<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 181 to 195.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/events/using-social-media-for-mobilisation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/use-of-visuals-and-nudges-in-privacy-notices"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/et-prime-sandhya-sharma-august-19-2019-us-pressure-threatens-to-weaken-data-localisation-mandate-in-indias-landmark-data-protection-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/us-clampdown"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/times-of-india-march-6-2015-uploaded-and-blocked-a-daylong-battle-rages-on-web-over-bbc-documentary"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/d-w-april-15-2013-untangling-the-web-of-indias-ungovernable-net"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/unpacking-data-protection-law-a-visual-representation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/aria-thaker-quartz-india-march-12-2019-twitter-unlike-facebook-barely-carries-political-ads-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/uid-and-npr"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/unique-identity-project"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/uid-and-npr-a-background-note"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/unique-id-system-pros-and-cons"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/unicef-nasscom-foundation-workshop-on-child-online-protection"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/unesco-open-forum"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/asia-pacific-regional-internet-governance-forum-aprigf-2017"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/events/using-social-media-for-mobilisation">
    <title>Using Social Media for Mobilisation</title>
    <link>https://cis-india.org/events/using-social-media-for-mobilisation</link>
    <description>
        &lt;b&gt;Panel discussion with Dina Mehta and Peter Griffin&lt;/b&gt;
        
&lt;div&gt;For some time now, blogs, facebook &amp;nbsp;and other forms of social
media have been used&amp;nbsp;extensively&amp;nbsp;for rallying people around an issue or
a cause. However, what makes some of these campaigns more successful
than others? Does the workability of social media for mobilisation
depend on the manner in which information is designed
and/or&amp;nbsp;disseminated?&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;This panel brings together two well-known names
from the world of social media, Dina Mehta and Peter Griffin, to
explore "meme engineering" and understand what makes some forms of use
of social media more effective than others.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;&lt;strong&gt;Speakers&lt;/strong&gt;&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Dina Mehta i&lt;span class="Apple-style-span"&gt;s
a founder and Managing Director of Mosoci India. She has spent twenty
years specializing in qualitative research and ethnography. She is at
the forefront of technology trend research in India and works with a
global portfolio of companies; including learning journeys, and
immersions for innovation teams. She brings her unique perspective to
understanding the emerging social aspects of new technology and the
impact of new media on youth and mobility.&amp;nbsp;Her work has led her to
study the impact of technology in rural markets, follow trend-setting
youth in urban settings, dig deep into motivations and possible
triggers across a wide range of demographic and psychographic groups,
explore and identify underlying value propositions and key
drivers/barriers in several categories.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Peter Griffin is a well-known blogger and has&amp;nbsp;been
involved with a number of collaborative projects, including the
South-East Asia Earthquake and Tsunami blog (also known as
TsunamiHelp), MumbaiHelp, Think Bombay, and the WorldWideHelp group and
its associated projects. All of these project have been concerned with
bringing together the web and free tools on one hand, and concerned web
natives and public goodwill on the other, to assist in disaster relief.
Peter is also the co-founder, joint editor and co-moderator of the
writing community, Caferati. He is currently associated with a national business magazine in the capacity of editor, special features.&lt;br /&gt;
&lt;h3&gt;Time and Date&lt;/h3&gt;
&lt;p&gt;Friday, 19 June, 2009; 6.30-8.00 pm&lt;/p&gt;
&lt;h3&gt;Venue&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Centre for Internet and Society, No. D2, 3rd Floor, Sheriff Chambers, 
14, Cunningham Road, Bangalore - 560052&lt;/p&gt;
&lt;h3&gt;Map &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;For a map, please click &lt;a class="external-link" href="http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=centre+for+internet+and+society+bangalore&amp;amp;jsv=128e&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=61.070016,113.203125&amp;amp;ie=UTF8&amp;amp;cd=1&amp;amp;latlng=12988395,77594450,9857706471034889432&amp;amp;ei=5QXRSKLrNYvAugPX4YSAAg"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/using-social-media-for-mobilisation'&gt;https://cis-india.org/events/using-social-media-for-mobilisation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sachia</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-05T04:33:30Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/use-of-visuals-and-nudges-in-privacy-notices">
    <title>Use of Visuals and Nudges in Privacy Notices</title>
    <link>https://cis-india.org/internet-governance/blog/use-of-visuals-and-nudges-in-privacy-notices</link>
    <description>
        &lt;b&gt;Nudging in privacy notices can be a privacy-enhancing tool. For example, informing users of how many people would have access to their data would help them make a decision. However, nudges can also be used to influence users towards making choices that compromise their privacy. For example, the visual design of default options on digital platforms currently nudge users to share their data. It is critical to ensure that there is mindful use of nudges, and that it is directed at the well being of the users.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Edited by Elonnai Hickok and Amber Sinha&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Former Supreme Court judge, Justice B.N. Srikrishna, who is currently involved in drafting the new data-privacy laws for India, was quoted recently by the Bloomberg&lt;a name="_ftnref1" href="#_ftn1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt;. Acknowledging the ineffectiveness of consent forms of tech companies that leads to users’ data being collected and misused, he asked if we should have pictograph warnings for consent much like the warnings that are given on cigarette packets. His concern is that an average Indian does not realise how much data they are generating or how it is being used. He attributed this to the access issues with the consent forms presented by companies which are in the English language. In the Indian context, Justice Srikrishna pointed out, considerations around literacy and languages should be addressed.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The new framework being worked on by Srikrishna and his committee comprising academics and government officials, would make the tech companies more accountable for data collection and use, and allow users to have more control over their own data. But, in addition to this regulatory step towards privacy and data protection, the concern towards communication of companies’ data practices through consent forms or privacy notices is also critical for users. Currently, the cryptic notices are a barrier for users, as are the services that do not provide incremental information about the use of the service - for example, what data is being shared with how many people or what data is being collected at what point, instead relying on blanket consent forms taken at the beginning of a service. Visuals can go a long way in making these notices and services accessible to users.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Although, Justice Srikrishna chose the extreme example of warnings on cigarette packets, visually depicting the health risks of cigarette smoking using repulsive imagery, the underlying intent seems to be of using visuals as a means of giving an immediate and clear warning about how people’s data is being used and by whom. It must be noted that the effectiveness of warnings on cigarette packets is debatable. These warnings are also a way in which manufacturers consider their accountability met, which is a possible danger with privacy notices as well. Most companies consider that their accountability is limited to giving all the information to the users without ensuring that the information is communicated to help the user understand the risks. Hence, one has to be cautious of the role of visuals in notices so that they are used with the primary purpose of meaningful communication and accessibility that can be used to inform further action. The visual summary of the data practice in terms of how it will affect the user will also serve as a warning.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The warning images on cigarette packets are an example of the user-influencing design approach called nudging&lt;a name="_ftnref2" href="#_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. While nudging techniques are meant to be aimed at the users’ well being, it brings forward the question of who decides what is beneficial for the users. Moreover, the harm in cigarette smoking is more obvious, and thus the favourable choice for the users is also clearer. But, in the context of data privacy, the harms are less apparent. It is difficult to demonstrate the harms or benefits of data use, particularly when data is re-purposed or used indirectly. There is also no single choice that can be pushed when it comes to the use and collection of data. Different users may have different preferences or degrees to which they would like to allow the use of their data. This raises deeper questions about the extent to which privacy law and regulation should be paternalistic.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Nudges are considered to follow the soft or libertarian paternalism approach, where the user is not forbidden any options but only given a push to alter their behaviour in a predictable way&lt;a name="_ftnref3" href="#_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. It is crucial to differentiate between the strong paternalistic approach that doesn’t allow a choice at all, the usability approach, and the soft paternalistic approach of nudging, as mentioned by Alessandro Acquisti in his paper, ‘The Behavioral Economics of Personal Information’&lt;a name="_ftnref4" href="#_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. In the usability approach, the design of the system would make it intuitive for users to change settings and secure their data. The soft paternalistic approach of nudging would be a step further and present secure settings as a default. Usability is often prioritised by designers. However, soft paternalism techniques help to enhance choice for users and lead to larger welfare&lt;a name="_ftnref5" href="#_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Nudging in privacy notices can be a privacy-enhancing tool. For example, informing users of how many people would have access to their data would help them make a decision&lt;a name="_ftnref6" href="#_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. However, nudges can also be used to influence users towards making choices that compromise their privacy. For example, the visual design of default options on digital platforms currently nudge users to share their data. It is critical to ensure that there is mindful use of nudges, and that it is directed at the well being of the users.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The design of privacy notices should be re-conceptualised to ensure that they inform the users effectively, keeping in mind certain best practices. For instance, a multilayered privacy notice can be used, which includes a very short notice designed for use on portable digital devices where there is limited space, condensed notice that contains all the key factors in an easy to understand way, and a complete notice with all the legal requirements&lt;a name="_ftnref7" href="#_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. Along with the layering of information, the timing of notices should also be designed to be at setup, just in time of the user’s action, or at periodic intervals. In terms of visuals, infographics can be used to depict data flows in a system. Another best practice is to integrate privacy notices with the rest of the system. Designers are needed to be involved early in the process so that the design decisions are not purely visual but also consider information architecture, content design, and research.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Practice based frameworks should be developed for communication designers in order to have a standardised vocabulary around creating privacy notices. Additionally, multiple user groups and their varied privacy preferences must be taken into account. Finally, an ethical framework must be put into place for design practitioners in order to ensure that the users’ well being is prioritised, and notices are designed to facilitate informed consent. Further recommendations and concerns regarding the design of privacy notices, and the use of visuals can be read &lt;a href="https://cis-india.org/internet-governance/blog/design-concerns-in-creating-privacy-notices"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Justice Srikrishna’s statement is an important step towards creating effective privacy notices with visuals. The conversation on the need to design privacy notices can lead to clearer and more comprehensible notices. Combined with the enforcement of fair collection and use of data by companies, well designed notices will allow users more control and a real choice to opt-in or out of a service and make informed choices as they engage with a service. Justice Srikrishna’s analogy seems to recommend using visuals to describe what type of data is being collected and for what purposes at the time of taking consent. Though cigarette warnings may not be the most appropriate analogy, this is a good start, and it is important to explore how visuals and design can be used throughout a service - from beginning to end - to convey and promote awareness and informed choices by users. It is also important to extend this conversation outside of privacy into the realm of security and understand how visuals and design can inform users’ awareness and personal choices around security when using a service.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.bloomberg.com/news/articles/2018-06-10/tech-giants-nervous-as-judge-drafts-first-data-rules-in-india"&gt;https://www.bloomberg.com/news/articles/2018-06-10/tech-giants-nervous-as-judge-drafts-first-data-rules-in-india&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.ijdesign.org/index.php/IJDesign/article/viewFile/1512/584"&gt;http://www.ijdesign.org/index.php/IJDesign/article/viewFile/1512/584&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn3" href="#_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.andrew.cmu.edu/user/pgl/psosm2013.pdf"&gt;https://www.andrew.cmu.edu/user/pgl/psosm2013.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn4" href="#_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.heinz.cmu.edu/~acquisti/papers/acquisti-privacy-nudging.pdf"&gt;https://www.heinz.cmu.edu/~acquisti/papers/acquisti-privacy-nudging.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn5" href="#_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.heinz.cmu.edu/~acquisti/papers/acquisti-privacy-nudging.pdf"&gt;https://www.heinz.cmu.edu/~acquisti/papers/acquisti-privacy-nudging.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn6" href="#_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://cis-india.org/internet-governance/files/rethinking-privacy-principles"&gt;https://cis-india.org/internet-governance/files/rethinking-privacy-principles&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn7" href="#_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/ten_steps_to_develop_a_multilayered_privacy_notice__white_paper_march_2007_.pdf"&gt;https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/ten_steps_to_develop_a_multilayered_privacy_notice__white_paper_march_2007_.pdf&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/use-of-visuals-and-nudges-in-privacy-notices'&gt;https://cis-india.org/internet-governance/blog/use-of-visuals-and-nudges-in-privacy-notices&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>saumyaa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-08-22T13:16:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/et-prime-sandhya-sharma-august-19-2019-us-pressure-threatens-to-weaken-data-localisation-mandate-in-indias-landmark-data-protection-bill">
    <title>US pressure threatens to weaken data - localisation mandate in India's landmark data-protection bill</title>
    <link>https://cis-india.org/internet-governance/news/et-prime-sandhya-sharma-august-19-2019-us-pressure-threatens-to-weaken-data-localisation-mandate-in-indias-landmark-data-protection-bill</link>
    <description>
        &lt;b&gt;Sources say the bill may have to concede vital ground to technology companies.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sandhya Sharma was &lt;a class="external-link" href="https://prime.economictimes.indiatimes.com/news/70730415/technology-and-startups/us-pressure-threatens-to-weaken-data-localisation-mandate-in-indias-landmark-data-protection-bill"&gt;published by ET Prime&lt;/a&gt; on August 19, 2019. Arindrajit Basu was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Indian law-enforcement agencies have repeatedly expressed their unhappiness with America’s reticence on the sharing of critical data — whether it was around the 26/11 Mumbai attacks or procuring electronic evidence under the Mutual Legal Assistance Treaty (MLAT) from technology companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Top cybersecurity sources in the government tell ET prime that India’s own Personal Data Protection (PDP) Bill 2019 is in response to this. Cabinet nod to the bill is expected anytime, and it is likely to be tabled in the next session of Parliament. However, thanks to diplomatic pulls and pressures, a vital provision of the bill could end up markedly diluted. Sources in the Indian government say the US has conveyed it does not want the bill at all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We expect it will be a better mechanism than MLAT” for procuring data from technology companies, says a person aware of the development, while adding that the thorny question of data localisation is now a very small part of the bill. Across key bilateral engagements — US Secretary of State Mike Pompeo’s June visit to India, G20 meetings between Prime Minister Narendra Modi and President Donald Trump, and a US trade representative delegation visiting India for talks — American unease with the growing “protectionism” in Indian policy has remained a key talking point.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Forum members oppose data localisation policies, and we look forward to sharing our concerns when the data protection bill gets introduced in Parliament,” says Susan Ritchie, vice-president of technology, media, and telecommunications at lobby group U.S. India Strategic Partnership Forum (USISPF).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“An environment where regulatory coherence is a governmental priority provides industry with greater predictability and stability resulting in increased investment." A toothless treaty? According to policy experts, MLATs have been the most widely used method for cross-border data sharing. India has signed MLATs with 39 countries, including the US. These treaties give India access to data stored on the cloud and call for data stored by multinational service providers within the jurisdiction of the partner country. However, MLATs are time consuming and have failed in their basic function in the past, sources say, and hence the government was keen to hold the data of Indians back in India, including data pertaining to e-commerce transactions, banking, healthcare, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the Justice Srikrishna Committee report, eight of the 10 most accessed websites by Indians are owned by US entities. If data is exclusively processed in India, it will potentially cut off foreign surveillance, the report also notes, while highlighting a three-pronged approach to Indian data to reduce dependence on MLATs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Talking exclusively to ET Prime, Justice BN Srikrishna says, “MLAT is a long-drawn process and hence the process goes through several diplomatic and judicial channels. It takes anywhere between 18 months to two years to get the information from the foreign technology companies for any investigation [and] much more time for extracting information on taxation and other financial matters…. Once the data of Indian citizens is in India, it will be much easier for law enforcement agencies to take the data for investigation purposes. In the past, the technology companies have dilly-dallied on the information requests of Indian law enforcement agencies.” To be sure, the report does not claim "perfect compliance" through data localisation and it clarifies that for data owned by companies like Google a "conflict of law" might arise if the country of registration — in this case the US — also asserts jurisdiction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the report, between January and June 2017, Google received 3,843 user data-disclosure requests by Indian governmental agencies. Google refused to provide data in 46% of the cases. Now with the PDP Bill, Indian officials can easily get their hands on the data of Indian citizens not residing in India, says Justice Srikrishna. US resistance US tech-industry insiders tell ET Prime on condition of anonymity that no law-enforcement agency should be allowed 100% unfettered access to information. They claim MLATs have been successful in most cases of intelligence sharing around terrorism and national security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“National security” is a very wide concept in India, unlike in the US where it generally refers to international activities, they say. Jacob Gullish, senior director for digital economy at the lobby group US India Business Council (USIBC), says the term MLAT is often used incorrectly as a catch-all. MLATs are designed for a very narrow and a specific purpose: where the transmitted information is admissible in the foreign country’s judicial system, he says. “In these cases, information has to be handled carefully to ensure the request complies with domestic laws and the transmission is certified for authenticity and a chain of custody, as well as packaged to allow its use as evidence in a foreign court. This process takes time, and the business community supports MLAT reform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Just like in the physical world, due process rights for the citizens of the world’s largest and the world’s oldest democracies must be respected in the digital domain. Companies also need legal certainty when operating between different jurisdictions. The bottom line is that law enforcement agencies (LEAs) on both sides need to develop clear processes and procedures, as well as trusted relationships, which will facilitate information exchange during an investigation.” A Google spokesperson echoes Gullish. “On urging from us and other Internet companies, MLAT processes have improved and in most cases responses are provided in a week or two,” the spokesperson says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In addition, we are also advocating for MLAT reform, including supporting calls to invest over [USD20 million] to address insufficient staffing, and helping investigators around the world better understand the MLAT process, to help expedite requests.” Other industry insiders claim that US companies field a high volume of requests and respond quickly for the most part, and that ultimately all of this goes back to trust. In December 2011, a Delhi court had issued summons to 21 companies, including Facebook, Microsoft, Google, Yahoo, and YouTube, to face trial for allegedly hosting objectionable content promoting hatred or communal disharmony.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The then IT Minister Kapil Sibal had asked Google and Facebook to ensure prompt removal of offensive material, complaining that the companies had not cooperated in the past. Concerns with data-localisation norms in the present state 1. Diplomatic and political: Data-localisation mandates could impact India’s trade relationships with partners like the US. 2. Security risks (“Regulatory stretching of the attack surface”): Storing data in multiple physical centres increases the exposure to exploitation by malicious actors. 3. Economic impact: Restrictions on cross-border data flow may harm economic growth by increasing compliance costs and entry barriers for foreign service providers, thereby reducing investment or forcing businesses to pass on these costs to the consumers. The major cost pertains to setting up data centres in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, for startups looking to attain global stature, reciprocal restrictions slapped by other countries can be a serious hurdle. “Data localisation would be most effective if it is — (a) done after India updates its privacy and security standards by passing the Personal Data Protection Bill 2019; (b) done sectorally, after considering how critical it is to store the data in India; (c) done conditionally in (i) the country where data is transferred having equivalent privacy and security safeguards, both de jure and de facto and (ii) the presence of an executive data sharing agreement,” says Arindrajit Basu, senior policy officer at New Delhi-based think tank Centre for Internet and Society. This is essentially what the international community describes as “free flow of data with trust” — the G20 mandate which India recently rejected. Can the US CLOUD Act solve for the lack of information access? A section of policy experts argues that the localisation mandate proposed in India’s new bill does not solve an important problem: What happens when law-enforcement agencies need access to data relating to a foreigner stored in a server located in another jurisdiction by a company incorporated in the US? Will the Clarifying Lawful Overseas Use of Data Act (CLOUD Act) passed in the US last year help?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The US has recently amended the CLOUD Act after a dispute between Microsoft and the US government. The law now ensures two things: American law-enforcement agencies will get access to data held by US cloud service providers (CSPs) regardless of jurisdiction, and allow “qualified foreign governments” to access data stored by US CSPs. This has given rise to a view that the CLOUD Act could be the silver bullet countries like India need to push US tech companies to share data in a timely fashion. Basu of the Centre for Internet and Society says, “India should use the threat of data localisation to negotiate an executive arrangement under the CLOUD Act. India would fare better if it were to use the language of international law to articulate its position in the MLAT reform process, or to propel itself to a better position under the CLOUD Act (which requires countries to demonstrate a commitment to a free and open Internet) or potentially pursue negotiations for a multilateral data sharing treaty.” Siddharth Jain, assistant commissioner in Delhi Police and an expert in investigating cyber-crime issues, says Indian technology firms do provide adequate and timely information about suspicious transactions; however, US firms are lax in sharing information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Telangana IPS officer Rema Rajeshwari concurs that it’s a problem for law-enforcement agencies to cull out information from some US technology companies. Data-protection bill already diluted? ET Prime has learned that the net result of the pulls and pressures exerted by US commercial and diplomatic interests is that data localisation now remains just a small part of India’s data-protection bill. The Ministry of External Affairs maintains that the US-India relationship is “extremely important”. After President Trump’s controversial comments on offering mediation on the Kashmir issue, ministry spokesperson Raveesh Kumar said, “We are very strong strategic partners and we have brought in deep convergences across a range of issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We have excellent trade and investment linkages and are moving toward high defence and technology tie-up.” It’s not just political posturing by India to maintain the tricky relationship at a time when the Trump administration is coming up with reports one after the other criticising the country’s proposed data-protection policies. The PDP Bill was listed to be tabled in Parliament in the first session of the Modi 2.0 government but is yet to see the light of the day. If India tables the draft bill without making concessions that ease the demands on US technology companies, it will severely harm the India-US technology relationship, according to some US policy lobbyists. However, government sources tell ET Prime that the bill now has “data localisation as a very small part”, meaning that it is already likely diluted due to US pressure tactics. Sources say the non-critical data of an individual like height, weight, bank-account number, etc., will not need to be mandatorily stored in India. However, biometric data will have to be stored locally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Top policymakers who were consulted for the Justice Srikrishna Committee report say should the bill be diluted under duress, it will be a sorry statement for India’s data-protection regime. Meanwhile, with nationalistic sentiments in full flourish during the new Modi government’s first Parliament session, the Ministry of Electronics and Information Technology issued a note that “the bill being prepared will address India’s sovereign data concerns and provide a framework to boost innovation in India while complying with the directives contained in the judgment of [the Honourable Supreme Court]”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India and EU: a potential template In contrast to the Indo-US friction, India’s understanding with the European Union (EU) on the issue of data protection offers a potential template. India is looking at dialing EU to seek ‘adequacy’ status with the General Data Protection Regulation (GDPR) once it passes the PDP Bill. Tomasz Kozlowski, EU Ambassador to India, said at the recent ET 5G Congress, “Data protection is an important element of EU-India cooperation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With such a law in place, India will be joining the global trend of global convergence toward a modern data-protection law, and take a leadership role in the region and globally, at a time when the need to address challenges to data privacy and security requires a common approach.” Kozlowski added that the “adoption of strong data protection law will also pave way for EU-India discussions and further facilitate data flows.” Top cybersecurity sources in the Indian government point out that the US has agreed to GDPR, which is far more stringent than the Indian Bill. If so, why make noise about India’s data-localisation demands?&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/et-prime-sandhya-sharma-august-19-2019-us-pressure-threatens-to-weaken-data-localisation-mandate-in-indias-landmark-data-protection-bill'&gt;https://cis-india.org/internet-governance/news/et-prime-sandhya-sharma-august-19-2019-us-pressure-threatens-to-weaken-data-localisation-mandate-in-indias-landmark-data-protection-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sandhya Sharma</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-08-22T01:41:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/us-clampdown">
    <title>US Clampdown Worse than the Great Firewall </title>
    <link>https://cis-india.org/internet-governance/us-clampdown</link>
    <description>
        &lt;b&gt;If you thought China’s Internet censorship was evil, think again. American moves to clean up the Web could hurt global surfers, writes Sunil Abraham in this article published in Tehelka, Volume 8, Issue 50, 17 December 2011.&lt;/b&gt;
        &lt;p&gt;TWO PARTICULARLY terrible pieces of legislation — the PROTECT-IP Act and the Stop Online Piracy Act (SOPA) — have been introduced in the US Senate and House of Representatives. If passed, the US administration will be empowered to shut down specific websites using the same four measures it employed in its failed attempt to shut down WikiLeaks — domain name system (DNS) filtering, blocking financial transfers via financial intermediaries, revoking hosting and sanitising search engine results. SOPA represents the perfect policy interest overlap between a State clamping down on freedom of expression and IPR-holders protecting their obsolete business models. After all it was Bono who publicly articulated the unspoken desire of many right-holders: “We know from China’s ignoble effort to suppress online dissent that it’s perfectly possible to track content.”&lt;/p&gt;
&lt;p&gt;China fortunately only censors the Internet for its own citizens, the Great Firewall does not, for example, prevent access to knowledge by Indian netizens. SOPA will enable the US to censor the global Internet unilaterally. The Great Firewall can be circumvented using tools like Tor, but SOPA will in many ways make its targets disappear for the average user. DNS filtering, even when implemented in a single country, has global consequences. DNS, one of the foundational mechanisms of the Internet, is an address look-up service that allows users to translate domain names (e.g. cisindia.org — easier for humans to remember) into IP addresses (e.g. 202.190.125.69 — easier for machines). The most critical servers in the global DNS hierarchy are the root servers, or today’s server clusters. Mandated DNS filtering would result in some DNS servers returning different IP addresses than other DNS servers for certain domain names. With PROTECT-IP and SOPA, these global consequences would be at unprecedented levels given that seven of the 13 server clusters that constitute the DNS root fall within US jurisdiction. We already have some indication where this is headed. The US Immigration and Customs Enforcement Agency announced recently that it has seized 150 domain names for alleged IPR infringement.&lt;/p&gt;
&lt;p&gt;We must remember that IPR policy in some countries has been configured in public interest to take advantage of the exceptions and limitations afforded by the TRIPS (trade-related aspects of IPR) agreement. In others, even though the letter of the law goes beyond TRIPS requirements, access by ordinary citizens is protected because of poor enforcement of these maximalist policies. E-commerce platforms that sell Micromax, Karbonn, Spice and Lava mobile phones that are manufactured in China may be taken offline because an American court is convinced of patent infringement. An online publisher of George Orwell’s books, which are public domain in Russia, India and South Africa but still under copyright in the US and Europe, may have its Paypal account blocked.&lt;/p&gt;
&lt;div class="pullquote"&gt;After the witch-hunt against WikiLeaks, policymakers have realised the extent of American hypocrisy&lt;/div&gt;
&lt;p&gt;In the recent past, activists in authoritarian regimes and democracies with draconian Internet laws have leveraged US Internet freedom rhetoric. This was first deployed by Hillary Clinton in early 2010 after Google’s melodramatic withdrawal from China. Even then, many observers were convinced that this was just selective tokenism and the real agenda was domination of global markets by US-based MNCs. Today, after the witch-hunts against WikiLeaks and Anonymous, global policymakers have realised the extent of American hypocrisy.&lt;/p&gt;
&lt;p&gt;Fortunately, opposition for SOPA has cut across traditional political and ideological divides — libertarians, liberal human rights organisations and political conservatives who believe in small government and also modern- day capitalists like Google, Facebook and Twitter. Let us pray that Kapil Sibal registers his protest with the Obama administration to protect the online aspirations of millions of Indian citizens and entrepreneurs.&lt;/p&gt;
&lt;p&gt;Read the original published in Tehelka &lt;a class="external-link" href="http://www.tehelka.com/story_main51.asp?filename=Op171211proscons.asp"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/us-clampdown'&gt;https://cis-india.org/internet-governance/us-clampdown&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-01-26T20:42:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/times-of-india-march-6-2015-uploaded-and-blocked-a-daylong-battle-rages-on-web-over-bbc-documentary">
    <title>Uploaded and blocked, a daylong battle rages on the web over BBC documentary</title>
    <link>https://cis-india.org/internet-governance/news/times-of-india-march-6-2015-uploaded-and-blocked-a-daylong-battle-rages-on-web-over-bbc-documentary</link>
    <description>
        &lt;b&gt;It was a daylong tussle between uploads and takedowns. Netizens kept uploading the controversial BBC documentary, 'India's Daughter', on video-sharing websites even as several of them were blocked within hours on Thursday. By 9pm, the hour-long film had been removed from at least four locations on YouTube. One of them had already gathered over 1.04 lakh views by then. The documentary which deals with the December 16 Nirbhaya rape case was still available on another video-sharing website, dailymotion.com, where two of three such uploads even had an advertisement preceding the video. It could also be seen on vimeo.com, another video-sharing service.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Kim Arora was &lt;a class="external-link" href="http://m.timesofindia.com/india/Uploaded-and-blocked-a-daylong-battle-rages-on-the-web-over-BBC-documentary/articleshow/46472422.cms"&gt;published in the Times of India&lt;/a&gt; on March 6, 2015. Rohini Lakshane is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Around 4.30pm, the video on the channel "Game Pundits"  titled 'India's Daughter: Indian rapist BBC Documentary Delhi Nirbhaya  Full HD' was removed by YouTube. It instead carried the message: "This  content is not available on this country domain due to a court order."  The video here had gathered over 3,500 views.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By late evening, the video uploaded from an account by  the name of Robin Kankerwal was taken down, displaying the same  message. On channels "7thave" and "Kate Bevan" the videos were taken  down over a copyright violation claim by BBC itself.&lt;br /&gt; &lt;br /&gt; A YouTube  spokesperson told TOI over email: "While we believe that access to  information is the foundation of a free society, and that services like  YouTube help people express themselves and share different points of  view, we continue to remove content that is illegal or violates our  community guidelines, once notified."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the rising crescendo of the debate around the  documentary, experts point to what is known as the "Streisand effect" on  the internet, which is, the attempt at censoring or hiding something  leading to increased discussion and exposure of the subject.  #IndiasDaughter was among the top trends on both Facebook and Twitter on  Thursday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"My research shows that such content is virulently  shared online and offline—through peer-to-peer sharing networks, popular  messaging services such as WhatApp, through DVDs, through video-sharing  and file-sharing websites. Even when it is taken down from the place  where it was first posted, it stays on in assorted web archives and  caches. The usual methods of weeding out web search results and  directing ISPs to block URLs are mostly ineffectual. There is an  indelible digital footprint," says Rohini Lakshane, a researcher at  Bangalore-based Center for Internet Society.&lt;br /&gt; &lt;br /&gt; The online  discussion around the film centered along three threads. There were  those who wanted it made freely available and the rapists publicly  shamed, those who wanted it to not be aired for fear of giving a rapist  an international platform, and others who pointed to the complex legal  problems associated with the convicted rapist's interview since his  appeal is still pending before the SC.&lt;br /&gt; &lt;br /&gt; The top rated comment on  Bevan's YouTube video was by one Tushar Lall, who wrote: "I'm from  India...They've banned this documentary. I'm sure this will get taken  down really soon. I might not be able to watch it again. But thanks to  you, [name withheld]'s story is out there." Dhirajj Kumar wrote: "I  don't kno y dis documentary is ban on air. India hav right to know, wat  rapist think abt girl. thanks bbc (sic)."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/times-of-india-march-6-2015-uploaded-and-blocked-a-daylong-battle-rages-on-web-over-bbc-documentary'&gt;https://cis-india.org/internet-governance/news/times-of-india-march-6-2015-uploaded-and-blocked-a-daylong-battle-rages-on-web-over-bbc-documentary&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-03-10T02:37:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/d-w-april-15-2013-untangling-the-web-of-indias-ungovernable-net">
    <title>Untangling the web of India's 'ungovernable' Net</title>
    <link>https://cis-india.org/news/d-w-april-15-2013-untangling-the-web-of-indias-ungovernable-net</link>
    <description>
        &lt;b&gt;India sells itself as a tech hub, outsourcing IT experts to the world. At home, it dreams of "equity on the Net." But millions remain unconnected and digital surveillance is on the rise. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This was &lt;a class="external-link" href="http://www.dw.de/untangling-the-web-of-indias-ungovernable-net/a-16740896"&gt;published in Deutsche Welle&lt;/a&gt; on April 15, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Indian government has a dream. It dreams of the "Equinet" - a time when "there shall be equity on the Net."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The Internet must not just be a platform for the privileged - the  Internet must become an inclusive platform," India's communications  minister Kapil Sibal says. "In fact, my vision is that the Internet  should ultimately become the Equinet. In other words, all those, no  matter which station in life they belong to, should have access to the  Internet, and that can only happen if all the elements of the Internet  are such that people can access them at affordable costs."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has the third highest number of people on the Net, with about 150 million people connected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But with a population of 1.2 billion, 150 million is not that many.  Internet penetration languishes at around 10 percent, while in the  United States and China - the top two countries in world rankings -  Internet penetration is at 78 and 40 percent, respectively.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Like in America… in 1994&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It's a fact that Google chairman Eric Schmidt highlighted on a recent tour of India, among other Asian countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The Internet feels [in India] like in America in 1994," he says. "It is  crucial for India to invest and enable fast fiber Internet connectivity  within the country, between the country and the other countries."&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Schmidt.png" alt="Schmidt" class="image-inline" title="Schmidt" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span&gt;While touring Asia, Schmidt said India seemed to have "rested on its laurels" after early success in the IT sector &lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;You would think that connectivity would be better in India. The country  prides itself on being a tech hub, with its centers of excellence in  places like Bangalore. It has outsourced information technology  specialists globally for over ten years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Communications minister Sibal insists the government is investing where  it can, saying India will connect 250,000 villages with fiber optics in  the "next year or so."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The networks should be in place, the fiber optics should be in place,  [connectivity] should be efficient and of high speed, and above all, the  access to handsets, which is really the key - unless handsets are  affordable and accessible to ordinary people, you will not get the kind  of penetration that you want from the Internet," he adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, for some, there are even greater challenges for India than poor connectivity and bad infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;All eyes on you&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In mid-March, police in India's financial capital Mumbai launched the country's first "Social Media Lab."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mumbai police say they will use it to monitor and track "which topics  are trending among the youth so [they] can plan law and order in a good  way."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Mumbai Social Media Lab comes amid concerns over "moral policing" of  the Net by Indian authorities, and censorship - especially where  comments involve political figures. The Times of India reports numerous  requests by authorities to have content removed by Google and Twitter.  There have also been arrests under the remit of a controversial section -  66A - of India's IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sibal denies India wants to censor the Net. If people have been arrested  under Section 66A of the IT Act, it's because police officials have  either misread the law, or acted independently, he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Yes, but I would say, from where does this emanate? Does it emanate  with a complete understanding at the top?" asks V.C. Vivekanandan,  director of the Institute of Global Internet Governance and Advocacy.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Kapil.png" alt="Kapil Sibal" class="image-inline" title="Kapil Sibal" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span&gt;Indian communications minister Kapil Sibal says "Internet governance is an oxymoron"&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;"There are various, multiple layers of governance in a huge country like  India, where people could be enthusiastic in their own way about  thinking what is right and wrong," says Vivekanandan. "So, I don't  really see censorship as such, but they would like to have discourse in a  model which was pre-Internet."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Tracking private lives&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But in other areas, India is showing itself to be very comfortable in  the Internet age - and where it has its eyes fixed on the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"From what I can tell, the social media monitoring cell in Mumbai is  perhaps one of the more benign components because it isn't keeping track  of private communications," says Sunil Abraham, executive director of  the Centre for Internet and Society (CIS) in Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the Indian government plans to track everybody's online  activities - that means anything that uses the Internet as a  communication network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There are very many other projects like the unique identification (UID)  and the National Intelligence Grid (NATGRID) that will keep track of  private communications," says Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UID is the Indian government's centralized biometric identity  management system, which will connect more than 20 databases that 12  intelligence and law enforcement agencies will be able to access.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"These databases include banking records, telecommunications records and  travel records [among other things]," says Abraham. "So, it's a very  large scale attempt by the Indian government to place citizens under 360  degree blanket surveillance."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet governance is an oxymoron&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But how these moves square with Sibal's vision of the Equinet is hard to see.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Mohit.png" alt="Mohit Sharma" class="image-inline" title="Mohit Sharma" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span&gt;This Delhi laywer, Mohit Sharma, is one of only 11 percent of Indians who are connected to the Internet &lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The communications minister believes Indians will not be dissuaded from using the Net.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The fact that 150 million people are on the Net is evidence of the fact  that they are not scared, and if you go to Twitter today, there are  more abuses on Twitter than perhaps you can find anywhere else in the  world," says Sibal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That doesn't necessarily mean that the government thinks this is a good  thing. But Sibal insists he is against Internet governance - in fact, he  says "Internet governance is an oxymoron."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"How can you govern something that cannot be governed? Because anybody  can say anything on the Net," says Sibal. "So, there should be an  element of self-regulation. Just as we interact with each other in  civilized society, similarly people on the Net should also interact with  each other with self-restraint."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the CIS's Sunil Abraham isn't convinced.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"If one listens very carefully to what the minister says, he says you  cannot regulate the Internet. But you can regulate what citizens do on  the Internet," he says. "You can regulate what corporations do on the  Internet. And you can also regulate what the government does on the  Internet."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/d-w-april-15-2013-untangling-the-web-of-indias-ungovernable-net'&gt;https://cis-india.org/news/d-w-april-15-2013-untangling-the-web-of-indias-ungovernable-net&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-16T06:06:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/unpacking-data-protection-law-a-visual-representation">
    <title>Unpacking Data Protection Law: A Visual Representation</title>
    <link>https://cis-india.org/internet-governance/blog/unpacking-data-protection-law-a-visual-representation</link>
    <description>
        &lt;b&gt;This visual explainer unpacking data protection law was developed by Amber Sinha (research) and Pooja Saxena (design), and published as part of the Data Privacy Week celebrations on the Privacy International blog. Join the conversation on Twitter using #dataprivacyweek.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Cross-posted from &lt;a href="https://medium.com/@privacyint/unpacking-data-protection-300e51c5f9b5" target="_blank"&gt;Privacy International blog&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;Credits: Flag illustrations, when not created by the authors, are from &lt;a href="http://www.freepik.com/" target="_blank"&gt;Ibrandify / Freepik&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;img src="https://github.com/cis-india/website/blob/master/img/AS-PS_UnpackingDataProtectionLaw_2018_01.png?raw=true" alt="Data protection law systems are usually seen as a dichotomy between the United State of America and the European Union" width="80%" /&gt;
&lt;img src="https://github.com/cis-india/website/blob/master/img/AS-PS_UnpackingDataProtectionLaw_2018_02.png?raw=true" alt="This dichotomy is not an accurate representation of the issue. Today, close to a hundred countries follow the omnibus approach, while less than a dozen, including the US, use the sectoral approach." width="80%" /&gt;
&lt;img src="https://github.com/cis-india/website/blob/master/img/AS-PS_UnpackingDataProtectionLaw_2018_03.gif?raw=true" alt="If too many laws apply to the same actor, compliance becomes difficult. As a result, the sectoral approach to data protection is becoming less relevant." width="80%" /&gt;
&lt;img src="https://github.com/cis-india/website/blob/master/img/AS-PS_UnpackingDataProtectionLaw_2018_04.png?raw=true" alt="Data protection regulation involve interaction between regulators and industry." width="80%" /&gt;
&lt;img src="https://github.com/cis-india/website/blob/master/img/AS-PS_UnpackingDataProtectionLaw_2018_05.gif?raw=true" alt="To be an effective data protection regulator, an entire range of regulatory tools are required, which the regulator can use to reward, support and sanction." width="80%" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/unpacking-data-protection-law-a-visual-representation'&gt;https://cis-india.org/internet-governance/blog/unpacking-data-protection-law-a-visual-representation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-02-15T13:22:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/aria-thaker-quartz-india-march-12-2019-twitter-unlike-facebook-barely-carries-political-ads-in-india">
    <title>Unlike Facebook, Twitter is a ghost town for political ads in India so far</title>
    <link>https://cis-india.org/internet-governance/news/aria-thaker-quartz-india-march-12-2019-twitter-unlike-facebook-barely-carries-political-ads-in-india</link>
    <description>
        &lt;b&gt;India’s politicians and political parties don’t seem to be buying ads on Twitter just yet, even as parties are pumping money into Facebook advertising.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aria Thaker was published in &lt;a class="external-link" href="https://qz.com/india/1570458/twitter-unlike-facebook-barely-carries-political-ads-in-india/"&gt;Quartz India&lt;/a&gt; on March 12, 2019. Elonnai Hickok was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;As of yesterday (March 11), Indian content is now visible on Twitter’s &lt;a href="https://ads.twitter.com/transparency"&gt;Ad Transparency Centre&lt;/a&gt;:  an archive that displays promoted tweets that have been run over the  past week. Quartz searched the archive’s records to see if it showed any  ads being run by major politicians and political parties, and could not  find a single one. (The archive only permits you to search accounts  individually—not to click to see all campaign ads at once. Quartz’s  manual searches of dozens of politicians and political accounts did not  yield any results, however.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The only accounts seen to have run ads related to politics were media  organisations, like television channel Times Now and news aggregation  startup Dailyhunt.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Twitter has rolled out the initiative as part of its &lt;a href="https://qz.com/india/1545204/are-whatsapp-facebook-and-twitter-ready-for-the-indian-election/"&gt;attempts to boost transparency&lt;/a&gt; ahead of India’s upcoming general election. Political campaign ads in  the archive, Twitter says, will be accompanied by details about the  demographics of audiences they are targeting. And if any promoted tweet  is found to have violated Twitter’s rules, the transparency centre will  list that it was suspended, and why.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Two  days ago, the chief commissioner of the Election Commission of India  (ECI) said that Twitter, along with Google, Facebook, and Youtube, &lt;a href="https://qz.com/india/1569796/election-commission-to-certify-google-twitter-lok-sabha-poll-ads/"&gt;has promised to ensure&lt;/a&gt; that all political ads on its platform will need to be pre-approved by  the poll body’s media certification and monitoring panel.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;In order to run political campaign ads, Twitter’s &lt;a href="https://business.twitter.com/en/help/ads-policies/restricted-content-policies/political-content/how-to-get-certified.html"&gt;political content policy&lt;/a&gt; requires organisations to submit certain identification documents.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;“The  Transparency Ad Centre along with the Political Content Policy is a  welcome step to bringing transparency to promoted and political promoted  tweets,” Elonnai Hickock, chief operating officer of the Indian think  tank The Centre for Internet and Society, told Quartz. “Going forward,  it will be important to see how the system is enforced—identifying,  categorising, and tagging content and accounts in violation of this  framework.”&lt;/p&gt;
&lt;h2 class="india _7d6a7" style="text-align: justify; "&gt;&lt;b&gt;The Facebook comparison&lt;/b&gt;&lt;/h2&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;While Twitter so far remains a ghost town for political ads, Facebook, which recently rolled out &lt;a href="https://qz.com/india/1487205/facebooks-trying-to-make-political-ads-more-transparent-in-india/"&gt;its own ad archive&lt;/a&gt; in India, is far from it. Many politics-related pages have spent handsomely on Facebook ads. In &lt;a href="https://www.facebook.com/ads/archive/report"&gt;Facebook’s ad archive report&lt;/a&gt; for the period between February and March 2019, a total of more than  Rs4.1 crore ($588,000) was spent on politics-related advertising. Around  &lt;a href="https://scroll.in/article/916044/pro-bjp-pages-account-for-70-of-ad-spending-made-public-by-facebook-analysis-shows?utm_source=rss&amp;amp;utm_medium=dailyhunt"&gt;70% of this advertising&lt;/a&gt; so far has come from the ruling Bharatiya Janata Party (BJP) and BJP-affiliated groups.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Favouring Facebook over Twitter seems a rational choice, in most ways. Twitter has &lt;a href="https://www.statista.com/statistics/381832/twitter-users-india/"&gt;less than 35 million&lt;/a&gt; users in India, according to statistics portal Statista, while Facebook is thought to have around &lt;a href="https://www.statista.com/statistics/268136/top-15-countries-based-on-number-of-facebook-users/"&gt;300 million&lt;/a&gt;.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Twitter  is also often thought of as an echo chamber for English-speaking  elites—not the grassroots population. Those constituents are generally  considered far more reachable through other technological means,  including via Facebook, SMS, and WhatsApp.&lt;/p&gt;
&lt;h2 class="india _7d6a7" style="text-align: justify; "&gt;&lt;b&gt;Translucent, more than transparent&lt;/b&gt;&lt;/h2&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;While  it may yet be early to determine the overall usefulness of Twitter’s ad  transparency centre, the simple comparison with Facebook’s archive  shows several areas in which the microblogging platform could stand to  be more transparent.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;For general, non-political advertising, Twitter’s  archive only displays promoted tweets that have run over the course of  the past seven days. It is not clear what Twitter’s rationale is for  cutting off access to ads after a week passes.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;But  for politics-related promoted tweets, Twitter plans to display the ads  as well as targeting information indefinitely. “All certified political  accounts on Twitter will have their ads displayed indefinitely on the  Ads Transparency Center. Other information such as billing details,  spend, targeting, etc. will also remain indefinitely,” a Twitter  spokesperson clarified to Quartz.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;The  transparency centre also only includes promoted tweets—not in-stream  video ads, which are another form of promoted content that can be used  in India. “We are working to include other ad formats in the future,”  Twitter’s &lt;a href="https://business.twitter.com/en/help/ads-policies/ads-transparency-center-faqs.html"&gt;frequently-asked-question section&lt;/a&gt; on the transparency centre reads.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;But  perhaps the most significant hindrance to genuine research on the  transparency centre is the fact that it, unlike Facebook’s ad archive,  cannot be searched for specific key terms used in ads. For example,  while Facebook’s archive allows you to search for all ads that mention  the words “prime minister Narendra Modi,” there is no way to run such a  query on Twitter’s archive.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;To see what politics-related ads are being run in  India, one has to manually search through the ads from relevant  accounts. The major issue with this is that, especially when it comes to  social media advertising, it is not always political parties’ official  accounts that run the most aggressive, or the most worrisome,  advertising.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Say, for example, a little-known  account—an unverified one, which is not outwardly affiliated with any  particular politicians—started to run polarising, religion-related ads  that helped a particular party. Twitter’s portal would not provide a  simple way of helping a user discover this behaviour—exactly the sort of  thing that a transparency resource should do.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/aria-thaker-quartz-india-march-12-2019-twitter-unlike-facebook-barely-carries-political-ads-in-india'&gt;https://cis-india.org/internet-governance/news/aria-thaker-quartz-india-march-12-2019-twitter-unlike-facebook-barely-carries-political-ads-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aria Thaker</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-03-20T16:02:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/uid-and-npr">
    <title>Unique Identity Number (UID), National Population Register (NPR), and Governance</title>
    <link>https://cis-india.org/internet-governance/events/uid-and-npr</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society and the Say No to UID campaign invite you to a workshop to discuss and learn about the present state of the UID and the NPR schemes. The event will be held on Saturday, March 2, 2013, at TERI, Bangalore, from 10.30 a.m. to 2.00 p.m.&lt;/b&gt;
        &lt;p&gt;&lt;b&gt;Among other questions, the workshop will address:&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What is the UID and NPR?&lt;/li&gt;
&lt;li&gt;How do the UID and NPR impact citizenship?&lt;/li&gt;
&lt;li&gt;Will NPR and UID schemes transform governance? &lt;/li&gt;
&lt;li&gt;Why and how is national security linked with UID / NPR?&lt;/li&gt;
&lt;li&gt;What is the relationship between UID and Big Data?&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;p style="text-align: left; "&gt;&lt;b&gt;Speakers:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Usha Ramanathan&lt;i&gt;, Independent Law Researcher and Human Rights Activist&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Anant Maringanti&lt;i&gt;, Hyderabad&lt;/i&gt;&lt;i&gt; Urban Labs &amp;amp; Right to the City Foundation&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Kaveri R&lt;i&gt;, Researcher, CES, IISc&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/uid-and-npr'&gt;https://cis-india.org/internet-governance/events/uid-and-npr&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-03-01T04:32:06Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/unique-identity-project">
    <title>Unique Identity (UID) Project: A Debate on Fundamental Rights</title>
    <link>https://cis-india.org/events/unique-identity-project</link>
    <description>
        &lt;b&gt;A half day workshop on unique identity number and fundamental rights is being held on Friday, 16 April, 2010 at the Institute of Agricultural Technologists in Bangalore. The event is being co-organised by Citizen Action Forum, People's Union for Civil Liberties - Karnataka, Slum Janandolana – Karnataka, Alternative Law Forum and the Centre for Internet and Society.&lt;/b&gt;
        
&lt;p&gt;In the past eight to ten months, there has been much talk about the introduction of the &lt;strong&gt;Unique Identification&lt;/strong&gt; for all Indian residents, i.e., the UID. The scheme proceeds from the standpoint that solving the problem of identity will result in the fixing of many other social and economic problems. However, seen against the backdrop of work on a National Population Registry, the National Intelligence Grid and other schemes that focus on the collection of data on individuals, the potential dangers to privacy and other civil liberties need to be discussed along with the stated benefits of the UID project.&amp;nbsp; Given that the key laws relating to the project are not yet enacted, this is a timely exercise and an opportunity to influence change.&lt;/p&gt;
&lt;p&gt;While the project has been hailed as a 'gamechanger' and a welfare measure, many have expressed growing concerns about the UID and its implications for ordinary citizens. Many questions are being asked about the nature, status and aims of the scheme and its implementing authority. Countries such as the UK, Australia and the USA have found similar measures unworkable with serious probability of abuse. The cost of the UID scheme is estimated at several thousand crores of rupees. Given the risks that plague identity schemes generally, we felt the need to engage the larger public in an open debate about the UID and its proposed scope, implementation, benefits and risks. The UID would affect every citizen. How it would affect each individual is something everyone should consider before deciding how to engage with the government on this issue. With the viewpoint of different panelists, we hope to provide as much information as is available now to you and take the debate&amp;nbsp; forward to make the spectrum of issues transparent. The organizers listed below would like to provide a platform to kickstart a healthy, open discussion about the potential benefits and pitfalls of the scheme.&amp;nbsp; This event has been jointly organized by the Citizen Action Forum, People's Union for Civil Liberties-Karnataka, the Alternative Law Forum, and the Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;div&gt;
&lt;div align="center"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;h1 align="left" style="text-align: center;"&gt;Agenda&lt;/h1&gt;
&lt;p&gt;&lt;span class="SubtitleChar"&gt;&lt;/span&gt;&lt;a name="table01"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;table class="MsoNormalTable"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;div&gt;
&lt;div align="left"&gt;&amp;nbsp;&lt;/div&gt;
&lt;h1 align="left" style="text-align: center;"&gt;Social/Ethical Panel- 2:30-3:30 pm&lt;/h1&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Lead Presentation&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p class="Li"&gt;Usha Ramanathan, Centre for the Study of
  Developing Societies&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Panelist 1&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Ashok Kamat, Pratham Books&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Panelist 2&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Dr. Dominic, Bangalore University&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Moderator&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Prof. Trilochan Sastry, IIM-B&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;div&gt;
&lt;h1 align="center" style="text-align: center;"&gt;Economics
  Panel- 3:30-4:30 pm&lt;/h1&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Lead Presentation&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;R. Ramakumar, Tata Institute of Social Sciences&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Panelist 1&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Mathew Thomas, Citizens Action Forum&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Panelist 2&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Nandana
  Reddy , Concerned for Working Children[*]&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Moderator&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Rajeev Gowda, IIM-B&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;div&gt;
&lt;h1 align="center" style="text-align: center;"&gt;Legal Panel- 4:30-5:30 pm&lt;/h1&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Lead Presentation&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p class="Li"&gt;B K Chandrashekar, former Minister of Information, INC&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Panelist 1&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;AN Jayaram, Former Additional Solicitor General of India and
  Advocate General&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="Li"&gt;&lt;strong&gt;Panelist 2&lt;/strong&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p class="Li"&gt;Malavika Jayaram, Centre
  for Internet &amp;amp; Society&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Panelist 3&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;AR Nizamuddin, Former Director General of Police&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;div&gt;
&lt;h1 align="center" style="text-align: center;"&gt;5:30-6:00 pm-
  Wrap-up moderated by Vinay Sreenivasa and close with tea, coffee and snacks&lt;/h1&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;[*] = To
be confirmed &lt;em&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p class="MsoNoSpacing"&gt;&lt;em&gt;&lt;strong&gt;Please contact/RSVP at &lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p class="MsoNoSpacing"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p class="MsoNoSpacing"&gt;Ajoy Kumar /
Radha Rao&lt;/p&gt;
&lt;p class="MsoNoSpacing"&gt;Centre for
Internet and Society&lt;/p&gt;
&lt;p class="MsoNoSpacing"&gt;No.194, 2nd 'C'
Cross,&lt;/p&gt;
&lt;p class="MsoNoSpacing"&gt;Domlur 2nd
Stage,&lt;/p&gt;
&lt;p class="MsoNoSpacing"&gt;Bangalore 560071&lt;/p&gt;
&lt;p class="MsoNoSpacing"&gt;P: +91 80 25350955&lt;/p&gt;
&lt;p class="MsoNoSpacing"&gt;W: &lt;a href="http://www.cis-india.org/"&gt;www.cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p class="MsoNoSpacing"&gt;E: &lt;a href="mailto:ajoy@cis-india.org"&gt;ajoy@cis-india.org&lt;/a&gt;,
&lt;a href="mailto:radha@cis-india.org"&gt;radha@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p class="MsoNoSpacing"&gt;M:
+919845492122&lt;/p&gt;
Videos
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdfgRgA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdfgdQA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdfhOAA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdfiCgA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdfiTwA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdflOQA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdflbwA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdfmQAA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdfmVwA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdfnQAA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdfoHwA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdiuLAA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdiwMgA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdiwYwA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdixKQA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdiyHwA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgduFRAA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgduGCAA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgduGWQA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgduHYAA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgduJLAA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgduNfQA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdz7ZQA"&gt;&lt;/embed&gt;&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdz8NwA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdz8fQA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdz%2BcwA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgd2AHQA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgd2DUAA"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/unique-identity-project'&gt;https://cis-india.org/events/unique-identity-project&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-05T04:08:17Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/uid-and-npr-a-background-note">
    <title>Unique Identification Scheme (UID) &amp; National Population Register (NPR), and Governance</title>
    <link>https://cis-india.org/internet-governance/blog/uid-and-npr-a-background-note</link>
    <description>
        &lt;b&gt;This post examines the UID, NPR and Governance as it exists in India. The background note gives a summary of what is the NPR, the legal grounding of NPR, its objectives, and the information which could be collected under the NPR. The post also throws light on the UID, its objectives, process of enrollment in UID, how UID is being adopted by different states in India, and finally the differences and controversies in UID and NPR.&lt;/b&gt;
        &lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Video&lt;/h2&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/P1CdCkdKtcU" width="315"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;The above video is from the "UID, NPR, and Governance" conference held on March 2, 2013 at TERI, Bangalore&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is the NPR?&lt;br /&gt;&lt;/b&gt;In 2010, the Government of India initiated the NPR which entails the creation of the National Citizens Register. This register is being prepared at the local, sub-district, district, state and national level. The database will contain thirteen categories of demographic information and three categories of biometric data collected from all residents aged five and above. Collection of this information was initially supposed to take place during the House listing and Housing Census phase of Census 2011 during April 2010 to September 2010.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is the legal grounding of the NPR? &lt;/b&gt;&lt;br /&gt;The NPR is legally grounded in the provisions of the Citizenship Act, 1955 and the Citizenship Rules 2003. It is &lt;i&gt;mandatory &lt;/i&gt;for every usual resident in India to register in the NPR as per Section 14A of the Citizenship Act, 1955, as amended in 2004. The collection of biometrics is not accounted for in the statute or rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What are the objectives of the NPR? &lt;/b&gt;&lt;br /&gt;The objectives of the NPR as stated by the Citizenship Act is for the creation of a National Citizen Register. The National Citizen Register is intended to assist in improving security by checking for illegal migration. Additional objectives that have been articulated include: providing services to the residents under government schemes and programmes, checking for identity frauds, and improving planning.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is the process of enrollment for the NPR?&lt;/b&gt;&lt;br /&gt;NPR enrollment is being carried out through house to house canvassing. The Office of the Registrar General and Census Commissioner, India has assigned Department of Information Technology (DIT) the responsibility of collecting and digitizing demographic data in 17 states and 2 Union Territories of India.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; Collected information will then be printed and &lt;i&gt;displayed in the local area &lt;/i&gt;where it is scrutinized by local officers and vetted by local bodies called ´Gram Sabha/Ward Committees´.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; This process of social audit is meant to bring in transparency, equity, and ensure accuracy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What information will be collected under the NPR?&lt;/b&gt;&lt;br /&gt;The NPR database will include thirteen categories of demographic information and three categories of biometrics. The collection biometrics has not been provided for in the text of the Citizenship Rules, and is instead appears to be authorized through guidelines,&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; which do not have statutory backing. Currently, two iris scans, ten fingerprints, and a photograph are being collected. According to a 2010 Committee note, only the photograph and fingerprints were initially envisioned to be collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is the Resident Identity Card? &lt;/b&gt;&lt;br /&gt;The proposed Resident Identity card is a smart card with a micro-processor chip of 6.4 Kb capacity; the demographic and biometric attributes of each individual will be personalized in this chip. The UID number will be placed on the card as well. Currently, the government is only considering the possibility of distributing smart cards to all residents over the age of 18.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is the UID?&lt;br /&gt;&lt;/b&gt;The Unique Identification Authority of India (UIDAI) was established in January 2009 and is part of the Planning Commission of India. UIDAI aims to provide a unique 12 digit ID number to all residents in India on a voluntary basis. The number will be known as AADHAAR. The UIDAI will own and operate a Unique Identification Number database which will contain biometric and demographic data of citizens.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is the objective of the UID?&lt;br /&gt;&lt;/b&gt;According to the UIDAI, the UID will provide identity for individuals. The scheme has been promoted by the UIDAI as enabling a number of social benefits including improving the public distribution system, enabling financial inclusion, and improving the Mahatma Gandhi National Rural Employment Guarantee Scheme (NREGS).  Despite these benefits, the UIDAI only guarantees identity, and does not guarantee rights, benefits or entitlement.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is the process for enrollment in the UID?&lt;/b&gt;&lt;br /&gt;To enroll in the UID, individuals must go to enrollment centers with the appropriate documentation. Once documents are verified and biometrics taken, individuals will receive an acknowledgment slip and their UID number will be sent in the mail.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; The UIDAI will enroll up to 600 million residents in 16 States and territories.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; Online registration prior to enrollment at a Center is also now being offered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How is UID being adopted by different States? &lt;/b&gt;&lt;br /&gt;The adoption of the UID by different states and platforms has been controversial as the UID is not a mandatory number, yet with states and services adopting the number for different governmental services, the UID is becoming mandatory by default.  Some ways in which states are using the UID include:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Gas and vehicles&lt;/i&gt;: The UPA Government has required that citizens have a UID number for services such as purchasing cooking gas, issuing a RTI request, and registering vehicles.&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Education&lt;/i&gt;: The Kerala government has required that all students must have UID number in order to be tracked through the system.&lt;a href="#fn12" name="fr12"&gt;[12] &lt;/a&gt;This mandate was questioned by the National Commission for Protection of Child Rights.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;First Information Reports (FIR’s)&lt;/i&gt;: The high court in Bombay has ordered the state home department to direct all police stations in Maharashtra to record the Unique Identification (UID) numbers of accused individuals and witnesses filing a FIR.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Banks&lt;/i&gt;: The National Payment Corporation of India has collaborated UIDAI and is issuing ‘RuPay cards’ (Dhan Aadhaar cards) which will serve as ATM/micro-ATM cards. In 2011 the Bank of India had issued 250 cards.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Railway&lt;/i&gt;: Railways are proposing to use the UID database for bookings and validation of passengers.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Social Security&lt;/i&gt;: Commencing January 1, 2013, MGNREGA, the Rajiv Gandhi Awas Yojana (RGAY), the Ashraya housing scheme, Bhagyalakshmi and the social security and pension scheme have included the UID in the Mysore district&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Has there been duplication of UID numbers?&lt;/b&gt;&lt;br /&gt;According to news reports:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The UIDAI has blacklisted an operator and a supervisor in Andhra Pradesh for issuing fake UID numbers.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The UIDAI is looking into six complaints regarding the misuse of personal data while issuing the UID numbers to individuals.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;The UIDAI has received two received complaints regarding duplication of UID numbers.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;What are the differences between the UID and NPR?&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Voluntary vs. Mandatory:&lt;/i&gt; It is compulsory for &lt;i&gt;all &lt;/i&gt;Indian residents to register with the NPR, while registration with the UIDAI is considered voluntary. However, the NPR will store individuals UID number with the NPR data and place it on the Resident Indian Card. In this way and others, the UID number is becoming compulsory by various means. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Number vs. Register:&lt;/i&gt; UID will issue a number, while the NPR is the prelude to the National Citizens Register. Thus, it is only a Register. Though earlier the MNIC card was implemented along the coastal area, there has been no proposal to extend the MNIC to the whole country. The smart card that is proposed under the NPR has only been raised for discussion, and there has been no official decision to issue a card.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Statute vs. Bill:&lt;/i&gt; The enrollment of individuals for the NPR is legally backed by the Citizenship Act, except in relation to the collection of biometrics, while the UID as proposed a bill which has not been passed for the legal backing of the scheme. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Authentication vs. Identification:&lt;/i&gt; The UID number will serve as an authenticator during transactions. It can be adopted and made mandatory by any platform. The National Resident Card will signify resident status and citizenship. It is unclear what circumstances the card will be required for use in. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;UIDAI vs. RGI:&lt;/i&gt; The UIDAI is responsible for enrolling individuals in the UID scheme, and the RGI is responsible for enrolling individuals in the NPR scheme. It is important to note that the UIDAI is located in the Planning Commission, but its status is unclear, as the NIC had indicated that the data held is not being held by the government. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Door to door canvassing vs. center enrollment&lt;/i&gt;: Individuals will have to go to an enrollment center and register for the UID, while the NPR will carry out part of the enrollment of individuals through door to door canvassing. Note: Individuals will still have to go to centers for enrolling their biometrics for the NPR scheme. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Prior documentation vs. census material:&lt;/i&gt; The UID will be based off of prior forms of documentation and identification, while the NPR will be based off of census information.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Online vs. Offline:&lt;/i&gt; For authentication of an individual’s UID number, the UID will require mobile connectivity, while the NPR can perform offline verification of an individual’s card. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;What is the controversy between the UID and NPR? &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Effectiveness:&lt;/i&gt; There is controversy over which scheme would be more effective and appropriate for different purposes. For example, the Ministry of Home Affairs has argued that the NPR would be more suited for distributing subsidies than the UID, as the NPR has data linking each individual to a household.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Legality of sharing data&lt;/i&gt;: Both the legality of the UID and NPR collecting data and biometrics has been questioned. For example, it has been pointed out that the collection of biometric information through the NPR, is beyond the scope of subordinate legislation. Especially as this appears to be left only to guidelines.&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt; Collection of any information under the UID scheme is being questioned as the Bill has not been approved by the Parliament.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Accuracy&lt;/i&gt;: The UIDAI's use of multiple registrars and enrolment agencies, the reliance on  'secondary information' via existing ID documents for enrollment in the UID, and the original plan to enroll individuals via the 'introducer' system has raised by Home Minister Chidambaram in January 2012 about how accurate the data collected by the UID is is that will be collected.&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; To this extent, the UIDAI has changed the introducer system to a ‘verifier’ system. In this system, Government officials verify individuals and their documents prior to enrolling them.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Biometrics&lt;/i&gt;: Though biometrics are mandatory for the UID scheme, according to information on the NPR website, if an individual has already enrolled with the UID, they will not need to provide their biometrics again for the NPR. Application of this standard has been haphazard as some individuals have been required to provide biometrics for both the UID and the NPR, and others have not been required to provide biometrics for the NPR.&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;What court cases have been filed against the UID?&lt;br /&gt;&lt;/b&gt;The following cases are currently filed in courts around the country:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;i&gt;Supreme Court:&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;K S Puttaswamy, a retired judge of Karnataka High Court filed a Public Interest Litigation (PIL) in the Supreme  Court challenging the legality of UIDAI.&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;i&gt;Chandigarh&lt;/i&gt;: A petition was filed in Chandigarh by Sanjeev Pandey which sought to quash executive order passed in violation of the Motor Vehicles Act, 1988, and Central Motor Vehicle Rules, 1989 by which UID cards had been made mandatory for registration of vehicles and grant of learner/regular driving license.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;i&gt;Karnataka:&lt;/i&gt;&lt;/span&gt; &lt;span&gt;Mathew Thomas and Mr. VK Somasekhar have filed a civil suit in the Bangalore City Civil Courts (numbered 8181 of 2012) asking for the UID project to be stopped. The suit was dismissed, and they have appealed the case to the High Court (numbered 1780 and 1825 of 2013).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Chennai&lt;/i&gt;: A PIL has been filed in the Madras High Court challenging the constitutional validity of the UIDAI and its issue of UID numbers.&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Bombay&lt;/i&gt;: In January 2012 a case was filed in the Mumbai high Court. The petitioners to the case are R. Ramkumar, G. Nagarjuna, Kamayani Mahabal, Yogesh Pawar and  Vickram Crishna &amp;amp; Ors.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is the relationship between UID, NPR, and National Security&lt;br /&gt;&lt;/b&gt;The UID and the NPR have both stated improving security as an objective for the projects. To this extent, it is envisioned that the UID and the NPR could be used to track and identify individuals, and determine if they are residents of India. In the case of the NPR, a distinction will be made between residents and citizens. Yet, concerns have also been raised that these projects instead raise national security threats, given the size of the databases that will be created, the centralized nature of the databases, the sensitive nature of the information held in the databases, and the involvement of international agencies.&lt;a href="#fn25" name="fr25"&gt;[25]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is the relationship between UID and Big Data?&lt;br /&gt;&lt;/b&gt;Aspects of the UID scheme allow it to generate a large amount of data from a variety of sources. Namely, the UID scheme aims to capture 12 billion fingerprints, 1.2 billion photographs and 2.4 billion iris scans and can be adopted by any platform. This data in turn can be stored, analyzed, and used for a number of purposes by a number of stakeholders in both the government and the private sectors. This is already happening to a certain extent as in November 2012 the UID  established a Public Data Portal for the UID project. According to UIDAI officials the data portal will allow for big data analysis using crowd sourcing models.&lt;a href="#fn26" name="fr26"&gt;[26]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How is UID being used for BPL direct cash transfers?&lt;br /&gt;&lt;/b&gt;Registration with the UID scheme is considered essential to determine whether beneficiaries belong in the BPL category and to provide transparency to the distribution of cash. In this way, the UID requirement is thought to prevent the leakage of social security benefits and subsidies to non-intended beneficiaries, as cash will only be made available to the person identified by the UID as the intended recipient. One of the main prerequisites of a below poverty line (BPL) direct cash transfer in India has become the registration with the UIDAI and the acquisition of a UID number. For example:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The "Cash for Food" programme requires that individuals applying for aid have a bank account, and a UID number. The money is transferred, electronically and automatically, to the bank account and the beneficiary should be able to withdraw it from a micro-ATM using the UID number.&lt;a href="#fn27" name="fr27"&gt;[27]&lt;/a&gt; It is important to note that micro-ATMs are not actual ATMs, but instead are handheld machines which may give information on bank balance and such, but will not dispense or maintain privacy of transaction.  Most importantly, the transaction is mediated though a banking correspondent.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The government plans to cover the target BPL families and deposit USD 570 billion per year in the bank accounts of 100 million poor families by 2014.&lt;a href="#fn28" name="fr28"&gt;[28]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Currently, only beneficiaries of thirteen government schemes and LPG connection holders have been identified as being entitled to register for a UID number.&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt; Though these schemes have been identified, as of yet, adoption has happened in very few districts. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What are the concerns regarding the use of biometrics in the UID and NPR scheme? &lt;br /&gt;&lt;/b&gt;Both the UID and the NPR rely on biometrics as a way to identify individuals.  Yet, many concerns have been raised about the use of biometrics in terms of legality, effectiveness, and accuracy of the technology.  With regards to the accuracy and effectiveness of biometrics – the following concerns have been raised:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Biometrics are not infallible:&lt;/i&gt; Inaccuracies can arise from variations in individuals  attributes and inaccuracies in the technology. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Environment matters&lt;/i&gt;: An individual’s biometrics can change in response to a number of factors including age, environment, stress, activity, and illness.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Population size matters&lt;/i&gt;: Because biometrics have differing levels of stability – the larger the population is the higher the possibility for error is. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Technology matters:&lt;/i&gt; The accuracy of a biometric match also depends on the accuracy of the technology used. Many aspects of biometric technology can change including: calibration, sensors, and algorithms.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Spoofing:&lt;/i&gt; It is possible to spoof a fingerprint and fool a biometric reader.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Government of India. Ministry of Home Affairs. Office of the Registrar General &amp;amp; Census Commissioner.  &lt;a class="external-link" href="http://bit.ly/IiySDh"&gt;http://bit.ly/IiySDh&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. This is according to a 2010 Cabinet note and the official website of the NPR.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Department of Information Technology: http://ditnpr.nic.in/frmStatelist.aspx - These include:  (1) Arunachal Pradesh (2) Assam (3) Bihar (4) Chhattisgarh (5) Haryana (6) Himachal Pradesh (7)Jammu &amp;amp; Kashmir (8) Jharkhand (9) Madhya Pradesh (10)Meghalaya (11)Mizoram (12)Punjab (13)Rajasthan (14)Sikkim (15)Tripura (16)Uttar Pradesh (17)Uttarakhand  Union Territories:-(1) Dadra &amp;amp; Nagar Haveli (2) Chandigarh.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Government of India. Ministry of Home Affairs. Office of the Registrar General &amp;amp; Census Commissioner: &lt;a class="external-link" href="http://bit.ly/IiySDh"&gt;http://bit.ly/IiySDh&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Department of Information Technology. National Population Register.  Question  22. What are the procedures to be followed for creating the NPR? The procedures to be followed for creating the NPR have been laid down in the Citizenship (Registration of Citizens and issue of National Identity Cards) Rules, 2003, and the guidelines being issued from time to time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. The Unique Identification Government of India. Ministry of Home Affairs. Office of the Registrar General &amp;amp; Census Commissioner: http://censusindia.gov.in/2011-Common/IntroductionToNpr.html Authority of India. &lt;a class="external-link" href="http://uidai.gov.in/"&gt;http://uidai.gov.in/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Unique Identification Authority of India. &lt;a class="external-link" href="http://uidai.gov.in/"&gt;http://uidai.gov.in/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. The point was made by R. Ramachandran. How reliable is UID? Frontline. Volume 28- Issue 24: November 19- December 02, 2011. Available at:&lt;a class="external-link" href="http://bit.ly/13UMiSv"&gt; http://bit.ly/13UMiSv&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. For more information see: How to get an Aadhaar. &lt;a class="external-link" href="http://bit.ly/R2jBOP"&gt;http://bit.ly/R2jBOP&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Mazumdar. R. UIDAI targets 400 million enrolments by mid 2013, Aadhar hopes to give unique identity to some 1.2 bn residents. Economic Times. December 2012. Available at: &lt;a class="external-link" href="http://bit.ly/ZC3Yv"&gt;http://bit.ly/ZC3Yv&lt;/a&gt;e. Last accessed: February 28th 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Malu. B. The Aadhaar Card – What are the real intentions of the UPA Government? DNA. February 18&lt;sup&gt;th&lt;/sup&gt; 2013. Available at: &lt;a class="external-link" href="http://bit.ly/150BXRj"&gt;http://bit.ly/150BXRj&lt;/a&gt;. Last accessed: February 28th 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Government of Kerala. General Education Department Circular No. 52957/G2?2012/G.Edn. Available at: &lt;a class="external-link" href="http://bit.ly/15Oiq8J"&gt;http://bit.ly/15Oiq8J&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Plumber, M. Make UID numbers must in FIRs: Bombay HC. DNA. October 2011. Available at: &lt;a class="external-link" href="http://bit.ly/tVsInl"&gt;http://bit.ly/tVsInl&lt;/a&gt;. Last accessed: February 28th 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Press Information Bureau. Government of India. Identity Card to Every Adult Resident of the Country under NPR; No Card being issued by UIDAI. December 2011. Available at: &lt;a class="external-link" href="http://bit.ly/tJwZG1"&gt;http://bit.ly/tJwZG1&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. TravelBiz. Railways to use Aadhar database for passenger validation. February 2013. Available at: &lt;a class="external-link" href="http://bit.ly/YcW5wl"&gt;http://bit.ly/YcW5wl&lt;/a&gt;. Last accessed: February 28th 2013.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Vombatkere. S.G. Questions for Mr. Nilekani. The Hindu. February 2013. Available at: &lt;a class="external-link" href="http://bit.ly/YqPlK1"&gt;http://bit.ly/YqPlK1&lt;/a&gt;. Last accessed: February 28th 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Economic Times. UIDAI orders probe into duplication of Aadhaar numbers.&lt;a class="external-link" href="http://bit.ly/ZORowg"&gt; http://bit.ly/ZORowg&lt;/a&gt;. Last accessed: February 28th 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Jain. B. Battle over turf muddies waters. Times of India. February 2013. Available at: &lt;a class="external-link" href="http://bit.ly/16ud3gm"&gt;http://bit.ly/16ud3gm&lt;/a&gt;. Last accessed: February 28th 2013&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Rediff. Aadhaar’s allocation is Parliament’s contempt. February 2013. Available at: &lt;a class="external-link" href="http://bit.ly/Y638JS"&gt;http://bit.ly/Y638JS&lt;/a&gt;. Last accessed: February 28th 2013.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Ibid 17.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. Times of India. Confused over Aadhaar, Cabinet clears GoM. February 2013. Available at &lt;a class="external-link" href="http://bit.ly/UTH2JS"&gt;http://bit.ly/UTH2JS&lt;/a&gt;. Last accessed: February 28th 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. Times of India. Supreme Court notice to govt on PIL over Aadhar. December 2012. Available at: &lt;a class="external-link" href="http://bit.ly/13UNs0i"&gt;http://bit.ly/13UNs0i&lt;/a&gt;. Last accessed: February 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. The Indian Express. HC issues notice to Centre, UT over mandatory UID for license. January 2013. Available at: &lt;a class="external-link" href="http://bit.ly/WJq43M"&gt;http://bit.ly/WJq43M&lt;/a&gt;. Last accessed: February 28th 2013.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. Economic Times. PIL seeks to scrap Nandan Nilekani’s Aadhar project. January 2012. Available at: &lt;a class="external-link" href="http://bit.ly/zB1H07"&gt;http://bit.ly/zB1H07&lt;/a&gt;. Last accessed: February 28th 2013.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. Times of India. UID poses national security threat: BJP. January 2012. Available at:&lt;a class="external-link" href="http://bit.ly/WeM6KA"&gt; http://bit.ly/WeM6KA&lt;/a&gt;. Last accessed: February 28th 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. Zeenews. UIDAI launches Public Data Portal for Aadhaar. November 8th 2012. Available at: &lt;a class="external-link" href="http://bit.ly/T9NdX3"&gt;http://bit.ly/T9NdX3&lt;/a&gt;. Last Accessed: November 12th 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. Punj, S. Wages of Haste: Implementing the cash transfer scheme is proving a challenge. January 2013. Available at: &lt;a class="external-link" href="http://bit.ly/1024Dwo"&gt;http://bit.ly/1024Dwo&lt;/a&gt;. Last accessed: February 28th 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. The International Business Times. India to Roll Out World’s Biggest Direct Cash Transfer Scheme for the Poor. November 2012. Available at: &lt;a class="external-link" href="http://bit.ly/UYbtw4"&gt;http://bit.ly/UYbtw4&lt;/a&gt;. Last accessed: February 28th 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. Mid Day. Do not register for Aadhaar card before March 15: UID in –charge. February 2013. Available at:  &lt;a class="external-link" href="http://bit.ly/Xymx9d."&gt;http://bit.ly/Xymx9d.&lt;/a&gt; Last accessed: February 28th 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;].   These points were raised in the following frontline article Ibid: Ramachandran, R. How reliable is UID? Frontline. Volume 28 – Issue 24 November 19th – December 2nd 2011. Available at: &lt;a class="external-link" href="http://bit.ly/13UMiSv"&gt;http://bit.ly/13UMiSv&lt;/a&gt;. Last accessed February  28th 2013.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/uid-and-npr-a-background-note'&gt;https://cis-india.org/internet-governance/blog/uid-and-npr-a-background-note&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-30T05:03:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/unique-id-system-pros-and-cons">
    <title>Unique ID System: Pros and Cons</title>
    <link>https://cis-india.org/internet-governance/unique-id-system-pros-and-cons</link>
    <description>
        &lt;b&gt;On September 16, 2011, the Citizen’s Voluntary Initiative for the City and Centre for Advocacy and Research organized a public consultation titled “Unique ID System: Pros and Cons” in Bangalore. The consultation was on the utility and impact of the UID system in India and featured a panel discussion with T. Prabhakar, public relations officer, e-governance, Ashok Dalwai, UIDAI regional deputy director, Somashekar V.K., managing trustee of Grahak Shakti and Col. Mathew Thomas, civic activist and retired army officer.&lt;/b&gt;
        
&lt;p&gt;Col. Mathew Thomas began his presentation by a comparative analysis of the Indian and the British experience in providing a unique identity to its citizens. In Britain, this initiative was labelled as ‘intrusive bullying’ and ‘an assault on personal liberties’. Additionally, the government recognized that they must conduct their business as servants of the public and not as their masters. The project was terminated on the grounds that it could not achieve the claimed objectives, and it was dangerous costly.&lt;/p&gt;
&lt;p&gt;Nevertheless, the unique identification (UID) system in India is being perscribed as a prestigious project that will eliminate identity fraud, financial exclusion, enhance accessibility for the poor, enable the government to better manage welfare schemes and target corruption in social programs such as the National Rural Employment Guarantee Act (NREGA), the public distribution system (PDS), public health and financial inclusion.&lt;/p&gt;
&lt;p&gt;Col. Mathew Thomas chronicled ID schemes. He explained that the advent and growth of information technology increased the availability of technology, which led to a commercial interest to exploit technology for profit. Technological solutions were heavily marketed, however, it is a mistaken belief that there is a technological fix to&amp;nbsp; every problem (technology could solve any problem). Post 9/11 paranoia resulted in the notion that ID cards were the best possible counter measure to terrorism. “The inherent ridiculousness of this notion is that militants do not come with ID cards, but with AK-47s, and possession of ID cards or citizenship does not prevent one from becoming a terrorist”, says Mathew Thomas. National ID cards do not stop or deter terrorist actions.&lt;/p&gt;
&lt;p&gt;India’s history with the UID project can be traced to the recommendations made by the Kargil Review Committee chaired by K. Subrahmanyam.The Committee recommended the issuing of ID cards to people in border areas to prevent infiltration and extend the system to the whole country to combat terrorism. Consequently, in 2003 the Citizenship Act of 1955 was amended by the NDA Government so as to compulsorily register all citizens into a “National Population Register” (NPR) and issue a Multi-purpose National Identity Card (MNIC). The NPR database will be inked to the UID. Subsequently, the UPA Government promoted the UID, as a pro-poor project.&lt;/p&gt;
&lt;p&gt;Col. Mathew Thomas discussed the various questionable aspects of the UID project: its legality, financial prudence, ethics and its uses and abuses.&lt;/p&gt;
&lt;h3&gt;UID and Legality&lt;/h3&gt;
&lt;p&gt;Firstly, there is no law governing the functioning of the Unique Identification Authority of India (UIDAI). The illegal implementation of the UID is a complete insult to the Parliament and citizens, considering that the National Identification Authority of India Bill 2010 was drafted long after the implementation of the UID commenced.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;UID and Financial Prudence&lt;/h3&gt;
&lt;p&gt;The high-level of apprehension surrounding the UID project stems from the fact that a project of this magnitude, cost and impact on the entire population would be undertaken without a feasibility study and a cost-benefit analysis. There exist two studies: one by the London School of Economics, regarding the UK project, and another by the Indian Institute of Management Ahmedabad, on UID in India. Both have concluded that such schemes are unworkable and too costly.&lt;/p&gt;
&lt;h3&gt;UID and Ethics&lt;/h3&gt;
&lt;p&gt;Ethical questions related to the UID are regarding its history, participation and ubiquity. Firstly, the UIDAI website is silent on the history prior to 2006. It fails to mention the significant historical roots of the UID, specifically, the Kargil War and the National Population Registry.&amp;nbsp; Second, the UID has been promoted as a pro-poor project, whereas huge possibilities for commercial exploitation exist. Lastly, the UIDAI asserts that enrollment for the UID is ‘voluntary’. Although participation in the UID scheme is supposed to be voluntary, service providers can make it compulsory, thereby making it ubiquitous. A subtle campaign is being carried on, hinting at denial of benefits and services to those without UID.&lt;/p&gt;
&lt;h3&gt;Uses and Abuses&lt;/h3&gt;
&lt;p&gt;UID claims to transform governance, make ‘Bharath’ part of the growth process, plug ‘leakages’ &amp;amp; ‘slippages’ in welfare schemes, bring about all round prosperity and put India on a ‘fast-track’ growth by becoming the pivot around which all anti-poverty measures will rotate. One can conclude that UID is a panacea or a ‘one size fits all’ solution. Mathew Thomas questioned how these ambitions can be achieved by fingerprinting and scanning the irises of 1.2 billion people and storing the data for use by agencies responsible for the delivery of services.&lt;/p&gt;
&lt;p&gt;These claims revolve around the assumptions that a lack of identity denies people welfare benefits; denies access to opportunities and services; and that a unique identification and de-duplication using biometrics would prevent “leakages”, “slippages” and in effect, all corruption. These assumptions need to be tested and verified so as to ensure validity.&lt;/p&gt;
&lt;h3&gt;The Public Distribution System and UID&lt;/h3&gt;
&lt;p&gt;Col. Mathew Thomas examined the PDS to analyze the use and claims of UID. He described the supply and demand of the PDS. The ‘supply’ side involves the fixing of minimum support prices, procurement by the centre and state governments, transport to FCI and state storages, distribution by centre to states and distribution by states to fair-price (ration) shops. All of the stages are affected by corruption and surprisingly UID beneficiaries have no role in any of the aforementioned stages.&lt;/p&gt;
&lt;p&gt;‘Leakages’ in the supply process could potentially occur during the fixing of the minimum support prices (if deals exist with large farmers), during procurement (if they lift less quantity than what was paid for) and during accounting and storage (if they write off larger quantities than the actual damage; write off against bogus ration-cards; and show more quantity in storage and shops than is actually there).&lt;/p&gt;
&lt;p&gt;The ‘demand’ process of the PDS system requires for state governments to decide on the eligibility of BPL people, issue ration cards, allocate ration-card holders to specific ration shops and requires the ration-card holders go to designated shops and collect entitlements. Corruption is possible, probable and happens in this discretionary decision-making. However, the only stage at which UID would find some use, if at all, is when ration-card holders collect rations.&lt;/p&gt;
&lt;p&gt;Col. Mathew Thomas provided an excellent example of the government’s lopsided priorities. He describes the UID in PDS as the story of the ‘fence eating the corn’. The ‘fence’ then says, “let’s brand the cattle to find who is stealing the corn!”&lt;/p&gt;
&lt;p&gt;The practicality of utilizing UID for authentication in the PDS system is a huge conundrum. Considering that the process to authenticate at ration shops requires all shops to have scanners (approximately six lakhs) which must be connected to a network and power at all the time.&lt;/p&gt;
&lt;p&gt;Another problem surrounds the collection of ration. Ration-card holders do not always go to collect rations. There could be occasions where one family member goes for collection or one person collects rations for a number of families. The worst part of the UID application to the PDS system is that the procedure puts the BPL person at the mercy of the ration-shop keeper. He could simply deny rations, saying, “Authentication failed”.&lt;/p&gt;
&lt;p&gt;The potential abuses of the UID could arise from the large collection of fingerprints that will be with various government officials and private agencies which could be used to foist false criminal cases against innocent people, forge title deeds, sale deeds, promissory notes wills, etc., and could target individuals and communities.&lt;/p&gt;
&lt;p&gt;Col. Mathew Thomas concluded by explaining the main risks of any centralized database, it can be hacked and can crash. Professor Ian Angle, of the London School of Economics, has said that the UID will be "Olympic games of hacking", providing people with the biggest challenge to hack through.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/uid.jpg/image_preview" alt="UID" class="image-inline image-inline" title="UID" /&gt;&lt;/p&gt;
&lt;p&gt;Making a point: (From left) Public Relations Officer, e-governance, T. Prabhakar; UIDAI Regional Deputy Director Ashok Dalwai; Managing Trustee of Grahak Shakti Somashekar V.K.; and civic activist Mathew Thomas at a panel discussion in Bangalore on Friday. — photo: V. Sreenivasa Murthy.&lt;/p&gt;
&lt;p&gt;Photo Source: From the &lt;strong&gt;Hindu&lt;/strong&gt;, September 17, 2011, &lt;a class="external-link" href="http://goo.gl/gCnqK"&gt;http://goo.gl/gCnqK&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Note: Unfortunately, the other presentations were conducted in Kannada and could not be understood by the author of this blog.&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/unique-id-system-pros-and-cons'&gt;https://cis-india.org/internet-governance/unique-id-system-pros-and-cons&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Natasha Vaz</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-02-29T11:28:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/unicef-nasscom-foundation-workshop-on-child-online-protection">
    <title>UNICEF &amp; Nasscom Foundation Workshop on Child Online Protection </title>
    <link>https://cis-india.org/internet-governance/news/unicef-nasscom-foundation-workshop-on-child-online-protection</link>
    <description>
        &lt;b&gt;Jyoti Panday attended UNICEF &amp; Nasscom Foundation Workshop on Child Online Protection (COP) held on 8 February 2016 at Hotel Claridges in New Delhi. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The workshop was organized to raise awareness of the Child Online Protection and the UNICEF -International Telecom Union COP Guidelines for Industry. The COP Guidelines offer general recommendations for industry on protecting children's safety when using ICT technologies. The guidelines also provide a sector specific checklist that recommend actions to respect and support children's rights. Recommendations are provided for mobile operators, ISPs,content providers, online retailers and app developers,UGC interactive and social media service providers, national and public service broadcasters, hardware manufacturers, OS developers and app stores.&lt;br /&gt;&lt;br /&gt;At the workshop the preliminary findings of the Rapid Assessment on Child Online Protection in India, carried out by UNICEF was shared. The discussions were structured as the beginning of a dialogue on Children and Internet with the private sector and other stakeholders and to discuss the incorporation of children’s rights dimensions into key ICT industry initiatives on COP. I participated in the panel discussions on the current scenario on child online protection in India and the role of the industry. I raised the issue of lack of transparency in blocking and taking down content online that deemed is harmful for children.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;See the &lt;a href="https://cis-india.org/internet-governance/blog/concept-note-unicef-nasscom-foundation-workshop-on-child-online-protection" class="internal-link"&gt;Concept Note&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Click for the &lt;a href="https://cis-india.org/internet-governance/blog/agenda-unicef-nasscom-foundation-workshop-on-child-online-protection" class="internal-link"&gt;Agenda&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/unicef-nasscom-foundation-workshop-on-child-online-protection'&gt;https://cis-india.org/internet-governance/news/unicef-nasscom-foundation-workshop-on-child-online-protection&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2016-02-14T11:01:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/unesco-open-forum">
    <title>UNESCO's Open Forum</title>
    <link>https://cis-india.org/events/unesco-open-forum</link>
    <description>
        &lt;b&gt;As UNESCO organized Freedom of Expression related workshops, this Open Forum will be
dedicated to other key IGF topics, notably multilingualism in cyberspace, open access to
scientific information, open educational resources, and accessibility for marginalized groups.
In addition, UNESCO will take this opportunity to announce new initiatives and share
experiences with participants. The interactive panel format will start with brief presentations from experts, followed by a moderated discussion with participants.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;Organizer:&lt;/strong&gt; UNESCO&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Moderator:&lt;br /&gt;&lt;/strong&gt;Mr Jānis Kārkliņš, Assistant Director-General for Communication and Information, UNESCO&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Opening by Mr Jānis Kārkliņš&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Introductory remarks&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Mr Nitin Desai, Chair of the Internet Governance Forum (IGF) will speak about:&amp;nbsp;The future of the IGF and UNESCO’s opportunities&lt;/li&gt;&lt;li&gt;Mr Rod Beckstrom, CEO ICANN, on cooperation with UNESCO, next steps&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;1. &lt;strong&gt;Multilingualism in cyberspace&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Proposed speakers:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Mr Baher Esmat, Manager, Regional Relations – Middle East, ICANN&lt;/li&gt;&lt;li&gt;Mr Daniel Pimienta, President of FUNREDES (Fundacion Redes y Desarrollo)&amp;nbsp;Saint Domingue, Dominican Republic&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;Open discussion&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;2. &lt;strong&gt;Open access to scientific information and open educational resources&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Proposed speakers:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Mr Indrajit Banerjee, Director, Information Society Division, Communication and&amp;nbsp;Information Sector, UNESCO&lt;/li&gt;&lt;li&gt;Mr Abel Packer, Director of the SciELO.org Open Access (OA) initiative&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;Open discussion&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;3. &lt;strong&gt;An initiative on developing inclusive information policies using ICTs in education for&amp;nbsp;&lt;/strong&gt;&lt;strong&gt;persons with disabilities&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Proposed speakers:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Mr Axel Leblois, Executive Director, the Global Initiative for Inclusive Information&amp;nbsp;and Communications Technologies 9G3ict), An Advocacy Initiative of the United&amp;nbsp;Nations Global Alliance for ICT and Development&lt;/li&gt;&lt;li&gt;Ms Anja Kovacs, Centre for Internet and Society (India)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;Open discussion&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/unesco-open-forum'&gt;https://cis-india.org/events/unesco-open-forum&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-05T03:58:47Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/asia-pacific-regional-internet-governance-forum-aprigf-2017">
    <title>UNESCO Multistakeholder consultation at 8th Asia Pacific Regional Internet Governance Forum (APrIGF)</title>
    <link>https://cis-india.org/internet-governance/news/asia-pacific-regional-internet-governance-forum-aprigf-2017</link>
    <description>
        &lt;b&gt;Sunil Abraham was a speaker at the APrIGF 2017 organized by UNESCO in Bangkok from July 26 to 29, 2017. Vidushi Marda also participated in the event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;UNESCO takes the occasion to present its&lt;b&gt; &lt;/b&gt;new project&lt;b&gt; “Defining Internet Universality Indicators” &lt;/b&gt;and engage with Asia-Pacific stakeholders, including young experts, at the 8&lt;sup&gt;th&lt;/sup&gt; Asia Pacific Regional Internet Governance Forum (APrIGF) for their inputs and contributions. This is a part of a &lt;b&gt;global consultation&lt;/b&gt; to develop a set of Internet Universality indicators. The project is an immediate response following UNESCO’s adoption of the &lt;b&gt;‘CONNECTing the Dots’ Outcome document i&lt;/b&gt;&lt;b&gt;n 2015&lt;/b&gt;, where UNESCO put the concept of ‘Internet Universality’ at the heart of its work to promote an Internet that works for all. &lt;b&gt;Internet universality&lt;/b&gt; points to four fundamental norms – known for short as the &lt;b&gt;ROAM&lt;/b&gt; &lt;b&gt;principles&lt;/b&gt; – which are the guiding framework that promotes an Internet based on:&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Rights (R)&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Openness (O)&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Accessibility (A) &lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Multistakeholder Participation (M)&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The project aims to &lt;b&gt;elaborate appropriate Internet indicators&lt;/b&gt;, which can serve to enrich the stakeholders’ capacity for assessing Internet development, broaden international consensus, and foster online democracy and human rights towards knowledge societies engaged in sustainable development. These indicators will&lt;b&gt; help governments and other stakeholders&lt;/b&gt; to assess their own national Internet environments and to promote the values associated with Internet Universality. Special attention will be paid to &lt;b&gt;gender&lt;/b&gt; and to the &lt;b&gt;needs and interests of&lt;/b&gt; &lt;b&gt;children&lt;/b&gt; and &lt;b&gt;young people&lt;/b&gt;. There will be a mix of quantitative and qualitative indicators. The work on the project to define Internet Universality indicators is being led for UNESCO by the Association for Progressive Communications (APC).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;b&gt;8&lt;sup&gt;th &lt;/sup&gt;&lt;/b&gt;&lt;b&gt;APrIGF&lt;/b&gt; is of high pertinence to the Internet Universality Indicators because it serves as a multi-stakeholder platform for public policy on Internet and its impact on society. It draws discussions and powers collaborations for the developments of &lt;b&gt;universally affordable, accessible, non-discriminated, secure and sustainable&lt;/b&gt; &lt;b&gt;Internet&lt;/b&gt; across the region, which are the focus topics of UNESCO’s multi-stakeholder consultation; as well as addressing &lt;b&gt;gender inclusion&lt;/b&gt; and the &lt;b&gt;inclusion of children and young people in the Internet environment&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The session will start with a brief presentation of the draft indicators and brief remarks from the speakers. The moderator will structure the discussion into five slots on Human Rights, Openness, Access, Multi-stakeholderism and crosscutting dimension and will invite all of you to take the floor. Focus groups will possibly be created to facilitate more in-depth discussion among participants. Some key questions will be asked to all participants regarding your experience of gathering and using Internet indicators within your country/area of work or the most important issues related to human rights, openness, accessibility and multistakeholder approach that should be included in the Internet Universality indicators.&lt;/p&gt;
&lt;p&gt;A draft background paper on Defining Internet Universality Indicators will be shared and released before the session as a basis for discussion.&lt;/p&gt;
&lt;p&gt;Written contribution is welcome via UNESCO &lt;b&gt;email&lt;/b&gt;: &lt;a href="mailto:internetstudy@unesco.org"&gt;internetstudy@unesco.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;An online platform for consultation will be available at: &lt;a href="http://www.unesco.org/new/en/internetuniversality"&gt;http://www.unesco.org/new/en/internetuniversality&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt;In-Person Co-Moderators&lt;/span&gt;: Ms. Xianhong Hu; Ms. Chat Garcia Ramilo&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt;Speakers&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Presentation of the project&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ms Xianhong Hu, UNESCO&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Speakers on &lt;b&gt;Human Rights&lt;/b&gt; dimension indicators&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ms Gayatri Khandahai, APC&lt;/li&gt;
&lt;li&gt;Ms. Anja Kovacs, Internet Democracy Project&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Speakers on &lt;b&gt;Openness&lt;/b&gt; indicators&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ms Xue Hong, Beijing Normal University&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Speakers on &lt;b&gt;Accessibility&lt;/b&gt; indicators&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mr. Winston Roberts, International Federation of Library Associations &amp;amp; Institutions&lt;/li&gt;
&lt;li&gt;Ms. Piyawan Suwattanathum, UNESCO Bangkok Education&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Speakers on &lt;b&gt;Multi-stakeholderism&lt;/b&gt; indicators&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mr. Sunil Abraham, Center for Internet Society&lt;/li&gt;
&lt;li&gt;Mr. Naveed Haq, ISOC&lt;/li&gt;
&lt;li&gt;Ms. Joyce Chen, ICANN&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Speakers on &lt;b&gt;Crosscutting &lt;/b&gt;dimension indicators&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ms. Bishakha Datta, Point of View&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;Vidushi participated in the following meetings on July 26:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fellowship Morning Meeting &lt;/li&gt;
&lt;li&gt;Meet &amp;amp; Greet for Fellows &amp;amp; Buddies&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Sharing of IG/Internet in your economies&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Expectation Setting &amp;amp; Quick Brief of 3 days agenda&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Capacity Building Day (13:00 - 18:30)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Welcome Social for Fellows @CU International House&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The following meetings on July 27:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Opening Plenary&lt;/li&gt;
&lt;li&gt;Synthesis Document Townhall Sessions&lt;/li&gt;
&lt;li&gt;Respective sub-theme sessions assigned for rapporteur work&lt;/li&gt;
&lt;li&gt;Closing Plenary&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Digital Asia Hub and CIS workshop on "Technology and Extremism" was a highlight of the event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vidushi moderated a panel discussing the PT project and sharing key findings, titled: "Towards Sustainable Development in Asia Pacific: Mobile Internet and Access to Knowledge in the Marketplace".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vidushi also attended the Global Partners Digital Event on the GCCS. List of APrIGF fellows can be &lt;a class="external-link" href="https://2017.aprigf.asia/fellows/"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/asia-pacific-regional-internet-governance-forum-aprigf-2017'&gt;https://cis-india.org/internet-governance/news/asia-pacific-regional-internet-governance-forum-aprigf-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-08-09T01:49:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
