<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1641 to 1655.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/news/the-register-february-15-2016-india-facebook-ruling-is-another-nail-in-coffin-of-mno-model"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/india-wont-censor-social-media"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-bna-february-1-2017-nayanima-basu-india-whatsapp-privacy-fight-may-affect-multinationals"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/looser-web-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/india-trilateral-forum"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-march-17-2015-neha-alawadhi-india-tops-list-of-content-restrictions-requests-says-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/vocativ-joshua-kopstein-india-private-companies-citizens-biometric-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-quint-january-11-2018-india-to-introduce-virtual-id-for-aadhaar-to-strengthen-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/www-china-post-aug-24-2012-india-threatens-action-against-twitter-for-ethnic-violence-rumors"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/tech-dirt-march-22-2016-india-still-trying-to-turn-optional-aadhaar-identification-number-into-mandatory-national-identity-system"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-straits-times-august-24-2018-debarshi-dasgupta-india-steps-up-vigilance-against-whatsapp-abuse"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/telecom/news/the-register-february-15-2016-india-facebook-ruling-is-another-nail-in-coffin-of-mno-model">
    <title>India's ‘Facebook ruling’ is another nail in the coffin of the MNO model</title>
    <link>https://cis-india.org/telecom/news/the-register-february-15-2016-india-facebook-ruling-is-another-nail-in-coffin-of-mno-model</link>
    <description>
        &lt;b&gt;Ability to access 'net from mobe no longer considered a miracle.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.theregister.co.uk/2016/02/15/indias_facebook_ruling_is_another_nail_in_the_coffin_of_the_mno_model/"&gt;Register&lt;/a&gt; on February 15, 2016. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Nobody could accuse India’s telecoms regulator, TRAI, of being in the operators’ pockets. This month it has, once again, set eye-watering reserve prices for the upcoming 700 MHz spectrum auction (see separate item), and now it has taken one of the toughest stances in the world on net neutrality, in effect banning zero rated or discounted content deals like Reliance Communications’ Facebook Basics, or Bharti Airtel’s Zero.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a ruling last Monday, TRAI said telecoms providers are banned from offering discriminatory tariffs for data services based on content, and from entering deals to subsidize access to certain websites. They have six months to wind down any existing arrangements which contravene the new rules. Its stance is even stricter than in other countries with strong pro-neutrality laws, such as Brazil and The Netherlands.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is the most extensive and stringent regulation on differential pricing anywhere in the world,” Pranesh Prakash, policy director at the Centre for Internet and Society, said. “Those who suggested regulation in place of complete ban have clearly lost.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such decisions, combined with high spectrum costs, will quickly make the traditional cellular business model unworkable in India, and the more that happens, the more wireless internet innovation will switch to open networks running on Wi-Fi and unlicensed spectrum. R.S. Sharma, chairman of TRAI, was careful to tell reporters that the zero rating ruling would not affect any plans to offer free Wi-Fi services, like those planned by Google in a venture with Indian Railways.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A disaster for MNOs, not Facebook&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook pronounced itself “disappointed” at TRAI’s ruling, having lobbied aggressively for a more flexible approach since RCOM was forced to suspend the Basics offering in December while the consultation process took place. But while the ruling bars the Basics offering – which provided free, low speed access, on RCOM’s network, to a selection of websites, curated by Facebook – it does not stop the social media giant pursuing other initiatives within its internet.org umbrella. These include projects to extend access using its own networks, powered by drones and unlicensed spectrum, to the unserved of India and other emerging economies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So while the TRAI decision may be a setback for Facebook, it is not the body blow that it represents for the MNOs with their huge debt loads and infrastructure costs, and low ARPUs. Facebook, with 130m users in India, has a comparable reach to the Indian MNOs (only three, Bharti Airtel, Vodafone and Idea, have more subscribers than Facebook has users), and is better skilled at monetizing those consumers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The challenge for companies like Facebook is that strict neutrality rules reduce their ability to harness others’ networks in order to reach out to new users. There are about 240m people in India who are online, but don’t use Facebook, and about 800m who are not connected, so the growth potential is far larger than in the other 37 countries where Basics is offered, such as Kenya or Zambia (Facebook is blocked in China). Using RCOM’s network and marketing activities was a far cheaper way to reach some of those people than launching drones, but Facebook has other options too, including its existing efforts to make its services more usable on very basic handsets and connections; the ability to leverage the WhatsApp brand; and partnerships with Wi-Fi providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The drones may have less immediate results than Basics, but they are a high profile example of an ongoing shift towards open networks, which has been going on for years, driven more by Wi-Fi proliferation than neutrality laws. The latter will be an accelerant, however.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;All internet will be free, not zero rated&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Currently, zero rating is an increasingly popular tactic to lure users with an apparently cheap deal and then, hopefully, see them upgrade to richer data plans, or spend money on m-commerce and premium content, in future. Zero rating involves allowing users access to selected websites and services without it affecting their data caps or allowances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The US regulator has so far tolerated the practice, but the debate is raging, there and elsewhere, over whether it infringes neutrality laws, by offering different pricing for different internet services. If other authorities take the stance adopted by TRAI in India, operators will have to find new ways to attract customers and differentiate themselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Increasingly, access to a truly open internet will be the baseline, and priced extremely low. That low pricing will be made commercially viable by rising use of Wi-Fi to reduce cost of data delivery, whether for MNOs, wireline providers or web players like Google and Facebook, which are moving into access provision. Providers, whether traditional or new, will have to stop regarding access to the internet as a premium service or a privilege – it will be more akin to connecting someone to the electricity grid, just the base enabler of the real revenue model.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just as it’s only when users plug something into that grid that they start to pay fees, so the operators will charge for higher value offerings which ride on top of the internet – premium content, enterprise services, cloud storage, freemium applications and so on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The mobile operators have not embraced these ideas willingly. For years, the ability to access the internet from a mobile device was regarded as a value-add, almost a miracle. Now that the wireless network is often the primary access method, they need to change their ideas and be more like the smarter cablecos – which have tacked internet access onto a model driven by paid-for content and services – or the web giants, which have worked out ways to monetize ‘free’ access, from advertising to big data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This, of course, is one of the goals of internet.org and Google’s similar initiatives involving drones, white space spectrum and satellites. The more users are able to access the internet, preferably for free, and the more they see Google or Facebook as their primary conduits to the web, the more data these companies have to feed into their deep learning platforms, their context aware services and their advertising and big data engines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So while critics of TRAI said the zero rating decision was a setback to the goal of getting internet access into the hands of the huge underserved population of India, that population is too large and potentially rich for Facebook and its rivals to give up at the first hurdle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook CEO Mark Zuckerberg wrote in a blog post: "While we're disappointed with today's decision, I want to personally communicate that we are committed to keep working to break down barriers to connectivity in India and around the world. Internet.org has many initiatives, and we will keep working until everyone has access to the internet."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/news/the-register-february-15-2016-india-facebook-ruling-is-another-nail-in-coffin-of-mno-model'&gt;https://cis-india.org/telecom/news/the-register-february-15-2016-india-facebook-ruling-is-another-nail-in-coffin-of-mno-model&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Free Basics</dc:subject>
    
    
        <dc:subject>TRAI</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    

   <dc:date>2016-02-28T03:44:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">
    <title>India's 'Big Brother': The Central Monitoring System (CMS)</title>
    <link>https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system</link>
    <description>
        &lt;b&gt;In this post, Maria Xynou looks at India´s Central Monitoring System (CMS) project and examines whether it can target individuals´ communications data, regardless of whether they are involved in illegal activity.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Starting from &lt;a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon"&gt;this month&lt;/a&gt;, all telecommunications and Internet communications in India will be analysed by the government and its agencies. What does that mean? It means that everything we say or text over the phone, write, post or browse over the Internet will be centrally monitored by Indian authorities. This totalitarian type of surveillance will be incorporated in none other than the Central Monitoring System (CMS).&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;The Central Monitoring System (CMS)&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Central Monitoring System (CMS) may just be another step in the wrong direction, especially since India currently lacks privacy laws which can protect citizens from potential abuse. Yet, all telecommunications and Internet communications are to be monitored by Indian authorities through the CMS, despite the fact that it remains &lt;/span&gt;&lt;a href="http://www.lossofprivacy.com/index.php/2009/11/india-to-set-up-a-central-monitoring-system/"&gt;unclear how our data will be used&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The CMS was prepared by the Telecom Enforcement, Resource and Monitoring (TREM) and by the Centre for Development of Telematics (C-DoT) and is being manned by the Intelligence Bureau. The CMS project is likely to start operating this month and the &lt;/span&gt;&lt;a href="http://newindianexpress.com/nation/article1300012.ece"&gt;government plans&lt;/a&gt;&lt;span&gt; on creating a platform that will include all the service providers in Delhi, Haryana and Karnataka. The &lt;/span&gt;&lt;a href="http://cactusblog.files.wordpress.com/2010/01/it_act_2008.pdf"&gt;Information Technology Amendment Act 2008&lt;/a&gt;&lt;span&gt; enables e-surveillance and central and regional databases will be created to help central and state level law enforcement agencies in interception and monitoring. Without any manual intervention from telecom service providers, the CMS will equip government agencies with Direct Electronic Provisioning, filters and alerts on the target numbers. The CMS will also enable &lt;/span&gt;&lt;a href="http://www.nextbigwhat.com/indian-government-to-setup-centralized-communication-monitor-system-297/"&gt;Call Data Records (CDR) analysis and data mining&lt;/a&gt;&lt;span&gt; to identify the personal information of the target numbers.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The estimated set up cost of the CMS is&lt;/span&gt;&lt;a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon"&gt; Rs. 4 billion&lt;/a&gt;&lt;span&gt; and it will be connected with the Telephone Call Interception System (TCIS) which will help monitor voice calls, SMS and MMS, fax communications on landlines, CDMA, video calls, GSM and 3G networks. Agencies which will have access to the CMS include the Research and Analysis Wing (R&amp;amp;AW), the Central Bureau of Investigation (CBI), the National Investigation Agency (NIA), the Central Board of Direct Taxes (CBDT), the Narcotics Control Bureau, and the Enforcement Directorate (ED). In particular, last October, &lt;/span&gt;&lt;a href="http://www.zdnet.com/in/india-agency-petitions-for-monitoring-system-7000005762/"&gt;the NIA approached the Department of Telecom&lt;/a&gt;&lt;span&gt; requesting its connection with the CMS, which would help it intercept phone calls and monitor social networking sites &lt;/span&gt;&lt;a href="http://articles.timesofindia.indiatimes.com/2012-10-15/internet/34471762_1_loknath-behera-nia-dot"&gt;without the cooperation of telcos.&lt;/a&gt;&lt;span&gt; However, the NIA is&lt;/span&gt;&lt;a href="http://newindianexpress.com/nation/article1300012.ece"&gt; currently monitoring eight out of 10,000 telephone lines &lt;/a&gt;&lt;span&gt;and if it is connected with the CMS, the NIA will also get access to e-mails and other social media platforms. Essentially, the CMS will be converging all the interception lines at one location and Indian law enforcement agencies will have access to them. The CMS will also be capable of &lt;/span&gt;&lt;a href="http://www.zdnet.com/in/india-agency-petitions-for-monitoring-system-7000005762/"&gt;intercepting our calls and analyzing our data on social networking sites&lt;/a&gt;&lt;span&gt;. Thus, even our attempts to protect our data from ubiquitous surveillance would be futile.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In light of the CMS being installed soon, the Mumbai police took the initiative of setting up a &lt;/span&gt;&lt;a href="http://www.google.com/hostednews/afp/article/ALeqM5iVMgMkOgpXOTaon2VoLdvu2x5oyg?docId=CNG.6d8f555d3498b94bac2fb1046fc7d3a6.4a1%20,%20http://m.timesofindia.com/articleshow/19040572.cms"&gt;´social media lab´&lt;/a&gt;&lt;span&gt; last month, which aims to monitor Facebook, Twitter and other social networking sites. This lab would be staffed by 20 police officers who would keep an eye on issues being publicly discussed and track matters relating to public security. According to &lt;/span&gt;&lt;a href="http://www.google.com/hostednews/afp/article/ALeqM5iVMgMkOgpXOTaon2VoLdvu2x5oyg?docId=CNG.6d8f555d3498b94bac2fb1046fc7d3a6.4a1%20,%20http://m.timesofindia.com/articleshow/19040572.cms"&gt;police spokesman Satyanarayan Choudhary&lt;/a&gt;&lt;span&gt;, the lab will be used to identify trends among the youth and to plan law and order accordingly. However, fears have arisen that the lab may be used to stifle political debate and freedom of expression. The &lt;/span&gt;&lt;a href="http://www.bbc.co.uk/news/world-asia-india-20405457"&gt;arrest of two Indian women last November over a Facebook post&lt;/a&gt;&lt;span&gt; which criticized the shutdown of Mumbai after the death of politician Bal Thackeray was proof that the monitoring of our communications can potentially oppress our freedom and human rights. And now that all our online activity will be under the microscope...will the CMS security trade-off be worth it?&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Surveillance in the name of Security&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In a digitised world,&lt;/span&gt;&lt;a href="http://www.businessrevieweurope.eu/technology/software/addressing-the-cyber-security-threat"&gt; threats to security have been digitised&lt;/a&gt;&lt;span&gt;. Terrorism is considered to be a &lt;/span&gt;&lt;a href="http://www.rorg.no/Artikler/869.html"&gt;product of globalisation&lt;/a&gt;&lt;span&gt; and as such, the Internet appears to be a tool used by terrorists. Hence governments all around the world are convinced that &lt;/span&gt;&lt;a href="http://www.slate.com/blogs/future_tense/2012/12/13/national_counterterrorism_center_s_massive_new_surveillance_program_uncovered.html"&gt;surveillance is probably one of the most effective methods in detecting and prosecuting terrorists&lt;/a&gt;&lt;span&gt;, as all movement, action, interests, ideas and everything else that could define an individual are closely being monitored under the ´surveillance umbrella´ True; if everything about our existence is being closely monitored and analysed, it seems likely that we will instantly be detected and prosecuted if engaged in illegal activity. But is that the case with big data? According to &lt;/span&gt;&lt;a href="http://www.schneier.com/blog/archives/2006/03/data_mining_for.html"&gt;security expert Bruce Schneier&lt;/a&gt;&lt;span&gt;, searching for a terrorist through data mining is like looking for a needle in a haystack. Generally, the bigger the amount of data, &lt;/span&gt;&lt;a href="http://www.statsoft.com/textbook/data-mining-techniques/"&gt;the bigger the probability of an error in matching profiles&lt;/a&gt;&lt;span&gt;. Hence, when our data is being analysed through data mining of big data, the probability of us being charged for a crime we did not commit is real. Nonetheless, the CMS is going to start operating soon in an attempt to enable law enforcement agencies to tackle crime and terrorism.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;A few days ago, I had a very interesting chat with an employee at &lt;/span&gt;&lt;a href="http://www.sas.com/offices/asiapacific/india/company/index_india.html"&gt;SAS Institute (India) Pvt. Ltd.&lt;/a&gt;&lt;span&gt; in Bangalore, which is a wholly owned subsidiary of&lt;/span&gt;&lt;a href="http://www.sas.com/company/about/index.html"&gt; SAS Institute Inc&lt;/a&gt;&lt;span&gt;. SAS is a company which produces &lt;/span&gt;&lt;a href="http://www.sas.com/company/about/index.html"&gt;software solutions and services&lt;/a&gt;&lt;span&gt; to combat fraud in financial services, identify cross-sell opportunities in retail, and all the business issues it addresses are based on three capabilities: information management, analytics and business intelligence. Interestingly enough, SAS also produces&lt;/span&gt;&lt;a href="http://www.sas.com/solutions/fraud/social-network/#section=1"&gt; social network analysis&lt;/a&gt;&lt;span&gt; which ´helps institutions detect and prevent fraud by going beyond individual and account views to analyze all related activities and relationships at a network dimension´. In other words, social network analysis by SAS would mean that, through Facebook, for example, all of an individual's´ interests, activities, habits, relationships and everything else that could be, directly or indirectly, linked to an individual would be mapped out in relation to other individuals. If, for example, several individuals appear to have mutual interests and activities, there is a high probability that an individual will be associated with the same type of organization as the other individuals, which could potentially be a terrorist organization. Thus, an essential benefit of the social network analysis solution is that it &lt;/span&gt;&lt;a href="http://www.sas.com/solutions/fraud/social-network/#section=3"&gt;uncovers previously unknown network connections and relationships&lt;/a&gt;&lt;span&gt;, which significantly enables more efficient investigations.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;According to the SAS employee I spoke to, the company provides social network analysis to Indian law enforcement agencies and aims at supporting the CMS project in an attempt to tackle crime and terrorism. Furthermore, the SAS employee argued that their social network analysis solution only analyzes open source data which is either way in the public online domain, hence respecting individuals´ online privacy. In support of the Mumbai ´social media lab´, &lt;/span&gt;&lt;a href="http://m.timesofindia.com/city/mumbai/Social-media-lab-cant-keep-a-tab-on-all-social-media-users-Experts/articleshow/19027308.cms"&gt;cyber security expert, Vijay Mukhi&lt;/a&gt;&lt;span&gt;, argued:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;i&gt;´There may be around 60 lakh twitter users in the city and millions of other social media network users. The police will require a budget of around Rs 500 crore and huge resources such as complex software, unique bandwidth and manpower to keep a track of all of them. To an extent, the police can monitor select people who have criminal backgrounds or links with anti-social or anti-national elements...[...]...Even the apprehension that police is reading your tweet is wrong. The volume of networking on social media sites is beyond anybody's capacity. Deleting any user's message is humanly impossible. It is even difficult to find the origin of messages and shares. However, during the recent Delhi gangrape incident such monitoring of data in public domain helped the police gauge the mood of the people.´&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://m.timesofindia.com/city/mumbai/Social-media-lab-cant-keep-a-tab-on-all-social-media-users-Experts/articleshow/19027308.cms"&gt;Another cyber security expert&lt;/a&gt;&lt;span&gt; argued that the idea that the privacy of our messages and online activity would be intercepted is a misconception. The expert stated that:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;i&gt;´The police are actually looking out for open source intelligence for which information in public domain on these sites is enough. Through the lab, police can access what is in the open source and not the message you are sending to your friend.´&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://m.timesofindia.com/city/mumbai/Social-media-lab-cant-keep-a-tab-on-all-social-media-users-Experts/articleshow/19027308.cms"&gt;Cyber security experts&lt;/a&gt;&lt;span&gt; also argued that the purpose of the creation of the Mumbai social media lab and the CMS in general is to ensure that Indian law enforcement agencies are better informed about current public opinion and trends among the youth, which would enable them to take better decisions on a policy level. It was also argued that, apparently, there is no harm in the creation of such monitoring centres, especially since other countries, such as the U.S., are conducting the same type of surveillance, while have enacted stringent privacy regulations. In other words, the monitoring of our communications appears to be justified, as long as it is in the name of security.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;CMS targeting individuals: myth or reality?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The CMS is not a big deal, because it will not target us individually...or at least that is what &lt;/span&gt;&lt;a href="http://m.timesofindia.com/city/mumbai/Social-media-lab-cant-keep-a-tab-on-all-social-media-users-Experts/articleshow/19027308.cms"&gt;cyber security experts&lt;/a&gt;&lt;span&gt; in India appear to be claiming. But is that really the case? Lets look at the following hypothesis:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="quoted"&gt;&lt;i&gt;The CMS can surveille and target individuals, if Indian law enforcement agencies have access to individuals content and non-content data and are simultaneously equipped with the necessary technology to analyse their data.&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The two independent variables of the hypothesis are: (1) Indian law enforcement agencies have access to individuals´ content and non-content data, (2) Indian law enforcement agencies are equipped with the necessary technology to analyse individuals´ content and non-content data. The dependent variable of the hypothesis is that the CMS can surveille and target individuals, which can only be proven once the two independent variables have been confirmed. Now lets look at the facts.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The &lt;/span&gt;&lt;a href="http://bigbrotherinc.org/v1/India/"&gt;surveillance industry in India&lt;/a&gt;&lt;span&gt; is a vivid reality. &lt;/span&gt;&lt;a href="http://www.clear-trail.com/"&gt;ClearTrail&lt;/a&gt;&lt;span&gt; is an Indian surveillance technology company which provides communication monitoring solutions to law enforcement agencies around the world and which is a regular sponsor of ISS world surveillance trade shows. In fact, ClearTrail &lt;/span&gt;&lt;a href="http://www.issworldtraining.com/iss_mea/sponsors2.html"&gt;sponsored the ISS world surveillance trade show in Dubai &lt;/a&gt;&lt;span&gt;last month - another opportunity to sell its surveillance technologies to law enforcement agencies around the world. ClearTrail´s &lt;/span&gt;&lt;a href="http://wikileaks.org/spyfiles/files/0/111_CLEARTRAIL.pdf"&gt;solutions&lt;/a&gt;&lt;span&gt; include, but are not limited to, mass monitoring of IP and voice networks, targeted IP monitoring, tactical Wi-Fi monitoring and off-the-air interception. Indian law enforcement agencies are equipped with such technologies and solutions and thus have the technical capability of targeting us individually and of monitoring our ´private´ online activity.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.shoghicom.com/"&gt;Shoghi Communications Ltd.&lt;/a&gt;&lt;span&gt; is just another example of an Indian surveillance technology company. WikiLeaks has published a&lt;/span&gt;&lt;a href="http://wikileaks.org/spyfiles/files/0/160_SHOGI-2006-semiactive_gsm_monitoring.pdf"&gt; brochure&lt;/a&gt;&lt;span&gt; with one of Shoghi´s solutions: the Semi Active GSM Monitoring System. This system can be used to intercept communications from any GSM service providers in the world and has a 100% target call monitor rate. The fact that the system is equipped with IMSI analysis software enables it to extract the suspect´s actual mobile number from the network without any help from the service provider. Indian law enforcement agencies are probably being equipped with such systems by Shoghi Communications, which would enable the CMS to monitor telecommunications more effectively.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;As previously mentioned, SAS provides Indian law enforcement agencies &lt;/span&gt;&lt;a href="http://www.sas.com/solutions/fraud/social-network/"&gt;social network analysis solutions&lt;/a&gt;&lt;span&gt;. In general, many companies, Indian and international, produce &lt;/span&gt;&lt;a href="http://wikileaks.org/the-spyfiles.html"&gt;surveillance products and solutions&lt;/a&gt;&lt;span&gt; which they supply to law enforcement agencies around the world. However, if such technology is used solely to analyse open source data, how do law enforcement agencies expect to detect criminals and terrorists? The probability of an individual involved in illegal activity to disclose secrets and plans in the public online sphere is most likely significantly low. So given that law enforcement agencies are equipped with the technology to analyse our data, how do they get access to our content data in order to detect criminals? In other words, how do they access our ´private´ online communications to define whether we are a terrorist or not?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Some of the biggest online companies in the world, such as Google and Microsoft, &lt;/span&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html?_r=0"&gt;disclose our content data to law enforcement agencies&lt;/a&gt;&lt;span&gt; around the world. Sure, a lawful order is a prerequisite for the disclosure of our data...but in the end of the day, law enforcement agencies &lt;/span&gt;&lt;i&gt;can &lt;/i&gt;&lt;span&gt;and &lt;/span&gt;&lt;i&gt;do &lt;/i&gt;&lt;span&gt;have access to our content data, such as our personal emails sent to friends, our browsing habits, the photos we sent online and every other content created or communicated via the Internet. &lt;/span&gt;&lt;a href="http://www.engadget.com/tag/transparencyreport/"&gt;Law enforcement requests reports &lt;/a&gt;&lt;span&gt;published by companies, such as Google and &lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/microsoft-releases-first-report-on-data-requests-by-law-enforcement-agencies"&gt;Microsoft&lt;/a&gt;&lt;span&gt;, confirm the fact that law enforcement agencies have access to both our&lt;/span&gt;&lt;a href="http://blogs.technet.com/b/microsoft_on_the_issues/archive/2013/03/21/microsoft-releases-2012-law-enforcement-requests-report.aspx"&gt; content and non-content data&lt;/a&gt;&lt;span&gt;, much of which was disclosed to Indian law enforcement agencies. Thus, having access to our ´private´ online data, all Indian law enforcement agencies need is the technology to analyse our data and match patterns. The various surveillance technology companies operating in India, such as &lt;/span&gt;&lt;a href="http://wikileaks.org/spyfiles/files/0/111_CLEARTRAIL.pdf"&gt;ClearTrail&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="http://wikileaks.org/spyfiles/files/0/160_SHOGI-2006-semiactive_gsm_monitoring.pdf"&gt;Shoghi Communications&lt;/a&gt;&lt;span&gt;, ensure that Indian law enforcement agencies are equipped with the necessary technology to meet these ends.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The hypothesis that the CMS can surveille and target us individually can be confirmed, since Indian law enforcement agencies have access to our content and non-content data, while simultaneously being equipped with the necessary technology to analyse our data. Thus, the arguments brought forth by cyber security experts in India appear to be weak in terms of validity and reliability and the CMS appears to be a new type of ´Big Brother´ upon us. But what does this mean in terms of our privacy and human rights?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The &lt;/span&gt;&lt;a href="http://perry4law.org/cecsrdi/?topic=central-monitoring-system-cms-for-telephone-tapping-in-india-2"&gt;telephone tapping laws in India are weak&lt;/a&gt;&lt;span&gt; and violate constitutional protections. The Information Technology Amendment Act 2008 has enabled e-surveillance to reach its zenith, but yet &lt;/span&gt;&lt;a href="http://perry4law.org/cecsrdi/?topic=central-monitoring-system-cms-for-telephone-tapping-in-india-2"&gt;surveillance projects, such as the CMS, lack adequate legal backing&lt;/a&gt;&lt;span&gt;. No privacy legislation currently exists in India which can protect us from potential abuse. The confirmed CMS hypothesis indicates that all individuals can potentially be targeted and monitored, regardless of whether they have been involved in illegal activity. Yet, India currently &lt;/span&gt;&lt;a href="http://perry4law.org/blog/?cat=9"&gt;lacks privacy laws&lt;/a&gt;&lt;span&gt; which can protect individuals from the infringement of their privacy and other human rights. The following questions in regards to the CMS remain vague: Who can authorise the interception of telecommunications and Internet communications? Who can authorise access to intercepted data? Who can have access to data? Can data monitored by the CMS be shared between third parties and if so, under what conditions? Is data monitored by the CMS retained and if so, for how long and under what conditions? Do individuals have the right to be informed about their communications being monitored and about data retained about them?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Immense vagueness revolves around the CMS, yet the project is due to start operating this month. In order to ensure that our right to privacy and other human rights are not breached, &lt;/span&gt;&lt;a href="http://perry4law.org/cecsrdi/?topic=central-monitoring-system-cms-for-telephone-tapping-in-india-2"&gt;parliamentary oversight of intelligence agencies in India&lt;/a&gt;&lt;span&gt; is a minimal prerequisite. E-surveillance regulations should be enacted, which would cover both policy and legal issues pertaining to the CMS project and which would ensure that human rights are not infringed. The overall function of the CMS project and its use of data collected should be thoroughly examined on a legal and policy level prior to its operation, as its current vagueness and excessive control over communications can create a potential for unprecedented abuse.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;The necessity and utility of the CMS remain unclear and thus it has not been adequately proven yet that the security trade-off is worth it. One thing, though, is clear: we are giving up a lot of our data....we are giving up the control of our lives...with the hope that crime and terrorism will be reduced. Does this make sense?&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;a class="external-link" href="http://www.medianama.com/2013/04/223-indian-government-plans-digital-central-monitoring-system-cis-india/"&gt;This was cross-posted in Medianama&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system'&gt;https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-12-06T09:39:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/india-wont-censor-social-media">
    <title>India won't censor social media: Telecom Minister</title>
    <link>https://cis-india.org/news/india-wont-censor-social-media</link>
    <description>
        &lt;b&gt;India does not intend to censor online social networks such as Facebook, a minister said Tuesday, but he demanded that they obey the same rules governing the press and other media. The article by AFP was published in the Tribune on February 14, 2012. 
&lt;/b&gt;
        
&lt;p&gt;“I never wanted to censor social media and no government wants to do so. But like the print and electronic media, they have to obey the laws of the country.” He held a number of meetings with leading Internet companies late last year in which he asked about the possibility of checking content before it is posted online by users.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;The minister was said to have shown Internet executives examples of obscene images found on the Internet that risked offending Muslims or defaming politicians, including the boss of the ruling Congress party, Sonia Gandhi. “The media reported I had said I wanted to pre-screen the content on social media. I have never even heard the word pre-screen,” he told the summit.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;Since these meetings, 19 Internet firms including Google, Yahoo! and Facebook have been targeted in criminal and civil cases lodged in lower courts, holding them responsible for content posted by users of their platforms. The government has given its sanction for the firms to be tried for serious crimes such as fomenting religious hatred and spreading social discord — offences that could land company directors in prison.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;“All I want is that they (social media) should follow the laws of the land. Social media must not consider itself to be above that,” Sibal said. But Internet privacy groups say social media sites may not have the resources to screen obscene material that violates local laws posted on the Internet. Local laws prohibit the sale or distribution of obscene material as well as those that can hurt religious sentiments in overwhelmingly-Hindu India.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;“It is just not humanly possible to pre-censor content and Sibal knows that very well,” said Rajan Gandhi, founder of a New Delhi-based advocacy group Society in Action. Pranesh Prakash of the Bangalore-based Centre for Internet and Society said he was “glad Sibal does not believe in censorship and that companies operating in India should follow local laws.” “But on the other hand he has asked them to evolve new guidelines and actively monitor user content which is not legally sanctioned. This makes him look two-faced,” Prakash added.&lt;/p&gt;
&lt;p&gt;Google and Facebook said earlier this month they had removed the allegedly offensive content used as evidence in the court cases.&lt;/p&gt;
&lt;p&gt;The groups have appealed to the Delhi High Court asking for the cases against them to be quashed on the basis they cannot be held responsible for their clients’ actions. The comments of a judge hearing the case raised further fears that freedom of expression online could be restricted. “You must have a stringent check. Otherwise, like in China, we may pass orders banning all such websites,” the judge said at the January hearing. Facebook is banned in China and Google moved its operations out of the country in 2010 in protest at censorship laws there.&lt;/p&gt;
&lt;p&gt;The debate about social networks mirrors a larger national dialogue about freedom of speech in the world’s biggest democracy following recent protests by religious groups. Indian-origin writer Salman Rushdie was prevented from speaking at a literature festival in Jaipur last month after Muslim groups protested against his presence over his allegedly blasphemous 1988 novel “The Satanic Verses.” A group led by author and journalist Nilanjana Roy organised public readings of banned literary works on Monday to protest against what it said were recent curbs on intellectual freedom.&lt;/p&gt;
&lt;p&gt;The initiative, called “Flashreads for free speech”, was widely advertised on social networks including Twitter and Facebook.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.google.com/hostednews/afp/article/ALeqM5ilgN7BOvkKddNXocYI9gMMd4XkvQ?docId=CNG.c0ad44e4f11cacfb71d75ae1fe1d813b.5b1"&gt;Originally published by AFP&lt;/a&gt; and reproduced in the &lt;a class="external-link" href="http://tribune.com.pk/story/336345/india-wont-censor-social-media-telecom-minister/"&gt;Tribune.&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/india-wont-censor-social-media'&gt;https://cis-india.org/news/india-wont-censor-social-media&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-03-01T07:15:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-bna-february-1-2017-nayanima-basu-india-whatsapp-privacy-fight-may-affect-multinationals">
    <title>India WhatsApp Privacy Fight May Affect Multinationals</title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-bna-february-1-2017-nayanima-basu-india-whatsapp-privacy-fight-may-affect-multinationals</link>
    <description>
        &lt;b&gt;The Indian Supreme Court’s review of Facebook Inc.'s and WhatsApp Inc.'s data security practices may lack teeth but also presages a desire for a stronger privacy regime and oversight of multinationals, internet and privacy specialists told Bloomberg BNA. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nayanima Basu was &lt;a class="external-link" href="https://www.bna.com/india-whatsapp-privacy-n57982083152/"&gt;published by Bloomberg BNA&lt;/a&gt; on February 1, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;WhatsApp revised its privacy policy in August 2016 to share data with owner Facebook and allow targeted ads and messages from businesses, laying the groundwork for the free messaging service to monetize such data. But a public interest complaint, akin to a class action in the U.S., filed by two Indian students and regulatory inquiries have resulted in India’s top court asking Facebook and WhatsApp about their data protection practices.&lt;br /&gt;&lt;br /&gt;The court’s move Jan. 17 to seek the information may make multinational companies jittery, Rahul Khullar, former secretary of commerce for India’s Ministry of Commerce and Industry, told Bloomberg BNA. Although stronger data privacy enforcement is needed, all the high court has done is aggravate Facebook and other large multinationals, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook is the second largest media company in the world with a $367 billion market capitalization, Bloomberg data show. It acquired WhatsApp in 2014 for approximately $18 billion, data show. Facebook didn’t immediately respond to Bloomberg BNA’s e-mail request for comments.&lt;br /&gt;&lt;br /&gt;Khullar, who is also the former chairman of the Telecom Regulatory Authority of India, said multinationals need to be more careful in sharing their data because of the “distinction between digital non-commercial data and digitally sensitive data,” he said. A strong national data privacy law would resolve some of these issues, he said.&lt;br /&gt;&lt;br /&gt;An U.S. official based at the U.S. Embassy in New Delhi, speaking on background, told Bloomberg BNA that any maneuver that restricts the free flow of data may harm the operations of U.S.-based multinationals and similar companies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Clarity, Stronger Laws Needed&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some internet and privacy specialists say that Facebook and WhatsApp failed to provide    effective data protection under Indian law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy director at the nonprofit digital technologies advocate Centre    for Internet and Society, told Bloomberg BNA that Facebook and WhatsApp are in violation    of    &lt;a class="bluenobold" href="http://www.wipo.int/edocs/lexdocs/laws/en/in/in098en.pdf"&gt; Section 43A of the Information Technology Act&lt;/a&gt; that lays out “reasonable security practices and procedures.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian citizens are reaching out to the courts for data protection enforcement because    lawmakers have “failed to do so,” he said. That highlights the need for robust data    protection laws in India and, he said, hopefully “goads the government and Parliament    into enacting a privacy and data protection law.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In lieu of further legislative action, companies may be able to resolve some issues    by establishing clearer privacy policies, Niraj Gunde, a Mumbai-based attorney and    consumer advocate, told Bloomberg BNA. Most software agreements have a clandestine    clause that allows companies to access user data, but those agreements should also    state how the data will be used, stored and eventually disposed of, he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-bna-february-1-2017-nayanima-basu-india-whatsapp-privacy-fight-may-affect-multinationals'&gt;https://cis-india.org/internet-governance/news/bloomberg-bna-february-1-2017-nayanima-basu-india-whatsapp-privacy-fight-may-affect-multinationals&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-02T02:28:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/looser-web-rules">
    <title>India Weighing Looser Web Rules</title>
    <link>https://cis-india.org/news/looser-web-rules</link>
    <description>
        &lt;b&gt;Indian authorities are considering revisions to new Internet regulations after criticism from free-speech advocates and companies like Google Inc. that fear they could be exposed to liability under the regime. This article by Amol Sharma was published in the Wall Street Journal on May 30, 2011.&lt;/b&gt;
        
&lt;p&gt;The rules, which took effect in April, require Internet companies to remove objectionable content from their sites, including anything "grossly harmful" or "harassing," within 36 hours of being notified by authorities. Executives could thereafter face penalties, including stiff fines or even jail time, say lawyers who have reviewed the regulations.&lt;/p&gt;
&lt;p&gt;The rules may soon be revised to add greater liability protections for Internet companies, Minister of Communications and Information Technology Kapil Sibal said in an interview.&lt;/p&gt;
&lt;p&gt;Mr. Sibal said it is fair for the government to ask Internet companies to put in place codes of conduct that restrain users from posting certain material online, as the regulations do. But he said it is "relatively unfair" to expect Internet companies—which are referred to in the rules as "intermediaries"—to be responsible for third-party content. "To make the intermediary liable for the user violating that code would, I think, not serve the larger interests of the market," Mr. Sibal said.The backlash after the rules were enacted has been growing. Civil-liberties groups are expressing fears the rules are too open to interpretation and could be used by the government to restrict free speech on the Web. The regulations represent an effort by India to get a grip on the Web without the kind of direct censorship or website-blocking practiced in countries like Iran, China and Saudi Arabia.&lt;/p&gt;
&lt;p&gt;He said ministry officials are trying to "apply our minds and see if the regime can be made more rational."&lt;/p&gt;
&lt;p&gt;In its defense earlier this month, India's ministry said the restrictions rightly require that Internet companies observe due diligence in order to enjoy exemption from liability for content posted by third parties. "These due diligence practices are the best practices followed internationally by well-known mega corporations operating on the Internet," the statement said.&lt;/p&gt;
&lt;p&gt;Google was among the companies and nonprofit organizations that offered feedback on the rules before they went into effect. The Web giant unsuccessfully sought changes to limit its potential liability for third-party content and to scale back a list of banned material that it said was "too prescriptive."&lt;/p&gt;
&lt;p&gt;The rules also require removal of content that is "ethnically objectionable," "disparaging," or that "harm[s] minors in any way."&lt;/p&gt;
&lt;p&gt;On Monday, a Google India spokeswoman referred to a previously issued statement on the matter. "If Internet platforms are held liable for third party content, it would lead to self-censorship and reduce the free flow of information. The regulatory framework should ideally help protect Internet platforms and people's abilities to access information," the statement said. Google has faced requests in many countries to take down content including social-networking profiles and YouTube videos that foreign governments or users find objectionable.&lt;/p&gt;
&lt;p&gt;India is one of the world's largest Internet markets, with a user base estimated at more than 80 million. That represents only a slice of its 1.2 billion-strong population, leaving room for growth.&lt;/p&gt;
&lt;p&gt;Mr. Sibal, who wasn't the telecom minister when the act was passed, is trying various efforts to boost Web usage. He plans to bring 500,000 villages online within a few years by laying a massive fiber-optic backbone and using wireless devices to let Web traffic travel the "last mile" to rural households.&lt;/p&gt;
&lt;p&gt;He said the government has to be careful not to get in the way of Internet companies trying to build up the market. "We need to ensure that we don't put conditions which are adverse to the efficient functioning of the intermediaries," he said. Despite his interest in relaxing the new rules, however, Mr. Sibal said Internet companies must "take into account the sensitivities of the countries in which they're operating."&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Sunil Abraham, executive director of the Centre for Internet and Society in Bangalore, said his organization and other civil liberties groups are preparing legal challenges to the regulations on constitutional grounds.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;He said the groups will broadly argue that the rules have put in place arbitrary and unclear restrictions on speech and have gone beyond the scope of the Information Technology Act of 2008, the law on which they are based.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Mr. Abraham welcomed Mr. Sibal's interest in potentially revising the regulations. "If Kapil Sibal gives this his personal time...there's a good chance the next version would be more robust in terms of constitutionality," he said.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Read the original published by the Wall Street Journal &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052702304563104576355223687825048.html"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/looser-web-rules'&gt;https://cis-india.org/news/looser-web-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-05-31T12:23:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/india-trilateral-forum">
    <title>India Trilateral Forum</title>
    <link>https://cis-india.org/internet-governance/news/india-trilateral-forum</link>
    <description>
        &lt;b&gt;Sunil Abraham was a panelist in the session "The Promise and Peril of Technology" at the 14th edition of India Trilateral Forum organized by the German Marshall Fund of the United States, Observer Research Foundation and Ministry of Foreign Affairs, Government of Sweden in Goa from March 22 - 23, 2018.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;The Promise and Peril of Technology&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The emergence of new technologies create possibilities for change, yet also carry risks of the emergence of “soft wars,” privacy issues, ethical challenges, among others.  With global military spending on the rise, we may now be on the cusp of a series of new technological innovations that will fundamentally change the way we conduct warfare. The rise of low-cost real-time satellite surveillance has the potential for privacy violation, intrusive controls, and hacking. Many credit the digital revolution with creating new possibilities for democratic engagement, because information technology has made institutions like mass media less hierarchical. There are hidden costs to the digital revolution and the transformative technologies, which needs to be carefully understood. The panel discussed the deeper layers of opportunities and risks associated with transformative technologies on war and peace and discuss whether the U.S., India, and Europe are falling behind China in this crucial area.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/india-trilateral-forum'&gt;https://cis-india.org/internet-governance/news/india-trilateral-forum&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-04-10T15:09:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-march-17-2015-neha-alawadhi-india-tops-list-of-content-restrictions-requests-says-facebook">
    <title>India tops list of content restrictions requests, says Facebook</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-march-17-2015-neha-alawadhi-india-tops-list-of-content-restrictions-requests-says-facebook</link>
    <description>
        &lt;b&gt;India has again topped the list of content restriction requests in the second half of 2014 with over 5,800 requests recorded in Facebook's Government Requests Report released on Sunday.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Neha Alawadhi was published in the &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2015-03-17/news/60211797_1_data-requests-government-requests-chris-sonderby"&gt;Economic Times&lt;/a&gt; on March 17, 2015. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"Overall, we continue to see an increase in government requests for data  and content restrictions. The amount of content restricted for  violating local law increased by 11% over the previous half, to 9,707  pieces of content restricted, up from 8,774," said Monika Bickert,  Facebook's head of global policy management, and Chris Sonderby, deputy  general counsel, in a statement on the social networking website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://economictimes.indiatimes.com/topic/Facebook"&gt;Facebook&lt;/a&gt; saw a rise in content restriction requests from countries like Turkey  and Russia, while requests from countries like Pakistan came down. The  number of content restriction requests from Pakistan came down to 54 in  the second half of 2014 from 1,773 in the first half. The number of  content restriction requests from India rose to 5,832 from 4,960 in the  first half.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has been the top requestor for content restrictions in the past  one and a half years, and the number of these requests and for user  account data from the country have consistently been on the rise.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook said that while the number of government requests for user  account data remained relatively flat in the six-month period, there was  an increase in data requests from "governments such as India, and  decline in requests from countries such as the United States and  Germany".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India made 5,473 requests for user account data in the six months ending  December 2014, second only to the United States, which made 14,274  requests in the same period. About 45% of the requests made by India led  to Facebook producing some data, according to the report, while 79% of  the requests made by the US were complied with.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Of course, the figures are alarming... But it would have been better if  Facebook had also given us more information on the kind of data that  was being asked for. Now we only have consolidated figures. So what kind  of data was asked for, that would have been more useful," said counsel  for the Software Freedom Law Centre.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is the second largest market for Facebook, with 112 million users  until last year, second only to the United States. According to Pranesh  Prakash, policy director at the Centre for Internet and Society, "the  number of content restriction requests are not only high on an absolute  number, but even on a per-user basis".&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-march-17-2015-neha-alawadhi-india-tops-list-of-content-restrictions-requests-says-facebook'&gt;https://cis-india.org/internet-governance/news/economic-times-march-17-2015-neha-alawadhi-india-tops-list-of-content-restrictions-requests-says-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-04-03T17:01:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar">
    <title>India Today Conclave Next 2017: Aadhaar was rushed, says MP Rajeev Chandrashekhar</title>
    <link>https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar</link>
    <description>
        &lt;b&gt;Talking at the ongoing India Today Conclave Next 2017, MP Rajeev Chandrashekhar said that Aadhaar was rushed and foisted on the country by authorities that fail to first create a proper ecosystem. Chandrashekhar gave his comments at a keynote titled Privacy -- The Fundamental Right for the Digital Citizen.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Priya Pathak was published by &lt;a class="external-link" href="http://indiatoday.intoday.in/technology/story/india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar/1/1084396.html"&gt;India Today&lt;/a&gt; on November 8, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chandrashekhar, who has been vocal on  the issues like data protection, privacy and net neutrality, said that  the government should have created a proper ecosystem for Aadhaar by  bringing norms and laws around data protection and privacy before asking  people to sign up for the unique ID.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The MP talked about India's  journey from being a largest unconnected world to becoming the largest  connected world. But Chandrashekhar criticised the "flawed" Aadhaar and  said that it was a classic example of how a government system would push  for technology in governance without addressing key bits of the  ecosystem around the citizen and the consumer.&lt;/p&gt;
&lt;div class="zg-placement-transition   zg-placement" id="zdt_3644892_1_wrapper" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;"If  that (Aadhaar) wasn't enough, the IT act and section 66A and its  language and its vagueness and its potential for misuse was another  example of the faults of a bureaucracy or a political system trying to  legislate or create solutions in the digital world, " he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At  the same time, he lauded the recent Supreme Court order that held all  Indians had fundamental right to privacy. "The latest finding of Supreme  Court of Privacy as fundamental right is a big deal and it will alter  number of things going forward," he said. He added that there should be  more debate and discussion on data privacy as there is an attempt to  characterise data privacy as some of kind of elitist issue in India  which it's not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy, especially for the digital world,  currently is one of the most debated topics in India. The country in the  past few years has seen a number of instances where a government or a  private entity has knowingly or unknowingly compromised the data of its  users. Recently a study published by Centre for Internet and Society, a  Bengaluru-based organisation, revealed that private data of more 130  million Aadhaar card holders were leaked from four government websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  Supreme Court in August this year declared privacy as a fundamental  right. A nine-judge Constitution bench headed by Chief Justice J S  Khehar has declared that "right to privacy is an intrinsic part of Right  to Life and Personal Liberty under Article 21 and entire Part III of  the Constitution".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move has been praised by many including  Rajeev Chadrashekhar who has said that it is a big welcome step. "It is  clear that Aadhaar and all other legislations existing and proposed will  have to meet the test of privacy being a fundamental right," he  recently said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar'&gt;https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-26T06:41:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/vocativ-joshua-kopstein-india-private-companies-citizens-biometric-data">
    <title>India To Let Private Companies Access Citizens’ Biometric Data</title>
    <link>https://cis-india.org/internet-governance/news/vocativ-joshua-kopstein-india-private-companies-citizens-biometric-data</link>
    <description>
        &lt;b&gt;India, home to the world’s largest national biometric registry, plans to begin sharing citizens’ data with the country’s private companies and startups.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Joshua Kopstein was published by &lt;a class="external-link" href="http://www.vocativ.com/404338/india-private-companies-citizens-biometric-data/"&gt;Vocativ&lt;/a&gt; on February 21, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The government-backed program, called  “India Stack,” will allow the second most populous country on Earth to  share nearly all of its 1.3 billion citizens’ fingerprints, iris scans,  and more, potentially creating unprecedented security and privacy risks  in the name of convenience and digital commerce.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India Stack will open up the country’s troves of biometric data to  Indian software developers, health care providers, and any other  business interested in using the government’s identification records in  their apps and services. The Indian government hopes the move will spur  innovation, jumpstarting its effort to create a centralized system of  digital commerce where citizens can purchase goods, apply for health  insurance, or even qualify for a loan using the biometric sensors on  their smartphones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Opponents, however, warn that the sharing scheme opens a Pandora’s  box of security and privacy problems, dramatically increasing the  likelihood of data breaches and abuse.&lt;/p&gt;
&lt;div class="page" style="text-align: justify; " title="Page 2"&gt;
&lt;div class="layoutArea"&gt;
&lt;div class="column"&gt;
&lt;p&gt;“It’s the worst time for privacy policy in the country,” Sunil  Abraham, the executive director of the Bangalore-based Centre for  Internet and Society, &lt;a href="https://www.wsj.com/articles/india-begins-building-on-its-citizens-biometrics-1487509205" target="_blank"&gt;told the Wall Street Journal&lt;/a&gt;. “We are very caught up in technological exuberance. Techno-utopians are ruling the roost.”&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The dangers aren’t just hypothetical. In 2015, an unprecedented breach at the U.S. Office of Personnel Management &lt;a href="https://www.washingtonpost.com/news/the-switch/wp/2015/09/23/opm-now-says-more-than-five-million-fingerprints-compromised-in-breaches/?utm_term=.8dc8ac825cd8" target="_blank"&gt;allowed hackers to steal the fingerprints of 5.6 million federal employees&lt;/a&gt;. Researchers have found that stolen fingerprints can be used to commit fraud and identity theft, and even &lt;a href="http://www.npr.org/sections/alltechconsidered/2016/07/27/487605182/police-use-fingertip-replicas-to-unlock-a-murder-victims-phone" target="_blank"&gt;replicated and used to unlock smartphones and other personal devices&lt;/a&gt;.  Worst of all, unlike passwords and social security numbers, biometric  identifiers like fingerprints can never be changed, meaning that any  breach is virtually guaranteed to have long-term consequences.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The India Stack program is the latest in several recent schemes to  push the country toward a fully-digitized and cashless economy. As of  December 2016, the Unique Identification Authority of India had  registered more than 91% of the population into a centralized system  called Aadhaar, which integrates with banks and allows citizens to  complete transactions and access government services using their  fingerprints. The country has also temporarily withdrawn its  higher-denomination bank notes from circulation in an effort to bolster  digital payment systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While the efforts of the government are commendable, the efficacy of  these programs in the absence of sufficient infrastructure for security  raises various concerns,” the Centre For Internet and Society wrote in &lt;a href="http://cis-india.org/internet-governance/blog/privacy-gaps-in-indias-digital-india-project" target="_blank"&gt;a paper&lt;/a&gt; outlining the privacy risks of India’s digital identity system.  “Increased awareness among citizens and stronger security measures by  the governments are necessary to combat the cogent threats to data  privacy arising out of the increasing rate of cyberattacks.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s program has already gone far beyond other countries’  biometric data collection schemes, which have mostly been limited to  passports and border control. &lt;span&gt;But law  enforcement officials’ smaller, more piecemeal efforts to collect  biometric information have also raised alarm over their potential for  abuse. &lt;/span&gt;Thanks to the cooperation of 16 state DMVs, &lt;a href="http://www.vocativ.com/394147/face-recognition-government-weapon" target="_blank"&gt;one in two Americans currently has their photo registered to a law enforcement face recognition database&lt;/a&gt; – regardless of whether they’ve been charged or even suspected of a  crime. Local police in several U.S. states have also begun collecting &lt;a href="http://www.reuters.com/article/us-crime-identification-iris-idUSTRE76J4A120110720" target="_blank"&gt;iris scans&lt;/a&gt; and &lt;a href="https://www.propublica.org/article/dna-dragnet-in-some-cities-police-go-from-stop-and-frisk-to-stop-and-spit" target="_blank"&gt;DNA swabs&lt;/a&gt; from people randomly stopped on the street, in some cases &lt;a href="http://www.vocativ.com/403313/stop-and-spit-lawsuit/" target="_blank"&gt;specifically targeting African American children&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/vocativ-joshua-kopstein-india-private-companies-citizens-biometric-data'&gt;https://cis-india.org/internet-governance/news/vocativ-joshua-kopstein-india-private-companies-citizens-biometric-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-27T15:09:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-quint-january-11-2018-india-to-introduce-virtual-id-for-aadhaar-to-strengthen-privacy">
    <title>India To Introduce Virtual ID For Aadhaar To Strengthen Privacy</title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-quint-january-11-2018-india-to-introduce-virtual-id-for-aadhaar-to-strengthen-privacy</link>
    <description>
        &lt;b&gt;The government will introduce a virtual identification number for Aadhaar to help strengthen privacy following several instances of data leaks.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was published by &lt;a class="external-link" href="https://www.bloombergquint.com/aadhaar/2018/01/10/india-to-introduce-virtual-id-for-aadhaar-to-strengthen-privacy"&gt;Bloomberg Quint &lt;/a&gt;on January 11, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The additional layer of security is meant to help Aadhaar users avoid sharing their unique identification number at the time of authentication to avail various services and welfare schemes, UIDAI said in a circular seen by BloombergQuint. The virtual ID will be an optional feature and users will be allowed to provide Aadhaar for verification.&lt;/span&gt;&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;The Aadhaar-issuing body, Unique Identification Authority of India, will also introduce limited know-your-customer rules to eliminate the need for agencies to store the biometric ID. Migration to the new system will start from June 1, it added.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;Virtual IDs should be made mandatory and the UIDAI should itself generate these codes instead of having the user do it, said Pranesh Prakash, policy director at the Center for Internet Security, which has published reports on the security flaws in the world’s largest database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The additional layer of security is meant to help Aadhaar users avoid sharing their unique identification number at the time of authentication to avail various services and welfare schemes, UIDAI said in a circular seen by BloombergQuint. The virtual ID will be an optional feature and users will be allowed to provide Aadhaar for verification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar-issuing body, Unique Identification Authority of India, will also introduce limited know-your-customer rules to eliminate the need for agencies to store the biometric ID. Migration to the new system will start from June 1, it added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Virtual IDs should be made mandatory and the UIDAI should itself generate these codes instead of having the user do it, said Pranesh Prakash, policy director at the Center for Internet Security, which has published reports on the security flaws in the world’s largest database.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;This takes into account concerns of third-party databases being combined without the consent of the individual but fails to address issues of government surveillance, exclusion and cybersecurity, he added.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;The move comes barely a week after The Tribune, a Chandigarh-based newspaper, reported that it could access the Aadhaar database by paying Rs 500, raising privacy concerns. Petitions challenging the validity of Aadhaar and the government’s decision to make it mandatory for everything from bank accounts to mobile services are pending in the Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As of now, citizens are required to share their Aadhaar number for authentication to avail certain services. With the introduction of the virtual ID that would change.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It would be a randomly generated 16-digit number that'd be digitally linked to a person's Aadhaar number. This ID would be temporary and revocable. There can be only one active and valid virtual ID for an Aadhaar number at any given point in time. Aadhaar holders will be able to use the virtual ID whenever authentication is required.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Virtual ID, by design being temporary, cannot be used by agencies for duplication.&lt;br /&gt;&lt;span&gt;&lt;strong&gt;UIDAI Circular&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Only Aadhaar holders themselves can generate a virtual ID and set a minimum validity period for that after which it will have to be replaced by a new one. The virtual IDs can be changed through UIDAI's portal, at an Aadhaar enrolment centre or using the mAadhaar mobile application, the circular said.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Who Can Store Your Aadhaar Data?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI will limit the number of agencies that can access and store your Aadhaar number. For this purpose, it will divide the agencies that seek to use Aadhaar authentication for services into two categories—global and local.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Global authentication agencies will be allowed to "securely" store the Aadhaar number, while local agencies won't. The latter would be the ones that’d use the virtual IDs and a unique token for authentication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar-issuing body has not clearly defined what would classify as a global agency. It has only said that it will "from time to time" evaluate authentication agencies "based on the laws governing them and categorise them" as global agencies. Any authentication agency that is not classified as global would be local.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Transition To New System&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;UIDAI has told all agencies that use Aadhaar authentication to update their applications and processes for accepting virtual IDs instead of the Aadhaar number and allow authentication using the UID token. This has to be done by June 1.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If an agency fails to migrate to the new system by then, their authentication services "may be discontinued" and a penalty may be imposed, UIDAI said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI will release the updated tools and protocols required for building the authentication software by March 1. All authentication agencies would also receive technical documents, workshops and training session to ensure smooth implementation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-quint-january-11-2018-india-to-introduce-virtual-id-for-aadhaar-to-strengthen-privacy'&gt;https://cis-india.org/internet-governance/news/bloomberg-quint-january-11-2018-india-to-introduce-virtual-id-for-aadhaar-to-strengthen-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-17T00:11:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/www-china-post-aug-24-2012-india-threatens-action-against-twitter-for-ethnic-violence-rumors">
    <title>India threatens action against Twitter for ethnic violence 'rumors'</title>
    <link>https://cis-india.org/news/www-china-post-aug-24-2012-india-threatens-action-against-twitter-for-ethnic-violence-rumors</link>
    <description>
        &lt;b&gt;India threatened to take action on Thursday against Twitter over content alleged to have inflamed ethnic tensions, as leaked documents revealed the government scrambling to censor online material.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Published in the &lt;a class="external-link" href="http://www.chinapost.com.tw/asia/india/2012/08/24/352011/India-threatens.htm"&gt;China Post&lt;/a&gt; on August 24, 2012. CIS is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;More than 309 orders have been issued demanding the removal of posts, images and links on websites including Facebook and Twitter as well as Australian news channel ABC, broadcaster Al-Jazeera and London's The Daily Telegraph newspaper.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has blamed Internet sites for spreading rumors that Muslims would attack students and workers who have migrated from the northeast to live in Bangalore and other southern cities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tens of thousands of people fled back to India's remote northeast region last week, fearing an outbreak of violence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has demanded that Twitter and other social network sites remove “inflammatory and harmful” material. It has also banned bulk text messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If Twitter fails to respond to our request, we will take appropriate action,” senior home ministry official R.K. Singh said in the Times of India newspaper. “We have asked the information technology ministry to serve them a notice.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The paper added that the government had set a deadline of Thursday for Twitter to respond.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bangalore-based Centre for Internet and Society (CIS) research group published analysis of the blocking orders sent by the Department of Telecommunications to domestic Internet services providers from August 18-21.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIS said that of the 309 separate items that the government ordered the providers to be blocked, the most affected sites were Facebook, YouTube, Twitter and Blogspot.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Content on websites for ABC, Al-Jazeera, The Times of India, The Daily Telegraph and online Catholic portal www.catholic.org were also targeted by the orders, though details of the contentious material are not known.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twitter representatives were not available to comment, but both Facebook and Google this week said they were in communication with Indian authorities and already had policies banning content that incited violence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has complained it was not receiving timely cooperation from social network groups over its attempts to ban “hateful” content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Thursday it said Twitter had agreed to remove six fake accounts pretending to be postings by Indian Prime Minister Manmohan Singh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Officials at Twitter have told us they are reviewing our request ... and they intend to cooperate,” Pankaj Pachauri, the premier's spokesman, told AFP.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/www-china-post-aug-24-2012-india-threatens-action-against-twitter-for-ethnic-violence-rumors'&gt;https://cis-india.org/news/www-china-post-aug-24-2012-india-threatens-action-against-twitter-for-ethnic-violence-rumors&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-27T02:52:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation">
    <title>India takes its first serious step toward privacy regulation – but it may be misguided </title>
    <link>https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation</link>
    <description>
        &lt;b&gt;The world’s second-most populous nation may be on the cusp of embracing privacy legislation. After several false starts the Indian government appears ready to accept the need for some form of regulation.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This blog post by Simon Davies was &lt;a class="external-link" href="http://www.privacysurgeon.org/blog/incision/india-takes-its-first-serious-step-toward-privacy-regulation-but-it-may-be-misguided/"&gt;published in the Privacy Surgeon&lt;/a&gt; on April 9, 2013. The Centre for Internet and Society recently published a draft Citizens privacy bill which is mentioned in this post.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Well, maybe this is a slightly optimistic view. A more accurate  portrayal might be “the Indian government appears ready to accept the &lt;i&gt;principle&lt;/i&gt; of some form of regulation”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is actually no agreed policy position across government on the  question of privacy and data protection, but the Planning Commission  last year established an Expert Group under the chairmanship of the  former Chief Justice of the Delhi High Court, A.P.Shah. Justice Shah’s  subsequent &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf" target="_blank" title="justice shah report"&gt;report&lt;/a&gt; is being considered and a draft Bill has been created.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Shah’s report provided a convincing body of evidence – both at the  domestic and the international level – for the creation of national  regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It called for the formation of a regulatory framework and set out nine  principles that could form a foundation for the next stage. These  principles – reflecting the basis of law in other countries – have been  generally accepted by Indian stakeholders as a sound frame of reference  for progress.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However although the nine principles are supported, the precise nature of any possible regulation is still very much in flux.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;There’s a long way to go before consensus is established on a overall  type of regulatory framework. Having said that, India is closer than  ever to seeing real legislation – and the international community needs  to put its weight behind the activity.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Debate over the merits of data protection and privacy law stretch back  beyond a decade but reform was constantly hampered by perceptions that  regulation would stifle economic growth.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some industry lobbies have been as keen as government to ensure that privacy proposals are stillborn.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even with the nine principles as a bedrock the path to privacy law must overcome two extremely difficult hurdles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first of these is that a substantial number of Indian opinion  leaders continue to express an instinctive view that there is no  cultural history for respect of privacy in India. That is, people don’t  want or expect privacy protection and Western notions of privacy are  alien to Indian society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In support of this assertion these critics often cite an analogy about  conversation on Indian trains. It is well known that many Indians will  disclose their life story to strangers on the Indian rail network,  discussing their personal affairs with people they have never before  met. This trait is construed as evidence that Indians do not value their  privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I spoke last week at an important &lt;a href="https://cis-india.org/news/future-of-privacy-in-india-on-april-5-2013-at-oberoi-hotel-new-delhi" target="_blank" title="India privacy meeting 2013"&gt;meeting&lt;/a&gt; in New Delhi where this exact point was repeatedly made. The meeting, organised by the Data Security &lt;a href="http://www.dsci.in/" target="_blank" title="dsci"&gt;Council&lt;/a&gt; of India and &lt;a href="http://www.i-comp.org/" target="_blank" title="icomp"&gt;ICOMP&lt;/a&gt; India was well attended by industry, government, academics and NGOs.  Speakers made constant reference to the matter of public disclosure of  personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In response, noted commentator Vickram Crishna expressed the view that  the train anecdote had no relevance and was a convenient ruse for people  who for their own self interest opposed privacy regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In reality this circumstance is like Vegas”, he said. “What happens on  Indian trains, stays on Indian trains. People will talk about their  lives because they will never see these passengers again and there is no  record of the disclosures.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“What we are dealing with in the online world is a completely different  matter. There is no correlation between the two environments”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A substantial opinion poll &lt;a href="http://www.privacysurgeon.org/blog/incision/indias-first-major-privacy-survey-reveals-deep-concerns-over-intrusion/" target="_blank" title="India’s first major privacy survey reveals deep concern over intrusion"&gt;published&lt;/a&gt; earlier this year also debunked the myth that Indians don’t care about  privacy. Levels of concern expressed by respondents was roughly the same  as the level of concern identified in other parts of the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A second hurdle facing privacy legislation is the perception -   particularly prevalent in the United States – that legislation will be a  burden on industry and people do not want yet another cumbersome and  costly government structure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are perhaps some grounds for considering this perspective, given the vast scale and complexity of India’s economy.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Government intervention does not enjoy a history of consistent success  in the marketplace, though in many instances intervention has been the  only means to bring industry into compliance with basic safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I made the point at the meeting that support for a purist model of  industry self regulation was simplistic and misguided. Most systems of a  similar nature fail unless someone is mandated to ensure compliance,  transparency, enforceability and consistency. It’s a question of finding  a way to embed accountability in industry self regulation – and this is  where legislation and government could help.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Justice Shah’s report reflected this widespread concern by recommending a  co-regulatory framework in which a privacy commissioner would oversee  industry self regulation. However – as last week’s meeting exemplified –  even this compromise solution is not acceptable to many industry  players. They oppose the idea of an appointed commissioner and believe  that industry self regulation alone will be sufficient.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is an influential view that cannot be brushed aside. However in a &lt;a href="http://www.youtube.com/watch?v=W0G1jWFp0fs" target="_blank" title="RSTV davies interview youtube"&gt;special programme&lt;/a&gt; aired on19th April on India’s main parliamentary television network – &lt;a href="http://rstv.nic.in/rstv/index.asp" target="_blank" title="rstv india"&gt;RSTV&lt;/a&gt; – I repeatedly make the point that such a view, if successful, would  put Indian industry in danger of winning the battle but losing the war.  Europe is unlikely to accept a model of sole industry regulation, and  the crucial flow of data between the two regions could be imperiled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Conscious of all these challenges the influential &lt;a href="https://cis-india.org/" target="_blank" title="cis india"&gt;NGO&lt;/a&gt; Centre for Internet and Society has published a draft Citizens privacy &lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-citizens-draft" target="_blank" title="cis citizens privacy bill"&gt;bill&lt;/a&gt; and has commenced a series of consultation meetings across the country.  These initiatives will provide important input for the emerging  legislation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is an important moment for privacy in India, and one that will  require careful thought and sensitive implementation. However no-one in  India should be in any doubt that the current unregulated situation is  unsustainable in a global environment where nations are expected to  protect both their citizens and the safety of data on their systems.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation'&gt;https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-04-15T06:39:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance">
    <title>India Subject to NSA Dragnet Surveillance! No Longer a Hypothesis — It is Now Officially Confirmed</title>
    <link>https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance</link>
    <description>
        &lt;b&gt;As of last week, it is officially confirmed that the metadata of everyone´s communications is under the NSA´s microscope. In fact, the leaked data shows that India is one of the countries which is under NSA surveillance the most! &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC. This blog was &lt;a class="external-link" href="http://www.medianama.com/2013/06/223-what-does-nsa-prism-program-mean-to-india-cis-india/"&gt;cross-posted in Medianama&lt;/a&gt; on 24th June 2013. &lt;br /&gt;&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;span id="docs-internal-guid-5905db2c-6115-80fb-3332-1eaa5155c762"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized" dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;¨Does the NSA collect any type of data at all on millions or hundreds of millions of  Americans?”, the democratic senator, &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;Ron Wyden, asked James Clapper&lt;/a&gt;&lt;span&gt;, the director of national intelligence a few months ago. “No sir”, replied Clapper.&lt;/span&gt;&lt;/blockquote&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;True, the National Security Agency (NSA) does not collect data on millions of Americans. Instead, it collects data on billions of &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;&lt;span&gt;Americans, Indians, Egyptians, Iranians, Pakistanis and others&lt;/span&gt;&lt;/a&gt;&lt;span&gt; all around the world.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Leaked NSA surveillance&lt;/h2&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Verizon Court Order&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Recently, the &lt;a href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;Guardian released&lt;/a&gt; a top secret order of the secret Foreign Intelligence Surveillance Court (FISA) requiring Verizon on an “ongoing, daily basis” to hand over information to the NSA on all telephone calls in its systems, both within the US and between the US and other countries. Verizon is one of America's largest telecoms providers and under a top secret court order issued on 25 April 2013, the communications records of millions of US citizens are being collected indiscriminately and in bulk supposedly until 19 July 2013. In other words, data collection has nothing to do with whether an individual has been involved in a criminal or terrorist activity or not. Literally everyone is potentially subject to the same type of surveillance.&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;a href="http://yahoo.usatoday.com/news/washington/2006-05-10-nsa_x.htm"&gt;&lt;span&gt;USA Today reported in 2006&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that the NSA had been secretly collecting the phone call records of millions of Americans from various telecom providers. However, the &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;&lt;span&gt;April 25 top secret order&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is proof that the Obama administration is continuing the data mining programme begun by the Bush administration in the aftermath of the 09/11 terrorist attacks. While content data may not be collected, this dragnet surveillance includes &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;&lt;span&gt;metadata &lt;/span&gt;&lt;/a&gt;&lt;span&gt;such as the numbers of both parties on a call, location data, call duration, unique identifiers, the International Mobile Subscriber Identity (IMSI) number and the time and duration of all calls.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Content data may not be collected, but metadata can also be adequate to discover an individual's network of associations and communications patterns. &lt;/span&gt;&lt;a href="https://www.privacyinternational.org/blog/top-secret-nsa-program-spying-on-millions-of-us-citizens"&gt;&lt;span&gt;Privacy and human rights concerns&lt;/span&gt;&lt;/a&gt;&lt;span&gt; rise from the fact that the collection of metadata can result in a highly invasive form of surveillance of citizens´ communications and lives.&lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;&lt;span&gt; Metadata records can enable the US government to know the identity of every person with whom an individual communicates electronically&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, as well as the time, duration and location of the communication. In other words, metadata is aggregate data and it is enough to spy on citizens and to potentially violate their right to privacy and other human rights.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;PRISM&lt;/span&gt;&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt;Recently, a secret NSA surveillance programme, code-named PRISM, was leaked by &lt;a href="http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html"&gt;The Washington Post&lt;/a&gt;. Apparently, not only is the NSA gaining access to the meta data of all phone calls through the Verizon court order, but it is also tapping directly into the servers of nine leading Internet companies: Microsoft, Skype, Google, Facebook, YouTube, Yahoo, PalTalk, AOL and Apple. However, following these allegations, Google, Microsoft and Facebook recently asked the U.S. government to allow them to &lt;a href="http://www.bbc.co.uk/news/business-22867185"&gt;disclose the security requests&lt;/a&gt; they receive for handing over user data. It remains unclear to what extent the U.S. government is tapping into these servers.&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Yet it appears that the &lt;/span&gt;&lt;a href="http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html"&gt;&lt;span&gt;PRISM online surveillance programme&lt;/span&gt;&lt;/a&gt;&lt;span&gt; enables the NSA to extract personal material, such as audio and video chats, photographs, emails and documents. The &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/09/prism-gchq-william-hague-statement"&gt;&lt;span&gt;Guardian reported&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that PRISM appears to allow GCHQ, Britain's equivalent of the NSA, to secretly gather intelligence from the same internet companies. Following allegations that GCHQ tried to circumvent UK law by using the PRISM computer network in the US, the British foreign secretary, William Hague, stated that it is “fanciful nonsense” to suggest that GCHQ would work with an agency in another country to circumvent the law. Most notably, William Hague emphasized that reports that GCHQ are gathering intelligence from photos and online sites should not concern people who have nothing to hide! However, this implies that everyone is guilty until proven innocent...when actually, democracy mandates the opposite.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;James R. Clapper, the US Director of National Intelligence, &lt;/span&gt;&lt;a href="http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html"&gt;&lt;span&gt;stated&lt;/span&gt;&lt;/a&gt;&lt;span&gt;:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized" dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;“&lt;/span&gt;&lt;span&gt;Information collected under this program is among the most important and valuable foreign intelligence information we collect, and is used to protect our nation from a wide variety of threats. The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.”&lt;/span&gt;&lt;/blockquote&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;So essentially, Clapper stated that in the name of US national security, the personal data of billions of citizens around the world is being collected. By having access to data stored in the servers of some of the biggest Internet companies in the world, the NSA ultimately has access to the private data of almost all the Internet users in the world. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Boundless Informant&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;And once the NSA has access to tons of data through the Verizon court order and the PRISM surveillance programme, how does it create patterns of intelligence and generally mine huge volumes of data? &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;The Guardian released top secret documents about the NSA data mining tool, called &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;&lt;span&gt;Boundless Informant&lt;/span&gt;&lt;/a&gt;&lt;span&gt;; this tool is used to detail and map by country the volumes of information collected from telephone and computer networks. The focus of the Boundless Informant is to count and categorise the records of communication, known as metadata, and to record and analyse where its intelligence comes from. One of the leaked documents states that the tool is designed to give NSA officials answers to questions like: “What type of coverage do we have on country X”. According to the Boundless Informant documents, the NSA has been collecting 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March 2013. During the same month, 97 billion pieces of intelligence from computer networks were collected worldwide. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;The following &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;&lt;span&gt;“global heat map”&lt;/span&gt;&lt;/a&gt;&lt;span&gt; reveals how much data is being collected by the NSA from around the world:&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;&lt;img src="https://cis-india.org/BoundlessInformantmap.jpg" alt="Boundless Informant: &amp;quot;Global Heat Map&amp;quot;" class="image-inline" title="Boundless Informant: &amp;quot;Global Heat Map&amp;quot;" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;The colour scheme of the above map ranges from green (least subjected to surveillance) through yellow and orange to red (most surveillance). India is notably orange and is thus subject to some of the highest levels of surveillance by the NSA in the world.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;During a mere 30-day period, the largest amount of intelligence was gathered from Iran with more than 14 billion reports, while Pakistan, Jordan and Egypt were next in line in terms of intelligence gathering. Unfortunately, India ranks 5th worldwide in terms of intelligence gathering by the NSA. According to the map above, 6.3 billion pieces of intelligence were collected from India by the NSA from February to March 2013. In other words, India is currently one of the top countries worldwide which is under the US microscope, with &lt;/span&gt;&lt;a href="http://epaper.timesofindia.com/Default/Scripting/ArticleWin.asp?From=Archive&amp;amp;Source=Page&amp;amp;Skin=ETNEW&amp;amp;BaseHref=ETBG/2013/06/12&amp;amp;PageLabel=20&amp;amp;ForceGif=true&amp;amp;EntityId=Ar02002&amp;amp;ViewMode=HTML"&gt;&lt;span&gt;15% of all information&lt;/span&gt;&lt;/a&gt;&lt;span&gt; being tapped by the NSA coming from India during February-March 2013. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance"&gt;&lt;span&gt;Edward Snowden&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is the 29-year-old man behind the NSA leaks...who is responsible for one of the most important leaks in US (and one may argue, global) history.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="350" width="425"&gt;
&lt;param name="src" value="http://www.youtube.com/v/5yB3n9fu-rM"&gt;&lt;embed height="350" width="425" src="http://www.youtube.com/v/5yB3n9fu-rM" type="application/x-shockwave-flash"&gt; &lt;/embed&gt;
&lt;/object&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;So what does this all mean for India?&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;In his &lt;/span&gt;&lt;a href="http://www.youtube.com/watch?v=Wl5OQz0Ko8c"&gt;&lt;span&gt;keynote speech at the 29th Chaos Communications Congress&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, Jacob Appelbaum stated that surveillance should be an issue which concerns “everyone´s department”, especially in light of the NSA spying on citizens all over the world. True, the U.S. appears to have &lt;/span&gt;&lt;a href="http://space.jpl.nasa.gov/msl/Programs/corona.html"&gt;&lt;span&gt;a history in spying on civilians&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and the Corona, Argon, and Lanyard satellites used by the U.S. for photographic surveillance from the late 1950s is proof of that. But how does all this affect India?&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;By &lt;/span&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=1&amp;amp;"&gt;&lt;span&gt;tapping into the servers of some of the biggest Internet companies in the world,&lt;/span&gt;&lt;/a&gt;&lt;span&gt; such as Google, Facebook and Microsoft, the NSA does not only gain access to the data of American users, but also to that of Indian users. In fact, the “global heat map” of the controversial &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;&lt;span&gt;Boundless Informant&lt;/span&gt;&lt;/a&gt;&lt;span&gt; data mining tool clearly shows that India ranked 5th worldwide in terms of intelligence gathering, which means that not only is the NSA spying on Indians, but that it is also spying on India more than most countries in the world. Why is that a problem?&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;India has no privacy law. India lacks privacy legislation which could safeguard citizens from potential abuse by different types of surveillance. But the worst part is that, even if India did have privacy laws, that would still not prevent the NSA from tapping into Indians´ data through the servers of Internet companies, such as Google. Moreover, the fact that India lacks a Privacy Commissioner means that the country lacks an expert authority who could address data breaches. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Recent reports that the NSA is tapping into these servers ultimately means that the U.S. government has access to the data of Indian internet users. However, it remains unclear how the U.S. government is handling Indian data, which other third parties may have access to it, how long it is being retained for, whether it is being shared with other third parties or to what extent U.S. intelligence agencies can predict the behaviour of Indian internet users through pattern matching and data mining. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Many questions remain vague, but one thing is clear: through the NSA´s total surveillance programme, the U.S. government can potentially control the data of billions of internet users around the world, and with this control arises the possibility of oppression. It´s not just about the U.S. government having access to Indians´ data, because access can lead to control and according to security expert, &lt;/span&gt;&lt;a href="http://www.wired.com/politics/security/commentary/securitymatters/2008/05/securitymatters_0515"&gt;&lt;span&gt;Bruce Schneier&lt;/span&gt;&lt;/a&gt;&lt;span&gt;:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;span&gt; “Our data reflects our lives...and those who control our data, control our lives”. &lt;/span&gt;&lt;/blockquote&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;How are Indians supposed to control their data, and thus their lives, when it is being stored in foreign servers and the U.S. has the “right” to tap into that data? The NSA leaks mark a significant point in our history, not only because they are resulting in &lt;/span&gt;&lt;a href="http://www.bbc.co.uk/news/business-22867185"&gt;&lt;span&gt;corporations seeking data request transparency&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, but also because they are unveiling a major global issue: surveillance is a fact and can no longer can be denied. The massive, indiscriminate collection of Indians´ data, without their prior knowledge or consent, and without the provision of guarantees in regards to how such data is being handled, poses major threats to their right to privacy and other human rights. The potential for abuse is real, especially since &lt;/span&gt;&lt;a href="http://www.statsoft.com/textbook/data-mining-techniques/"&gt;&lt;span&gt;the larger the database, the larger the probability for error&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Mining more data does not necessarily increase security; on the contrary, it increases the potential for abuse, especially since &lt;/span&gt;&lt;a href="http://dspace.flinders.edu.au/xmlui/bitstream/handle/2328/26269/wahlstrom%20on%20the%20impact.pdf;jsessionid=D948EDED21805D871C18E6E4B07DAE14?sequence=1"&gt;&lt;span&gt;technology is not infallible &lt;/span&gt;&lt;/a&gt;&lt;span&gt;and data trails are not always accurate.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;What does this mean? Well, probably the best case scenario is that an individual is targeted. The worst case scenario is that an individual is imprisoned (or maybe even &lt;/span&gt;&lt;a href="http://www.time.com/time/world/article/0,8599,2097899,00.html"&gt;&lt;span&gt;murdered - remember the drones&lt;/span&gt;&lt;/a&gt;&lt;span&gt;?) because his or her data “says” that he or she is guilty. Is that the type of world we want to live in?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;What can we do now?&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Let´s start from the basics. India needs privacy legislation. India needs privacy legislation now. India needs privacy legislation now, more than ever.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Privacy legislation would regulate the collection, access to, sharing of, retention and disclosure of all personal data within India. Such legislation could also regulate surveillance and the interception of communications, in compliance with the right to privacy and other human rights. A Privacy Commissioner would also be established through privacy legislation, and this expert authority would be responsible for overseeing the enforcement of the Privacy Act and addressing data breaches. But clearly, privacy legislation is not enough. The various privacy laws of European countries have not prevented the NSA from tapping into the servers of some of the biggest Internet companies in the world and from gaining access to the data of millions of citizens around the world. Yet, privacy legislation in India should be a basic prerequisite to ensure that data is not breached within India and by those who may potentially gain access to Indian national databases.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;As a next- but immediate- step, the Indian government should demand answers from the NSA to the following questions:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;What type of data is collected from India and which parties have access to it?&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;How long is such data retained for? Can the retention period be renewed and if so, for how long?&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Is data collected on Indian internet users shared with third parties? If so, which third parties can gain access to this data and under what conditions? Is a judicial warrant required?&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;In addition to the above questions, the Indian government should also request all other information relating to Indians´ data collected through the PRISM programme, as well as proceed with a dialogue on the matter. Governments are obliged to protect their citizens from the abuse of their human rights, especially in cases when such abuse may occur from foreign agencies. Thus, the Indian government should ensure that the future secret collection of Indians´ data is prevented and that Internet companies are transparent and accountable in regards to who has access to their servers.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;On an individual level, Indians can protect their data by using encryption, such as &lt;/span&gt;&lt;a href="http://www.gnupg.org/"&gt;&lt;span&gt;GPG encryption&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for their emails and &lt;/span&gt;&lt;a href="https://www.encrypteverything.ca/index.php/Setting_up_OTR_and_Pidgin"&gt;&lt;span&gt;OTR encryption&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for instant messaging. &lt;/span&gt;&lt;a href="https://www.torproject.org/"&gt;&lt;span&gt;Tor&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is free software and an open network which enables online anonymity by bouncing communications around a distributed network of relays run by volunteers all around the world. Tor is originally short for “The Onion Router” and “onion routing” refers to the layers of encryption used. In particular, data is encrypted and re-encrypted multiple times and is sent to randomly selected Tor relays. Each relay decrypts a “layer” of encryption to reveal it only to the next relay in the circuit and the final relay decrypts the last “layer” of encryption. Essentially, Tor reduces the possibility of original data being understood in transit and conceals the routing of it.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;To avoid surveillance, the use of &lt;/span&gt;&lt;a href="https://www.eff.org/https-everywhere"&gt;&lt;span&gt;HTTPS-Everywhere&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in the &lt;/span&gt;&lt;a href="https://www.torproject.org/download/download-easy.html"&gt;&lt;span&gt;Tor Browser&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is recommended, as well as the use of combinations of additional software, such as &lt;/span&gt;&lt;a href="https://addons.mozilla.org/en-us/thunderbird/addon/torbirdy/"&gt;&lt;span&gt;TorBirdy&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="http://www.enigmail.net/home/index.php"&gt;&lt;span&gt;Enigmail&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, OTR and &lt;/span&gt;&lt;a href="https://joindiaspora.com/"&gt;&lt;span&gt;Diaspora&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;a href="https://blog.torproject.org/blog/prism-vs-tor"&gt;&lt;span&gt;Tor hidden services are communication endpoints &lt;/span&gt;&lt;/a&gt;&lt;span&gt;that are resistant to both metadata analysis and surveillance, which is why they are highly recommended in light of the NSA´s surveillance. An XMPP client that ships with an XMPP server and a Tor hidden service is a good example of how to avoid surveillance.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Protecting our data is more important now than ever. Why? Because global, indiscriminate, mass data collection is no longer a hypothesis: it´s a fact. And why is it vital to protect our data? Because if we don´t, we are ultimately sleepwalking into our control and oppression where basic human rights, such as freedom, would be a myth of the past.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;The &lt;/span&gt;&lt;a href="http://necessaryandproportionate.net/"&gt;&lt;span&gt;principles&lt;/span&gt;&lt;/a&gt;&lt;span&gt; formulated by the Electronic Frontier Foundation and Privacy International on communication surveillance should be taken into consideration by governments and law enforcement agencies around the world. In short, these &lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights"&gt;&lt;span&gt;principles&lt;/span&gt;&lt;/a&gt;&lt;span&gt; are:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Legality&lt;/b&gt;: Limitations to the right to privacy must be prescribed by law&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Legitimate purpose&lt;/b&gt;: Access to communications or communications metadata should be restricted to authorised public authorities for investigative purposes and in pursuit of a legitimate purpose&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Necessity&lt;/b&gt;: Access to communications or communications metadata by authorised public authorities should be restricted to strictly and demonstrably necessary cases&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Adequacy&lt;/b&gt;: Public authorities should be restricted from adopting or implementing measures that allow access to communications or communications metadata that is not appropriate for fulfillment of the legitimate purpose&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Competent authority&lt;/b&gt;: Authorities must be competent when making determinations relating to communications or communications metadata&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Proportionality&lt;/b&gt;: Public authorities should only order the preservation and access to specifically identified, targeted communications or communications metadata on a case-by-case basis, under a specified legal basis&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Due process&lt;/b&gt;: Governments must respect and guarantee an individual's human rights, that may interference with such rights must be authorised in law, and that the lawful procedure that governs how the government can interfere with those rights is properly enumerated and available to the public&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;User notification&lt;/b&gt;: Service providers should notify a user that a public authority has requested his or her communications or communications metadata with enough time and information about the request so that a user may challenge the request&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Transparency about use of government surveillance&lt;/b&gt;: The access capabilities of public authorities and the process for access should be prescribed by law and should be transparent to the public&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Oversight&lt;/b&gt;: An independent oversight mechanism should be established to ensure transparency of lawful access requests&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Integrity of communications and systems&lt;/b&gt;: Service providers are responsible for the secure transmission and retention of communications data or communications metadata&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Safeguards for international cooperation&lt;/b&gt;: Mutual legal assistance processes between countries and how they are used should be clearly documented and open to the public&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Safeguards against illegitimate access&lt;/b&gt;: Governments should ensure that authorities and organisations who initiate, or are complicit in, unnecessary, disproportionate or extra-legal interception or access are subject to sufficient and significant dissuasive penalties, including protection and rewards for whistleblowers, and that individuals affected by such activities are able to access avenues for redress&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Cost of surveillance&lt;/b&gt;: The financial cost of providing access to user data should be borne by the public authority undertaking the investigation&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Applying these above principles is a prerequisite, but may not be enough. Now is the time to resist unlawful and non-transparent surveillance. Now is the time for &lt;/span&gt;&lt;span&gt;everyone &lt;/span&gt;&lt;span&gt;to fight for their right to be free.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;&lt;i&gt;Is a world without freedom worth living in?&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance'&gt;https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-06T10:20:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/tech-dirt-march-22-2016-india-still-trying-to-turn-optional-aadhaar-identification-number-into-mandatory-national-identity-system">
    <title>India Still Trying To Turn Optional Aadhaar Identification Number Into A Mandatory National Identity System</title>
    <link>https://cis-india.org/internet-governance/news/tech-dirt-march-22-2016-india-still-trying-to-turn-optional-aadhaar-identification-number-into-mandatory-national-identity-system</link>
    <description>
        &lt;b&gt;from the sliding-down-the-slippery-slope-to-disaster dept&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was published by &lt;a class="external-link" href="https://www.techdirt.com/articles/20160314/10271433902/india-still-trying-to-turn-optional-aadhaar-identification-number-into-mandatory-national-identity-system.shtml"&gt;&lt;span style="text-decoration: underline;"&gt;Tech Dirt&lt;/span&gt;&lt;/a&gt; on March 22, 2016. CIS research on Aadhaar was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Last year, we wrote about India's attempt to turn the use of its &lt;a href="https://www.techdirt.com/articles/20150704/06313831544/aadhaar-soon-india-everyone-will-be-number.shtml"&gt;&lt;span style="text-decoration: underline;"&gt;Aadhaar&lt;/span&gt;&lt;/a&gt; system, which assigns a unique 12-digit number to all Indian citizens, into a &lt;a href="https://www.techdirt.com/articles/20150819/07244632004/indias-attorney-general-privacy-not-fundamental-right.shtml"&gt;&lt;span style="text-decoration: underline;"&gt;requirement&lt;/span&gt;&lt;/a&gt; for accessing government schemes. An article in the Hindustan Times shows that the Indian government is still &lt;a href="http://www.hindustantimes.com/india/privacy-concerns-overshadow-monetary-benefits-of-aadhaar-scheme/story-E3o0HRwc6XOdlgjqgmmyAM.html"&gt;&lt;span style="text-decoration: underline;"&gt;pushing to turn Aadhaar into a mandatory national identity system&lt;/span&gt;&lt;/a&gt;. A Bill has just been passed by both houses of the country's parliament, which seeks to give statutory backing to the scheme -- in the teeth of opposition from India's Supreme Court: &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;&lt;i&gt;There have been orders passed by the Supreme Court that prohibit the government from making Aadhaar mandatory for availing government services whereas this Bill seeks to do precisely that, contrary to the government's argument that Aadhaar is voluntary.&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;The article notes that in some respects, the new Bill brings improvements over a previous version: &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;&lt;i&gt;It places stringent restrictions on when and how the UID [Unique Identification] Authority (UIDAI) can share the data, noting that biometric information -- fingerprint and iris scans -- will not be shared with anyone. It seeks prior consent for sharing data with third party. These are very welcome provisions.&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt; But it also contains some huge loopholes: &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;&lt;i&gt;The government will get sweeping power to access the data collected, ostensibly for "efficient, transparent, and targeted delivery of subsidies, benefits and services" as it pleases "in the interests of national security", thus confirming the suspicions that the UID database is a surveillance programme masquerading as a project to aid service delivery.&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;The fact that an optional national numbering system now seems to be morphing into a way to monitor what people are doing will hardly come as a surprise to Techdirt readers, but this continued slide down the slippery slope is still troubling, as are other aspects of the new legislation. For example, it was introduced as a "Money Bill," which is normally reserved for matters related to taxation, not privacy. That suggests a desire to push it through without real scrutiny. What makes this attempt to give the Aadhaar number a much larger role in Indian society even more dangerous is the possibility that it won't work: &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;blockquote&gt;&lt;i&gt;A recent paper in the Economic and Political Weekly by Hans Mathews, a mathematician with the [Centre for Internet and Society], shows the programme would fail to uniquely identify individuals in a country of 1.2 billion.&lt;/i&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt; A mandatory national identity system that can't even uniquely identify people: sounds like a recipe for disaster.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/tech-dirt-march-22-2016-india-still-trying-to-turn-optional-aadhaar-identification-number-into-mandatory-national-identity-system'&gt;https://cis-india.org/internet-governance/news/tech-dirt-march-22-2016-india-still-trying-to-turn-optional-aadhaar-identification-number-into-mandatory-national-identity-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-24T06:34:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-straits-times-august-24-2018-debarshi-dasgupta-india-steps-up-vigilance-against-whatsapp-abuse">
    <title>India steps up vigilance against WhatsApp abuse</title>
    <link>https://cis-india.org/internet-governance/news/the-straits-times-august-24-2018-debarshi-dasgupta-india-steps-up-vigilance-against-whatsapp-abuse</link>
    <description>
        &lt;b&gt;Delhi wants firm to open local office, appoint grievance officer as misinformation spreads.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Debashree Dasgupta was published by &lt;a class="external-link" href="https://www.straitstimes.com/asia/south-asia/india-steps-up-vigilance-against-whatsapp-abuse"&gt;Straits Times&lt;/a&gt; on August 24, 2018. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In one of its strongest directives yet to WhatsApp, the Indian  government has asked the California-based messaging service firm to set  up an office and appoint a grievance officer in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian Information Technology Minister Ravi Shankar Prasad conveyed  the request to WhatsApp chief executive Chris Daniels during a meeting  on Tuesday. It came against the backdrop of the growing misuse of the  messaging app to disseminate misinformation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I requested WhatsApp chief executive Chris Daniels to set up a  grievance officer in India, establish a corporate entity in India,  comply with Indian laws. He assured me that #WhatsApp will soon take  steps on all these counts," Mr Prasad tweeted after the meeting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I further asked WhatsApp CEO... to work closely with law enforcement  agencies of India and create public awareness campaign to prevent  misuse of WhatsApp. He assured me that #WhatsApp will undertake these  initiatives," he added in another tweet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The firm has not yet provided a confirmation of these claims.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The spread of misinformation about child kidnappings through WhatsApp  has been linked to a series of mob lynchings that have led to the  deaths of least 28 people across India since April.&lt;/p&gt;
&lt;blockquote class="pull-quote-left" style="text-align: justify; "&gt;
&lt;p&gt;TAKING RESPONSIBILITY&lt;/p&gt;
&lt;p&gt;When rumours and fake news get propagated by mischief  mongers, the medium used for such propagation cannot evade  responsibility and accountability. If they remain mute spectators, they  are liable to be treated as abettors and thereafter, face consequent  legal action.&lt;/p&gt;
&lt;p&gt;INDIA'S MINISTRY OF ELECTRONICS AND INFORMATION TECHNOLOGY&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;There are also concerns that the spread of fake news via the  application could gather further momentum ahead of next year's general  elections in India. The firm has more than 200 million active monthly  users in India - its biggest market and a sizeable chunk of its 1.5  billion global user base.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;WhatsApp, the most widely used messaging app in India, has struggled  to control the spread of misinformation in India on its platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the government demanding greater accountability from it, the  firm has made it more difficult for users to forward content by removing  shortcuts. It has limited to five the number of people a message can be  forwarded to each time, and introduced a "forwarded" label for such  messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the authorities have found this inadequate given the enormity of the challenge and rampant abuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last month, the Indian Ministry of Electronics and Information  Technology said: "There is a need for bringing in traceability and  accountability when a provocative/inflammatory message is detected, and a  request is made by law enforcement agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"When rumours and fake news get propagated by mischief mongers, the  medium used for such propagation cannot evade responsibility and  accountability. If they remain mute spectators, they are liable to be  treated as abettors and thereafter, face consequent legal action."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr Prasad, speaking to the media after the meeting, said: "I have  said in the past that it does not take rocket science to locate a  message being circulated in hundreds and thousands... You must have a  mechanism to find a solution."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government's demand for WhatsApp to set up a local office is not unprecedented.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The European Union General Data Protection Regulation says a foreign  firm that processes personal data of individuals in the EU "may be  required" to appoint a representative in an EU state. However, calls by  the government to detect messages and track down senders have prompted  concerns over privacy violation, and pose a technical challenge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr Sunil Abraham, executive director of the Centre for Internet and  Society, a Bangalore-based nonprofit organisation, said:  "Application-wide blocking of the same content is not possible on  WhatsApp because it uses end-to-end cryptography, and there is no way  WhatsApp can determine which messages are being forwarded."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But there are potential remedies that are less controversial, and easier to achieve.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr Abraham suggested that WhatsApp fund a large network of fact  checkers and provide a "fact check this" button along with all forwarded  messages. "This button could then transmit the suspicious message to a  common database that is managed by the network for fact checkers," he  added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last month, the Ministry of Electronics and Information Technology  raised concerns on the expected roll-out of WhatsApp Payments, which  lets users make financial transactions via the application. It has  sought clarity on whether the service adheres to the Reserve Bank of  India's security and privacy rules.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-straits-times-august-24-2018-debarshi-dasgupta-india-steps-up-vigilance-against-whatsapp-abuse'&gt;https://cis-india.org/internet-governance/news/the-straits-times-august-24-2018-debarshi-dasgupta-india-steps-up-vigilance-against-whatsapp-abuse&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-08-27T15:22:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
