<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1646 to 1660.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/india-trilateral-forum"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-march-17-2015-neha-alawadhi-india-tops-list-of-content-restrictions-requests-says-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/vocativ-joshua-kopstein-india-private-companies-citizens-biometric-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-quint-january-11-2018-india-to-introduce-virtual-id-for-aadhaar-to-strengthen-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/www-china-post-aug-24-2012-india-threatens-action-against-twitter-for-ethnic-violence-rumors"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/tech-dirt-march-22-2016-india-still-trying-to-turn-optional-aadhaar-identification-number-into-mandatory-national-identity-system"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-straits-times-august-24-2018-debarshi-dasgupta-india-steps-up-vigilance-against-whatsapp-abuse"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/India-gets-to-grips-with-ecommerce"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/new-york-times-august-14-2019-vindu-goel-karan-deep-singh-and-sameer-yasir-india-shut-down-kashmir-internet-access-now-we-cannot-do-anything"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/internet-watchmen"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/voice-of-america-anjana-pasricha-february-9-2016-india-sets-strict-new-net-neutrality-rules"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/india-trilateral-forum">
    <title>India Trilateral Forum</title>
    <link>https://cis-india.org/internet-governance/news/india-trilateral-forum</link>
    <description>
        &lt;b&gt;Sunil Abraham was a panelist in the session "The Promise and Peril of Technology" at the 14th edition of India Trilateral Forum organized by the German Marshall Fund of the United States, Observer Research Foundation and Ministry of Foreign Affairs, Government of Sweden in Goa from March 22 - 23, 2018.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;The Promise and Peril of Technology&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The emergence of new technologies create possibilities for change, yet also carry risks of the emergence of “soft wars,” privacy issues, ethical challenges, among others.  With global military spending on the rise, we may now be on the cusp of a series of new technological innovations that will fundamentally change the way we conduct warfare. The rise of low-cost real-time satellite surveillance has the potential for privacy violation, intrusive controls, and hacking. Many credit the digital revolution with creating new possibilities for democratic engagement, because information technology has made institutions like mass media less hierarchical. There are hidden costs to the digital revolution and the transformative technologies, which needs to be carefully understood. The panel discussed the deeper layers of opportunities and risks associated with transformative technologies on war and peace and discuss whether the U.S., India, and Europe are falling behind China in this crucial area.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/india-trilateral-forum'&gt;https://cis-india.org/internet-governance/news/india-trilateral-forum&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-04-10T15:09:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-march-17-2015-neha-alawadhi-india-tops-list-of-content-restrictions-requests-says-facebook">
    <title>India tops list of content restrictions requests, says Facebook</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-march-17-2015-neha-alawadhi-india-tops-list-of-content-restrictions-requests-says-facebook</link>
    <description>
        &lt;b&gt;India has again topped the list of content restriction requests in the second half of 2014 with over 5,800 requests recorded in Facebook's Government Requests Report released on Sunday.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Neha Alawadhi was published in the &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2015-03-17/news/60211797_1_data-requests-government-requests-chris-sonderby"&gt;Economic Times&lt;/a&gt; on March 17, 2015. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"Overall, we continue to see an increase in government requests for data  and content restrictions. The amount of content restricted for  violating local law increased by 11% over the previous half, to 9,707  pieces of content restricted, up from 8,774," said Monika Bickert,  Facebook's head of global policy management, and Chris Sonderby, deputy  general counsel, in a statement on the social networking website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://economictimes.indiatimes.com/topic/Facebook"&gt;Facebook&lt;/a&gt; saw a rise in content restriction requests from countries like Turkey  and Russia, while requests from countries like Pakistan came down. The  number of content restriction requests from Pakistan came down to 54 in  the second half of 2014 from 1,773 in the first half. The number of  content restriction requests from India rose to 5,832 from 4,960 in the  first half.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has been the top requestor for content restrictions in the past  one and a half years, and the number of these requests and for user  account data from the country have consistently been on the rise.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook said that while the number of government requests for user  account data remained relatively flat in the six-month period, there was  an increase in data requests from "governments such as India, and  decline in requests from countries such as the United States and  Germany".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India made 5,473 requests for user account data in the six months ending  December 2014, second only to the United States, which made 14,274  requests in the same period. About 45% of the requests made by India led  to Facebook producing some data, according to the report, while 79% of  the requests made by the US were complied with.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Of course, the figures are alarming... But it would have been better if  Facebook had also given us more information on the kind of data that  was being asked for. Now we only have consolidated figures. So what kind  of data was asked for, that would have been more useful," said counsel  for the Software Freedom Law Centre.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is the second largest market for Facebook, with 112 million users  until last year, second only to the United States. According to Pranesh  Prakash, policy director at the Centre for Internet and Society, "the  number of content restriction requests are not only high on an absolute  number, but even on a per-user basis".&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-march-17-2015-neha-alawadhi-india-tops-list-of-content-restrictions-requests-says-facebook'&gt;https://cis-india.org/internet-governance/news/economic-times-march-17-2015-neha-alawadhi-india-tops-list-of-content-restrictions-requests-says-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-04-03T17:01:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar">
    <title>India Today Conclave Next 2017: Aadhaar was rushed, says MP Rajeev Chandrashekhar</title>
    <link>https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar</link>
    <description>
        &lt;b&gt;Talking at the ongoing India Today Conclave Next 2017, MP Rajeev Chandrashekhar said that Aadhaar was rushed and foisted on the country by authorities that fail to first create a proper ecosystem. Chandrashekhar gave his comments at a keynote titled Privacy -- The Fundamental Right for the Digital Citizen.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Priya Pathak was published by &lt;a class="external-link" href="http://indiatoday.intoday.in/technology/story/india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar/1/1084396.html"&gt;India Today&lt;/a&gt; on November 8, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chandrashekhar, who has been vocal on  the issues like data protection, privacy and net neutrality, said that  the government should have created a proper ecosystem for Aadhaar by  bringing norms and laws around data protection and privacy before asking  people to sign up for the unique ID.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The MP talked about India's  journey from being a largest unconnected world to becoming the largest  connected world. But Chandrashekhar criticised the "flawed" Aadhaar and  said that it was a classic example of how a government system would push  for technology in governance without addressing key bits of the  ecosystem around the citizen and the consumer.&lt;/p&gt;
&lt;div class="zg-placement-transition   zg-placement" id="zdt_3644892_1_wrapper" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;"If  that (Aadhaar) wasn't enough, the IT act and section 66A and its  language and its vagueness and its potential for misuse was another  example of the faults of a bureaucracy or a political system trying to  legislate or create solutions in the digital world, " he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At  the same time, he lauded the recent Supreme Court order that held all  Indians had fundamental right to privacy. "The latest finding of Supreme  Court of Privacy as fundamental right is a big deal and it will alter  number of things going forward," he said. He added that there should be  more debate and discussion on data privacy as there is an attempt to  characterise data privacy as some of kind of elitist issue in India  which it's not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy, especially for the digital world,  currently is one of the most debated topics in India. The country in the  past few years has seen a number of instances where a government or a  private entity has knowingly or unknowingly compromised the data of its  users. Recently a study published by Centre for Internet and Society, a  Bengaluru-based organisation, revealed that private data of more 130  million Aadhaar card holders were leaked from four government websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  Supreme Court in August this year declared privacy as a fundamental  right. A nine-judge Constitution bench headed by Chief Justice J S  Khehar has declared that "right to privacy is an intrinsic part of Right  to Life and Personal Liberty under Article 21 and entire Part III of  the Constitution".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move has been praised by many including  Rajeev Chadrashekhar who has said that it is a big welcome step. "It is  clear that Aadhaar and all other legislations existing and proposed will  have to meet the test of privacy being a fundamental right," he  recently said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar'&gt;https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-26T06:41:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/vocativ-joshua-kopstein-india-private-companies-citizens-biometric-data">
    <title>India To Let Private Companies Access Citizens’ Biometric Data</title>
    <link>https://cis-india.org/internet-governance/news/vocativ-joshua-kopstein-india-private-companies-citizens-biometric-data</link>
    <description>
        &lt;b&gt;India, home to the world’s largest national biometric registry, plans to begin sharing citizens’ data with the country’s private companies and startups.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Joshua Kopstein was published by &lt;a class="external-link" href="http://www.vocativ.com/404338/india-private-companies-citizens-biometric-data/"&gt;Vocativ&lt;/a&gt; on February 21, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The government-backed program, called  “India Stack,” will allow the second most populous country on Earth to  share nearly all of its 1.3 billion citizens’ fingerprints, iris scans,  and more, potentially creating unprecedented security and privacy risks  in the name of convenience and digital commerce.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India Stack will open up the country’s troves of biometric data to  Indian software developers, health care providers, and any other  business interested in using the government’s identification records in  their apps and services. The Indian government hopes the move will spur  innovation, jumpstarting its effort to create a centralized system of  digital commerce where citizens can purchase goods, apply for health  insurance, or even qualify for a loan using the biometric sensors on  their smartphones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Opponents, however, warn that the sharing scheme opens a Pandora’s  box of security and privacy problems, dramatically increasing the  likelihood of data breaches and abuse.&lt;/p&gt;
&lt;div class="page" style="text-align: justify; " title="Page 2"&gt;
&lt;div class="layoutArea"&gt;
&lt;div class="column"&gt;
&lt;p&gt;“It’s the worst time for privacy policy in the country,” Sunil  Abraham, the executive director of the Bangalore-based Centre for  Internet and Society, &lt;a href="https://www.wsj.com/articles/india-begins-building-on-its-citizens-biometrics-1487509205" target="_blank"&gt;told the Wall Street Journal&lt;/a&gt;. “We are very caught up in technological exuberance. Techno-utopians are ruling the roost.”&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The dangers aren’t just hypothetical. In 2015, an unprecedented breach at the U.S. Office of Personnel Management &lt;a href="https://www.washingtonpost.com/news/the-switch/wp/2015/09/23/opm-now-says-more-than-five-million-fingerprints-compromised-in-breaches/?utm_term=.8dc8ac825cd8" target="_blank"&gt;allowed hackers to steal the fingerprints of 5.6 million federal employees&lt;/a&gt;. Researchers have found that stolen fingerprints can be used to commit fraud and identity theft, and even &lt;a href="http://www.npr.org/sections/alltechconsidered/2016/07/27/487605182/police-use-fingertip-replicas-to-unlock-a-murder-victims-phone" target="_blank"&gt;replicated and used to unlock smartphones and other personal devices&lt;/a&gt;.  Worst of all, unlike passwords and social security numbers, biometric  identifiers like fingerprints can never be changed, meaning that any  breach is virtually guaranteed to have long-term consequences.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The India Stack program is the latest in several recent schemes to  push the country toward a fully-digitized and cashless economy. As of  December 2016, the Unique Identification Authority of India had  registered more than 91% of the population into a centralized system  called Aadhaar, which integrates with banks and allows citizens to  complete transactions and access government services using their  fingerprints. The country has also temporarily withdrawn its  higher-denomination bank notes from circulation in an effort to bolster  digital payment systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While the efforts of the government are commendable, the efficacy of  these programs in the absence of sufficient infrastructure for security  raises various concerns,” the Centre For Internet and Society wrote in &lt;a href="http://cis-india.org/internet-governance/blog/privacy-gaps-in-indias-digital-india-project" target="_blank"&gt;a paper&lt;/a&gt; outlining the privacy risks of India’s digital identity system.  “Increased awareness among citizens and stronger security measures by  the governments are necessary to combat the cogent threats to data  privacy arising out of the increasing rate of cyberattacks.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s program has already gone far beyond other countries’  biometric data collection schemes, which have mostly been limited to  passports and border control. &lt;span&gt;But law  enforcement officials’ smaller, more piecemeal efforts to collect  biometric information have also raised alarm over their potential for  abuse. &lt;/span&gt;Thanks to the cooperation of 16 state DMVs, &lt;a href="http://www.vocativ.com/394147/face-recognition-government-weapon" target="_blank"&gt;one in two Americans currently has their photo registered to a law enforcement face recognition database&lt;/a&gt; – regardless of whether they’ve been charged or even suspected of a  crime. Local police in several U.S. states have also begun collecting &lt;a href="http://www.reuters.com/article/us-crime-identification-iris-idUSTRE76J4A120110720" target="_blank"&gt;iris scans&lt;/a&gt; and &lt;a href="https://www.propublica.org/article/dna-dragnet-in-some-cities-police-go-from-stop-and-frisk-to-stop-and-spit" target="_blank"&gt;DNA swabs&lt;/a&gt; from people randomly stopped on the street, in some cases &lt;a href="http://www.vocativ.com/403313/stop-and-spit-lawsuit/" target="_blank"&gt;specifically targeting African American children&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/vocativ-joshua-kopstein-india-private-companies-citizens-biometric-data'&gt;https://cis-india.org/internet-governance/news/vocativ-joshua-kopstein-india-private-companies-citizens-biometric-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-27T15:09:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-quint-january-11-2018-india-to-introduce-virtual-id-for-aadhaar-to-strengthen-privacy">
    <title>India To Introduce Virtual ID For Aadhaar To Strengthen Privacy</title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-quint-january-11-2018-india-to-introduce-virtual-id-for-aadhaar-to-strengthen-privacy</link>
    <description>
        &lt;b&gt;The government will introduce a virtual identification number for Aadhaar to help strengthen privacy following several instances of data leaks.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was published by &lt;a class="external-link" href="https://www.bloombergquint.com/aadhaar/2018/01/10/india-to-introduce-virtual-id-for-aadhaar-to-strengthen-privacy"&gt;Bloomberg Quint &lt;/a&gt;on January 11, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The additional layer of security is meant to help Aadhaar users avoid sharing their unique identification number at the time of authentication to avail various services and welfare schemes, UIDAI said in a circular seen by BloombergQuint. The virtual ID will be an optional feature and users will be allowed to provide Aadhaar for verification.&lt;/span&gt;&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;The Aadhaar-issuing body, Unique Identification Authority of India, will also introduce limited know-your-customer rules to eliminate the need for agencies to store the biometric ID. Migration to the new system will start from June 1, it added.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;Virtual IDs should be made mandatory and the UIDAI should itself generate these codes instead of having the user do it, said Pranesh Prakash, policy director at the Center for Internet Security, which has published reports on the security flaws in the world’s largest database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The additional layer of security is meant to help Aadhaar users avoid sharing their unique identification number at the time of authentication to avail various services and welfare schemes, UIDAI said in a circular seen by BloombergQuint. The virtual ID will be an optional feature and users will be allowed to provide Aadhaar for verification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar-issuing body, Unique Identification Authority of India, will also introduce limited know-your-customer rules to eliminate the need for agencies to store the biometric ID. Migration to the new system will start from June 1, it added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Virtual IDs should be made mandatory and the UIDAI should itself generate these codes instead of having the user do it, said Pranesh Prakash, policy director at the Center for Internet Security, which has published reports on the security flaws in the world’s largest database.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;This takes into account concerns of third-party databases being combined without the consent of the individual but fails to address issues of government surveillance, exclusion and cybersecurity, he added.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;The move comes barely a week after The Tribune, a Chandigarh-based newspaper, reported that it could access the Aadhaar database by paying Rs 500, raising privacy concerns. Petitions challenging the validity of Aadhaar and the government’s decision to make it mandatory for everything from bank accounts to mobile services are pending in the Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As of now, citizens are required to share their Aadhaar number for authentication to avail certain services. With the introduction of the virtual ID that would change.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It would be a randomly generated 16-digit number that'd be digitally linked to a person's Aadhaar number. This ID would be temporary and revocable. There can be only one active and valid virtual ID for an Aadhaar number at any given point in time. Aadhaar holders will be able to use the virtual ID whenever authentication is required.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Virtual ID, by design being temporary, cannot be used by agencies for duplication.&lt;br /&gt;&lt;span&gt;&lt;strong&gt;UIDAI Circular&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Only Aadhaar holders themselves can generate a virtual ID and set a minimum validity period for that after which it will have to be replaced by a new one. The virtual IDs can be changed through UIDAI's portal, at an Aadhaar enrolment centre or using the mAadhaar mobile application, the circular said.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Who Can Store Your Aadhaar Data?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI will limit the number of agencies that can access and store your Aadhaar number. For this purpose, it will divide the agencies that seek to use Aadhaar authentication for services into two categories—global and local.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Global authentication agencies will be allowed to "securely" store the Aadhaar number, while local agencies won't. The latter would be the ones that’d use the virtual IDs and a unique token for authentication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar-issuing body has not clearly defined what would classify as a global agency. It has only said that it will "from time to time" evaluate authentication agencies "based on the laws governing them and categorise them" as global agencies. Any authentication agency that is not classified as global would be local.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Transition To New System&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;UIDAI has told all agencies that use Aadhaar authentication to update their applications and processes for accepting virtual IDs instead of the Aadhaar number and allow authentication using the UID token. This has to be done by June 1.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If an agency fails to migrate to the new system by then, their authentication services "may be discontinued" and a penalty may be imposed, UIDAI said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI will release the updated tools and protocols required for building the authentication software by March 1. All authentication agencies would also receive technical documents, workshops and training session to ensure smooth implementation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-quint-january-11-2018-india-to-introduce-virtual-id-for-aadhaar-to-strengthen-privacy'&gt;https://cis-india.org/internet-governance/news/bloomberg-quint-january-11-2018-india-to-introduce-virtual-id-for-aadhaar-to-strengthen-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-17T00:11:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/www-china-post-aug-24-2012-india-threatens-action-against-twitter-for-ethnic-violence-rumors">
    <title>India threatens action against Twitter for ethnic violence 'rumors'</title>
    <link>https://cis-india.org/news/www-china-post-aug-24-2012-india-threatens-action-against-twitter-for-ethnic-violence-rumors</link>
    <description>
        &lt;b&gt;India threatened to take action on Thursday against Twitter over content alleged to have inflamed ethnic tensions, as leaked documents revealed the government scrambling to censor online material.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Published in the &lt;a class="external-link" href="http://www.chinapost.com.tw/asia/india/2012/08/24/352011/India-threatens.htm"&gt;China Post&lt;/a&gt; on August 24, 2012. CIS is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;More than 309 orders have been issued demanding the removal of posts, images and links on websites including Facebook and Twitter as well as Australian news channel ABC, broadcaster Al-Jazeera and London's The Daily Telegraph newspaper.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has blamed Internet sites for spreading rumors that Muslims would attack students and workers who have migrated from the northeast to live in Bangalore and other southern cities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tens of thousands of people fled back to India's remote northeast region last week, fearing an outbreak of violence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has demanded that Twitter and other social network sites remove “inflammatory and harmful” material. It has also banned bulk text messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If Twitter fails to respond to our request, we will take appropriate action,” senior home ministry official R.K. Singh said in the Times of India newspaper. “We have asked the information technology ministry to serve them a notice.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The paper added that the government had set a deadline of Thursday for Twitter to respond.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bangalore-based Centre for Internet and Society (CIS) research group published analysis of the blocking orders sent by the Department of Telecommunications to domestic Internet services providers from August 18-21.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIS said that of the 309 separate items that the government ordered the providers to be blocked, the most affected sites were Facebook, YouTube, Twitter and Blogspot.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Content on websites for ABC, Al-Jazeera, The Times of India, The Daily Telegraph and online Catholic portal www.catholic.org were also targeted by the orders, though details of the contentious material are not known.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twitter representatives were not available to comment, but both Facebook and Google this week said they were in communication with Indian authorities and already had policies banning content that incited violence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has complained it was not receiving timely cooperation from social network groups over its attempts to ban “hateful” content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Thursday it said Twitter had agreed to remove six fake accounts pretending to be postings by Indian Prime Minister Manmohan Singh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Officials at Twitter have told us they are reviewing our request ... and they intend to cooperate,” Pankaj Pachauri, the premier's spokesman, told AFP.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/www-china-post-aug-24-2012-india-threatens-action-against-twitter-for-ethnic-violence-rumors'&gt;https://cis-india.org/news/www-china-post-aug-24-2012-india-threatens-action-against-twitter-for-ethnic-violence-rumors&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-27T02:52:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation">
    <title>India takes its first serious step toward privacy regulation – but it may be misguided </title>
    <link>https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation</link>
    <description>
        &lt;b&gt;The world’s second-most populous nation may be on the cusp of embracing privacy legislation. After several false starts the Indian government appears ready to accept the need for some form of regulation.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This blog post by Simon Davies was &lt;a class="external-link" href="http://www.privacysurgeon.org/blog/incision/india-takes-its-first-serious-step-toward-privacy-regulation-but-it-may-be-misguided/"&gt;published in the Privacy Surgeon&lt;/a&gt; on April 9, 2013. The Centre for Internet and Society recently published a draft Citizens privacy bill which is mentioned in this post.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Well, maybe this is a slightly optimistic view. A more accurate  portrayal might be “the Indian government appears ready to accept the &lt;i&gt;principle&lt;/i&gt; of some form of regulation”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is actually no agreed policy position across government on the  question of privacy and data protection, but the Planning Commission  last year established an Expert Group under the chairmanship of the  former Chief Justice of the Delhi High Court, A.P.Shah. Justice Shah’s  subsequent &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf" target="_blank" title="justice shah report"&gt;report&lt;/a&gt; is being considered and a draft Bill has been created.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Shah’s report provided a convincing body of evidence – both at the  domestic and the international level – for the creation of national  regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It called for the formation of a regulatory framework and set out nine  principles that could form a foundation for the next stage. These  principles – reflecting the basis of law in other countries – have been  generally accepted by Indian stakeholders as a sound frame of reference  for progress.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However although the nine principles are supported, the precise nature of any possible regulation is still very much in flux.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;There’s a long way to go before consensus is established on a overall  type of regulatory framework. Having said that, India is closer than  ever to seeing real legislation – and the international community needs  to put its weight behind the activity.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Debate over the merits of data protection and privacy law stretch back  beyond a decade but reform was constantly hampered by perceptions that  regulation would stifle economic growth.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some industry lobbies have been as keen as government to ensure that privacy proposals are stillborn.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even with the nine principles as a bedrock the path to privacy law must overcome two extremely difficult hurdles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first of these is that a substantial number of Indian opinion  leaders continue to express an instinctive view that there is no  cultural history for respect of privacy in India. That is, people don’t  want or expect privacy protection and Western notions of privacy are  alien to Indian society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In support of this assertion these critics often cite an analogy about  conversation on Indian trains. It is well known that many Indians will  disclose their life story to strangers on the Indian rail network,  discussing their personal affairs with people they have never before  met. This trait is construed as evidence that Indians do not value their  privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I spoke last week at an important &lt;a href="https://cis-india.org/news/future-of-privacy-in-india-on-april-5-2013-at-oberoi-hotel-new-delhi" target="_blank" title="India privacy meeting 2013"&gt;meeting&lt;/a&gt; in New Delhi where this exact point was repeatedly made. The meeting, organised by the Data Security &lt;a href="http://www.dsci.in/" target="_blank" title="dsci"&gt;Council&lt;/a&gt; of India and &lt;a href="http://www.i-comp.org/" target="_blank" title="icomp"&gt;ICOMP&lt;/a&gt; India was well attended by industry, government, academics and NGOs.  Speakers made constant reference to the matter of public disclosure of  personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In response, noted commentator Vickram Crishna expressed the view that  the train anecdote had no relevance and was a convenient ruse for people  who for their own self interest opposed privacy regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In reality this circumstance is like Vegas”, he said. “What happens on  Indian trains, stays on Indian trains. People will talk about their  lives because they will never see these passengers again and there is no  record of the disclosures.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“What we are dealing with in the online world is a completely different  matter. There is no correlation between the two environments”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A substantial opinion poll &lt;a href="http://www.privacysurgeon.org/blog/incision/indias-first-major-privacy-survey-reveals-deep-concerns-over-intrusion/" target="_blank" title="India’s first major privacy survey reveals deep concern over intrusion"&gt;published&lt;/a&gt; earlier this year also debunked the myth that Indians don’t care about  privacy. Levels of concern expressed by respondents was roughly the same  as the level of concern identified in other parts of the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A second hurdle facing privacy legislation is the perception -   particularly prevalent in the United States – that legislation will be a  burden on industry and people do not want yet another cumbersome and  costly government structure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are perhaps some grounds for considering this perspective, given the vast scale and complexity of India’s economy.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Government intervention does not enjoy a history of consistent success  in the marketplace, though in many instances intervention has been the  only means to bring industry into compliance with basic safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I made the point at the meeting that support for a purist model of  industry self regulation was simplistic and misguided. Most systems of a  similar nature fail unless someone is mandated to ensure compliance,  transparency, enforceability and consistency. It’s a question of finding  a way to embed accountability in industry self regulation – and this is  where legislation and government could help.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Justice Shah’s report reflected this widespread concern by recommending a  co-regulatory framework in which a privacy commissioner would oversee  industry self regulation. However – as last week’s meeting exemplified –  even this compromise solution is not acceptable to many industry  players. They oppose the idea of an appointed commissioner and believe  that industry self regulation alone will be sufficient.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is an influential view that cannot be brushed aside. However in a &lt;a href="http://www.youtube.com/watch?v=W0G1jWFp0fs" target="_blank" title="RSTV davies interview youtube"&gt;special programme&lt;/a&gt; aired on19th April on India’s main parliamentary television network – &lt;a href="http://rstv.nic.in/rstv/index.asp" target="_blank" title="rstv india"&gt;RSTV&lt;/a&gt; – I repeatedly make the point that such a view, if successful, would  put Indian industry in danger of winning the battle but losing the war.  Europe is unlikely to accept a model of sole industry regulation, and  the crucial flow of data between the two regions could be imperiled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Conscious of all these challenges the influential &lt;a href="https://cis-india.org/" target="_blank" title="cis india"&gt;NGO&lt;/a&gt; Centre for Internet and Society has published a draft Citizens privacy &lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-citizens-draft" target="_blank" title="cis citizens privacy bill"&gt;bill&lt;/a&gt; and has commenced a series of consultation meetings across the country.  These initiatives will provide important input for the emerging  legislation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is an important moment for privacy in India, and one that will  require careful thought and sensitive implementation. However no-one in  India should be in any doubt that the current unregulated situation is  unsustainable in a global environment where nations are expected to  protect both their citizens and the safety of data on their systems.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation'&gt;https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-04-15T06:39:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance">
    <title>India Subject to NSA Dragnet Surveillance! No Longer a Hypothesis — It is Now Officially Confirmed</title>
    <link>https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance</link>
    <description>
        &lt;b&gt;As of last week, it is officially confirmed that the metadata of everyone´s communications is under the NSA´s microscope. In fact, the leaked data shows that India is one of the countries which is under NSA surveillance the most! &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC. This blog was &lt;a class="external-link" href="http://www.medianama.com/2013/06/223-what-does-nsa-prism-program-mean-to-india-cis-india/"&gt;cross-posted in Medianama&lt;/a&gt; on 24th June 2013. &lt;br /&gt;&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;span id="docs-internal-guid-5905db2c-6115-80fb-3332-1eaa5155c762"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized" dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;¨Does the NSA collect any type of data at all on millions or hundreds of millions of  Americans?”, the democratic senator, &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;Ron Wyden, asked James Clapper&lt;/a&gt;&lt;span&gt;, the director of national intelligence a few months ago. “No sir”, replied Clapper.&lt;/span&gt;&lt;/blockquote&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;True, the National Security Agency (NSA) does not collect data on millions of Americans. Instead, it collects data on billions of &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;&lt;span&gt;Americans, Indians, Egyptians, Iranians, Pakistanis and others&lt;/span&gt;&lt;/a&gt;&lt;span&gt; all around the world.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Leaked NSA surveillance&lt;/h2&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Verizon Court Order&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Recently, the &lt;a href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;Guardian released&lt;/a&gt; a top secret order of the secret Foreign Intelligence Surveillance Court (FISA) requiring Verizon on an “ongoing, daily basis” to hand over information to the NSA on all telephone calls in its systems, both within the US and between the US and other countries. Verizon is one of America's largest telecoms providers and under a top secret court order issued on 25 April 2013, the communications records of millions of US citizens are being collected indiscriminately and in bulk supposedly until 19 July 2013. In other words, data collection has nothing to do with whether an individual has been involved in a criminal or terrorist activity or not. Literally everyone is potentially subject to the same type of surveillance.&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;a href="http://yahoo.usatoday.com/news/washington/2006-05-10-nsa_x.htm"&gt;&lt;span&gt;USA Today reported in 2006&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that the NSA had been secretly collecting the phone call records of millions of Americans from various telecom providers. However, the &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;&lt;span&gt;April 25 top secret order&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is proof that the Obama administration is continuing the data mining programme begun by the Bush administration in the aftermath of the 09/11 terrorist attacks. While content data may not be collected, this dragnet surveillance includes &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;&lt;span&gt;metadata &lt;/span&gt;&lt;/a&gt;&lt;span&gt;such as the numbers of both parties on a call, location data, call duration, unique identifiers, the International Mobile Subscriber Identity (IMSI) number and the time and duration of all calls.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Content data may not be collected, but metadata can also be adequate to discover an individual's network of associations and communications patterns. &lt;/span&gt;&lt;a href="https://www.privacyinternational.org/blog/top-secret-nsa-program-spying-on-millions-of-us-citizens"&gt;&lt;span&gt;Privacy and human rights concerns&lt;/span&gt;&lt;/a&gt;&lt;span&gt; rise from the fact that the collection of metadata can result in a highly invasive form of surveillance of citizens´ communications and lives.&lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;&lt;span&gt; Metadata records can enable the US government to know the identity of every person with whom an individual communicates electronically&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, as well as the time, duration and location of the communication. In other words, metadata is aggregate data and it is enough to spy on citizens and to potentially violate their right to privacy and other human rights.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;PRISM&lt;/span&gt;&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt;Recently, a secret NSA surveillance programme, code-named PRISM, was leaked by &lt;a href="http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html"&gt;The Washington Post&lt;/a&gt;. Apparently, not only is the NSA gaining access to the meta data of all phone calls through the Verizon court order, but it is also tapping directly into the servers of nine leading Internet companies: Microsoft, Skype, Google, Facebook, YouTube, Yahoo, PalTalk, AOL and Apple. However, following these allegations, Google, Microsoft and Facebook recently asked the U.S. government to allow them to &lt;a href="http://www.bbc.co.uk/news/business-22867185"&gt;disclose the security requests&lt;/a&gt; they receive for handing over user data. It remains unclear to what extent the U.S. government is tapping into these servers.&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Yet it appears that the &lt;/span&gt;&lt;a href="http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html"&gt;&lt;span&gt;PRISM online surveillance programme&lt;/span&gt;&lt;/a&gt;&lt;span&gt; enables the NSA to extract personal material, such as audio and video chats, photographs, emails and documents. The &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/09/prism-gchq-william-hague-statement"&gt;&lt;span&gt;Guardian reported&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that PRISM appears to allow GCHQ, Britain's equivalent of the NSA, to secretly gather intelligence from the same internet companies. Following allegations that GCHQ tried to circumvent UK law by using the PRISM computer network in the US, the British foreign secretary, William Hague, stated that it is “fanciful nonsense” to suggest that GCHQ would work with an agency in another country to circumvent the law. Most notably, William Hague emphasized that reports that GCHQ are gathering intelligence from photos and online sites should not concern people who have nothing to hide! However, this implies that everyone is guilty until proven innocent...when actually, democracy mandates the opposite.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;James R. Clapper, the US Director of National Intelligence, &lt;/span&gt;&lt;a href="http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html"&gt;&lt;span&gt;stated&lt;/span&gt;&lt;/a&gt;&lt;span&gt;:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized" dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;“&lt;/span&gt;&lt;span&gt;Information collected under this program is among the most important and valuable foreign intelligence information we collect, and is used to protect our nation from a wide variety of threats. The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.”&lt;/span&gt;&lt;/blockquote&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;So essentially, Clapper stated that in the name of US national security, the personal data of billions of citizens around the world is being collected. By having access to data stored in the servers of some of the biggest Internet companies in the world, the NSA ultimately has access to the private data of almost all the Internet users in the world. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Boundless Informant&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;And once the NSA has access to tons of data through the Verizon court order and the PRISM surveillance programme, how does it create patterns of intelligence and generally mine huge volumes of data? &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;The Guardian released top secret documents about the NSA data mining tool, called &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;&lt;span&gt;Boundless Informant&lt;/span&gt;&lt;/a&gt;&lt;span&gt;; this tool is used to detail and map by country the volumes of information collected from telephone and computer networks. The focus of the Boundless Informant is to count and categorise the records of communication, known as metadata, and to record and analyse where its intelligence comes from. One of the leaked documents states that the tool is designed to give NSA officials answers to questions like: “What type of coverage do we have on country X”. According to the Boundless Informant documents, the NSA has been collecting 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March 2013. During the same month, 97 billion pieces of intelligence from computer networks were collected worldwide. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;The following &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;&lt;span&gt;“global heat map”&lt;/span&gt;&lt;/a&gt;&lt;span&gt; reveals how much data is being collected by the NSA from around the world:&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;&lt;img src="https://cis-india.org/BoundlessInformantmap.jpg" alt="Boundless Informant: &amp;quot;Global Heat Map&amp;quot;" class="image-inline" title="Boundless Informant: &amp;quot;Global Heat Map&amp;quot;" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;The colour scheme of the above map ranges from green (least subjected to surveillance) through yellow and orange to red (most surveillance). India is notably orange and is thus subject to some of the highest levels of surveillance by the NSA in the world.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;During a mere 30-day period, the largest amount of intelligence was gathered from Iran with more than 14 billion reports, while Pakistan, Jordan and Egypt were next in line in terms of intelligence gathering. Unfortunately, India ranks 5th worldwide in terms of intelligence gathering by the NSA. According to the map above, 6.3 billion pieces of intelligence were collected from India by the NSA from February to March 2013. In other words, India is currently one of the top countries worldwide which is under the US microscope, with &lt;/span&gt;&lt;a href="http://epaper.timesofindia.com/Default/Scripting/ArticleWin.asp?From=Archive&amp;amp;Source=Page&amp;amp;Skin=ETNEW&amp;amp;BaseHref=ETBG/2013/06/12&amp;amp;PageLabel=20&amp;amp;ForceGif=true&amp;amp;EntityId=Ar02002&amp;amp;ViewMode=HTML"&gt;&lt;span&gt;15% of all information&lt;/span&gt;&lt;/a&gt;&lt;span&gt; being tapped by the NSA coming from India during February-March 2013. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance"&gt;&lt;span&gt;Edward Snowden&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is the 29-year-old man behind the NSA leaks...who is responsible for one of the most important leaks in US (and one may argue, global) history.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="350" width="425"&gt;
&lt;param name="src" value="http://www.youtube.com/v/5yB3n9fu-rM"&gt;&lt;embed height="350" width="425" src="http://www.youtube.com/v/5yB3n9fu-rM" type="application/x-shockwave-flash"&gt; &lt;/embed&gt;
&lt;/object&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;So what does this all mean for India?&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;In his &lt;/span&gt;&lt;a href="http://www.youtube.com/watch?v=Wl5OQz0Ko8c"&gt;&lt;span&gt;keynote speech at the 29th Chaos Communications Congress&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, Jacob Appelbaum stated that surveillance should be an issue which concerns “everyone´s department”, especially in light of the NSA spying on citizens all over the world. True, the U.S. appears to have &lt;/span&gt;&lt;a href="http://space.jpl.nasa.gov/msl/Programs/corona.html"&gt;&lt;span&gt;a history in spying on civilians&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and the Corona, Argon, and Lanyard satellites used by the U.S. for photographic surveillance from the late 1950s is proof of that. But how does all this affect India?&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;By &lt;/span&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=1&amp;amp;"&gt;&lt;span&gt;tapping into the servers of some of the biggest Internet companies in the world,&lt;/span&gt;&lt;/a&gt;&lt;span&gt; such as Google, Facebook and Microsoft, the NSA does not only gain access to the data of American users, but also to that of Indian users. In fact, the “global heat map” of the controversial &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;&lt;span&gt;Boundless Informant&lt;/span&gt;&lt;/a&gt;&lt;span&gt; data mining tool clearly shows that India ranked 5th worldwide in terms of intelligence gathering, which means that not only is the NSA spying on Indians, but that it is also spying on India more than most countries in the world. Why is that a problem?&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;India has no privacy law. India lacks privacy legislation which could safeguard citizens from potential abuse by different types of surveillance. But the worst part is that, even if India did have privacy laws, that would still not prevent the NSA from tapping into Indians´ data through the servers of Internet companies, such as Google. Moreover, the fact that India lacks a Privacy Commissioner means that the country lacks an expert authority who could address data breaches. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Recent reports that the NSA is tapping into these servers ultimately means that the U.S. government has access to the data of Indian internet users. However, it remains unclear how the U.S. government is handling Indian data, which other third parties may have access to it, how long it is being retained for, whether it is being shared with other third parties or to what extent U.S. intelligence agencies can predict the behaviour of Indian internet users through pattern matching and data mining. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Many questions remain vague, but one thing is clear: through the NSA´s total surveillance programme, the U.S. government can potentially control the data of billions of internet users around the world, and with this control arises the possibility of oppression. It´s not just about the U.S. government having access to Indians´ data, because access can lead to control and according to security expert, &lt;/span&gt;&lt;a href="http://www.wired.com/politics/security/commentary/securitymatters/2008/05/securitymatters_0515"&gt;&lt;span&gt;Bruce Schneier&lt;/span&gt;&lt;/a&gt;&lt;span&gt;:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;span&gt; “Our data reflects our lives...and those who control our data, control our lives”. &lt;/span&gt;&lt;/blockquote&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;How are Indians supposed to control their data, and thus their lives, when it is being stored in foreign servers and the U.S. has the “right” to tap into that data? The NSA leaks mark a significant point in our history, not only because they are resulting in &lt;/span&gt;&lt;a href="http://www.bbc.co.uk/news/business-22867185"&gt;&lt;span&gt;corporations seeking data request transparency&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, but also because they are unveiling a major global issue: surveillance is a fact and can no longer can be denied. The massive, indiscriminate collection of Indians´ data, without their prior knowledge or consent, and without the provision of guarantees in regards to how such data is being handled, poses major threats to their right to privacy and other human rights. The potential for abuse is real, especially since &lt;/span&gt;&lt;a href="http://www.statsoft.com/textbook/data-mining-techniques/"&gt;&lt;span&gt;the larger the database, the larger the probability for error&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Mining more data does not necessarily increase security; on the contrary, it increases the potential for abuse, especially since &lt;/span&gt;&lt;a href="http://dspace.flinders.edu.au/xmlui/bitstream/handle/2328/26269/wahlstrom%20on%20the%20impact.pdf;jsessionid=D948EDED21805D871C18E6E4B07DAE14?sequence=1"&gt;&lt;span&gt;technology is not infallible &lt;/span&gt;&lt;/a&gt;&lt;span&gt;and data trails are not always accurate.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;What does this mean? Well, probably the best case scenario is that an individual is targeted. The worst case scenario is that an individual is imprisoned (or maybe even &lt;/span&gt;&lt;a href="http://www.time.com/time/world/article/0,8599,2097899,00.html"&gt;&lt;span&gt;murdered - remember the drones&lt;/span&gt;&lt;/a&gt;&lt;span&gt;?) because his or her data “says” that he or she is guilty. Is that the type of world we want to live in?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;What can we do now?&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Let´s start from the basics. India needs privacy legislation. India needs privacy legislation now. India needs privacy legislation now, more than ever.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Privacy legislation would regulate the collection, access to, sharing of, retention and disclosure of all personal data within India. Such legislation could also regulate surveillance and the interception of communications, in compliance with the right to privacy and other human rights. A Privacy Commissioner would also be established through privacy legislation, and this expert authority would be responsible for overseeing the enforcement of the Privacy Act and addressing data breaches. But clearly, privacy legislation is not enough. The various privacy laws of European countries have not prevented the NSA from tapping into the servers of some of the biggest Internet companies in the world and from gaining access to the data of millions of citizens around the world. Yet, privacy legislation in India should be a basic prerequisite to ensure that data is not breached within India and by those who may potentially gain access to Indian national databases.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;As a next- but immediate- step, the Indian government should demand answers from the NSA to the following questions:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;What type of data is collected from India and which parties have access to it?&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;How long is such data retained for? Can the retention period be renewed and if so, for how long?&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Is data collected on Indian internet users shared with third parties? If so, which third parties can gain access to this data and under what conditions? Is a judicial warrant required?&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;In addition to the above questions, the Indian government should also request all other information relating to Indians´ data collected through the PRISM programme, as well as proceed with a dialogue on the matter. Governments are obliged to protect their citizens from the abuse of their human rights, especially in cases when such abuse may occur from foreign agencies. Thus, the Indian government should ensure that the future secret collection of Indians´ data is prevented and that Internet companies are transparent and accountable in regards to who has access to their servers.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;On an individual level, Indians can protect their data by using encryption, such as &lt;/span&gt;&lt;a href="http://www.gnupg.org/"&gt;&lt;span&gt;GPG encryption&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for their emails and &lt;/span&gt;&lt;a href="https://www.encrypteverything.ca/index.php/Setting_up_OTR_and_Pidgin"&gt;&lt;span&gt;OTR encryption&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for instant messaging. &lt;/span&gt;&lt;a href="https://www.torproject.org/"&gt;&lt;span&gt;Tor&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is free software and an open network which enables online anonymity by bouncing communications around a distributed network of relays run by volunteers all around the world. Tor is originally short for “The Onion Router” and “onion routing” refers to the layers of encryption used. In particular, data is encrypted and re-encrypted multiple times and is sent to randomly selected Tor relays. Each relay decrypts a “layer” of encryption to reveal it only to the next relay in the circuit and the final relay decrypts the last “layer” of encryption. Essentially, Tor reduces the possibility of original data being understood in transit and conceals the routing of it.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;To avoid surveillance, the use of &lt;/span&gt;&lt;a href="https://www.eff.org/https-everywhere"&gt;&lt;span&gt;HTTPS-Everywhere&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in the &lt;/span&gt;&lt;a href="https://www.torproject.org/download/download-easy.html"&gt;&lt;span&gt;Tor Browser&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is recommended, as well as the use of combinations of additional software, such as &lt;/span&gt;&lt;a href="https://addons.mozilla.org/en-us/thunderbird/addon/torbirdy/"&gt;&lt;span&gt;TorBirdy&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="http://www.enigmail.net/home/index.php"&gt;&lt;span&gt;Enigmail&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, OTR and &lt;/span&gt;&lt;a href="https://joindiaspora.com/"&gt;&lt;span&gt;Diaspora&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;a href="https://blog.torproject.org/blog/prism-vs-tor"&gt;&lt;span&gt;Tor hidden services are communication endpoints &lt;/span&gt;&lt;/a&gt;&lt;span&gt;that are resistant to both metadata analysis and surveillance, which is why they are highly recommended in light of the NSA´s surveillance. An XMPP client that ships with an XMPP server and a Tor hidden service is a good example of how to avoid surveillance.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Protecting our data is more important now than ever. Why? Because global, indiscriminate, mass data collection is no longer a hypothesis: it´s a fact. And why is it vital to protect our data? Because if we don´t, we are ultimately sleepwalking into our control and oppression where basic human rights, such as freedom, would be a myth of the past.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;The &lt;/span&gt;&lt;a href="http://necessaryandproportionate.net/"&gt;&lt;span&gt;principles&lt;/span&gt;&lt;/a&gt;&lt;span&gt; formulated by the Electronic Frontier Foundation and Privacy International on communication surveillance should be taken into consideration by governments and law enforcement agencies around the world. In short, these &lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights"&gt;&lt;span&gt;principles&lt;/span&gt;&lt;/a&gt;&lt;span&gt; are:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Legality&lt;/b&gt;: Limitations to the right to privacy must be prescribed by law&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Legitimate purpose&lt;/b&gt;: Access to communications or communications metadata should be restricted to authorised public authorities for investigative purposes and in pursuit of a legitimate purpose&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Necessity&lt;/b&gt;: Access to communications or communications metadata by authorised public authorities should be restricted to strictly and demonstrably necessary cases&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Adequacy&lt;/b&gt;: Public authorities should be restricted from adopting or implementing measures that allow access to communications or communications metadata that is not appropriate for fulfillment of the legitimate purpose&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Competent authority&lt;/b&gt;: Authorities must be competent when making determinations relating to communications or communications metadata&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Proportionality&lt;/b&gt;: Public authorities should only order the preservation and access to specifically identified, targeted communications or communications metadata on a case-by-case basis, under a specified legal basis&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Due process&lt;/b&gt;: Governments must respect and guarantee an individual's human rights, that may interference with such rights must be authorised in law, and that the lawful procedure that governs how the government can interfere with those rights is properly enumerated and available to the public&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;User notification&lt;/b&gt;: Service providers should notify a user that a public authority has requested his or her communications or communications metadata with enough time and information about the request so that a user may challenge the request&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Transparency about use of government surveillance&lt;/b&gt;: The access capabilities of public authorities and the process for access should be prescribed by law and should be transparent to the public&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Oversight&lt;/b&gt;: An independent oversight mechanism should be established to ensure transparency of lawful access requests&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Integrity of communications and systems&lt;/b&gt;: Service providers are responsible for the secure transmission and retention of communications data or communications metadata&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Safeguards for international cooperation&lt;/b&gt;: Mutual legal assistance processes between countries and how they are used should be clearly documented and open to the public&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Safeguards against illegitimate access&lt;/b&gt;: Governments should ensure that authorities and organisations who initiate, or are complicit in, unnecessary, disproportionate or extra-legal interception or access are subject to sufficient and significant dissuasive penalties, including protection and rewards for whistleblowers, and that individuals affected by such activities are able to access avenues for redress&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Cost of surveillance&lt;/b&gt;: The financial cost of providing access to user data should be borne by the public authority undertaking the investigation&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Applying these above principles is a prerequisite, but may not be enough. Now is the time to resist unlawful and non-transparent surveillance. Now is the time for &lt;/span&gt;&lt;span&gt;everyone &lt;/span&gt;&lt;span&gt;to fight for their right to be free.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;&lt;i&gt;Is a world without freedom worth living in?&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance'&gt;https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-06T10:20:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/tech-dirt-march-22-2016-india-still-trying-to-turn-optional-aadhaar-identification-number-into-mandatory-national-identity-system">
    <title>India Still Trying To Turn Optional Aadhaar Identification Number Into A Mandatory National Identity System</title>
    <link>https://cis-india.org/internet-governance/news/tech-dirt-march-22-2016-india-still-trying-to-turn-optional-aadhaar-identification-number-into-mandatory-national-identity-system</link>
    <description>
        &lt;b&gt;from the sliding-down-the-slippery-slope-to-disaster dept&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was published by &lt;a class="external-link" href="https://www.techdirt.com/articles/20160314/10271433902/india-still-trying-to-turn-optional-aadhaar-identification-number-into-mandatory-national-identity-system.shtml"&gt;&lt;span style="text-decoration: underline;"&gt;Tech Dirt&lt;/span&gt;&lt;/a&gt; on March 22, 2016. CIS research on Aadhaar was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Last year, we wrote about India's attempt to turn the use of its &lt;a href="https://www.techdirt.com/articles/20150704/06313831544/aadhaar-soon-india-everyone-will-be-number.shtml"&gt;&lt;span style="text-decoration: underline;"&gt;Aadhaar&lt;/span&gt;&lt;/a&gt; system, which assigns a unique 12-digit number to all Indian citizens, into a &lt;a href="https://www.techdirt.com/articles/20150819/07244632004/indias-attorney-general-privacy-not-fundamental-right.shtml"&gt;&lt;span style="text-decoration: underline;"&gt;requirement&lt;/span&gt;&lt;/a&gt; for accessing government schemes. An article in the Hindustan Times shows that the Indian government is still &lt;a href="http://www.hindustantimes.com/india/privacy-concerns-overshadow-monetary-benefits-of-aadhaar-scheme/story-E3o0HRwc6XOdlgjqgmmyAM.html"&gt;&lt;span style="text-decoration: underline;"&gt;pushing to turn Aadhaar into a mandatory national identity system&lt;/span&gt;&lt;/a&gt;. A Bill has just been passed by both houses of the country's parliament, which seeks to give statutory backing to the scheme -- in the teeth of opposition from India's Supreme Court: &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;&lt;i&gt;There have been orders passed by the Supreme Court that prohibit the government from making Aadhaar mandatory for availing government services whereas this Bill seeks to do precisely that, contrary to the government's argument that Aadhaar is voluntary.&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;The article notes that in some respects, the new Bill brings improvements over a previous version: &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;&lt;i&gt;It places stringent restrictions on when and how the UID [Unique Identification] Authority (UIDAI) can share the data, noting that biometric information -- fingerprint and iris scans -- will not be shared with anyone. It seeks prior consent for sharing data with third party. These are very welcome provisions.&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt; But it also contains some huge loopholes: &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;&lt;i&gt;The government will get sweeping power to access the data collected, ostensibly for "efficient, transparent, and targeted delivery of subsidies, benefits and services" as it pleases "in the interests of national security", thus confirming the suspicions that the UID database is a surveillance programme masquerading as a project to aid service delivery.&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;The fact that an optional national numbering system now seems to be morphing into a way to monitor what people are doing will hardly come as a surprise to Techdirt readers, but this continued slide down the slippery slope is still troubling, as are other aspects of the new legislation. For example, it was introduced as a "Money Bill," which is normally reserved for matters related to taxation, not privacy. That suggests a desire to push it through without real scrutiny. What makes this attempt to give the Aadhaar number a much larger role in Indian society even more dangerous is the possibility that it won't work: &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;blockquote&gt;&lt;i&gt;A recent paper in the Economic and Political Weekly by Hans Mathews, a mathematician with the [Centre for Internet and Society], shows the programme would fail to uniquely identify individuals in a country of 1.2 billion.&lt;/i&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt; A mandatory national identity system that can't even uniquely identify people: sounds like a recipe for disaster.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/tech-dirt-march-22-2016-india-still-trying-to-turn-optional-aadhaar-identification-number-into-mandatory-national-identity-system'&gt;https://cis-india.org/internet-governance/news/tech-dirt-march-22-2016-india-still-trying-to-turn-optional-aadhaar-identification-number-into-mandatory-national-identity-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-24T06:34:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-straits-times-august-24-2018-debarshi-dasgupta-india-steps-up-vigilance-against-whatsapp-abuse">
    <title>India steps up vigilance against WhatsApp abuse</title>
    <link>https://cis-india.org/internet-governance/news/the-straits-times-august-24-2018-debarshi-dasgupta-india-steps-up-vigilance-against-whatsapp-abuse</link>
    <description>
        &lt;b&gt;Delhi wants firm to open local office, appoint grievance officer as misinformation spreads.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Debashree Dasgupta was published by &lt;a class="external-link" href="https://www.straitstimes.com/asia/south-asia/india-steps-up-vigilance-against-whatsapp-abuse"&gt;Straits Times&lt;/a&gt; on August 24, 2018. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In one of its strongest directives yet to WhatsApp, the Indian  government has asked the California-based messaging service firm to set  up an office and appoint a grievance officer in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian Information Technology Minister Ravi Shankar Prasad conveyed  the request to WhatsApp chief executive Chris Daniels during a meeting  on Tuesday. It came against the backdrop of the growing misuse of the  messaging app to disseminate misinformation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I requested WhatsApp chief executive Chris Daniels to set up a  grievance officer in India, establish a corporate entity in India,  comply with Indian laws. He assured me that #WhatsApp will soon take  steps on all these counts," Mr Prasad tweeted after the meeting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I further asked WhatsApp CEO... to work closely with law enforcement  agencies of India and create public awareness campaign to prevent  misuse of WhatsApp. He assured me that #WhatsApp will undertake these  initiatives," he added in another tweet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The firm has not yet provided a confirmation of these claims.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The spread of misinformation about child kidnappings through WhatsApp  has been linked to a series of mob lynchings that have led to the  deaths of least 28 people across India since April.&lt;/p&gt;
&lt;blockquote class="pull-quote-left" style="text-align: justify; "&gt;
&lt;p&gt;TAKING RESPONSIBILITY&lt;/p&gt;
&lt;p&gt;When rumours and fake news get propagated by mischief  mongers, the medium used for such propagation cannot evade  responsibility and accountability. If they remain mute spectators, they  are liable to be treated as abettors and thereafter, face consequent  legal action.&lt;/p&gt;
&lt;p&gt;INDIA'S MINISTRY OF ELECTRONICS AND INFORMATION TECHNOLOGY&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;There are also concerns that the spread of fake news via the  application could gather further momentum ahead of next year's general  elections in India. The firm has more than 200 million active monthly  users in India - its biggest market and a sizeable chunk of its 1.5  billion global user base.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;WhatsApp, the most widely used messaging app in India, has struggled  to control the spread of misinformation in India on its platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the government demanding greater accountability from it, the  firm has made it more difficult for users to forward content by removing  shortcuts. It has limited to five the number of people a message can be  forwarded to each time, and introduced a "forwarded" label for such  messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the authorities have found this inadequate given the enormity of the challenge and rampant abuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last month, the Indian Ministry of Electronics and Information  Technology said: "There is a need for bringing in traceability and  accountability when a provocative/inflammatory message is detected, and a  request is made by law enforcement agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"When rumours and fake news get propagated by mischief mongers, the  medium used for such propagation cannot evade responsibility and  accountability. If they remain mute spectators, they are liable to be  treated as abettors and thereafter, face consequent legal action."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr Prasad, speaking to the media after the meeting, said: "I have  said in the past that it does not take rocket science to locate a  message being circulated in hundreds and thousands... You must have a  mechanism to find a solution."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government's demand for WhatsApp to set up a local office is not unprecedented.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The European Union General Data Protection Regulation says a foreign  firm that processes personal data of individuals in the EU "may be  required" to appoint a representative in an EU state. However, calls by  the government to detect messages and track down senders have prompted  concerns over privacy violation, and pose a technical challenge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr Sunil Abraham, executive director of the Centre for Internet and  Society, a Bangalore-based nonprofit organisation, said:  "Application-wide blocking of the same content is not possible on  WhatsApp because it uses end-to-end cryptography, and there is no way  WhatsApp can determine which messages are being forwarded."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But there are potential remedies that are less controversial, and easier to achieve.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr Abraham suggested that WhatsApp fund a large network of fact  checkers and provide a "fact check this" button along with all forwarded  messages. "This button could then transmit the suspicious message to a  common database that is managed by the network for fact checkers," he  added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last month, the Ministry of Electronics and Information Technology  raised concerns on the expected roll-out of WhatsApp Payments, which  lets users make financial transactions via the application. It has  sought clarity on whether the service adheres to the Reserve Bank of  India's security and privacy rules.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-straits-times-august-24-2018-debarshi-dasgupta-india-steps-up-vigilance-against-whatsapp-abuse'&gt;https://cis-india.org/internet-governance/news/the-straits-times-august-24-2018-debarshi-dasgupta-india-steps-up-vigilance-against-whatsapp-abuse&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-08-27T15:22:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/India-gets-to-grips-with-ecommerce">
    <title>India slowly gets to grips with ecommerce</title>
    <link>https://cis-india.org/news/India-gets-to-grips-with-ecommerce</link>
    <description>
        &lt;b&gt;Growth in computer use and Internet penetration will help e-commerce. &lt;/b&gt;
        
&lt;p&gt;Vipul Modi is a busy high court lawyer in India's financial capital Mumbai. Like many people, he uses the Internet to buy rail and airline tickets as well as pay his utility bills. Yet when it comes to buying other products online, the 44-year-old has misgivings, particularly about the security of his bank account details and other personal data.&lt;br /&gt;&lt;br /&gt;"Online shopping is not something that we feel comfortable with... because the responsibility of something being misused is on the consumer compared with the United States, where it's on the credit card companies," he told AFP.&lt;br /&gt;&lt;br /&gt;"And I'd still not buy some things online because I still like to go and see what it is."&lt;br /&gt;&lt;br /&gt;From books to groceries, Internet shopping has become popular in many Western countries for people with disposable income, busy lifestyles and unpredictable working hours.&lt;br /&gt;&lt;br /&gt;As Indian society, particularly in big cities such as Mumbai and the capital New Delhi, changes along similar lines on the back of the country's economic expansion, retailers are now looking to follow suit.&lt;br /&gt;&lt;br /&gt;Gift shop chain The Bombay Store last month became the latest outlet to launch an online facility, following in the footsteps of major retailers such as Big Bazaar, Pantaloons and shopping portals on websites like www.rediff.com.&lt;br /&gt;&lt;br /&gt;"Online shopping in India is on the cusp of taking off," said Deepa Thomas, a senior manager at the online auction site www.ebay.in, which has 2.5 million registered users in nearly 2,500 locations across the country.&lt;br /&gt;&lt;br /&gt;"But when it comes to things like product shopping there's still a fairly long way to go."&lt;br /&gt;&lt;br /&gt;For a country with 1.1 billion people, India's use of computers and the Internet is still low, despite being a major player in global information technology and outsourcing.&lt;br /&gt;&lt;br /&gt;At present only eight percent of Indian households have access to a personal computer, the country's IT and communications minister, Sachin Pilot, said on a visit to Washington in March.&lt;br /&gt;&lt;br /&gt;Of India's estimated 60 million Internet users, about six million shop online, with the ecommerce market thought to be worth about 100 billion rupees (2.2 billion dollars) and expanding at about 30 percent a year, Thomas said.&lt;br /&gt;&lt;br /&gt;At present, social networking, email and accessing news and sports sites remain the mainstay of computer use for most Indians.&lt;br /&gt;&lt;br /&gt;Pilot has predicted an "exponential growth" in computer use and Internet penetration in the coming years, as the government works to extend broadband access into 250,000 out of India's more than 600,000 villages.&lt;br /&gt;&lt;br /&gt;Industry analysts such as Nishant Shah, director of research at the Centre for Internet and Society in the southern city of Bangalore, India's IT hub, said that can only help develop ecommerce.&lt;br /&gt;&lt;br /&gt;"The countries where Internet shopping has been on the upswing are countries with highly developed broadband infrastructure which allows for quick, easy and secure connections," Shah said in an email interview.&lt;br /&gt;&lt;br /&gt;"The lack of strong digital infrastructure means that the Internet is still used by a large majority of people for 'functional' things - jobs, retrieving information, communication, social networking."&lt;br /&gt;&lt;br /&gt;Unlike other countries, India's half-a-billion mobile phone subscribers could drive the sector's expansion, he added.&lt;br /&gt;&lt;br /&gt;The government is currently auctioning 3G licences, which would enable more users to access data at high-speed, instead of having to rely on slow, dial-up connections at places such as public cyber cafes, making transactions easier.&lt;br /&gt;&lt;br /&gt;Thomas said eBay was launching a mobile phone application for buying and selling by the end of June, predicting that "mobile web is going to become a big part of developing the market".&lt;br /&gt;&lt;br /&gt;For Asim Dalal, managing director of The Bombay Store, going online makes business sense in the global economy as it expands the company's reach beyond India's borders.&lt;br /&gt;&lt;br /&gt;"International visitors comprise approximately 25 percent of our sales," he said in a statement. "Since they mostly are on visit or tour to India, their repeat purchases for gifting or home were restricted."&lt;br /&gt;&lt;br /&gt;But if and how quickly Indian consumers will change habits is hard to tell, with a preference for cash transactions and personal contact with suppliers, particularly for food and clothing at bustling markets.&lt;/p&gt;
&lt;p&gt;Read the original article in the &lt;a class="external-link" href="http://www.independent.co.uk/life-style/house-and-home/india-slowly-gets-to-grips-with-ecommerce-1975188.html"&gt;Independent&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/India-gets-to-grips-with-ecommerce'&gt;https://cis-india.org/news/India-gets-to-grips-with-ecommerce&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T06:46:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/new-york-times-august-14-2019-vindu-goel-karan-deep-singh-and-sameer-yasir-india-shut-down-kashmir-internet-access-now-we-cannot-do-anything">
    <title>India Shut Down Kashmir’s Internet Access. Now, ‘We Cannot Do Anything.’</title>
    <link>https://cis-india.org/internet-governance/news/new-york-times-august-14-2019-vindu-goel-karan-deep-singh-and-sameer-yasir-india-shut-down-kashmir-internet-access-now-we-cannot-do-anything</link>
    <description>
        &lt;b&gt;Masroor Nazir, a pharmacist in Kashmir’s biggest city, Srinagar, has some advice for people in the region: Do not get sick, because he may not have any medicine left to help.&lt;/b&gt;
        &lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;The article by Vindu Goel, Karan Deep Singh and Sameer  was published in &lt;/span&gt;&lt;a class="external-link" href="https://www.nytimes.com/2019/08/14/technology/india-kashmir-internet.html" style="text-align: justify; "&gt;New York Times&lt;/a&gt;&lt;span style="text-align: justify; "&gt; on August 14, 2019. Gurshabad Grover was quoted.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;“Shutting down the internet has become the first go-to the moment the police think there will be any kind of disturbance,” said Mishi Choudhary, founder of SFLC.in, a legal advocacy group in New Delhi that has &lt;a class="css-1g7m0tk" href="https://internetshutdowns.in/" rel="noopener noreferrer" target="_blank"&gt;tracked the sharp rise in web shutdowns&lt;/a&gt; in India since 2012.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;In Jammu and Kashmir, a Muslim-majority territory where security forces constantly worry about attacks by separatist militants, the internet has been blocked in at least part of the region 54 times this year, according to SFLC.in’s data. The authorities simply order internet service providers and phone companies to stop providing access to the web or to mobile networks.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;But this latest shutdown has been far more sweeping than others, Kashmiris said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;“We used the internet for everything,” said Mr. Nazir, 28, whose pharmacy is near the city’s famed clock tower. He said he normally went online to order new drugs and to fulfill requests from other pharmacies in more rural parts of Kashmir Valley. But now, “we cannot do anything.”&lt;/span&gt;&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;As the &lt;a class="css-1g7m0tk" href="https://www.nytimes.com/2019/08/05/world/asia/india-pakistan-kashmir-jammu.html?module=inline"&gt;Indian government’s shutdown&lt;/a&gt; of internet and phone service in the contested region enters its 11th day, Kashmir has become paralyzed.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;Shopkeepers said that vital supplies like insulin and baby food, which they typically ordered online, were running out. Cash was scarce, as metal shutters covered the doors and windows of banks and A.T.M.s, which relied on the internet for every transaction. Doctors said they could not communicate with their patients.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;Only a few government locations with landlines have been available for the public to make phone calls, with long waits to get a few minutes of access.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;The information blockade was an integral part of India’s unilateral decision last week &lt;a class="css-1g7m0tk" href="https://www.nytimes.com/2019/08/05/world/asia/india-pakistan-kashmir-jammu.html?module=inline"&gt;to wipe out the autonomy&lt;/a&gt; of Jammu and Kashmir, an area of 12.5 million people that is claimed by both India and Pakistan and has long been a source of tension. That has brought everyday transactions, family communications, online entertainment and the flow of money and information to a halt.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;While Prime Minister Narendra Modi has promoted the &lt;a class="css-1g7m0tk" href="https://www.nytimes.com/2018/04/07/technology/india-id-aadhaar.html?module=inline"&gt;rapid adoption of the internet&lt;/a&gt;, particularly on smartphones, to modernize India and bring it out of poverty, the country is also the world leader in shutting down the internet.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;The country has increasingly deployed communications and internet stoppages to suppress potential protests, prevent rumors from spreading on WhatsApp, conduct elections and even  stop students from cheating on exams. Last year, India blocked the internet 134 times, compared with 12 shutdowns in Pakistan, the No. 2 country, according to Access Now, a global digital rights group, which said its data understates the number of occurrences.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;Umar Qayoom, who used to spend his days running around Srinagar signing up merchants for Paytm, a digital payments service, is now stuck in his house. He said he had not been able to contact his girlfriend since the shutdown began, and his smartphone — his primary source of entertainment, with its endless supply of videos and social media — is an inert hunk of metal.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;“I don’t know when to sleep, when to wake up, what to do with my life,” he said during a rare foray outside on Monday evening for &lt;a class="css-1g7m0tk" href="https://www.nytimes.com/2017/09/02/world/eid-al-adha-muslims.html?module=inline"&gt;Eid al-Adha&lt;/a&gt;, the holiest festival in Islam. “There is no life without internet, even in Kashmir.”&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;Muheet Mehraj, founder and chief executive of Kashmir Box, a start-up that buys traditional handicrafts like pashmina shawls and pottery from local artisans and sells them online, said he could not check incoming orders or communicate with his suppliers. His 25 employees are idle. If the shutdown lingers, they will soon be out of work.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;“We’ve seen more than 400 shutdowns,” he said. “This has been the worst of them all.”&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;No one knows how long the blackout will last. In 2016, the internet was blocked in Kashmir for more than four months. The unpredictable access wreaked havoc with students, businesses and &lt;a class="css-1g7m0tk" href="https://cis-india.org/internet-governance/blog/internet-shutdown-stories" rel="noopener noreferrer" target="_blank"&gt;even musicians&lt;/a&gt;, who had relied on YouTube, Instagram and other digital services to reach potential audiences.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;At a hearing on Tuesday, India’s Supreme Court declined to lift any of the current restrictions, accepting the government’s argument that the shutdown was needed to maintain order and would be “settled soon.” The next day, the police indicated that most of the valley would remain on lockdown, including on Thursday, India’s Independence Day.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;“Kashmir has become invisible even to itself,” said Gurshabad Grover, a senior policy officer at the Center for Internet and Society in Bangalore, quoting &lt;a class="css-1g7m0tk" href="https://indianexpress.com/article/india/valley-has-seen-many-a-lockdown-but-why-this-time-it-is-so-different-article-370-kashmir-amit-shah-5884129/" rel="noopener noreferrer" target="_blank"&gt;a recent line&lt;/a&gt; in The Indian Express. The center published a &lt;a class="css-1g7m0tk" href="https://cis-india.org/internet-governance/blog/internet-shutdown-stories" rel="noopener noreferrer" target="_blank"&gt;report last year on the social and economic toll of internet shutdowns&lt;/a&gt; across India.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;The United Nations has repeatedly &lt;a class="css-1g7m0tk" href="https://www.nytimes.com/2012/07/06/opinion/carl-bildt-a-victory-for-the-internet.html?_r=2%E2%80%9D&amp;amp;module=inline"&gt;condemned government-ordered internet shutdowns&lt;/a&gt; as a violation of human rights.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;But that has not deterred India from routinely using the tool. Under India’s laws, authorities at even the local level can easily shut down internet access in the name of ensuring “peace and tranquillity.”&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;“It helps in any kind of situation which can flare up the sentiments of people and flare up the bulk mobilization of people,” said Rahul Pandey, deputy superintendent of police in Darjeeling in northeastern India, where the internet was blocked for about 100 days in 2017.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;Raman Jit Singh Chima, Asia Pacific policy director at Access Now, said that Indian officials have seen few negative consequences from shutdowns, so they keep using them. “It has become standard operating procedure among police,” he said.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;But the true costs of such blockades are high. Internet shutdowns from 2012 to 2017 cost India’s economy more than $3 billion, the Indian Council for Research on International Economic Relations estimated last year. And the number of stoppages has spiked since then. The Darjeeling shutdown, one of the longest in the country, occurred after the state government decided it needed to quash a separatist movement that had clashed violently with security forces.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;Darjeeling’s fabled tea industry, the lifeblood of the local economy, lost most of a year’s harvest as workers went on strike. Production was hurt the next year, too.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;Many corporate tea buyers and traders sought tea elsewhere during the disruption and never came back, said Girish Sarda, director of Nathmulls, a tea exporter in the region.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;“We lost many customers,” he said, estimating that the company’s revenue dropped more than 30 percent at the time. “Even when the internet is on, people think that this business is probably shut down.”&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;The government has argued that one reason for suppressing the internet in Kashmir was to stop the spread of false information.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;But in the digital blackout, rumors have continued spreading the old-fashioned way: by word of mouth.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;When thousands of protesters marched through Srinagar on Friday and security forces fired gunshots in response, word spread that there had been a massacre. Reporters who investigated found that at least seven people had been injured, but no one had died. Other unverified reports of people being killed by the police have also circulated.&lt;/p&gt;
&lt;p class="evys1bk0 css-exrw3m" style="text-align: justify; "&gt;The enforced idleness creates another risk, said Mr. Qayoom, the Paytm employee stuck at home. When young people have nothing else to do, leaving the house to protest — or throw stones at the police — looks a lot more appealing. “There is going to be bloodshed,” he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/new-york-times-august-14-2019-vindu-goel-karan-deep-singh-and-sameer-yasir-india-shut-down-kashmir-internet-access-now-we-cannot-do-anything'&gt;https://cis-india.org/internet-governance/news/new-york-times-august-14-2019-vindu-goel-karan-deep-singh-and-sameer-yasir-india-shut-down-kashmir-internet-access-now-we-cannot-do-anything&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vindu Goel, Karan Deep Singh and Sameer Yasir</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-08-22T01:20:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/internet-watchmen">
    <title>India Should Watch Its Internet Watchmen </title>
    <link>https://cis-india.org/news/internet-watchmen</link>
    <description>
        &lt;b&gt;The month after terrorists attacked Mumbai in 2008, India's government initiated legislation enabling it to eavesdrop on electronic communication and block websites on grounds of national security. There was no public debate before the bill in question was introduced, and hardly any debate inside parliament itself before it passed in 2009. In the law, there were no guidelines about the extent to which an individual's right to privacy would be breached. And there was certainly no mention, and therefore, reassurance, that due process would be followed when it came to restricting access to websites. This article by Rahul Bhatia was published in the Wall Street Journal on March 28, 2011.&lt;/b&gt;
        
&lt;p&gt;It's taken about two years for the first signs of misuse to show up. And there may be many more, as the government uses vague discretion instead of firm rules to police India's Internet. Various groups can exploit these discretionary powers to their own ends.&lt;/p&gt;
&lt;p&gt;Earlier this month, the Indian Computer Emergency Response Team (CERT-In), the body appointed by the government to protect India's information infrastructure, blocked a text-message provider that sends out advertisements in bulk over mobile phone. It also blocked Typepad.com, a publishing platform used frequently by bloggers. Both restrictions have now been lifted.&lt;/p&gt;
&lt;p&gt;Most contentiously, a Delhi court ordered CERT-In to block access to Zone-H.org, an Italian security giant that acts as a repository of hacked websites—that is, it collects screen grabs of sites that are infiltrated, which later proves valuable for studying the cyber crime in question. A representative of this website accused an Indian cyber security firm, E2 Labs, of using Zone-H's logo and images to promote its own cyber security school courses. E2 Labs dragged Zone-H to court in 2009 and, on grounds of defamation, had Zone-H's website blocked. What muddies the waters is that E2 Labs claims to work for the government.&lt;/p&gt;
&lt;p&gt;Nobody knows what threat, if any, these websites posed to national security. Users who tried accessing them simply received a one-line message from their service providers that the sites had been blocked due to "instructions from the Department of Telecom." That message later disappeared, replaced by the standard error message: "Page Not Found."&lt;/p&gt;
&lt;p&gt;Many bloggers immediately started comparing this case to the situation they found themselves in 2006, when the government banned Blogspot.com right after Mumbai's suburban train system was hit by bomb blasts. The Department of Telecom then did not offer an official reason, leaving people guessing that this was some kind of response to that terrorist attack.&lt;/p&gt;
&lt;p&gt;That's happening again. The guidelines under which CERT-In operates say that all information related to website blocking is classified. Moreover, its mandate does not include communicating with the public. Which is why everyone is in the dark. Nobody even knows how widespread the blockade is. There's no hint of the process involved. There's no course for redress for those who own the affected sites.&lt;/p&gt;
&lt;p&gt;Inquiries from journalists about the Department of Telecom's method of functioning have gone unanswered. When cornered by the press this month, India's Information Technology minister Kapil Sibal, who oversees this department, passed responsibility to the ministry of home affairs, which manages the nation's internal security.&lt;/p&gt;
&lt;p&gt;Perhaps there are legitimate reasons for blocking these websites. India has faced its share of terrorist attacks that have, in the last decade, begun to affect the country's urban centers. Terrorists have gotten more sophisticated. The 2008 Mumbai assault especially put pressure on security personnel to be electronically vigilant, because the terrorists used satellite phones and internet technology to communicate. Since then, the government has ramped up its scrutiny of the Internet, including getting into a high-profile dispute last year with Blackberry-maker Research in Motion. Blogs are fair game, too, seeing as how terrorist groups have been known to use them for recruiting and communication. But if there are good reasons this time for blocking the sites in question, they're unknown and unexplained.&lt;/p&gt;
&lt;p&gt;That lack of explanation is cause for alarm. First, there's the impact on businesses. Intermediary guidelines proposed by the Department of Information Technology put the onus on service providers to remove any material that, in addition to endangering national security, "causes inconvenience or annoyance," is "grossly offensive or menacing in nature," or "belongs to another person." These open-ended guidelines mean service providers have to spend a good chunk of their time dealing with government officials to determine, say, what is offensive.&lt;/p&gt;
&lt;p&gt;The larger impact is on the rule of law. The clumsiness with which New Delhi has blocked these sites undermines any legitimacy the laws have. Lawyers I've spoken with already say that the guidelines, which are open to wide interpretation, violate the country's constitution.&lt;/p&gt;
&lt;p&gt;This legal debacle has implications beyond any immediate security concerns. Despite being a democracy with a vigorous free press, India can't afford to take freedom of speech for granted. The concern here is that a statute intended to protect the country from terrorism may also give new legal cover to people trying to restrict speech for other reasons.&lt;/p&gt;
&lt;p&gt;Already, thanks in part to the lack of political support for free speech, varied groups hijack cracks or loopholes in the legal framework to their populist ends. For instance, a colonial-era law against religious insults was used in 2007 to appease Hindu nationalists who wanted the government to punish Muslim painter M.F. Hussain for depicting "Mother India" in the nude. That case suggests that the new ill-considered and badly implemented rules for online policing could be exploited by political or business interests.&lt;/p&gt;
&lt;p&gt;India undoubtedly faces a serious terrorism problem. But New Delhi needs to defend itself through laws that don't end up impinging on free speech in damaging, undemocratic ways.&lt;/p&gt;
&lt;p&gt;Mr. Bhatia is a writer with Open Magazine in Mumbai.&lt;/p&gt;
&lt;p&gt;Read the original story &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052748704396904576226460167553174.html"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/internet-watchmen'&gt;https://cis-india.org/news/internet-watchmen&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-05-06T05:08:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content">
    <title>India should reconsider its proposed regulation of online content</title>
    <link>https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content</link>
    <description>
        &lt;b&gt;The lack of technical considerations in the proposal is also apparent since implementing the proposal is infeasible for certain intermediaries. End-to-end encrypted messaging services cannot “identify” unlawful content since they cannot decrypt it. Presumably, the government’s intention is not to disallow end-to-end encryption so that intermediaries can monitor content.&lt;/b&gt;
        &lt;p class="moz-quote-pre"&gt;The article was &lt;a class="external-link" href="https://www.hindustantimes.com/analysis/india-should-reconsider-its-proposed-regulation-of-online-content/story-vvuPhz6tuxNIKTjXbRhijO.html"&gt;published in the Hindustan Times&lt;/a&gt; on January 24, 2019. The author would like to thank Akriti Bopanna and Aayush Rathi for their feedback.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Flowing from the Information Technology (IT) Act, India’s current  intermediary liability regime roughly adheres to the “safe harbour”  principle, i.e. intermediaries (online platforms and service providers)  are not liable for the content they host or transmit if they act as mere  conduits in the network, don’t abet illegal activity, and comply with  requests from authorised government bodies and the judiciary. This  paradigm allows intermediaries that primarily transmit user-generated  content to provide their services without constant paranoia, and can be  partly credited for the proliferation of online content. The law and IT  minister shared the intent to change the rules this July when discussing  concerns of online platforms being used “to spread incorrect facts  projected as news and designed to instigate people to commit crime”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On  December 24, the government published and invited comments to the draft  intermediary liability rules. The draft rules significantly expand “due  diligence” intermediaries must observe to qualify as safe harbours:  they mandate enabling “tracing” of the originator of information, taking  down content in response to government and court orders within 24  hours, and responding to information requests and assisting  investigations within 72 hours. Most problematically, the draft rules go  much further than the stated intentions: draft Rule 3(9) mandates  intermediaries to deploy automated tools for “proactively identifying  and removing [...] unlawful information or content”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first  glaring problem is that “unlawful information or content” is not  defined. A conservative reading of the draft rules will presume that the  phrase means restrictions on free speech permissible under Article  19(2) of the Constitution, including that relate to national integrity,  “defamation” and “incitement to an offence”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ambiguity aside, is  mandating intermediaries to monitor for “unlawful content” a valid  requirement under “due diligence”? To qualify as a safe harbour, if an  intermediary must monitor for all unlawful content, then is it  substantively different from an intermediary that has active control  over its content and not a safe harbour? Clearly, the requirement of  monitoring for all “unlawful content” is so onerous that it is contrary  to the philosophy of safe harbours envisioned by the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By  mandating automated detection and removal of unlawful content, the  proposed rules shift the burden of appraising legality of content from  the state to private entities. The rule may run afoul of the Supreme  Court’s reasoning in Shreya Singhal v Union of India wherein it read  down a similar provision because, among other reasons, it required an  intermediary to “apply [...] its own mind to whether information should  or should not be blocked”. “Actual knowledge” of illegal content, since  then, has held to accrue to the intermediary only when it receives a  court or government order.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the inconsistencies with legal precedence, the rules may not stand judicial scrutiny if notified in their current form.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  lack of technical considerations in the proposal is also apparent since  implementing the proposal is infeasible for certain intermediaries.  End-to-end encrypted messaging services cannot “identify” unlawful  content since they cannot decrypt it. Internet service providers also  qualify as safe harbours: how will they identify unlawful content when  it passes encrypted through their network? Presumably, the government’s  intention is not to disallow end-to-end encryption so that  intermediaries can monitor content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Intermediaries that can  implement the rules, like social media platforms, will leave the task to  algorithms that perform even specific tasks poorly. Just recently,  Tumblr flagged its own examples of permitted nudity as pornography, and  Youtube slapped a video of randomly-generated white noise with five  copyright-infringement notices. Identifying more contextual expression,  such as defamation or incitement to offences, is a much more complex  problem. In the lack of accurate judgement, platforms will be happy to  avoid liability by taking content down without verifying whether it  violated law. Rule 3(9) also makes no distinction between large and  small intermediaries, and has no requirement for an appeal system  available to users whose content is taken down. Thus, the proposed rules  set up an incentive structure entirely deleterious to the exercise of  the right to freedom of expression. Given the wide amplitude and  ambiguity of India’s restrictions on free speech, online platforms will  end up removing swathes of content to avoid liability if the draft rules  are notified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The use of draconian laws to quell dissent plays a  recurring role in the history of the Indian state. The draft rules  follow India’s proclivity to join the ignominious company of  authoritarian nations when it comes to disrespecting protections for  freedom of expression. To add insult to injury, the draft rules are  abstruse, ignore legal precedence, and betray a poor technological  understanding. The government should reconsider the proposed regulation  and the stance which inspired it, both of which are unsuited for a  democratic republic.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content'&gt;https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>gurshabad</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-01-24T16:59:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/voice-of-america-anjana-pasricha-february-9-2016-india-sets-strict-new-net-neutrality-rules">
    <title>India Sets Strict New Net Neutrality Rules</title>
    <link>https://cis-india.org/internet-governance/news/voice-of-america-anjana-pasricha-february-9-2016-india-sets-strict-new-net-neutrality-rules</link>
    <description>
        &lt;b&gt;In India, advocates of net neutrality have welcomed new rules by the telecom regulator that have blocked efforts by Facebook to offer free but limited access to the web in the country’s fast growing Internet market.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Anjana Pasricha was published in &lt;a class="external-link" href="http://www.voanews.com/content/india-sets-strict-new-net-neutrality-rules/3182965.html"&gt;Voice of America&lt;/a&gt; on February 9, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In a widely awaited ruling, the Telecom Regulator Authority of India  (TRAI) said on Monday that “no service provider shall charge  differential pricing on the basis of application, platforms or websites  or sources." It will impose penalties of $735 a day if the regulations  are broken.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kiran Jonnalagadda, who was among a group of 10 that launched an impassioned campaign called &lt;a href="http://www.savetheinternet.in" target="_blank"&gt;Save the Internet&lt;/a&gt;, says they have won a “fabulous” victory against large corporations to ensure equal web access for millions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We were up against the most powerful companies in the world, we had  no chance of fighting Airtel last year, we had no chance of fighting  Facebook. I think the only reason it worked is that we were on the side  of facts, the opposition was not,” says Jonnalagadda.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Debate on Airtel&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The campaign on net neutrality snowballed into a nationwide public  debate after an Indian telecom company, Airtel, launched a marketing  platform last April on which it planned to offer customers access with  no data charges to certain Internet services and sites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In recent weeks, the focus turned to “Free Basics”, a service being  offered by Facebook on mobile phones to a handful of sites in areas such  as communication, healthcare, and education.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saying it wanted to vastly expand Internet access in poor, rural  areas, Facebook had launched a massive advertising campaign in support  of the platform. Only about 300 million in the country of 1.2 billion  people have access to the net, many just through mobile devices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But campaigners slammed Free Basics as “poor Internet for poor  people” and said it would create a “walled garden” in which Facebook  would control the content it offered users. Leading Indian technology  entrepreneurs and university professors also called on the government to  guard against attempts by Internet giants to turn the country into a  “digital colony.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many of them have applauded the regulator’s move to strengthen net neutrality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Ban on differential pricing &lt;/b&gt;&lt;br /&gt; &lt;br /&gt; However, some are raising questions about the the complete ban on  differential pricing announced by the regulator. That includes the  Bangalore-based Center for Internet and Society research group, which  says India has put in place the most stringent net neutrality  regulations across the world. Its executive director, Sunil Abraham,  says TRAI cited the examples of the Netherlands and Chile, but the ban  on differential pricing in those countries is not as absolute as the one  notified in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We think that if proper technological safeguards and other market  safeguards are put in place, it would be possible to have both — to have  rapid growth in Internet access and reduced harm that emerge[s] from  network neutrality violations,” says Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, the last word may not have been said on net neutrality in  India as big telecom operators are expected to mount legal challenges to  the regulator’s ruling in the coming months.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Expressing disappointment with India’s ruling, the Cellular Operators  Association of India has called the ban on differential pricing a  “welfare reducing measure” that could block an avenue for “less  advantaged citizens to move to increased economic growth and prosperity  by harnessing the power of the Internet.”&lt;br /&gt; &lt;br /&gt; In a statement, Facebook has said “we will continue our efforts to  eliminate barriers and give the unconnected an easier path to the  Internet.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But after having tasted victory, the volunteers at Save the Internet,  who have grown from about 10 to 100 in the last year, have already set  their sights on another aspect of net neutrality besides differential  pricing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The campaign is not going to retire because this is not the end of  it. There is also discrimination on the basis of speed, which the  regulator has not taken up yet,” says Jonnalagadda.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/voice-of-america-anjana-pasricha-february-9-2016-india-sets-strict-new-net-neutrality-rules'&gt;https://cis-india.org/internet-governance/news/voice-of-america-anjana-pasricha-february-9-2016-india-sets-strict-new-net-neutrality-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Free Basics</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-02-11T01:53:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
