<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1431 to 1445.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/interview-with-the-tactical-technology-collective"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/interview-with-citizen-lab-on-internet-filtering"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-november-30-2012-video-interview-with-pranesh-prakash"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/interview-with-finnish-data-protection-ombudsman"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/interview-with-irish-data-protection-commissioner"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/interview-with-mathew-thomas-from-the-say-no-to-uid-campaign"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/interview-with-berlin-data-protection-commissioner"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/interview-with-bruce-schneier"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/interview-with-big-brother-watch-on-privacy-and-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/abigail-d-pershing-yale-journal-of-international-law-interpreting-the-outer-space-treaty-s-non-appropriation-principle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/internet-driven-developments"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/internet-transparency-and-politics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/internet-szabadon"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-social-media-access-should-not-be-blocked-ban"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/interview-with-the-tactical-technology-collective">
    <title>Interview with the Tactical Technology Collective on Privacy and Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/interview-with-the-tactical-technology-collective</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society recently interviewed Anne Roth from the Tactical Technology Collective in Berlin. View this interview and gain an insight on why we should all "have something to hide"!&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;For all those of you who haven't heard of the &lt;a class="external-link" href="https://tacticaltech.org/about"&gt;Tactical Technology Collective&lt;/a&gt;, it's a Berlin and Bangalore-based non-profit organisation which aims to advance the skills, tools and techniques of rights advocates, empowering them to  use information and communications to help marginalised communities  understand and effect progressive social, environmental and political  change.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tactical Tech's &lt;a class="external-link" href="https://tacticaltech.org/what-we-do"&gt;Privacy &amp;amp; Expression programme&lt;/a&gt; builds the digital security awareness and capacity of human rights  defenders, independent journalists, anti-corruption advocates and  activists. The programme's activities range from awareness-raising comic  films aimed at audiences new to digital security issues, to direct  training and materials for high-risk defenders working in some of the  world's most repressive environments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="https://tacticaltech.org/team"&gt;Anne Roth&lt;/a&gt; works with Tactical Tech on the Privacy &amp;amp; Expression programme as a researcher and editor. &lt;span&gt; &lt;span&gt;Anne holds a degree in political science from the Free  University of Berlin. She cofounded one of the first interactive media  activist websites, Indymedia, in Germany in 2001 and has been involved  with media activism and various forms of activist online media ever  since. She has worked as a web editor and translator in the past. Since  2007 she has written a blog that covers privacy, surveillance, media,  net politics and feminist issues.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;The Centre for Internet and Society interviewed Anne Roth on the following questions:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
 &lt;ol&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;How do you define privacy?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Can privacy and freedom of expression co-exist? Why/ Why 	not?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;What is the balance between Internet freedom and 	surveillance?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;According to research, most people worldwide care about 	their online privacy – yet they give up most of it through the use 	of social networking sites and other online services. Why, in your 	opinion, does this occur and what are the potential implications?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Should people have the right to give up their right to 	privacy? Why/ Why not?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;What implications on human rights can mass surveillance 	potentially have?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;“I'm not a terrorist and I have nothing to hide...and 	thus surveillance can't affect me personally”. Please comment.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Do we have Internet freedom?&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;VIDEO &lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/QZsFf_Qyqyo" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/interview-with-the-tactical-technology-collective'&gt;https://cis-india.org/internet-governance/blog/interview-with-the-tactical-technology-collective&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-18T09:56:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/interview-with-citizen-lab-on-internet-filtering">
    <title>Interview with the Citizen Lab on Internet Filtering in India</title>
    <link>https://cis-india.org/internet-governance/blog/interview-with-citizen-lab-on-internet-filtering</link>
    <description>
        &lt;b&gt;Maria Xynou recently interviewed Masashi Crete-Nishihata and Jakub Dalek from the Citizen Lab on internet filtering in India. View this interview and gain an insight on Netsweeper and FinFisher!&lt;/b&gt;
        &lt;p&gt;A few days ago, Masashi Crete-Nishihata (research manager) and Jakub Dalek (systems administrator) from the Citizen Lab visited the Centre for Internet and Society (CIS) to share their research with us.&lt;/p&gt;
&lt;p&gt;The Citizen Lab is an interdisciplinary laboratory based at the Munk  School of Global Affairs at the University of Toronto, Canada. The  OpenNet Initiative is one of the Citizen Lab's ongoing projects which  aims to document patterns of Internet surveillance and censorship around  the world. OpenNet.Asia is another ongoing project which focuses on  censorship and surveillance in Asia.&lt;/p&gt;
&lt;p&gt;The following video entails an interview of both Masashi Crete-Nishihata and Jakub Dalek on the following questions:&lt;/p&gt;
&lt;p&gt;1. Why is it important to investigate Internet filtering around the world?&lt;/p&gt;
&lt;p&gt;2. How high are the levels of Internet filtering in India, in comparison to the rest of the world?&lt;/p&gt;
&lt;p&gt;3. "Censorship and surveillance of the Internet aim at tackling crime and terrorism and in increasing overall security." Please comment.&lt;/p&gt;
&lt;p&gt;4. What is Netsweeper and how is it being used in India? What consequences does this have?&lt;/p&gt;
&lt;p&gt;5. What is FinFisher and how could it be used in India?&lt;/p&gt;
&lt;p&gt;Video&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/4Z9Iq_cIJgw" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/interview-with-citizen-lab-on-internet-filtering'&gt;https://cis-india.org/internet-governance/blog/interview-with-citizen-lab-on-internet-filtering&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-06-26T09:47:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-november-30-2012-video-interview-with-pranesh-prakash">
    <title>Interview with Pranesh Prakash</title>
    <link>https://cis-india.org/news/livemint-november-30-2012-video-interview-with-pranesh-prakash</link>
    <description>
        &lt;b&gt;Pranesh Prakash of the Centre for Internet and Society talks to Mint’s Surabhi Agarwal about the controversial Section 66A of the IT Act and the government’s decision to tweak it. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This video was &lt;a class="external-link" href="http://origin-www.livemint.com/Multimedia/NXN6HB1L1UOLFyI8mwXUEJ/Video--Interview-with-Pranesh-Prakash.html"&gt;published in LiveMint &lt;/a&gt;on November 30, 2012:&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/TqDX3Y0jFhc" width="420"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-november-30-2012-video-interview-with-pranesh-prakash'&gt;https://cis-india.org/news/livemint-november-30-2012-video-interview-with-pranesh-prakash&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2012-11-30T06:58:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/interview-with-finnish-data-protection-ombudsman">
    <title>Interview with Mr. Reijo Aarnio - Finnish Data Protection Ombudsman</title>
    <link>https://cis-india.org/internet-governance/blog/interview-with-finnish-data-protection-ombudsman</link>
    <description>
        &lt;b&gt;Maria Xynou recently interviewed Mr. Reijo Aarnio, the Finnish Data Protection Ombudsman, at the CIS' 5th Privacy Round Table. View this interview and gain an insight on recommendations for better data protection in India! &lt;/b&gt;
        &lt;p&gt;Mr. Reijo Aarnio - the Finnish Data Protection Ombudsman - was interviewed on the following questions:&lt;/p&gt;
&lt;p&gt;1. What activities and functions does the Finnish data commissioner's office undertake?&lt;/p&gt;
&lt;p&gt;2. What powers does the Finnish Data commissioner's office have? In your opinion, are these sufficient? Which powers have been most useful? If there is a lack, what would you feel is needed?&lt;/p&gt;
&lt;p&gt;3. How is the office of the Finnish data protection commissioner funded?&lt;/p&gt;
&lt;p&gt;4. What is the organizational structure at the Office of the Finnish Data Protection Commissioner and the responsibilities of the key executives?&lt;/p&gt;
&lt;p&gt;5. If India creates a Privacy Commissioner, what structure/framework would you suggest for the office?&lt;/p&gt;
&lt;p&gt;6. What challenges has your office faced?&lt;/p&gt;
&lt;p&gt;7. What is the most common type of privacy violation that your office is faced with?&lt;/p&gt;
&lt;p&gt;8. Does your office differ from other EU data protection commissioner offices?&lt;/p&gt;
&lt;p&gt;9. How do you think data should be regulated in India?&lt;/p&gt;
&lt;p&gt;10. Do you support the idea of co-regulation or self-regulation?&lt;/p&gt;
&lt;p&gt;11. How can India protect its citizens' data when it is stored in foreign servers?&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/zJzWD4LWLhY" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/interview-with-finnish-data-protection-ombudsman'&gt;https://cis-india.org/internet-governance/blog/interview-with-finnish-data-protection-ombudsman&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-19T13:02:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/interview-with-irish-data-protection-commissioner">
    <title>Interview with Mr. Billy Hawkes - Irish Data Protection Commissioner</title>
    <link>https://cis-india.org/internet-governance/blog/interview-with-irish-data-protection-commissioner</link>
    <description>
        &lt;b&gt;Maria Xynou recently interviewed Mr. Billy Hawkes, the Irish Data Protection Commissioner, at the CIS´ 4th Privacy Round Table meeting. View this interview and gain an insight on recommendations for data protection in India!&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The Irish Data Protection Commissioner was asked the following questions:&lt;/p&gt;
&lt;p&gt;1. What powers does the Irish Data Commissioner´s office have? In your opinion, are these sufficient? Which powers have been most useful? If there is a lack, what would you feel is needed?&lt;/p&gt;
&lt;p&gt;2. Does your office differ from other EU data protection commissioner offices?&lt;/p&gt;
&lt;p&gt;3. What challenges has your office faced? What is the most common type of privacy violation that your office has faced?&lt;/p&gt;
&lt;p&gt;4. Why should privacy legislation be enacted in India?&lt;/p&gt;
&lt;p&gt;5. Does India need a Privacy Commissioner? Why? If India creates a Privacy Commissioner, what structure / framework would you suggest for the office?&lt;/p&gt;
&lt;p&gt;6. How do you think data should be regulated in India? Do you support the idea of co-regulation or self-regulation?&lt;/p&gt;
&lt;p&gt;7. How can India protect its citizens´ data when it is stored in foreign servers?&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;video  &lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYOTmT4A.html?p=1" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/interview-with-irish-data-protection-commissioner'&gt;https://cis-india.org/internet-governance/blog/interview-with-irish-data-protection-commissioner&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T11:06:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/interview-with-mathew-thomas-from-the-say-no-to-uid-campaign">
    <title>Interview with Mathew Thomas from the Say No to UID campaign - UID Court Cases</title>
    <link>https://cis-india.org/internet-governance/blog/interview-with-mathew-thomas-from-the-say-no-to-uid-campaign</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) recently interviewed Mathew Thomas from the Say No to UID campaign about his ongoing efforts to challenge the UID scheme legally in the Bangalore High Court and Supreme Court of India. Read this interview and gain an interesting insight on recent legal developments with regards to the UID!&lt;/b&gt;
        
&lt;h3&gt;&lt;b&gt;Hi Mathew! We've heard that you've been in court a lot over the last few years with regards to the UID scheme. Could you please tell us about the UID case you have filed?&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY" class="western"&gt;In early 2012, I filed a civil suit at the Bangalore Court to declare the UID scheme illegal and to stop further biometric enrollments. I alleged that foreign agencies are involved in the process of biometric enrollment, and that cases of corruption have occurred with regards to the companies contracted by the UID Authority of India (UIDAI). Many dubious companies have been empanelled  for biometric enrollments by the UIDAI and many cases of corruption have been noted, especially with regards to the preparation of biometric databases for below poverty line (BPL) ration cards in Karnataka.&lt;/p&gt;

&lt;p align="JUSTIFY" class="western"&gt;In 2010, according to a government audit report, COMAT Technologies Private Limited had a contract with the Karnataka Government and was required to undertake a door-to-door survey and to set up biometric devices. COMAT Technologies Private Limited was paid ₹ 542.3 million for this purpose, but it turns out that the company did not comply with the terms of the contract and did not fullfill its obligations under the contract. Even though COMAT Technologies Private Limited had been contracted and had been paid ₹ 542.3 million, the company did not hand over any biometric device to the Karnataka Government. Instead, when the company got questioned, it walked away from the contract in 2010, even though it had been paid for a service it did not deliver.&lt;/p&gt;

&lt;p style="text-align: justify; "&gt;In the same year, 2010, COMAT Technologies was empanelled as an Enrolling Agency of the UIDAI. COMAT Technologies also carries out enrollments in Mysore and a TV  channel sting operation revealed that fake IDs were being issued in the  Mysore enrollment center. After much persuasion, the e-Government department of Karnataka informed me that they have filed an FIR. And this is just one case of a corrupt company empanelled as an enrollement agency with the UIDAI. Many similar cases with other companies have occurred in other cities in India, such as Mumbai, where the empanelled agencies have committed fraud and police complaints have been filed. But unfortunately, there is no publicly available information on the state of the investigations.&lt;/p&gt;

&lt;p align="JUSTIFY" class="western"&gt;As such, I filed a case at the Bangalore Court and stated that the whole UID system is insecure, that it will not achieve the objective of preventing leakages of welfare subsidies and that, therefore, it is a waste of public funds, which also affects individuals' right to privacy and right to life. In my complaint in the civil court I made allegations of corruption and dangers to national security backed by documentary evidence. According to Order 8 of the Civil Procedure Code (CPC), defendants are required to specifically deny each of the allegations against them and if they don't, the court is required to accept the allegations as accurate. According to law, vague, bald denials are not acceptable in courts. Interestingly enough, the defendants in this court case did &lt;i&gt;not&lt;/i&gt; deny any of the allegations, but instead stated that they (allegations) are “trivial” and requested the judge to dismiss the case without a trial. The judge requested the defendants to file a written application, asking for the suit to be dismissed under Order 7, Rule 11, of the Civil Procedure Code. Nonetheless, in May 2012, the judge observed that this is a serious case which should not be dismissed and that he would like to have a daily hearing of the case, especially since the case was grounded on the allegation that thousands of crores of rupees of public money are spent every day.&lt;/p&gt;

&lt;p align="JUSTIFY" class="western"&gt;However, one month later in June 2012, the judge dismissed the case by stating that I did not have a “cause of action” and that the case is not of civil nature under Section 9 of the Code of Civil Procedure. I argued that tax payers have a right to know where their money is going and that we all have a right to privacy and that therefore, I &lt;i&gt;did&lt;/i&gt; have a cause for action. I quoted the Supreme Court case setting out the law relating to the meaning of “civil nature”. The Apex court said, “Anything which is not of criminal nature is of civil nature”. I also quoted several court precedents which explained conditions under which complaints could be dismissed under Order VII Rule 11. Unfortunately though, the judge dismissed all of this and  suggested that I should take this case to the High Court or to the Supreme Court, since the Bangalore Court did not have the authority to address the violation of fundamental human rights. In my opinion, the fallacy in this judgement was that, on the one hand, the judge stated in his order that there was “no cause for action”, but on the other hand, he said that I should take the case to the High Court or to the Supreme Court! And on top of that, the judge stated that my case was frivolous and levied on me a Rs. 25, 000 fine, because apparently I was “wasting the court's time” !&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;In addition to all of this, the judge made a very intriguing statement in his order: he claimed that the biometric enrollment with the UIDAI is voluntary and that therefore I need not enrol. I argued that although the UID is voluntary in theory, it is actually mandatory on many levels, especially since access to many governmental services require enrollment with the UIDAI. Nonetheless, the judge insisted that the UID is purely voluntary and that if I am not happy with the UID, then I should just “stay at home”.&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;And how did the case continue thereafter?&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY" class="western"&gt;In October 2012 I appealed against this to the High Court by stating that there was a misapplication of Order 7, Rule 11, of the Civil Procedure Code and requested the High Court to send the suit back for trial at the Bangalore Court.&lt;/p&gt;

&lt;p align="JUSTIFY" class="western"&gt;Now, when you appeal in India, the Court has to issue notices to the opposite party, which are usually sent by registered post. However, nothing was happening, so I filed a number of applications to hear the case. The registrar’s office filed a number of trivial “objections” with which I needed to comply and this took three months, until January 2013. For example, one “objection” was that the lower court order stated the date of the order as "03-07-12", whereas I had mentioned the date as 3 July 2012.  Then they would argue that the acknowledgement of the receipt of the notice from the respondents was not received. The High Court is located next to the head post office (GPO) in Bangalore and normally it would be sent there, then directly to the GPO in Delhi and from there to the Planning Commission or to the UIDAI. Yet, the procedure was delayed because apparently the notices weren't sent. In one hearing, the court clerk said that the address of the defendant was wrong and that the address of the Planning Commission should also be included. All in all, it seemed to me like there was some deliberate attempt to delay the procedure and the dismissal of the case by the Bangalore Court seemed very questionable. As a result, in January 2013, I asked the High Court to permit me to personally hand over my appeal to the Government Council. And finally, on 17th December 2013, my appeal was heard by the Bangalore High Court!&lt;/p&gt;

&lt;p align="JUSTIFY" class="western"&gt;Over the last three months, the defendants have not filed any counter affidavit. Instead, the Government Council came to the High Court and stated that I have not filed a “paper book” (which includes depositions and evidence, among other things). However, the judge stated that this is not a case which requires a “paper book”, since my appeal was about the misapplication of Order 7, Rule 11, of the Civil Procedure Code. Then the Government Council asked for more time to review the appeal and it is has been postponed.&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;Have there been any other recent court cases against the UID?&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY" class="western"&gt;Yes. While all of this was going on, retired judge, Justice Puttaswamy, filed a petition in the Supreme Court, stating that the UID scheme is illegal, since it violates article 73 of the Constitution. Aruna Roy, who is an activist at the National Council for People’s Right to Information, has also filed a petition where she has questioned the UID because it violates privacy rights and the rights of the poor.&lt;/p&gt;

&lt;p align="JUSTIFY" class="western"&gt;Furthermore, petitions have been filed in the Madras High Court and in the Mumbai High Court.  In 2012, it was argued in the Madras High Court that the only legal provision for taking fingerprints  exists under the Prisoners Act, whereas the UIDAI is taking the fingerprints of people who are not prisoners and therefore it is illegal. In 2013, Vikram Crishna, Kamayani Bahl and a few others argued in the Mumbai High Court that the right to privacy is being violated through the UID scheme. It is noteworthy that in most of these cases, the defendants have not filed any counter-arguments. The only exceptions were in the Aruna Roy and Puttaswamy cases, where the defendants claimed that the UID is secure and supported it in general. In the end, the Supreme Court directed that the cases in Mumbai and Madras should be clubbed together and addressed by it. As such, the cases filed in the Madras and Mumbai High Courts have been sent to the Supreme Court of India.&lt;/p&gt;

&lt;p align="JUSTIFY" class="western"&gt;Major General Vombathakere also filed a petition in the Supreme Court, arguing that the UID scheme violates individuals' right to privacy. When the counsel for the General commenced his arguments the judge pointed to the possibility of the Government passing the NIA Bill soon, which will contain provisions for privacy, as stated by the Government. As such, the judge implied that if the Government passes such a law the argument, that the Government is implementing the scheme in a legal vacuum, may not be valid.&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;So what is the status of your pending court cases?&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY" class="western"&gt;Well, I impleaded myself in Aruna Roy's petition and brought my arguments with regards to corruption in the case of companies contracted with the UIDAI and the danger to national security through the involvement of persons linked to US intelligence agencies. The last hearing in the Supreme Court was on 10th December 2013, but it was postponed to 28 January 2014. So in short, in the Supreme Court I am currently filing a case for investigation with regards to corruption and links with foreign intelligence agencies by companies contracted with the UIDAI, while in the Bangalore High Court, I have appealed a civil trial with regards to the misplacement of Order 7, Rule 11, of the Civil Procedure Code.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/interview-with-mathew-thomas-from-the-say-no-to-uid-campaign'&gt;https://cis-india.org/internet-governance/blog/interview-with-mathew-thomas-from-the-say-no-to-uid-campaign&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-01-27T12:47:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/interview-with-berlin-data-protection-commissioner">
    <title>Interview with Dr. Alexander Dix - Berlin Data Protection and Freedom of Information Commissioner</title>
    <link>https://cis-india.org/internet-governance/blog/interview-with-berlin-data-protection-commissioner</link>
    <description>
        &lt;b&gt;Maria Xynou recently interviewed Berlin's Data Protection and Freedom of Information Commissioner: Dr. Alexander Dix. View this interview and gain an insight on recommendations for better data protection in India!&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.ediscovery-exchange.com/SpeakerInfo.aspx?tp_spkid=37916"&gt;Dr. Alexander Dix&lt;/a&gt; has been Berlin's Data Protection and Freedom of Information Commissioner since June 2005. He has more than 26 years of practical experience in German data protection authorities and previously served as Commissioner for the state of Bradenburg for seven years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dr. Dix is a specialist in telecommunications and media and has dealt  with a number of issues regarding the cross-border protection of  citizen’s privacy. He chairs the International Working Group on Data  Protection in Telecommunications (“Berlin Group”) and is a member of the  Article 29 Working Party of European Data Protection Supervisory  Authorities. In this Working Party he represents the Data Protection  Authorities of the 16 German States (Länder).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A native of Bad Homburg, Hessen, Dr. Alexander Dix graduated from Hamburg  University with a degree in law in 1975. He received a Master of Laws  degree from the London School of  Economics and Political Science in 1976 and a Doctorate in law from  Hamburg University in 1984. He has published extensively on issues of  data protection and freedom of information. Inter alia he is a co-editor  of the German Yearbook on Freedom of Information and Information Law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society interviewed Dr. Alexander Dix on the following questions:&lt;/p&gt;
 &lt;ol&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;What activities and functions does the Berlin data 	commissioner's office undertake?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;What powers does the Berlin data commissioner's office 	have? In your opinion, are these sufficient? Which powers have been 	most useful? If there is a lack, what would you feel is needed?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;How is the office of the Berlin Data Protection 	Commissioner funded?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;What is the organisational structure at the Office of 	the Berlin Data Protection Commissioner and the responsibilities of 	the key executives?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;If India creates a Privacy Commissioner, what 	structure/framework would you suggest for the office?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;What challenges has your office faced?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;What is the most common type of privacy violation that 	your office is faced with?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Does your office differ from other EU data protection 	commissioner offices?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;How do you think data should be regulated in India?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Do you support the idea of co-regulation or 	self-regulation?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;How can India protect its citizens' data when it is 	stored in foreign servers?&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;VIDEO &lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/agXVs7ZlKdU" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/interview-with-berlin-data-protection-commissioner'&gt;https://cis-india.org/internet-governance/blog/interview-with-berlin-data-protection-commissioner&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-06T09:29:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate">
    <title>Interview with Caspar Bowden - Privacy Advocate and former Chief Privacy Adviser at Microsoft</title>
    <link>https://cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate</link>
    <description>
        &lt;b&gt;Maria Xynou recently interviewed Caspar Bowden, an internationally renowned privacy advocate and former Chief Privacy Adviser at Microsoft. Read this exciting interview and gain an insight on India's UID and CMS schemes, on the export of surveillance technologies, on how we can protect our data in light of mass surveillance and much much more!&lt;/b&gt;
        &lt;div dir="ltr" style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.isodarco.it/courses/andalo12/doc/CBowden.pdf"&gt;Caspar Bowden&lt;/a&gt; is an independent advocate for better Internet privacy technology and regulation. He is a specialist  in  data  protection  policy,  privacy  enhancing  technology  research,  identity  management  and authentication.  Until  recently  he  was  Chief Privacy  Adviser  for  Microsoft,  with  particular  focus on  Europe and regions with horizontal privacy law.&lt;/div&gt;
&lt;div dir="ltr" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div dir="ltr" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div dir="ltr" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div dir="ltr" style="text-align: justify; "&gt;From 1998-2002, he was the director of the Foundation for Information Policy Research (www.fipr.org) and was also an expert adviser to the UK Parliament for the passage of three bills concerning privacy, and was co-organizer of the influential Scrambling for Safety public conferences on UK encryption and surveillance policy.  His  previous  career  over  two  decades  ranged  from  investment  banking  (proprietary  trading  risk-management for option arbitrage), to software engineering (graphics engines and cryptography), including work for Goldman Sachs, Microsoft Consulting Services, Acorn, Research Machines, and IBM.&lt;/div&gt;
&lt;div dir="ltr" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div dir="ltr" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div dir="ltr" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div dir="ltr" style="text-align: justify; "&gt;The Centre for Internet and Society interviewed Caspar Bowden on the following questions:&lt;/div&gt;
&lt;p align="JUSTIFY"&gt; &lt;/p&gt;
&lt;h3 align="JUSTIFY"&gt;1. Do you think India needs privacy legislation? Why / Why not?&lt;/h3&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;Well I think it's essential for any modern democracy based on a constitution to now recognise a universal human right to privacy. This isn't something that would necessarily have occurred to the draft of constitutions before the era of mass electronic communications, but this is now how everyone manages their lives  and maintains social relationships at a distance, and therefore there needs to be an entrenched right to privacy – including communications privacy – as part of the core of any modern state. &lt;/span&gt;&lt;/p&gt;
&lt;h3 align="JUSTIFY"&gt;2. The majority of India's population lives below the line of poverty and barely has any Internet access. Is surveillance an elitist issue or should it concern the entire population in the country? Why / Why not?&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt; &lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;Although the majority of people in India are still living in conditions of poverty and don't have access to the Internet or, in some cases, to any electronic communications, that's changing very rapidly. India has some of the  highest growth rates in take up with both mobile phones and mobile Internet and so this is  spreading very rapidly through all strata of society. It's becoming an essential tool for transacting with business and government, so it's going to be increasingly important to have a privacy law which guarantees rights equally, no matter what anyone's social station or situation. There's also, I think, a sense in which having a right to privacy based on individual rights is much preferable to some sort of communitarian approach to privacy, which has a certain philosophical following; but that model of privacy - that somehow, because of a community benefit, there should also be a sort of community sacrifice in individual rights to privacy - has a number of serious philosophical flaws which we can talk about. &lt;/span&gt;&lt;/p&gt;
&lt;h3 align="JUSTIFY"&gt;3. "I'm not a terrorist and I have nothing to hide...and thus surveillance can't affect me personally." Please comment.&lt;/h3&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h3 align="JUSTIFY"&gt;&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;Well, it's hard to know where to begin. Almost everybody in fact has “something to hide”, if you consider all of the social relationships and the way in which you are living your life. It's just not true that there's anybody who literally has nothing to hide and in fact I think that it's rather a dangerous idea, in political culture, to think about imposing that on leaders and politicians. There's an increasing growth of the idea – now, probably coming from America- that political leaders (and even their staff - to get hired in the current White House) should open up their lives, even to the extent of requiring officials to give up their passwords to their social network accounts (presumably so that they can be vetted for sources of potential political  embarrassment in their private life). This is a very bad idea because if we only elect leaders, and if we only employ bureaucrats, who do not accord any subjective value to privacy, then it means we will almost literally be electing (philosophical) zombies. And we can't expect our political leaders  to respect our privacy rights, if we don't recognise that they have a right to privacy in their own lives also. The main problem with the “nothing to hide, so nothing to fear” mantra is that this is used as a rhetorical tool by authoritarian forces in government and society, who simply wish to take a more paternalistic and protective attitude. This reflects a disillusionment within the “deep state” about how democratic states should function.&lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Essentially, those who govern us are given a license through elections to exercise power with consent, but  this entails no abrogation of a citizen's duty to question authority. Instead, that should be seen as a civic duty - providing the objections are reasonable. People actually know that there are certain things in their lives that they don't wish other people to know, but by indoctrinating the “nothing to hide” ideology, it inculcates a general tendency towards more conformism in society, by inhibiting critical voices.&lt;/p&gt;
&lt;h3&gt;4. Should people have the right to give up their right to privacy? Why / Why not?&lt;/h3&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;In European data protection law there is an obscure provision which is particularly relevant to medical privacy, but almost never used in the area of so-called sensitive personal data, like political views or philosophical views. It is possible currently for European governments to legislate to override the ability of the individual to consent. So this might arise, for example, if a foreign company sets up a service to get people to consent to have their DNA analysed and taken into foreign databases, or generally where people might consent to a big foreign company analysing and capturing their medical records. I think there is a legitimate view that, as a matter of national policy, a government could decide that these activities were threatening to data sovereignty, or that was just bad public policy. For example, if a country has a deeply-rooted social contract that guarantees the ability to access medical care through a national health service, private sector actors could try to undermine that social-solidarity basis for universal provision of health care. So for those sorts of reasons I  do think it's defensible for governments to have the ability in those sectors to say: “Yes, there are areas where people should not be able to consent to give up their privacy!” &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;But then going back to the previous answer, more generally, commercial privacy policies are now so complicated – well, they've always been complicated, but now are mind-blowingly devious as well - people have no real possibility of knowing what they're consenting to. For example, the secondary uses of data flows in social networks are almost incomprehensible, even for technologists at the forefront of research.  The French Data Protection authorities are trying to penalize Google for replacing several very complicated privacy policies by one so-called unified policy, which says almost nothing at all. &lt;/span&gt;There's&lt;span&gt; no possible way for people to give informed consent to this over-simplified policy, because it doesn't even tell anything useful to an expert. So again in these circumstances, it's right for a regulator to intercede to prevent unfair exploitation of the deceptive kind of “tick-box” consent. Lastly, it is not possible for EU citizens to waive or trade away their basic right to access (or delete) their own data in future, because this seems a reckless act and it cannot be foreseen when this right might become essential in some future circumstances. So in these three senses, I believe it is proper for legislation to be able to prevent the abuse of the concept of consent.&lt;/span&gt;&lt;/p&gt;
&lt;h3 align="JUSTIFY"&gt;5. Do you agree with India's UID scheme? Why / Why not?&lt;/h3&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h3 align="JUSTIFY"&gt;&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;There is a valid debate about whether it's useful for a country to have a national identity system of some kind - and there's about three different ways that can be engineered technically. The first way is to centralise all data storage in a massive repository, accessed through remote terminal devices. The second way is a more decentralised approach with a number of different  identity databases or systems which can interoperate (or “federate” with eachother), with technical and procedural rules to  enforce privacy and security safeguards. In general it's probably a better idea to decentralise identity information, because then if there is a big disaster (or cyber-attack) or data loss, you haven't lost everything. The third way is what's called “user-centric identity management”, where the devices (smartphones or computers) citizens use to interact with the system keep the identity information in a totally decentralised way. &lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;Now the obvious objection to that is: “Well, if the data is decentralised and it's an official system, how can we trust that the information in people's possession is authentic?”. Well, you can solve that with cryptography. You can put digital signatures on the data, to show that the data hasn't been altered since it was originally verified. And that's a totally solved problem. However, unfortunately, not very many policy makers understand that and so are easily persuaded that centralization is the most efficient and secure design – but that hasn't been true technically for twenty years. Over that time, cryptographers have refined the  techniques (the alogithms can now run comfortably on smartphones) so that user-centric identity management is totally achievable, but policy makers have not generally understood that. But there is no technical reason a totally user-centric vision of identity architecture should not be realized. But still the UID appears to be one of the most centralised large systems ever conceived. &lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;There are still questions I don't understand about its technical architecture. For example, just creating an identity number by itself doesn't guarantee security and it's a classic mistake to treat an identifier as an authenticator. In other words, to use an identifier or knowledge of an identifier - which could become public information, like the American social security number – to treat knowledge of that number as if it were a key to open up a system to give people access to their own private information is very dangerous. So it's not clear to me how the UID system is designed in that way. It seems that by just quoting back a number, in some circumstances this will be the key to open up the system, to reveal private information, and that is an innately insecure approach. There may be details of the system I don't understand, but I think it's open to criticism on those systemic grounds. &lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;And then more fundamentally, you have to ask what's the purpose of that system in society. You can define a system with a limited number of purposes – which is the better thing to do – and then quite closely specify the legal conditions under which that identity information can be used. It's much more problematic, I think, to try and just say that “we'll be the universal identity system”, and then you just try and find applications for it later. A number of countries tried this approach, for example Belgium around 2000, and they expected that having created a platform for identity, that many applications would follow and tie into the system. This really didn't happen, for a number of social and technical reasons which critics of the design had predicted. I suppose I would have to say that the UID system is almost the anithesis of the way I think identity systems should be designed, which should be based on quite strong technical privacy protection mechanisms - using cryptography - and where, as far as possible, you actually leave the custody of the data with the individual. &lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;Another objection to this user-centric approach is “back-up”: what happens when you lose the primary information and/or your device? Well, you can anticipate that. You can arrange for this information to be backed-up and recovered, but in such a way that the back-up is encrypted, and the recovered copy can easily be checked for authenticity using cryptography.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;6. Should Indian citizens be concerned about the Central Monitoring System (CMS)? Why / Why not?&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;Well, the Central Monitoring System does seem to be an example of very large scale “strategic surveillance”, as it is normally called. Many western countries have had these for a long time, but normally only for international communications. Normally surveillance of domestic communications is done under a particular warrant, which can only be applied one investigation at a time. And it's not clear to me that that is the case with the Central Monitoring System. It seems that this may also be applicable to mass surveillance of communications inside India. Now we're seeing a big controversy in the U.S - particularly at the moment - about the extent to which their international strategic surveillance systems are also able to be used internally. What has happened in the U.S. seems rather deceptive; although the “shell” of the framework of individual protection of rights was left in place, there are actually now so many exemptions when you look in the detail, that an awful lot of Americans' domestic communications are being subjected to this strategic mass surveillance. That is unacceptable in a democracy. &lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;There are reasons why, arguably, it's necessary to have some sort of strategic surveillance in international communications, but what Edward Snowden revealed to us is that in the past few years many countries – the UK, the U.S, and probably also Germany, France and Sweden – have constructed mass surveillance systems which knowingly intrude  on  domestic communications also. We are living through a transformation in surveillance power, in which the State is becoming more able to monitor and control  the population secretively than ever before in history. And it's very worrying that all of these systems appear to have been constructed without the knowledge of Parliaments and without precise legislation. Very few people in government even seem to have understood the true mind-boggling breadth of this new generation of strategic surveillance. And no elections were fought on a manifesto asking “Do people want this or not?”. It's being justified under a counter-terrorism mantra, without very much democratic scrutiny at all. The long term effects of these systems on democracies are really uncharted territory. &lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;We know that we're not in an Orwellian state, but the model is becoming more Kafkaesque. If one knows that this level of intensive and automated surveillance exists, then it has a chilling effect on society. Even if not very much is publicly known about these systems, there is still a background effect that makes people more conformist and less politically active, less prepared to challenge authority. And that's going to be bad for democracy in the medium term – not just the long term. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;7. Should surveillance technologies be treated as traditional arms / weapons? If so, should export controls be applied to surveillance technologies? Why / Why not?&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;Surveillance technologies probably do need to be treated as weapons, but not necessarily as traditional weapons. One probably is going to have to devise new forms of export control, because tangible bombs and guns are physical goods – well, they're not “goods”, they're “bads” -  that you can trace by tagging and labelling them, but many of the “new generation” of surveillance weapons are &lt;/span&gt;&lt;i&gt;&lt;span&gt;software&lt;/span&gt;&lt;/i&gt;&lt;span&gt;. It's very difficult to control the proliferation of bits – just as it is with copyrighted material. And I remember when I was working on some of these issues thirteen years ago in the UK – during the so-called crypto wars – that the export of cryptographic software from many countries was prohibited. And there were big test cases about whether the source code of these programs was protected under the US First Amendment, which would prohibit such controls on software code. It was intensely ironic that in order to control the proliferation of cryptography in software, governments seemed to be contemplating the introduction of strategic surveillance systems to detect (among other things) when cryptographic software was being exported. In other words, the kind of surveillance systems which motivated the “cypherpunks” to proselytise cryptography, were being introduced (partly) with the perverse justification of preventing such proliferation of such cryptography!&lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;In the case of the new, very sophisticated software monitoring devices (“Trojans”) which are being implanted into people's computers – yes, this has to be subject to the same sort of human rights controls that we would have applied to the exports of weapon systems to oppressive regimes. But it's quite difficult to know how to do that. You have to tie responsibility to the companies that are producing them, but a simple system of end-user licensing might not work. So we might actually need governments to be much more proactive than they have been in the past with traditional arms export regimes and actually do much more actively to try and follow control after export – whether these systems are only being used by the intended countries. As for the law enforcement agencies of democratic countries which are buying these technologies: the big question is whether law enforcement agencies are actually applying effective legal and operational supervision over the use of those systems. So, it's a bit of a mess! And the attempts that have been made so far to legislate this area I don't think are sufficient. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;8. How can individuals protect their data (and themselves) from spyware, such as FinFisher?&lt;/h3&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;In democratic countries, with good system of the rule of law and supervision of law enforcement authorities, there have been cases – notably in Germany – where it's turned out that the police using techniques, like FinFisher, have actually disregarded legal requirements from court cases laying down the proper procedures. So I don't think it's good enough to assume that if one was doing ordinary lawful political campaigning, that one would not be targeted by these weapons. So it's wise for activists and advocates to think about protecting themselves – of course, other professions as well who look after confidential information – because these techniques may also get into the hands of industrial spies, private detectives and  generally by people who are not subject to even the theoretical constraints of law enforcement agencies. &lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;After Edward Snowden's revelations, we understand that all our computer infrastructure is much more vulnerable – particularly to foreign and domestic intelligence agencies – than we ever imagined. So for example, I don't use Microsoft software anymore – I think that there are techniques which are now being sold to governments and available to governments for penetrating Microsoft platforms and probably other major commercial platforms as well. So, I've made the choice, personally, to use free software – GNU/Linux, in particular – and it still requires more skill for most people to use, but it is much much easier than even a few years ago. So I think it's probably wise for most people to try and invest a little time getting rid of proprietary software if they care at all about societal freedom and privacy. I understand that using the latest, greatest smartphone is cool, and the  entertainment and convenience of Cloud and tablets – but people should not imagine that they can keep those platforms secure. &lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;It might sound a bit primitive, but I think people should have to go back to the idea that if they really want confidential communications with their friends, or if they are involved with political work, they have to think about setting aside one machine - which they keep offline and just use essentially for editing and encrypting/decrypting material. Once they've encrypted their work on their “air gap” machine, as it's called, then they can put their encrypted emails on a USB stick and transfer them to their second machine which they use to connect online (I notice Bruce Schneier is just now recommending the same approach). Once the “air gap” machine has been set up and configured, you should not connect that to the network – and preferably, don't connect it to the network, ever! So if you follow those sorts of protocols, that's probably the best that is achievable today. &lt;/span&gt;&lt;/p&gt;
&lt;h3 align="JUSTIFY"&gt;9. How would you advise young people working in the surveillance industry?&lt;/h3&gt;
&lt;p&gt; &lt;/p&gt;
 &lt;ol&gt; &lt;/ol&gt;
&lt;p&gt;&lt;span&gt;Young 	people should try and read a little bit into the ethics of 	surveillance and to understand their own ethical limits in what they 	want to do, working in that industry. And in some sense, I think 	it's a bit like contemplating  a career in the arms industry. There 	are defensible uses of military weapons, but the companies that 	build these weapons are, at the end of the day, just corporations 	maximizing value for shareholders. And so, you need to take a really 	hard look at the company that you're working for or the area you 	want to work in and satisfy your own standard of ethics, and that 	what you're doing is not violating other people's human rights. I 	think that in the fantastically explosive growth of surveillance 	industries that we've seen over the past few years – and it's 	accelerating – the sort of technologies particularly being 	developed for electronic mass surveillance are fundamentally and 	ethically problematic. And I think that for a talented engineer, 	there are probably better things that he/she can do with his/her 	career. &lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; &lt;ol&gt;&lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt; &lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate'&gt;https://cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-06T08:16:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/interview-with-bruce-schneier">
    <title>Interview with Bruce Schneier - Internationally Renowned Security Technologist</title>
    <link>https://cis-india.org/internet-governance/blog/interview-with-bruce-schneier</link>
    <description>
        &lt;b&gt;Maria Xynou recently interviewed Bruce Schneier on privacy and surveillance. View this interview and gain an insight on why we should all "have something to hide"!&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="https://www.schneier.com/about.html"&gt;Bruce Schneier&lt;/a&gt; is an internationally renowned security technologist, called a "security guru" by &lt;cite&gt;The Economist&lt;/cite&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He is the author of 12 &lt;a href="https://www.schneier.com/books.html"&gt;books&lt;/a&gt; -- including &lt;a href="https://www.schneier.com/book-lo.html"&gt;&lt;cite&gt;Liars and Outliers: Enabling the Trust Society Needs to Survive&lt;/cite&gt;&lt;/a&gt; -- as well as hundreds of articles, &lt;a href="https://www.schneier.com/essays.html"&gt;essays&lt;/a&gt;, and &lt;a href="https://www.schneier.com/cryptography.html"&gt;academic papers&lt;/a&gt;.  His influential newsletter "&lt;a href="https://www.schneier.com/crypto-gram.html"&gt;Crypto-Gram&lt;/a&gt;" and his blog "&lt;a href="https://www.schneier.com/about.html"&gt;Schneier on Security&lt;/a&gt;"  are read by over 250,000 people.  He has testified before Congress, is a  frequent guest on television and radio, has served on several  government committees, and is regularly &lt;a href="https://www.schneier.com/news.html"&gt;quoted&lt;/a&gt; in the press.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Schneier is a fellow at the Berkman Center for Internet  and Society at Harvard Law School, a program fellow at the New America  Foundation's Open Technology Institute, a board member of the Electronic  Frontier Foundation, an Advisory Board Member of the Electronic Privacy  Information Center, and the Security Futurologist for &lt;a href="http://www.bt.com/"&gt;BT&lt;/a&gt; -- formerly British Telecom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society (CIS) interviewed Bruce Schneier on the following questions:&lt;/p&gt;
 &lt;ol&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Do you think India needs privacy legislation? Why/ Why 	not?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;The majoity of India's population lives below the line 	of poverty and barely has any Internet access. Is surveillance an 	elitist issue or should it concern the entire population in the 	country? Why/ Why not?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;“I'm not a terrorist and I have nothing to hide...and 	thus surveillance can't affect me personally.” Please comment.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Can free speech and privacy co-exist? What is the 	balance between privacy and freedom of expression?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Should people have the right to give up their right to 	privacy? Why/ Why not?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Should surveillance technologies be treated as 	traditional arms/weapons? Why/ Why not?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;How can individuals protect their data (and themselves) 	from spyware, such as FinFisher?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;How would you advise young people working in the 	surveillance industry?&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;VIDEO &lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/mpKaXW_hwcE" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/interview-with-bruce-schneier'&gt;https://cis-india.org/internet-governance/blog/interview-with-bruce-schneier&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-17T08:54:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/interview-with-big-brother-watch-on-privacy-and-surveillance">
    <title>Interview with Big Brother Watch on Privacy and Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/interview-with-big-brother-watch-on-privacy-and-surveillance</link>
    <description>
        &lt;b&gt;Maria Xynou interviewed Emma Carr, the Deputy Director of Big Brother Watch, on privacy and surveillance. View this interview and gain an insight on why we should all "have something to hide"!&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;For all those of you who haven't heard of Big Brother Watch, it's a London-based campaign group which was founded in 2009 to protect individual privacy and defend civil liberties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.bigbrotherwatch.org.uk/about"&gt;Big Brother Watch&lt;/a&gt; was set up to challenge policies that threaten our  privacy, our freedoms and our civil liberties, and to expose the true  scale of the surveillance state. The campaign group has produced unique research exposing the erosion of civil liberties in the  UK, looking at the dramatic expansion of surveillance powers, the growth  of the database state and the misuse of personal information. Big Brother Watch campaigns to give individuals more control over their personal data,  and hold to account those who fail to respect our privacy, whether  private companies, government departments or local authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.bigbrotherwatch.org.uk/who-we-are/emma-frances-carr-deputy-director"&gt;Emma Carr&lt;/a&gt; joined Big Brother Watch as Deputy Director in February 2012 and has since been regularly quoted in the UK press. The Centre for Internet and Society interviewed Emma Carr on the following questions:&lt;/p&gt;
 &lt;ol&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;How do you define privacy?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Can privacy and freedom of expression co-exist? Why/Why 	not?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;What is the balance between Internet freedom and 	surveillance?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;According to your research, most people worldwide care 	about their online privacy – yet they give up most of it through 	the use of social networking sites and other online services. Why, 	in your opinion, does this occur and what are the potential 	implications?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Should people have the right to give up their right to 	privacy? Why/Why not?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;What implications on human rights can mass surveillance 	potentially have?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;“I'm not a terrorist and I have nothing to hide...and 	thus surveillance can't affect me personally.” Please comment.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Do we have Internet freedom?&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
&lt;p align="JUSTIFY"&gt; &lt;/p&gt;
&lt;p&gt;VIDEO  &lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/KhmwPYgLfjo" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/interview-with-big-brother-watch-on-privacy-and-surveillance'&gt;https://cis-india.org/internet-governance/blog/interview-with-big-brother-watch-on-privacy-and-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-15T14:24:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/abigail-d-pershing-yale-journal-of-international-law-interpreting-the-outer-space-treaty-s-non-appropriation-principle">
    <title>Interpreting the Outer Space Treaty's Non-Appropriation Principle: Customary International Law from 1967 to Today</title>
    <link>https://cis-india.org/internet-governance/news/abigail-d-pershing-yale-journal-of-international-law-interpreting-the-outer-space-treaty-s-non-appropriation-principle</link>
    <description>
        &lt;b&gt;Arindrajit Basu's research was quoted in the journal article authored by Abigail D. Pershing and published by Yale Journal of International Law.&lt;/b&gt;
        &lt;p id="_mcePaste" style="text-align: justify; "&gt;Origin wants to take tourists to space by April 2019. The European Space Agency points to the possibilities of mining Helium-3 on the moon to providecleaner energy here on Earth. Space tourism, exploration, and exploitation are very real possibilities in the near future—at least technologically. Legally,however, the way forward is less clear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the 1967 Treaty on Principles Governing the Activities of States in the Exploration and Use of Outer Space, Including the Moon and Other Celestial Bodies (commonly known as the Outer Space Treaty), no State has the right to claim as sovereign territory the moon or any other celestial body. Some critics see the Outer Space Treaty as merely an outdated relic from the Cold War era, but there are good reasons for maintaining the fundamental principles under girding the law in its current form. If the Treaty were repealed or interpreted to allow a free-for-all, first-come, first-served method of allocating space property rights (as some have suggested either should, or will, happen), this would likely produce an extremely chaotic and unequal allocation of resources. Developing nations that currently lack space capabilities would be at a significant disadvantage relative to States possessing such capabilities, and the ensuing State actions would likely result in an unequal territorial grab leaving few, if any, resources for those nations technologically incapable of space exploration.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="https://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=1697&amp;amp;context=yjil"&gt;Click to read&lt;/a&gt; the complete article.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Citations:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;{Footnotes 123, 126 and 132}  Arindrajit Basu, Regulatory Mechanism for the Exploitation of Natural Resources in  Outer  Space  and  Celestial  Bodies, in SPACE LAW:THE EMERGING TRENDS (Sandeepa Bhat eds, 2017)&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/abigail-d-pershing-yale-journal-of-international-law-interpreting-the-outer-space-treaty-s-non-appropriation-principle'&gt;https://cis-india.org/internet-governance/news/abigail-d-pershing-yale-journal-of-international-law-interpreting-the-outer-space-treaty-s-non-appropriation-principle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-07-06T03:17:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/internet-driven-developments">
    <title>Internet-driven Developments — Structural Changes and Tipping Points </title>
    <link>https://cis-india.org/internet-governance/blog/internet-driven-developments</link>
    <description>
        &lt;b&gt;A symposium on Internet Driven Developments: Structural Changes and Tipping Points was held in Cambridge, Massachusetts at Harvard University from December 6 to 8, 2012. The symposium was sponsored by the Ford Foundation and the MacArthur Foundation and was hosted by the Berkman Center for Internet &amp; Society. In this blog post, I summarize the discussions that took place over the two days and add my own personal reflections on the issues.

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The symposium served as an inaugural event for the &lt;i&gt;Global Network of Interdisciplinary Centers&lt;/i&gt;, which currently includes as its members:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The Berkman Center for Internet and Society at Harvard University&lt;/li&gt;
&lt;li&gt;The Alexander von Humboldt Institute for Internet &amp;amp; Society&lt;/li&gt;
&lt;li&gt;The Centre for Internet and Society, Bangalore &lt;/li&gt;
&lt;li&gt;The Center for Technology &amp;amp; Society at the Fundacao Getulio Vargas Law School, Keio University&lt;/li&gt;
&lt;li&gt;The MIT Media Lab and its Center for Civic Media&lt;/li&gt;
&lt;li&gt;The NEXA Center for Internet &amp;amp; Society at Politicnico di Torino. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Individuals and researchers from the Centers focused on understanding the effects of internet and society. The participants were brought together to explore the past, present, and future tipping points of the internet, to identify knowledge gaps, and to find areas of collaboration and future action between institutes and individuals. Specifically, the symposium set out to examine fundamental questions about the internet, identify structural changes that are occurring because of the internet, and the forces that are catalyzing these changes. Questions asked and discussed included:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What forces are changing production and service models? &lt;/li&gt;
&lt;li&gt;What forces are influencing entrepreneurship and innovation? and &lt;/li&gt;
&lt;li&gt;What forces are changing political participation?&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Production and Service Models&lt;/h2&gt;
&lt;h3&gt;Discussion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;When participants discussed the changes that are happening to production and service models, concepts such as big data, algorithms, peer based models of production, and intermediaries were identified as actors and tools that are driving change in production and service models in the context of the internet. For example, big data and algorithms are being used to alter the nature, scope, and reach of business by allowing for the personalization and customization of services. To this end, many organizations have incorporated customer participation into business models, and provide platforms for feedback and input. The personalization of services has placed greater emphasis on the voice of the customer, allowing customers to guide and influence business by voicing preferences, satisfaction levels, etc. In this way, consumers can determine what type of service they want, and can also make political statements through their choices and feedback. In the process, however, such platforms generate and depend on large amounts of data and thus raise concerns about privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Knowledge gaps that were identified during the conversation included how to predict what would make a participatory platform and peer based model successful, and how these platforms can be effectively researched. When looking at big data, a knowledge gap that was identified included how to ensure that data are collected ethically and accurately, as well as the related question: once large data sets are collected, how can the data be analyzed and used in a meaningful way?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was also discussion about the increasingly critical and powerful role that intermediaries serve within the scope of the internet as they act as the platform provider and regulator for internet content. Intermediaries both allow for content to be posted on the internet, and determine what information is accessed through the filtering of web searches.  Increasingly, governments are seeking to regulate intermediaries and create strict rules of compliance with governmental mandates. At the same time governments are placing the responsibility and liability of regulating what content is posted on internet on intermediaries, essentially placing them in the role of an adjudicator. This is one example of how the relationship between the private sector, the government, and the individual is changing, because it is only recently that private intermediaries have been held responsible first to governments, and only secondarily to customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Knowledge gaps identified in the discussion on intermediaries included understanding and researching how intermediaries decide to filter content found through searches. On what basis is each filter done? Are there actors influencing this process? And what are the economics behind the process?&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Personal Thoughts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;When reflecting on how the internet is changing and influencing the production of goods and services, I personally would add to the points discussed in the meeting the fact that the internet has also impacted the job economy.  Reports show that jobs in the extraction and manufacturing sector are decreasing, as the internet has created a mandatory new tech oriented skill set that often outweighs the need for other skill sets.  This change is far reaching as the job economy influences what skills students choose to learn, why and for what purposes individuals migrate across borders for employment, and in what industries governments invest money towards domestic development. In addition to changing the nature of skills in demand, the nature of the services themselves is changing. Though services are becoming more personalized and tailored to the individual, this personalization is automated, and replacing the ‘human touch’ that was once prized in business. Whether customers care if the service they are given is generated by an algorithm or delivered by an individual may depend on a person’s preference, but the European Union has seen this shift as being significant enough to address automated decision making in Article 15 of the EU directive, which provides individuals the right to not be subject to a decision which legally impacts him/her which is based only on automated processing of data. This directive encompasses decisions such as evaluation of a person’s performance at work, creditworthiness, reliability, conduct, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The internet has also increased the cost of small mistakes made by businesses, as any mistake will now potentially impact millions of customers. The impact of any mistake makes risk management much more important and difficult, as businesses must seek to anticipate and mitigate any and all mistakes. The internet has also created a new level of dependency on the network, as businesses shift all of their services and functions over to the internet. Thus, if the network goes down, businesses will lose revenue and customers. This level of dependency on the network that exists today is different from past reliance’s on technology — in the sense that in the past there was not one single type of technology that would be essential for many businesses to run. The closest analogue was transportation: if trucks, trains, or ships were unavailable, multiple industries would be impacted. The difference is that those who relied on rail could shift temporarily to ships or trucks. Those relying on the network have no alternatives. Furthermore, past technologies were constantly evolving in the resources they depended on — from coal to gas, etc, but for the internet, it seems that the resource is not evolving, so much as expanding as increased bandwidth and connectivity are the solution to allowing technological evolution and innovation through the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As discussed above, intermediaries are becoming key and powerful players, but they also seem to be increasingly placed between a rock and a hard place, as governments around the world are asking national and multinational intermediaries to filter content that violates national laws in one context, but not another context. Furthermore, intermediaries are increasingly being asked to comply with law enforcement requests for access to data that is often not within the jurisdiction of the requesting country. The difficult position intermediaries are placed in demonstrates how the architecture of the internet is borderless but the regulation and use of the internet is still tied to borders and jurisdiction.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Entrepreneurship and Innovation&lt;/h2&gt;
&lt;h3&gt;Discussion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;When discussing entrepreneurship and innovation it was pointed out by participants that grey markets and market failures are important indicators for possibilities of new business models and forms of innovation. Because of that, it is important to study what has failed and why when identifying new possibilities and trends. The importance of policies and laws that allow for innovation and entrepreneurship was also highlighted.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Personal Thoughts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;When thinking about entrepreneurship and innovation on the internet and forces driving them, it seems clear that tethering, conglomerating, and organizing information from multiple sources is one direction that innovation is headed. Services are coming out that have the ability to search the internet based on individual preferences and provide more accurate data quickly. This removes the need for individuals to search the internet at length to find the information or products they want. Along the same lines, it seems that there is a greater trend towards personalization. Services are finding new and innovative ways to bring individuals customized products. Another trend is the digitization of all services — from moving libraries online, to bookstores online, to grocery stores online. Lastly, there is a constant demand for new applications to be developed. These can range from applications enabling communication through social networking, to applications that act as personal financial consultants, to applications that act as personal trainers. The ability for concepts, trends, etc to go viral on the internet has also added another dimension to entrepreneurship and innovation as any individual can potentially become successful by something going viral. The ability for something to go viral on the internet does not just impact entrepreneurship and innovation, but also impacts political participation and production and service models.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Political Participation&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Discussions also centered on how political participation is changing as the internet is being used as a new platform for participation. For example, it is now possible for individuals to leverage their voice and message to local and global communities. Furthermore, this message can be communicated on a seemingly personal scale. Individuals from one community are able to connect to communities from another location — both local and abroad, and to work together to catalyze change. Messages and communications can be spread easily to millions of people and can go viral.  This ability has changed and created new public spheres, where anyone can contribute to a dialogue from anywhere.  Empowerment is shifting as well, because the internet allows for new power structures to be created by any actor who knows how to leverage the network. These factors allow for more voices to be heard and for greater citizen participation. The role of the youth in political movements was also emphasized in the discussions. On the other hand governments have responded by more heavily regulating speech and content on the internet when dissenting voices and campaigns are seen as a threat. It was also brought out that though emerging forms of online political participation have been heralded by many for achievements such as facilitating democracy, transparency, and bringing a voice to the silenced — many have warned that analysis of these political forms of participation overlook individual contributions and time. Other critiques that were discussed included the fact that digital revolutions also exclude individuals who do not have access to the internet or to platforms/applications and overlook actions and movements that take place offline.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Knowledge gaps that were identified included understanding the basics of the change that is happening in political participation through the internet. For example, it is unclear who the actors are that determine the conditions and scope for these changes, and like participatory forms of business, what enables and mobilizes change. Furthermore, it is unclear who specifically benefits from these changes and how, and who participates in the changes — and in what capacity. Additionally, much of the change has been quantified in the dialogue of the ‘global’ — global voices, global movements — but that dialogue ignores the local.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Personal Thoughts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In addition to the discussions on political participation, I believe the internet has created the possibility for ‘social governance’. To address situations in which there is no particular law against an action, but individuals come together and speak out against actions that they see on the internet that they believe should be stopped or changed. Depending on the extent individuals choose to enforce these decisions, this can be potentially dangerous as individuals are essentially rewriting laws and social norms without subjecting them to the crucible of consensus decision-making or review. In addition, forms of political participation are not changing just in terms of how the individual engages politically with states and governments, but also in the ways that politicians are engaging with citizens. For example, politicians are using Facebook and Twitter as means to communicate and gather feedback from supporters. Politicians are also using technology to reach more individuals with their messages — from experimenting with 3D holograms, to web casting, to using technology like CCTV cameras to prove transparency. The impact of this could be interesting, as technology is becoming a mediating tool that works in both directions between citizens and governments. Is this changing the traditional understandings of the State and the relationship between the State and the citizen?&lt;/p&gt;
&lt;h2&gt;Conclusion and ways forward&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The discussions also pulled out dichotomies that apply to the internet and illustrate tensions arising from different forces. These dichotomies can be shaped by individuals and actors attempting to regulate the internet, as for example with new models of regulation vs. old models of regulation,  private vs. public, local vs. global,  owned vs. unowned, and zoned vs. unzoned. These dichotomies can be shaped by how the internet is used. For example, fair vs. unfair, just vs. unjust, represented vs. silenced, and uniform vs. diverse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Common questions being asked and areas for potential research that came out of these discussions included information communication and media, how to address different and at times contradictory policies and levels of development in different countries, and what is the impact of big data on different sectors and industries like e-health and journalism? What is the importance of ICT in creating economic progress? How is the Internet changing the nature of democracy?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When discussing ways forward and areas for future collaboration it was brought out that exploring ways to leverage open data, ways to effectively use and build off of perspectives and experiences from other contexts and cultures, and ways to share resources across borders including funding, human presence, and expertise were important questions to answer. Common challenges that were identified by participants ranged from cyber security and the rise of state and non-state actors in cyber warfare, finding adequate funding to support research, sustaining international collaborations, ensuring that research is meaningful and can translate into useful resources for policy and law makers, and ensuring that projects are designed with a long-term objective and vision in mind.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussions, presentations, and contributions by participants during the two day symposium were interesting and important as they demonstrated just how multi-faced the internet is, and how it is never one dimensional. How the internet is researched, how it is used, and how it is regulated will be constantly changing. Whether this change is a step forward, or a re-invention of what has already been done, is up to all who use the internet including the individual, the corporation, the researcher, the policy maker, and the government.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/internet-driven-developments'&gt;https://cis-india.org/internet-governance/blog/internet-driven-developments&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-12-28T15:34:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/internet-transparency-and-politics">
    <title>Internet, Transparency and Politics</title>
    <link>https://cis-india.org/events/internet-transparency-and-politics</link>
    <description>
        &lt;b&gt;Talk by Barun Mitra&lt;/b&gt;
        
&lt;p&gt;The 2009 general elections in India have been
preceded by various initiatives that seek to provide information to the
voters about candidates contesting the elections. The aim of providing
this information is to help voters to make 'informed choices' when
casting their votes. This talk is being organized in the context of the
research that CIS-RAW fellow Zainab Bawa is carrying out on "Internet,
Transparency and Politics". Why has the Internet become an important
space for publishing information that is streamlined for facilitating
interaction between citizens and the state? What is the impact of
making such information available to citizens? How does it transform
their relationship with political actors and government agencies?
Simultaneously, how are elected representatives and political parties
responding to these 'transparency' initiatives?&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Speaker&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Barun Mitra is the Director of
Liberty Institute, a think-tank based in Delhi. He has conceptualized
EmpoweringIndia.org to enable voters to cast their votes thoughtfully
during the elections and to use the information on the site to hold
their elected representatives accountable after they have been voted
in. Barun Mitra also writes on issues of environment, health, trade and
democracy in publications such as The Mint, Economic Times and Business
Standard.&lt;/p&gt;
&lt;h3&gt;Time and Date&lt;/h3&gt;
&lt;p&gt;Wednesday, 15 April 2009; 5.00-6.30 pm&lt;/p&gt;
&lt;h3&gt;Venue&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Centre for Internet and Society, No. D2, 3rd Floor, Sheriff Chambers, 
14, Cunningham Road, Bangalore - 560052&lt;/p&gt;
&lt;h3&gt;Map &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;For a map, please click &lt;a class="external-link" href="http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=centre+for+internet+and+society+bangalore&amp;amp;jsv=128e&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=61.070016,113.203125&amp;amp;ie=UTF8&amp;amp;cd=1&amp;amp;latlng=12988395,77594450,9857706471034889432&amp;amp;ei=5QXRSKLrNYvAugPX4YSAAg"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/internet-transparency-and-politics'&gt;https://cis-india.org/events/internet-transparency-and-politics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sachia</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-05T04:36:59Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/internet-szabadon">
    <title>Internet, szabadon</title>
    <link>https://cis-india.org/news/internet-szabadon</link>
    <description>
        &lt;b&gt;A polgárjogi aktivisták konfrontálódtak és panaszkodtak, a Google és a Facebook hárított és panaszkodott az Internet at Liberty konferencián, amelyet kedden és szerdán rendezett a Google és a CEU Budapesten.&lt;/b&gt;
        
&lt;p&gt;– Célunk a szabad, nyílt és biztonságos internet. A Google igyekszik maximalizálni az információhoz való szabad hozzáférést, bár néha hibázunk. Útelágazáshoz érkeztünk, valószínű, hogy az internet korlátozottabb lesz, és a felhasználókat megfosztják hatalmuktól. 2002-ben még csak négy, 2010-ben már 40 ország – köztük Irán, Törökország, Oroszország és Kína – kormánya blokkol tartalmat a neten. Azon vannak, hogy kiépítésék saját, államilag támogatott és feltehetően cenzúrázott keresőiket. A Google célja, hogy a net szabad maradjon – röviden ezt mondta David Google Drummond, a Google jogi igazgatója, egyben a Google egyik alelnöke a Google és a CEU és a Google által szervezett nemzetközi konferencián, az Internet at Liberty 2010-en kedden Budapesten.&lt;br /&gt;&lt;br /&gt;Hát ezért kár volt ilyen messzire jönni.&lt;/p&gt;
&lt;p&gt;De még mielőtt a hallgatóság egy emberként a laptopjába bújt volna, hogy a Farmville-ben bekkelje ki az elkövetkező két napot, szerencsére kiderült, hogy a jelenlévők között akad rengeteg polgárjogi aktivista, netes szabadságharcos és született privacymániás a világ minden részéről. Ők gondoskodtak róla, hogy személyes, országos, sőt globális volumenű panaszaikkal árnyalják a süppedő padlószőnyegből és az erdei gigantposzterből áradó, felelősségteljes corporate derűt.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/DavidDrummer.jpg/image_preview" alt="David Drummond, Senior Vice President, Google" class="image-inline image-inline" title="David Drummond, Senior Vice President, Google" /&gt;&lt;/p&gt;
&lt;p&gt;„Az internet önmagában nem változtat meg semmit. Ki kell menni az utcára, és a vérünkkel kell fizetnünk!”; „Legalább mondják meg, mi a szart csinálnak!”; „Tudja maga, milyen rendőrségünk van nekünk Pakisztánban?” - ilyen és ehhez hasonló hozzászólások árnyékolták be a felelősségteljes corporate derűt. Amely a sötét fellegek ellenére egészen kedd estig kitartott; de ne szaladjunk ennyire előre.&lt;/p&gt;
&lt;h3&gt;A jó, a csúf és az illegális&lt;/h3&gt;
&lt;p&gt;Az internetes szólásszabadság története a jó, a csúf és az illegális története, mondta a konferencia első beszélgetésén Rob Faris, a Harvard Berkman internetes központjának kutatási igazgatója és a nyílt internetért ügyködő OpenNet Initiative munkatársa. A legfontosabb feladat Faris szerint eldönteni azt, hol húzódik a határ a csúf, de még törvényes, és az illegális tartalom között. Erre a legjobb példa a netes pornó helyzete az Egyesült Államokban: az USA Legfelsőbb Bírósága kétszer is megsemmisítette a betiltást célzó törvényeket, és most ott tart az ügy, hogy csak az iskolákban és a könyvtárakban elérhetetlen a pornó, egyébként alkotmányos védelmet élvez. Nem úgy, mint Indiában, de ne szaladjunk ennyire előre.&lt;/p&gt;
&lt;p&gt;Faris szerint ugyanakkor világszerte mostanában jelennek meg az internetszabályozás második generációs módszerei, amelyek között ott vannak a szerzői jogi alapon benyújtott eltávolítási kérelmek, sőt az aktivisták és a médiaszájtok ellen intézett kibertámadások is. Az egyes országok kormányai finomítottak szűrési módszereiken, Bahreinben és Jemenben például a választások idején csak speciális szájtokat és információt blokkoltak, Argentína eljutott odáig, hogy néhány éve sikerült a Yahooból elérhetetlenné tennie a Diego Maradonára vonatkozó találatokat. Faris konklúziója: nemzetközi megoldásokra van szükség. De ne szaladjunk ennyire előre.&lt;/p&gt;
&lt;h3&gt;Panaszfal extra&lt;/h3&gt;
&lt;p&gt;Nem kellett sok idő hozzá, hogy a konferencia egyetlen hatalmas panaszfallá változzon, vicces és kevésbé vicces panaszrohamokkal. A kirgiz meghívott, Tattu Mambetalieva elmondta, hogy Kirgizisztánban kevesen neteznek, mert drága. Sunil Abraham, az indiai meghívott elmondta, hogy náluk blokkolják a pornót, különös tekintettel a Savita Bhabhi kalandjait ábrázoló &lt;a class="external-link" href="http://kirtu.com/index.php"&gt;képregénysorozatra&lt;/a&gt; &lt;strong&gt;[Warning: Not safe for work - adult content]&lt;/strong&gt;. Sazad Ahmad, a pakisztáni meghívott elmondta, hogy a náluk a kormány blaszfémiára hivatkozva blokkol, de mindig kiderül, hogy politikai okok állnak a háttérben.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/MadeleineMorris.jpg/image_preview" alt="Madeleine Morris moderál a BBC-től. A Twitteren mad_morris " class="image-inline image-inline" title="Madeleine Morris moderál a BBC-től. A Twitteren mad_morris " /&gt;&lt;/p&gt;
&lt;p align="left"&gt;Egy szíriai aktivista arra panaszkodott, hogy a tunéziai kormány 12 millió dollárért vett a netes forgalom ellenőrzésére szolgáló szervert, és hogy a fejlődő országokban a tartalomszűrésre használt szoftvert nyugatról szerzik be. Egy jemeni aktivista arra panaszkodott, hogy a yemenportal.net-et blokkolja a kormányzat, és hogy a világ semmit nem tud az országban zajló tömegtüntetésekről, nem beszélve a helyi LGBT-közösségéről és a rockegyüttesekről. Tunéziában az a probléma, hogy ha tömegmegmozdulás szerveződik a neten, húszezren feliratkoznak ugyan rá, de csak tízen mennek el. Törökország több száz szájtot blokkol, köztük a YouTube-ot és a Google számos szolgáltatását (Docs, Books, Translate). Azerbajdzsánban két bloggert bebörtönöztek írásaik miatt, és azért nem engedik ki őket, mert nem számítanak újságírónak. A Facebook törli a szoptató anyákról készült képeket, és a Wikipédián az emberi anatómiát taglaló szócikkeket illusztráló fotókat egyre gyakrabban váltják fel rajzok.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/SurfingatLiberty.jpg/image_preview" alt="Surfing at Liberty" class="image-inline image-inline" title="Surfing at Liberty" /&gt;&lt;/p&gt;
&lt;p align="left"&gt;Csodák csodájára a panaszok úgy pattantak le a jelen lévő politikusokról, diplomatákról és üzletemberekről, mint eltévedt golflabda a moha lepte kőkerítésről: a Facebook, a Google és a francia külügyminisztérium jelen lévő képviselői, részben tehát a közvetlen címzettek végig ügyesen hárítottak. Folyamatosan hangoztatták, milyen irtózatosan nehéz dolguk van ebben az egyre globálisabb világban, ahol diktatúrák és demokráciák között kell zsonglőrködniük, mindenkinek a kedvében járniuk, és ők mindent megtesznek ugyan, de hát Kína, ugye. Meg Irán. Főleg Irán. Így aztán nem hozott érdemi vitát a Facebook és a Google közös színpadi szereplése sem, pedig a két cég magas szinten képviseltette magát: a Google-től Drummond, a Facebooktól egyenesen Lord Richard Allan, Hallam bárója, volt brit parlamenti képviselő jött el Budapestre, akivel &lt;a class="external-link" href="http://index.hu/tech/2010/09/22/hogyan_kuzd_a_facebook_a_mellekkel/"&gt;interjút is készítettünk&lt;/a&gt; [2].&lt;/p&gt;
&lt;h3 align="left"&gt;Még a kritikus sem kritizál&lt;/h3&gt;
&lt;p align="left"&gt;„Nem áll szándékomban a privacy-vel kapcsolatos kritikát megfogalmazni”, mondta nekik kérdésnek látszó expozéjában Marc Rotenberg, az Electronic Privacy Information Center (EPIC) igazgatója, akitől joggal lehetett várni, hogy rendesen megszorongatja a Google és a Facebook tökét. Rotenberg a két cég képviselőihez intézett beszédében annyit mondott, hogy nem feltétlenül hasznos a szólásszabadságot és a magánszférát két ütköző, egymással kiegyensúlyozandó területként felfogni. Szerinte a kettő inkább kiegészíti egymást: az anonim véleménynyilvánítás joga például olyan terület, ahol kéz a kézben jár a magánszférához fűződő jog és a szólásszabadság.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/DavidDrummondLordRichard.jpg/image_preview" alt="David Drummond (Google) és Lord Richard Allan (Facebook)" class="image-inline image-inline" title="David Drummond (Google) és Lord Richard Allan (Facebook)" /&gt;&lt;/p&gt;
&lt;p align="left"&gt;Rotenberg szerint még a privacy semmibe vételével folyamatosan vádolt Facebook sem az ördögtől való, olyannyira, hogy ő maga is fent van rajta. „A Facebook olyan, mint a telefon vagy az email. Használjuk csak politikai aktivizmusra, de legyünk tisztában a hiányosságaival” - mondta Rotenberg, aki szerint a kritikánál többet használ a dialógus.&lt;/p&gt;
&lt;p align="left"&gt;Mindeközben Lord Allan of Hallam szorgalmasan jegyzetelt az általa csak fPadként emlegetett, Facebook-kék színű füzetbe, Drummond a Google-től pedig atyai stílusban oktatta: „Sok-sok hibát fognak még elkövetni – mondta a Google főjogásza a brit bárónak. – De idővel majd beletanulnak”.&lt;/p&gt;
&lt;p align="left"&gt;A példátlan kultúrdialógus-kényszerben szinte elsikkadt az egyik legeredetibb résztvevő, Jevgenyij Morozov mondanivalója, pedig Morozov a techvilág jelenleg talán legnépszerűtlenebb álláspontját képviseli: azt hangoztatja, hogy az internet hozzásegíti a diktatúrákat ahhoz, hogy megerősítsék saját hatalmukat A belorusz származású blogger, újságíró és kutató általában szkeptikusan gondolkodik az internet demokratizáló hatásáról. Morozov, aki a tavalyi TED konferencián egész &lt;a class="external-link" href="http://www.ted.com/talks/evgeny_morozov_is_the_internet_what_orwell_feared.html"&gt;előadást&lt;/a&gt; [3]&amp;nbsp; tartott arról, hogyan élnek vissza a diktatúrák a modern technológiai eszközök és a web általában jótékonynak tartott adományaival, azt mondja, hogy az internet egyszerre autonóm erő, és egyszerre a hatalom eszköze. A kutató szerint túlságos leegyszerűsítés a kérdést az aktivisták és a kormányok közötti harcra lebontani. Először meg kell érteni a kultúra, a vallás, a nacionalizmus közötti kapcsolatokat, és csak utána kitalálni, hogyan vonatkoztatható mindez az internetre. A tanulság: tovább kell tanulmányozni a kérdést. Morozov nézeteit nem mindenki osztotta, egy hozzászóló szerint például Iránban kifejezetten jót tesz, hogy a bloggerek fényképeznek, írnak és az anyagot feltöltik a netre, legalább el tudják mondani, hogy a világ figyeli őket. És ez már önmagában reményt kelt.&lt;/p&gt;
&lt;p align="left"&gt;Read the original in &lt;strong&gt;&lt;a class="external-link" href="http://index.hu/tech/2010/09/22/internet_szabadon/"&gt;index&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/internet-szabadon'&gt;https://cis-india.org/news/internet-szabadon&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T09:25:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-social-media-access-should-not-be-blocked-ban">
    <title>Internet, social media access should not be blocked: Ban</title>
    <link>https://cis-india.org/internet-social-media-access-should-not-be-blocked-ban</link>
    <description>
        &lt;b&gt;Amidst a raging controversy over the federal government’s proposal to monitor content in cyber space, UN Secretary General Ban Ki-moon on Friday said access to the Internet and various social media must not be blocked as a way to prevent criticism and public debate.
&lt;/b&gt;
        
&lt;p&gt;In his speech on the eve of the Human Rights Day which was released at the United Nations Information Centre, Ban said: “Today, within their existing obligation to respect the rights of freedom of assemble and expression, governments must not block access to the Internet and various forms of social media as a way to prevent criticism and public debate.”&lt;br /&gt;&lt;br /&gt;His comments came a few days after Telecom Minister Kapil Sibal said the government will take steps to stop offensive and defamatory content on Internet sites.&lt;br /&gt;&lt;br /&gt;Ban said: “Many of the people seeking their legitimate aspirations were linked through social media.”&lt;br /&gt;&lt;br /&gt;Sibal’s comments provoked anger and derision among Internet users. Sunil Abraham, executive director at the Centre for Internet and Society in Bangalore, said it would be “impractical on the level of scale and on the level of the objective test. What’s offensive for someone might be completely banal to somebody else,” he said. Any ham-fisted government crackdown would “have a high impact on our credibility as a democracy” and risk alienating India’s growing online community, Abraham said.&lt;/p&gt;
&lt;p&gt;The story was published in the Oman Tribune on December 10, 2011. Sunil Abraham was quoted in this article. Read the original &lt;a class="external-link" href="http://www.omantribune.com/index.php?page=news&amp;amp;id=107144&amp;amp;heading=India"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-social-media-access-should-not-be-blocked-ban'&gt;https://cis-india.org/internet-social-media-access-should-not-be-blocked-ban&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-12T04:16:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
