<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1776 to 1790.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-2012-vs-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-analysis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/today-september-24-2015-huge-outcry-forces-india-backtrack-social-media-data-proposal"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/how-workstream-2-plans-to-improve-icanns-transparency"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/web2.0-responds-to-hazare"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/outlook-india-october-12-2015-arindam-mukherjee-how-to-win-friends-fb-style"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/india-blogs-nytimes-november-20-2012-how-to-steer-clear-of-indias-strict-internet-laws"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/how-to-shutdown-internet-shutdowns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/how-to-engage-in-broadband-policy-and-regulatory-processes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-leslie-d-monte-joji-thomas-philip-july-3-2013-how-the-worlds-largest-democracy-is-preparing-to-snoop-on-its-citizens"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/uid-project-concern"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-quint-november-17-2016-payaswini-upadhyay-how-the-uk-got-a-better-deal-from-facebook-than-india-did"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/scroll.in-march-24-2016-rajshekhar-anumeha-yadav-how-the-govt-gains-when-private-companies-use-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-2012-vs-2015">
    <title>Human DNA Profiling Bill 2012 v/s 2015 Bill</title>
    <link>https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-2012-vs-2015</link>
    <description>
        &lt;b&gt;This entry analyses the Human DNA Profiling Bill introduced in 2012 with the provisions of the 2015 Bill &lt;/b&gt;
        &lt;p&gt;A comparison of changes that have been introduced in the	&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;Human DNA Profiling Bill, June 2015.&lt;/a&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Definitions:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;1. 2012 Bill: The definition of "&lt;span style="text-decoration: underline;"&gt;analytical procedure&lt;/span&gt;" was included under clause 2 (1) (a) and was defined as an orderly step by step procedure 	designed to ensure operational uniformity.&lt;/p&gt;
&lt;p&gt;2015 Bill: This definition has been included under the Explanation under clause 22 which provides for measures to be taken by DNA Laboratory.&lt;/p&gt;
&lt;p&gt;2. 2012 Bill: The definition of "&lt;span style="text-decoration: underline;"&gt;audit&lt;/span&gt;" was earlier defined under clause 2 (1) (b) and was defined as an inspection used to evaluate, confirm or 	verify activity related to quality.&lt;/p&gt;
&lt;p&gt;2015 Bill: This definition has been included under the Explanation under clause 22 which provides for measures to be taken by DNA Laboratory.&lt;/p&gt;
&lt;p&gt;3. 2012 Bill: There was no definition of "&lt;span style="text-decoration: underline;"&gt;bodily substance&lt;/span&gt;".&lt;/p&gt;
&lt;p&gt;2015 Bill: Clause 2(1) (b) defines bodily substance to be any biological material of or from a body of the person (whether living or dead) and includes 	intimate/non-intimate body samples as well.&lt;/p&gt;
&lt;p&gt;4. 2012 Bill: The definition of "&lt;span style="text-decoration: underline;"&gt;calibration&lt;/span&gt;" was included under clause 2 (1) (d) in the previous Bill.&lt;/p&gt;
&lt;p&gt;2015 Bill: The definition has been removed from the definition clause and has been included as an explanation under clause 22.&lt;/p&gt;
&lt;p&gt;5. 2012 Bill: Previously "&lt;span style="text-decoration: underline;"&gt;DNA Data Bank&lt;/span&gt;" was defined under clause 2(1)(h) as a consolidated DNA profile storage and maintenance facility, whether in 	computerized or other form, containing the indices as mentioned in the Bill.&lt;/p&gt;
&lt;p&gt;2015 Bill: However, in this version, the definition has been briefed under clause 2(1) (f) to mean as a DNA Data Bank as established under clause 24.&lt;/p&gt;
&lt;p&gt;6. 2012 Bill: Previously a "&lt;span style="text-decoration: underline;"&gt;DNA Data Bank Manager&lt;/span&gt;" was defined clause 2(1) (i) as the person responsible for supervision, execution and maintenance 	of the DNA Data Bank.&lt;/p&gt;
&lt;p&gt;2015 Bill: In the new Bill, it is defined clause 2(1) (g) as a person appointed under clause 26.&lt;/p&gt;
&lt;p&gt;7. 2012 Bill: Under clause 2(1) (j), the definition of "&lt;span style="text-decoration: underline;"&gt;DNA laboratory&lt;/span&gt;" was defined to be any laboratory established to perform DNA procedures.&lt;/p&gt;
&lt;p&gt;8. 2015 Bill: Under clause 2(1) (h) "DNA laboratory" has been now defined to be any laboratory established to perform DNA profiling.&lt;/p&gt;
&lt;p&gt;9. 2012 Bill: "&lt;span style="text-decoration: underline;"&gt;DNA procedure&lt;/span&gt;" was defined under clause 2(1) (k) as a procedure to develop DNA profile for use in the applicable instances as 	specified in the Schedule.&lt;/p&gt;
&lt;p&gt;2015 Bill: This definition has been removed from the Bill.&lt;/p&gt;
&lt;p&gt;10. 2012 Bill: There was no definition of "&lt;span style="text-decoration: underline;"&gt;DNA Profiling&lt;/span&gt;".&lt;/p&gt;
&lt;p&gt;2015 Bill: DNA profiling has been defined under clause 2(1) (j) as a procedure to develop DNA profile for human identification.&lt;/p&gt;
&lt;p&gt;11. 2012 Bill: "&lt;span style="text-decoration: underline;"&gt;DNA testing&lt;/span&gt;" was defined under clause 2(1) (n) as the identification and evaluation of biological evidence using DNA technologies 	for use in the applicable instances.&lt;/p&gt;
&lt;p&gt;2015 Bill: This definition has been removed.&lt;/p&gt;
&lt;p&gt;12. 2012 Bill: "&lt;span style="text-decoration: underline;"&gt;forensic material&lt;/span&gt;" was defined under clause 2(1) (o) as biological material of or from the body of a person living or dead, and 	representing an intimate body sample or non-intimate body sample.&lt;/p&gt;
&lt;p&gt;2015 Bill: This definition has been included under the definition of "bodily substance" under clause 2(1) (b).&lt;/p&gt;
&lt;p&gt;13. 2012 Bill: "&lt;span style="text-decoration: underline;"&gt;intimate body sample&lt;/span&gt;" was defined under clause 2(1) (q).&lt;/p&gt;
&lt;p&gt;2015 Bill: This has been removed from the definitions clause and has been included as an explanation under clause 23 which addresses sources and manner of 	collection of samples for DNA profiling.&lt;/p&gt;
&lt;p&gt;14. 2012 Bill: "&lt;span style="text-decoration: underline;"&gt;intimate forensic procedure&lt;/span&gt;" was defined under 2(1) (r).&lt;/p&gt;
&lt;p&gt;2015 Bill: This has been removed from the definitions clause and has been included as an explanation under clause 23 which addresses sources and manner of 	collection of samples for DNA profiling.&lt;/p&gt;
&lt;p&gt;15. 2012 Bill: "&lt;span style="text-decoration: underline;"&gt;non-intimate body sample&lt;/span&gt;" was defined under clause 2(1) (v) in 2012 Bill.&lt;/p&gt;
&lt;p&gt;2015 Bill: The definition of "non-intimate body sample" has not been included in the definitions clause and has been included as an Explanation under 	clause 23 which addresses sources and manner of collection of samples for DNA profiling.&lt;/p&gt;
&lt;p&gt;16. 2012 Bill: "&lt;span style="text-decoration: underline;"&gt;non-intimate forensic procedure&lt;/span&gt;" was defined under clause 2(1) (w) in 2012 Bill.&lt;/p&gt;
&lt;p&gt;2015 Bill: The definition of "non-intimate forensic procedure" has not been included in the definitions clause and has been included as an Explanation 	under clause 23 which addresses sources and manner of collection of samples for DNA profiling.&lt;/p&gt;
&lt;p&gt;17. 2012 Bill: "&lt;span style="text-decoration: underline;"&gt;undertrial&lt;/span&gt;" was defined under clause 2(1) (zk) as a person against whom a criminal proceeding is pending in a court of law.&lt;/p&gt;
&lt;p&gt;2015 Bill: The definition now states such a person against whom charges have been framed for a specified offence in a court of law under clause 2(1) (zc).&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;DNA Profiling Board:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;1. 2012 Bill: Under clause 4 (a), the Bill stated that a renowned molecular biologist must be appointed as the Chairperson.&lt;/p&gt;
&lt;p&gt;2015 Bill: Under clause 4 addressing Composition of the Board, the Bill states that the Board shall consist of a Chairperson who shall be appointed by the 	Central Government and must have at least fifteen years' experience in the field of biological sciences.&lt;/p&gt;
&lt;p&gt;2. 2012 Bill: Under clause 4 (i), the Chairman of National Bioethics Committee of Department of Biotechnology, Government of India was to be included as a 	member under the DNA Profiling Board.&lt;/p&gt;
&lt;p&gt;2015 Bill: This member has been removed from the composition.&lt;/p&gt;
&lt;p&gt;3. 2012 Bill: Under clause 4 (m), the term of 1 person from the field of genetics was not mentioned in the 2012 Bill.&lt;/p&gt;
&lt;p&gt;2015 Bill: In this Bill under clause 4 (m), it has been stated that such a person must have minimum experience of twelve years in the field.&lt;/p&gt;
&lt;p&gt;4. 2012 Bill: The term of 2 people from the field of biological sciences was not mentioned in the 2012 Bill under clause 4 (l).&lt;/p&gt;
&lt;p&gt;2015 Bill: Under clause 4 (l), it has been stated that such 2 people must have minimum experience of twelve years in the field.&lt;/p&gt;
&lt;p&gt;5. The following members have been included in the 2015 Bill-&lt;/p&gt;
&lt;p&gt;i. Chairman of National Human Rights Commission or his nominees, as an ex-officio member under clause 4 (a).&lt;/p&gt;
&lt;p&gt;ii. Secretary to Government of India, Ministry of Law and Justice or his nominees (not below rank of Joint Secretary), as an ex-officio member under clause 	4 (b).&lt;/p&gt;
&lt;p&gt;6. 2012 Bill: Under clause 5, the term of the members was not uniform and varied for all members.&lt;/p&gt;
&lt;p&gt;2015 Bill: The term of people from the field of biological sciences and the person from the field of genetics has been states to be five years from the 	date of their entering upon the office, and would be eligible for re-appointment for not more than 2 consecutive terms.&lt;/p&gt;
&lt;p&gt;Also, the age of a Chairperson or a member cannot exceed seventy years.&lt;/p&gt;
&lt;p&gt;The term of members under clauses (c), (f), (h), and (i) of clause 4 is 3 years and for others the term shall continue as long as they hold the office.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Chief Executive Officer:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;/b&gt; 2012 Bill: Earlier it was stated in the Bill under clause 10 (3) that such a person should be a scientist with understanding of genetics and molecular 	biology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2015 Bill: The Bill states under clause 11 (3) that the CEO shall be a person possessing qualifications and experience in science or as specified under 	regulations. The specific experience has been removed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A new clause- 12(5) addresses power of the Board to co-opt the number of people for attending the meetings and take part in proceedings; however such a 	person shall be devoid of voting rights. Also, such a person shall be entitled to specified allowances for attending the meetings.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Officers and Other Employees of Board:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: The Bill stated under clause 11 (3) that the Board may appoint consultants required to assist in the discharge of its functions on such terms 	and conditions as may be specified by the regulations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2015 Bill: The 2015 Bill states under clause 12 (3) that the Board may appoint experts to assist for discharging its functions and may hold consultations 	with people whose rights may be affected by DNA profiling.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Functions of the Board:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;2012 Bill: 26 functions were stated in the 2012 Bill.&lt;/p&gt;
&lt;p&gt;2015 Bill: The number of the functions has been reduced to 22 with a few changes based on recommendations of Expert Committee.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Power of Board to withdraw approval:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2015 Bill: The circumstances in which the Board could withdraw its approval have not been changed from the 2012 Bill (previously under clause 16). There's 	an addition to the list as provided under clause 17 (1) (d) wherein the Board can also withdraw its approval in case the DNA laboratory fails to comply 	with any directions issued by the DNA Profiling Board or any such regulatory Authority under any other Act.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Obligations of DNA Laboratory:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;2015 Bill: There is an addition to the list of obligations to be undertaken by a DNA laboratory under clause 19 (d). The laboratory has an additional 	obligation to share the DNA data prepared and maintained by it with the State DNA Data Bank and the National DNA Data Bank.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Qualification and experience of Head, technical and managerial staff and employees of DNA Laboratory:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: The previous Bill clearly mandated under clause 19 (2) the qualifications of the Head of every DNA laboratory to be a person possessing 	educational qualifications of Doctorate in Life Sciences from a recognised University with knowledge and understanding of the foundation of molecular 	genetics as applied to DNA work and such other qualifications as may be specified by regulations made by the Board.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2015 Bill: The provision has been generalized and provides under clause 20 (1) for a person to be possess the specified educational qualifications and 	experience.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Measures to be taken by DNA Laboratory:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: In the previous Bill, there were separate clauses with regard to security, minimization of contamination, evidence control system, validation 	process, analytical procedure, equipment calibration and maintenance, audits of laboratory to be followed by a DNA Laboratory.&lt;/p&gt;
&lt;p&gt;2015 Bill: In the 2015 Bill, these measures to be adopted by DNA Laboratory have been included under one clause itself-clause 22.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Infrastructure and training:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: The specific provisions regarding infrastructure, fee, recruitment, training and installing of security system in the DNA Laboratory were 	present in the Bill under clauses 28-31.&lt;/p&gt;
&lt;p&gt;2015 Bill: These provisions have been removed from the 2015 Bill.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Sources and manner of collection of samples for DNA profiling:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;2012 Bill: Part II of the Schedule in the Bill provided for sources and manner of collection of samples for DNA Profiling.&lt;/p&gt;
&lt;p&gt;The sources include: Tissue and skeleton remains and Already preserved body fluids and other samples.&lt;/p&gt;
&lt;p&gt;Also, it provided for a list of the manner in which the profiling can be done:&lt;/p&gt;
&lt;p&gt;(1) Medical Examination (2) Autopsy examination (3) Exhumation&lt;/p&gt;
&lt;p&gt;Also, provision for collection of intimate and non-intimate body samples was provided as an Explanation.&lt;/p&gt;
&lt;p&gt;2015 Bill: Under Clause 23, the sources include bodily substances and other sources as specified in Regulations. The other sources remain unchanged.&lt;/p&gt;
&lt;p&gt;Also, provision for collection of intimate and non-intimate body samples is addressed in clause 23(2).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The explanation to the provision states what would be implied by the terms medical practitioner, intimate body sample, intimate forensic procedure, 	non-intimate body sample and non-intimate forensic procedure.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;DNA Data Bank:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;- Establishment:&lt;/p&gt;
&lt;p&gt;2012 Bill: The Bill did not specify any location for establishment of the National DNA Data Bank.&lt;/p&gt;
&lt;p&gt;2015 Bill: The Bill states under clause 24 (1) that the Central Government shall establish a National DNA Data Bank at Hyderabad.&lt;/p&gt;
&lt;p&gt;-Maintenance of indices of DNA Data Bank:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: Apart from the DNA profiles, every DNA Data Bank shall contain the identity of the person from whose body the substances are taken in case of a 	profile in the offenders' index as under clause 32 (6) (a).&lt;/p&gt;
&lt;p&gt;2015 Bill: Clause 25 (2) (a) states that the DNA Data Bank shall contain the identity for the suspects' or offenders' index.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; DNA Data Bank Manager: &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: The Bill States under clause 33 (1) that a DNA Data Bank Manger shall be appointed for conducting all operations of the National DNA Data Bank. 	The functions were not specific.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2015 Bill: The Bill states under clause 26 (1) specifically that a DNA Data Bank Manger shall be appointed for the purposes of execution, maintenance and 	supervision of the National DNA Data Bank.&lt;/p&gt;
&lt;p&gt;- Qualification:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: In the previous Bill, it was stated under clause 33 (3) that the DNA Data Bank Manager must be a scientist with understanding of computer 	applications and statistics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2015: The Bill states under clause 26 (2) that the DNA Data Bank Manager must possess educational qualification in science and any such experience as 	prescribed by the regulations.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Officers and other employees of the National DNA Data Bank:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: The Bill stated under clause 34 (3) that the Board may appoint consultants required to assist in the discharge of the functions of the DNA Data 	Banks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2015 Bill: The Bill provides under clause 27 (3) that the Board may appoint experts required to assist in the discharge of the functions of the DNA Data 	Banks&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Comparison and Communication of DNA profiles:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2015 Bill: The New Bill specifically addresses comparison and communication the DNA profiles as that in the offenders' or crime scene index under clause 28 	(1). Also, there is an additional provision under clause 29 (3) which states that the National DNA Data Bank Manger may communicate a DNA profile through 	Central Bureau of Investigation on request of a court, tribunal, law enforcement agency or DNA laboratory to the Government of a foreign State, an 	international organization or institution of Government.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Use of DNA profiles and DNA samples and records:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: The Bill provided under clause 39 that all DNA profiles, samples and records would be used solely for purpose of facilitating identification of 	perpetrator of an offence as listed under the Schedule. The proviso to this provision addressed the fact that such samples could be used to identify 	victims of accidents or disaster or missing persons, or any purpose of civil dispute.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2015 Bill: The Bill restricts the use of all DNA profiles, samples and records solely for purpose of facilitating identification of a person under the Act 	under clause 32.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;DNA Profiling Board Fund:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: The Bill stated under clause 47 (2) that the financial power for the application of monies of the Fund shall be delegated to the Board in such 	manner as may be prescribed and as may be specified by the regulations made by the Board.&lt;/p&gt;
&lt;p&gt;Also, the Bill stated that the Fund shall be applied for meeting remuneration requirements to be paid to the consultants under clause 47 (3) (c).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2015 Bill: This provision has not been included in the Bill. Also, the Bill does not include the provision of paying the remuneration to the experts from 	the Fund.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Delegation of Powers:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: The Bill provided under clause 61 that The Board may delegate its powers and functions to the Chairperson or any other Member or officer of the 	Board subject to such conditions, if necessary.&lt;/p&gt;
&lt;p&gt;2015 Bill: This provision has not been included in the 2015 Bill.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Powers of Board to make rules:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;2012 Bill: The Bill provided for an exhaustive list consisting of 33 powers listed under clause 65.&lt;/p&gt;
&lt;p&gt;2015 Bill: The Bill provides for a list of 27 powers of the Board under clause 57.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Schedule:&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2012 Bill: In the list of offense where human DNA profiling would be applicable, there was an inclusion of any law as may be specified by the regulations 	made by the Board.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2015 Bill: This provision has been removed from the 2015 Bill.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-2012-vs-2015'&gt;https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-2012-vs-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>DNA Profiling</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-09-06T14:10:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-analysis">
    <title>Human DNA Profiling Bill 2012 Analysis</title>
    <link>https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-analysis</link>
    <description>
        &lt;b&gt;Jeremy Gruber from the Council for Responsible Genetics, US provides an analysis of the Human DNA Profiling Bill, 2012. He says that India’s updated 2012 Human DNA Profiling Bill offers largely superficial changes from its predecessor, the Draft DNA Profiling Bill, 2007.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Indeed, where there are significant departures from prior language, they tend to raise additional privacy and human rights concerns.  Overall the current version of the Bill is littered with significant and striking human rights and privacy concerns and, if passed in its current form, would place India far outside the mainstream of both law and policy in this area.  Beyond the privacy and human rights concerns that are addressed in this analysis of the Bill, the breadth of the structural and financial costs of enacting the Bill in its current form should also be seriously considered as they would most certainly be staggeringly high.&lt;/p&gt;
&lt;h2&gt;Bill Analysis&lt;/h2&gt;
&lt;h3&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The introduction of the Bill sets out the broad policy objectives of its drafters. The most telling portion in paragraph 1 states: “[DNA analysis] makes it possible to determine whether the source of origin of one body substance is identical to that of another, and further to establish the biological relationship, if any, between two individuals, living or dead &lt;i&gt;without any doubt&lt;/i&gt;.”   (emphasis added).  It is evident that the policy animating the Bill presupposes the objective infallibility of genetic analysis. This patent mistruth underpins the policy rationale for the Bill, and as such casts a long shadow over its substantive provisions. At the very least, it tells the reader (and perhaps one day the court) to broadly interpret the Bill’s language to favor DNA analysis as the privileged solution to investigational and prosecutorial needs. This provision, and indeed the bill as a whole, ignores the occurrence of false matches, cross-contamination, laboratory error and other limitations of forensic DNA analysis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The introduction goes on to state, truthfully, that “DNA analysis offers sensitive information which, if misused can cause harm to person or society.”  However this statement does not acknowledge that DNA analysis often causes more harm when used as intended as part of  unnecessarily expansive powers given to law enforcement authorities. Indeed this is further illustrated by language showing the legislative intent to draft a broad based bill that would govern the use of DNA in a variety of civil and criminal proceedings as well as for purposes to be determined at a later point.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Definitions (Chapter II)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A number of the Bill’s definitions are overbroad, further expanding the scope of its later provisions. The “crime scene index” is defined to include “DNA profiles from forensic material found . . . on or within the body of any person, on anything, or at any place, associated with the commission of a specified offence.” Chapter II(2)(iv)&lt;i&gt;.&lt;/i&gt; A “specified offence” is defined as any   “offence listed in Part 1of the Schedule [to the Bill].” Part 1 of the “Schedule,” on page 56 of the Bill , includes in (A) “Offences under Indian Penal Code”  without any specification.  In the 2007 version of the bill, the language related to criminal offences was incredibly expansive but specified the various crimes covered inc. rape,“offences relating to dowry,” defamation, and “unnatural offenses.” (See 2007 Bill Schedule p. 34). The current Bill version dispenses with such identified crimes and seemingly expands the Schedule to create an “all crimes” database.  The new Bill (Section B) further adds a variety of additional offences under special laws ranging from the Medical Termination of Pregnancy Act to the Motor Vehicles Act and empowers the Board to add any new law it wants to the Schedule. Section C of the Schedule identifies a wide variety of civil matters to be included in the Schedule including disputes related to paternity, pedigree, and organ transplantation.  In adds additional civil categories not contemplated by prior versions of the Bill including issues related to assisted reproductive technologies, issues related to immigration/emigration and similar to Section B of the Schedule and in another significant departure from previous Bill versions, empowers the Board to include any other civil matter it chooses in the future.  The Crime Scene Index also defines victim expansively to include a person “reasonably suspected of being a victim” (Section 2 ii).  Taken together, the government is empowered to conduct genetic testing on almost anyone in any way connected with even minor infractions of the criminal law or involved in virtually any civil proceeding.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The definition of “offender” (Section 2y) is not limited to one with a criminal conviction but includes anyone even charged with an offense, thereby expanding coverage of the criminal provisions of the Bill to include individuals who have not yet been convicted of any crime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The crucial term “suspect” (Section 2zi) is defined as anyone “suspected of having committed an offence.” &lt;i&gt; &lt;/i&gt; By intentionally leaving out the qualifier “specified,” the drafters’ intent is plain: to sweep within the Bill’s breadth all persons suspected of any crime whatsoever even if there is insufficient probable cause for arrest. And, accordingly, the Bill defines the “suspects index” to include “DNA profiles derived from forensic material lawfully taken from suspects.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore the definitions include a category of persons entitled “volunteers,” (Section 2 zo) defined as “a person who volunteers to undergo a DNA procedure and, in case of a child or incapable person, his parent or guardian having agreed…” There is no additional clarification as to how this category might be treated in practice but without any clear provisions for informed consent, it is highly unlikely that such participation will be truly voluntary; especially without provisions for decision making subsequent to offering the sample such as future expungement from the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Taken together the definitions of victim, offender and suspect expand the reach of this Bill to a broad range of potentially innocent individuals involved in the criminal justice system, while the Schedule and definition of “volunteers” sweep a broad range of categories of innocent citizens into the purview of this Bill- including children and the mentally incapacitated-having nothing to do with the criminal justice system.  There is simply no corollary in any other country to such expansive authority. The Bill places India far outside the mainstream of policy in this area and raises serious and far ranging human rights concerns&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;DNA Profiling Board (Chapter III)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The DNA Profiling Board (hereinafter “Board”) is responsible for administering and overseeing the Indian DNA database &lt;i&gt;.&lt;/i&gt; Oversight is an important and valuable concept, however the value of such principles in this Bill are completely overshadowed by the expansive powers given to the Board.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bill lays out a number of fields from which the members are to be chosen inc. molecular biology, population biology, criminal justice and bioethics.  There is no representation from civil society human rights organizations or the criminal defense bar to ensure that privacy, human rights and the general public interest are ensured.  Furthermore the Chief Executive Office of the Board is to be a scientist and therefore unlikely to be familiar with criminal justice matters and evaluations of their efficacy. (Chapter III, Section 10)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Board is given an almost limitless list of responsibilities including “recommendations for maximizing the use of DNA techniques and technologies (Section 10k) and identifying scientific advances that may assist law enforcement (Section 10L). Such powers are particularly concerning because the Bill does not include any privacy provisions whatsoever but rather  invests in the Board the power to make “recommendations for privacy protection laws, regulations and practices relating to access to, or use of stored DNA samples or DNA analyses,” as well as “mak[ing] specific recommendations to . . . ensure the appropriate use and dissemination of DNA information [and] take any other necessary steps required to be taken to protect privacy.” (Section 10o and p). Furthermore the Board is given the responsibility of “deliberating and advising on all ethical and human rights issues emanating out of DNA profiling.” (Section 10t).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These provisions are in lieu of any substantive language limiting the scope of the legislation, and protecting privacy and human rights principles (which the bill otherwise lacks.) These are significant omissions. As expressed in the introduction, the stated purpose of the Bill is “to enhance protection of people in the society and [the] administration of justice.” Taken alone, this Bill actually expresses only the government’s interest in the legislation, suggesting an ambiguously wide scope for its provisions. Substantive concepts of individual privacy and human rights are required to counterbalance the interests of the government and provide protections for the equally vital privacy and human rights interests of the individual. As such,  limiting privacy and human rights principles should be included alongside the expression of the government’s security interest. Without it, the Board will effectively have &lt;i&gt;carte blanche&lt;/i&gt; with regard to what privacy and human rights protections are—or are not—adopted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also in a departure from previous versions of this Bill, this Bill expands the Boards powers to include areas of policy beyond the coverage of the Bill’s other provisions including “intellectual property issues. (Section 10i)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, as noted earlier in the discussion of the Schedule (and in a significant departure from previous versions of the Bill), the Board is given total control to expand every category of person to be included under the Bill. In a democratic system of government, such decisions should rest exclusively with the Parliament and therefore be subject to the checks and balances of government as well as the transparency necessary to ensure public participation.  Leaving such decision making to an unelected body raises serious human rights concerns.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Approval of Laboratories (Chapter IV)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Sections 13 to 17 provide for the approval by the DNA Profiling Board of DNA laboratories that will process and analyze genetic material for eventual inclusion on the DNA database. Under Section 13, all laboratories must be approved in writing prior to processing or analyzing any genetic material. However, a conflicting provision appears in the next section, Section 14(2), which permits DNA laboratories in existence at the time the legislation is enacted to process or analyze DNA samples immediately, without first obtaining approval.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Either an oversight on the part of the drafters, or the product of overly-vague language, the result is that established genetic laboratories—including whatever genetic material or profiles they may already have for whatever reason—are in effect “grandfathered” into the system. The only review of these laboratories is the &lt;i&gt;post hoc&lt;/i&gt; approval of the laboratory by the DNA profiling board. The potential for abuse and error that this conflict of provisions would be best addressed in keeping with the rule articulated in Section 13, i.e. correcting the language of Section 14(2) that allows for laboratories to be “grandfathered” into the system.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Standards, Obligations of DNA Laboratory (Chapter V)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Chapter V, which concerns the obligations of and the standards to be observed by approved DNA laboratories, lacks adequate administrative requirements. For example, Section 21 requires that labs ensure “adequate security” to minimize contamination without providing for accountability in the event of contamination. Similarly, Section 27 provides for audits of DNA laboratories only, withholding from similar scrutiny of the DNA Profiling Board itself. However, the greatest limitation of every Section of this Chapter is that rather than offering any specific substantive requirements, they instead offer categories requiring attention “as may be specified “ by the DNA Board.  Any actual standard or obligation by a laboratory is set entirely by the DNA Board.  Minimum standards must be set by law to ensure compliance.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Infrastructure and Training (Chapter VI)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Similar to Chapter V, this section offers no legislative benchmarks but rather categories of activities, with further regulation “as may be specified” by the Board.  As noted earlier, there are serious concerns in using DNA analysis with regards to false matches, cross-contamination and laboratory error.  Not taking such concerns seriously, and taking serious steps to minimize their occurrence, can lead to significant distrust of government and police authority when such incidents occur.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;DNA Databank (Chapter VII)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In addition on one national DNA database, the Bill sanctions the several Indian states to maintain their own DNA databases, provided these state-level databases forward copies of their content to the national database. Section 32(3). Section 32(5) states that the indices should include records related thereto” the DNA analysis. (See also Section 35(b)) Such  provisions allow for access to “the information” contained in the database, not simply “the DNA profiles” contained in the database. Without further clarification it would appear to authorize an unlimited amount of private information unrelated to identification to be included in the indices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The national database is envisioned to comprise several sub-databases (Section 32(4)), each to contain the genetic information of a subset of persons/samples, namely: (a) unidentified crime scene samples, (b) samples taken from suspects, (c) samples taken from offenders inc. persons convicted or currently subject to prosecution for criminal offenses   (d) samples associated with missing persons, (e) samples taken from unidentified bodies, (f) samples taken from “volunteers,” and finally (g) samples taken for reasons “as may be specified by regulations made by the Board. Section 33 (4) &lt;i&gt;et seq.&lt;/i&gt; Putting to one side the breadth of persons subject to inclusion under subcategories (1) through (6), subsection (7) appears on its face to be a “catch all” provision, leaving one only to guess at the circumstances under which its specificities may be promulgated. &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A close reading of Section 32(6) strongly suggests that the agency conducting the forensic analyses and populating the DNA database shall retain the actual DNA samples thereafter. This section reads in relevant part:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The “DNA Data Bank shall contain . . . the following information, namely: (a) in case of a profile in the offenders index, the identity of the person from whose body substance or body substances the profile was derived, and (b) in case of all other profiles, the case reference number of the investigation associated with the body substance or body substances from which the profile was derived.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Allowing retention of the biological sample, even after a profile has been created from it, in conjunction with the unlimited ability of the Board to create regulations for additional uses of that sample raises serious privacy and human rights concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, rather than choosing to link the DNA profile data to a specific offender or case, the drafters of the Bill instead link the “body substance or body substances” with that specific offender or case. Whether sloppy drafting or clever nuance, this provision equates the DNA &lt;i&gt;profile&lt;/i&gt; with the DNA &lt;i&gt;sample&lt;/i&gt;, injecting unneeded—and potentially harmful—ambiguity into the proposed law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 37 (1) allows for indefinite retention of information in the offenders index (which includes individuals charged with an offense but not convicted).  This provision raises serious human rights concerns as it would appear to allow indefinite retention of profiles of individuals who have not been convicted of a crime.  This directly conflicts with Section 37 (II) which  allows for expungement when a certified copy of a court order stating that the individual in question has been acquitted.  This provision also appears to conflict with Chapter VIII Section 43(b) which appears to allow indefinite retention of DNA of suspects even after they’ve been excluded from an investigation. Indeed no process or procedures for expungement and removal of records are in place for suspects generally who are never charged or for any of the other categories of indices that are present in the Bill, thereby raising serious question as to how and even whether such profiles can be removed from the Databank.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Confidentiality, Access to DNA Profiles, Samples, and Records (Chapter VIII)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Two further provisions regarding access to the database warrant close scrutiny. First, Sections 39 and 40 confers upon the Board the unlimited power to expand categories for which DNA profiles, samples and records can be used. Considering that the Bill (Section 40(e)) already questionably allows such records to be used for population research, these provisions raise serious questions as to the classes of potential use such private information might be subject.&lt;br /&gt;Sections 40-42  purport to confer upon the police and other authorized individuals direct access to all of the information contained in the national DNA database. While administratively expedient, this arrangement opens up the possibility for misuse. A more prudent system would place the Board (or some administrative subordinate portion thereof) between the police and the content of the DNA database, with the latter having to make specific and particular requests to the former. This would minimize the risks inherent in the more expansive model of database access the bill currently envisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 45 related to post-conviction DNA testing has the laudable goal of offering “any individual undergoing a sentence of imprisonment or death pursuant to conviction for an offence, may apply to the court which convicted him for an order of DNA testing” in order to prove their innocence.   However such an application lists eleven separate criteria that such an applicant must meet before qualifying, and allows a court total discretion in deciding whether all such criteria have been met.  High barriers and absolute discretion make such testing highly unlikely and therefore make a provision seeming to offer human rights protections completely hollow.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Offences and Penalties (Chapter X)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This chapter lays out penalties for misuse of the Database. Most notably, the bill specifically excludes a private cause of action for the unlawful collection of DNA, or for the unlawful storage of private information on the national DNA database. A new provision in Section 58 does allow for an aggrieved person to petition the Central Government or Board if an instance of misuse is not being addressed but such provision does not contain any required processes such entities must follow in responding to such a petition, making an otherwise positive new provision relatively empty.  Nor does the bill grant an individual right to review one’s personal data contained on the database. Without these key features, there are limited checks against the unlawful collection, analysis, and storage of private genetic information on the database.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Best Practices Analysis&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;Collection of DNA&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;With consent: only for a specific investigation (e.g. from a victim or for elimination purposes). Volunteers should not have information entered on a database. &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Without consent: only from persons suspected of a crime for which DNA evidence is directly relevant i.e. a crime scene sample exists or is likely to exist. Or, broader categories?&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Requirement for an order by a court? Or allowed in other circumstances?&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Samples collected by police officers, or only medical professionals? Must take place in a secure location i.e. not on the street, etc.&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Provision of information for all persons from whom DNA is taken.&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Crime scenes should be promptly examined if DNA evidence is likely to be relevant, and quality assurance procedures must protect against contamination of evidence.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Analysis of DNA&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Should take place only in laboratories with quality assurance.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Regulated at discretion of DNA Profiling Board.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Laboratories should be independent of police.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Profiling standards must be sufficient to minimize false matches occurring by chance. This must take account of increased likelihood of false matches in transboundary searches, and with relatives.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Storage of DNA and Linked Data&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Data from convicted persons should be separate from others e.g. missing persons’ databases. &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Unclear.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Access to databases and samples must be restricted and there must be an independent and transparent system of governance, with regular information published e.g. annual reports, minutes of oversight meetings.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Access to database at discretion of DNA Data Bank Manager.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Personal identification information should not be sent with samples to laboratories.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Any transfer of data e.g. from police station to lab or database, must be secure.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Uses of Samples and Data&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Research uses should be restricted to anonymised verification of database performance (e.g. checking false matches etc.). Third party access to data for such purposes should be allowed, provided public information on research projects is published. There should be an ethics board. &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Research uses for other purposes e.g. health research, behavioral research should not be allowed.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Uses should be restricted by law to solving crimes or identifying dead bodies/body parts. Identification of a person is not an acceptable use. Missing persons databases (if they exist) should be separate from police databases. &lt;br /&gt;.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Ambiguous provisions suggest much wider scope.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Any transfer of data e.g. from police station to lab or database, must be secure.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Destruction of DNA and Linked Data&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;DNA samples should be destroyed once the DNA profiles needed for identification purposes have been obtained from them, allowing for sufficient time for quality assurance, e.g. six months. &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;DNA samples are retained.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;An automatic removals process is required for deletion of data from innocent persons. This must take place within a reasonable time of acquittal, etc.&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;There should be limits on retention of DNA profiles from persons convicted of minor crimes. &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;There should be an appeals process against retention of data.&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Linked data on other databases (e.g. police record of arrest, fingerprints) should be deleted at the same time as DNA database records.&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Crime scene DNA evidence should be retained for as long as a reinvestigation might be needed (including to address miscarriages of justice).&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;DNA evidence permitted to be retained indefinitely. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Use in court&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Individuals must have a right to have a second sample taken from them and reanalyzed as a check. &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Individuals must have a right to obtain re-analysis of crime scene forensic evidence in the event of appeal.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Allowed but with impossibly high barriers.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Expert evidence and statistics must not misrepresent the role and value of the DNA evidence in relation to the crime. &lt;br /&gt;.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Other&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Relevant safeguards must be proscribed by law and there should be appropriate penalties for abuse.  &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Impacts on children and other vulnerable persons (e.g. mentally ill) must be considered. &lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Potential for racial bias must be minimized.&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.councilforresponsiblegenetics.org/"&gt;Click&lt;/a&gt; for more information on the Council for Responsible Genetics.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-analysis'&gt;https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-analysis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Jeremy Gruber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-03-19T09:53:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/today-september-24-2015-huge-outcry-forces-india-backtrack-social-media-data-proposal">
    <title>Huge outcry forces India to backtrack on social media data proposal</title>
    <link>https://cis-india.org/internet-governance/news/today-september-24-2015-huge-outcry-forces-india-backtrack-social-media-data-proposal</link>
    <description>
        &lt;b&gt;Govt retracts move after strongly negative reaction to 90-day message-saving policy&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published by &lt;a class="external-link" href="http://www.todayonline.com/chinaindia/india/huge-outcry-forces-india-backtrack-social-media-data-proposal?singlepage=true"&gt;Today&lt;/a&gt; on September 24, 2015. Pranesh Prakash has been quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Responding to a chorus of withering criticism, Indian officials have  withdrawn a draft policy on encryption that would have required users of  social media and messaging apps to save plain-text versions of their  messages for 90 days so they could be shared with the police.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  proposal, which many condemned as both draconian and impractical, came  as an embarrassment days before Prime Minister Narendra Modi travels to  Silicon Valley to try to attract investment and promote India as an  emerging market for digital technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr Modi is an avid user of social media and has mobilised large networks of online activists during his party’s campaigns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  government issued a statement on Tuesday saying the draft proposing  that users save messages for three months had been withdrawn, as  officials hurried to distance themselves from the idea.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I wish to  make it clear that it is just a draft and not the view of the  government,” said Mr Ravi Shankar Prasad, the Minister of Communications  and Information Technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet policy activists discovered  the draft on a government website late last week and began to lampoon it  online as “absurd”. One offered the example of an iPhone, which  automatically encrypts messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“They can’t intentionally want  people to copy and paste every message a person gets on their iPhone on  to another device,” said Mr Pranesh Prakash, a policy director at the  Center for Internet and Society in Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft, which was  put forward by a committee of unidentified experts in the Department of  Electronics and Information Technology, also overlooked the fact that  most Indians use mobile phones with very little storage space, said Mr  Nikhil Pahwa, the editor of MediaNama.com, which covers digital media  issues in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is incomprehensible how they would have  expected users to keep their messages in plain-text format,” he said.  “And I don’t think that anyone can argue that keeping data in a  plain-text format makes it secure.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An official in the  Communications Ministry, who spoke on the condition of anonymity because  he was not authorised to talk to the media, said the expert committee  had been convened to formulate a policy on the “phenomenal rise” in  encrypted communication over the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He said the committee  had intended to require social media platforms and messaging apps, such  as WhatsApp and Viber, to save plain-text versions of messages and did  not intend to impose that burden on individual users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It was interpreted by the netizens as ‘you and I’,” the official said. He added that interpretation was misleading.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But  that version of the requirement would also be “outrageous,” Mr Prakash  said. For example, WhatsApp uses “end-to-end” encryption and does not  save communications between users or have access to plain text, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr  Prakash said that as officials revised the proposal, the government  should reach out to “experts in cryptography and human rights”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This  is a very crucial combination of three rights: the right to security,  the right to freedom of expression, and the right to privacy,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On  television, spokesmen for Mr Modi’s Bharatiya Janata Party (BJP) found  themselves debating their counterparts from the opposition Indian  National Congress Party, one of whom remarked that “tomorrow they will  start demanding that you videograph what has been going on in your  bedroom for the past 90 days.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The BJP’s national spokeswoman,  Shaina Nana Chudasama, responded with some exasperation. “I don’t know  why we have to have this hue and cry,” she said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Our Prime  Minister believes in absolute freedom on social media. There is no  question of our trying to come down heavily on the freedom of the public  at large.” THE NEW YORK TIMES&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/today-september-24-2015-huge-outcry-forces-india-backtrack-social-media-data-proposal'&gt;https://cis-india.org/internet-governance/news/today-september-24-2015-huge-outcry-forces-india-backtrack-social-media-data-proposal&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-01T01:31:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/how-workstream-2-plans-to-improve-icanns-transparency">
    <title>How Workstream 2 Plans to Improve ICANN's Transparency</title>
    <link>https://cis-india.org/internet-governance/blog/how-workstream-2-plans-to-improve-icanns-transparency</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has worked extensively on ICANN’s transparency policies. We are perhaps the single largest users of the Documentary Information Disclosure Policy. Our goal in doing so is not to be a thorn in ICANN’s side, but to try and ensure that ICANN, the organisation, as well as the ICANN community have access to the data required to carry out the task of regulating the global domain name system.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The transparency subgroup of ICANN’s Workstream 2 dialogue attempts to see how they could effectively improve the transparency and accountability of the organization. The main document under scrutiny at the moment is the draft Transparency Report published a few days before the 57th ICANN meeting in Hyderabad.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The report begins with an acknowledgement of the value of taking tips from the Right to Information policies of other institutions and governments. My colleague Padmini Baruah had earlier written a blog post comparing the exclusion policy of ICANN’s DIDP and the Indian Government’s RTI where she found that “the net cast by the DIDP exclusions policy is more vast than even than that of a democratic state’s transparency law.”&lt;a href="#ftn1"&gt;[1] &lt;/a&gt;The WS2 report not only discusses the DIDP process, but also discusses ICANN’s proactive disclosures (with regard to lobbying etc) and whistleblower policies. This article focuses solely on the first.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As our earlier blog posts have mentioned, CIS sent in 28 DIDP requests over the last two years.&amp;nbsp; Our experience with DIDP has been less than satisfactory and we are pleased that DIDP reform was an important part of the discussions of this subgroup. The report proposes some concrete structural changes to the DIDP process but skirts around some of the more controversial ones.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The recommendation to make the process of submitting requests clearer is a good one. There are currently no instructions on the follow-up process or what ICANN requires of the requestors. The report also recommends capping any extension to the original 30-day limit to an additional 30 days. While this is good, we further recommend that ICANN stay in touch with the requestor in order to help them to the best of its ability. The correspondence should ideally not be limited to a notification that they require an extension. Any clarifications on the part of the requestor must be resolved by ICANN. We commend the report for pointing out that the status quo – where there is no outside limit for extension of time beyond the mandated 30 days – is problematic as it allows the ICANN staff to give lesser priority to responding to DIDP requests. We strongly suggest that extensions of time on responding to DIDP requests be restricted to a maximum of 7 days after the passing of the 30-day period, after which liability should be strictly imposed on ICANN in the form of an individual fine, analogous to India’s RTI policy.&lt;a href="#ftn2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;One of the major areas of focus for this report and for our earlier analysis was the problematic nature of the exclusions to the DIDP. I had written that the conditions were "numerous, vaguely worded and contain among them a broad range of information that should legitimately be in the public domain.”&lt;a href="#ftn3"&gt;[3] &lt;/a&gt;This is echoed by the report which calls for a deletion of two clauses that we found most used in denying our requests for information.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The report also calls into question the subjective nature of the last condition which states that ICANN can deny information if they find requests “not reasonable, excessive or overly burdensome, not feasible, abusive or vexatious or made by a vexatious or querulous individual.” As seen from our blog posts, we are of the firm belief that such a subjective condition has no place in a robust information disclosure policy. Requiring the Ombudsman’s consent to invoke it is a good first step. In addition to that, we strongly encourage that objective guidelines which specify when a requestor is considered “vexatious” be drawn up and made public.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The most disappointing aspect of this report is that it does not delve into details about having an independent party dedicated to reviewing the DIDP process to address grievances. We believe that this must not be left to the Ombudsman who cannot devote all their time to this process. We are of the opinion that an independent party would also be able to more effectively oversee the tracking and periodic review of the DIDP mechanism.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In conclusion, we believe that this report is a good start but does not comprehensively answer all of our issues with the DIDP process as it is. We look forward to more engagement with the Transparency subgroup to close all loopholes within the DIDP process.&lt;/p&gt;
&lt;hr style="text-align: justify;" /&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="ftn1"&gt;[1] &lt;/a&gt;Padmini Baruah, &lt;em&gt;Peering behind the veil of ICANN’s DIDP&lt;/em&gt;, (September 21, 2015), &lt;em&gt;available at&lt;/em&gt; &lt;a href="http://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp"&gt;http://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp&lt;/a&gt; (Last visited on November 9, 2016).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="ftn2"&gt;[2] &lt;/a&gt;Section 20(1), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="ftn3"&gt;[3] &lt;/a&gt;Asvatha Babu, If the DIDP Did Its Job, (November 3, 2016), &lt;em&gt;available at&lt;/em&gt; &lt;a href="http://cis-india.org/internet-governance/blog/if-the-didp-did-its-job"&gt;http://cis-india.org/internet-governance/blog/if-the-didp-did-its-job&lt;/a&gt; (Last Visited on November 9, 2016).&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/how-workstream-2-plans-to-improve-icanns-transparency'&gt;https://cis-india.org/internet-governance/blog/how-workstream-2-plans-to-improve-icanns-transparency&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Asvatha Babu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-11-11T10:05:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/web2.0-responds-to-hazare">
    <title>How Web 2.0 responded to Hazare </title>
    <link>https://cis-india.org/news/web2.0-responds-to-hazare</link>
    <description>
        &lt;b&gt;Social media often fails to give us time to form critical opinions. ‘It mirrored the spectacle that we were being fed by TV channels', says Nishant Shah in an interview with Deepa Kurup. This news was published in the Hindu on April 11, 2011.&lt;/b&gt;
        
&lt;p style="text-align: center;"&gt;&lt;img src="https://cis-india.org/home-images/annahazare.jpg/image_preview" alt="Anna Hazare" class="image-inline image-inline" title="Anna Hazare" /&gt;&lt;/p&gt;
&lt;p&gt;By Day Two of the protests at Jantar Mantar, where social activist Anna Hazare was leading a fast-unto-death against corruption, most commentators were drawing fierce parallels with Tahrir Square, and other pro-democracy revolutions in the Middle-East.&lt;/p&gt;
&lt;p&gt;Soon enough, the social media angle raised its head. After a quiet Tuesday, when television channels began to “play up” the protests, Wednesday morning saw social media platforms abuzz with chatter. Initiated by campaign organisers, the India Against Corruption team, Facebook profile badges, missed call campaigns and petitions (most notably on online campaign site Avaaz (where over 6.17 lakh have registered support) entered the scene.&lt;/p&gt;
&lt;p&gt;In 140 characters, #janlokpal, #annahazare and the less gracious #meranetachorhain began to trend on Twitter. YouTube shows up around 2,000 video results, a lot of which are amateur videos shot by participants.&lt;/p&gt;
&lt;p&gt;‘Causes' application requests for “brandishing corruption”, ‘Like'-this-revolution requests and Tweets on how you can indeed weed out the corruption demon with a Re-Tweet, were abound.&lt;/p&gt;
&lt;p&gt;But did this social media buzz translate into more people on the ground? Did the Tweets and chain e-mails, that were doing the rounds fairly early on, manage to drive public opinion, or outrage, as in this case? On this, the jury is divided.&lt;/p&gt;
&lt;h3&gt;Crunching numbers&lt;/h3&gt;
&lt;p&gt;Even in the Middle-East, where we saw dictators plug social media channels, experts have downplayed the pivotal role attributed to social media. A tool for sharing information, its standalone role in triggering a revolution has been dismissed by many.&lt;/p&gt;
&lt;p&gt;In the current context, this is even more difficult to establish because efforts appear to be all too scattered, unlike in Egypt where the ‘We are all Khaled Said' page by Wael Ghonim, appeared to be a focal point of sorts.&lt;/p&gt;
&lt;p&gt;In comparison, a simple search on Facebook reveals over 20 pages that all have around 25,000-30,000 users on-board. Mr. Hazare's Facebook profile page has over 1.3 lakh ‘Likes'.&lt;/p&gt;
&lt;p&gt;Gaurav Mishra, social media analyst, pegs the total support at around 15 lakh. Drawing parallels with the citizen activism campaigns that emerged between the terrorist attacks in Mumbai in 2008 and the Lok Sabha elections of 2009 (the former being when social media arrived in India), Mr. Mishra also points out that corruption did go for a Six on Friday (the final day) with IPL4 dominating conversation online.&lt;/p&gt;
&lt;p&gt;Nishant Shah, director (research) at the Centre for Internet and Society, points out that while during revolutions, the social media has proved to be a poignant and powerful tool to mobilise resources, last week it emerged that it can not only propagate dubious opinions, but also it often (because it relies on the temporal quality of making things viral) fails to give us time to form critical opinions.&lt;/p&gt;
&lt;p&gt;He compares a platform like Avaaz, that mobilised people ‘against corruption', with long-term Ipaidabribe project (using the same digital tools) which actually leads to debate around why corruption is so endemic.&lt;/p&gt;
&lt;h3&gt;Mirrors TV&lt;/h3&gt;
&lt;p&gt;Interestingly, as Mr. Shah points out, the social media mirrored the spectacle that people were being fed by TV channels, instead of being a true discursive space of public dialogue. It's now getting clear that they are actually playing out an interesting traction as they supplement each other in bolstering of evidence and participation, he adds.&lt;/p&gt;
&lt;p&gt;On the other hand, blogs too were abuzz. However, many did seek to provide deeper perspective, and provided more space for debate and dissent. In fact, progressive blogs even attempted to counter the one-sided commentary provided on traditional visual media.&lt;/p&gt;
&lt;p&gt;Click here for the story in the &lt;a class="external-link" href="http://www.hindu.com/2011/04/11/stories/2011041155420700.htm"&gt;Hindu&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/web2.0-responds-to-hazare'&gt;https://cis-india.org/news/web2.0-responds-to-hazare&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-11T10:38:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/outlook-india-october-12-2015-arindam-mukherjee-how-to-win-friends-fb-style">
    <title>How To Win Friends, FB Style </title>
    <link>https://cis-india.org/internet-governance/news/outlook-india-october-12-2015-arindam-mukherjee-how-to-win-friends-fb-style</link>
    <description>
        &lt;b&gt;True to form—and Facebook—there was a warm, friendly and familial feel to Prime Minister Narendra Modi’s townhall meeting at Melon, California, with Mark Zuckerberg on September 27. Modi got emotional (yet again) while talking about his mother. Zuckerberg, the youngish founder of the world’s largest social networking site, got his parents to meet and pose with Modi. &lt;/b&gt;
        &lt;p&gt;The article by Arindam Mukherjee was published in &lt;a class="external-link" href="http://www.outlookindia.com/article/how-to-win-friends-fb-style/295492"&gt;Outlook&lt;/a&gt; on October 12, 2015. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“The most amazing moment was when I talked about our families,” Zuckerberg wrote in a post, “and he (Modi) shared stories of his childhood....” That’s just the kind of stuff we would see and post on Facebook—the benign visage of a profitable, all-pervasive US-based corporation. (Needless to say, everyone who has worked on this story is a registered user).&lt;br /&gt;&lt;br /&gt;Of course, we know Modi too is on Facebook. No other Indian politician has so effectively utilised the power of ‘likes’: and he has got 30 million. The problem with this chummy approach is that one could almost forget that the PM is also the supreme leader of a country that is Facebook’s second-largest market in the world with 125 million users. A few days earlier, Zuc­kerberg flew to Seattle to meet Chinese President Xi Jinping. Facebook is not present in China. “On a personal note, this was the first time I’ve ever spoken with a world leader entirely in a foreign language,” wrote Zuckerberg in another post.&lt;br /&gt;&lt;br /&gt;In contrast, Modi and Zuckerberg were speaking the same language. In fact, they even jointly updated their profile picture on Facebook—wrapped in the shades of the Indian tricolour—to support the Modi government’s Digital India initiative. Millions of Indians followed suit. And that’s when the shit hit the internet—it was discovered that people supporting the Digital India campaign were also putting in a ‘yes’ vote for Facebook’s contentious initiative internet.org (free but restricted net access; see accompanying faqs for all the details). Immediately, Modi became a party to the raging debate in India over net neutrality. This is unfortunate as the Modi government is yet to put on paper its stand on net neutrality. The nervous reaction to this engagement is also a function of the new truism of our times—“with this government, you never know”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Modi2.png" alt="Modi" class="image-inline" title="Modi" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What we do know is that the internet.org class name was built into the code for support for Digital India. Many experts feel this is not a coincidence; rather a clever ploy by Facebook to get the support of Indians and promote its internet.org initiative. This upset a vocal community of activists who see internet.org on the opposite camp. This led to the charge that Facebook was trying to influence the debate. Says Sunil Abraham, executive director with the Bangalore-based Centre for Internet and Society (CIS), “The moves by Facebook are quite juvenile as it is trying to use the Modi visit to further muddy the net neutrality debate. We should be concerned about Facebook trying to damage the debate in India to spin the PM’s participation in its own favour.” Of course, there are two sides to this debate. There are many people within the government who feel net neutrality is an elitist concern—increasing internet penetration, which Facebook and other such initiatives promise, is the way forward in a poor, unconnected country like India. “Today to talk about net neutrality is to talk about the 20 per cent who have access to the internet,” says telecom expert Mahesh Uppal. “It is unreasonable to dismiss out of hand anybody who offers free service to a subset of websites or services. Eventually, access to internet must come first before we talk about net neutrality.”&lt;br /&gt;&lt;br /&gt;Facebook promoted internet.org along with Samsung, Nokia, Qualcomm, Ericsson, MediaTek and Opera Software, the aim being to provide free internet service to developing nations. India, obviously, is a hot target for Facebook. Facebook has a partnership with Reliance in the country; the free internet service will be available only to Reliance users and the free access will be limited to Facebook’s partner sites. The debate over internet.org too has picked up steam in India—big media companies like NDTV and Times of India have pulled out of it on these issues. While Facebook has stressed that internet.org will ensure that the internet reaches people who do not have access to it, there have been concerns that it will restrict internet access only to sites that are internet.org’s partners.&lt;br /&gt;&lt;br /&gt;On its part, Facebook has been quick to refute the charge. A spokesperson in the US said, “There is absolutely no connection between updating your profile picture for Digital India and internet.org. An engineer mistakenly used the words ‘internet.org profile picture’ as a shorthand name he chose for part of the code.” The code was changed soon after. Despite repeated requests, representatives from Facebook India were unavailable for comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Zuckerberg.png" alt="Zuckerberg" class="image-inline" title="Zuckerberg" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the damage has been done. Many now openly question Facebook’s motives in India and whether they have been truthful or not. Given all this brouhaha, questions will naturally be raised about Modi’s alignment with Facebook. Digital India is many things—but obviously increasing net penetration is one its goals. “Now whatever he does on net neutrality, it will be seen in terms of whether it will benefit Google or Facebook. That is the risk he took. I would like to know why the diplomatic advisors took the risk of putting the PM in a bargaining position instead of a bonus at the end of a deal,” says Prof Narendar Pani, who teaches at the National Institute of Advanced Studies, Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All this matters because the Modi government positions itself as digital-friendly, even though its moves on this front have been invasive (the push for Aadhar despite a legal sanction and increasing reports of monitoring digital conversations), and contradictory (the abortive porn and WhatsApp bans, among others). “The PM is going way beyond the e-governance plan to a stage where the government will just sit and watch people speaking. It is scary,” says internet activist Usha Ramanathan. She feels it doesn’t make sense to have companies like Google sharing ideas with the government while Indian people are being kept out of the loop. “And now Facebook will be joining that gang, it doesn’t make sense. What has Facebook done to get that privilege?” she asks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here again there is a carefully worded counter-argument. Former telecom entrepreneur and Rajya Sabha MP Rajeev Chandrashekhar says, “Net neutrality is a definition that would be made in the public domain. It will not be influenced by the PM’s engagement with Facebook and Mark Zuckerberg. Anyone who tries to mess with the definition of net neutrality will be met with a public outcry and judicial intervention.” The substance of this view is that Modi was within his rights to speak to corporations to further Digital India, or Make in India for that matter, and that there should be an open debate on the future direction of net neutrality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/copy5_of_Sunil.png" alt="Sunil" class="image-inline" title="Sunil" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clearly, the political knives are out. “Either the prime minister is not being briefed properly or he does not read his brief properly,” says former UPA minister Manish Tewari. Arguing that governments should be discussing rules of engagement in cyberspace, and not stakeholders, he asks, “Is India comfortable with that construct especially when the bulk of the technology companies, the root servers which form the underlying hardware of the internet, are all based in the US, and one being in Europe?”&lt;br /&gt;&lt;br /&gt;Although the government is yet to firm up its decision on net neutrality and a policy on it is yet to be announced, the debate has already acquired political colour in India, with the Congress and Aam Aadmi Party putting their weight behind the people’s voice. This is the first time that there has been a nation-wide upsurge of such an unprecedented size and magnitude on an internet policy. Says AAP’s Adarsh Shastri, “Facebook, Google etc are just tools. People can use them at will. To make them the mainstay of your programme for digital empowerment is to step on the civil rights and liberties of citizens. Doing this is a complete no-no. Let people access internet as they want is the way to go.”&lt;br /&gt;&lt;br /&gt;A consultation paper floated by telecom regulator Telecom Regulatory Authority of India (TRAI) got almost 15 lakh responses from the Indian public in support of net neutrality. There was also strong opposition to zero rating platforms announced by telecom companies like Airtel which sought to provide free access to some websites on their platform in much the same way that internet.org proposes. And the reactions to the Facebook coding error are a pointer to what people in India think. Says Nikhil Pahwa, editor of Medianama and a leading net neutrality activist, “The reactions of the people to the Facebook event were heartening and showed that people are emotive and there is still mass support for net neutrality. The reaction to the TRAI paper was not a flash in the pan.”&lt;br /&gt;&lt;br /&gt;Interestingly, a couple of months ago, a department of telecommunications committee had said that internet.org was a violation of net neutrality and should not be allowed. It will be difficult for Modi and the government to overrule that and give it full and free access in India. Internet experts feel that the engagement with India and Modi was a desperate move by Facebook to get numbers from India. Says internet expert Mahesh Murthy, “Facebook is pulling out all stops to get favour for internet.org and is desperate about it. If India says yes, many others will say yes, but if India says no, other countries will follow.”&lt;br /&gt;&lt;br /&gt;Murthy says Facebook’s real problem is that it is finding it difficult to justify its price to earnings ratio as against its user numbers vis-a-vis Google which is much better in this respect. For this, it is desperately trying to get numbers, and with China banning Facebook, the only country left to get numbers is India. The massive electronic and print campaign at the cost of Rs 40-50 crore is a pointer towards this. He says everything about internet.org is about hooking Indians to it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No wonder, Facebook has been cultivating Indian media. The Modi visit has also been tarnished by the news that Facebook paid for the travel and accommodation of journalists from three Indian newspapers and one magazine to go and cover the Facebook-Modi meeting and get favourable coverage. Says writer-activist Arundhati Roy, “Many journalists covering the event for the Indian media were flown in from India by Facebook. So were some who asked pre-assigned questions at the event. I don’t know who sponsored the crocodile tears and the clothes.” It is also quite strange that the entire display picture and source code controversy got almost no play in the national media which chose instead to talk about Modi’s speech and his tears.&lt;br /&gt;&lt;br /&gt;All said and done, it is obvious that Facebook may be seeing India as an easy and vulnerable target which can be manipulated for its own advantage. Says Parminder Jeet Singh, executive director with IT for Change, an NGO working on information society, “India has low internet penetration and lots of people want to get on to the internet. There is low purchasing power but lots of aspiration. So the moment a free service is offered, a whole lot of people are likely to jump on it.” And that is something Facebook may be looking and aiming at.&lt;br /&gt;&lt;br /&gt;Currently, three processes are on that will determine how India will look at net neutrality—one at the DoT, one at TRAI and a third one at a parliamentary standing committee. But given the massive people’s response net neutrality has got vis-a-vis TRAI’s paper and also during the present Facebook issue, the outcome is predictable. Or so it seems. There’s a lot of money power at stake. For now, millions of internet Indians have already voted with that dislike button. And then, governments move in mysterious ways.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/outlook-india-october-12-2015-arindam-mukherjee-how-to-win-friends-fb-style'&gt;https://cis-india.org/internet-governance/news/outlook-india-october-12-2015-arindam-mukherjee-how-to-win-friends-fb-style&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-18T12:02:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/india-blogs-nytimes-november-20-2012-how-to-steer-clear-of-indias-strict-internet-laws">
    <title>How to Steer Clear of India’s Strict Internet Laws</title>
    <link>https://cis-india.org/news/india-blogs-nytimes-november-20-2012-how-to-steer-clear-of-indias-strict-internet-laws</link>
    <description>
        &lt;b&gt;The arrest of two women in Mumbai for a Facebook post is the latest heavy-handed move by India’s government to curb what Indian citizens say on the Internet.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Sangeeta Rajesh and Heather Timmons was published in the New York Times on November 20, 2012. Sunil Abraham and Pranesh Prakash are quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;The two women &lt;a href="http://india.blogs.nytimes.com/2012/11/19/women-arrested-in-mumbai-for-complaining-on-facebook/#postComment"&gt;were&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2012/11/19/women-arrested-in-mumbai-for-complaining-on-facebook/#postComment"&gt; arrested&lt;/a&gt; Sunday under a section of the &lt;a href="http://eci.nic.in/archive/manuals/part2/acts_1d.htm"&gt;Indian Penal Code&lt;/a&gt; that outlaws spreading “statements creating or promoting enmity, hatred or ill- will between classes” after one complained about the citywide strike sparked by the death of the Shiv Sena leader Bal Thackeray and the second woman “liked” her statement. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the incident was just the latest in a string of recent arrests,  detentions and account suspensions in India over online comments. If you  live in India and have an opinion someone might not like, but you don’t  want to become a target of the law, there’s one easy rule you need to  follow, experts say: stay off social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Right now, “there’s nothing one can do but to close up your social media  accounts” and stop voicing your opinion on the Internet entirely, if  you want to guarantee you won’t be arrested in India, said Sunil  Abraham, executive director at the Center for Internet and Society in  Bangalore. (To be sure, that’s not what most free speech advocates  recommend that you do. India Ink will soon have more on a social media  activist who is fighting India’s strict Internet controls.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Abraham advises extreme caution because India’s free speech rules  have been historically weak (read more about India’s long history of  censorship &lt;a href="http://india.blogs.nytimes.com/2011/12/08/newswallah-censorship/"&gt;here&lt;/a&gt;), a relatively new Internet law is extremely broadly defined and police and &lt;a href="http://ibnlive.in.com/news/may-review-it-act-to-prevent-misuse-kapil-sibal-on-girls-arrest/306432-3-244.html"&gt;lawmakers themselves&lt;/a&gt; are sometimes confused about what the actual rules themselves say.&lt;/p&gt;
&lt;p style="text-align: center; "&gt;&lt;img alt="A screenshot of Ravi Srinivasan's twitter page. Mr. Srinivasan was arrested for a tweet he posted." height="268" id="100000001894388" src="http://graphics8.nytimes.com/images/2012/11/09/world/asia/9-Twitter-arrest-IndiaInk/9-Twitter-arrest-IndiaInk-blog480.jpg" width="480" /&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;A screenshot of Ravi Srinivasan’s twitter page. Mr. Srinivasan was arrested for a tweet he posted.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Late last month, Ravi Srinivasan, a Puducherry businessman and an India  Against Corruption volunteer, was arrested for his Twitter post  that  alleged Karti Chidambaram, the son of Finance Minister P. Chidambaram,  had amassed a large amount of wealth. Mr. Srinivasan was arrested Oct.  30 but was later released on bail.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier in October, an associate professor of the National Institute for  Fashion Technology in Chennai was arrested after what the Tamil Nadu  singer Chinmayi said was a &lt;a href="http://www.chinmayisripada.com/2012/10/facing-abuse-and-backlash-of-rumours.html"&gt;long period of harassment on the Internet&lt;/a&gt;, including negative Twitter messages. In August, the Indian government demanded Internet service providers &lt;a href="http://india.blogs.nytimes.com/2012/08/23/indian-government-casts-a-wide-puzzling-net-over-internet/"&gt;suspend hundreds of Web pages&lt;/a&gt; to curb ethnic tension and asked Twitter to &lt;a href="http://india.blogs.nytimes.com/2012/08/24/outrage-in-india-over-twitter-crackdown-on-twitter-at-least/"&gt;suspend accounts&lt;/a&gt; parodying government officials. Last year, the central government asked social media companies to &lt;a href="http://india.blogs.nytimes.com/2011/12/05/india-asks-google-facebook-others-to-screen-user-content/"&gt;prescreen content&lt;/a&gt; about India for objectionable remarks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The key culprits here are revisions to  India’s Information Technology Act made in 2008 and 2011, experts say,  that leave nearly everything that is transmitted via the Internet open  to interpretation by nearly everyone who reads it on the Internet.  Things that are considered “annoying” and “offensive” can, under the  law, land their sender in jail for up to three years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While some of India’s nearly 50  million Facebook users and millions of Twitter users are up in arms  about the recent arrests in Mumbai and are sharing the woman’s original  post, under the theory that the police can’t arrest everyone,  conservative advocates don’t recommend that sort of action on the  Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;V. Vijaya Baskar, an advocate with  Madras High Court practicing civil, criminal and family law for over 10  years, said that there are basic guidelines of free speech behavior that  should be followed, even by Internet users. The most important, he  said, is to avoid the use of obscene language and pictures, which are  considered a direct threat. He also advised against getting into  confrontations with people you don’t know or recognize on social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If you have a true and verifiable  source or documented evidence, then making a public statement is not  defamation, but making passing comments of any person, particularly  people in public life, will amount to defaming the person and is  punishable,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While India’s government and law  officials sometimes come across as not very tech-savvy, Pranesh Prakash,  policy director at the Center for Internet and Society, said that  lawmakers in many countries with a much higher Internet penetration are  just as challenged by the Internet. And in India, while the laws are  strict, people seldom land in jail for Internet-related offenses, he  said.&lt;/p&gt;
&lt;p&gt;“The detention law in India, sensibly, defaults to ‘bail, not jail,’ ” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Prakash said he could not offer  any global guidelines to avoid being arrested, and concluded that “each  forum has its own rules of etiquette, which cannot be codified or  enforced by legislation.” Online speech can be disagreed upon and  opinions should be made known, since it is only the “natural tendency  for people with extreme views to be more vocal online.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Not surprisingly, the authorities in  India who have been involved in arrests insist they are just doing their  job, and doing it well. The Tamil Nadu police, for example, said they  acted appropriately in Mr. Srinivasan’s arrest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;R. S. Krishna, inspector general for  law and order, told the media that the Puducherry police could not be  faulted for filing a First Investigation Report, the precursor to filing  charges, against Mr. Srinivasan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I am very clear that we have acted  purely on the basis of the merit of the complaint, in accordance with  the rule of law,” he said. “We are right on our part.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/india-blogs-nytimes-november-20-2012-how-to-steer-clear-of-indias-strict-internet-laws'&gt;https://cis-india.org/news/india-blogs-nytimes-november-20-2012-how-to-steer-clear-of-indias-strict-internet-laws&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-11-30T10:13:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/how-to-shutdown-internet-shutdowns">
    <title>How to Shut Down Internet Shutdowns</title>
    <link>https://cis-india.org/internet-governance/events/how-to-shutdown-internet-shutdowns</link>
    <description>
        &lt;b&gt;This talk will focus on the challenges and opportunities for research on internet shutdowns after the judgement of the Supreme Court in Anuradha Bhasin v. Union of India. Stepping beyond the judgement, there will be a wider discussion on the practice of whitelists, blocking powers of the central government.
&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/How-to-Shut-Down-Internet-Shutdowns-Details/" alt="null" width="100%" /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;About the Speaker&lt;/strong&gt;&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;Apar Gupta is the Executive Director of the Internet Freedom Foundation.&lt;/p&gt;
&lt;p&gt;Apar has been fighting the good fight for digital rights. While in law school almost 20 years ago, he wrote a legal commentary on the IT Act that is now in its third edition. As a lawyer in the Supreme Court, he worked on landmark cases such as on Section 66A, Intermediary Liability, Internet Shutdowns, the Right to Privacy and Privacy.&lt;/p&gt;
&lt;p&gt;He also helped create public campaigns to advance net neutrality, reform defamation laws, fight Internet shutdowns and create a privacy statute. Apar previously ran his own successful law firm, was profiled in Outlook Magazine and listed in Forbes India's list of 30 under 30. He has also worked as a commercial litigator and partner in top law firms, written papers cited widely in local and international publications and taught courses at NLS and NLU.&lt;/p&gt;
&lt;p&gt;RSVP &lt;a class="external-link" href="https://forms.gle/CGei6wNUbR4t92549"&gt;here&lt;/a&gt;, or by sending an email Torsha (torsha@cis-india.org).&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/how-to-shutdown-internet-shutdowns'&gt;https://cis-india.org/internet-governance/events/how-to-shutdown-internet-shutdowns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-02-03T11:13:12Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy">
    <title>How to make EVMs hack-proof, and elections more trustworthy</title>
    <link>https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy</link>
    <description>
        &lt;b&gt;Free and fair elections are the expression of democratic emancipation. India has always led by example: the Nehru Committee sought universal adult franchise in 1928, at a time when France didnât let women vote, and laws in the USA allowed disqualification of poor, illiterate, and African-American voters. But how reliable are our voting systems, particularly in terms of security?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://timesofindia.indiatimes.com/home/sunday-times/all-that-matters/how-to-make-evms-hack-proof-and-elections-more-trustworthy/articleshow/67004651.cms"&gt;Times of India&lt;/a&gt; on December 9, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;Electronic voting machines (EVM) have been in use for general elections in India since 1999 having been first introduced in 1982 for a by-election in Kerala. The EVMs we use are indigenous, having been designed jointly by two public-sector organisations: the Electronics Corporation of India Ltd. and Bharat Electronics Ltd. In 1999, the Karnataka High Court upheld their use, as did the Madras High Court in 2001.&lt;br /&gt;&lt;br /&gt;Since then a number of other challenges have been levelled at EVMs, but the only one that was successful was the petition filed by Subramanian Swamy before the Supreme Court in 2013. But before we get to Swamy's case and its importance, we should understand what EVMs are and how they are used.&lt;br /&gt;&lt;br /&gt;The EVM used in India are standardised and extremely simple machines. From a security standpoint this makes them far better than the myriad different, and some notoriously insecure machines used in elections in the USA. Are they 'hack-proof' and 'infallible' as has been claimed by the ECI? Not at all.&lt;br /&gt;&lt;br /&gt;Similarly simple voting machines in the Netherlands and Germany were found to have vulnerabilities, leading both those countries to go back to paper ballots.&lt;br /&gt;&lt;br /&gt;Because the ECI doesn't provide security researchers free and unfettered access to the EVMs, there had been no independent scrutiny until 2010. That year, an anonymous source provided a Hyderabad-based technologist an original EVM. That technologist, Hari Prasad, and his team worked with some of the world's foremost voting security experts from the Netherlands and the US, and demonstrated several actual live hacks of the EVM itself and several theoretical hacks of the election process, and recommended going back to paper ballots. Further, EVMs have often malfunctioned, as news reports tell us. Instead of working on fixing these flaws, the ECI arrested Prasad (for being in possession of a stolen EVM) and denied Princeton Prof Alex Halderman entry into India when he flew to Delhi to publicly discuss their research. Even in 2017, when the ECI challenged political parties to âhackâ EVMs, it did not provide unfettered access to the machines.&lt;br /&gt;&lt;br /&gt;While paper ballots may work well in countries like Germany, they hadn't in India, where in some parts ballot-stuffing and booth-capturing were rampant. The solution as recognised by international experts, and as the ECI eventually realised, was to have the best of both worlds and to add a printer to the EVMs.&lt;br /&gt;&lt;br /&gt;These would print out a small slip of paper containing the serial number and name of the candidate, and the symbol of the political party, so that the sighted voter could verify that her vote has been cast correctly. This paper would then be deposited in a sealed box, which would provide a paper trail that could be used to audit the correctness of the EVM. They called this VVPAT: voter-verifiable paper audit trail. Swamy, in his PIL, asked for VVPAT to be introduced. The Supreme Court noted that the ECI had already done trials with VVPAT, and made them mandatory.&lt;br /&gt;&lt;br /&gt;However, VVPATs are of no use unless they are actually counted to ensure that the EVM tally and the paper tally do match. The most advanced and efficient way of doing this has been proposed by Lindeman &amp;amp; Stark, through a methodology called (RLAs), in which you keep auditing until either you've done a full hand count or you have strong evidence that continuing is pointless. The ECI could request the Indian Statistical Institute for its recommendations in implementing RLAs. Also, it must be remembered, current VVPAT technology are inaccessible for persons with visual impairments.&lt;br /&gt;&lt;br /&gt;While in some cases, the ECI has conducted audits of the printed paper slips, in 2017 it officially noted that only the High Court can order an audit and that the ECI doesn't have the power to do so under election law. Rule 93 of the Conduct of Election Rules needs to be amended to make audits mandatory.&lt;br /&gt;&lt;br /&gt;The ECI should also create separate security procedures for handling of VVPATs and EVMs, since there are now reports of EVMs being replaced 'after' voting has ended. Having separate handling of EVMs and VVPATs would ensure that two different safe-houses would need to be broken into to change the results of the vote. Implementing these two changes, changing election law to make risk-limiting audits mandatory, and improving physical security practices would make Indian elections much more trustworthy than they are now, while far more needs to be done to make them inclusive and accessible to all.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy'&gt;https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-01-14T15:34:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/how-to-engage-in-broadband-policy-and-regulatory-processes">
    <title>How to Engage in Broadband Policy and Regulatory Processes</title>
    <link>https://cis-india.org/news/how-to-engage-in-broadband-policy-and-regulatory-processes</link>
    <description>
        &lt;b&gt;LIRNEasia with the support of the Ford Foundation offered a four-day course in Gurgaon from March 7 to 10, 2014. Sunil Abraham taught on Surveillance and Privacy. &lt;/b&gt;
        &lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/surveillance-and-privacy.pdf" class="internal-link"&gt;Click to see&lt;/a&gt; Sunil Abraham's presentation on Surveillance and Privacy. Also read it on LIRNE asia website &lt;a class="external-link" href="http://broadbandasia.info/wp-content/uploads/2014/03/privacy-lirneasia.pdf"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Goal&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To enable members of Indian civil-society groups (including academics and those from the media) to marshal available research and evidence for effective participation in broadband policy and regulatory processes including interactions with media, thereby facilitating and enriching policy discourse on means of increasing broadband access by the poor.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Outcomes&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The objective of the course is to produce discerning and knowledgeable consumers of research who are able to engage in broadband policy and regulatory processes.  The course will benefit those working in government and at operators as well.&lt;/p&gt;
&lt;p&gt;At the end of the course attendees will:&lt;/p&gt;
&lt;p&gt;Be able to find and assess relevant research &amp;amp; evidence&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Be able to summarize the research in a coherent and comprehensive manner&lt;/li&gt;
&lt;li&gt;Have an understanding of broadband policy and regulatory processes in India &lt;/li&gt;
&lt;li&gt;Have the necessary tools to improve their communication skills&lt;/li&gt;
&lt;li&gt;Have some understanding of how media function and how to effectively interact with media&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Participants will be formed into teams on day1. Both group assignments are connected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first assignment requires each group to research on a National Broadband Network (NBN) assigned to them (one of US, Singapore, Hong Kong, Brazil, South Africa, Korea or Colombia) and writing it up based on a template that will be provided. Each team will have to present their findings about the NBN at the end of day 2.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second assignment is to be performed by teams.  It is an oral presentation, accompanied by a policy brief of two pages max. at a mock public hearing at which the Indian Department of Telecommunications (DoT) is seeking input on the question of subsidizing fiber-to-the-home (FTTH) as the second phase of the current INR 20,000 Crore (USD 4 Billion) National Optical Fiber Network initiative.  Each team will be assigned a role and they should present the recommendations from the point of view of the assigned ‘role’.  All presentations must be evidence based.  It is expected that participants will use what they learnt about other NBNs on day 2 to support their argument.  Additional research must be conducted on Days 3 and 4.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;/th&gt;&lt;th&gt;Day1 (March 7)&lt;/th&gt;&lt;th&gt;Day2 (March 8)&lt;/th&gt;&lt;th&gt;Day3 (March 9)&lt;/th&gt;&lt;th&gt;Day4 (March 10)&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09.00&lt;br /&gt;10.30&lt;/td&gt;
&lt;td&gt;S1  Introduction (Rohan Samarajiva RS)&lt;/td&gt;
&lt;td&gt;S5  Interrogating supply-side indicators (RS &amp;amp; RLG)&lt;/td&gt;
&lt;td&gt;S8 Indian broadband policy &amp;amp; regulatory environment in relation to comparator countries (Satyen Gupta SG)&lt;/td&gt;
&lt;td&gt;S13 Lessons from Mexico (Ernesto Flores EF) &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.30&lt;br /&gt;11.00&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.00&lt;br /&gt;12.00&lt;/td&gt;
&lt;td&gt;S2 Research on significance of broadband/Internet (Payal Malik PM)&lt;/td&gt;
&lt;td&gt;S6 Assessing &amp;amp; summarizing research (RS &amp;amp; NK)&lt;/td&gt;
&lt;td&gt;S9  Research on subsidies in broadband eco system (PM)&lt;/td&gt;
&lt;td&gt;S14 Spectrum policy debates (Martin Cave (MC)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.00&lt;br /&gt;13.00&lt;/td&gt;
&lt;td&gt;S3   Finding research (Nilusha Kapugama NK)&lt;/td&gt;
&lt;td&gt;S7 The art of media interaction (RS)&lt;/td&gt;
&lt;td&gt;S10 Making policy &amp;amp; doing regulation (SG &amp;amp; Rajat Kathuria RK) panel discussion&lt;/td&gt;
&lt;td&gt;S15 Framing issues (RS)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.00&lt;br /&gt;14.00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.00&lt;br /&gt;15.00&lt;/td&gt;
&lt;td&gt;A1 Group formation; Assignments explained and introduction of Broadband Website (Roshanthi Lucas Gunaratne RLG)&lt;/td&gt;
&lt;td&gt;A2 Rewriting research summaries &amp;amp; preparing presentations&lt;/td&gt;
&lt;td&gt;S11 Surveillance and Privacy (RS &amp;amp; Sunil Abraham SA)&lt;/td&gt;
&lt;td&gt;A5 Mock public hearing (RS &amp;amp; panel)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.00&lt;br /&gt;15.30&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.30&lt;br /&gt;17.00&lt;/td&gt;
&lt;td&gt;S4 Demand-side research (NK) &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;A3 Presentation &amp;amp; critique of research summaries (RS &amp;amp; Panel)&lt;/td&gt;
&lt;td&gt;S12 International policy debates on Internet and broadband (RS)&lt;/td&gt;
&lt;td&gt;A5 Mock public hearing &amp;amp; critique (RS &amp;amp; panel)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.00 onwards&lt;/td&gt;
&lt;td&gt;Group work&lt;/td&gt;
&lt;td&gt;Group work&lt;/td&gt;
&lt;td&gt;Group work&lt;/td&gt;
&lt;td&gt;Certificate dinner&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Faculty&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Rohan Samarajiva, PhD&lt;/b&gt;&lt;br /&gt;Rohan Samarajiva, was the founding CEO (2004 - 2012) and Chair (2004 – onwards) of LIRNEasia.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previously he was the Team Leader at the Sri Lanka Ministry for Economic Reform, Science and Technology (2002-04) responsible for infrastructure reforms, including participation in the design of the USD 83 million e Sri Lanka Initiative.  He was Director General of Telecommunications in Sri Lanka (1998-99), a founder director of the ICT Agency of Sri Lanka (2003-05), Honorary Professor at the University of Moratuwa in Sri Lanka (2003-04), Visiting Professor of Economics of Infrastructures at the Delft University of Technology in the Netherlands (2000-03) and Associate Professor of Communication and Public Policy at the Ohio State University in the US (1987-2000).  He was Policy Advisor to the Ministry of Post and Telecom in Bangladesh (2007-09).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He serves as Senior Advisor to Sarvodaya (Sri Lanka’s largest community based organization) on ICT matters. Samarajiva is a Board Member of Communication Policy Research south, an initiative to identify and foster policy intellectuals in emerging Asia. He serves on the editorial boards of seven academic journals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;His full CV can be found at &lt;a href="http://lirneasia.net/wp-content/uploads/2007/12/CVApril1long.pdf"&gt;http://lirneasia.net/wp-content/uploads/2007/12/CVApril1long.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Martin Cave, PhD&lt;/b&gt;&lt;br /&gt;Martin Cave is a regulatory economist specialising in competition law and in the network industries, including  airports, broadcasting, energy, posts, railways, telecommunications and water. He has published extensively in these fields, and has held professorial positions at Warwick Business School, University of Warwick, UK, and the Department of Economics, Brunel University, UK. In 2010/11, Martin held the BP Centennial Chair at the London School of Economics, based in the Department of Law. He is now Visiting Professor at Imperial College Business School.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He is a Deputy Chair of the Competition Commission from January 2012. He has provided expert advice to governments, competition authorities, regulators and firms around the world, focussing particularly upon the communications industries. This work has included reviews of spectrum policies for the Governments of Australia, Canada and the UK; advice on market analysis and access remedies to a large number of regulators in Asia, Australia, Europe and Latin America, including the European Commission. He has provided advice and expert testimony in competition and sector-specific regulatory proceedings to a number of major international firms in Asia, Australasia and Europe. He has also advised UK ministers on matters relating to the water sector, housing, legal services and airports, and advised regulators in the railway and energy sectors. He was a founder member of the Academic Advisory Committee of the Brussels-based think tank, the Centre for Regulation in Europe (&lt;a href="http://www.cerre.eu/" target="_blank"&gt;www.cerre.eu&lt;/a&gt;). In 2009 he was awarded the OBE for public service.&lt;/p&gt;
&lt;p&gt;His full CV&lt;b&gt; &lt;/b&gt;available on &lt;a href="http://www.martincave.org.uk/index.php"&gt;http://www.martincave.org.uk/index.php&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Payal Malik&lt;/b&gt;&lt;br /&gt;Payal Malik is a Senior Research Fellow of LIRNEasia and an Associate Professor of Economics at the Delhi University. She is currently on deputation to the Competition Commission of India. She is also associated with National Council of Applied Economic Research and Indicus Analytics. She received her Master of Philosophy (M.Phil.), and MA in Economics from the Delhi School of Economics and BA in Economics from Lady Shriram College, University of Delhi. She also has a MBA in Finance from the University of Cincinnati.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She has several years of research experience on the issues of competition and regulation in network industries like power, telecommunication and water. In addition, she has done considerable research on the ICT sector. Recently she has been actively engaged in competition policy research. At LIRNEasia, she has led research on measuring India’s telecom sector and regulatory performance, including a study on Universal Service Instruments. She has written both for professional journals as well as for the economic press. Currently she is a regular columnist for the Financial Express, India and a referee for the Information Technologies and International Development journal published by University of Southern California, Annenberg.  &lt;a href="http://lirneasia.net/wp-content/uploads/2011/01/Payal-Malik-Curriculum-Vita%C3%A8-December-2010.pdf"&gt;Click here to download a detailed version of CV&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Satyen Gupta&lt;/b&gt;&lt;br /&gt;Satyen Gupta is the founder and Secretary General, NGN Forum, India. Previously he was the chief of Corporate Affairs, Sterlite Technologies Ltd and headed the Regulatory and Govt. Affairs for BT global Services for SAARC Region and handled Licencing, Regulation, compliance, competition and Industry Advocacy issues. He is also a member, Advisory Board of Creation and Implementation of National Optical Fibre Network for the government of India (2011 onwards). From 2000-2006 he served as the Principle Advisor, Telecom Regulatory Authority of India at the level of additional secretary to the government of India and headed the fixed network division. He is the author of “Everything Over IP-All you want to know about NGN” (2011).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He has conducted and taught many courses on telecommunication technologies, policy and regulation. He is also a Govt. Affairs and Regulatory advocate. He  graduated with Hons, in Engineering in 1979 from NIT, Kurukshetra University, INDIA and went on to complete his post graduate studies in Electronics Design Technology at CEDT, Indian Institute of Science, Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rajat Kathuria, PhD&lt;/b&gt;&lt;br /&gt;Rajat Kathuria is Director and Chief Executive at Indian Council for Research on International Economic Relations (ICRIER), New Delhi. He has over 20 years experience in teaching and 10 years experience in economic policy, besides research interests on a range of issues relating to regulation and competition policy. He worked with Telecom Regulatory Authority of India (TRAI) during its first eight years (1998-2006) and gained hands on experience with telecom regulation in an environment changing rapidly towards competition. The role entailed analysis of economic issues relating to telecom tariff policy, tariff rebalancing, interconnection charges and licensing policy. Market research and questionnaire development and analysis formed an integral part of this exercise. It also involved evaluation of macro level initiatives for transforming the telecom industry. He wrote a number of consultation papers which eventually formed the basis of tariff and interconnection orders applicable to the industry. He has an undergraduate degree in Economics from St. Stephens College, a Masters from Delhi School of Economics and a PhD degree from the University of Maryland, College Park.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Ernesto Flores, PhD&lt;/b&gt;&lt;br /&gt;Ernesto M. Flores-Roux majored in Mathematics from the National University of Mexico (UNAM), obtained partial credits in a Masters in Economics (ITAM), and received his PhD in Statistics from The University of Chicago (1993). From 1993 to 2004, he worked for McKinsey &amp;amp; Co., Inc. (Mexico, Brazil), one of the most prestigious international consulting firms, first as a Consultant, then as Partner, and finally as the Partner in charge of McKinsey's Rio de Janeiro office. He specialized in several aspects of the telecommunications industry, including regulation, planning, strategy, and marketing. He assisted the governments of Mexico and Brazil in their deregulation and privatization processes. In 2004, he joined Telefonica, first as Director of Marketing and Strategy in Mexico and then transferring to Telefónica's operations in Peru, China (Beijing), and Brazil. In 2008 he joined the Ministry of Communications and Transport (SCT) in Mexico as Chief of Staff of the Deputy Minister of Communications. In 2009 he joined CIDE (Centro de Investigación y Docencia Económicas, Mexico City) as an associate professor of CIDE's telecommunications program (Telecom CIDE). He has published several papers in telecommunications policy and has written reports for the IDB, GSMA, UN/CEPAL , Ahciet, CAF, OECD, as well as other publications in industry and academic journals. In 2011 he became a member of the Advisory Council of the Mexican telecommunications regulator (Cofetel – Comisión Federal de Telecomunicaciones).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham&lt;/b&gt;&lt;br /&gt;Sunil Abraham is the Executive Director of Bangalore based research organization, the Centre for Internet and Society. He founded Mahiti in 1998, a company committed to creating high impact technology and communications solutions. Today, Mahiti employs more than 50 engineers. Sunil continues to serve on the board. Sunil was elected an Ashoka fellow in 1999 to 'explore the democratic potential of the Internet' and was also granted a Sarai FLOSS fellowship in 2003. Between June 2004 and June 2007, Sunil also managed the International Open Source Network, a project of United Nations Development Programme's Asia-Pacific Development Information Programme serving 42 countries in the Asia-Pacific region.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Nilusha Kapugama&lt;/b&gt;&lt;br /&gt;Nilusha Kapugama is a Research Manager at LIRNEasia and manages the electricity component of the 2012-2014 IDRC Project on ‘Achieving e-inclusion by improving government service delivery &amp;amp; exploring the potential of “big data” for answering development questions’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She is also working on a systematic review looking at the economic impacts of mobile phones. Previously she managed the Knowledge Based Economy project at LIRNEasia, which looked at the information and knowledge gaps in agriculture supply chains. She also worked on &lt;a href="http://www.lirneasia.net/projects/current-projects/capacity-and-field-building/"&gt;CPR&lt;/a&gt;&lt;a href="http://www.lirneasia.net/projects/current-projects/capacity-and-field-building/"&gt;south&lt;/a&gt;, LIRNEasia’s capacity-building initiative to develop Asia-Pacific expertise and knowledge networks in ICT policy regulation. She has also done research on broadband quality indicators and national regulatory authority (NRA) website indicators. She has also worked on LIRNEasia’s &lt;a href="http://www.lirneasia.net/projects/current-projects/virtual-organization/"&gt;Virtual Organization Project&lt;/a&gt;.  She has experience organizing international conferences and training courses.&lt;/p&gt;
&lt;p&gt;She holds a master’s degree in development economics and policy from the University of Manchester, UK.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Roshanthi Lucas Gunaratne&lt;/b&gt;&lt;br /&gt;Roshanthi is a Research Manager at LIRNEasia and is currently managing the Ford Foundation Funded project on Giving Broadband Access to the Poor in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She is also contributing to the IDRC Customer Lifecycle Management Practices Project by conducting research on customer lifecycle management practices in telecommunication sector in Bangladesh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before joining LIRNE&lt;i&gt;asia&lt;/i&gt;, Roshanthi worked at the Global Fund to fight AIDS, Tuberculosis and Malaria, Geneva, Switzerland as a Strategic Information Officer. She contributed to the process of defining the Global Fund Key Performance Indicators, and also worked on improving the performance measurements of their grants. Prior to that, she worked as a telecom project manager at Dialog Telecom, and Suntel Ltd in Sri Lanka. As Suntel she managed the design and implementation of corporate customer projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She holds a MBA from the Judge Business School, University of Cambridge, UK and a BSc. Eng (Hons) specializing in Electronics and Telecommunication from the University of Moratuwa, Sri Lanka.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Resource Materials&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Bauer, Johannes M.; Kim, Junghyun; &amp;amp; Wildman, Steven S. (2005).  An integrated framework for assessing broadband policy options.  MICH. ST. L. REV. 21, pp. 21-50.  &lt;a href="http://www.msulawreview.org/PDFS/2005/1/Bauer-Kim.pdf"&gt;http://www.msulawreview.org/PDFS/2005/1/Bauer-Kim.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Broadband Commission (2012). &lt;i&gt;The state of broadband 2012:  Achieving digital inclusion for all.&lt;/i&gt; &lt;a href="http://www.broadbandcommission.org/Documents/bb-annualreport2012.pdf"&gt;http://www.broadbandcommission.org/Documents/bb-annualreport2012.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government of India, Department of Telecommunications (2012).  &lt;i&gt;National Telecom Policy 2012&lt;/i&gt;.  &lt;a href="http://www.dot.gov.in/ntp/NTP-06.06.2012-final.pdf"&gt;http://www.dot.gov.in/ntp/NTP-06.06.2012-final.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government of India, Department of Telecommunications (2004).  &lt;i&gt;Broadband policy&lt;/i&gt;.  &lt;a href="http://www.dot.gov.in/ntp/broadbandpolicy2004.htm"&gt;http://www.dot.gov.in/ntp/broadbandpolicy2004.htm&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Junio, Don Rodney (2012). Does a National Broadband Plan Matter? A Comparative Analysis of Broadband Plans in Hong Kong and Singapore &lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2146566"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2146566&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;InfoDev.  &lt;i&gt;Broadband strategies toolkit&lt;/i&gt;.  &lt;a href="http://broadbandtoolkit.org/en/toolkit/contents"&gt;http://broadbandtoolkit.org/en/toolkit/contents&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Samarajiva, Rohan (2010).  Leveraging the budget telecom network business model to bring broadband to the people, &lt;i&gt;Information Technology and International Development&lt;/i&gt;, 6, special edition:  93-97.  &lt;a href="http://itidjournal.org/itid/article/view/630/270"&gt;http://itidjournal.org/itid/article/view/630/270&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/how-to-engage-in-broadband-policy-and-regulatory-processes'&gt;https://cis-india.org/news/how-to-engage-in-broadband-policy-and-regulatory-processes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-03T06:07:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-leslie-d-monte-joji-thomas-philip-july-3-2013-how-the-worlds-largest-democracy-is-preparing-to-snoop-on-its-citizens">
    <title>How the world’s largest democracy is preparing to snoop on its citizens</title>
    <link>https://cis-india.org/news/livemint-leslie-d-monte-joji-thomas-philip-july-3-2013-how-the-worlds-largest-democracy-is-preparing-to-snoop-on-its-citizens</link>
    <description>
        &lt;b&gt;Monitoring system will allow govt to snoop on voice calls, SMSes, and access Internet data. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Leslie D' Monte and Joji Thomas Philip was &lt;a class="external-link" href="http://www.livemint.com/Politics/pR5zc8hCD1sn3NWQwa7cQJ/The-new-surveillance-state.html"&gt;published in Livemint&lt;/a&gt; on July 3, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Nothing will be secret or private.&lt;/p&gt;
&lt;p class="mceContentBody documentContent"&gt;Every conversation on landlines and mobile phones will be  heard; some will be recorded. Every move you make on the Internet will  be tracked.&lt;/p&gt;
&lt;p class="mceContentBody documentContent"&gt;Fiction?&lt;/p&gt;
&lt;p class="mceContentBody documentContent"&gt;By December, when the Nanny State goes live, it will be fact.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;Once the government’s innocuously named CMS  (communication monitoring system) is in place, the state will be able to  snoop on your voice calls, fax messages, SMSes and MMSes, across all  phone networks. It will be able to access your Internet data, and see  not just what sites you visit but even build a cache of your inbox, to  decrypt at leisure.&lt;/p&gt;
&lt;p class="mceContentBody documentContent"&gt;The process began more than a couple of years ago.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;On 29 April 2011, India’s home ministry called for bids  to set up communications monitoring systems in all state capitals. The  notice, which was published on its website and went almost unnoticed,  specified that the system should be able to monitor voice calls, fax  messages, SMSes and MMSes, and work across terrestrial networks, GSM and  CDMA (the dominant mobile telephony platforms), and the Internet.&lt;/p&gt;
&lt;div class="p"&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/q9fAaeNdzUQ" width="320"&gt;&lt;/iframe&gt;&lt;/th&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The tender specified that the system should be able to  listen in live, and be able to analyse intercepted data. It should have  the ability to record, store and playback, without interfering “with the  operation of telecommunication network or make the target aware that he  is being monitored”.&lt;/p&gt;
&lt;p class="p" style="text-align: justify; "&gt;The CMS is no longer a concept. It has undergone  successful pilots and is likely to be commissioned by the year-end,  according to an internal note dated 10 June from the department of  telecommunications (DoT).&lt;/p&gt;
&lt;p class="p" style="text-align: justify; "&gt;A top government official, who did not want to be named, said the CMS  centralized data centre is likely to be ready by July and commissioned  by October. The official also added that the Centre for Development of  Telematics (C-DoT), the government’s telecom technology arm, has “signed  an agreement with the Centre for Artificial Intelligence and Robotics  (CAIR) for Internet Service Provider integration”. This agreement will  allow monitoring agencies to track an individual’s Internet use.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;p class="documentcontent" style="text-align: justify; "&gt;Subsequent media reports, which have cited internal government documents, peg the cost of the CMS at around Rs.400 crore, but there is hardly any official data from the government about the implementation of the CMS.&lt;/p&gt;
&lt;p class="documentcontent" style="text-align: justify; "&gt;In its 2012-13 annual report, DoT said the government has decided to set up the CMS for lawful interception and monitoring by law enforcement agencies, “reducing the manual intervention at many stages as well as saving of time”.&lt;/p&gt;
&lt;p class="documentcontent" style="text-align: justify; "&gt;The system, according to the report, was to be installed by C-DoT after which the Telecom Enforcement, Resource and Monitoring (TERM) cells would take over. As on 31 March, there were 34 such TERM cells in the country. The current number could not be ascertained.&lt;/p&gt;
&lt;p class="documentcontent" style="text-align: justify; "&gt;How does the government justify this invasive system? Its purpose is unclear, but national security is always a handy spectre. And so what if such a system can be misused to bully, spy and curtail the freedom of individuals? Indeed, India’s track record of using existing laws doesn’t inspire confidence.&lt;/p&gt;
&lt;p class="documentcontent" style="text-align: justify; "&gt;Student &lt;a href="http://www.livemint.com/Search/Link/Keyword/Shaheen%20Dhada"&gt;Shaheen Dhada&lt;/a&gt; was arrested (under the law) for criticizing the shutdown of Mumbai after the death of Shiv Sena supremo &lt;a href="http://www.livemint.com/Search/Link/Keyword/Bal%20Thackeray"&gt;Bal Thackeray&lt;/a&gt; on her personal Facebook account. Her friend, &lt;a href="http://www.livemint.com/Search/Link/Keyword/Renu%20Srinivasan"&gt;Renu Srinivasan&lt;/a&gt;, who had “liked” the comment was also arrested. The two were later freed, on bail.&lt;/p&gt;
&lt;h3 class="documentcontent" style="text-align: justify; "&gt;No known safeguards&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;But how does the CMS work? According to the government official cited above, the Central Bureau for Investigation (CBI), for instance, is likely to be provided interception facilities through the CMS in Delhi initially.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“CBI shall enter data related to target in the CMS system and approach the telecom services provider”, at which point the process is automated, and the provider simply sends the data to a server which forwards the requested information, he explained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He didn’t mention any safeguards, nor have any been made public, which means that there are likely none. In a Q&amp;amp;A session on the popular social network Reddit on Tuesday, academic and activist &lt;a href="http://www.livemint.com/Search/Link/Keyword/Lawrence%20Lessig"&gt;Lawrence Lessig&lt;/a&gt;, the co-founder of Creative Commons, wrote on the subject of snooping in the US, “I’m really troubled by national security programmes. We don’t know what protections are built into the system.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That has become the subject of much debate following the leaks by whistleblower &lt;a href="http://www.livemint.com/Search/Link/Keyword/Edward%20Snowden"&gt;Edward Snowden&lt;/a&gt; about the US National Security Agency’s surveillance programme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lessig pointed out that protection based on code is the only real protection from misuse, as other safeguards are dependent on people choosing not to violate reasonable expectations of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Which is the heart of the problem. From what we know, the list of agencies with access to data in India is already large: the Research and Analysis Wing, CBI, the National Investigation Agency, the Central Board of Direct Taxes, the Narcotics Control Bureau, and the Enforcement Directorate. More may be added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the system to be useful in any practical fashion, access will have to be given to a large number of officials in each of these agencies. And in the absence of safeguards, one must assume that all data is accessible to all officials.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To be sure, some of this information is already being tracked by Internet companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ravina Kothari, a 22-year-old student at Cardiff University, said she learnt a bitter lesson “last year when I Googled my name”. “It revealed all the personal details I had put up on social media sites. My childhood school photos popped up on &lt;a href="http://www.livemint.com/Search/Link/Keyword/Google"&gt;Google&lt;/a&gt; image search results. Worse, I had not put them there. My friends had tagged me in—all so scary. And I can’t do anything about it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She has since stopped uploading personal details such as videos, pictures or telephone numbers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twenty-one-year-old Shruti Lodha, studying to be a chartered accountant, feels a similar discomfort.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I am definitely not comfortable with Google, and how every time I Google myself it reveals my identity and shows information that is on social media sites.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, 24-year-old &lt;a href="http://www.livemint.com/Search/Link/Keyword/Max%20Schrems"&gt;Max Schrems&lt;/a&gt; of Vienna, Austria, asked the world’s largest social networking site &lt;a href="http://www.livemint.com/Search/Link/Keyword/Facebook%20Inc."&gt;Facebook Inc.&lt;/a&gt; for a copy of every piece of information it had collected on him since he had created an account with it two years earlier.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Schrems was delivered a CD packing a 1,222-page file that included information he had deleted, but had been stored on &lt;a href="http://www.livemint.com/Search/Link/Keyword/Facebook"&gt;Facebook&lt;/a&gt;’s servers, according to ThreatPost, a publication on information technology (IT) security run by Kaspersky Lab, a leading maker of antivirus software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Had Schrems been a resident of India, he could not have known how much personal information Facebook had on him. Every person in the European Union (EU) has the right to access all the data that a company holds on him or her.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the CMS, all this information, and much more, can be called up by just about anyone—the taxman, CBI officials, Assam Police (which will also monitor the network according to some reports)—and the old bogey of national security may not even be raised.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Need for a privacy law&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Publicly at least, companies agree that the new monitoring systems infringe on our rights. &lt;a href="http://www.livemint.com/Search/Link/Keyword/Subho%20Ray"&gt;Subho Ray&lt;/a&gt;, president, Internet and Mobile Association of India said, “Without any prior permission, government should not take or use any information which is considered private. The biggest challenge for us is that we do not have a privacy law in India.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber law experts and privacy lobby groups caution that the world’s largest democracy’s attempt to snoop on its citizens with the CMS, ostensibly for security reasons, could be abused in the absence of a transparent process and a privacy law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issue has become alarming, they add, with the US admitting to be collecting billions of pieces of information on immigrants—6.3 billion from Indian citizens alone under the Foreign Intelligence Surveillance Act, according to an 8 June report in the UK-based &lt;i&gt;The Guardian&lt;/i&gt; newspaper.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We don’t know much about the CMS, except that when implemented, it could be plugged directly into telecom nodes and lead to widespread tapping,” said Apar Gupta, a partner at law firm Advani and Co. specializing in IT law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There’s no legal sanction as of now for any type of mass surveillance, such as the one that the CMS suggests,” said Pavan Duggal, a Supreme Court lawyer and cyberlaw expert.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gupta added that since India lacks privacy legislation, which obliges companies to maintain privacy standards when they export the data which they’ve gathered in India overseas, “this poses a problem”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;N.S. Nappinai, a Bombay high court advocate, said, “India has lived without any codified laws to protect privacy all these years and has relied primarily on Article 21 of the Constitution. Protecting privacy has just become more complicated with the humongous quantity of data being uploaded online. People seem totally unaware of the trouble they are inviting upon themselves.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Current laws are already compromised&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The lack of a privacy law makes it easier for the government to take such extreme steps. The Indian Telegraph Act and the IT Act, 2008 (amendments introduced in the IT Act, 2000), already gives the government the power to monitor, intercept and even block online conversations and websites. The addition of the CMS will greatly widen the number of sources and could simplify access to these records as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On 25 April 2011, the government admitted that the existing laws include provisions for interception and pointed out that the Supreme Court had, on 18 December 1996, upheld the constitutional validity of interceptions and monitoring.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the court had added that telephone tapping infringes on the right to life and the right to freedom of speech and expression, unless permitted under special procedures, these guidelines are not usually implemented, according to activists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The shortcomings of the existing laws already make it possible to misuse the vast amount of information that is available today. These laws were written at a time when the Internet was not a fact of life, and where the lines between public and private were not already blurred. Given that, the perspectives on privacy can be worrisome.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a report presented to the Lok Sabha on 13 December 2011, the ministry of planning said, “Collection of information without a privacy law in place does not violate the right to privacy of the individual…There is no bar on collecting information, the only requirement to be fulfilled with respect to the protection of the privacy of an individual is that care should be taken in collection and use of information, consent of individual would be relevant, information should be kept safe and confidential.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This proposed Right to Privacy Bill was leaked to the public, and eventually nothing came of it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On 16 October 2012, a commission headed by justice (retired) &lt;a href="http://www.livemint.com/Search/Link/Keyword/A.P.%20Shah"&gt;A.P. Shah&lt;/a&gt; issued a report that included the study of privacy laws and related Bills from around the world. The report noted that with the “increased collection of citizen information by the government, concerns have emerged on their impact on the privacy of persons”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite the report being given to the Planning Commission, the government has continued with its plans.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Early this year, a privacy lobby body, the Centre for Internet and Society (CIS) drafted the Privacy (Protection) Bill 2013, with the objective of contributing to privacy legislation in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS worked with the Federation of Indian Chambers of Commerce and Industry and the Data Security Council of India and held round table meetings around the country to bring about a privacy law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director, CIS, said, “While the government sets out to protect national interests, it’s also very important to protect the rights of individuals.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The way ahead&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Human Rights Watch, in a 7 June media release, described the CMS as “chilling, given its (India’s) reckless and irresponsible use of sedition and Internet laws”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to &lt;i&gt;Freedom on the Net 2012&lt;/i&gt;, released on 24 September, India—which scored 39 points out of 100—was termed “partly-free”. But India is not alone. Around 40 countries filter the Internet in varying degrees, including democratic and non-democratic governments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/YouTube"&gt;YouTube&lt;/a&gt; and Gmail (both owned by &lt;a href="http://www.livemint.com/Search/Link/Keyword/Google%20Inc."&gt;Google Inc.&lt;/a&gt;), &lt;a href="http://www.livemint.com/Search/Link/Keyword/BlackBerry"&gt;BlackBerry&lt;/a&gt;, WikiLeaks, Skype (owned by &lt;a href="http://www.livemint.com/Search/Link/Keyword/Microsoft%20Corp."&gt;Microsoft Corp.&lt;/a&gt;), &lt;a href="http://www.livemint.com/Search/Link/Keyword/Twitter"&gt;Twitter&lt;/a&gt; and Facebook have all been censored, at different times, in countries such as China, Iran, Egypt and India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;European Union countries have strong privacy laws as is evident from the Schrems case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Australia is engaged in putting similar safeguards in place. On 24 June, a Senate committee recommended that Australia’s proposed data retention scheme only be considered if it just collected metadata, avoided capture of browser histories and contained rigorous privacy controls and oversight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian politicians could take a cue from such countries when balancing national interest with protecting the privacy of individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Gopal Sathe in New Delhi and Zahra Khan in Mumbai contributed to this story.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-leslie-d-monte-joji-thomas-philip-july-3-2013-how-the-worlds-largest-democracy-is-preparing-to-snoop-on-its-citizens'&gt;https://cis-india.org/news/livemint-leslie-d-monte-joji-thomas-philip-july-3-2013-how-the-worlds-largest-democracy-is-preparing-to-snoop-on-its-citizens&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T09:41:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/uid-project-concern">
    <title>How the UID project can be a cause for concern</title>
    <link>https://cis-india.org/news/uid-project-concern</link>
    <description>
        &lt;b&gt;The Unique Identification Authority of India (UIDAI), headed by Nandan Nilekani, is the UPA government's most ambitious project, where one billion Indians are branded with a unique identity number. &lt;/b&gt;
        &lt;p&gt;Prime Minister Manmohan Singh&amp;nbsp; handed over the first of the Aadhaar cards at Tembhli village in Nandurbar district of Maharashtra. This mammoth project aims to provide Indian residents with a unique 12-digit identification number that will serve multiple purposes.&lt;/p&gt;
&lt;p&gt;Given the reach and the impact of such an exercise there is much excitement around the Unique Identity (UID) number (also known as Aadhaar) drive, along with some confusion.&lt;/p&gt;
&lt;p&gt;However, there remains some concerns of identity theft.&lt;/p&gt;
&lt;p&gt;For example, the number is linked to their fingerprints and the patterns in their eyes. Since those markers are unique to each of us, no one will steal their rations and wages again. They will be issued only after verification. But our eye's Iris patterns change, with age, disease or malnourishment. Fake fingerprints can very easily be made. Hence, the unique element of these numbers can be tampered.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Sunil Abraham, Director, Centre for Internet and Society said, “If I leave my fingerprints around, my identity can be stolen and transactions done on my behalf.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Activists claim that in a few years, banks, insurance companies, cell phone providers and hospitals will demand UID number before doing business with you. They could use that number, to share information about anybody.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Hence, Abraham said, “An insurance company and a hospital can merge databases. If you have AIDS or TB, they can bump up your premium, or refuse you cover.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Usha Ramanathan, lawyer said, “Say I go to Srinagar six times in a month. That information could be accessed by the government because the airlines asked for my number before booking a ticket. And that could make me a suspect. There's something wrong in being treated as a suspect for no other reason, than state paranoia.”&lt;/p&gt;
&lt;p&gt;Interestingly, even though India seems excited about this project, Britain recently stopped attempts at biometric based identification systems, after warnings that such a database could easily be hacked.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;See the &lt;a class="external-link" href="http://ibnlive.in.com/videos/132833/how-the-uid-project-can-be-a-cause-for-concern.html"&gt;video&lt;/a&gt; here.&lt;br /&gt;See the original coverage in &lt;a class="external-link" href="http://ibnlive.in.com/news/how-the-uid-project-can-be-a-cause-for-concern/132375-3.html"&gt;IBN Live&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/uid-project-concern'&gt;https://cis-india.org/news/uid-project-concern&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-09T12:59:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-quint-november-17-2016-payaswini-upadhyay-how-the-uk-got-a-better-deal-from-facebook-than-india-did">
    <title>How The U.K. Got A Better Deal From Facebook Than India Did </title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-quint-november-17-2016-payaswini-upadhyay-how-the-uk-got-a-better-deal-from-facebook-than-india-did</link>
    <description>
        &lt;b&gt;The U.K.’s Information Commissioner’s Office (ICO) and India’s Karmanya Sareen shared a similar concern – how messenger application WhatsApp’s decision to share user data with parent Facebook is a violation of the promise of privacy.&lt;/b&gt;
        &lt;p&gt;The blog post by Payaswini Upadhyay was &lt;a class="external-link" href="http://www.bloombergquint.com/business/2016/11/17/how-the-uk-got-a-better-deal-from-facebook-than-india-did"&gt;published in Bloomberg Quint&lt;/a&gt; on November 17, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Last week, Facebook agreed to address the concerns of the ICO; in India, it didn’t have to.&lt;/p&gt;
&lt;h3&gt;WhatsApp: New Privacy Policy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In August 2016, WhatsApp issued a revised privacy policy that allowed it to share user information with parent company Facebook. Any user who didn’t want her information to be shared with Facebook had a 30-day period to opt out of the policy. Opting out meant that a user’s account information would not be shared with Facebook to improve ads and product experiences. But, there was a caveat.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;The Facebook family of companies will still receive and use this information for other purposes such as improving infrastructure and delivery systems, understanding how our services or theirs are used, securing systems, and fighting spam, abuse, or infringement activities.&lt;br /&gt;&lt;b&gt;WhatsApp Support Team statement on its website &lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Facebook’s Commitment To ICO&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The ICO decided to delve deeper into what Facebook intended to do with the WhatsApp user data. Elizabeth Denham, Information Commissioner, ICO stated in her blog that users haven’t been given enough information about what Facebook plans to do with the information, and WhatsApp hasn’t got valid consent from users to share the information.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;I also believe users should be given ongoing control over how their information is used, not just a 30-day window.&lt;br /&gt;&lt;b&gt;Elizabeth Denham, Information Commissioner, ICO&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Denham further elaborated ICO’s stand - that it’s important users have control over their personal information, even if services don’t charge them a fee.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;We’ve set out the law clearly to Facebook, and we’re pleased that they’ve agreed to pause using data from U.K. WhatsApp users for advertisements or product improvement purposes.&lt;br /&gt;&lt;b&gt;Elizabeth Denham, Information Commissioner, ICO&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ICO has now asked Facebook and WhatsApp to sign an undertaking committing to better explaining to users how their data will be used, and to giving users ongoing control over that information. Additionally, the ICO also wants WhatsApp to give users an unambiguous choice before Facebook starts using that information and for them to be given the opportunity to change that decision at any point in the future. Facebook and WhatsApp are yet to agree to this, Denham stated.&lt;/p&gt;
&lt;pre style="text-align: justify; "&gt;If Facebook starts using the data without valid consent, it may face enforcement action from my office.&lt;br /&gt;&lt;b&gt;Elizabeth Denham, Information Commissioner, ICO&lt;/b&gt;&lt;/pre&gt;
&lt;p style="text-align: justify; "&gt;In the U.K., protections in the European Data Protection Directive have been incorporated into local law via the Data Protection Act 1998. The ICO is both the privacy regulator and the transparency (right to information) regulator, Sunil Abraham, executive director at the Centre for Internet and Society pointed out. The regulator can issue enforcement notices and also fine errant actors in the market place, he said.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;This is a regulator with expertise, experience and teeth. Come May 25, 2018, the General Data Protection Regulation will come into force and this will give more comprehensive powers to the regulator to investigate and remedy cases like this. The regulator will take each principle from the Directive or Regulation and examine Facebook’s actions comprehensively before deciding on a response. &lt;br /&gt;&lt;b&gt;Sunil Abraham, Executive Director, Centre for Internet and Society&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, if the regulator determines that the principle of choice and consent has not been complied with, it can force Facebook to reverse its decisions and provide greater transparency and clearer choices, Abraham added.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Karmanya Sareen’s Grievance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Back home in India, just two months ago, Karmanya Sareen, a WhatsApp user, argued before the Delhi High Court against the company’s new privacy policy. The argument was that WhatsApp’s August 2016 notice to its users about the proposed change in the privacy policy violated the fundamental rights of users under Article 21 of the Constitution. Article 21 promises protection of life and personal liberty.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Proposed change in the privacy policy of WhatsApp would result in altering/changing the most valuable, basic and essential feature of WhatsApp i.e. the complete protection provided to the privacy of details and data of its users.&lt;br /&gt;&lt;b&gt;Karmanya Sareen vs Union of India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Delhi High Court struck down the Article 21 argument saying that the Supreme Court was still deliberating over including right to privacy as a fundamental right. It also pointed to WhatsApp’s 2012 Privacy Policy that allowed the company to transfer user information in case of an acquisition or merger with a third party. The 2012 policy also allowed WhatsApp to change the terms periodically.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consequently, the Delhi High Court held that it is not open to the users now to contend that WhatsApp should be compelled to continue the same terms of service. However, the court gave WhatsApp two directions to protect users.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WhatsApp to delete from its servers and not share with Facebook or its group companies any information belonging to users who delete their account.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Users who continue to be on WhatsApp, their existing information up to September 25, 2016 cannot be shared with Facebook or any of its group companies.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Did The Delhi High Court Go Easy On Facebook And WhatsApp?&lt;/h3&gt;
&lt;p&gt;Apar Gupta, an advocate specializing in information technology, points out that the directions given by the Delhi High Court to WhatsApp did not contemplate any additional protection to a user than what was already provided by WhatsApp.&lt;/p&gt;
&lt;p class="callout"&gt;The Delhi Court essentially reproduced WhatsApp’s privacy policy. It did not compel or provide any additional safeguard.&lt;br /&gt;&lt;b&gt;Apar Gupta, Lawyer&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Apar attributes this to the absence of a regulatory framework.&lt;/p&gt;
&lt;p class="callout"&gt;The lack of substantive safeguard and enforcement framework in India led to the Delhi High Court upholding WhatsApp’s new privacy policy.&lt;br /&gt;&lt;b&gt;Apar Gupta, Lawyer&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham added that the court did not examine the privacy policy from the perspective of data protection principles as would have been the case in EU or any other jurisdictions with a proper data protection law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The court too admitted this in its order that there existed a regulatory vacuum in India and asked TRAI to look into the matter. Facebook did not respond to BloombergQuint’s query on whether it would implement its U.K. commitments in India as well.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-quint-november-17-2016-payaswini-upadhyay-how-the-uk-got-a-better-deal-from-facebook-than-india-did'&gt;https://cis-india.org/internet-governance/news/bloomberg-quint-november-17-2016-payaswini-upadhyay-how-the-uk-got-a-better-deal-from-facebook-than-india-did&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-11-18T01:56:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/scroll.in-march-24-2016-rajshekhar-anumeha-yadav-how-the-govt-gains-when-private-companies-use-aadhaar">
    <title>How the government gains when private companies use Aadhaar</title>
    <link>https://cis-india.org/internet-governance/news/scroll.in-march-24-2016-rajshekhar-anumeha-yadav-how-the-govt-gains-when-private-companies-use-aadhaar</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p&gt;This blog post by M. Rajshekhar and Anumeha Yadav was published in &lt;a href="http://scroll.in/article/805467/how-the-government-gains-when-private-companies-use-aadhaar"&gt;&lt;span&gt;Scroll.in&lt;/span&gt;&lt;/a&gt; on March 24, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last week, Rajya Sabha made a last-ditch attempt to modify the contentious Aadhaar legislation introduced by the Modi government. Since the legislation was introduced as a Money Bill, the Upper House had no powers to amend it. It could only send back the bill with recommended amendments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the clauses which Rajya Sabha wished to amend related to the use of the Aadhaar number, the 12-digit unique identification number assigned after the collection of an individual’s biometrics in the form of fingerprints and iris scans.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause 57 said that anyone, whether an individual or a public or private organisation, could use the Aadhaar number. Rajya Sabha voted to restrict the use of the number to the government. After all, the government had justified introducing Aadhaar legislation as a Money Bill by stating that it would be used for delivering government subsidies and benefits funded out of the Consolidated Fund of India. If the delivery of government welfare is the aim of Aadhaar, why should private companies be allowed to use it?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Rajya Sabha recommended dropping clause 57 to limit the use of Aadhaar to government agencies. But the Lok Sabha rejected its recommendation, and cleared the Bill in its original form, paving the way for private companies to use Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Strikingly, however, well before the Bill was cleared, a private company started advertising its services as&lt;em&gt; &lt;/em&gt;“India’s 1st Aadhaar based mobile app to verify your maid, driver, electrician, tutor, tenant and everyone else instantly”&lt;em&gt;. &lt;/em&gt;In an &lt;a href="http://scroll.in/article/805201/the-future-is-here-a-private-company-claims-to-have-access-to-your-aadhaar-data"&gt;&lt;span style="text-decoration: underline;"&gt;article&lt;/span&gt;&lt;/a&gt; for &lt;em&gt;Scroll.in,&lt;/em&gt; legal researcher Usha Ramanathan said, “A private company is advertising that it can use Aadhaar to collate information about citizens at a price. It says this openly, even as a case about the privacy of the information collected for the biometrics-linked government database is still pending in the Supreme Court.”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;LinkedIn for plumbers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The company that owns the mobile app called TrustID believes it is not doing anything wrong.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Monika Chowdhry, who heads the marketing division of Swabhimaan Distribution Services, the company that created TrustID, defended the app, saying it offers the valuable service of verifying people's identities. “In our day to day life, we do a lot of transactions with people – like maids or plumbers. Till now, you would have to trust them on what they said about themselves and what others said about the quality of their work.” The company is solving that problem, she said. “We are saying ask the person for their Aadhaar number and name and we will immediately tell you if they are telling the truth or not,” Chowdhry said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chowdhry said that over time, the Aadhaar number of individuals will be used to create a private verified database of TrustIDs. “Our plan is to create a rating mechanism,” she said. Referring to the option for maid, plumbers and other service providers on the app, she added: “People like you and me, we have Linkedin and Naukri. What do these people have?”&lt;/p&gt;
&lt;p&gt;How does the company use Aadhaar for verification and is there a reason to be concerned?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Aadhaar authentication&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After you have logged into the TrustID app, you can choose from a dropdown menu of categories. You can send anyone's Aadhaar number, gender and name – or even biometrics – and the app claims it can verify their identity.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;figure class="cms-block-image cms-block"&gt;&lt;img src="https://c2.staticflickr.com/2/1607/25979673596_e8c67299f5_b.jpg" /&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The app performs Aadhaar authentication – which means it matches an Aadhaar number with the information stored against that number in the servers of the Unique Identification Authority of India. At the time an individual enrols for an Aadhaar number, they disclose their name, gender, address and give biometric scans. This information is held in a database maintained by the UID authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the criticisms of Aadhaar has been that the database of millions of people could be misused in the absence of a privacy law in India. First, there is the question about whether the biometrics are secure. Second, there are risks that accompany the uncontrolled use of unique numbers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In response, the proponents of Aadhaar have said that the data is encrypted and secure, and can be accessed only by the authority. Those wanting to authenticate – or match – the Aadhaar number cannot directly access the database. They can simply make requests to the authority which authenticates the number for them.&lt;/p&gt;
&lt;p&gt;So far, it appeared that the authority was taking Aadhaar authentication requests solely from government agencies. For instance, to pay wages to workers of the rural employment guarantee programme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But TrustID’s example showed that private companies too have been sending authentication requests to the authority. This is not entirely surprising for those who have followed the blueprint for Aadhaar as envisioned by Nandan Nilekani, its founder. In an &lt;a class="link-external" rel="nofollow" href="http://www.mckinsey.com/industries/public-sector/our-insights/for-every-citizen-an-identity" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;interview&lt;/span&gt;&lt;/a&gt; in 2012, Nilekani spoke about creating a "thriving application system" using Aadhaar for both the public and private sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chowdhary said Swabhimaan Distribution Services registered as an Aadhaar authentication agency in November 2015, and the app was launched in January 2016.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;figure class="cms-block-image cms-block"&gt;&lt;img src="http://d1u4oo4rb13yy8.cloudfront.net/bnqkqkhrnf-1458797562.png" /&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TrustID, or Swabhimaan, is not the only private company that has signed up as an authentication agency for Aadhaar. A quick Google search throws up the name of &lt;a class="link-external" rel="nofollow" href="https://www.alankit.com/egovernance.aspx?id=AUA" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;Alankit&lt;/span&gt;&lt;/a&gt;, which wants to “provide Aadhaar Enabled Services to its beneficiaries, clients and customers and can further verify the correctness of the Aadhaar numbers provided ” .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This shows the authority entered into agreements with private companies well before the Aadhaar law was passed in Parliament. The companies were running ahead of legislation in a space unbounded by law, and the UIDAI supported them in this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is unclear how many private companies were sending requests for Aadhaar authentication. &lt;em&gt;Scroll's&lt;/em&gt; questions to Harish Agrawal, the deputy director general of Aadhaar's Authentication and Application Division, remained unanswered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an interview to &lt;em&gt;Business Standard&lt;/em&gt;, ABP Pandey, the director general of the UIDAI, said, "Usually what happens is that first a law is passed and thereafter the institutions are built and operations start. Here it has happened the other way around. The operations – the enrolment – is almost complete. The organisation is also there and has been working under executive orders. Now everything has to be kind of retrofitted in to the acts and the regulations."&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Why is this problematic?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;For one, allowing private companies to use the Aadhaar number shows that the government’s stated aims of Aadhaar are misleading.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both in the Supreme Court and in Parliament, the government has pushed for the use of Aadhaar as an instrument of welfare delivery. It justified passing Aadhaar legislation as a Money Bill by emphasising its importance to its welfare schemes. But as the case of Swabhimaan shows, Aadhaar's uses clearly go well beyond what the Bill's preamble describes as the “targeted delivery of subsidies, benefits and services, the expenditure for which is incurred from the Consolidated Fund of India.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two, biometrics and unique identification numbers are a qualitatively new form of private information. As such, they bring unknown risks. India does not have a privacy law, and a law defining the use of biometrics and unique numbers is yet to be created. Delhi-based lawyer Apar Gupta said, “Even the Aadhaar Bill is yet to be approved by the president. Its rules are yet to be drafted. There is not enough legal guidance on its use.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three, companies like Swabhimaan would be in a position to construct databases of their own. Take TrustID. When it starts retaining Aadhaar numbers, and adds ratings to them, it creates a database of its own, which amounts to creating profiles of people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here, as Ramanathan said, the analogy with the networking site LinkedIn doesn't work. “When I have an account on LinkedIn, I update my data,” she said. But the TrustID app generates profiles out of the ratings that others give. Even if a prospective employee shares his/her Aadhaar number, it does not amount to free consent since getting a job hinges on giving that number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the future, companies could use Aadhaar numbers in unknown ways, for instance, to combine multiple databases – banks, telecom companies, hospitals – to create detailed profiles of you and me that they can monetise. In effect, Aadhaar becomes a commercial instrument for private companies, and not just a mechanism for the delivery of government welfare.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Gains for the government&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, the executive director of the Centre for Internet and Society, further explained the risks that arise when databases are combined. He cited the example of &lt;a class="link-external" rel="nofollow" href="https://www.iiitd.ac.in/research/news/ocean" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;OCEAN&lt;/span&gt;&lt;/a&gt;, the system created by researchers at the Indraprastha Institute of Information Technology to raise privacy awareness. OCEAN used publicly available information held by the government (voter identity card, PAN card, driving licence) to access details about citizens in Delhi. This public data was combined with people's Facebook and Twitter accounts, and the aggregated results were visualised as a family tree which showed information extending to a person’s parents, siblings and spouse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"If a company like TrustID tied up with OCEAN, it can create a very detailed profile of an individual," said Abraham. "To continue with the example of a job-seeker, if a employer uses TrustID to verify applicants' identity or profiles, the App may combine a database like OCEAN to track that you logged into Twitter at, say 2 am on most nights. It can profile you as someone who might not turn up at work on time in the morning."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham pointed out that the government too stands to gain by allowing private companies to use Aadhaar for authentication. "Use of authentication by private companies will mean UIDAI can have information on authentications performed on you, or by you, over time in the private sphere as well, say during such a job search," he said. For instance, when TrustID runs a search for your prospective employers using your Aadhaar number, the government knows you have applied for a job at certain companies. "This is unnecessary involvement of the government, giving it access to information in an area that it should not have access to."&lt;/p&gt;
&lt;p&gt;Over time, such Aadhaar authentication for private services in companies, hospitals, or hotels will "help the government gain granular data on citizens", he said.&lt;/p&gt;
&lt;p&gt;Perhaps that explains why the government rushed the Aadhaar Bill through Parliament, allowing little time and room for public debate.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/scroll.in-march-24-2016-rajshekhar-anumeha-yadav-how-the-govt-gains-when-private-companies-use-aadhaar'&gt;https://cis-india.org/internet-governance/news/scroll.in-march-24-2016-rajshekhar-anumeha-yadav-how-the-govt-gains-when-private-companies-use-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-04-01T15:58:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india">
    <title>How Surveillance Works in India</title>
    <link>https://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india</link>
    <description>
        &lt;b&gt;When the Indian government announced it would start a Centralized Monitoring System in 2009 to monitor telecommunications in the country, the public seemed unconcerned. When the government announced that the system, also known as C.M.S., commenced in April, the news didn’t receive much attention. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Pranesh Prakash was &lt;a class="external-link" href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/"&gt;published in the New York Times&lt;/a&gt; on July 10, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;After a colleague at the Centre for Internet and Society wrote about the program and it was &lt;a href="http://www.hrw.org/news/2013/06/07/india-new-monitoring-system-threatens-rights"&gt;lambasted&lt;/a&gt; by Human Rights Watch, more reporters started covering it as a privacy  issue. But it was ultimately the revelations by Edward J. Snowden about  American surveillance that prompted Indians to ask questions about its  own government’s surveillance programs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, we have a strange mix of great amounts of transparency and  very little accountability when it comes to surveillance and  intelligence agencies. Many senior officials are happy to anonymously  brief reporters about the state of surveillance, but there is very  little that is officially made public, and still less is debated in the  national press and in Parliament.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This lack of accountability is seen both in the way the Big-Brother  acronyms (C.M.S., Natgrid, T.C.I.S., C.C.T.N.S., etc.) have been rolled  out, as well as the murky status of the intelligence agencies.&lt;span id="more-66746"&gt; &lt;/span&gt; No intelligence agency in India has been created under an act of Parliament with &lt;a href="http://articles.timesofindia.indiatimes.com/2013-02-02/india/36703357_1_intelligence-agencies-ntro-intelligence-bureau"&gt;clearly established roles and limitations on powers&lt;/a&gt;, and hence &lt;a href="http://articles.timesofindia.indiatimes.com/2012-03-26/chennai/31239894_1_ib-intelligence-bureau-officer-r-n-kulkarni"&gt;there is no public accountability whatsoever&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The absence of accountability has meant that the government has &lt;a href="http://articles.economictimes.indiatimes.com/2006-02-04/news/27434344_1_illegal-phone-indian-telegraph-act-security-agencies"&gt;since 2006&lt;/a&gt; &lt;a href="http://articles.timesofindia.indiatimes.com/2011-05-12/india/29535755_1_security-agencies-cms-intercept"&gt;been working on the C.M.S.&lt;/a&gt;, which will integrate with the &lt;a href="http://mha.nic.in/writereaddata/13040930061_Tr-ITJ-290411.pdf"&gt;Telephone&lt;/a&gt; &lt;a href="http://www.coraltele.com/support/GetPresentations.ashx?id=33"&gt;Call&lt;/a&gt; &lt;a href="http://indiatoday.intoday.in/story/government-plans-to-tighten-phone-tapping-norms/1/137251.html"&gt;Interception System&lt;/a&gt; that is also being rolled out. The cost: around 8 billion rupees ($132  million) — more than four times the initial estimate of 1.7 billion —  and even more important, our privacy and personal liberty. Under their  licensing terms, all Internet service providers and telecom providers  are required to provide the government direct access to all  communications passing through them. However, this currently happens in a  decentralized fashion, and the government in most cases has to ask the  telecoms for metadata, like call detail records, visited Web sites, IP  address assignments, or to carry out the interception and provide the  recordings to the government. Apart from this, the government uses  equipment to gain access to &lt;a href="http://www.outlookindia.com/article.aspx?265192"&gt;vast quantities of raw data traversing the Internet across multiple cities&lt;/a&gt;, including the data going through the undersea cables that land in Mumbai.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the C.M.S., the government will get &lt;a href="http://www.thehindu.com/news/national/indias-surveillance-project-may-be-as-lethal-as-prism/article4834619.ece"&gt;centralized access to all communications metadata and content&lt;/a&gt; traversing through all telecom networks in India. This means that the  government can listen to all your calls, track a mobile phone and its  user’s location, read all your text messages, personal e-mails and chat  conversations. It can also see all your Google searches, Web site  visits, usernames and passwords if your communications aren’t encrypted.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Surveillance.png" alt="Internet Surfing" class="image-inline" title="Internet Surfing" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="caption"&gt;A man surfing a Facebook page at an internet cafe in Guwahati, Assam, on Dec. 6, 2011. &lt;br /&gt;Image Credit: &lt;/span&gt;&lt;span class="credit"&gt;Anupam Nath/Associated Press&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;You might ask: Why is this a problem when the government already had  the same access, albeit in a decentralized fashion? To answer that  question, one has to first examine the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are no laws that allow for &lt;i&gt;mass&lt;/i&gt; surveillance in India.  The two laws covering interception are the Indian Telegraph Act of 1885  and the Information Technology Act of 2000, as amended in 2008, and they  restrict lawful interception to time-limited and targeted  interception.The targeted interception both these laws allow ordinarily  requires case-by-case authorization by either the home secretary or the  secretary of the department of information technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, the colonial government framed better privacy  safeguards into communications interception than did the  post-independence democratic Indian state. The Telegraph Act mandates  that interception of communications can only be done on account of a  public emergency or for public safety.  If either of those two  preconditions is satisfied, then the government may cite any of the  following five reasons: “the sovereignty and integrity of India, the  security of the state, friendly relations with foreign states, or public  order, or for preventing incitement to the commission of an offense.”  In 2008, the Information Technology Act copied much of the interception  provision of the Telegraph Act but removed the preconditions of public  emergency or public safety, and expands the power of the government to  order interception for “investigation of any offense.” The IT Act thus  very substantially lowers the bar for wiretapping.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from these two provisions, which apply to interception, there  are many laws that cover recorded metadata, all of which have far lower  standards. Under the Code of Criminal Procedure, no court order is  required unless the entity is seen to be a “postal or telegraph  authority” — and generally e-mail providers and social networking sites  are not seen as such.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unauthorized access to communications data is not punishable per se, which is why a private detective who gained access to &lt;a href="http://articles.timesofindia.indiatimes.com/2013-04-17/india/38615115_1_anurag-singh-arvind-dabas-naushad-ahmad-khan"&gt;the cellphone records of Arun Jaitley&lt;/a&gt;,  a Bharatiya Janata Party leader, has been charged under the weak  provision on fraud, rather than invasion of privacy. While there is a  provision in the Telegraph Act to punish unlawful interception, it  carries a far lesser penalty (up to three years of imprisonment) than  for a citizen’s failure to assist an agency that wishes to intercept or  monitor or decrypt (up to seven years of imprisonment).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To put the ridiculousness of the penalty in &lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguards-for-interception-monitoring-and-decryption-of-information-rules-2009/"&gt;Sections 69&lt;/a&gt; and &lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009"&gt;69&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009"&gt;B&lt;/a&gt; of the IT Act provision in perspective, an Intelligence Bureau officer who spills national secrets &lt;a href="http://www.vakilno1.com/bareacts/laws/the-intelligence-organisations-restriction-of-rights-act-1985.html"&gt;may be imprisoned up to three years. &lt;/a&gt;And  under the Indian Penal Code, failing to provide a document one is  legally bound to provide to a public servant, the punishment can be &lt;a href="http://indiankanoon.org/doc/54229/"&gt;up to one month’s imprisonment&lt;/a&gt;.  Further, a citizen who refuses to assist an authority in decryption, as  one is required to under Section 69, may simply be exercising her &lt;a href="http://lawcommissionofindia.nic.in/reports/180rpt.pdf"&gt;constitutional right against self-incrimination&lt;/a&gt;. For these reasons and more, these provisions of the IT Act are arguably unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As bad as the IT Act is, legally the government has done far worse.  In the licenses that the Department of Telecommunications grants  Internet service providers, cellular providers and telecoms, there are  provisions that require them to provide direct access to all  communications data and content even without a warrant, which is not  permitted by the existing laws on interception. The licenses also force  cellular providers to have ‘bulk encryption’ of less than 40 bits.  (Since G.S.M. network encryption systems like A5/1, A5/2, and A5/3 have a  fixed encryption bit length of 64 bits, providers in India have been  known use A5/0, that is, no encryption, thus meaning any person — not  just the government — can use off-the-air interception techniques to  listen to your calls.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cybercafes (but not public phone operators) are required to maintain  detailed records of clients’ identity proofs, photographs and the Web  sites they have visited, for a minimum period of one year. Under the  rules designed as India’s data protection law (oh, the irony!),  sensitive personal data has to be shared with government agencies, if  required for “purpose of verification of identity, or for prevention,  detection, investigation including cyber incidents, prosecution, and  punishment of offenses.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Along similar lines, in the rules meant to say when an Internet  intermediary may be held liable for a user’s actions, there is a  provision requiring the Internet company to “provide information or any  such assistance to government agencies legally authorized for  investigative, protective, cybersecurity activity.” (Incoherent, vague  and grammatically incorrect sentences are a consistent feature of laws  drafted by the Ministry of Communications and IT; one of the telecom  licenses states: “The licensee should make arrangement for monitoring  simultaneous calls by government security agencies,” when clearly they  meant “for simultaneous monitoring of calls.”)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a landmark 1996 judgment, the Indian Supreme Court  held that &lt;a href="http://indiankanoon.org/doc/87862/"&gt;telephone tapping is a serious invasion of an individual’s privacy&lt;/a&gt; and that the citizens’ right to privacy has to be protected from abuse  by the authorities. Given this, undoubtedly governments must have  explicit permission from their legislatures to engage in any kind of  broadening of electronic surveillance powers. Yet, without introducing  any new laws, the government has surreptitiously granted itself powers —  powers that Parliament hasn’t authorized it to exercise — by sneaking  such powers into provisions in contracts and in subordinate legislation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india'&gt;https://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T10:20:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
