<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1716 to 1730.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/scroll-karishma-attari-september-9-2017-in-our-anxiety-about-the-blue-whale-challenge-are-we-missing-the-elephant-in-the-room"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/new-facebook-features"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-shweta-mohandas-july-30-2019-in-india-privacy-policies-of-fintech-companies-pay-lip-service-to-user-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/time-world-anjan-trivedi-june-30-2013-in-india-prison-like-surveillance-slips-under-the-radar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/voice-of-america-anjana-pasricha-march-18-2016-in-india-biometric-data-storage-sparks-demands-for-privacy-laws"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/improving-collective-intelligence"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/igf-2014-session-post-snowden-localisation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/implications-of-post-snowden-internet-localization-proposals"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-august-10-2016-gulveen-aulakh-neha-alawadhi-implementing-indian-languages-in-feature-phones-will-be-difficult"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/impact-of-industrial-revolution-4-0-it-and-automotive-sector-in-india-by-the-dialogue-and-fes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/imagine-a-feminist-internet-research-practice-and-policy-in-south-asia"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/iisc-students-boycott-uid"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/iigf-recruitment"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/igf-academy-regional-workshop"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/emerging-issues-social-networks"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/scroll-karishma-attari-september-9-2017-in-our-anxiety-about-the-blue-whale-challenge-are-we-missing-the-elephant-in-the-room">
    <title>In our anxiety about the Blue Whale Challenge, are we missing the elephant in the room?</title>
    <link>https://cis-india.org/internet-governance/news/scroll-karishma-attari-september-9-2017-in-our-anxiety-about-the-blue-whale-challenge-are-we-missing-the-elephant-in-the-room</link>
    <description>
        &lt;b&gt;In the beginning, the Blue Whale Challenge seemed like it had all the hallmarks of an urban legend: an online self-harm game that instructed victims to commit increasing degrees of violence upon themselves, finally convincing them to commit suicide. While it was whispered about in schools, college corridors and Reddit forums, reporters found it difficult to trace.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Karishma Attari was published by &lt;a class="external-link" href="https://scroll.in/magazine/849851/in-our-anxiety-about-the-blue-whale-challenge-are-we-missing-the-elephant-in-the-room"&gt;Scroll&lt;/a&gt; on September 9, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;But since then, it appears to be accruing a body count: multiple suicides and suicide attempts in Russia, Kenya, Brazil, China, Spain, Italy, Chile and India have been attributed to people signing up for the challenge. The stories are often accompanied by images of a blue whale carved onto the victim’s skin or a last selfie taken before committing suicide.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The latest incident in India involves the last-minute rescue of a teenager in Jodhpur who attempted suicide twice – first by &lt;a class="link-external" rel="nofollow" href="http://www.news18.com/news/india/blue-whale-challenge-girl-tries-to-kill-self-rescued-1510379.html" target="_blank"&gt;&lt;span&gt;jumping into Kalina Lake&lt;/span&gt;&lt;/a&gt; on September 4, and then by &lt;a class="link-external" rel="nofollow" href="http://indiatoday.intoday.in/story/blue-whale-challenge-jodhpur-teenager-attempts-suicide-again/1/1042569.html)http://indiatoday.intoday.in/story/blue-whale-challenge-jodhpur-teenager-attempts-suicide-again/1/1042569.html)" target="_blank"&gt;&lt;span&gt;overdosing on sleeping pills&lt;/span&gt;&lt;/a&gt; – within the same week. The teenager had carved the shape of a whale on her arm, and when interviewed, revealed that unless she completed the last task of the challenge, she believed that her mother would die.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most victims of the Blue Whale Challenge across the world appear to have a few things in common – they are young and vulnerable to abuse online, and their connection with the game is hard to substantiate. While the stories speak to our wariness of technology-dependence, and send our parenting instincts into nervous overdrive, there is very little evidence on ground that the game even exists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ever since the challenge was first reported on a Russian news portal, news reports have &lt;a class="link-external" rel="nofollow" href="http://www.snopes.com/blue-whale-game-suicides-russia/" target="_blank"&gt;&lt;span&gt;debunked&lt;/span&gt;&lt;/a&gt; its existence, raising questions about the media’s responsibility in spreading unsubstantiated rumours and the manner in which the issue is being used to argue against &lt;a class="link-external" rel="nofollow" href="https://www.rferl.org/a/russia-teen-suicide-blue-whale-internet-social-media-game/28322884.html" target="_blank"&gt;&lt;span&gt;the influence of the internet&lt;/span&gt;&lt;/a&gt; and promote panic. Much of the coverage regarding the challenge’s possible influence, begs the question: how can teens be raised in a way that makes them safe from the internet?&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block" style="text-align: justify; "&gt;&lt;strong&gt;The Blue Whale Challenge in India&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Cyber-lawyer Karnika Seth, who authored the book &lt;em&gt;&lt;a class="link-external" rel="nofollow" href="https://blog.ipleaders.in/laws-related-protection-children-internet/" target="_blank"&gt;&lt;span&gt;Protection of Children on Internet&lt;/span&gt;&lt;/a&gt;,&lt;/em&gt; admits that it is impossible to generate the kind of surveillance required to nip perceived online threats – both on account of privacy laws and the sheer scale of effort such an exercise would require. She calls the unregulated internet in India a “mammoth problem that cannot be overlooked anymore”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While there is no specific law to be applied to a situation like the alleged Blue Whale Challenge, Seth pointed to acts relating to the cyber space like the IT Act and the Protection of Children from Sexual Offences Act, along with inbuilt provisions within the Indian Penal Code, such as Act 305, that could be applied.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There have been approximately 10 reported cases of suicide in India, which are believed to be related to the Blue Whale Challenge. Google Trends show that Indian interest in the phenomenon has been overwhelming – the most common searched phrases have been “Download Blue Whale Game”, which might suggest that people are keen to inflict self-harm, or just morbidly curious (particularly in &lt;a class="link-external" rel="nofollow" href="http://www.rediff.com/getahead/report/blue-whale-challenge-blue-whale-game-google-trends-search-highest-in-india-rank-no1/20170901.htm" target="_blank"&gt;&lt;span&gt;Kochi and Calcutta&lt;/span&gt;&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Timely intervention appears to have saved at least a few lives, such as the &lt;a class="link-external" rel="nofollow" href="http://www.ndtv.com/india-news/i-have-come-back-engineering-student-saved-from-blue-whale-suicide-game-1743126" target="_blank"&gt;&lt;span&gt;case of an engineering student in Kolkata&lt;/span&gt;&lt;/a&gt; who claimed that having completed several levels of the game, he was pulled back from the brink of suicide by his teacher, parents and a CID officer who counselled him. He was quoted as saying: “My message to whoever is in this game is stop before it is too late. It is not a game…they give you challenges and they take you to places you cannot come back from. They drive you to suicide.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But despite this, the police in India have found no direct link between the suicides and the existence of any virtual moderator, who according to the Blue Whale legend, instructs victims to inflict self-harm. A lot of the so-called links have been proved to be &lt;a class="link-external" rel="nofollow" href="http://www.hindustantimes.com/india-news/the-fatal-fifty-tasks-is-blue-whale-killing-youngsters-in-india/story-XZhbCIW13VBs4ZHFn8aEoJ.html" target="_blank"&gt;&lt;span&gt;hearsay and hysteria as seen in&lt;/span&gt;&lt;/a&gt; the case of a 12-year-old from Indore, whose mother clarified that while he had admitted to “playing games”, he had never heard of Blue Whale.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block" style="text-align: justify; "&gt;&lt;strong&gt;A disturbing trend&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Policy Director at the Centre for Internet and Society, concluded: “All the available evidence points to this being a hoax, including those situations where teenagers have actually engaged in self-harm by carving a whale on their arm and have blamed the ‘Blue Whale app’ and a stranger threatening them. The children have subsequently been found to be lying through hard evidence, for instance the mobile operator finds no records of any messages or calls at those timings to the child’s number.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the first suicide linked to the alleged challenge emerged in Russia in 2015, Prakash added: “[E]ven the Russian police haven’t revealed any evidence in their possession in the arrests they have made related to the Blue Whale Challenge, nor have those cases gone to trial. How else can one explain the fact that there hasn’t been evidence of a ‘tutor’ in even a single one of the cases reported in India?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is, however, a huge problem regardless of whether the game exists: “The harm caused by the media sensationalism is quite real thanks to what is known as the Werther effect, leading to copycat suicides,” Prakash said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Authorities in most countries where victims have appeared have treated these claims seriously. In May, the Russian Duma or parliament made it an act of criminal responsibility to create a pro-suicide group on social media. Authorities in China and other countries are monitoring mentions of the game on forums and live broadcasts. &lt;a class="link-external" rel="nofollow" href="http://indiatoday.intoday.in/story/blue-whale-challenge-delhi-police-advisory/1/1041710.html" target="_blank"&gt;&lt;span&gt;The Delhi Police have issued an advisory&lt;/span&gt;&lt;/a&gt; after a cyber cell spotted related hashtags and messages on social networking sites. In India, the Ministry of Electronics and Information Technology directed several internet companies such as Google, Facebook, Instagram, WhatApp, Microsoft and Yahoo to remove all links which direct users to the Blue Whale Challenge.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block" style="text-align: justify; "&gt;&lt;strong&gt;The real problem&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Teenage suicide is a growing concern worldwide and &lt;a class="link-external" rel="nofollow" href="http://www.hindustantimes.com/health-and-fitness/every-hour-one-student-commits-suicide-in-india/story-7UFFhSs6h1HNgrNO60FZ2O.html" target="_blank"&gt;&lt;span&gt;India has one of the world’s highest suicide rates&lt;/span&gt;&lt;/a&gt; for youth aged between 15 and 29. In the US, suicide is documented as &lt;a class="link-external" rel="nofollow" href="http://www.apa.org/research/action/suicide.aspx" target="_blank"&gt;&lt;span&gt;the second leading cause of death&lt;/span&gt;&lt;/a&gt; for young people. The &lt;a class="link-external" rel="nofollow" href="https://www.higgypop.com/news/13-reasons-why-ban/" target="_blank"&gt;&lt;span&gt;Netflix original series &lt;em&gt;13 Reasons Why&lt;/em&gt;&lt;/span&gt;&lt;/a&gt; was banned in several countries over accusations that it glamourised teen depressives and suicides.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The real conversation we need to be having with the youth is about their reasons for choosing self-harm – about mental health and depression. Dr Depeak Raheja, a senior psychiatrist and vice-president of the Delhi Psychiatric Society, suggested that parents who suspect their child might have suicidal urges should address not just the issue of the game, “but also the underlying causative factors – isolation, low self-worth, hopelessness and underlying or active depression”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One way in which this is already happening is through online mental health support groups which are promoted as alternatives to the Blue Whale Challenge. In Brazil, a designer has created a viral counter movement called the &lt;a class="link-external" rel="nofollow" href="https://www.buzzfeed.com/krishrach/combating-the-blue-whale-challenge?utm_term=.ss5Z5v9a3#.vpbDRkzZe" target="_blank"&gt;&lt;span&gt;Pink Whale (Baleia Rosa)&lt;/span&gt;&lt;/a&gt;, which relies on the collaboration of hundreds of volunteers and is based on positive tasks that combat depression. The British YouTuber HiggyPop has also set up an email service that sends daily Pink Whale challenges to participants. In the United States, a site called Blue Whale Challenge uses fifty days of tasks to promote mental health and well-being, while the Green Whale Challenge is a humorous version of the game in Argentina.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fear and anxiety around the Blue Whale Challenge shows our willingness to project our fears of an unregulated internet onto anything that fits the profile, even as we override all evidence to the contrary. Instead, parents in particular must treat the tragic aftermath of popular suicide games as an opportunity to have a necessary, if belated, conversation about depression and mental health. The Blue Whale challenge may well turn out to be a hoax, but the challenge of keeping teenagers safe and healthy is a very real one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;Karishma Attari is the author of &lt;/em&gt;I See You&lt;em&gt; and &lt;/em&gt;Don’t Look Down&lt;em&gt;. She runs a workshop series called &lt;/em&gt;&lt;em&gt;Shakespeare for Dummies&lt;/em&gt;&lt;em&gt; and is currently writing a novel titled &lt;/em&gt;The Want Diaries&lt;em&gt;. Her &lt;/em&gt;&lt;em&gt;Twitter handle is &lt;a class="link-external" rel="nofollow" href="https://twitter.com/KarishmaWrites" target="_blank"&gt;&lt;span&gt;@KarishmaWrites&lt;/span&gt;&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/scroll-karishma-attari-september-9-2017-in-our-anxiety-about-the-blue-whale-challenge-are-we-missing-the-elephant-in-the-room'&gt;https://cis-india.org/internet-governance/news/scroll-karishma-attari-september-9-2017-in-our-anxiety-about-the-blue-whale-challenge-are-we-missing-the-elephant-in-the-room&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-01-03T02:09:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/new-facebook-features">
    <title>In new Facebook features, a comeback for community </title>
    <link>https://cis-india.org/news/new-facebook-features</link>
    <description>
        &lt;b&gt;Nearly 750 tweets bombard the web every second. Internet traffic is growing by 40 per cent a year. People post 2.5 billion photos on Facebook every month. Every minute, 24 hours of video is uploaded on YouTube. But who owns all that data? Until now, big business was in complete control and used the data to monetise operations. But all that is set to change. With Facebook launching two new features, ‘Groups' and a ‘Download your information,' the community is making a comeback.&lt;/b&gt;
        
&lt;h3&gt;More control over data&lt;/h3&gt;
&lt;p&gt;If Facebook CEO Mark Zuckerberg is to be believed, users now have more control over who sees their data and how much. They can also bundle up their entire social graph (as a zip file) and walk away to another service.&lt;/p&gt;
&lt;p&gt;‘Groups' tries to tackle one of Facebook's long-standing problems. On Facebook, everyone, from your boss to your long-lost school friend, is a “friend.” And this means annoying, sometimes embarrassing situations.&lt;/p&gt;
&lt;p&gt;An easy way to form small private groups on a social network, as we do in real life, is the “biggest problem in social networking,” Mr. Zuckerberg told journalists after the announcement.&lt;/p&gt;
&lt;p&gt;The Groups feature allows you to form small circles of friends. Up to 300 Groups per user are allowed, and the tool also allows Group chat and emails. The groups can be open, closed, or secret, depending on the privacy settings.&lt;/p&gt;
&lt;p&gt;Gaurav Mishra, Director (Digital and Social Media), MS&amp;amp;L Group, Asia-Pacific, says this step is important for Facebook, given the rising competition in social networking.&lt;/p&gt;
&lt;p&gt;With alternatives on the horizon, such as Diaspora, which is being designed as an open-source, privacy-conscious social network, and Google's plans to integrate social networking elements into its services through ‘Google Me,' Facebook has to take up this “strategic pre-emptive move,” says Mr. Mishra.&lt;/p&gt;
&lt;p&gt;But the Groups feature comes with its own baggage. It is not ‘opt in.' A friend can add you to the Group, and you get to decide whether you want to be in it or not. It appears that in the trade-off between giving the user more control and encouraging use, Facebook has chosen the latter.&lt;/p&gt;
&lt;p&gt;Users will also have to be prepared for more noise as the new features offer a mirage of secure conversation space that will encourage them to share more personal details.&lt;/p&gt;
&lt;p&gt;“The amount of sharing will go up massively and will be completely addictive,” Mr. Zuckerberg predicted.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Sunil Abraham, Executive Director, Centre for Internet and Society, says: “Facebook has always taken a more promiscuous approach to configuring our social behaviour online, the primary motivation being the maximisation of user transactions and consequently profits.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;According to him, the logic of adding a user to a group without seeking permission first makes a lot of assumptions, including that you check your account regularly to do early damage control and that your friends follow best security practices.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;“I would warn people not to do anything on a Facebook group — open, closed or secret — that they would not do on email.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Read the original in the&lt;a class="external-link" href="http://www.hindu.com/2010/10/10/stories/2010101055841600.htm"&gt; Hindu&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/new-facebook-features'&gt;https://cis-india.org/news/new-facebook-features&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T09:58:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-shweta-mohandas-july-30-2019-in-india-privacy-policies-of-fintech-companies-pay-lip-service-to-user-rights">
    <title>In India, Privacy Policies of Fintech Companies Pay Lip Service to User Rights</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-shweta-mohandas-july-30-2019-in-india-privacy-policies-of-fintech-companies-pay-lip-service-to-user-rights</link>
    <description>
        &lt;b&gt;A study of the privacy policies of 48 fintech companies that operate in India shows that none comply with even the basic requirements of the IT Rules, 2011.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shweta Mohandas highlighting the key observations in Fintech study conducted by CIS was &lt;a class="external-link" href="https://thewire.in/tech/india-fintech-data-privacy"&gt;published in the Wire&lt;/a&gt; on July 30, 2019.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Earlier this month, an &lt;a href="https://www.huffingtonpost.in/entry/fintech-apps-privacy-snooping-credit-vidya_in_5d1cbc34e4b082e55373370a"&gt;investigation&lt;/a&gt; revealed that a Hyderabad-based fintech company called CreditVidya was sneakily collecting user data through their devotional and music apps to assess people’s creditworthiness.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This should be unsurprising as the privacy policies of most Indian fintech companies do not specify who they will be sharing the information with. Instead, they employ vague terminology to identify sharing arrangements such as ‘third-party’, ‘affiliates’ etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is one of the many findings that we came across while analysing the &lt;a href="https://cis-india.org/internet-governance/files/Hewlett%20A%20study%20of%20FinTech%20companies%20and%20their%20privacy%20policies.pdf"&gt;privacy policies of 48 fintech companies&lt;/a&gt; that operate in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The study looked at how the privacy policies complied with the requirements of the existing data protection regime in India – the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) &lt;a href="https://www.wipo.int/edocs/lexdocs/laws/en/in/in098en.pdf"&gt;Rules&lt;/a&gt;, 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="https://www.wipo.int/edocs/lexdocs/laws/en/in/in098en.pdf"&gt;IT Rules&lt;/a&gt;, among other things, require that privacy policies specify the type of data being used, the purpose of collection, the third parties the data will be shared with, the option to withdraw consent and the grievance redressal mechanism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rules also require the privacy policy to be easily accessible as well as easy to understand. The problem is that they are not as comprehensive and specific as, say, the draft Personal Data Protection Bill, which is awaiting passage through parliament, and hence require the companies to do much less than privacy and data protection practices emerging globally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nevertheless, despite the limited requirements, none of the companies in our sample of 48 were fully compliant with the parameters set by the IT Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While 95% of the companies did fulfil the basic requirement of actually formulating and having a privacy policy, two major players stood out as defaulters: Airtel Payments Bank and Bhim UPI, for which we were not able to locate a privacy policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though a majority of the privacy policies contained the statement “we take your privacy and security seriously”, 43% of the companies did not provide adequate details of the reasonable security practices and procedures followed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The requirement in which most companies did not provide information for was regarding a grievance redressal mechanism, where only 10% of the companies comply.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While 31% of the companies provided the contact of a grievance redressal officer (some without even mentioning the redressal mechanism), 37% of the companies provided contact details of a representative but did not specify if this person could be contacted in case of any grievance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Throughout the study, it was noted that the wording of the IT Rules allowed companies to use ambiguous terms to ensure compliance without exposing their actual data practices. For example, Rule 5 (7) requires a fintech company to provide an option to withdraw consent. Twenty three percent of the companies allowed the user to opt out or withdraw from certain services such as mailing list, direct marketing and in app public forums but they did not allow the user to withdraw their consent completely. While several of 17 companies did provide the option to withdraw consent, they did not clarify whether the withdrawal also meant that the user’s data was no processed or shared.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, when it came to data retention, most of the 27 companies that provided some degree of  information about the retention policy stated that some data would be stored for perpetuity either for analytics or for complying with law enforcement. The remaining 21 companies say nothing about their data retention policy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;In local languages&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The issue of ambiguity most clearly arises when the user is actually able to cross the first hurdle – reading an app’s privacy policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With fintech often projected as one of the drivers of greater financial inclusion in India, it is telling that only one company (PhonePe) had the option to read the privacy policy in a language other than English. With respect to readability, we noted that the privacy policies were difficult to follow not just because of legalese and length, but also because of fonts and formatting – smaller and lighter texts, no distinction between paragraphs etc. added to the disincentive to read the privacy policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy policies act as a notice to individuals about the terms on which their data will be treated by the entity collecting data. However, they are a monologue in terms of consent where the user only has the option to either agree to it or decline and not avail the services. Moreover, even the notice function is not served when the user is unable to read the privacy policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They, thus, serve as mere symbols of compliance, where they are drafted to ensure bare minimum conformity to legal requirements. However, the responsibility of these companies lies in giving the user the autonomy to provide an informed consent as well as to be notified in case of any change in how the data is being handled (this could be when and whom the data is being shared with, if there has been a breach etc).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the growth of fintech companies and the promise of financial inclusion, it is imperative that the people using these services make informed decisions about their data. The draft Personal Data Protection Bill – in its current form – would encumber companies processing sensitive personal data with greater responsibility and accountability than before. However, the Bill, similar to the IT Rules, endorses the view of &lt;a href="https://www.medianama.com/wp-content/uploads/Centre-for-Internet-and-Society-Submission-India-Draft-Data-Protection-Bill-Privacy-2018.pdf"&gt;blanket consent&lt;/a&gt;, where the requirement for change in data processing is only of periodic notice (Section 30 (2)), a lesson that needs to be learnt from the CreditVidya story.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to blanket consent, the SPD/I Rules and well as the PDP Bill does not require the user to be notified in all cases of a breach. While the information that is provided to data subjects is necessary to be designed keeping the user in mind, neither the SPD/I Rules, nor the PDP Bill take into account the manner in which data flows operate in the context of ‘disruptive’ business models that are a hallmark of the ‘fintech revolution’.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-shweta-mohandas-july-30-2019-in-india-privacy-policies-of-fintech-companies-pay-lip-service-to-user-rights'&gt;https://cis-india.org/internet-governance/blog/the-wire-shweta-mohandas-july-30-2019-in-india-privacy-policies-of-fintech-companies-pay-lip-service-to-user-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>shweta</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-07-31T02:21:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/time-world-anjan-trivedi-june-30-2013-in-india-prison-like-surveillance-slips-under-the-radar">
    <title>In India, Prism-like Surveillance Slips Under the Radar</title>
    <link>https://cis-india.org/news/time-world-anjan-trivedi-june-30-2013-in-india-prison-like-surveillance-slips-under-the-radar</link>
    <description>
        &lt;b&gt;Prism, the contentious U.S. data-collection surveillance program, has captured the world’s attention ever since whistle-blower Edward Snowden leaked details of global spying to the Guardian and Washington Post.

&lt;/b&gt;
        &lt;p&gt;The article by Anjan Trivedi was &lt;a class="external-link" href="http://world.time.com/2013/06/30/in-india-prism-like-surveillance-slips-under-the-radar/#ixzz2XoCbrn00"&gt;published in Time World &lt;/a&gt;on June 30, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;However, it turns out &lt;a href="http://topics.time.com/india/"&gt;India&lt;/a&gt;,  the world’s largest democracy, is building its own version to monitor  internal communications in the name of national security. Yet India’s  Central Monitoring System, or CMS, was not shrouded in secrecy — New  Delhi &lt;a href="http://www.dot.gov.in/sites/default/files/AR%20Englsih%2011-12_0.pdf"&gt;announced&lt;/a&gt; its intentions to watch over its citizens, however mutedly, in &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=70747"&gt;2011&lt;/a&gt;, and rollout is slated for August. And while reports that the American system collected 6.3 billion &lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;intelligence reports&lt;/a&gt; in India led to a &lt;a href="http://m.indianexpress.com/news/supreme-court-agrees-to-hear-pil-on-us-surveillance-of-internet-data/1131011/"&gt;lawsuit&lt;/a&gt; at the nation’s &lt;a href="http://topics.time.com/supreme-court/"&gt;Supreme Court&lt;/a&gt;, comparable indignation has been conspicuously lacking with the domestic equivalent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CMS is an ambitious surveillance system that monitors text messages,  social-media engagement and phone calls on landlines and cell phones,  among other communications. That means 900 million landline and  cell-phone users and 125 million Internet users. The project, which is  being implemented by the government’s &lt;a href="http://www.cdot.in/about_us/berif_history.htm"&gt;Centre for Development of Telematics&lt;/a&gt; (&lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=78145"&gt;C-DOT&lt;/a&gt;),  is meant to help national law-enforcement agencies save time and avoid  manual intervention, according to the Department of Telecommunications’ &lt;a href="http://www.dot.gov.in/sites/default/files/Telecom%20Annual%20Report-2012-13%20%28English%29%20_For%20web%20%281%29.pdf"&gt;annual report&lt;/a&gt;.  This has been in the works since 2008, when C-DOT started working on a  proof-of-concept, according to an older report. The government &lt;a href="http://planningcommission.nic.in/aboutus/committee/wrkgrp12/cit/wgrep_telecom.pdf"&gt;set aside&lt;/a&gt; approximately $150 million for the system as part of its 12th five-year  plan, although the Cabinet ultimately approved a higher amount.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within the internal-security ministry though, the surveillance system  remains a relatively “hush-hush” topic, a project official unauthorized  to speak to the press tells TIME. In April 2011, the Police  Modernisation Division of the Home Affairs Ministry put out a 90-page  tender to solicit bidders for communication-interception systems in  every state and union territory of India. The system requirements  included “live listening, recording, storage, playback, analysis,  postprocessing” and voice recognition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Civil-liberties groups concede that states often need to undertake  targeted-monitoring operations. However, the move toward extensive  “surveillance capabilities enabled by digital communications,” suggests  that governments are now “casting the net wide, enabling intrusions into  private lives,” according to Meenakshi Ganguly, South Asia director for  Human Rights Watch. This extensive communications surveillance through  the likes of Prism and CMS are “out of the realm of judicial  authorization and allow unregulated, secret surveillance, eliminating  any transparency or accountability on the part of the state,” a recent  U.N. &lt;a href="http://www.ohchr.org/Documents/HRBodies/HRCouncil/RegularSession/Session23/A.HRC.23.40_EN.pdf"&gt;report&lt;/a&gt; stated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is no stranger to censorship and monitoring — tweets, blogs,  books or songs are frequently blocked and banned. India ranked second  only to the U.S. on Google’s list of user-data requests with 4,750  queries, up &lt;a href="http://www.google.com/transparencyreport/userdatarequests/IN/"&gt;52% from two years back&lt;/a&gt;, and removal requests from the government &lt;a href="http://www.google.com/transparencyreport/removals/government/IN/?metric=items&amp;amp;p=2012-12"&gt;increased by 90%&lt;/a&gt; over the previous reporting period. While these were largely made  through police or court orders, the new system will not require such a  legal process. In recent times, India’s democratically elected  government has barred access to certain websites and Twitter handles,  restricted the number of outgoing text messages to five per person per  day and arrested citizens for liking Facebook posts and tweeting.  Historically too, censorship has been India’s preferred means of  policing social unrest. “Freedom of expression, while broadly available  in theory,” Ganguly tells TIME, “is endangered by abuse of various India  laws.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is a growing discrepancy and power imbalance between citizens  and the state, says Anja Kovacs of the Internet Democracy Project. And,  in an environment like India where “no checks and balances [are] in  place,” that is troubling. The potential for misuse and  misunderstanding, Kovacs believes, is increasing enormously. Currently,  India’s laws relevant to interception “disempower citizens by relying  heavily on the executive to safeguard individuals’ constitutional  rights,” a recent &lt;a href="http://www.indianexpress.com/news/way-to-watch/1133737/0"&gt;editorial&lt;/a&gt; noted. The power imbalance is often noticeable at public protests, as  in the case of the New Delhi gang-rape incident in December, when the  government shut down public transport near protest grounds and  unlawfully detained demonstrators.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With an already sizeable and growing population of Internet users,  the government’s worries too are on the rise. Netizens in India are set  to triple to 330 million by 2016, &lt;a href="http://startupcatalyst.in/wp-content/uploads/2013/05/From_Buzz_to_Bucks_Apr_2013_tcm80-132875.pdf"&gt;according to a recent report&lt;/a&gt;.  “As [governments] around the world grapple with the power of social  media that can enable spontaneous street protests, there appears to be  increasing surveillance,” Ganguly explains.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s junior minister for telecommunications attempted to explain the benefits of this system during a &lt;a href="http://www.youtube.com/watch?v=rwTsek5WUfE"&gt;recent Google+ Hangout&lt;/a&gt; session. He acknowledged that CMS is something that “most people may  not be aware of” because it’s “slightly technical.” A participant noted  that the idea of such an intrusive system was worrying and he did not  feel safe. The minister, though, insisted that it would “safeguard your  privacy” and national security. Given the high-tech nature of CMS, he  noted that telecom companies would no longer be part of the government’s  surveillance process. India currently does &lt;a href="http://www.hrw.org/news/2013/06/07/india-new-monitoring-system-threatens-rights"&gt;not&lt;/a&gt; have formal privacy legislation to prohibit arbitrary monitoring. The new system comes under the &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=71791"&gt;jurisdiction&lt;/a&gt; of the Indian Telegraph Act of 1885, which allows for monitoring communication in the “interest of public safety.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The surveillance system is not only an “abuse of privacy rights and  security-agency overreach,” critics say, but also counterproductive in  terms of security. In the process of collecting data to monitor criminal  activity, the data itself may become a target for terrorists and  criminals — a “honeypot,” according to Sunil Abraham, executive director  of India’s Centre for Internet and Society. Additionally, the  wide-ranging tapping undermines financial markets, Abraham says, by  compromising confidentiality, trade secrets and intellectual property.  What’s more, vulnerabilities will have to be built into the existing  cyberinfrastructure to make way for such a system. Whether the nation’s  patchy infrastructure will be able to handle a complex web of  surveillance and networks, no one can say. That, Abraham contends, is  what attackers will target.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;National security has widely been cited as the reason for this  system, but no one can say whether it will actually help avert terrorist  activity. India’s own 9/11 is a case in point: the Indian government  was handed intelligence by foreign agencies about the possibility of the  2008 Mumbai terrorist attacks, but did not act. This is a “clear  indication that having access to massive amounts of data is not  necessarily going to make people safer,” Kovacs tells TIME. However,  officers familiar with the new system say it will not increase  surveillance or enhance intrusion beyond current levels; it will only  strengthen the policy framework of privacy and increase &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=80829"&gt;operational efficiency&lt;/a&gt;.  Spokespersons and officials in the internal-security and telecom  departments did not respond to requests or declined to comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has been cagey about details on implementation and &lt;a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=70791"&gt;extent&lt;/a&gt;.  This ability to act however the authorities deems fit “just makes it  really easy to slide into authoritarianism, and that is not acceptable  for any democratic country,” Kovacs says. Indeed, India has seen that  before — almost four decades ago, Indira Gandhi declared a state of  emergency for 19 months, which suspended all civil liberties. Indians  complaining about Prism may want to look a little closer to home.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/time-world-anjan-trivedi-june-30-2013-in-india-prison-like-surveillance-slips-under-the-radar'&gt;https://cis-india.org/news/time-world-anjan-trivedi-june-30-2013-in-india-prison-like-surveillance-slips-under-the-radar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-03T09:31:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/voice-of-america-anjana-pasricha-march-18-2016-in-india-biometric-data-storage-sparks-demands-for-privacy-laws">
    <title>In India, Biometric Data Storage Sparks Demands for Privacy Laws </title>
    <link>https://cis-india.org/internet-governance/news/voice-of-america-anjana-pasricha-march-18-2016-in-india-biometric-data-storage-sparks-demands-for-privacy-laws</link>
    <description>
        &lt;b&gt;In India, calls for strict privacy laws are growing after this week's passage of a measure that allows federal agencies access to biometric data of the nation's citizens, the world's largest such repository.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Anjana Pasricha was &lt;a class="external-link" href="http://www.voanews.com/content/india-biometrics-privacy/3243744.html"&gt;published in Voice of America&lt;/a&gt; on March 18, 2016. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The government says the use of biometrics will help cut rampant graft in the distribution of subsidies, but activists and opposition lawmakers warn it could usher in an era of increased state surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Raghubir Gaur, who works as an electrician in the capital, New Delhi, says he has never collected subsidized rations such as wheat and rice, because “somebody else has been taking the rations I should have gotten.” Now, with a national proof of identity, or "Aadhaar" card in his hands, Gaur says he is confident he will be able to access his designated subsidies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar card is being used to give welfare benefits to the poor, who often cannot provide any proof identity, allowing corrupt officials to siphon entitlements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government says it has saved nearly $2 billion by preventing misuse of the subsidies in the last fiscal year alone.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Critics fear ‘police state’&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Civil activists and research groups, however, have dubbed the Aadhaar program “surveillance technology” that constitutes a serious breach of privacy. They point to identity-verification systems in other countries, where cards or identification numbers are used for verification without creating a gigantic central database that documents every last transaction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, the Aadhaar database also stores fingerprints and iris scans of every account holder, labeling each with a 12-digit identification number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns that this could lead to a massive invasion of privacy have been heightened because the new law allows the data to be used “in the interest of national security.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“From verifying yourself to the ticket conductor on a train to someone who is delivering something at your house, all the way to opening a new bank account, all these transactions get logged against the centralized data base," says Pranesh Prakash of the Center for Internet and Society in Bangalore. "So this invades your life completely and thoroughly.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some lawyers and privacy advocates say this has made it even more important to support a strong privacy law to ensure the huge government database isn't misused.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finance Minister Arun Jaitley has defended the biometrics legislation, saying the data will be accessed only in rare cases that require authorization by a senior official.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“You mark my words, you are midwifing a police state,” said lawmaker Asaduddin Owaisi, just one parliamentarian opposed passage of the legislation and found no comfort in Jaitley's assurances.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Fraud concerns&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Despite objections, the bill was passed by legislators who argued that such a move is critical to ensuring subsidies reach intended beneficiaries in a country where millions are poor and illiterate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Attempts to draft a right to privacy bill to protect individuals against misuse of data by government or private agencies date back to 2010, but have made little headway. The latest push started in 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Citing a cyberattack targeting the U.S. government, in which a hacker gained access to the information of millions of people, research groups have also flagged security concerns around India’s ambitious Aadhaar program.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If this database gets leaked, the entire identification system collapses because people will be able to authenticate themselves as anyone else. So identity fraud is a great concern,” said Prakash of the Center for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nearly one billion biometric identity cards have been issued in India in the last six years.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/voice-of-america-anjana-pasricha-march-18-2016-in-india-biometric-data-storage-sparks-demands-for-privacy-laws'&gt;https://cis-india.org/internet-governance/news/voice-of-america-anjana-pasricha-march-18-2016-in-india-biometric-data-storage-sparks-demands-for-privacy-laws&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-23T02:27:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/improving-collective-intelligence">
    <title>Improving Collective Intelligence</title>
    <link>https://cis-india.org/events/improving-collective-intelligence</link>
    <description>
        &lt;b&gt;CIS in collaboration with iMorph, Inc. and Program For the Future, is organizing a Tweetup on 
Dec 20th, 2009 at TERI from 4pm to 7pm.&lt;/b&gt;
        
&lt;p&gt;The tweetup is to increase the awareness for "Improving Collective Intelligence".&lt;/p&gt;
&lt;p&gt;Tools like Twitter and other social networks allow global participation of a large number of people in solving some of the World's pressing problems. This Tweetup is aimed at identifying some of these problems, brainstorming about ways to solve them and raise the awareness of the power of Collective Intelligence.&lt;/p&gt;
&lt;p&gt;Specially, a Collective Intelligence Challenge organized by "The Program For The Future"&amp;nbsp; will be the first step towards the effort. A description of the project (from the website - http://thetechvirtual.org/projects)&lt;/p&gt;
&lt;p&gt;Develop a practical method, tool or technology that connects people so that they collectively act more intelligently. The challenge embraces all areas of human endeavor – not just technical domains like computing or engineering but also the arts, business, economics, education, government, health, law, philanthropy, science and other spheres. Winning entries will be displayed in the participating museums.&lt;/p&gt;
&lt;p&gt;Participating museums: Tech Museum of Innovation, MIT Museum , Science Center Singapore, Citilab Barcelona, Global Women's Leadership Network&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Indian Organizations - National Institute of Engineering, Mysore, Innovation Cell at KCG College of Technology&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://thetechvirtual.org/projects/program-for-the-future/"&gt;More Information&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Contacts:&lt;br /&gt;Dorai Thodla - dorait@gmail.com &lt;br /&gt;Hrish Thota - dhempe@gmail.com&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/improving-collective-intelligence'&gt;https://cis-india.org/events/improving-collective-intelligence&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>radha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-05T04:19:02Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/igf-2014-session-post-snowden-localisation">
    <title>Implications of post-Snowden Internet localization proposals</title>
    <link>https://cis-india.org/news/igf-2014-session-post-snowden-localisation</link>
    <description>
        &lt;b&gt;The Ninth Annual Internet Governance Forum (IGF) Meeting will be held in Istanbul, Turkey on 2-5 September 2014. The venue of the meeting is Lütfi Kirdar International Convention and Exhibition Center (ICEC).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sunil Abraham will be speaking &lt;a class="external-link" href="http://www.intgovforum.org/cms/wks2014/index.php/proposal/view_public_duplicate/112"&gt;in this workshop&lt;/a&gt; organized by Internet Society and Center for Democracy and Technology at the IGF.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Following the 2013-2014 disclosures of large-scale pervasive surveillance of Internet traffic, various proposals to "localize" Internet users' data and change the path that Internet traffic would take have started to emerge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Examples include mandatory storage of citizens' data within country, mandatory location of servers within country (e.g. Google, Facebook), launching state-run services (e.g. email services), restricted transborder Internet traffic routes, investment in alternate backbone infrastructure (e.g. submarine cables, IXPs), etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Localization of data and traffic routing strategies can be powerful tools for improving Internet experience for end-users, especially when done in response to Internet development needs. On the other hand, done uniquely in response to external factors (e.g. foreign surveillance), less optimal choices may be made in reactive moves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;How can we judge between Internet-useful versus Internet-harmful localisation and traffic routing approaches? What are the promises of data localization from the personal, community and business perspectives? What are the potential drawbacks? What are implications for innovation, user choice and the availability of online services in the global economy? What impact might they have on a global and interoperable Internet? What impact (if any) might these proposals have on user trust and expectations of privacy?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The objective of the session is to gather diverse perspectives and experiences to better understand the technical, social and economic implications of these proposals.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Name(s) and stakeholder and organizational affiliation(s) of institutional co-organizer(s)&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Organizer:&lt;/b&gt;&lt;br /&gt;Nicolas Seidler, Policy advisor&lt;br /&gt; Technical community&lt;br /&gt; Internet Society&lt;br /&gt;&lt;b&gt;Co-organizer:&lt;/b&gt;&lt;br /&gt;Matthew Shears&lt;br /&gt; Civil society&lt;br /&gt; Center for Democracy and Technology&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Names and affiliations (stakeholder group, organization) of speakers the proposer is planning to invite&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Mr. Chris Riley, Senior Policy Engineer, Mozilla Corporation, Private sector (CONFIRMED)&lt;/li&gt;
&lt;li&gt;Mr. Jari Arkko, Chair of the Internet Engineering Task Force, Technical community (CONFIRMED)&lt;/li&gt;
&lt;li&gt;Mr. Christian Kaufmann, Director Network Architecture at Akamai Technologies, Private sector (CONFIRMED)&lt;/li&gt;
&lt;li&gt;Ms. Emma Llanso, Director of Free Expression Project, Center for Democracy and Technology, Civil Society (CONFIRMED)&lt;/li&gt;
&lt;li&gt;Mr. Sunil Abraham, Executive Director, Center for Internet and Society, India, Civil Society (CONFIRMED)&lt;/li&gt;
&lt;li&gt;Mr. Thomas Schneider, Deputy head of international affairs, Swiss  Federal Office of Communication (OFCOM), Government (CONFIRMED)&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 class="title"&gt;Name of Moderator(s)&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Nicolas Seidler, Policy advisor, Internet Society&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Name of Remote Moderator(s)&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Konstantinos Komaitis &lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/igf-2014-session-post-snowden-localisation'&gt;https://cis-india.org/news/igf-2014-session-post-snowden-localisation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-07-03T07:09:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/implications-of-post-snowden-internet-localization-proposals">
    <title>Implications of post-Snowden Internet Localization Proposals</title>
    <link>https://cis-india.org/internet-governance/news/implications-of-post-snowden-internet-localization-proposals</link>
    <description>
        &lt;b&gt;Sunil Abraham was a speaker in this workshop organized by Center for Democracy and Technology on September 2, 2014.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Following the 2013-2014 disclosures of large-scale pervasive  surveillance of Internet traffic, various proposals to "localize"  Internet users' data and change the path that Internet traffic would  take have started to emerge.&lt;br /&gt; &lt;br /&gt; Examples include mandatory storage  of citizens' data within country, mandatory location of servers within  country (e.g. Google, Facebook), launching state-run services (e.g.  email services), restricted transborder Internet traffic routes,  investment in alternate backbone infrastructure (e.g. submarine cables,  IXPs), etc.&lt;br /&gt; &lt;br /&gt; Localization of data and traffic routing strategies  can be powerful tools for improving Internet experience for end-users,  especially when done in response to Internet development needs. On the  other hand, done uniquely in response to external factors (e.g. foreign  surveillance), less optimal choices may be made in reactive moves.&lt;br /&gt; &lt;br /&gt; How can we judge between Internet-useful versus Internet-harmful  localisation and traffic routing approaches? What are the promises of  data localization from the personal, community and business  perspectives? What are the potential drawbacks? What are implications  for innovation, user choice and the availability of online services in  the global economy? What impact might they have on a global and  interoperable Internet? What impact (if any) might these proposals have  on user trust and expectations of privacy?&lt;br /&gt; &lt;br /&gt; The objective of the  session is to gather diverse perspectives and experiences to better  understand the technical, social and economic implications of these  proposals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For full details &lt;a class="external-link" href="http://igf2014.sched.org/event/df8e8e82fbe7f80f8d8d50e316d3feea#.VDENqFdIOo8"&gt;see the IGF website&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/implications-of-post-snowden-internet-localization-proposals'&gt;https://cis-india.org/internet-governance/news/implications-of-post-snowden-internet-localization-proposals&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-10-05T08:59:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-august-10-2016-gulveen-aulakh-neha-alawadhi-implementing-indian-languages-in-feature-phones-will-be-difficult">
    <title>Implementing Indian languages in feature phones will be difficult</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-august-10-2016-gulveen-aulakh-neha-alawadhi-implementing-indian-languages-in-feature-phones-will-be-difficult</link>
    <description>
        &lt;b&gt;A recent government standard requiring support for inputting text in any one Indian language in mobile phones - along with Hindi and English - has manufacturers worried. The companies argue that the well-intentioned move may be difficult to implement, especially in the case of feature phones, because inventory and logistics will have to be planned for each state.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Gulveen Aulakh and Neha Alawadhi was &lt;a class="external-link" href="http://economictimes.indiatimes.com/tech/hardware/implementing-indian-languages-in-feature-phones-will-be-difficult/articleshow/53625366.cms"&gt;published in the Economic Times&lt;/a&gt; on August 10, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The  Bureau of Indian Standards (BIS) said in June that all mobile phones  must support the ability to type messages in English, Hindi and at least  one additional Indian official language. It also requires message  readability for all 22 Indian official languages. The objective is to  enable widespread communication in local languages, especially for  people who may not use English or Hindi with as much ease.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Handset makers said while such changes, which are yet to be notified,  can be done easily through software in smartphones, it would be a big  challenge for feature phones because of screen and keypad limitations,  apart from managing supplies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It will be nightmarish to do planning for the number of models (with  different languages) to be sold in each state, and plan inventory and  logistics around that, so it's very challenging," said Gaurav Nigam,  product head of Lava International, which has a phone with  message-reading ability in all 22 Indian official languages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nigam  said the BIS standard does not mandate the printing of vernacular  languages on keypads, which would have created a massive hurdle for  mobile phone manufacturers. "I might end up over-stocking in some states  and lesser inventory in some states, which might lead to loss of sales  since I won't be able to divert a Kerala-printed stock to Punjab or any  other state," Nigam said. However, the government is hopeful of  compliance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;An  official said logistical and supply-chain issues can be addressed by  companies. "We are talking to them and we are open to giving them a  leeway of nine to 12 months to implement the order," said the official,  requesting anonymity.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;The  official said although the government had started consultations on the  premise that the third language should be imprinted on the keypad, it  was felt in due course that other technologies could also be used. "Some  lanFeature phones account for 65 per cent of the total mobile phone user base of about 700 million in India and are popular in rural areas and smaller towns. Sales of feature phones in the country declined to 150 million last year from 179-180 million, according to International Data Corporation, a US market research company.&lt;br /&gt;&lt;br /&gt;The Indian Cellular Association, which represents mobile phone makers in India including Apple, Samsung Electronics, Micromax Informatics and Intex, said that it was talking to the BIS and the Department of Electronics and Information Technology on excluding the imprinting of vernacular language characters on keypads from the standard and allowing handset makers to develop solutions for local language input capability in phones.&lt;br /&gt;&lt;br /&gt;"A formal communication or notification is expected soon from DeitY on implementing the rules," said Pravin Gondane, associate director at ICA. The department is expected to hold consultations with the industry by the month-end before it comes out with a notification that mandates the standard.&lt;br /&gt;&lt;br /&gt;Sunil Abraham, executive director of the Centre for Internet and Society, suggested a middle ground where the government could map all reasonably popular input standards and document them so that customers can pick a phone they are comfortable with.&lt;br /&gt;&lt;br /&gt;While awaiting the notification, the association has internally sent notices to all companies stating that printing on keypads may not be necessary, even for feature phones, Gondane said. Alternative solutions could include a keypad cover that lists vernacular language characters for text input and inputting of text through a virtual keypad.&lt;br /&gt;&lt;br /&gt;While a task force set up by DeitY admits it's a challenge to implement this rule for feature phones because the number of keys is limited, it suggested that a common minimum framework to assign characters on 12 keys should follow international standards and incorporate Indian languages requirement on the same. The taskforce has issued best practices for designing Indian language text-entry mechanisms for phones with 12 keys, rather than lay out a standard for keypads.&lt;br /&gt;&lt;br /&gt;Smartphones have touchscreens, making language reading and inputting changes a software requirement that's easy to implement. Samsung smartphones and feature phones are enabled with typing, reading and changing user interface in 14 local languages, said Manu Sharma, the company's VP of mobile business.guages can be easily printed on the keyboard, while others can be  enabled through typing on the screen," the official said.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-august-10-2016-gulveen-aulakh-neha-alawadhi-implementing-indian-languages-in-feature-phones-will-be-difficult'&gt;https://cis-india.org/internet-governance/news/economic-times-august-10-2016-gulveen-aulakh-neha-alawadhi-implementing-indian-languages-in-feature-phones-will-be-difficult&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-08-10T15:51:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/impact-of-industrial-revolution-4-0-it-and-automotive-sector-in-india-by-the-dialogue-and-fes">
    <title>Impact of Industrial Revolution 4.0 - IT and Automotive Sector in India by the Dialogue and FES</title>
    <link>https://cis-india.org/internet-governance/news/impact-of-industrial-revolution-4-0-it-and-automotive-sector-in-india-by-the-dialogue-and-fes</link>
    <description>
        &lt;b&gt;On August 21, 2019, Aayush Rathi, attended a report launch event and focus group discussion on the "Impact of Industrial Revolution 4.0 - IT and Automotive Sector in India". Research conducted by the Dialogue in collaboration with the Friedrich-Ebert-Stiftung (FES) were being presented. &lt;/b&gt;
        &lt;p class="moz-quote-pre" style="text-align: justify; "&gt;At CIS, we have previously produced research on the future of work in these sectors. Aayush attended the event to understand how other researchers are approaching the subject of the future of work in terms of the methodological approach and the questions being asked and policy responses being proposed. In what may be treated as validation of our research design, FES and the Dialogue have addressed similar questions and adopted an empirical+desk based approach to do so as well.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/impact-of-industrial-revolution-4-0-it-and-automotive-sector-in-india-by-the-dialogue-and-fes'&gt;https://cis-india.org/internet-governance/news/impact-of-industrial-revolution-4-0-it-and-automotive-sector-in-india-by-the-dialogue-and-fes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Industry 4.0</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2019-08-27T00:13:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/imagine-a-feminist-internet-research-practice-and-policy-in-south-asia">
    <title>Imagine a Feminist Internet: Research, Practice and Policy in South Asia</title>
    <link>https://cis-india.org/internet-governance/news/imagine-a-feminist-internet-research-practice-and-policy-in-south-asia</link>
    <description>
        &lt;b&gt;Internet Democracy Project and Point of View co-organized a two-day Imagine a Feminist Internet event in Sri Lanka on 22011 and 22 February 2019. Ambika Tandon was a speaker and presented a paper 'Framing Reproductive Health as a Data Problem? Unpacking ‘Dataveillance’ in India' which was co-authored by herself and Aayush Rathi.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The panel also had a presentation by Dr. Anja Kovacs, and was moderated by Eva Blum-Dumontet from Privacy International. Ambika also participated in a committee that drafted a declaration for policymakers based on the presentations at the conference, which is yet to be finalised. The agenda can be &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/ifi-draft-agenda"&gt;seen here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/imagine-a-feminist-internet-research-practice-and-policy-in-south-asia'&gt;https://cis-india.org/internet-governance/news/imagine-a-feminist-internet-research-practice-and-policy-in-south-asia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-27T01:52:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/iisc-students-boycott-uid">
    <title>IISc students boycott UID, don’t want Big Brother to keep watch</title>
    <link>https://cis-india.org/news/iisc-students-boycott-uid</link>
    <description>
        &lt;b&gt;The programme doesn’t have statutory backing. It is still in parliament &lt;/b&gt;
        
&lt;p&gt;Nandan Nilekani may be Bangalore’s blue-eyed boy making waves at the national level with his Unique Identification Number (UID), but there’s one part of the city that’s not impressed: A section of students and faculty of Indian Institute of Science (IISc).&lt;/p&gt;
&lt;p&gt;While many Bangaloreans have started enrolling for UID, the students are in boycott mode and say they will never do so.&lt;/p&gt;
&lt;p&gt;Professor Shiv Sethi, astrophysics department, Raman Research Institute, said, “They (the authorities) have moved faster than us by starting the enrolment. It was during the discussion phase that we tried to impress upon them the loopholes of UID. Now that they have started the enrolment, it’s our turn to protest. We will meet and discuss with other like-minded people.”&lt;/p&gt;
&lt;p&gt;IIScians say they don’t want to be under surveillance and that they are not comfortable with giving away their personal details since studies have proved how unsafe electronic data can be. The programme has been scrapped in the UK, they said.&lt;/p&gt;
&lt;p&gt;In fact, when Nilekani visited IISc a few months back to deliver a lecture, the anti-UID group protested with placards and banners that read, ‘Beware, Big Brother is watching you’ and ‘Secure electronic archive is a myth’.&lt;/p&gt;
&lt;p&gt;And now, apart from not signing up, some students are even considering burning copies of UID forms, a la team Anna burning copies of the draft Lokpal bill.&lt;/p&gt;
&lt;p&gt;Prathamesh, a scholar, said: “UID is not going to solve problems of leakages. The government should universalise the PDS system to control misuse of subsidised foodgrain that find their way to restaurants. The project is fraught with loopholes and doesn’t have statutory backing. I will burn copies of the forms.”&lt;/p&gt;
&lt;p&gt;Prathamesh added that the UID project was the brainwave of software companies who do not have a regular stream of revenue.&lt;/p&gt;
&lt;p&gt;Even IISc alumni are putting up a fight. One of them who participated in the protest said, “I will not register. The programme does not have statutory backing. It is still in parliament. First, they said it was voluntary. Now, they are trying to link it to banks, LPG connections and other utilities.”&lt;/p&gt;
&lt;p&gt;Sethi added, “A few people have approached the court. We will decide the next course of action.”&lt;/p&gt;
&lt;p&gt;There are others who have doubts. Consumer activist Chandrasekhar of Malle-swaram feels that he needs to clarify all his doubts before enrolling. “I spoke with the officials. They told me it was voluntary. But now, it looks like they are linking it with other utilities.”&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Nishant Shah, director, research, Centre for Internet Society, said, "We need to check for three issues: data retention, data protection and data privacy. Only after these issues are resolved can we have a UID for every citizen."&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;This article by&amp;nbsp;Sameer Ranjan Bakshi was published in the Bangalore Mirror on August 23, 2011. The original story can be read &lt;a class="external-link" href="http://www.bangaloremirror.com/article/10/20110823201108230010571621d4f13b8/IISc-students-boycott-UID-don%E2%80%99t-want-Big-Brother-to-keep-watch.html"&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/iisc-students-boycott-uid'&gt;https://cis-india.org/news/iisc-students-boycott-uid&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-08-23T08:24:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/iigf-recruitment">
    <title>IIGF Recruitment</title>
    <link>https://cis-india.org/internet-governance/news/iigf-recruitment</link>
    <description>
        &lt;b&gt;The National Internet Exchange of India (NIXI) is conducting walk-in interviews on May 16, 2015 at 10 a.m. at NIXI Jasola office, Flat No. 6B, 6th Floor, Uppals M6 Plaza, New Delhi. NIXI is seeking candidates to fill the posts of Technology Analyst, Policy Analyst, Research Associate and Executive Assistants.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;IIGF Recruitment Guidelines&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The India Internet Governance Forum (IIGF) is the national forum constituted by the Department of Electronics and Information Technology (DeitY), Government of India for multi-stakeholder dialogue between the government, private sector, technical community, academia and civil society organizations on public-policy issues related to Internet Governance. IIGF would be reviewing the global Internet policy landscape and provide guidelines for  matters related to Internet Governance, taking into account the technical development and the dynamically changing  societal needs in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instrumental to furthering the aims of IIGF, NIXI would be providing the technical and administrative support, conducting research, training, and workshops and preparing white papers, technology reports etc. In particular, the following specific activities will be carried out:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Organisation of the annual IIGF event in a purposeful and inclusive manner.&lt;/li&gt;
&lt;li&gt;Capacity building and awareness-raising on the public policy issues pertaining to Internet Governance.&lt;/li&gt;
&lt;li&gt;Regular and sustained engagement with all stakeholders.&lt;/li&gt;
&lt;li&gt;Making India a significant player in the global Internet Governance space.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;In order to achieve the above goals, NIXI will provide the requisite support functions through specialised personnel, recruited for this task. Accordingly, a group of approximately 8-10 analysts/ associates and support staff would be recruited   who will perform the following functions:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Develop an annual work plan of the IIGF activities&lt;/li&gt;
&lt;li&gt;Provide technical, research and administrative support to the IIGF keeping in view the rapid global developments&lt;/li&gt;
&lt;li&gt;Promote the IIGF activities of the members (sub-regional and national IGFs including   other stakeholders);&lt;/li&gt;
&lt;li&gt;Act as a knowledge management hub of the IIGF experiences, best practices, knowledge, expertise, needs and resources among sub-regional and national IGFs&lt;/li&gt;
&lt;li&gt;Help convene India IGF meetings and&lt;/li&gt;
&lt;li&gt;Develop and maintain active e-mail lists and website to provide updated India IGF related information to sub-regional and national IGFs including other international stakeholders.&lt;/li&gt;
&lt;li&gt;Any other activity related to IG required from time to time would also be actively identified and pursued.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;General expectations from recruited personnel:&lt;/b&gt; Positive attitude, excellent qualities to work in a team, perform as per the needs of the organization and ensuring healthy work culture. Prior experience and good track record will be added advantages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Period of service:&lt;/b&gt; The selected candidates would initially be recruited for a contract period of 1 year which would be extended up to 3 years depending upon performance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Technology Analyst – 2-3 nos. (Full-time/ part-time)&lt;br /&gt;&lt;/b&gt;Qualifications: B.Tech/M.Tech Electronics &amp;amp; Communications/IT &amp;amp; Computer Science/MCA&lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Experience&lt;/b&gt;:Knowledge of Internet technologies – resources, telecommunication policies, procedures of inter-ministerial coordination, regulations and procedures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Expectations&lt;/b&gt;: Ability to study, analyze and write national impact assessment reports taking into account global Internet Technology Standards and Processes from Internet Engineering Task Force (IETF) and other standards bodies; to bring out Technology Roadmap recommendation documents on global Internet Governance and Technology related issues; monitor and participate in RFC process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Remuneration&lt;/b&gt;: Rs.50,000 -75000 per month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Policy Analyst&lt;/b&gt; – 2-3 nos. (Full-time/ part-time)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Qualifications&lt;/b&gt;: Law or public policy graduate. Cyber-law knowledge would be an added advantage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Experience&lt;/b&gt;: Awareness and understanding of Public Policy issues pertaining to global Internet Governance, technology and governance related regulations, policies and procedures. Previous work-experience desirable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Expectations&lt;/b&gt;: Ability to Study, analyze and write policy documents of global Internet Governance and Technology related issues, summarize and analyze them and convert it into usable knowledge, assist in all aspects of the planning/organization of IIGF events.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Remuneration&lt;/b&gt;: Rs.50,000 -75000 per month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Research Associate&lt;/b&gt; – 2-3 nos. (Full-time/ part-time)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Qualifications&lt;/b&gt;: Graduates/Post Graduates Computing and information system/ Information Technology/Computer applications/B.Tech/M.Tech Electronics/Communication/IT, or other relevant disciplines, preferably with work experience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Expectations&lt;/b&gt;: Aptitude to analyze problems and articulate solutions, undertake research on both policy and technical issues connected to IG, assist in all aspects of the planning/organization of the IIGF events.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Remuneration: Rs. 30,000 - 40000 per month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Executive Assistants – 1 no.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Qualifications: &lt;/b&gt;Graduates in Computing and Information system, Information Technology, Computer Applications (MCA/BCA degree) preferably with 2 years work experience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Experience:&lt;/b&gt; Excellent drafting skills, sound knowledge of English, commitment and maintaining confidentiality and secrecy are the important requirements. Those with experience in similar area of work in Govt./PSU /private sector will be preferred.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Expectations:&lt;/b&gt; Good communication skills, positive attitude, high commitment, maintaining confidentiality and secrecy, high commitments and spirit to excel at the main requirements. Prior working experience would be an added advantage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Remuneration:&lt;/b&gt; Rs.  20,000 - 30000 per month.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/iigf-recruitment'&gt;https://cis-india.org/internet-governance/news/iigf-recruitment&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-04-29T16:14:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/igf-academy-regional-workshop">
    <title>IGF Academy Regional Workshop</title>
    <link>https://cis-india.org/internet-governance/news/igf-academy-regional-workshop</link>
    <description>
        &lt;b&gt;Sunil Abraham will be a speaker at this event organized by LIRNE Asia in Colombo, Sri Lanka on August 4, 2016. He will speak on the status of freedom of expression, internet governance and multi-stakeholder processes&lt;/b&gt;
        &lt;p&gt;Sunil Abraham made a &lt;a href="https://cis-india.org/internet-governance/files/lirneasia-presentation/view" class="external-link"&gt;presentation&lt;/a&gt; at the event.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/IGF1.jpg" alt="IGF" class="image-inline" title="IGF" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/IGF2.jpg" alt="IGF" class="image-inline" title="IGF" /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/igf-academy-regional-workshop'&gt;https://cis-india.org/internet-governance/news/igf-academy-regional-workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-08-06T15:30:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/emerging-issues-social-networks">
    <title>IGF 2009 - Main Session: Emerging Issues: Social Networks</title>
    <link>https://cis-india.org/news/emerging-issues-social-networks</link>
    <description>
        &lt;b&gt;Current laws don't seem to scale well to handle Web 2.0 issues&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;Session description:&lt;/strong&gt; Discussion was centered on the development of social media (social networks, user-generated content sites, micro-blogging, collaboration tools, etc.) in order to explore whether these developments require to new or modified policy approaches. Key issues explored include privacy and data protection, rules applicable to user-generated content and copyrighted material, and freedom of expression and illegal content. The session also addressed the importance of the “terms of service” of large platforms, how they are developed and their relationship with emerging business models that are based on behavioral analysis.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Participants in the discussion included:&lt;/strong&gt; Sunil Abraham, director of policy, Centre for Internet and Society, Bangalore; Rebecca MacKinnon, co-founder of the Global Network Initiative; Grace Bomu, manager,&amp;nbsp; Kenya-Heartstrings and Fanartics Theatre Company, Kenya; Sergio Suiama, prosecutor, State of São Paulo, Brazil; Rachel O'Connell, VP of people networks and chief safety officer, Bebo.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;November 18, 2009 - Sunil Abraham&lt;/strong&gt;, an Internet policy expert from Bangalore, was a key panelist in this session who introduced the primary concerns tied to social networks today.&lt;br /&gt;&lt;br /&gt;"I'm going to raise nine emerging issues about social media," he began, "and I categorize them into four categories: Intellectual property rights, morality laundering, the hegemony of the connected and the hegemony of text."&lt;br /&gt;&lt;br /&gt;He noted that intellectual property law is completely outdated and cannot be applied in today's communications environment, saying it is "irrelevant." He added, "To take some examples, the right of the consumer to review, the right of the consumer to privacy, the right of the entrepreneur or enthusiast to make interoperable, complementary or competing products. All these rights used to be protected under the right to reverse-engineer. Issue 2 under IPR: On some corporate-mediated social media platforms, copyright takedown notices from one political party are acted on much more swiftly when compared to similar takedown notices from an opposing party. Issue 3, under IPR: Some rights holders, and in particular news organizations, use copyright takedown notices selectively to purge social media Web sites of content that opposes their editorial viewpoint. Issue 4 under intellectual property rights: The increased use of automated enforcement of copyright by rights holders is seriously undermining freedom of expression on the Internet, as in the case of the baby dancing to Prince's 'Let's Go Crazy.'"&lt;br /&gt;&lt;br /&gt;He explained "morality laundering" - saying that, like policy laundering, it is "trying to impose a globally homogenized morality regime." He cited the example of breast-feeding photos on a social network being deleted because they were considered obscene. "Breast-feeding, I may remind you, is still a public activity in many southern countries," he said. "Photographs of public life on a beach in a country where nudism is the norm becomes child pornography in another country."&lt;br /&gt;&lt;br /&gt;He said that religious traditions can sometime be reduced to a monoculture on community-managed social media platforms that "depend on editors to determine the truth," adding "That is because upper-crust and upper-class populations have greater access to the Internet. Literate communities will try to maintain their hegemony on the Internet. Community-managed social media platforms that depend on textual citation often ignore the knowledge of the oral communities of the global south."&lt;br /&gt;&lt;br /&gt;Session moderator &lt;strong&gt;Simon Davies&lt;/strong&gt;, director of Privacy International, asked Abraham if automated enforcement of social network policies should be outlawed. "I don't think it is possible for us to completely take out machine involvement in moderating content online," Abraham said, "whether it is from a freedom-of-speech perspective or a hate-speech perspective or from an intellectual-property-rights perspective. But I think the process has to become more transparent, so that the public will know what happened and why it happened and that there is due process and the possibility of appeal."&lt;br /&gt;&lt;br /&gt;Davies had kicked off the session with a plea that participants try to think ahead in this discussion of social networks. "Our role today in this panel is to look to the future, and our mentors at the UN and at IGF have urged me to motivate, as much as possible, an imagining of the future," he said. "Our role, as we can see on the program, is to look at social networks and social spaces such as micro-blogging and Web 2.0, as we move through to the next - what are the issues that we're likely to confront. So our two goals, if I can suggest a focus, is: What have we brought out of this last few days that tells us something about the way the future will go? Particularly in terms of social interaction. And second, imagine that future."&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Sergio Siuama&lt;/strong&gt;, prosecutor for the State of São Paulo, Brazil, was asked to describe the privacy problem that developed there on Google's social network Orkut. "Social networks are the fourth most popular online activity, ahead of personal e-mail," he said. "Eighty percent of Brazilian Intenet users interact through social network sites. In Brazil as well in India and Pakistan, the most popular social networking service is Google's Orkut. More than 30% of Brazilian users access regularly use Orkut and about 25% of them are children and teenagers." He said many social networks accessed by people globally are transnational. "The most-accessed services in Brazil are provided by companies physically located in the United States," he said.&lt;br /&gt;&lt;br /&gt;In 2005 Google set up a branch in São Paulo, but it was not enough to handle the business of 30 million users. Since 2004 Brazilian authorities have been receiving reports of cyberbullying, drug dealing, child pornogrphy and other human rights violations in Orkut's space. In 2006 the federal attorney's office started a collective lawsuit against Google. Google responded with a proactive plan. After two years of litigation, in July 2008, the parties settled on a collective agreement in which Google agreed, among other obligations, to comply with Brazilian legislation, to store traffic data for at least six months, to take down child-abuse images, to develop a proactive system of child-abuse images detection, removal and report to law enforcement, and to establish a customer-service office able to quickly respond to all users' complaints. Some of these obligations were adopted as standards for the whole of Latin America in a document - the memorandum of Montevideo.&lt;br /&gt;&lt;br /&gt;Siuama raised several governance issues that arise from this case: Which criteria should be used to define the ability of a country to legislate over and sanction conducts committed on the Internet? Is it legitimate to enforce rules at a local company's office regarding a service operated from another country? What are the basic standards we should expect from ISPs to help cope with human rights violations on the Internet? Is any national law enforcement agency equipped to cope with crimes committed on social networking sites? Will it be necessary to ensure minimum levels of transparency and social accountability of networking services?&lt;br /&gt;&lt;br /&gt;Panel member &lt;strong&gt;Rachel O'Connell&lt;/strong&gt;, vice president of people networks and chief safety officer for Bebo, chaired the &lt;a class="external-link" href="http://www.europeandigitalmedia.org/safer-social-networking"&gt;European Union's Safer Social Networking Cross-Industry Task Force&lt;/a&gt; - an effort by 18 social networking companies, including Facebook and Google, working with the European Commission and civil liberties, child welfare, law enforcement and parenting groups.&lt;br /&gt;&lt;br /&gt;"We came up with seven principles that relate to education and ensuring that we have prominent and easily accessible safety messages and also addressing reporting abuse and providing people with the technologies and capabilities so they can use the Internet safely," she said. "We are doing a lot of filtering on the back end. We have moderation teams in place. We have very strong links with law enforcement. We look at the legal issues in each of the countries and the markets in which we operate and see how that ties up with being a US-based company. We're also aware of treaties like the multinational legal assistance treaty, in terms of working with law enforcement and investigators."&lt;br /&gt;&lt;br /&gt;O'Connell said the industry has probably not been clear enough about how these procedures are implemented. She expects that the principles set out by the task force will make things more clear. "The number of signatories was 18 and now it's up to 23, and part of my role is to encourage companies to become signatories," she said. "It means you need to self-declare how you have implemented the principles and each of the substantive recommendations. These self-declarations are being reviewed by independent researchers, and their report will be released to coincide with Safer Internet Day in February."&lt;br /&gt;&lt;br /&gt;She added that U.S. attorneys general have asked social networking companies to begin being more transparent and accountable. "Facebook has an internal auditor to ensure that they are meeting the requirements outlined by the attorneys general, and similarly MySpace has an agreement, so there is an incredible amount of work going on," she said. "That said, there is still a log of work to do, as there always will be. For example, AOL has been working closely with the National Center for Missing and Exploited Children and are diligent about working with law enforcement in other countries to ensure we can facilitate the investigative process. We also have a filtering process we run on the back end."&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Grace Bomu&lt;/strong&gt;, manager for Kenya-Heartstrings and Fanartics Theatre Company, Kenya, was on hand to talk about the positive influence of social networks. Her creative troupe uses them to do marketing, research and concept development. "From our Facebook page," she explained, "we're able to tell which issues the youth in Kenya are facing, and from those issues, we are able to develop a concept and sell our plays. On our Facebook page, people propose lines, other people propose they be actors, and this has really changed the way we do business. It's the actors who write the script, and our friends help us in writing the script.&lt;br /&gt;&lt;br /&gt;"Another way the Internet helps us is using the mobile money payment systems. Our management uses a mobile phone to update the page, to make comments and so on. Friends came up with the idea that they could pay to attend plays using mobile money payment systems."&lt;br /&gt;&lt;br /&gt;She said there are some negatives. Anonymous respondents and competitors write negative comments on the troupe's page, politicians sometimes try to use the page to advance their goals, "and we have had&amp;nbsp; problem of balancing what some people call abusive language with what others say is artistic expression."&lt;br /&gt;&lt;br /&gt;"We'd say that these tools have really helped news opening up culture, in growth of urban language and also in the contribution of topical issues," she concluded. "Tools are helping us to expand freedom of expression rather than caging it. So what we have done as a company is that we are coming up with - slowly, we are coming up with a code within us that we shall follow in balancing the competing interests."&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Rebecca MacKinnon&lt;/strong&gt;, Open Society Institute fellow and co-founder of the Global Network Initiative, noted that throughout the sessions of IGF-2009 people have been speaking out about the power of social networks as spaces where individual citizens can speak truth to power. "Spaces that help to make governments and other institutions more accountable to individuals," she said. "This is happening all over the world, across a range of political systems. But there are trends that are counteracting the potential of social networks to be a force that can truly help citizens participate in public life. This may be contributing to social networks acting as more opaque extensions of incumbent power in some situations, rather than as transparent conduits between citizens and institutions."&lt;br /&gt;&lt;br /&gt;MacKinnon raised four key points. The first is the level of liability governments place on social networking services in regard to user-generated content.&lt;br /&gt;&lt;br /&gt;While it is part of the groundrules for IGF that participants are encouraged to avoid singling out people or nations when meting out criticism, it was clear that she was referring to China when she said, "In some jurisdictions, international social networking sites end up being blocked because the sovereign government is not happy with some of the content being posted on the sites. And in some of those jurisdictions, what then ends up happening is that a robust set of domestic social networking sites evolve. And the social networking sites that are hosted domestically are held liable for all the content that their users are posting on the site. And so in order to comply with government requirements and the particular government's definition of what constitutes legal speech, these social networking sites end up having to develop large departments of people whose job it is to police content. international social networking sites that want to act - want to operate in certain jurisdictions have to make a choice, either to be blocked to users in that country because users may post things that the local government objects to, or agree to develop a locally hosted site in the local language which would then be subject to greater local jurisdiction and agree to police it. And there have been some cases where certain - and I have again been asked not to name and shame - but where certain companies have chosen to host locally and comply with government requests for political censorship in that regard. And so this is one challenge that social networking companies around the world are facing, is how to deal with this."&lt;br /&gt;&lt;br /&gt;Other points she outlined were:&lt;br /&gt;&lt;br /&gt;- &lt;strong&gt;Social network users are often not allowed to be anonymous&lt;/strong&gt;. "There's at least one country where now anybody who uses a social networking site or Web service over a certain size has to register with their national ID number," she explained, "and many human rights groups have expressed concerns about some users who have been traced for political speech. At least one international social networking service decided to disable the local uploading of videos and comments onto its service, so&amp;nbsp; people in that country have to use the international version of the service rather than the local service - so that this particular social networking site would not be in the position of handing people over for speech that might arguably be political."&lt;br /&gt;&lt;br /&gt;- &lt;strong&gt;Administrators of social networking sites will sometimes perceive that something is going against the terms of service when the content has a much different intent&lt;/strong&gt;. "There are political activists from a range of countries who found their Facebook accounts frozen because their pattern of activity resembled spamming," she said, "and this had an impact on their ability to conduct political activities. And there have been situations where activists in various countries post images of abuse by authorities against citizens and these are quite graphic and are deemed to be against terms of service. And the people concerned feel that 'if these sites do not let me speak truth to power, then were can I go?' So that's another sort of human-rights issue."&lt;br /&gt;&lt;br /&gt;- &lt;strong&gt;A new multistakeholder group, the &lt;a class="external-link" href="http://www.globalnetworkinitiative.org/"&gt;Global Network Initiative&lt;/a&gt;, is being co-founded by MacKinnon&lt;/strong&gt; and others to protect and advance freedom of expression and privacy in ICTs. "Our approach recognizes that a lot of these issues are difficult to legislate for because they involve very nuanced contextual situations that differ greatly," she said. "Companies do feel there is a need to have some kind of assistance in doing the right thing. How can social networks fulfill their potential and serve their users so they feel they can use these services without becoming victims of oppression in various ways? The Global Network Initiative combines companies who have signed on as well as human rights groups, socially responsible investment funds and some academics to help companies proactively figure out how to anticipate free-expression issues in order to avoid problems and assist in making choices about how to structure businesses."&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Pavan Duggal&lt;/strong&gt; spoke from the floor of the session about the formation of a dynamic coalition on social networks, which came together after a session on legal issues and social media earlier in the day. "These issues not only relate to data protection and privacy," he said. "They also relate to the issue of jurisdiction and ownership, storage, retention and transmission of user-generated content. Do we have the right to be anonymous? Do we have a right to oblivion? Can there be a right to delete in the context of social media? Is there a right of purging children-generated content? Can there be a right to forget and to forgive in the context of information? We also discussed how the deadly cocktail mix of social media and cloud computing is venturing us into a wild, wild west as far as jurisprudential rules and principles are concerned. Which country, what data, which server, which law would apply, which would be effective remedy, which would be the relevant court and how would the ultimate adjudication be done?"&lt;br /&gt;&lt;br /&gt;He said it is expected that national governments will try to legislate in this area. "While the Internet has made geography history, the fact still remains that national governments will try to legislate," he said. "It is time that respective stakeholders must come together, not just the players, the users, but also the industry, the government, the lawmakers, law enforcement."&lt;/p&gt;
&lt;p&gt;For the UN video, &lt;a class="external-link" href="http://www.un.org/webcast/igf/ondemand.asp?mediaID=pl091118pm2"&gt;click here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For the UN transcript, &lt;a class="external-link" href="http://www.intgovforum.org/cms/2009/sharm_el_Sheikh/Transcripts/Sharm%20El%20Sheikh%2018%20November%202009%20Emerging%20Issues.pdf"&gt;click here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For the original article, &lt;a class="external-link" href="http://www.elon.edu/e-web/predictions/igf_egypt/social_networks.xhtml"&gt;click here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/emerging-issues-social-networks'&gt;https://cis-india.org/news/emerging-issues-social-networks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T13:46:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
