to have improved. There are a series of smaller TV stations but these have reduced coverage - mostly in bigger cities. I understand that they've started rolling out IP TV with packages of 50+ TV channels - local and international. The national Telecoms operator provides very good Internet coverage. Dial-up Internet at reasonable prices is available everywhere in the country. Broadband availability even in rural areas is very good. And it's not too expensive. As to the role of Internet - indeed its influence is increasing. A series of media portals are frequented by many, including me. http://unimedia.md/; http://m.protv.md/; http://jurnaltv.md/; http://forum.md/to mention a few. The news here is conveyed tersely &amp;nbsp;but I do my own editorializing if need be. Also, I can read the comments if I want to get a feeling about how others feel about some specific event.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;SR&lt;/strong&gt;: Can you tell us about some of the popular bloggers and blogging platforms in Moldova? Live Journal is popular in Russia; can the same be said of Moldova?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VD&lt;/strong&gt;: I'm not aware of any significant blogger, more so, political blogger. I'd say we still need to wait for someone whose commentary is mature enough for people to care about him or her... As to the platform - those blogging attempts that I've seen were indeed on major blogging portals like Live Journal.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;SR&lt;/strong&gt;: What can you tell us about the presence of social media in Moldova? Does Moldova prefer its own versions of global digital platforms, or are FB, My Space, Twitter popular here? &amp;nbsp;What is the role of the diaspora in this space?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VD&lt;/strong&gt;: Global platforms are widely used. There are a few Russian popular platforms in wide use too, such as odnoklassniki.ru. We have up to 1 million Moldovans working in European countries, Russia and other places, since the pay is significantly higher over there. These people left a few years back and most of them intend to return. And they, indeed, rely on the available platforms to relate back to relatives and friends.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;SR&lt;/strong&gt;: Lastly, can you tell us about the linguistic landscape of Moldovan new media; I imagine the most widely used language on the internet is Moldovan/Romanian. Is Russian prevalent or is new media here a platform to assert their exclusive Moldovan identity?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VD&lt;/strong&gt;: The rules for language are that media should have at least 60-70% of content in "state" language and the law was often changed so that sometimes 'state language’ included Russian too. &amp;nbsp;In fact, in Moldova we are very comfortable with the Russian language, at least those a bit older (30+ years) since we were supposed to speak it well in the Soviet era. &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;SR&lt;/strong&gt; (with many thanks to Victor Diaconu and Sunil Abraham)&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;About Sudha Rajagopalan&lt;/h3&gt;
&lt;p&gt;Sudha Rajagopalan is the deputy editor of &lt;a class="external-link" href="http://www.digitalicons.org/"&gt;Digital Icons: Studies in&amp;nbsp;Russian, Eurasian and Central European New Media&lt;/a&gt;&amp;nbsp;and co-blogger at &lt;a class="external-link" href="http://russ-cyberspace.livejournal.com/"&gt;Russian Cyberspace&lt;/a&gt;.&amp;nbsp;Sudha is also a &amp;nbsp;Research Affiliate&amp;nbsp;with the Media Studies Group at the University of Utrecht in the&amp;nbsp;Netherlands. Her current research is on audience and fan communities&amp;nbsp;on Runet (the Russian-language internet), with a special interest in&amp;nbsp;identity, performativity and affect in online practices. Sudha&amp;nbsp;obtained her PhD in Russian History from Indiana University,&amp;nbsp;Bloomington (2005). She is the author of 'Leave Disco Dancer Alone:&amp;nbsp;Indian Cinema and Soviet Movie-going after Stalin,' Yoda Press, 2008&amp;nbsp;('Indian Films in Soviet Cinemas: The Culture of Movie-going after&amp;nbsp;Stalin,' Indiana University Press, 2009).&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/moldova-online'&gt;https://cis-india.org/internet-governance/blog/moldova-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sudha Rajagopalan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:10:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-times-of-india-sujit-john-and-shilpa-phadnis-october-6-2015-modi-valley-hug-sparks-swadeshi-talk">
    <title>Modi's Valley hug sparks swadeshi talk</title>
    <link>https://cis-india.org/internet-governance/news/the-times-of-india-sujit-john-and-shilpa-phadnis-october-6-2015-modi-valley-hug-sparks-swadeshi-talk</link>
    <description>
        &lt;b&gt;His warm hug of Facebook's Mark Zuckerberg will perhaps be the most abiding image of Narendra Modi's visit to the Silicon Valley.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;But that embrace, and what  it conveyed, is now becoming the subject for an intense debate among  techies here. Is Modi giving in too much to the Googles and Facebooks of  the world, when there is so much technology talent within India? Is he  taking the easy way out by handing out critical pieces of his Digital  India vision to global incumbents rather than build domestic  capabilities?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;"When the government  wanted to build a citizen engagement platform earlier this year, they  depended on Google. Now when they want Wi-Fi in railway stations, it's  again Google. These are things that can be done by our companies,  otherwise we will not be able to create our own digital industry.  Remember, we are the people who built Aadhaar," said an industry veteran  who did not want to be named.&lt;br /&gt; &lt;br /&gt; Nitin Pai, co-founder of  Takshashila, an independent policy research and advocacy body that  provides services for government agencies, NGOs and corporations, said  Modi's team should make a careful distinction between national interest  and MNCs' commercial interest. "Many MNCs have come forward to  participate in Digital India initiatives. The government will have to  look at offering sufficient incentives for innovation to domestic tech  companies, many of whom are coming with innovative business models," he  said.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;Speaking to a  cross-section of tech companies here, two sets of concerns emerge. One  relates to the concessions that will work in favour of global incumbents  and against newcomers - the latter is likely to add more value in the  long term. This includes the issue of net neutrality , on which the  government is seen to be waffling, and the guidelines issued by the  Indian Patent Office declaring that software is patentable in India.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;img src="https://cis-india.org/home-images/Concerns.png/@@images/3d04c7c6-2ac6-444b-8fbb-4e7d79823c8c.png" alt="Concerns" class="image-inline" title="Concerns" /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The new guidelines will  make it easier for companies to file for software patents in India. But  software patenting has become hugely controversial globally , because  innova tions in the area are often just incremental, and come on top of  other software programs.Besides, patenting is expensive and is often the  subject of litigation, both of which work against small ventures with  little resources. Companies like Google have spent billions of dollars  to buy patents.&lt;br /&gt; &lt;br /&gt; Venkatesh Hariharan, member of software product  think-tank iSpirt, said the new guidelines would make it easier for  bigger companies to file software patents, but for smaller firms and  startups, the move could be detrimental."They could end up fighting  patent litigations. In the US, 37% of patent litigation is around  software and business patents," he said.&lt;br /&gt; &lt;br /&gt; Sunil Abraham,  executive director in research organization Centre for Internet and  Society , fears litigation could kill local innovation. He cited a  recent example where a Delhi high court order asked Indian handset  manufacturer Micromax to pay 1.25%-2% of the selling price of its  devices to Ericsson that had claimed infringement of patents.&lt;br /&gt; &lt;br /&gt; The other set of issues relates to certain rules and regulations in  India that place significant obstacles before small technology ventures.  This is resulting in many ventures shifting their registered offices to  Singapore or the US.&lt;br /&gt; &lt;br /&gt; Albinder Dindsa's on-demand delivery  service Gro fers is among the latest to create a holding company in  Singapore. "It is challenging to do business in India. Even opening a  bank account took time. We thought it would be easier to do an IPO if we  are in Singapore," he said.&lt;br /&gt; &lt;br /&gt; A senior industry analyst who did  not want to be named said that till last year, two out of four ventures  were moving out of India, but now that figure is three out of four. "I  would expect the government to do something about it. In fact, the  finance minister did say in June that the issues would be addressed  within 30 days. But nothing has happened."&lt;br /&gt; &lt;br /&gt; Also, it is expensive for angel investors overseas to invest in Indian startups.&lt;br /&gt; &lt;br /&gt; India disallows startups from offering stock options to foreign  nationals, which makes it difficult for them to access seasoned mentors.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-times-of-india-sujit-john-and-shilpa-phadnis-october-6-2015-modi-valley-hug-sparks-swadeshi-talk'&gt;https://cis-india.org/internet-governance/news/the-times-of-india-sujit-john-and-shilpa-phadnis-october-6-2015-modi-valley-hug-sparks-swadeshi-talk&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-11T05:33:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/united-news-of-india-march-26-2018-modi-govt-compromising-privacy-of-individuals-congress">
    <title>Modi Govt compromising privacy of individuals: Cong</title>
    <link>https://cis-india.org/internet-governance/news/united-news-of-india-march-26-2018-modi-govt-compromising-privacy-of-individuals-congress</link>
    <description>
        &lt;b&gt;Charging the Narendra Modi Governemt with compromising the privacy of individuals by leaking user information on the Narendra Modi app, the Congress on Monday said the counter allegations by the BJP that the Opposition party was indulging in 'data theft' were an attempt to divert attention from the issue.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published by &lt;a class="external-link" href="http://www.uniindia.com/news/india/modi-govt-compromising-privacy-of-individuals-cong/1180219.html"&gt;United News of India&lt;/a&gt; on March 26, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Talking to reporters here, AICC spokesperson Abhishek Manu Singhvi said, 'we have said repeatedly that the biggest assault on individual privacy has occurred under the watch of the Narendra Modi Government. Not only people’s money, but people’s privacy is also in question.&lt;br /&gt;&lt;br /&gt;Even as startling revelations that the Narendra Modi app, run by the BJP is sharing data of millions of users with American companies emerge, the Modi Government mocks and flouts the ‘Right to Privacy’ with brazen impunity. While the Prime Minister’s Office, PMO India app, asks users to voluntarily part with their identity on 14 data points, the NaMo app asks for a sweeping access to 22 data points. The NaMo app records audio, video, contacts of your friends and family and even tracks your location via GPS. No wonder, Modi ji is like the ‘Bigg Boss’ who with brazenness likes to spy on Indians. The BJP whose IT (Identity Theft?) Minister does daily press conferences on the issue of data security and democracy, has much to answer to the people of India on the unscrupulous means by which Shri Narendra Modi’s personal app is accessing data and passing on data of more than 50 lakh Indians,' he alleged.&lt;br /&gt;&lt;br /&gt;Describing the BJP allegations that the Congress was indulging in 'data theft' through its mobile app, Mr Singhvi said. 'the Modi Government is resorting to deflectionary and diversionary tactics. The Congress application had just 15,000 downloads against the 50 lakh Indians who downloaded the NaMo app. Also, the Congress application was discontinued as most of the users wanted to register offline.'&lt;br /&gt;&lt;br /&gt;Accusing Mr Modi of misusing the Prime Minister’s position to build personal database with data on millions of Indians via the NaMo app promoted by the government, Mr Singhvi said, 'Why does Mr Modi, in his own book ‘Exam Warriors’ urge you to download the NaMo app. Is he now planning to snoop in on minors? Mr Modi is misusing the Prime Minister’s position to build personal database with data on millions of Indians via the NaMo app promoted by Government. If as PM he wants to use tech to communicate with India, there is no problem in that. But use the official PMO app for it, not the NaMo app. This data belongs to India, not to Mr Modi.&lt;br /&gt;&lt;br /&gt;Shockingly, data of atleast 13 lakh NCC cadets which include personal mobile phone numbers and email ID’s are being given to the Prime Minister’s Office for an interaction.'&lt;br /&gt;&lt;br /&gt;Citing in this regard the report of a committee of experts appointed by the government on the issue of data protection, Mr Singhvi said, 'importantly, a Government appointed Committee of Experts (CoE) to look into a framework for data protection, headed by Justice (retd) BN Srikrishna has made scathing observations in a paper released in November 2017, against the Government and has shockingly implied (according to the media reports) that the Modi Government is collecting personal data illegally. The committee, which is currently in the process of conducting consultations, has also considered the SC judgment on privacy, says in its paper “The public and private sector are collecting and using personal data on an unprecedented scale. While data can be put to beneficial use, unregulated and arbitrary use of data, especially personal data, raise concerns relating to centralisation of databases, profiling of individuals, increased surveillance and a consequent erosion of individual autonomy.” &lt;br /&gt;&lt;br /&gt;Alleging that under the Modi Government, not only the personal data of citizens was under serious threat, but there were multiple reports of data breaches in banks, Mr Singhvi said, 'astonishingly, under the Modi Government, not only the personal data of citizens is under serious threat, but multiple breaches in the banks. In an atmosphere where every single day there has been a bank fraud worth thousands of crores of rupees being reported, have resulted in one single question - how safe is our money in banks?&lt;br /&gt;&lt;br /&gt;Banks and PSU’s have reported multiple breaches in recent past. A newspaper report on Monday said two online security experts have claimed that the Aadhaar database of two public-sector enterprises leaked select data and the vulnerability was fixed only a month after attention was drawn to it. This exposes their names, the 12-digit Aadhaar number and information of the services they have linked their Aadhaar card to. These services include bank details, policy details and other private information. This was corroborated by the UIDAI statement released on Sunday. &lt;br /&gt;&lt;br /&gt;“It was left up there for more than a month — even though it had been reported to them directly,” claim the security experts. On February 23, 2018 a report had claimed that there was a data breach which had hit the the Punjab National Bank, whereby sensitive credit, debit card details of 10,000 customers were leaked. Quick Heal, a reputed software company in October 2017 had also claimed that there was a massive data breach in 6,000 government offices including banks. Earlier in 2016, as per media reports -- 32 lakh debit/credit cards of various Indian banks were compromised. The worst-hit was the State Bank of India along with certain private banks.' &lt;br /&gt;&lt;br /&gt;He also charged the present Government of breach of Aadhaar data of individuals.&lt;br /&gt;&lt;br /&gt;'In April 2014, the then Gujarat Chief Minister Narendra Modi had attacked Aadhaar and the UPA Government on its possible ‘security threat’. Life has now come full circle for the BJP. Just like numerous other issues, their blatant hypocrisy on Aadhaar is exposed. In January, this year, when a reputed newspaper in a sting exposed how 1 crore Aadhaar details can be accessed in just 10 minutes, by paying just Rs 500 in Chandigarh, the UIDAI had then filed an FIR against the reporter. Now the editor of the reputed media house has also been replaced. &lt;br /&gt;&lt;br /&gt;We have seen it in May 4, 2017, when the Modi Government is on record in Supreme Court, accepting data breach in the Aadhaar scheme. Now the Attorney General in Supreme Court, while arguing that Aadhaar data remains safe and secure, says that the Aadhaar data remains secure behind a complex that has 13-ft high and five-feet thick walls, which is laughable and ludicrous, to say the least. On November 20, 2017, the UIDAI had accepted on record that –“More than 210 central and state government websites publicly displayed details such as names and addresses of Aadhaar beneficiaries”. Earlier too, ‘Centre for Internet and Society’, a Bengaluru-based organisation (CIS) in a study published on May 1, 2017, had found that data of more than 130 million Aadhaar card holders has been leaked from just four government websites. Therefore this is a serious issue. Clearly, neither our money, nor our Aadhaar details or our personal details are secure under the Modi Government.'&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/united-news-of-india-march-26-2018-modi-govt-compromising-privacy-of-individuals-congress'&gt;https://cis-india.org/internet-governance/news/united-news-of-india-march-26-2018-modi-govt-compromising-privacy-of-individuals-congress&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-04-18T01:10:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide">
    <title>Models for Surveillance and Interception of Communications Worldwide</title>
    <link>https://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide</link>
    <description>
        &lt;b&gt;This is an evaluation of laws and practices governing surveillance and interception of communications in 9 countries. The countries evaluated represent a diverse spectrum not only in terms of their global economic standing but also their intrusive surveillance capabilities. The analysis is limited to the procedural standards followed by these countries for authorising surveillance and provisions for resolving interception related disputes.&lt;/b&gt;
        &lt;table class="grid" style="text-align: justify; "&gt;
&lt;thead&gt;&lt;/thead&gt;
&lt;/table&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;thead&gt; 
&lt;tr&gt;
&lt;th&gt;Sl. No.&lt;/th&gt; &lt;th&gt;Country&lt;/th&gt; &lt;th&gt;Legislation&lt;/th&gt; &lt;th&gt;Model&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt; 
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1.&lt;/td&gt;
&lt;td&gt;Australia&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Telecommunications (Interceptions and Access) Act, 1979&lt;/b&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Governs interception of communications&lt;/li&gt;
&lt;li&gt;Relevant provisions: S. 3, 7, 6A, 34, 46&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt; Surveillance Devices Act, 2004 &lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Establishes procedure for obtaining warrants and for use of surveillance devices&lt;/li&gt;
&lt;li&gt;Relevant Provisions: S.13, 14&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt; &lt;span style="text-align: justify; "&gt;Authorisation for surveillance is granted in the form of a warrant from a &lt;b&gt;Judge or a nominated member of the Administrative Appeals Tribunal&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;The warrant issuing authority must be satisfied that information obtained through interception shall assist in the investigation of a serious crime&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;The Acts provide a list of prescribed offences for which interception of communication may be authorized&lt;/li&gt;
&lt;li&gt;T&lt;span style="text-align: justify; "&gt;he Acts also specify certain federal and state law enforcement agencies that may undertake surveillance&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.&lt;/td&gt;
&lt;td&gt;Brazil&lt;/td&gt;
&lt;td&gt;&lt;b style="text-align: justify; "&gt;Federal Law No. 9,296, 1996&lt;/b&gt;&lt;span style="text-align: justify; "&gt;:&lt;/span&gt; 
&lt;ul&gt;
&lt;li&gt;Regulates wiretapping&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt; &lt;span style="text-align: justify; "&gt;Authorisation for interception is granted on a &lt;b&gt;Judge’s order&lt;/b&gt; for a period of 15 days at a time&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Interception is only allowed for investigations into serious offences like drug smuggling, corruption murder and kidnapping&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.&lt;/td&gt;
&lt;td&gt;Canada&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Criminal Code, 1985&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Governs general rules of criminal procedure including search and seizure protocols&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Relevant Provision: §§ 184.2, 184.4&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Grants power to intercept communication by obtaining authorisation from a &lt;/span&gt;&lt;b style="text-align: justify; "&gt;provincial court judge or a judge of the superior court&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Before granting his authorisation, the judge must be satisfied that either the originator of the communication or the recipient thereof  has given his/her consent to the interception&lt;/li&gt;
&lt;li&gt;Under exceptional circumstances, however, a police officer owing to the exigency of the situation may intercept communication without prior authorisation&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.&lt;/td&gt;
&lt;td&gt;France&lt;/td&gt;
&lt;td&gt;&lt;b style="text-align: justify; "&gt;&lt;i&gt;Loi d'orientation et de programmation pour la performance de la sécurité intérieure&lt;/i&gt;&lt;/b&gt;&lt;b style="text-align: justify; "&gt; (LOPPSI 2), 2011&lt;/b&gt;&lt;span style="text-align: justify; "&gt;:&lt;/span&gt; 
&lt;ul&gt;
&lt;li&gt;Authorises use of video surveillance and interception of communications&lt;/li&gt;
&lt;li&gt;Relevant Provisions: Article 36&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;&lt;i&gt;Loi de Programmation Militaire&lt;/i&gt;&lt;/b&gt;&lt;b&gt; (LPM), 2013&lt;/b&gt;: 
&lt;ul&gt;
&lt;li&gt;Authorises&lt;b&gt; &lt;/b&gt;surveillance for protection of national security and prevention of terrorism&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt; &lt;span style="text-align: justify; "&gt;Interception of comm&lt;b&gt;unication under LOPPSI 2 requires previous authorization from an investigating Judge after consultation with the Public Prosecutor&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;
&lt;div style="text-align: left; "&gt;Such authorization is granted for a period of 4 months which is further extendable by another 4 months&lt;/div&gt;
&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;
&lt;div style="text-align: left; "&gt;&lt;span style="text-align: justify; "&gt;
&lt;div style="text-align: left; "&gt;&lt;span style="text-align: justify; "&gt;Interception of communication &lt;b&gt;under LPM does not require prior sanction from an investigating judge and is instead provided by the &lt;/b&gt;&lt;/span&gt;&lt;span style="text-align: justify; "&gt;&lt;b&gt;Prime Minister’s office&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Information that can be intercepted under LPM includes not only metadata but also content and geolocation services&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.&lt;/td&gt;
&lt;td&gt;Germany&lt;/td&gt;
&lt;td&gt;&lt;span style="text-align: justify; "&gt; &lt;/span&gt;&lt;b style="text-align: justify; "&gt;&lt;i&gt;Gesetz zur Beschränkung des Brief-, Post und Fernmeldegeheimnisses &lt;/i&gt;(G10 Act)&lt;i&gt;, &lt;/i&gt;2001&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Imposes restrictions on the right to privacy and authorizes surveillance for protecting freedom and democratic order, preventing terrorism and illegal drug trade&lt;/li&gt;
&lt;li&gt;Relevant Provisions: §3&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;The German Code of Criminal Procedure (StPO), 2002&lt;/b&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Lays down search and seizure protocol and authorizes interception of telecommunications for criminal prosecutions&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Relevant Provisions: §§ 97, 100a&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Authorises &lt;/span&gt;&lt;b style="text-align: justify; "&gt;warrantless&lt;/b&gt;&lt;span style="text-align: justify; "&gt; surveillance by specific German agencies like the &lt;/span&gt;&lt;i style="text-align: justify; "&gt;Bundesnachrichtendienst &lt;/i&gt;&lt;span style="text-align: justify; "&gt;(Federal Intelligence Service)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Lays down procedure that must be followed while undertaking surveillance and intercepting communications&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Authorises sharing of intercepted intelligence for criminal prosecutions&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Mandates &lt;/span&gt;&lt;i style="text-align: justify; "&gt;ex post&lt;/i&gt;&lt;span style="text-align: justify; "&gt; notification to persons whose privacy has been violated but no judicial remedies are available to such persons&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;The Code of Criminal Procedure authorises interception of communication of a person suspected of being involved in a serious offence only on the &lt;b&gt;order of a court&lt;/b&gt; upon &lt;b&gt;application by the public prosecution office&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6.&lt;/td&gt;
&lt;td&gt;Pakistan&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Pakistan Telecommunications Reorganisation Act, 1996:&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Controls the flow of false and fabricated information and protects national security&lt;/li&gt;
&lt;li&gt;Relevant Provisions: § 54&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;Investigation for Fair Trial Act, 2013:&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Regulates the powers of law enforcement and intelligence agencies regarding covert surveillance and interception of communications&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: left; "&gt;Relevant Provisions:  §§ 6,7, 8, 9&lt;/span&gt;&lt;span style="text-align: left; "&gt; &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Authorisation for interception is provided by the &lt;/span&gt;&lt;b style="text-align: justify; "&gt;federal government&lt;/b&gt;&lt;span style="text-align: justify; "&gt;. No formal legal structure to monitor surveillance exists&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Interception can be authorized in the interest of national security and on the apprehension of any offence&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Requests for filtering and blocking of content are routed through the Inter-Ministerial Committee for the Evaluation of Websites, a confidential regulatory body&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Under the Fair Trial Act, interception can only be authorised on application to the &lt;/span&gt;&lt;b style="text-align: justify; "&gt;Fedral Minister for Interior&lt;/b&gt;&lt;span style="text-align: justify; "&gt; who shall then permit the application to be placed before a &lt;/span&gt;&lt;b style="text-align: justify; "&gt;High Court Judge&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The warrant shall be issued by a judge only on his satisfaction that interception will aid in the collection of evidence and that a reasonable threat of the commission of a scheduled offence exists&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7.&lt;/td&gt;
&lt;td&gt;South Africa&lt;/td&gt;
&lt;td&gt;&lt;b style="text-align: justify; "&gt;The Regulation of Interception of Communications and Provision of Communication-related Information Act, 2002&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Regulates and authorizes monitoring and interception of telecommunications services&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: left; "&gt;Relevant Provisions: §§ 16, 22&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Warrant for intercepting communications and installing surveillance devices is granted by a &lt;/span&gt;&lt;b style="text-align: justify; "&gt;designated judge&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The warrant is issued on satisfaction of the judge that the investigation relates to a serious offence or that the information gathering is vital to public health or safety, national security or compelling national economic interests&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8.&lt;/td&gt;
&lt;td&gt;United Kingdom&lt;/td&gt;
&lt;td&gt;&lt;b style="text-align: justify; "&gt;Regulation of Investigatory Powers Act, 2000&lt;/b&gt;&lt;span style="text-align: justify; "&gt;:&lt;/span&gt; 
&lt;ul&gt;
&lt;li&gt;Authorises interception of communications and surveillance&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: left; "&gt;Relevant Provisions: §§ 5, 6, 65&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Authorisation for interception is granted in the form of a warrant by the &lt;/span&gt;&lt;b style="text-align: justify; "&gt;Secretary of State &lt;/b&gt;&lt;span style="text-align: justify; "&gt;or in certain special cases by a &lt;/span&gt;&lt;b style="text-align: justify; "&gt;‘senior officer’&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Communications can be intercepted only it is necessary to do so in the interest of national security or for the purpose of preventing and detecting serious crimes&lt;/li&gt;
&lt;li&gt;Complaints of alleged illegal surveillance are heard by the Investigatory Powers Tribunal&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9.&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;&lt;b style="text-align: justify; "&gt;Electronic Communications Privacy Act, 1986 (Title III, Omnibus Crime Control and Safe Streets Act)&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Governs authorisation for wiretapping and interception&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: left; "&gt;Relevant Provisions: §18&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Authorisation for interception can be granted by &lt;/span&gt;&lt;b style="text-align: justify; "&gt;a  district court or federal appeals court&lt;/b&gt;&lt;span style="text-align: justify; "&gt; on application by a law enforcement officer duly signed by the attorney general&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Application mandates obtaining the information through a service provider before invading upon individual’s privacy&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide'&gt;https://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bedaavyasa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>surveillance technologies</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2014-07-10T07:50:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/mobilising-support-for-freedom-on-web">
    <title>Mobilising support for freedom on the Web</title>
    <link>https://cis-india.org/news/mobilising-support-for-freedom-on-web</link>
    <description>
        &lt;b&gt;A motion in the Rajya Sabha has sought annulment of the IT intermediary guidelines, writes Deepa Kurup in this article published in the Hindu on April 22, 2012.&lt;/b&gt;
        
&lt;p&gt;A research, or a sting operation, conducted by researchers at the Centre for Internet and Society in October 2011 — a few months after the Information Technology (Intermediary Guidelines) Rules were notified — revealed some inherent flaws in the guidelines laid down by the Indian government. The results of the study made news, particularly after Union Minister for IT, Kapil Sibal, asked Internet companies and Web service providers to screen content.&lt;br /&gt;&lt;br /&gt;The study revealed that companies were only too eager to comply with take-down notices or requests, in order to avoid further hassles, particularly legal ones.&lt;br /&gt;&lt;br /&gt;Rishab Dara, a researcher who was part of this ‘sting', pointed out that unless the content was commercial, or had potential commercial interest, companies preferred to err on the side of caution.&lt;br /&gt;&lt;br /&gt;Addressing an audience at a panel discussion, titled ‘Resisting Internet censorship: strategies for furthering freedom of expression in India', held at the Bangalore International Centre, Mr. Dara pointed out that search engines did not invest enough resources to check how valid the claims were, before taking down over 2,000 URLs related to a random complaint or take-down notice sent by them. His study underlined the need for debate and discussion on the intermediary guidelines, locating this in the larger context of freedom on the Web.&lt;br /&gt;&lt;br /&gt;The discussion, organised by the Centre for Internet and Society, was moderated by the former journalist and academic, Paranjoy Guha Thakurta. The audience and the panel comprised a diverse lot: from students, netizens and academics to those who were directly involved in the business of publishing content or hosting Web content. While a substantial part of the discussion dealt with the legal aspects of the notified rules, and how it may contradict the constitutional rights of citizens, a section of the debate also delved into whether the Web as a medium needed to be policed at all.&lt;br /&gt;&lt;br /&gt;If panellist Mahesh Murthy, Chief Executive Officer of Pinstorm, argued vociferously for unfettered freedom on the Web and accused the government of being threatened by movements such as the anti-corruption campaign led by Anna Hazare (which he said was largely mobilised on the Web), another panellist Na. Vijayshankar, Cyber Law College, who claimed he was among those instrumental in bringing down the pornographic cartoon portal Savitabhabhi.com, argued that though these rules need to be withdrawn, there are “boundaries” to what can be posted and said on the Web.&lt;br /&gt;&lt;br /&gt;Another section of the audience brought up the issues of hate speech on the Web, and pointed out that in some cases there was a need to pin liability on those who generate content that incites hatred.&lt;br /&gt;&lt;br /&gt;Sudhir Krishnaswamy, Centre for Law and Policy Research, pointed out that currently the way the issue was being played out in court, the discourse was more about companies.&lt;br /&gt;&lt;br /&gt;“The debate is not about users today. Companies are trying to duck liabilities, rather than deal with substantive issues of free speech,” he said, pointing to the complexities in locating liability for content.&lt;br /&gt;&lt;br /&gt;Speaking from the publisher's perspective, B.G. Mahesh, OneIndia.in, an online news and entertainment portal, spoke of specific cases where his portal had been targeted by the Chennai Cybercrime cell for hosting a news story (syndicated from a news agency) that was declared defamatory. “We took it down, but there was no answer from them when we asked for an explanation,” he said, adding that in such cases there is tremendous pressure and harassment from authorities, leaving publishers with no choice but to comply.&lt;br /&gt;&lt;br /&gt;Though the IT intermediary rules were notified in April 2011, the issue made headlines when Union Minister for Information and Communication Technology Kapil Sibal asked private companies or Web service providers to pre-screen content, a statement which he later withdrew.&lt;br /&gt;&lt;br /&gt;Also discussed in detail were the complexities posed by a medium like the World Wide Web, and what were the reasonable restrictions to free speech on the Web. Does one need a separate legal dispensation to deal with this medium, Mr. Thakurta asked. While emphasising that the solution does not lie in “knee-jerk reactions”, such as the rules that have been proposed, he pointed out that the bid to control flow of information was a simple manifestation of the utter helplessness and inability of the government — and governments worldwide — to control the Web. Be it in West Bengal, where a professor is held for sharing a cartoon, or with the Union government that beckons corporates to pre-screen the Web, these acts are a manifestation of a “combination of arrogance and stupidity”, he said.&lt;br /&gt;&lt;br /&gt;Subsequently, in February, Rajya Sabha member from Kerala, P. Rajeeve, moved a statutory motion in the Rajya Sabha seeking that these guidelines be annulled on the grounds that it allowed intermediaries protection from legal liability in return for trading away freedom of expression of users.&lt;br /&gt;&lt;br /&gt;In the Parliamentary session that will start next week, this is likely to come up for discussion, and across the country, rights activists are mobilising support and lobbying with legislators to garner support for this annulment.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.thehindu.com/news/states/karnataka/article3340032.ece"&gt;Read the original here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/mobilising-support-for-freedom-on-web'&gt;https://cis-india.org/news/mobilising-support-for-freedom-on-web&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-04-25T11:02:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/mobile-trust-and-privacy">
    <title>Mobile, Trust and Privacy</title>
    <link>https://cis-india.org/internet-governance/news/mobile-trust-and-privacy</link>
    <description>
        &lt;b&gt;Sunil Abraham was a speaker at the event organized by GSM Association on September 4, 2014. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;More consumers now use their mobiles to go online to access information  and services. Mobile plays a central role in driving economic growth and  social opportunities. However, it is important that people can interact  and access services in a trusted and secure environment that protects  their online privacy.&lt;br /&gt; Increasingly, mobile ecosystems acquire  consumers’ data by default, while smartphones broadcast data by default.  These ‘default’ positions challenge current data protection and privacy  legal frameworks, and consumers’ ability to manage their privacy and  online identities.&lt;br /&gt; A key ingredient for strengthening trust in a  mobile connected world is a user-centred privacy framework that applies  to all digital and identity services whether in retail, healthcare,  government, banking or any other sector.&lt;br /&gt; The GSMA recently published  global research showing trust matters and that mobile users want better  transparency and choice over how their personal data are used. They  also expect all companies accessing their data to treat their privacy  consistently.&lt;br /&gt; This workshop aims to bring together leading  representatives from a broad spectrum of stakeholder groups to discuss  privacy-related issues and ways to enhance mobile users’ trust. &lt;br /&gt; Questions to address include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; How can citizens – in both developed and developing countries – benefit from the responsible use of mobile-derived data?&lt;/li&gt;
&lt;li&gt;What are the key emerging issues and challenges of a mobile hyper-connected world?&lt;/li&gt;
&lt;li&gt;How can we ensure secure and trusted identities online?&lt;/li&gt;
&lt;li&gt;eds to be done to ensure consumers are able to access services in private, trusted and secure ways?&lt;/li&gt;
&lt;li&gt;What are the respective roles of law and industry self-regulation in enhancing trust?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;For full details &lt;a class="external-link" href="http://igf2014.sched.org/event/170880f1a2eb995fd2f61f7d9e37d28d#.VDERIVdIOo8"&gt;see the IGF website&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/mobile-trust-and-privacy'&gt;https://cis-india.org/internet-governance/news/mobile-trust-and-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-10-05T09:21:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/mobile-tech-4-social-change">
    <title>Mobile Tech 4 Social Change</title>
    <link>https://cis-india.org/events/mobile-tech-4-social-change</link>
    <description>
        &lt;b&gt;Mobile Tech 4 Social Change, Bangalore camp is a one-day event and is an exploration of mobile technology to advance social development and social change goals.&lt;/b&gt;
        
&lt;p&gt;Mobile Tech 4 Social Change Camps are local events for people passionate about using mobile technology for social impact and to make the world a better place.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mobile Tech 4 Social Change Camp in Bangalore includes: &lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;interactive discussions about mobile tech for social good,&lt;br /&gt;&lt;/li&gt;&lt;li&gt;hands-on-demos of mobile apps and tools,&lt;br /&gt;&lt;/li&gt;&lt;li&gt;collaborations about ways to use, deploy, develop and promote mobile technology in health, advocacy, economic development, environment, human rights, and citizen media&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Participants for Mobile Tech 4 Social Change barcamps include nonprofits, mobile application developers, researchers, donors, intermediary organizations, and mobile operators.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;In short, Mobile Tech 4 Social Change Bangalore Camp is: &lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;A one-day event in Bangalore on September 4, 2009&lt;/li&gt;&lt;li&gt;An exploration of mobile technology to advance social development and social change goals&lt;/li&gt;&lt;li&gt;Participatory and interactive&lt;/li&gt;&lt;li&gt;Open to anyone with passion and interest in the topic&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Participants&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;YOU - register today! &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Cost&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Mobile Tech 4 Social Change camps are grassroots events. We are charging a small fee for this event that is used to offset costs for breakfast and lunch as well as supplies for the camp. If this cost constitutes a huge barrier for you attending, please be in touch so that we can work something out! &lt;/li&gt;&lt;/ul&gt;
&lt;h1&gt;&lt;strong&gt;Planners and Sponsors&lt;/strong&gt;&lt;/h1&gt;
&lt;p&gt;Mobile Tech 4 Social Change Bangalore is organized by the following organizations.&amp;nbsp; We are very grateful for this collaboration and support. &lt;/p&gt;
&lt;p&gt;&lt;img src="http://www.cis-india.org/logo.png" alt="" height="130" width="295" /&gt;&lt;img src="http://mobileactive.org/files/images/wlpfulllogo.jpg" alt="" height="123" width="251" /&gt;&lt;img src="http://momoamsterdam.files.wordpress.com/2007/04/logo_mobilemonday_hi_res_color.jpg" alt="" height="51" width="130" /&gt; India&lt;img src="http://mobileactive.org/files/images/mobileactivefile73.jpg" alt="" height="168" width="357" /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;If you want to be an angel and sponsor this community-supported event, we would love to hear from you!&lt;/p&gt;
videos



&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbCAGQA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbCAXgA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbCERgA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbDHZQA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbGZZAA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbGaIgA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbGbcQA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbG%2BfwA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbG_XQA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbHAHQA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbHAYwA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbHAeQA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbHBLQA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbHCegA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgbHDYgA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbHETgA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/mobile-tech-4-social-change'&gt;https://cis-india.org/events/mobile-tech-4-social-change&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>radha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-05T04:32:26Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/mobile-net-ban-during-peaceful-protest-leaves-farmers-confused">
    <title>Mobile net ban during peaceful protest leaves farmers confused</title>
    <link>https://cis-india.org/internet-governance/blog/mobile-net-ban-during-peaceful-protest-leaves-farmers-confused</link>
    <description>
        &lt;b&gt;Strap: Administration says it was done to prevent rumours from spreading, protesters insist they needed internet to fight it.&lt;/b&gt;
        &lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;In Sikar district, about 15,000 farmers had staged a protest at Krishi Upaj Mandi on 1 September 2017 under the banner of All India Kisan Sabha. Their major demands were farm loan waiver, pension for farmers and implementation of the recommendations of the Swaminathan Commission. The protest had the support of students, traders' associations, anganwadi workers, transport unions and a few other organisations. About 100,000 people joined farmers in a solidarity march during the next 13 days.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;The demonstrations continued and when talks with the government failed, thousands of farmers set out to lay siege to the district collector's office and block highways on September 11. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;Accordingly, the district administration clamped prohibitory orders under Section 144 of Criminal Procedure Code, restricting assembly of five or more people, and blocked mobile internet in the district.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/RajasthanFarmerProtest2.JPG/@@images/a9e6d382-e304-4f4c-a983-47b064e621eb.jpeg" alt="Rajasthan Farmers Protest " class="image-inline" title="Rajasthan Farmers Protest " /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/RajasthanFarmerProtest1.JPG/@@images/a7bca141-ad0d-452a-a64d-4ac73fd20801.jpeg" alt="Rajasthan Farmers Protest " class="image-inline" title="Rajasthan Farmers Protest " /&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Kishan Pareek, district secretary of Communist Party of India (Marxist) which took part in the protest, contended that though the government says the ban was enforced to check the spread of violence, the actual motive was something else. He says the administration was vying to stifle their movement but couldn’t use force as the protesters were peaceful.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;"So, they resorted to spreading rumours to provoke us to commit any violent activity. If internet was working that time, we could have easily denied those [rumours],” he says.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;According to Pareek, the rumours that circulated that day included: the protest has turned violent at some location, police have fired bullets/charged baton at the protesters, additional force has been called in from Jaipur etc. As broadband was operational, the organisers managed to counter falsehood with facts and the misinformation didn't spread outside Sikar. Pareek says whichever protest-spot the rumours portrayed as violence-ridden, their social media team shared videos from there on Facebook to counter them.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;i&gt;Pictures above: &lt;/i&gt;&lt;span&gt;&lt;i&gt;Thousands of farmers held a protest at Krishi Upaj Mandi, Sikar in September 2017&lt;/i&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;span&gt;Nevertheless, in the absence of mobile internet, farmers’ teams that had gathered at various highways to block roads had difficulty processing the false information that was trickling in. Though it created much confusion among them, it failed to instigate them.&lt;/span&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Rajpal Singh, a Sikar-based member of CPI(M)'s social media wing, informed that the mainstream media didn't give much attention to the protest. He says it were local websites and newspapers that covered the event, which is why the administration banned internet, hoping restriction on the flow of information would throw a spanner in the works. Apart from local news websites, local Facebook pages -- Sikar Aapno, Sikar Sandesh, We love CPIM- Dhod and CPIM Sikar, etc. -- were giving minute-by-minute updates of the farmers' protest.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;The internet services were resumed in Sikar a day later as the protest did not get violent and the protesters were not found circulating any provocative content.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;A former CPI(M) MLA, president of All India Kisan Sabha and leader of the farmers' agitation, Amara Ram, told 101Reporters that one of the very reasons their movement enjoyed humongous public support was its peaceful nature. He says as their movement unfolded, people from Sikar and outside realised this protest would not turn violent and it’s a cause that needed support.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;As cautious as the government might have been about the September 11 protest, police presence indicated that the law-enforcement agency did not perceive it as a threat. One of the protesters, Nemichand, says only 50-odd policemen had been deputed for the protest march of 15,000+ farmers to the district collectorate. He claimed that the number of men in khaki dwindled to 20 by the afternoon.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;He alleged that the real reason for internet shutdown was stopping the dissemination of news about their protest as it exposes the Modi government's inconsiderate approach towards farmers.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;“Everybody in Sikar was talking about the internet ban. Since there was no legitimate reason for the ban, the government couldn’t continue with it, fearing how they will justify,” he says.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/RajasthanFarmerProtest3.png/@@images/3258a626-8fce-4784-9977-098c720496af.png" style="text-align: justify; " title="Rajasthan Farmers Protest " class="image-inline" alt="Rajasthan Farmers Protest " /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;td&gt;
&lt;div id="_mcePaste"&gt;
&lt;p class="normal" style="text-align: justify; "&gt;The administration confirmed that the ban was imposed fearing threat to law and order in the district due to the gathering of thousands. “Though they were protesting peacefully the initial ten days at the &lt;i&gt;mahapadav,&lt;/i&gt; they had planned to block the district collectorate on September 11 in thousands. To restrict their movement, internet was suspended in Sikar. During such situations, no one writes positive about the administration. We didn’t want to provide them a platform for spreading rumours that could have made the protestors violent. If there had been no internet ban that day, something big would have happened,” Jai Prakash Narayan, additional district collector and additional district magistrate, told 101reporters.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;“Broadband was made working during the internet ban so that the private and government offices were not affected. While giving order for internet ban, it is made sure that normal call and broadband facilities are not debarred. General masses are affected but internet shutdown is the only option we have,” he added. “While their blockade continued for three days, we restricted internet services only for first 24 hours as the protest had gained stability till then.”&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Even three months after the high-powered ministerial committee was formed to look into the farmers’ demand, nothing has been done. Now, they plan to stage a protest in February 2018 when the state assembly will be in function.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Former CPI(M) MLA Pema Ram says, “Preparation for February protest has already begun. Kisan Sansads are being organised in Sikar, where active farmers from each village participate to raise demands regarding implementation of the recommendations of the Swaminathan Commission report, a solution to the menace of stray cattle, complete farm loan waiver and pension for farmers. They then discuss it with other farmers in their villages.”&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;i&gt;Pictures above:  Apart from local news websites, local Facebook pages - Sikar Aapno, Sikar Sandesh, We love CPIM- Dhod and CPIM Sikar, etc. - were giving minute-by-minute updates of the farmers' protest. &lt;/i&gt;Pictures courtesy: Shruti Jain&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;strong&gt;&lt;i&gt;(Shruti Jain is a Jaipur-based journalist and a member of &lt;/i&gt;&lt;/strong&gt;&lt;a href="https://101reporters.com/"&gt;&lt;strong&gt;&lt;i&gt;101Reporters.com&lt;/i&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;&lt;i&gt;, a pan-India network of grassroots reporters.)&lt;/i&gt;&lt;/strong&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/mobile-net-ban-during-peaceful-protest-leaves-farmers-confused'&gt;https://cis-india.org/internet-governance/blog/mobile-net-ban-during-peaceful-protest-leaves-farmers-confused&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shruti Jain</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Shutdown</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-01-19T15:20:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
