<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1811 to 1825.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-september-3-2015-harjeet-inder-singh-sahi-hiding-behind-rules-on-naming-sites-it-banned-govt-reveals-fears"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindustan-times-elonnai-hickok-august-7-2017-here-is-why-we-need-a-lot-more-discussion-on-indias-new-dna-profiling-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-danish-raza-october-15-2016-here-is-why-government-twitter-handles-have-been-posting-offensive-and-partisan-messages"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/india-today-june-16-2016-here-is-the-entire-list-of-escorts-service-websites-that-govt-has-banned"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/health-data-management-policies"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/ndtv-video-the-social-network-feb-5-2013-hate-speech-ban-or-ignore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/has-geek-presents-the-fifth-elephant"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-september-17-2018-haryana-cops-say-internet-shutdowsn-hurt-police-operations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/governance-now-march-9-2016-taru-bhatia-hard-to-broad-ban"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/www-ibnlive-in-com-haphazard-censorship-leaked-list-of-blocked-sites"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/indian-express-january-11-2018-"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hakon-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hacking-without-borders-the-future-of-artificial-intelligence-and-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/hackers-take-protest-to-indian-streets-and-cyberspace"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-september-3-2015-harjeet-inder-singh-sahi-hiding-behind-rules-on-naming-sites-it-banned-govt-reveals-fears">
    <title>Hiding behind rules on naming sites it banned, govt reveals fears </title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-september-3-2015-harjeet-inder-singh-sahi-hiding-behind-rules-on-naming-sites-it-banned-govt-reveals-fears</link>
    <description>
        &lt;b&gt;With the union government's ban on 857 porn sites in July creating brouhaha across the country, there had been a concern over the voice of the youth being stifled and censorship making a comeback.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Harjeet Inder Singh Sahi was published in the &lt;a class="external-link" href="http://www.hindustantimes.com/chandigarh/hiding-behind-rules-on-naming-sites-it-banned-govt-reveals-fears/story-Ef2IdZLe4mu15KNpe8HOHO.html"&gt;Hindustan Times&lt;/a&gt; on September 3, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Even though there was a partial rollback of the ban, the government  still seems intent on being obtrusive with information and deny access  to it, especially about the internet and the way it intends to govern  it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This has been illustrated by the union government's department of  telecommunications refusing to provide information on websites it has  banned to a petition under the Right to Information (RTI) Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The reply&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The group coordinator, cyber law division, department of electronics  and information technology, has been authorised as designated officer  and issues instructions for blocking/unblocking of websites/URLs. The  clause 16 of Information Technology Procedure and Safeguards for  blocking access of information by Public, Rules 2009, says strict  confidentiality shall be maintained regarding all requests and  complaints received and actions taken thereof," says the reply to the  RTI application filed by this correspondent on August 3.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The reply to the petition - filed at &lt;a href="http://www.rtionline.gov.in"&gt;www.rtionline.gov.in&lt;/a&gt; with registration number DOTEL/R/2015/61348 - was received on August 27.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Background to the case&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In July this year, the department of electronics and information  technology had banned 857 pornographic websites listed in the petition  of Indore-based advocate Kamlesh Vaswani in the supreme court. The  websites were banned by citing 'morality' and 'decency' enshrined in  Article 19 (2) of the Constitution of India and under provisions of the  Information Technology Act, 2000. A few days later, the government did a  flip-flop and revoked the ban partially.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society (CIS) had subsequently released  the list online. Now, the government has refused to provide information  on websites banned in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Department tangle&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The department of electronics and IT decided on the ban, but it was  the department of telecom which served the order to the internet  companies because it is the supervising authority for them. The RTI can  be filed with the department of telecom as it issues guidelines for and  notices to internet service providers. The same application could also  have been filed with the department of electronics and information  technology. This department might have replied to the application or  forwarded it to the telecom department.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-september-3-2015-harjeet-inder-singh-sahi-hiding-behind-rules-on-naming-sites-it-banned-govt-reveals-fears'&gt;https://cis-india.org/internet-governance/news/hindustan-times-september-3-2015-harjeet-inder-singh-sahi-hiding-behind-rules-on-naming-sites-it-banned-govt-reveals-fears&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-09-27T10:59:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindustan-times-elonnai-hickok-august-7-2017-here-is-why-we-need-a-lot-more-discussion-on-indias-new-dna-profiling-bill">
    <title>Here’s why we need a lot more discussion on India’s new DNA Profiling Bill</title>
    <link>https://cis-india.org/internet-governance/blog/hindustan-times-elonnai-hickok-august-7-2017-here-is-why-we-need-a-lot-more-discussion-on-indias-new-dna-profiling-bill</link>
    <description>
        &lt;b&gt;The DNA Profiling Bill 2017 is still missing a number of safeguards that would enable individual rights. The implications of creating regional and national level DNA databanks need to be fully understood and publicly debated. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.hindustantimes.com/analysis/here-s-why-we-need-a-lot-more-discussion-on-india-s-new-dna-profiling-bill/story-CojTDv2vfMMMBsW0CaLxIP.html"&gt;Hindustan Times&lt;/a&gt; on August 7, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The first step towards a DNA Profiling Bill was taken in 2007 with the ‘&lt;a href="http://www.prsindia.org/uploads/media/draft/DNA_Bill.pdf"&gt;Draft DNA Profiling Bill&lt;/a&gt;” by the Centre for DNA Fingerprinting and Diagnostics. Since then, there has been a &lt;a href="http://www.prsindia.org/uploads/media/draft/DNA_Bill.pdf"&gt;2012&lt;/a&gt;, &lt;a href="http://www.prsindia.org/uploads/media/draft/Draft%20Human%20DNA%20Profiling%20Bill%202015.pdf"&gt;2015&lt;/a&gt;, and a 2016 version of the Bill - the last not available to the public. In 2013, the Department of Biotechnology formulated an &lt;a href="https://cis-india.org/internet-governance/blog/expert-committee-meetings.zip/view"&gt;Expert Committee &lt;/a&gt;to  deliberate on concerns raised about the Bill and finalise the text. The  “Use and Regulation of DNA Based Technology Bill 2017” and the report  by the Law Commission is a further evolution of the legislation and  dialogue. The 2017 Bill contains a number of improvements from previous  versions - yet there are still outstanding concerns that remain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Positive changes in the Bill include provisions for consent, defined  instances for deletion of profiles, limitation on purpose of the use of  data in the DNA Data Bank, defined instances fo r destruction of  biological samples, and the ability for an individual to request a  re-test of bodily substances if they believe contamination has occurred.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite these changes the Bill still has an overly broad  schedule defining instances of when DNA profiling can be used and is  missing a number of safeguards that would enable individual rights.  These include a right to notification of storage and access to  information on the DNA databank, the right to appeal and challenge  storage of DNA samples, and right to access and review personal  information stored on the DNA Data Bank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is concerning that the 2017 Bill has left the defining of privacy  and security safeguards to regulation — including implementation and  sufficiency of protection, appropriate use and dissemination of DNA  information, accuracy, security and confidentiality of DNA information,  timely removal and deletion of obsolete or inaccurate DNA information,  and other steps as necessary. Furthermore, though the Law Commission  cites the use of the 13 CODIS (Combined DNA Index System) profiling  standard as a means to protecting privacy in its report — this standard  has yet to find its way in the text of the Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The implications of creating regional and national level DNA  databanks need to be fully understood and publicly debated. DNA is not  foolproof - false matches can take place for multiple reasons.  Importantly, the usefulness of DNA based technology to a legal system  and the impact on individual rights is dependent and reflective of the  social, legal, and political environment the technology is used in. DNA  based technology can be a powerful tool for law enforcement, and it is  important that a robust process and structure is given to the collection  of DNA samples from a crime scene to the laboratory for analysis, to  the DNA Bank for storage and comparison, but this structure needs to  also be fully cognizant of the rights of individuals and the potential  for misuse of the technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As society continues to rapidly become more and more data centric, and  that data increasingly is a direct extension of the person, it is  critical that legislation that is developed has clear protections of  rights. In addition to amendments to the text of the draft 2017 Bill,  this includes enacting a comprehensive privacy legislation in India. It  is worrying that in the conclusion of its report, the Law Commission has  referred to whether privacy is an integral part of Article 21 of the  Constitution as merely “a matter of academic debate.” Privacy is  recognised as a fundamental right in many democratic contexts –  including many of those reviewed by the Law Commission as examples of  contexts with DNA Profiling laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Policy needs to evolve past protections that are limited to process  oriented legal privacy provisions, but instead to protections that are  comprehensive — accounting for process and enabling the individual to  control and know how her/his data is being used and by whom. Other  countries have recognised this and are taking important steps to empower  the individual. India needs to do the same for its citizens.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindustan-times-elonnai-hickok-august-7-2017-here-is-why-we-need-a-lot-more-discussion-on-indias-new-dna-profiling-bill'&gt;https://cis-india.org/internet-governance/blog/hindustan-times-elonnai-hickok-august-7-2017-here-is-why-we-need-a-lot-more-discussion-on-indias-new-dna-profiling-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-08-21T23:48:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-danish-raza-october-15-2016-here-is-why-government-twitter-handles-have-been-posting-offensive-and-partisan-messages">
    <title>Here is why government twitter handles have been posting offensive and partisan messages </title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-danish-raza-october-15-2016-here-is-why-government-twitter-handles-have-been-posting-offensive-and-partisan-messages</link>
    <description>
        &lt;b&gt;You have failed us big time Mr Kejriwal, for your petty political gains you can become headlines for Pakistani press,” read a tweet on October 5 from @IndiaPostOffice, the official twitter handle of the Indian postal service.&lt;/b&gt;
        &lt;div align="justify" id="div_storyContent"&gt;
&lt;p&gt;The article by Danish Raza was &lt;a href="http://www.hindustantimes.com/india-news/here-is-why-government-twitter-handles-have-been-posting-offensive-and-partisan-messages/story-TETZblpE9F2JVzTYOALMjL.html"&gt;published in the Hindustan Times&lt;/a&gt; on October 15, 2016. Nishant Shah was quoted.&lt;/p&gt;
&lt;hr size="2" width="100%" /&gt;
&lt;p&gt;It was a reference to Delhi Chief Minister Arvind Kejriwal urging the  Prime Minister to counter Pakistan’s propaganda over surgical strikes.&lt;/p&gt;
&lt;p&gt;Within hours, India Post tweeted an apology saying that the account was hacked.&lt;/p&gt;
&lt;p&gt;This is the latest in a series of opinions and statements posted from  official twitter handles of government departments and bodies. Of late,  the Twitter handles meant to broadcast information related to  government programmes have appeared like personal accounts tweeting  slander and criticism.&lt;/p&gt;
&lt;p&gt;Last month, the Twitter handle of Digital India tweeted a poem in  Hindi calling on the Indian Army to persistently fire at protesters in  Kashmir.&lt;/p&gt;
&lt;p&gt;In August, the Twitter handle of Startup India retweeted a post  suggesting that the Indian Army should ‘take care’ of #Presstitutes, a  reference to sections of Indian media critical of the government.&lt;/p&gt;
&lt;p&gt;The tweets expose loopholes in the government’s social media policy  and raise questions about the norms followed in the recruitment of  social media professionals for ministries and government institutions.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Work in Progress&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The process of adopting new tools is work in progress. While the  government agencies are trying to leverage social media to enhance  citizen engagement, for the vast majority of government bodies, it is  unexplored territory. Babus who have traditionally been dealing in  paperwork and file notings are overwhelmed to see hash tags and trends.  With a tech- savvy Prime Minister at the helm, every government  department is trying to increase its digital footprint. At the same  time, they face the challenge of reinterpreting existing work ethics and  codes of conduct and applying them to the use of social media.  Ministries such as the Ministry of External Affairs, Information &amp;amp;  Broadcasting and the Prime Minister’s Office which have cohesive  programmes and big mandate, have separate social media wings of their  own with well- defined protocols. But these are exceptions.&lt;/p&gt;
&lt;p&gt;Overall, the government bodies lack social media guidelines for their  own efforts or which others can learn from. According to Chinmayi Arun,  executive director, Centre for Communication Governance, National Law  University, Delhi, mistakes are bound to happen given that everyone is  new to social media. But it should be non-negotiable that when anything  is said using an official governmental handle, the government should  take more responsibility than just saying ‘oops’. “One of course is a  clear and unequivocal statement apologising and taking back whatever was  said. However, it should take pro-active measures to train and test  people who handle its public-facing accounts and publish a clear  monitoring and accountability mechanism by which they can be called to  account. It should not be open to anyone to misuse the government’s  official handles in this manner,” said Arun.&lt;/p&gt;
&lt;p&gt;One of the areas where the lack of sensitisation is apparent is the  usage of the same mobile device for multiple twitter handles – the most  common reason for such goof-ups cited by social media consultants  attached to various government departments. “I believe these were  inadvertently posted by people handling these accounts. It may neither  have been their mandate nor their intention. It happens when the person  has configured multiple twitter handles from the same device and ends up  posting from the wrong account,” said Amit Malviya, BJP’s National  Convener, IT.&lt;/p&gt;
&lt;p&gt;The majority of ministries and government departments do not give  phones to members of the social media teams. It is up to the individual  to use his personal device or get an additional one to manage the  professional handle (s). A mistake will happen if a comment which was to  be posted from the personal handle is posted from the official handle.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Twitter Goof-ups from GoI Accounts&lt;/b&gt;&lt;/p&gt;
&lt;div class="wrapbox"&gt;&lt;img src="http://www.hindustantimes.com/static/ht2016/10/twitter_goofs.jpg" width="100%&amp;quot;/" /&gt;&lt;/div&gt;
&lt;p&gt;“Because of the personalised and individual nature of social media,  it is easy to forget that they are representing an institution and not  themselves when using these handles. This also suggests the lack of  public usage training in these organisations, and the need to educate  our public actors in using social media with more responsibility as  office bearers of an institution rather than a personal expression or an  opinion,” said Nishant Shah, co-founder of the Centre for Internet and  Society, Bangalore.&lt;/p&gt;
&lt;p&gt;Another issue is that access to the account is given to multiple  people. “Each one of them brings their individual personality and  politics to their operation of the handle,” said Shah.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Hiring Issues&lt;br /&gt; &lt;/b&gt;&lt;/p&gt;
Part of the problem lies in the fact that there is no standard  protocol on who can access the twitter handle of Indian government  bodies and how this person or team is hired.
&lt;p&gt;A few ministries (example: the ministry of railways) have a team  comprising of government employees and staff of private agencies  handling their account. Others have outsourced the job to agencies.&lt;/p&gt;
&lt;p&gt;During the campaigning for the 2009 election, political parties got  outside expertise to mark their presence online. The selection  parameters of social media consultants – established public relations  firms in some cases and individuals in others – was not uniform.&lt;/p&gt;
&lt;section class="story_top_news"&gt;
&lt;div class="news_photo"&gt;&lt;img src="http://www.hindustantimes.com/rf/image_size_800x600/HT/p2/2016/10/15/Pictures/16-10-ht-weup-1-15_636b22d4-92ec-11e6-b1ee-4de56c7571da.jpg" /&gt;&lt;/div&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;/section&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Unlike the traditional public relations officers who are from the  Indian Information Services cadre, the social media consultants were  selected based on their expertise in the field, political affiliation,  and proximity to a party or leader.&lt;/p&gt;
&lt;p&gt;Those who started handling social media accounts of political parties  and leaders included trolls and social media influencers. “Parties got  youngsters who were politically motivated and willing to work for  political parties. They became cheaper alternatives for social media  experts,” said Ishan Russel, political communication consultant.&lt;/p&gt;
&lt;p&gt;After the NDA came to power, almost every ministry outsourced its  digital expertise to agencies. Many individuals who were earlier  directly working with leaders and parties got back with them via  agencies. “If an agency is looking for people to handle the twitter  account or Facebook page of a certain ministry in the BJP government,  then those who are politically inclined towards the BJP will apply for  the vacancies and their chances of getting hired are also much higher  than someone who is neutral or known to be an AAP sympathiser,” said  Vikas Pandey, 32-year-old software engineer, who headed the “I Support  Namo” campaign on Facebook and Twitter, as a volunteer for the BJP.&lt;/p&gt;
&lt;p&gt;Last year, the Prime Minister felicitated more than a dozen social  media enthusiasts, including Vikas. The move raised eyebrows because  many felt that the government was encouraging trolls. “It illuminates  the fact that trolls have found gainful employment in the Government of  India. Also that the entire edifice of the centre is being taken over by  woefully undereducated bigots,” said Swati Chaturvedi, senior  journalist and author.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Agency, the Soft Target&lt;br /&gt; &lt;/b&gt;&lt;/p&gt;
Till the time the government staff is well versed with social media  tools, attributing the mistakes to an ‘outside agency’ appears to be the  norm.
&lt;p&gt;In the case of the twitter goof-up involving Startup India, Commerce  and Industry minister Nirmala Sitharaman blamed a private agency that  was managing the account of Startup India. “The retweets were done by an  employee of the agency hired by the department of industrial policy and  promotion. The person assigned by the agency for this particular job is  not decided by the department and is the sole prerogative of the  agency,” she said.&lt;/p&gt;
&lt;p&gt;S Radha Chauhan, CEO of National e-Governance Division, attributed  the controversial post from Digital India’s twitter handle to an agency  called Trivone. “The person responsible had mistakenly tweeted from the  official handle what he wanted to tweet from his personal account,” said  Chauhan.&lt;/p&gt;
&lt;p&gt;Those familiar with the functioning of the government’s social media  verticals say that agencies are mentioned to cover up for mistakes often  committed by someone from the government staff. “When in crisis, blame  the agency, is the thumbrule the government follows. The fact is that  each twitter post is approved by the client before it is posted,” said a  senior executive with a digital marketing firm attached to a ministry  which has recently earned lot of praise for its social media  initiatives.&lt;/p&gt;
&lt;p&gt;Nishtha Arora, social media and digital consultant in a reputed ad  agency, was handling a political account till very recently. She said  that the client required her to just randomly tweet or RT to be heard by  the followers of a tech-savvy minister and be his digital mouthpiece.  “I often had to draft tweets which looked like press releases,” she  said.&lt;/p&gt;
&lt;p&gt;“Digital faux pas is blamed on to someone who might be an expert in  the field but yet has to bow down to the client pressure so that their  agenda for the day is met and the said government body or ministry  remains in the news,” she added.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-danish-raza-october-15-2016-here-is-why-government-twitter-handles-have-been-posting-offensive-and-partisan-messages'&gt;https://cis-india.org/internet-governance/news/hindustan-times-danish-raza-october-15-2016-here-is-why-government-twitter-handles-have-been-posting-offensive-and-partisan-messages&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Twitter</dc:subject>
    
    
        <dc:subject>Social Networking</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-10-16T03:24:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/india-today-june-16-2016-here-is-the-entire-list-of-escorts-service-websites-that-govt-has-banned">
    <title>Here is the entire list of 'escorts service' websites that the government has banned</title>
    <link>https://cis-india.org/internet-governance/news/india-today-june-16-2016-here-is-the-entire-list-of-escorts-service-websites-that-govt-has-banned</link>
    <description>
        &lt;b&gt;Another day and another opaque order asking Indian service providers to block websites that allegedly offer or advertise escort services in India. In total, the government has ordered ban on 237 websites. But as it happens whenever the Indian government bans website, there has been no public communication about the same. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indiatoday.intoday.in/technology/story/govt-blocks-239-indian-escorts-service-websites/1/692381.html"&gt;published in India Today&lt;/a&gt; on June 16, 2016&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Also, it has not been explained what, if any, process was followed before these websites were banned and what norms were applied for the order that the internet service providers have received.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;However, now Centre for Internet and Society has caught hold of the list of the websites that have been banned. Here is what &lt;a href="http://cis-india.org/internet-governance/blog/list-of-blocked-escort-service-websites" target="_blank"&gt;the organisation says,&lt;/a&gt; "Unfortunately, the government does not make available publicly the  list of websites they have ordered ISPs to block. Given that knowledge  of what is censored by the government is crucial in a democracy, we are  publishing the entire list of blocked websites." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;As for the websites and URLs here they are:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;www.sterlingbioscience.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;rawpoint.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.onemillionbabes.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaihotcollection.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;simranoberoi.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;rubinakapoor.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;talita.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiescortsagency.net&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaifunclubs.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.alishajain.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.ankitatalwar.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;https://www.jennyarora.ind.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.riya-kapoor.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;shneha.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;missinimi.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiglamour.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;kalyn.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.saumyagiri.co.in/city/mumbai/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;bookerotic.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.divyamalik.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.suhanisharma.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.ruhi.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;umbaiqueens.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.aliyaghosh.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;priyasen.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.highprofilemumbaiescorts.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;charmingmumbai.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.poojamehata.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;kiiran.in/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;mansikher.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.newmumbaiescorts.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaifunclubs.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.punarbas.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.discreetbabes.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.alisharoy.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.arpitarai.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.nidhipatel.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;navimumbailescort.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.zoyaescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.juhioberoi.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;shoniya.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;panchibora.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;rehu.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.nehaanand.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.aditiray.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.rakhibajaj.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.alianoidaescorts.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.sobiya.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.alishaparul.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;mumbai-escorts.leathercurrency.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;ankita-ahuja.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.yamika.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;mumbailescort.co&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.ranjika.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.aditiray.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.alinamumbailescort.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.sonikaa.com/services/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;riyamodel.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;soonam.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.sejalthakkar.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.yomika-tandon.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.asika.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.siyasharma.org/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.rubikamathur.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiescortslady.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.sexyshe.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.indepandentescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.saanvichopra.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.goswamipatel.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;ojaloberoi.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.naincy.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.sonyamehra.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.pinkgrapes.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;anjalitomar.in/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.nishakohli.com/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;sagentia.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;mumbai.vivastreet.co.in/escort+mumbai&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.deseescortgirls.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;guides.wonobo.com/mumbai/mumbai-escorts-service/.4299&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;jasmineescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.shalinisethi.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.highclassmumbailescort.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.vipescortsinmumbai.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiescorts69.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;monikabas.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.riyasehgal.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;onlycelebrity.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.greatmumbaiescorts.com/escort-service-mumbai.html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.aishamumbailescort.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.jennydsouzaescort.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.desifun.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.siyaescort.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;masti-escort.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.sofya.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiwali.in/navi-mumbai-escort-service.php&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiwali.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.calldaina.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiescortsservice.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.escortsgirlsinmumbai.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.passionmumbai.escorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.nehakapoor.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;meerakapoor.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.dianamumbaiescorts.net .in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.allmumbailescort.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.rakhiarora.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.ritikasingh.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.rekhapatil.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaidolls.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.piapandey.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaicuteescorts.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiescortssevice.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.onlycelebrity.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.meetescortservice.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;onlyoneescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;simirai.org&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.riyamumbaiescorts.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.neharana.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaihiprofilegirls.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.sexyescortsmumbai.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.sexymumbai.escorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.four-seasons-escort.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiescortsgirl.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.vdreamescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.passionatemumbaiescorts.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.payalmalhotra.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.shrutisinha.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.juliemumbaiescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.indiasexservices.com/mumbai.html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbai-escorts.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.aliyamumbaiescorts.net.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;shivaniarora.co.in/escort-service-mumbai.html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.pinkisingh.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;soyam.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.arpitaray.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.localescorts.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.jennifermumbaiescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.yanaroy.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;escorts18.in/mumbai-escorts.html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.tinamumbaiescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaijannatescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.deepikaroy.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.nancy.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.pearlpatel.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;30minsmumbaiescorts.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.datinghopes.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;https://www.riyaroy.com/services.html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.sonalikajain.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.zainakapoor.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;kavyajain.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.kinnu.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;exmumbai.in/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mansimathur.in/pinkyagarwal&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;exmumbai.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mansimathur.in/pinkyagarwal&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.devikabatra.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;katlin.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;riyaverma.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;escortsinindia.co/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.snehamumbaiescorts.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;shimi.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiescortsforu.com/about&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.chetnagaur.co.in/chetna-gaur.html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.escortspoint.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.rupalikakkar.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.hemangisinha.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;1escorts.in/location/mumbai.html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.salini.in/navi-mumbai-independent-escort-service.php&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.salini.in/navi-mumbai-independent-escort-service.php&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaibella.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;mohitescortservicesmumbai.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.anchu.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.aliyaroy.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;jaanu.co.in/mumbai-escorts-service-call-girls.html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.andyverma.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;dreams-come-true.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;feel-better.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;jellyroll.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;dreamgirlmumbai.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;role-play.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;mansi-mathur.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.zarinmumbaiescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;mymumbai.escortss.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.goldentouchescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaipassion.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;ishitamalhotra.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;happy-ending.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;juicylips.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.escortsmumbai.name&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.kirstygbasai.net&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.hiremumbaiescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.meeraescorts.com/mumbai-escorts.php&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;3-5-7star.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.pranjaltiwari.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.richagupta.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;way2heaven.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;piya.co/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;pinkflowers.info&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.beautifulmumbaiescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.bestescortsinmumbai.com/charges-html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiescorts.me&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.tanikatondon.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.escortsinmumbai.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.escortgirlmumbai.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaicallgrils.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.quickescort4u.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mayamalhotra.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.legal-escort.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;escortsbaba.com/mumbai-escorts.html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;rupa.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiescorts.agency/erotic-service-mumbai.html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.escortscelebrity.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.independentescortservicemumbai.com/mumbai%20escort%20servi..&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;garimachopra.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;kajalgupta.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;lipkiss.site&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;aanu.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;bombayescort.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;hotkiran.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;khushikapoor.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;joyapatel.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;rici.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;aaditi.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;andheriescorts.org.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.jiyapatel.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;spicymumbai.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;rimpyarora.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;lovemaking.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;riyadubey.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;escortservicesmumbai.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;mumbaiescorts.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;midnightprincess.in/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;vashiescorts.co.in/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;angee.in/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.rozakhan.in/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiescortsvilla.in/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;kylie.co.in/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;escortservicemumbai.co.in&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/india-today-june-16-2016-here-is-the-entire-list-of-escorts-service-websites-that-govt-has-banned'&gt;https://cis-india.org/internet-governance/news/india-today-june-16-2016-here-is-the-entire-list-of-escorts-service-websites-that-govt-has-banned&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2016-07-02T04:51:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/health-data-management-policies">
    <title>Health Data Management Policies - Differences Between the EU and India </title>
    <link>https://cis-india.org/internet-governance/blog/health-data-management-policies</link>
    <description>
        &lt;b&gt;Through this issue brief we would like to highlight the differences in approaches to health data management taken by the EU and India, and look at possible recommendations for India, in creating a privacy preserving health data management policy. &lt;/b&gt;
        &lt;p&gt;This issue brief was reviewed and edited by Pallavi Bedi&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Health data has seen an increased interest the world over, on account of the amount of information and inferences that can be drawn not just about a person but also about the population in general. The Covid 19 pandemic also brought about an increased focus on health data, and brought players that earlier did not collect health data to be required to collect such data, including offices and public spaces. This increased interest has led to further thought on how health data is regulated and a greater understanding of the sensitivity of such data, because of which countries are in varying processes to get health data regulated over and above the existing data protection regulations. The regulations not only look at ensuring the privacy of the individual but also look at ways in which this data can be shared with companies, researchers and public bodies to foster innovation and to monetise this valuable data. However for a number of countries the effort is still on the digitisation of health data. India has been in the process of implementing a nationwide health ID that can be used by a person to get all their medical records in one place. The National Health Authority (NHA) has also since 2017 been publishing policies that look at the framework and ecosystem of health data, as well as the management and sharing of health data. However these policies and a scattered implementation of the health ID are being carried out without a data protection legislation in place. In comparison, Europe, which already has an established health Id system, and a data protection legislation (GDPR) is looking at the next stage of health data management through the EU Health Data Space (EUHDS). Through this issue brief we would like to highlight the differences in approaches to health data management taken by the EU and India, and look at possible recommendations for India, in creating a privacy preserving health data management policy.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Background&lt;/h2&gt;
&lt;h3&gt;EU Health Data Space&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The EU Health Data Space (&lt;b&gt;EUHDS&lt;/b&gt;) was proposed by the EU Council as a way to create an ecosystem which combines rules, standards, practices and infrastructure, around health data under a common governance framework. The EUHDS is set to rely on two pillars; namelyMyHealth@EU and HealthData@EU, where MyHealth@EU facilitates easy flow of health data between patients and healthcare professionals within member states, the HealthData@EU,faciliates secondary use of data which allows policy makers,researchers access to health data to foster research and innovation.&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[1]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The EUHDS aims to provide a trustworthy system to access and process health data and builds up from the General Data Protection Regulation (GDPR), proposed Data Governance Act.&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[2]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;India’s health data policies: &lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The last few years has seen a flurry of health policies and documents being published and the creation of a framework for the evolution of a National Digital Health Ecosystem (NDHE). The components for this ecosystem were the National Digital Health Blueprint published in 2019 (NDHB) and the National Digital Health Mission (NDHM). The BluePrint was created to implement the National Health Stack (published in 2018)  which facilitated the creation of Health IDs.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[3]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Whereas the NDHM was drafted to drive the implementation of the Blueprint, and promote and facilitate the evolution of NDHE.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[4]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The National Health Authority (&lt;b&gt;NHA&lt;/b&gt;) established in 2018 has been given the responsibility of implementing the National Digital Health Mission. 2018 also saw the Digital Information Security in Healthcare Act (&lt;b&gt;DISHA&lt;/b&gt;) which was to be a legislation that laid down provisions that regulate the generation, collection, access, storage, transmission and use of Digital Health Data ("DHD") and associated personal data.&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[5]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However since its call for public consultation no progress has been made on this front.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Along with these three strategy documents the NHA has also released policy documents more particularly the Health Data Management Policy (which was revised three times; the latest version released in April 2022), the Health Data Retention Policy (released April 2021), and the Consultation Paper on Unified Health Interface (UHI) (released March 2021). Along with this in 2022 the NHA released the NHA Data Sharing Guidelines for the Pradhan Mantri Jan Aarogya Yojana (PM-JAY) India’s state health insurance policy. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;However these draft guidelines repeat the pattern of earlier policies on health data, wherein there is no reference to the policies that predated it; the PM-JAY’s Data Sharing Guidelines published in August 2022 did not even refer to the draft National Digital Health Data Management Policy (published in April 2022). As stated through the examples above these documents do not cross-refer or mention preceding health data documents, creating a lack of clarity of which documents are being used as guidelines by health care providers. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In addition to this the Personal Data Protection Bill has been revised three times since its release in 2018. The latest version was published for public comments on November 18, 2022; the Bill has removed the distinction between sensitive personal data and personal data and clubbed all personal data under one umbrella heading of personal data.  Health and health data definition has also been deleted; creating further uncertainty with respect to health data as the different policies mentioned above rely on the data protection legislation to define health data. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;&lt;span&gt;Comparison of the Health Data Management Approaches &lt;/span&gt;&lt;/b&gt;&lt;span&gt;&lt;br /&gt; &lt;/span&gt;&lt;span&gt;Interoperability with Data Protection Legislations &lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;At the outset the key difference between the EU and India’s health data management policies has been the legal backing of GDPR which the EUHDS has. EUHDS has a strong base in terms of rules for privacy and data protection as it follows, draws inference and works in tandem with the General Data Protection Regulation (GDPR). The provisions also build upon legislation such as Medical Devices Regulation and the In Vitro Diagnostics Regulation. With particular respect to GDPR the EUHDS draws from the rights set out for protection of personal data including that of electronic health data.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Indian Health data policies however currently exist in the vacuum created by the multiple versions of the Data Protection Bill that are published and repealed or replaced. The current version called the Digital Personal Data Protection Bill 2022 seems to take a step backward in terms of health data. The current version does away with sensitive personal data (which health data was a part of) and keeps only one category of data - personal data. It can be construed that the Bill currently considers all personal data as needing the same level of protection but it is not so in practice. The Bill does not at the moment mandate more responsibilities on data fiduciaries&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[6]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; that deal with health data (something that was present in all the earlier versions of the Bill) and in other data protection legislation across different jurisdictions  and leaves the creation of Significant Data Fiduciaries (who have more responsibilities) to be created by rules, based on the sensitivity of data decided by the government at a later date.&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[7]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In addition to this the Bill does not define “health data”, the reason why this is a cause for worry is that the existing health data policies also do not define health data often relying on the definition mentioned in the versions of Data Protection Bill. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Definitions and Scope&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;The EUHDS defines ‘personal electronic health data’ as data concerning health and genetic data as defined in Regulation (EU) 2016/679&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[8]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, as well as data referring to determinants of health, or data processed in relation to the provision of healthcare services, processed in an electronic form. Health data by these parameters would then include not just data about the status of health of a person which includes reports and diagnosis, but also data from medical devices. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In India the Health Data Management Policy 2022, defines “Personal Health Records” (&lt;b&gt;PHR&lt;/b&gt;) as a health record that is initiated and maintained by an individual. The policy also states that  a PHR would be able to reveal a complete and accurate summary of the health and medical history of an individual by gathering data from multiple sources and making this accessible online. However there is no definition of health data which can be used by companies or users to know what comes under health data. The 2018, 2019 and 2021 version of the Data Protection Legislation had definitions of the term health data, however the 2022 version of the Bill does away with the definition.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Health data and wearable devices&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;One of the forward looking provisions in the EUHDS is the inclusion of devices that records health data into this legislation. This also includes the requirement of them to be added to registries to provide easy access and scrutiny. The document also requires voluntary labeling of wellness applications and registration of EHR systems and wellness applications. This is not just for the regulation point of view but also in the case of data portability, in order for people to control the data they share. In addition to this in the case where manufacturers of medical devices and high-risk AI systems declare interoperability with the EHR systems, they will need to comply with the essential requirements on interoperability under the EHDS. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In India the health data management policy 2022 while stating the applicable entities and individuals who are part of the ABDM ecosystem&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[9]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; mention medical device manufacturers, does not mention device sellers or use terms such as wellness applications or wearable devices. Currently the regulation of medical devices falls under the purview of  the Drugs and Cosmetics Act, 1940 (DCA) read along with the Medical Device Rules, 2017 (MDR). However in 2020 possibly due to the pandemic the Indian Government along with the Drugs Technical Advisory Board (DTAB) issued two notifications the first one expanded the scope of medical devices which earlier was limited to only 37 categories excluding medical apps, and second one notified the Medical Device (Amendment) Rules, 2020. These two changes together brought all medical devices under the DCA as well as expanded the categories of medical devices. However it is still unclear whether fitness tracker apps that come with devices are regulated, as the rules and the DCA still rely on the manufacturer to self-identify as a medical device.&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[10]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, this regulatory uncertainty has not brought about any change in how this data is being used and insurance companies at times encourage people to sync their fitness tracker data.&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[11]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Multiple use of health data &lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The EUHDS states two types of uses of data: primary and secondary use of data. In the document the EU states that while there are a number of organisations collecting data, this data is not made available for purposes other than for which it was collected. In order to ensure that researchers, innovators and policy makers can use this data. the EU encourages the data holders to contribute to this effort in making different categories of electronic health data they are holding available for secondary use. The data that can be used for secondary use would also include user generated data such as from devices, applications or other wearables and digital health applications.However, the regulation cautions against using this data for measures and making decisions that are detrimental to the individual, in ways such as increasing insurance premiums. The EUHDS also states that as the data is sensitive personal data care should be taken by the data access bodies, to ensure that while data is being shared it is necessary to ensure that the data will be processed in a privacy preserving manner. This could include through pseudonymisation, anonymisation, generalisation, suppression and randomisation of personal data.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;While the document states how important it is to have secondary use of the data for public health, research and innovation it also requires that the data is not provided without adequate checks. The EUHDS requires the organisation seeking access to provide several pieces of information and be evaluated by the data access body. The information should include legitimate interest, the necessity and the process the data will go through. In the case where the organisation is seeking pseudonymised data, there is a need to explain why anonymous data would not be sufficient. In order to ensure a comprehensive approach between health data access bodies, the EUHDS states that the European Commission should support the harmonisation of data application, as well as data request.         &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In India, while multiple health data documents state the need to share data for public interest, research and innovation, not much thought has been given to ensuring that the data is not misused and that there is harmonisation between bodies that provide the data. Most recently the PMJay documents states that the NHA shall make aggregated and anonymised data available through a public dashboard for the purpose of facilitating health and clinical research, academic research, archiving, statistical analysis, policy formulation, the development and promotion of diagnostic solutions and such other purposes as may be specified by the NHA. Such data can be accessed through a request to the Data Sharing Committee&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[12]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; for the sharing of such information through secure modes, including clean rooms and other such secure modes specified by NHA. However the document does not mention what clean rooms are in this context. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Health Data Management Policy 2022 states that Data fiduciaries (data controllers/ processors according to the data protection legislation) can themselves make anonymised or de-identified data in an aggregated form available based in technical processes and anonymisation protocols which may be specified by the NDHM in consultation with the MeitY. The purposes mentioned in this policy included health and clinical research, academic research, archiving, statistical analysis, policy formulation, the development and promotion of diagnostic solutions and such other purposes as may be specified by the NDHMP. The policy states that in order to access the anonymised or de-identified data the entity requesting the data would have to provide relevant information such as name, purpose of use and nodal person of contact details. While the policy does not go into details about the scrutiny of the organisations seeking this data, it does state that the data will be provided based on the term as may be stipulated. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;However the issue arises as both the documents published by the NHA do not have a similar process for getting the data, for example the NDHMP requires the data fiduciary to share the data directly, while the PMJay guidelines requires the data to be shared by the Data Sharing Committee, creating duplicate datasets as well as affecting the quality of the data being shared. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;&lt;span&gt;Recommendations for India &lt;/span&gt;&lt;/b&gt;&lt;span&gt;&lt;br /&gt; &lt;/span&gt;&lt;span&gt;Need for a data protection legislation:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;While the EUHDS is still a draft document and the end result could be different based on the consultations and deliberations, the document has a strong base with respect to the privacy and data protection based on the earlier regulations and the GDPR. The definitions of what counts as health data, and the parameters for managing the data creates a more streamlined process for all stakeholders. More importantly the GDPR and other regulations provide a way of recourse for people. In India the health data related  policies and strategy documents have been published and enforced before the data protection legislation is passed. In addition to this India, unlike the EU has just begun looking at a universal health ID and digitisation of the healthcare system, ideally it would be better to take each step at a time, and at first look at the issues that may arise due to the universal health ID. In addition to this, multiple policies, without a strong data protection legislation providing parameters and definitions could mean that the health data management policies only benefit certain people. This also creates uncertainty in terms of where an individual will go in case of harms caused by the processing of their data, and who would be the authority to govern questions around health data. The division of health data management between different documents also creates multiple silos of data management which creates data duplication and issues with data quality. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Secondary use of data&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;While both the EUHDS and India's Health Data Management Policy look at the sharing of health data with researchers and private organisations in order to foster innovation, the division of sharing of data based on who uses the data is a good way to ensure that only interested parties have access to the data. With respect to the health data policies in India, a number of policies talk about the sharing of anonymised data with researchers, however the documents being scattered could cause the same data to be shared by multiple health data entities, making it possible to identify people. For example, the health data management policy could share anonymised data of health services used by a person, whereas the PMJAY policy could share data about insurance covers, and the researcher could probably match the data and be closer to identifying people. It has also been  revealed in multiple studies that anonymisation of data is not permanent and that the anonymisation can be broken. This is more concerning since the polices do not put limits or checks on who the researchers are and what is the end goal of the data sought by them, the policies seem to rely on the anonymisation of the data as the only check for privacy. This data could be used to de-anonymise people, could be used by companies working with the researchers to get large amounts of data to train their systems, &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;train data that could lead to greater surveillance, increase insurance scrutiny etc. The NHA and Indian health policy makers could look at the restrictions and checks that the EUHDS creates for the secondary use of data and create systems of checks and categories of researchers and organisations seeking data to ensure minimal risks to an individual’s data. &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;&lt;span&gt;Conclusion&lt;/span&gt;&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;While the EU Health data space has been criticised for facilitating vast amounts of data with private companies and the collecting of data by governments, the codification of the legislation does in some way give some way to regulate the flow of health data. While India does not have to emulate the EU and have a similar document, it could look at the best practices and issues that are being highlighted with the EUHDS. Indian lawmakers have looked at the GDPR for guidance for the draft data protection legislation, similarly it could do so with regard to health data and health data management. One possible way to ensure both the free flow of health data and the safeguards of a regulation could be to re-introduce the DISHA Act which much like the EUHDS could act as a legislation which provides an anchor to the multiple health data policies, including standard definition of health data, grievance redressal bodies, and adjudicating authorities and their functions. In addition a legislation dedicated to the health data would also remove the existing burden on the to be formed data protection authority. &lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[1]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; “&lt;/span&gt;&lt;span&gt;European Health Data Space&lt;/span&gt;&lt;span&gt;”, European Commission, 03 May 2022,https://health.ec.europa.eu/ehealth-digital-health-and-care/european-health-data-space_en &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[2]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;“&lt;/span&gt;&lt;span&gt;European Health Data Space&lt;/span&gt;&lt;span&gt;”&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[3]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; “National Digital Health Blueprint”, Ministry of Health and Family Welfare Government of India, https://abdm.gov.in:8081/uploads/ndhb_1_56ec695bc8.pdf&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[4]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; “National Digital Health Blueprint”&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[5]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; “Mondaq” “DISHA – India's Probable Response To The Law On Protection Of Digital Health Data” accessed 13 June 2023,https://www.mondaq.com/india/healthcare/1059266/disha-india39s-probable-response-to-the-law-on-protection-of-digital-health-data&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[6]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;“The Digital Personal Data Protection Bill 2022”, accessed 13 June 2023 , https://www.meity.gov.in/writereaddata/files/The%20Digital%20Personal%20Data%20Potection%20Bill%2C%202022_0.pdf&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[7]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;The Digital Personal Data Protection Bill 2022&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[8]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Regulation (EU) 2016/679 defines health data as “Personal data concerning health should include all data pertaining to the health status of a data subject which reveal information relating to the past, current or future physical or mental health status of the data subject. This includes information about the natural person collected in the course of the registration for, or the provision of, health care services as referred to in Directive 2011/24/EU of the European Parliament and of the Council (1) to that natural person; a number, symbol or particular assigned to a natural person to uniquely identify the natural person for health purposes; information derived from the testing or examination of a body part or bodily substance, including from genetic data and biological samples; and any information on, for example, a disease, disability, disease risk, medical history, clinical treatment or the physiological or biomedical state of the data subject independent of its source, for example from a physician or other health professional, a hospital, a medical device or an in vitro diagnostic test. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[9]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; For creating an integrated, uniform and interoperable ecosystem in a patient or individual centric manner, all the government healthcare facilities and programs, in a gradual/phased manner, should start assigning the same number for providing any benefit to individuals.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[10]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; For example a manufacturer of a  fitness tracker which is capable of monitoring heart rate could state that the intended purpose of the device was fitness or wellness as opposed to early detection of heart disease thereby not falling under the purview of the regulation.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[11]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;“&lt;/span&gt;&lt;span&gt;Healthcare Executive” “GOQii Launches GOQii Smart Vital 2.0, an ECG-Enabled Smart Watch with Integrated Outcome based Health Insurance &amp;amp; Life Insurance, accessed 13 June 2023&lt;br /&gt; &lt;/span&gt;&lt;a href="https://www.healthcareexecutive.in/blog/ecg-enabled-smart-watch"&gt;&lt;span&gt;https://www.healthcareexecutive.in/blog/ecg-enabled-smart-watch&lt;/span&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[12]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; The guidelines only state that the Committee will be responsible for ensuring the compliance of the guidelines in relation to the personal data under its control. And does not go into details of defining the Committee.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/health-data-management-policies'&gt;https://cis-india.org/internet-governance/blog/health-data-management-policies&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>shweta</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Health Management</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Covid19</dc:subject>
    
    
        <dc:subject>Digitisation</dc:subject>
    

   <dc:date>2023-07-10T16:36:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/ndtv-video-the-social-network-feb-5-2013-hate-speech-ban-or-ignore">
    <title>Hate speech: ban or ignore?</title>
    <link>https://cis-india.org/news/ndtv-video-the-social-network-feb-5-2013-hate-speech-ban-or-ignore</link>
    <description>
        &lt;b&gt;The Social Network discusses the hate speeches: whether they should be banned or ignored. Why does the state take action against some and not against some others. This on a day when Togadia and Owaisi were simultaneously trending on the social media.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This discussion was aired on NDTV on February 5, 2013&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Policy Director, Centre for Internet and Society, and Shivam Vij of Kafila.com joined NDTV in the studio while actor and standup comic Sanjay Rajoura joined via webcam.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh said that the talk of banning these videos is foolish. He added, I don't think that is a solution. But the issue is one of criminal prosecution – whether that should happen or not, and with regard to the interesting dichotomy that Shivam pointed out some people are calling for somethings to be banned but not others. I think that kind of hypocrisy should be pointed out. I am happy that these small incidents of hate mongering are actually being blown out of proportion on social media because it actually gets people to react...to say wait a second...that is not right I might have a certain leanings towards Hindutva but that kind of speech is not what I support, or I might have a certain leanings towards what is called "pseudo-secularism" but that kind of speech is not what I support. So getting out that discussion out is important.&lt;/p&gt;
&lt;p&gt;If we were on one hand a society where we had communal peace and then social media were focusing on these small kinds of incidents and blowing it out of proportion then that would be a problem.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a class="external-link" href="http://www.ndtv.com/video/player/the-social-network/hate-speech-ban-or-ignore/264125"&gt;Watch the full discussion aired on NDTV&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ndtv-video-the-social-network-feb-5-2013-hate-speech-ban-or-ignore'&gt;https://cis-india.org/news/ndtv-video-the-social-network-feb-5-2013-hate-speech-ban-or-ignore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-02-13T09:40:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/has-geek-presents-the-fifth-elephant">
    <title>HasGeek presents The Fifth Elephant</title>
    <link>https://cis-india.org/internet-governance/has-geek-presents-the-fifth-elephant</link>
    <description>
        &lt;b&gt;HasGeek and the Centre for Internet &amp; Society invite you the Fifth Elephant at the NIMHANS Convention Centre, Bangalore on July 27 and 28, 2012. &lt;/b&gt;
        
&lt;h3&gt;Why The Fifth Elephant?&lt;/h3&gt;
&lt;p&gt;Modern technology with ubiquitous connectivity and cloud-hosted computing power is increasingly becoming important for making sense of data. The infrastructure, tools, processes and algorithms for storage, analytics and visualization shape the meanings and value that can be derived from the data. At the same time, these technologies are strongly intertwined i.e., the database infrastructure shapes how data is accessed for processing, as well as the tools you can (or cannot) use to represent the data in certain ways on the frontend. Similarly, the paradigms used for simplifying and storing data — MapReduce, NoSQL, RDBMS — variously enable the morphing of complex data into meaningful formats. Working with each one of them involves limitations and possibilities.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Fifth Elephant &lt;/strong&gt;is the first of its kind of events where you will meet different people working with different kinds of data. It is an opportunity for learning about new tools, technologies, platforms, processes and best practices, and engaging with business leaders, IT decision-makers, journalists, analysts and developers. It is also an opportunity to showcase data products, APIs, services and platforms.&lt;/p&gt;
&lt;h3&gt;A Conference? An Event?&lt;/h3&gt;
&lt;p&gt;The Fifth Elephant is not simply a series of lectures. It is a space for interactions with a diverse audience to serendipitously explore insights and solutions for your data problems, to understand how hidden meanings in data can be made manifest, and to learn how others are working with data. The event is open to data analysts and scientists, statisticians, geeks, enthusiasts, data-driven product managers and designers, enterprise architects, journalists, researchers, developers and database professionals.&lt;/p&gt;
&lt;h3&gt;The Agenda&lt;/h3&gt;
&lt;p&gt;The Fifth Elephant will be held on July&amp;nbsp; 27 and 28, 2012  at the NIMHANS Convention Centre, Bangalore. Day 1 covers the technology track — big data infrastructure,&amp;nbsp; analytics and visualization. Day 2 invites talks from business and industry — finance, retail, health, media, telecom — to showcase the nature of data in each of these sectors and how they are working (and not working) with the data.&lt;/p&gt;
&lt;p&gt;Apart from demos, lectures and tutorials, there will be opportunities for open house discussions and presentations on Hadoop, NoSQL versus RDBMS paradigms, and legal and licensing frameworks for data sharing, among others. Hacker corners, a dedicated participant lounge and interactive sponsor booths will further the learning, showcasing and engagement at the event.&lt;/p&gt;
&lt;p&gt;For submitting talks and speaking proposals, visit &lt;a class="external-link" href="http://funnel.hasgeek.com/5el"&gt;funnel.hasgeek.com/5el&lt;/a&gt;.&lt;br /&gt;Corporate tickets available for company delegates and employees. For more information write to &lt;a class="external-link" href="mailto:info@hasgeek.com"&gt;info@hasgeek.com&lt;/a&gt;&lt;br /&gt;For sponsorship queries, write to &lt;a class="external-link" href="mailto:zainab@hasgeek.com"&gt;zainab@hasgeek.com&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/has-geek-presents-the-fifth-elephant'&gt;https://cis-india.org/internet-governance/has-geek-presents-the-fifth-elephant&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-19T06:38:13Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-september-17-2018-haryana-cops-say-internet-shutdowsn-hurt-police-operations">
    <title>Haryana Cops Say Internet Shutdowns Hurt Police Operations</title>
    <link>https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-september-17-2018-haryana-cops-say-internet-shutdowsn-hurt-police-operations</link>
    <description>
        &lt;b&gt;India sees a very high number of Internet shutdowns, often to preserve law and order, but Haryana cops are arguing against the practice.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Gopal Sathe was published by Huffington Post on September 19, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Ahead of a Haryana court verdict in a rape case against  Dera Sacha Sauda (DSS) head Gurmeet Ram Rahim Singh, mobile Internet  services were shut down in nearby areas such as Panchkula and Mohali.  The &lt;a href="https://www.hindustantimes.com/punjab/ram-rahim-rape-verdict-ban-on-internet-brings-chandigarh-panchkula-to-a-standstill/story-PrcbUfait5yqzmF7QJiHBJ.html" target="_blank"&gt;&lt;i&gt;Hindustan Times&lt;/i&gt;&lt;/a&gt; reported that SMSes, mobile Internet and all services apart from voice calls were suspended to keep the peace.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But  as a result of the shutdown, police in Panchkula faced a challenge in  estimating the size of crowds gathered at different locations. "We were  until then sharing information and photos on WhatsApp to figure out the  number of people pouring in the city from various points as it helped  identify problem areas. DSS followers had started gathering August 22  onwards," Panchkula police commissioner Arshinder Singh Chawla has said,  according to a &lt;a href="https://cis-india.org/internet-shutdown-stories/view" target="_blank"&gt;report&lt;/a&gt; by Manoj Kumar first published by the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This  was a replay of events during the Jat agitation of 2016 as  well—protestors were present in much greater numbers than police  personnel, who were not aware of the scenario on the ground. The police  also worried about sending messages asking for help over the radio, as  this could have been tapped into by the protestors, according to the  report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The lack of mobile Internet during the DSS-related  Internet shutdown also affected the use of technology such as drone  cameras, Chawla said. And because the police could not communicate with  security personnel at the court complex, the police inside had to scale  walls to leave safely, as they could not ask their colleagues for  backup.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report points out that this is in stark contrast to  what happened in Mumbai, where former police commissioner Rakesh Maria  made use of WhatsApp and SMS messages to prevent a scuffle from turning  into &lt;a href="http://www.ndtv.com/mumbai-news/putting-lid-on-rumours-helped-control-situation-in-lalbaug-rakesh-maria-723212"&gt;a riot&lt;/a&gt; during Eid celebrations in early 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A study by the Software Freedom Law Centre stated that India has already over 100 Internet shutdowns in 2018, &lt;a href="https://www.medianama.com/2018/09/223-india-100-internet-shutdowns/" target="_blank"&gt;&lt;i&gt;Medianama&lt;/i&gt;&lt;/a&gt; reported. The five states with the most shutdowns are Jammu and  Kashmir, Rajasthan, Uttar Pradesh, Maharashtra and Bihar. This has been  criticised by many, &lt;a href="https://www.accessnow.org/united-nations-event-explore-ways-stop-internet-shutdowns/"&gt;including the UN&lt;/a&gt;,  and as the Haryana police's experience show, the shutdowns are not just  harming citizens, but are counter-productive to maintaining order as  well.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-september-17-2018-haryana-cops-say-internet-shutdowsn-hurt-police-operations'&gt;https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-september-17-2018-haryana-cops-say-internet-shutdowsn-hurt-police-operations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-09-18T15:57:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/governance-now-march-9-2016-taru-bhatia-hard-to-broad-ban">
    <title>Hard to broad ban!</title>
    <link>https://cis-india.org/internet-governance/news/governance-now-march-9-2016-taru-bhatia-hard-to-broad-ban</link>
    <description>
        &lt;b&gt;The provisions under the Telegraph Act are wispy and can’t be convincingly invoked to exercise a jurisdiction on the internet world.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Taru Bhatia was published by &lt;a class="external-link" href="http://www.governancenow.com/gov-next/egov/hard-broad-ban-internet-haryana-jat-agitation"&gt;Governance Now&lt;/a&gt; on March 9, 2016. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Haryana government on February 19 suspended mobile internet services in the districts affected by the agitation caused by the Jat community over reservation. The ban was imposed under section 144 of criminal procedure code (CrPC) to control the situation from being fanned by rumours or inflammatory messages.Similar ban was imposed in Gujarat last year during violent protests stirred by Hardik Patel over reservation of Patel community. In a similar manner internet connectivity was snapped in Nagaland, Rajasthan and Jammu and Kashmir last year under section 144 in order to contain law and order situation.&lt;br /&gt;&lt;br /&gt; The CrPC section allows an official authorised by the state government to “direct any person to abstain from a certain act or to take certain order” which is “likely to prevent, or tends to prevent, obstruction, annoyance or injury to any person lawfully employed or danger to human life, health or safety, or a disturbance of the public tranquility, or a riot, of an affray”. “An order under this section may, in cases of emergency or in cases where the circumstances do not admit of the serving in due time of a notice upon the person against whom the order is directed, be passed ex parte,” the section states.&lt;br /&gt;&lt;br /&gt; However, the civil rights lawyers claim that section 144 is a general law. “Section 144 is a means to curb apprehended danger and nuisance in emergencies, but its use to ban internet access for a region is an excessive and arbitrary use  of powers granted to the state government under this provision,” says Mishi Choudhary, legal director, software freedom law centre (SFLC).&lt;br /&gt;&lt;br /&gt; They, moreover, believe that the above section is not specific and contextual in cases of communication ban. So what is the correct law that comes in disposal of state authorities during emergencies that call for an urgent step? It’s  section 5 of the Indian Telegraph Act, 1885. The act specifically deals with blocking web domains or web pages or blanket ban. Section 5(2) says that states or central government can prevent transmission of any message(s) that cause  incitement to unlawful situation. Looking carefully, this section focuses only on blocking of inflammatory message(s), not a blanket ban.&lt;br /&gt;&lt;br /&gt; In the case of Gujarat, for example, Hardik Patel, leading the agitation, used WhatsApp to spread the word for Bharat bandh, which consequently caused a blanket ban on data services by the state authorities. Under section 5(2), the  authorities could have gone ahead only with banning social media websites and messaging application, instead of a blanket ban.&lt;br /&gt;&lt;br /&gt; Section 5(2) of the telegraph Act also allows the authorities to lawfully intercept messages during public emergency. The central government has laid out clear guidelines in 2014, defining circumstances that demands phone tapping and in what manner. Similar guidelines are not there for suspending internet services under same law, however.&lt;br /&gt;&lt;br /&gt; “The way in which the ban is imposed is unreasonable. Problem is in the method that is being used in absence of guidelines, defining circumstances under which they can impose a restriction on internet sites,” says Arun Kumar, head of cyber initiatives at Observer Research Foundation (ORF).&lt;br /&gt;&lt;br /&gt; If government formulates these rules or guidelines it will set a threshold for state or central authorities, which will define the urgency of imposing ban on internet services. It will also make authorities answerable, limiting the misuse of power under the section 144 of the CrPC.&lt;br /&gt;&lt;br /&gt; The civil rights lawyers cite example of section 69 A of the IT Act, 2000, which grants power to the central government to direct notice to intermediaries (for example, Facebook and Twitter), to block public access to any information that could stir violence in the country. In this case the government formulated blocking rules in 2009, providing for examination of complaints. The authority to employ this power however lies with the central government, and so, a state not using this law for taking down any message or domain from public view is understandable, during riot-like situation.&lt;br /&gt;&lt;br /&gt; For states to legitimately use their power, it is essential to have similar blocking rules for section 5(2) of telegraph act.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Is blanket ban needed, anyway?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; “Blocking all internet access is clearly an unnecessary and disproportionate measure that cannot be countenanced as a ‘reasonable restriction’ on freedom of expression and the right to seek and receive information, which is an integral part of the freedom of expression,” says Pranesh Prakash, policy director, Centre for Internet and Society (CIS).&lt;br /&gt;&lt;br /&gt; For instance, he adds, a riot-affected woman seeking to find out the address of the nearest hospital cannot do so on her phone. “Instead of blocking access to the internet, the government should seek to quell rumours by using social networks to spread the truth, and by using social networks to warn potential rioters of the consequences,” he says.&lt;br /&gt;&lt;br /&gt; Former Mumbai police commissioner Rakesh Maria used WhatsApp to counter rumours spread after circulation of a fake photo in January 2015. A similar approach could have been taken by state authorities in the case of Gujarat or Haryana; countering miscreants, informing public about the truth and emergency help details.&lt;br /&gt;&lt;br /&gt; “Instead of doing that, we saw that in Gujarat, the police themselves engaged in acts of violent vandalism (caught on CCTV cameras), and in Manipur the police shot dead nine Manipuri tribals, including a 11-year-old child,” retorts Pranesh.&lt;br /&gt;&lt;br /&gt; Blocking internet should be used as a last resort, and taking a balanced approach that considers interest of every stakeholder in a society is essential, argue civil rights lawyers. It is also imperative on the part of the government to formulate guidelines or a rule book to tackle the arbitrariness exercised by the states and security forces.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/governance-now-march-9-2016-taru-bhatia-hard-to-broad-ban'&gt;https://cis-india.org/internet-governance/news/governance-now-march-9-2016-taru-bhatia-hard-to-broad-ban&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-03-22T17:00:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/www-ibnlive-in-com-haphazard-censorship-leaked-list-of-blocked-sites">
    <title>Haphazard censorship? Leaked list of blocked websites in India</title>
    <link>https://cis-india.org/news/www-ibnlive-in-com-haphazard-censorship-leaked-list-of-blocked-sites</link>
    <description>
        &lt;b&gt;An analysis of a leaked list of the websites blocked by Indian Internet Service Providers (ISPs) on directions from the Department of Telecom bring to light the inconsistencies in India's online censorship efforts. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Published in &lt;a class="external-link" href="http://ibnlive.in.com/news/haphazard-censorship-leaked-list-of-blocked-sites/284592-11.html"&gt;IBNLive on August 23, 2012&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, programme manager at the Centre for Internet and Society (CIS), analysed the 309 specific items that were asked to be censored from August 18, till August 21, 2012 by the Indian government following the recent incidents of communal violence and the mass exodus of North East Indians from Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It is clear that the list was not compiled with sufficient care," Prakash writes in a post on the CIS website that reveals several egregious errors in the censorship process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the government put on its censor gear to apparently stop rumours from spreading, Prakash discovered that "people and posts debunking rumours have been blocked." Also there are some items on the list that do not even exist online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 309 items that were ordered to be blocked include URLs, Twitter accounts, img tags, blog posts, blogs, and a few websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash, a graduate of the National Law School of India University, Bangalore, also raises the questions on the legal standing of the government's actions. "The blocking of many of the items on that list are legally questionable and morally indefensible, even while a some of the items ought, in my estimation, to be removed," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian ISPs are also known to go overboard in their efforts to comply with any government order. There have been numerous incidents in the past when ISPs were asked to block a specific URL and they ended up blocking entire domains. The latest round of censorship is also no different. There have been reports of Airtel blocking the entire YouTube short URL youtu.be in some cities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS hasn't published the complete list of the blocked items given "the sensitivity of the issue" but has posted a list of domains from which specific items have been asked to be blocked. The list follows:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;ABC.net.au&lt;/li&gt;
&lt;li&gt;AlJazeera.com&lt;/li&gt;
&lt;li&gt;AllVoices.com&lt;/li&gt;
&lt;li&gt;WN.com&lt;/li&gt;
&lt;li&gt;AtjehCyber.net&lt;/li&gt;
&lt;li&gt;BDCBurma.org&lt;/li&gt;
&lt;li&gt;Bhaskar.com&lt;/li&gt;
&lt;li&gt;Blogspot.com&lt;/li&gt;
&lt;li&gt;Blogspot.in&lt;/li&gt;
&lt;li&gt;Catholic.org&lt;/li&gt;
&lt;li&gt;CentreRight.in&lt;/li&gt;
&lt;li&gt;ColumnPK.com&lt;/li&gt;
&lt;li&gt;Defence.pk&lt;/li&gt;
&lt;li&gt;EthioMuslimsMedia.com&lt;/li&gt;
&lt;li&gt;Facebook.com&lt;/li&gt;
&lt;li&gt;Farazahmed.com&lt;/li&gt;
&lt;li&gt;Firstpost.com&lt;/li&gt;
&lt;li&gt;HaindavaKerelam.com&lt;/li&gt;
&lt;li&gt;HiddenHarmonies.org&lt;/li&gt;
&lt;li&gt;HinduJagruti.org&lt;/li&gt;
&lt;li&gt;Hotklix.com&lt;/li&gt;
&lt;li&gt;HumanRights-Iran.ir&lt;/li&gt;
&lt;li&gt;Intichat.com&lt;/li&gt;
&lt;li&gt;Irrawady.org&lt;/li&gt;
&lt;li&gt;IslamabadTimesOnline.com&lt;/li&gt;
&lt;li&gt;Issuu.com&lt;/li&gt;
&lt;li&gt;JafriaNews.com&lt;/li&gt;
&lt;li&gt;JihadWatch.org&lt;/li&gt;
&lt;li&gt;KavkazCenter&lt;/li&gt;
&lt;li&gt;MwmJawan.com&lt;/li&gt;
&lt;li&gt;My.Opera.com&lt;/li&gt;
&lt;li&gt;Njuice.com&lt;/li&gt;
&lt;li&gt;OnIslam.net&lt;/li&gt;
&lt;li&gt;PakAlertPress.com&lt;/li&gt;
&lt;li&gt;Plus.Google.com&lt;/li&gt;
&lt;li&gt;Reddit.com&lt;/li&gt;
&lt;li&gt;Rina.in&lt;/li&gt;
&lt;li&gt;SandeepWeb.com&lt;/li&gt;
&lt;li&gt;SEAYouthSaySo.com&lt;/li&gt;
&lt;li&gt;Sheikyermami.com&lt;/li&gt;
&lt;li&gt;StormFront.org&lt;/li&gt;
&lt;li&gt;Telegraph.co.uk&lt;/li&gt;
&lt;li&gt;TheDailyNewsEgypt.com&lt;/li&gt;
&lt;li&gt;TheFaultLines.com&lt;/li&gt;
&lt;li&gt;ThePetitionSite.com&lt;/li&gt;
&lt;li&gt;TheUnity.org&lt;/li&gt;
&lt;li&gt;TimesofIndia.Indiatimes.com&lt;/li&gt;
&lt;li&gt;TimesOfUmmah.com&lt;/li&gt;
&lt;li&gt;Tribune.com.pk&lt;/li&gt;
&lt;li&gt;Twitter.com&lt;/li&gt;
&lt;li&gt;TwoCircles.net&lt;/li&gt;
&lt;li&gt;Typepad.com&lt;/li&gt;
&lt;li&gt;Vidiov.info&lt;/li&gt;
&lt;li&gt;Wikipedia.org&lt;/li&gt;
&lt;li&gt;Wordpress.com&lt;/li&gt;
&lt;li&gt;YouTube.com&lt;/li&gt;
&lt;li&gt;YouTu.be&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/www-ibnlive-in-com-haphazard-censorship-leaked-list-of-blocked-sites'&gt;https://cis-india.org/news/www-ibnlive-in-com-haphazard-censorship-leaked-list-of-blocked-sites&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-23T06:18:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/indian-express-january-11-2018-">
    <title>Hammered government offers Virtual ID firewall to protect your Aadhaar</title>
    <link>https://cis-india.org/internet-governance/news/indian-express-january-11-2018-</link>
    <description>
        &lt;b&gt;Days after reports surfaced claiming security breaches, the Unique Identification Authority of India (UIDAI) on Wednesday announced the implementation of a new security protocol that would remove the need to divulge Aadhaar numbers during authentication processes and limit third-party access to KYC details.&lt;/b&gt;
        &lt;p&gt;The article was published in &lt;a class="external-link" href="http://www.newindianexpress.com/nation/2018/jan/11/hammered-government-offers-virtual-id-firewall-to-protect-your-aadhaar-1750466.html"&gt;New Indian Express&lt;/a&gt; on January 11, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Admitting that the “collection and storage of Aadhaar numbers by various entities has heightened privacy concerns”, the UIDAI circular said Authentication User Agencies (AUAs) providing Aadhaar services have to be ready to implement the protocol from March 1, 2018. From June 1 use of Virtual ID for authentication would be mandatory.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The linchpin of the new protocol will be the virtual ID (VID) — a “temporary, revocable 16-digit random number” that can be used instead of Aadhaar to verify or link services. VIDs will have a limited validity and can be generated only by the Aadhaar holder. “UIDAI will provide various options to generate, retrieve and replace VIDs… these will be made available via UIDAI’s resident portal, Aadhaar Enrolment Centre, mAadhaar mobile application, etc.,” it said. While only one VID per Aadhaar number will be valid at a time, users can revoke and generate new VIDs as many times as desired.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI will also limit KYC details accessible by AUAs by classifying them as Global AUAs, which are required to use Aadhaar e-KYC by law, and Local AUAs. Only the former will have full access to e-KYC details and can store Aadhaar numbers. Local AUAs will only have access to limited KYC details and be prohibited from storing Aadhaar numbers. UIDAI will also generate UID tokens which will be used to identify customers within agencies’ systems, but these will not be usable by other AUAs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, cybersecurity experts say that even if the new “patch” is effective, verification processes will have to be redone to prevent misuse of already-leaked Aadhaar numbers. “The concept is attractive, but the devil is in the details,” observed Pavan Duggal, cyberlaw expert, adding that the new system does not address those who have already gained unauthorised access to Aadhaar numbers. Sunil Abraham, executive director, Centre for Internet and Society, was more categorical. “If it has to be effective, they will have to redo (Aadhaar-KYC) from scratch.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/indian-express-january-11-2018-'&gt;https://cis-india.org/internet-governance/news/indian-express-january-11-2018-&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-16T23:34:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hakon-2016">
    <title>Hakon 2016</title>
    <link>https://cis-india.org/internet-governance/news/hakon-2016</link>
    <description>
        &lt;b&gt; Udbhav Tiwari attended attended Hakon 2016, a conference held between September 30 and October 2, 2016 at Indore, Madhya Pradesh, India,on behalf of CIS under the Hewlett Cyber Security Project. &lt;/b&gt;
        &lt;p dir="ltr" style="text-align: justify; "&gt;Hakon 2016 was the third edition of the conference which  has been organised by Ninja Information Security Systems, an ISO  27001:2013 &amp;amp; 9001:2008 certified training organisation and the  primary sponsor of the conference from Indore. The conference was  efficiently organised, had about 150 to  200 people attending overall  and provided an unique window into the non-tech hub/big city ethical  hacker ecosystem and their place within the cyber security setup in  India. The agenda of this year's conference was the Underground Digital  Black Market &amp;amp; Digital Terrorism, with a fair mix of participants  from the industry, academia and the government. The conference website  can be looked up at &lt;a href="http://www.hakonindia.org/"&gt;http://www.hakonindia.org/&lt;/a&gt; for further details, including a look at past editions of the conference.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The technical workshops held during the first two days of the conference were well organised and networking with the teachers during and mostly at the end of the conference was very helpful in understanding a practitioners perspective on cutting edge aspects of cyber security. This was particularly true for &lt;a class="external-link" href="http://www.chuckeasttom.com/"&gt;Chuck Easttom Williams&lt;/a&gt;, an accomplished cyber security expert from the USA who regularly trains government agencies and in a fairly reputed industry veteran who has been an invited speaker at DEFCON and even has a couple of patents to his name.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hakon-2016'&gt;https://cis-india.org/internet-governance/news/hakon-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-10-15T10:04:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hacking-without-borders-the-future-of-artificial-intelligence-and-surveillance">
    <title>Hacking without borders: The future of artificial intelligence and surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/hacking-without-borders-the-future-of-artificial-intelligence-and-surveillance</link>
    <description>
        &lt;b&gt;In this post, Maria Xynou looks at some of DARPA´s artificial intelligence surveillance technologies in regards to the right to privacy and their potential future use in India. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="Normal1"&gt;Robots or computer systems controlling our thoughts is way beyond anything I have seen in science fiction; yet something of the kind may be a reality in the future. The US Defence Advanced Research Projects Agency (DARPA) is currently funding several artificial intelligence projects which could potentially equip governments with the most powerful weapon possible: mind control.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Combat Zones That See (CTS)&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;&lt;img src="http://farm5.staticflickr.com/4137/4749564682_9ab88cb4d1.jpg" /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="Normal1"&gt;Source: &lt;span&gt; &lt;/span&gt;&lt;a href="http://www.flickr.com/photos/swanksalot/"&gt;swanksalot&lt;/a&gt; on flickr&lt;/p&gt;
&lt;p class="Normal1"&gt;Ten years ago DARPA started funding the&lt;a href="http://www.freerepublic.com/focus/f-news/939608/posts"&gt; Combat Zones That See (CTS)&lt;/a&gt; project, which aims to ´track everything that moves´ within a city through a massive network of surveillance cameras linked to a centralized computer system. Groundbreaking artificial intelligence software is being used in the project to identify and track all movement within cities, which constitutes Big Brother as a reality. The computer software supporting the CTS is capable of automatically identifying vehicles and provides instant alerts after detecting a vehicle with a license plate on a watch list. The software is also able to analyze the video footage and to distinguish ´normal´ from ´abnormal´ behavior, as well as to discover links between ´places, subjects and times of activity´ and to identify patterns. With the use of this software, the CTS constitute the world´s first multi-camera surveillance system which is capable of automatically analyzing video footage.&lt;/p&gt;
&lt;p class="Normal1"&gt;Although the CTS project was initially intended to be used for solely military purposes, its use for civil purposes, such as combating crime, remains a possibility. In 2003 DARPA stated that&lt;span&gt; &lt;a class="external-link" href="http://www.wired.com/politics/law/news/2003/07/59471"&gt;40 million surveillance cameras were already in use around the &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://www.wired.com/politics/law/news/2003/07/59471"&gt;world &lt;/a&gt;by law enforcement agencies to combat crime and terrorism, with 300 million expected by 2005. &lt;a href="http://www.wired.com/politics/law/news/2003/07/59471"&gt;Police&lt;/a&gt; in the U.S. have stated that buying new technology which may potentially aid their work is an integral part of the 9/11 mentality. Considering the fact that literally millions of CCTV cameras are installed by law enforcement agencies around the world and that DARPA has developed the software that has the capability of automatically analyzing data gathered by CCTV cameras, it is very possible that law enforcement agencies are participating in the CTS network.&lt;/p&gt;
&lt;p class="Normal1"&gt;However if such a project was used for non-military level purposes, it could raise concerns in regards to data protection, privacy and human rights. As a massive network of surveillance cameras, the CTS ultimately could enable the sharing of footage between private parties and law enforcement agencies without individuals´ knowledge or consent. Databases around the world could be potentially linked to each other and it remains unclear what laws would regulate the access, use and retention of such databases by law enforcement agencies of multiple countries. Furthermore, there is no universal definition for ´normal´ and ´abnormal´ behaviour, thus if the software is used for its original purpose, to distinguish between “abnormal” and “normal” behaviour, and used beyond military purposes, then there is a potential for abuse, as the criteria for being monitored, and possibly arrested, would not be clearly set out.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Mind´s Eye&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;&lt;img src="http://farm9.staticflickr.com/8425/7775805386_8260b7836c.jpg" /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="Normal1"&gt;Source: &lt;span&gt; &lt;/span&gt;&lt;a href="http://www.flickr.com/photos/58687716@N05/"&gt;watchingfrogsboil&lt;/a&gt; on flickr&lt;/p&gt;
&lt;p class="Normal1"&gt;A camera today which is only capable of recording visual footage appears futile in comparison to what DARPA´s creating: a &lt;a href="http://www.wired.com/dangerroom/2011/01/beyond-surveillance-darpa-wants-a-thinking-camera/"&gt;thinking camera&lt;/a&gt;. The Mind´s Eye project was launched in the U.S. in early 2011 and is currently developing smart cameras endowed with &lt;a href="http://www.darpa.mil/Our_Work/I2O/Programs/Minds_Eye.aspx"&gt;´visual intelligence´&lt;/a&gt;. This ultimately means that artificial intelligence surveillance cameras can not only record visual footage, but also automatically detect ´abnormal´ behavior, alert officials and analyze data in such a way that they are able to &lt;a href="http://phys.org/news/2012-10-surveillance-tech-carnegie-mellon.html"&gt;predict future human activities and situations&lt;/a&gt;.&lt;/p&gt;
&lt;p class="Normal1"&gt;Mainstream surveillance cameras already have visual-intelligence algorithms, but none of them are able to automatically analyze the data they collect. Data analysts are usually hired for analyzing the footage on a per instance basis, and only if a policeman detects ´something suspicious´ in the footage. Those days are over. &lt;a href="http://www.wired.com/dangerroom/2011/01/beyond-surveillance-darpa-wants-a-thinking-camera/"&gt;General&lt;/a&gt;&lt;a href="http://www.wired.com/dangerroom/2011/01/beyond-surveillance-darpa-wants-a-thinking-camera/"&gt; &lt;/a&gt;&lt;a href="http://www.wired.com/dangerroom/2011/01/beyond-surveillance-darpa-wants-a-thinking-camera/"&gt;James Cartwright&lt;/a&gt;, the vice chairman of the Joint Chiefs of Staff, stated in an intelligence conference that “Star[ing] at Death TV for hours on end trying to find the single target or see something move is just a waste of manpower.” Today, the Mind´s Eye project is developing smart cameras equipped with artificial intelligence software capable of identifying &lt;a href="http://www.darpa.mil/Our_Work/I2O/Programs/Minds_Eye.aspx"&gt;operationally significant activity&lt;/a&gt; and predicting outcomes.&lt;/p&gt;
&lt;p class="Normal1"&gt;Mounting these &lt;a href="http://www.dailygalaxy.com/my_weblog/2011/01/minds-eye-darpas-new-thinking-camera-will-transform-the-world-of-surveillance.html"&gt;smart cameras on drones&lt;/a&gt; is the initial plan; and while that would enable military operations, many ethical concerns have arisen in regards to whether such technologies should be used for ´civil purposes.´ Will law enforcement agencies in India be equipped with such cameras over the next years? If so, how will their use be regulated?&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;SyNAPSE&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;&lt;img src="http://farm9.staticflickr.com/8230/8384110298_da510e0347.jpg" /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="Normal1"&gt;Source: &lt;span&gt; &lt;/span&gt;&lt;a href="http://www.flickr.com/photos/healthblog/"&gt;A Health Blog&lt;/a&gt; on flickr&lt;/p&gt;
&lt;p class="Normal1"&gt;The &lt;i&gt;Terminator &lt;/i&gt;could be more than just science fiction if current robots had artificial brains with similar form, function and architecture to the mammalian brain. DARPA is attempting this by funding HRL Laboratories, Hewlett-Packard and IBM Research to carry out this task through the &lt;a href="http://www.artificialbrains.com/darpa-synapse-program"&gt;Systems of Neuromorphic Adaptive Plastic Scalable Electronics (SyNAPSE)&lt;/a&gt; programme.  Is DARPA funding the creation of the &lt;i&gt;Terminator&lt;/i&gt;? No. Such artificial brains would be used to build robots whose intelligence matches that of mice and cats...for now.&lt;/p&gt;
&lt;p class="Normal1"&gt;SyNAPSE is a programme which aims to develop &lt;a href="http://celest.bu.edu/outreach-and-impacts/the-synapse-project"&gt;electronic neuromorphic machine technology&lt;/a&gt; which scales to biological levels. It started in the U.S. in 2008 and is scheduled to run until around 2016, while having received&lt;a href="http://www.artificialbrains.com/darpa-synapse-program"&gt; $102.6 million&lt;/a&gt; in funding as of January 2013. The ultimate aim is to build an electronic microprocessor system that matches a mammalian brain in power consumption, function and size. As current programmable machines are limited by their computational capacity, which requires human-derived algorithms to describe and process information, SyNAPSE´s objective is to create &lt;a href="http://www.darpa.mil/Our_Work/DSO/Programs/Systems_of_Neuromorphic_Adaptive_Plastic_Scalable_Electronics_(SYNAPSE).aspx"&gt;biological neural systems &lt;/a&gt;which can autonomously process information in complex environments. Like the mammalian brain, SyNAPSE´s &lt;a href="http://www.ibm.com/smarterplanet/us/en/business_analytics/article/cognitive_computing.html"&gt;cognitive computers&lt;/a&gt; would be capable of automatically learning relevant and probabilistically stable features and associations, as well as of finding correlations, creating hypotheses and generally remembering and learning through experiences.&lt;/p&gt;
&lt;p class="Normal1"&gt;Although this original type of computational device could be beneficial to &lt;a href="http://www.ibm.com/smarterplanet/us/en/business_analytics/article/cognitive_computing.html"&gt;predict natural disasters&lt;/a&gt; and other threats to security based on its cognitive abilities, human rights questions arise if it were to be used in general for surveillance purposes. Imagine surveillance technologies with the capacity of a human brain. Imagine surveillance technologies capable of remembering your activity, analyzing it, correlating it to other facts and/or activities, and of predicting outcomes; and now imagine such technology used to spy on us. That might be a possibility in the future.&lt;/p&gt;
&lt;p class="Normal1"&gt;Such cognitive technology is still in an experimental phase and although it could be used to tackle threats to security, it could also potentially be used to monitor populations more efficiently. No such technology currently exists in India, but it could only be a matter of time before Indian law enforcement agencies start using such artificial intelligence surveillance technology to supposedly enhance our security and protect us.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Brain-Computer Interface (BCI)&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="360" src="http://www.youtube.com/embed/qCSSBEXBCbY?feature=player_embedded" width="640"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p class="Normal1"&gt;Remember Orwell's ´&lt;i&gt;Thought Police&lt;/i&gt;´? Was Orwell exaggerating just to get his point across? Well, the future appears to be much scarier than Orwell's vision depicted in &lt;i&gt;1984&lt;/i&gt;. Unlike the ´&lt;i&gt;Thought Police&lt;/i&gt;´ which merely arrested individuals who openly expressed ideas or thoughts which contradicted the Party´s dogma, today, technologies are being developed which can &lt;i&gt;literally &lt;/i&gt;read our thoughts.&lt;/p&gt;
&lt;p class="Normal1"&gt;Once again, DARPA appears to be funding one of the world´s most innovative projects: the &lt;a href="http://www.wired.com/opinion/2012/12/the-next-warfare-domain-is-your-brain/"&gt;Brain-Computer Interface (BCI)&lt;/a&gt;. The human brain is far better at pattern matching than any computer, whilst computers have greater analytical speed than human brains. The BCI is an attempt to merge the two together, and to enable the human brain to control robotic devices and other machines. In particular, the BCI is comprised of a headset (an electroencephalograph -&lt;a href="http://www.extremetech.com/wp-content/uploads/2012/08/brain-hacking-accuracy-chart.jpg"&gt; an EEG&lt;/a&gt;) with sensors that rest on the human scalp, as well as of software which processes brain activity. This enables the human brain to be linked to a computer and for an individual to control technologies without moving a finger, but by merely &lt;i&gt;thinking &lt;/i&gt;of the action.&lt;/p&gt;
&lt;p class="Normal1"&gt;Ten years ago it was reported that the brains of &lt;a href="http://www.newscientist.com/article/dn2237"&gt;rats&lt;/a&gt; and &lt;a href="http://news.bbc.co.uk/2/hi/health/3186850.stm"&gt;monkeys&lt;/a&gt; could control robot arms through the use of such technologies. A few years later&lt;a href="http://www.newscientist.com/article/dn4540"&gt; brainstem implants&lt;/a&gt; were developed to tackle deafness. Today, brain-computer interface technologies are able to directly link the human brain to computers, thus enabling paralyzed people to conduct computer activity by merely thinking of the actions, as well as&lt;a href="http://www.cyborgdb.org/mckeever.htm"&gt; to control robotic limbs with their thoughts&lt;/a&gt;. BCIs appear to open up a new gateway for disabled persons, as all previously unthinkable actions, such as typing on a computer or browsing through websites, can now be undertaken by literally &lt;i&gt;thinking &lt;/i&gt;about them, while using a BCI.&lt;/p&gt;
&lt;p class="Normal1"&gt;Brain-controlled robotic limbs could change the lives of disabled persons, but&lt;a href="http://www.guardian.co.uk/science/2007/feb/09/neuroscience.ethicsofscience"&gt; ethical concerns&lt;/a&gt; have arisen in regards to the BCI´s mind-reading ability.  If the brain can be used to control computers and other technologies, does that ultimately mean that computers can also be used to control the human brain?  Researchers from the University of Oxford and Geneva, and the University of California, Berkley, have created a custom programme that was specially designed with the sole purpose of finding out &lt;a href="http://www.extremetech.com/extreme/134682-hackers-backdoor-the-human-brain-successfully-extract-sensitive-data"&gt;sensitive data&lt;/a&gt;, such as an individuals´ home location, credit card PIN and date of birth. Volunteers participated in this programme and it had up to 40% success in obtaining useful information. To extract such information, researchers rely on the &lt;i&gt;P300 response&lt;/i&gt;, which is a very specific brainwave pattern that occurs when a human brain recognizes something that is meaningful, whether that is personal information, such as credit card details, or an enemy in a battlefield. According to &lt;a href="http://www.digitaltrends.com/cool-tech/this-is-your-brain-on-silicon/"&gt;DARPA&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;i&gt;´When a human wearing the EEG cap was introduced, the number of false alarms dropped to only five per hour, out of a total of 2,304 target events per hour, and a 91 percent successful target recognition rate was introduced.´&lt;/i&gt;&lt;/blockquote&gt;
&lt;p class="Normal1"&gt;This constitutes the human brain as&lt;a class="external-link" href="http://www.wired.com/opinion/2012/12/the-next-warfare-domain-is-your-brain/"&gt; a &lt;span&gt;new warfighting &lt;/span&gt;domain&lt;/a&gt; of the twenty-first century, as experiments have proven that the brain can control and maneuver quadcopter drones and other military technologies. Enhanced threat detection through BCI´s scan for P300 responses and the literal control of military operations through the brain, definitely appear to be changing the future of warfare. Along with this change, the possibility of manipulating a soldier´s BCI during conflict is real and could lead to absolute chaos and destruction.&lt;/p&gt;
&lt;p class="Normal1"&gt;Security expert, Barnaby Jack, of IOActive demonstrated the &lt;a href="http://www.computerworld.com/s/article/9232477/Pacemaker_hack_can_deliver_deadly_830_volt_jolt"&gt;vulnerability of biotechnological systems&lt;/a&gt;, which raises concerns that BCI technologies may also potentially be vulnerable and expose an individual's´ brain to hacking, manipulation and control by third parties. If the brain can control computer systems and computer systems are able to detect and distinguish brain patterns, then this ultimately means that the human brain can potentially be controlled by computer software.&lt;/p&gt;
&lt;p class="Normal1"&gt;Will BCI be used in the future to&lt;a href="http://www.guardian.co.uk/science/2007/feb/09/neuroscience.ethicsofscience"&gt; interrogate terrorists and suspects&lt;/a&gt;? What would that mean for the future of our human rights? Can we have human rights if authorities can literally hack our brain in the name of national security? How can we be protected from abuse by those in power, if the most precious thing we have - our &lt;i&gt;thoughts&lt;/i&gt; - can potentially be hacked? Human rights are essential because they protect us from those in power; but the &lt;i&gt;privacy of our thoughts&lt;/i&gt; is even more important, because without it, we can have no human rights, no individuality.&lt;/p&gt;
&lt;p class="Normal1"&gt;Sure, the BCI is a very impressive technological accomplishment and can potentially improve the lives of millions. But it can also potentially destroy the most unique quality of human beings: their personal thoughts. Mind control is a vicious game to play and may constitute some of the scariest political novels as a comedy of the past. Nuclear weapons, bombs and all other powerful technologies seem childish compared to the BCI which can literally control our mind! Therefore strict regulations should be enacted which would restrict the use of BCI technologies to visually impaired or handicapped individuals.  Though these technologies currently are not being used in India, explicit laws on the use of artificial intelligence surveillance technologies should be enacted in India, to help ensure that they do not infringe upon the right to privacy and other human rights.&lt;/p&gt;
&lt;p class="Normal1"&gt;Apparently, anyone can&lt;a href="http://www.extremetech.com/extreme/134682-hackers-backdoor-the-human-brain-successfully-extract-sensitive-data"&gt; buy Emotiv or Neurosky BCI online&lt;/a&gt; to mind control their computer with only $200-$300. If the use of BCI was imposed in a top-down manner, then maybe there would be some hope that people would oppose its use for surveillance purposes; but if the idea of mind control is being socially integrated...the future of privacy seems bleak.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hacking-without-borders-the-future-of-artificial-intelligence-and-surveillance'&gt;https://cis-india.org/internet-governance/blog/hacking-without-borders-the-future-of-artificial-intelligence-and-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T15:30:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked">
    <title>Hacking of SIM card by spy agencies raises fears of sensitive documents being leaked</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked</link>
    <description>
        &lt;b&gt;The hacking of SIM-card and digital security services provider Gemalto by American and British spy agencies has raised fears that sensitive communications, by the Indian government and hundreds of domestic companies, may have been at the risk of being spied on.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by PK Jayadevan and Neha Alawadhi was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2015-02-25/news/59499696_1_gemalto-encryption-keys-security-solutions"&gt;published in the Economic Times&lt;/a&gt; on February 25, 2015. Pranesh Prakash and Sunil Abraham were quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Netherlands-based Gemalto was jointly hacked by the &lt;a href="http://economictimes.indiatimes.com/topic/US%20National%20Security%20Agency"&gt;US National Security Agency&lt;/a&gt; and Britain's Government Communications Headquarters, and encryption  keys were stolen to monitor mobile communications, according to a news  report published last week.&lt;/p&gt;
&lt;div class="mod-articletext mod-economictimesarticletext mod-economictimesarticletextwithadcpc" id="mod-a-body-after-first-para" style="text-align: justify; "&gt;
&lt;p&gt;India's largest telecom vendors including Airtel, Vodafone and &lt;a href="http://economictimes.indiatimes.com/topic/Idea%20Cellular"&gt;Idea Cellular&lt;/a&gt; use SIM cards supplied by Gemalto, the world's biggest maker of  mobile-phone chips and provider of secure devices such as smart cards  and tokens. &lt;a href="http://economictimes.indiatimes.com/topic/Online%20publisher"&gt;Online publisher&lt;/a&gt; The Intercept in its report named Idea Cellular as one of the networks from which the spy agencies accessed encryption keys.&lt;/p&gt;
&lt;p&gt;"Phone calls and text messages by military, government, diplomats, spy  corporations and by ordinary citizen of India - all of those get  affected by this hack," said Pranesh Prakash, Policy Director at  research and advocacy firm &lt;a href="http://economictimes.indiatimes.com/topic/Centre%20for%20Internet"&gt;Centre for Internet&lt;/a&gt; and Society.&lt;/p&gt;
&lt;p&gt;The Intercept, which accessed top secret documents provided by NSA whistleblower &lt;a href="http://economictimes.indiatimes.com/topic/Edward%20Snowden"&gt;Edward Snowden&lt;/a&gt;,  said American and British spies dug into the private communications of  Gemalto engineers and other employees to steal encryption keys.&lt;/p&gt;
&lt;p&gt;Gemalto provides security services such as two-factor authentication and  access management, and has hundreds of clients in India. The company in  2012 said it provided 25 million e-driver's licences and vehicle  registration certificates in India that let the government "consolidate  driver and vehicle registration information across the population in a  central repository".&lt;/p&gt;
&lt;p&gt;"We believe that the biggest risk stands for  the large number of Vodafone users in the country as the company has  deployed Gemalto's Near Field Communication services solutions to  provide secure and convenient 'wave and pay' contactless transactions  via mobile phone," said Sanchit Vir Gogia, Chief Analyst and Group CEO,  Greyhound Research.&lt;/p&gt;
&lt;p&gt;"We have no further details of these  allegations, which are industry-wide in nature and are not focused on  any one mobile operator. We will support industry bodies and Gemalto in  their investigations," said a Vodafone spokesperson in an email  response.&lt;/p&gt;
&lt;p&gt;Emails to Idea and &lt;a href="http://economictimes.indiatimes.com/topic/Airtel"&gt;Airtel&lt;/a&gt; were unanswered till the time of going to Press.&lt;/p&gt;
&lt;p&gt;"Indian operators typically go for cheaper Chinese vendors that are  anyway low on security. Among the European SIM vendors, Gemalto has the  largest share in India," said a senior mobile services executive,  requesting anonymity.&lt;/p&gt;
&lt;p&gt;The report on the hack comes at a time when Gemalto was looking to tap the &lt;a href="http://economictimes.indiatimes.com/topic/Indian%20market"&gt;Indian market&lt;/a&gt;,  including e-governance initiatives. The company in a recent email to ET  said it had plans to expand its center of excellence in India to  develop multiple products, offer tech support and provide security  solutions for the domestic market.&lt;/p&gt;
&lt;p&gt;"We take this (breach) very  seriously and will devote all resources necessary to fully investigate  and understand the scope of such highly sophisticated attacks to obtain  SIM card data," a Gemalto spokesperson said. "The target was not  Gemalto, per se - it was an attempt to try and cast the widest net  possible to reach as many mobile phones as possible."&lt;/p&gt;
&lt;p&gt;Initial  investigations indicate that SIM products as well as banking cards,  passports and other products and platforms are secure, the company said.  Gemalto is expected to announce the results of its investigation on  Wednesday. British and US spy agencies have been under fire for hacking  and spying on citizens after Snowden in mid-2013 began leaking documents  that revealed massive surveillance programmes by the two governments.  At the time, the Indian government said the NSA was only collecting  meta-data and had no access to the actual contents of phone calls or  text messages.&lt;/p&gt;
&lt;div class="mod-articletext mod-economictimesarticletext mod-economictimesarticletextwithadcpc" id="mod-a-body-after-second-para"&gt;
&lt;p&gt;Experts suggest a multinational consensus or treaty that strikes a balance between national security concerns and privacy.&lt;/p&gt;
&lt;p&gt;"Governments will have to debate this in the United Nations and some  kind of rules for surveillance, maybe treaties, are relevant in the  future," said Kamlesh Bajaj, Chief Executive at Data Security Council of  India. "They shall have to have some kind of a limit to surveillance.  They can't be vacuuming all data in the name of finding a needle in the  haystack."&lt;/p&gt;
&lt;p&gt;Sunil Abraham, Executive Director at Center for  Internet and Society, suggested the Indian government should replace  proprietary operating systems and Android on phones with pure free  software projects, use of virtual private network on phones to  carry voice and data traffic, and encrypt voice and data payloads  separately.&lt;/p&gt;
&lt;p&gt;"When it comes to all the other services provided by  Gemalto, the India government should insist that they will do key  management on their own. This will also mitigate the compromise of  Gemalto's enterprise networks by the NSA," he said.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked'&gt;https://cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-03-09T01:31:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/hackers-take-protest-to-indian-streets-and-cyberspace">
    <title>Hackers Take Protest to Indian Streets and Cyberspace</title>
    <link>https://cis-india.org/news/hackers-take-protest-to-indian-streets-and-cyberspace</link>
    <description>
        &lt;b&gt;First there was self-styled Gandhian activist Anna Hazare who took to the streets to protest corruption. Now a group agitating against censorship on the Internet has arrived in India.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://blogs.wsj.com/indiarealtime/2012/06/08/hackers-take-protest-to-indian-streets-and-cyberspace/"&gt;This article by Shreya Shah was published in the Wall Street Journal on June 8, 2012&amp;nbsp; &lt;/a&gt;Pranesh Prakash is quoted in this article.&lt;/p&gt;
&lt;p&gt;Only this time, the location is cyberspace and their modus operandi hacking.&lt;/p&gt;
&lt;p&gt;In the last few months, Anonymous –a group of hackers, or hacktivists as they like to call themselves –has gone after Web sites of political parties, government sites and Internet service providers, &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/article3496968.ece"&gt;the latest being MTNL&lt;/a&gt;, to protest censorship on the Internet.&lt;/p&gt;
&lt;p&gt;The group says they are opposing laws including the 2008 Information Technology (Amendment) Act and the Information Technology (Intermediaries Guidelines) Rules of 2011, which they say unfairly restrict Internet freedom.&lt;/p&gt;
&lt;p&gt;On Saturday, the hackers will take their protest to the streets, with an Occupy Wall Street-style march called ”Operation Occupy India” planned in 17 cities including Mumbai, Delhi, Indore in Madhya Pradesh, Nagpur in Maharashtra and Kundapur in Karnataka. The group has requested all protestors to wear Guy Fawkes masks, the symbol of Anonymous.&lt;/p&gt;
&lt;p&gt;“This time the common man wants to help us,” an “anon,” which is what members of the group call themselves, told India Real Time.&lt;/p&gt;
&lt;p&gt;Anonymous, which has a global presence, catapulted to fame with its &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052748704457604576011873881591338.html"&gt;attacks on Visa, Mastercard and Paypal&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This is how the group attacks Web sites: It overwhelms them with thousands of requests from different computer systems simultaneously. The Web site is unable to handle the load and crashes.&lt;/p&gt;
&lt;p&gt;The group intensified its attacks after Internet Service Providers like Reliance, MTNL and Airtel temporarily &lt;a class="external-link" href="http://blogs.wsj.com/indiarealtime/2012/05/18/vimeo-ban-more-web-censorship/"&gt;blocked file sharing sites like Vimeo&lt;/a&gt;, Dailymotion, Patebin and Pirate bay, citing a Court order.&lt;/p&gt;
&lt;p&gt;But many question the method used by Anonymous.&lt;/p&gt;
&lt;p&gt;“I don’t believe in defacing or hacking government Web sites to prove a point,” says Ankit Fadia, a cyber security expert. “You can’t hold the government ransom,” he adds.&lt;/p&gt;
&lt;p&gt;In an &lt;a class="external-link" href="http://opindia.posterous.com/open-letter-from-anonymous-to-government-of-i"&gt;open letter&lt;/a&gt; to the government, Anonymous India defended its actions. It wrote that traditional ways of protesting are losing meaning and this is a new method to pressure the politicians.&lt;/p&gt;
&lt;p&gt;Members of the group say that like a regular protest on the street, they too block the infrastructure of their opponents. Except in this case, the infrastructure is located in cyberspace.&lt;/p&gt;
&lt;p&gt;This is a “geek method of attacking,” said the anon who spoke to India Real Time. The group does not plan to attacks sites like that of the Indian railways, for instance, which is used by the masses, he explained.&lt;/p&gt;
&lt;p&gt;But not everyone is convinced.&lt;/p&gt;
&lt;p&gt;The group attacked the Web site of India’s Supreme Court even when it says it does not attack Web sites used by the common man, says Pranesh Prakash, Program Director of the Center for Internet and Society.&lt;/p&gt;
&lt;p&gt;The IT Act is another reason Anonymous is protesting. The Act gives the government the power to remove content it finds offensive. The government can also restrict public access to a Web site.&lt;/p&gt;
&lt;p&gt;Anonymous is also protesting the &lt;a class="external-link" href="http://www.mit.gov.in/sites/upload_files/dit/files/GSR314E_10511%281%29.pdf"&gt;Intermediary Guidelines of 2011&lt;/a&gt;. According to this Act, a site that hosts offensive content will have to remove it within 36 hours of a complaint against it.&lt;/p&gt;
&lt;p&gt;As a result, Web sites like Google and Facebook are &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052702304746604577381791461076660.html%20%20%E2%80%9CThis%20government%20does%20not%20stand%20for%20censorship;%20this%20government%20does%20not%20stand%20for%20infringement%20of%20fr"&gt;facing criminal cases&lt;/a&gt; for hosting objectionable content on their site.&lt;/p&gt;
&lt;p&gt;“This government does not stand for censorship; this government does not stand for infringement of free speech. Indeed, this government does not stand for regulation of free speech,” Kapil Sibal, the Communications and Information Technology Minister told the Rajya Sabha, or the upper house of the Indian Parliament, last month.&lt;/p&gt;
&lt;p&gt;Pranesh Prakash, of the Center for Internet and Society told India Real Time that he does not believe that Anonymous will influence policy makers. He says that the main aim of a protest is to get media attention, and in turn get the attention of the people.&lt;/p&gt;
&lt;p&gt;But he agrees that India’s cyber laws are “hopelessly flawed” and create a framework by which not only the government but &lt;a class="external-link" href="http://kafila.org/2012/01/11/invisible-censorship-how-the-government-censors-without-being-seen-pranesh-prakash/"&gt;everyone can censor&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;He adds, “The laws are a greater threat than Anonymous.”&lt;/p&gt;
&lt;p&gt;Photo Source: Joel Saget/Agence France-Presse/Getty Images&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hackers-take-protest-to-indian-streets-and-cyberspace'&gt;https://cis-india.org/news/hackers-take-protest-to-indian-streets-and-cyberspace&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-06-18T04:02:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
