<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1871 to 1885.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-december-31-2014-jayadevan-neha-alawadhi-december-31-2014-govt-blocks-over-60-websites"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-times-of-india-jan-1-2015-kim-arora-government-blocks-32-websites-to-check-isis-propaganda"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/articles-economictimes-indiatimes-com-govt-asks-twitter-to-block-fake-pmo-india-accounts-site-fails-to-respond"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/intgovforum-cms-w2012-proposals-governing-identity-on-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/governing-id-use-of-digital-id-in-the-healthcare-sector"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/governing-id-kenya2019s-huduma-namba-programme"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/governing-id-india2019s-unique-identity-programme"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/governing-id-2028use-of-digital-id-for-verification"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/governance-issues-for-private-data-stores"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/inet-bangkok-june-8-2013-governance-in-the-age-of-internet-and-fta"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/google2019s-privacy-policy-raises-hackles"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/axios-may-16-2017-google-and-facebook-artificial-intelligence-group-adds-new-members"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cio-november-14-2016-john-riberio-google-facebook-will-not-place-ads-on-sites-distributing-fake-news"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-december-31-2014-jayadevan-neha-alawadhi-december-31-2014-govt-blocks-over-60-websites">
    <title>Government blocks over 60 websites including github &amp; sourceforge on anti-terror advisory</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-december-31-2014-jayadevan-neha-alawadhi-december-31-2014-govt-blocks-over-60-websites</link>
    <description>
        &lt;b&gt;Over 60 websites and links, including popular online tools like Github and Sourceforge used by thousands of programmers have been blocked in India, triggering angry protests by Internet users.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by P.K. Jayadevan and Neha Alawadhi was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2014-12-31/news/57558537_1_websites-information-technology-various-internet-service-providers"&gt;published in the Economic Times&lt;/a&gt; on December 31, 2014. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The websites were blocked for hosting content that is pro terrorist  group ISIS and not cooperating with government investigations, officials  said.&lt;/p&gt;
&lt;div class="mod-articletext mod-economictimesarticletext mod-economictimesarticletextwithadcpc" id="mod-a-body-after-first-para" style="text-align: justify; "&gt;
&lt;p&gt;&lt;a href="http://economictimes.indiatimes.com/topic/Arvind%20Gupta"&gt;Arvind Gupta&lt;/a&gt;,  the head of IT Cell, BJP Tweeted: "The websites that have been blocked  were based on an advisory by Anti Terrorism Squad, and were carrying  Anti India content from ISIS. The sites that have removed objectionable  content and/or cooperated with the on going investigations, are being  unblocked."&lt;/p&gt;
&lt;p&gt;Based on an order issued by the country's telecom  department, in a letter dated December 17 and a subsequent letter on  December 19, over 60 websites have been blocked by various internet  service providers in the country.&lt;/p&gt;
&lt;p&gt;While some internet service  providers are yet to block these websites, many users have been  reporting frequent outages in these web services over the last two  weeks.&lt;/p&gt;
&lt;p&gt;Websites like Pastebin don't host any content but are a platform for users to paste text. Popular video &lt;a href="http://economictimes.indiatimes.com/topic/networks"&gt;networks&lt;/a&gt; like &lt;a href="http://economictimes.indiatimes.com/topic/Vimeo"&gt;Vimeo&lt;/a&gt; and Dailymotion are among the websites that have been blocked.&lt;/p&gt;
&lt;p&gt;Officials from the department of Information Technology and the  department of telecom were not available for comment. "These are all  providing very dangerous kind of cut and paste services..You can take  code, cut it, paste it, remove it, delete it," said one government  official who requested anonymity.&lt;/p&gt;
&lt;p&gt;The government has invoked  section 69A of the Information technology Act (2000) and Information  Technology (Procedure and Safeguards for Blocking for Access of  Information by Public) Rules ("Blocking Rules") to ban these websites.&lt;/p&gt;
&lt;p&gt;Many websites have been blocked in India from time to time on various  grounds. In September, following the Muzaffarnagar riots, over 80  websites and links on social media were blocked.&lt;/p&gt;
&lt;p&gt;However, the  inclusion of services like Github and Sourceforge that host code for  open source software are causing much anger among the developer  community. "Sometimes they might need to block specific URLs, but  blocking the entire website is wrong or they haven't thought through  it," said Thejesh GN, the co-founder of &lt;a href="http://economictimes.indiatimes.com/topic/Datameet"&gt;Datameet&lt;/a&gt; and an open source developer.&lt;/p&gt;
&lt;p&gt;"There is also a lack of transparency where people don't get to know why their sites were blocked," he added.&lt;/p&gt;
&lt;p&gt;"We're aware of reports of connectivity issues in India. We're looking  into it, and will update with more information when we have it," a  Github spokesperson said.&lt;/p&gt;
&lt;p&gt;In June 2014, the &lt;a href="http://economictimes.indiatimes.com/topic/Delhi%20High%20Court"&gt;Delhi High Court&lt;/a&gt; ordered a block of 472 file sharing websites including &lt;a href="http://economictimes.indiatimes.com/topic/Google%20Docs"&gt;Google Docs&lt;/a&gt; and &lt;a href="http://economictimes.indiatimes.com/topic/Pirate%20Bay"&gt;Pirate Bay&lt;/a&gt; following a complaint filed by Sony Entertainment. The entertainment  company was hacked and contents from its servers were shared by hackers  on various file sharing websites. In earlier instances, many websites  have been blocked for copyright infringement as well.&lt;/p&gt;
&lt;p&gt;"Courts unfortunately are not exercising restraint and are indulging  ignorant copyright lawyers," said Pranesh Prakash, Policy Director at  the &lt;a href="http://economictimes.indiatimes.com/topic/Centre%20for%20Internet"&gt;Centre for Internet&lt;/a&gt; and Society. Prakash said that most of the sites on the list don't host  copyrighted material themselves and a case can not be made against  them.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-december-31-2014-jayadevan-neha-alawadhi-december-31-2014-govt-blocks-over-60-websites'&gt;https://cis-india.org/internet-governance/news/economic-times-december-31-2014-jayadevan-neha-alawadhi-december-31-2014-govt-blocks-over-60-websites&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-01-02T14:22:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-times-of-india-jan-1-2015-kim-arora-government-blocks-32-websites-to-check-isis-propaganda">
    <title>Government blocks 32 websites to check ISIS propaganda</title>
    <link>https://cis-india.org/internet-governance/news/the-times-of-india-jan-1-2015-kim-arora-government-blocks-32-websites-to-check-isis-propaganda</link>
    <description>
        &lt;b&gt;The Centre has blocked 32 websites, including vimeo.com, dailymotion.com, pastebin.com and github.com, in an effort to curb ISIS propaganda, prompting a wave of online protests.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Kim Arora was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/Government-blocks-32-websites-to-check-ISIS-propaganda/articleshow/45712815.cms"&gt;published in the Times of India&lt;/a&gt; on January 1, 2015. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;An Indian "hacktivist" group, Anonymous India, has threatened reprisal. By Wednesday evening, however, websites that had complied with the government order to remove objectionable content had been unblocked, sources said.&lt;br /&gt;&lt;br /&gt;A confidential department of telecom order, dated December 17, instructing all internet service licensees to block the websites appeared online on Wednesday. When contacted to verify the news, Dr Gulshan Rai, director of the Indian Computer Emergency Response Team (CERT-In), told TOI the directions had been issued to internet service providers following a Mumbai additional chief metropolitan magistrate's November order directing the government's Department of Electronics and Information Technology (DeitY) to implement the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He added that Mumbai's Anti-Terrorism Squad (ATS) had approached the judiciary after interrogating Arif Majeed, a 23-year-old ISIS recruit from Kalyan. More recently, Bengaluru professional Mehdi Biswas was arrested for allegedly spreading ISIS propaganda on Twitter. "These websites were being used to invite youths to join ISIS. We had contacted the websites sometime back and asked for the removal of the objectionable content. At that time, our communications were ignored. Some of them have now agreed to work with the government. The websites that have complied are being unblocked," Rai told TOI.&lt;br /&gt;&lt;br /&gt;The move met with opposition from the online community. While the tech community opposed the Github ban, others were upset about video-sharing websites like dailymotion.com and vimeo.com being taken down. "By blocking vimeo and dailymotion along with other websites, India is walking in the footsteps of Pakistan," tweeted @baawraman.&lt;br /&gt;&lt;br /&gt;The list of websites in the DoT document was heavy on large text-sharing and collaboration websites, like Github and Pastebin, popular with coders and software developers. Many objected to the blocking of entire websites instead of specific URLs hosting problematic content. However, Rai explained that individual URLs could not be blocked because of the "high mobility of content" on the websites. "It can just be removed and pasted elsewhere. There are no checks and balances," he said.&lt;br /&gt;&lt;br /&gt;Hacktivist group Anonymous India tweeted, "One fine morning, Indian government decided to block sites like Github. Now now, it is time to wake-up. Government of India, Expect Us," a tweet from their handle @opindia_revenge said.&lt;br /&gt;&lt;br /&gt;As questions began to be raised on social networks, BJP IT cell head Arvind Gupta tweeted, "The websites that have been blocked were based on an advisory by the Anti-Terrorism Squad, and were carrying anti-India content from ISIS. The sites that have removed objectionable content and/or cooperated with the ongoing investigations, are being unblocked."&lt;br /&gt;&lt;br /&gt;The sustainability of counter-measures like blanket blocking to contain threats is being questioned. Prasanth Sugathan, counsel at Software Freedom and Law Center, said such a move is short-sighted. "If you block one website, terrorists can always use another one. Or they will move to using encrypted channels, peer-to-peer communication or even telephones. One can't block everything. In my opinion, such a move only inconveniences the daily users and doesn't solve the long-term purpose," said Sugathan. The sentiment was echoed by common Twitter users as well.&lt;br /&gt;&lt;br /&gt;Prime Minister Narendra Modi's tweet from August 2012 condemning blanket blocking of websites was pulled out for recirculation. "As a common man, I join the protest against crackdown on freedom of speech! Have changed my DP. 'Sabko Sanmati De Bhagwan.' #GOIBlocks," Modi had tweeted on August 24, 2012.&lt;br /&gt;&lt;br /&gt;Pranesh Prakash, policy director at Bengaluru-based Center for Internet and Society, questioned the lack of transparency around the practice of blocking websites under the Indian law. "Qn for govt: Why does the law require secrecy of web blocking orders when it doesn't allow such secrecy for books, films? #GoIBlocks," he tweeted, adding, "The 69A Rules don't allow for transparency, accountability, time-limits on blocks, etc. So easily misused by govt. + courts + individuals." The websites were blocked under section 69 A of the IT Act, 2000 and the IT (Procedure and sdafeguards for Blocking of Access of Information by Public) rules, 2009.&lt;br /&gt;&lt;br /&gt;Currently, the Supreme Court is in the middle of hearing a clutch of petitions challenging several IT Act provisions, including blocking and takedown of websites.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-times-of-india-jan-1-2015-kim-arora-government-blocks-32-websites-to-check-isis-propaganda'&gt;https://cis-india.org/internet-governance/news/the-times-of-india-jan-1-2015-kim-arora-government-blocks-32-websites-to-check-isis-propaganda&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-01-02T13:37:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/articles-economictimes-indiatimes-com-govt-asks-twitter-to-block-fake-pmo-india-accounts-site-fails-to-respond">
    <title>Government asks Twitter to block fake 'PMO India' accounts; site fails to respond</title>
    <link>https://cis-india.org/news/articles-economictimes-indiatimes-com-govt-asks-twitter-to-block-fake-pmo-india-accounts-site-fails-to-respond</link>
    <description>
        &lt;b&gt;A standoff between the government and microblogging service Twitter, that has got India's online community up in arms, continues, as Twitter is still to act on India's requests to block some of the fake 'PMO India' accounts. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2012-08-23/news/33342478_1_twitter-parody-accounts-unlawful-content"&gt;published&lt;/a&gt; in the Economic Times on August 23, 2012. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;India's Minister for Communications and Information Technology &lt;a href="http://economictimes.indiatimes.com/topic/Kapil%20Sibal"&gt;Kapil Sibal&lt;/a&gt; said, "Twitter has not responded to our requests in a satisfactory manner. The fake accounts are still there. The government of India is contemplating what action should be taken against Twitter and this will be announced as soon as we have finalised our response," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sibal further added that the government received a response from the &lt;a href="http://economictimes.indiatimes.com/topic/US%20Department%20of%20Justice"&gt;US Department of Justice&lt;/a&gt;, which also agreed that the content on the sites India sought to ban was inappropriate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twitter's operating code allows for parody accounts to be allowed as long as such accounts clearly identify as parody. The accounts in question - including @Indian_pm, @PMOIndiaa, @dryumyumsingh, @PM0India- do so.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike other popular parody accounts of world leaders, though, some of these accounts make no attempt to 'spoof' tweets from the Prime Minister. The user of the @PM0India handle, with over 11 thousand followers, has changed their handle to @thehinduexpress, and tweeted "When I've to parody PM, I'll use the other a/c and RT that. For countering media and &lt;a href="http://economictimes.indiatimes.com/topic/Congress"&gt;Congress&lt;/a&gt;, this ID will be used. To hell with censorship."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An email by ET to &lt;a href="http://economictimes.indiatimes.com/topic/Twitter%20Inc"&gt;Twitter Inc&lt;/a&gt;, received no response at the time of going to press. However, news agency PTI quoted sources saying that Twitter has communicated to the PMO that it would be locating the "unlawful content". "India is important to us and we would like to have clearer communication in these matters in future," PTI quoted Twitter as saying. Official spokesperson for Indian Prime Minister's Office Pankaj Pachauri confirmed that Twitter is looking into the matter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the past few days, the government has blocked around 300 websites which it blames for spreading rumours that triggered the exodus of people from the North East from several cities. &lt;a href="http://economictimes.indiatimes.com/topic/Google"&gt;Google&lt;/a&gt; and &lt;a href="http://economictimes.indiatimes.com/topic/Facebook"&gt;Facebook&lt;/a&gt; on Tuesday told ET they were working with India in removing content which can incite violence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="gwt-Image" src="http://www.economictimes.indiatimes.com/photo/15610805.cms" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There is clear evidence that these social networks have caused harm and disruption. However, they need to be clearer about the way they go about blocking sites and other links. The block order contained around 20 accounts and over 80 &lt;a href="http://economictimes.indiatimes.com/topic/Youtube"&gt;Youtube&lt;/a&gt; videos.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It also had several mainstream media reports and a few Pakistani sites," Sunil Abraham, executive director of Bangalore-based &lt;a href="http://economictimes.indiatimes.com/topic/Centre%20for%20Internet"&gt;Centre for Internet&lt;/a&gt; and Society said. Analysts do not rule out the possibility that Twitter itself will be blocked in India if it does not act.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/articles-economictimes-indiatimes-com-govt-asks-twitter-to-block-fake-pmo-india-accounts-site-fails-to-respond'&gt;https://cis-india.org/news/articles-economictimes-indiatimes-com-govt-asks-twitter-to-block-fake-pmo-india-accounts-site-fails-to-respond&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-09-04T12:24:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/intgovforum-cms-w2012-proposals-governing-identity-on-the-internet">
    <title>Governing Identity on the Internet</title>
    <link>https://cis-india.org/news/intgovforum-cms-w2012-proposals-governing-identity-on-the-internet</link>
    <description>
        &lt;b&gt;Security, openness and privacy will be discussed at this workshop to be held at the IGF 2012 on November 8, 2012 from 11.00 a.m. to 12.30 p.m. Malavika Jayaram, a fellow at CIS is one of the panelists confirmed for participation.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Concise Description of Workshop:&lt;/b&gt;&lt;br /&gt;From single-sign-on identifiers for federated websites to Whois data associated with Internet resources, countless individuals, business and government organizations have a stake in Internet identity information and its governance. While territorially-based governments have historically played a central role in their citizens' identity, it is private service providers and individual users that might be considered the de facto managers of Internet identity information.  Private, rule-based arrangements (e.g., “trust frameworks”) have emerged in many industry sectors to help manage Internet identity transactions.  Nonetheless, many states are actively pursuing digital identity efforts (OECD 2011), including the United States government's National Strategy for Trusted Identity in Cyberspace (NSTIC) which is standing up a governance body and the European Commission's proposed regulation on electronic identification and trusted services for electronic transactions. These efforts seek to promote greater adoption and interoperability of Internet identity solutions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What are the appropriate roles of governments, the private sector and individuals in Internet identity?  Are there benefits or risks of various Internet identity governance solutions being proposed?  How compatible are they with the transnational nature of the Internet?  Which stakeholders will determine the standards and policies for how Internet identity information is created, transmitted, utilized, or protected?  This workshop, drawing on expertise from business, technical community, civil society and government actors, explores this active yet under examined area of Internet governance. The format of the workshop will include short position statements from the panelists followed by a question and answer session facilitated by a moderator involving the audience.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Organiser(s) Name:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Brenden Kuerbis, Citizen Lab, Munk School of      Global Affairs, University of Toronto and Internet Governance Project,      Syracuse University&lt;/li&gt;
&lt;li&gt;Christine Runnegar, Internet Society&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Previous Workshop(s):&lt;/b&gt;&lt;a href="http://www.intgovforum.org/workshops_08/showmelist.php?mem=9" title="http://www.intgovforum.org/workshops_08/showmelist.php?mem=9"&gt;&lt;br /&gt;http://www.intgovforum.org/workshops_08/showmelist.php?mem=9&lt;/a&gt; &lt;a href="http://intgovforum.org/Rio_event_report.php?mem=23" title="http://intgovforum.org/Rio_event_report.php?mem=23"&gt;http://intgovforum.org/Rio_event_report.php?mem=23&lt;/a&gt; &lt;a href="http://www.intgovforum.org/workshops_08/showmelist.php?mem=10" title="http://www.intgovforum.org/workshops_08/showmelist.php?mem=10"&gt;http://www.intgovforum.org/workshops_08/showmelist.php?mem=10&lt;/a&gt; &lt;a href="http://www.intgovforum.org/cms/index.php/component/chronocontact/?chronoformname=Workshopsreports2009View&amp;amp;curr=1&amp;amp;wr=76" title="http://www.intgovforum.org/cms/index.php/component/chronocontact/?chronoformname=Workshopsreports2009View&amp;amp;curr=1&amp;amp;wr=76"&gt;http://www.intgovforum.org/cms/index.php/component/chronocontact/?chrono...&lt;/a&gt; &lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=WSProposals2010View&amp;amp;wspid=147" title="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=WSProposals2010View&amp;amp;wspid=147"&gt;http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=W...&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Submitted Workshop Panelists:&lt;/b&gt;&lt;br /&gt;The following panelists have been confirmed for participation:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Naomi Lefkovitz, Senior Privacy Advisor, National      Strategy for Trusted Identities in Cyberspace National Program Office,      NIST, United States Dept of Commerce (government) (bio [1])&lt;/li&gt;
&lt;li&gt;Andrea Servida, Head of Task Force      "Legislation Team (eIDAS)", European Commission (government)      (bio [2])&lt;/li&gt;
&lt;li&gt;Robin Wilton, Technical Outreach for Identity and      Privacy, Internet Society (technical) (bio [3])&lt;/li&gt;
&lt;li&gt;Malavika Jayaram, Fellow, Centre for Internet      &amp;amp; Society&lt;/li&gt;
&lt;li&gt;Mawaki Chango, Africa Internet Policy      Coordinator, Association for Progressive Communications (academic/civil      society) (bio [4])&lt;/li&gt;
&lt;li&gt;Marc Crandall, Google (business)&lt;/li&gt;
&lt;li&gt;Bill Smith, Technology Evangelist, Paypal      (business) (bio [5])&lt;/li&gt;
&lt;li&gt;Brenden Kuerbis, Postdoctoral Fellow, Citizen      Lab, University of Toronto and Internet Governance      Project (academic/civil society) (bio [6])&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;[1] &lt;a href="http://www.linkedin.com/pub/naomi-lefkovitz/47/788/a88" title="http://www.linkedin.com/pub/naomi-lefkovitz/47/788/a88"&gt;http://www.linkedin.com/pub/naomi-lefkovitz/47/788/a88&lt;/a&gt; [2] &lt;a href="http://www.linkedin.com/pub/andrea-servida/0/47a/a70" title="http://www.linkedin.com/pub/andrea-servida/0/47a/a70"&gt;http://www.linkedin.com/pub/andrea-servida/0/47a/a70&lt;/a&gt; [3] &lt;a href="http://www.internetsociety.org/who-we-are/staff/mr-robin-wilton" title="http://www.internetsociety.org/who-we-are/staff/mr-robin-wilton"&gt;http://www.internetsociety.org/who-we-are/staff/mr-robin-wilton&lt;/a&gt; [4] &lt;a href="http://www.linkedin.com/in/touchwithmawaki" title="http://www.linkedin.com/in/touchwithmawaki"&gt;http://www.linkedin.com/in/touchwithmawaki&lt;/a&gt; [5] &lt;a href="http://www.linkedin.com/pub/bill-smith/1/a0b/3a6" title="http://www.linkedin.com/pub/bill-smith/1/a0b/3a6"&gt;http://www.linkedin.com/pub/bill-smith/1/a0b/3a6&lt;/a&gt; [6] &lt;a href="http://www.linkedin.com/in/brendenkuerbis" title="http://www.linkedin.com/in/brendenkuerbis"&gt;http://www.linkedin.com/in/brendenkuerbis&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Name of Remote Moderator(s):&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Frédéric Donck, European Regional Bureau Director, Internet Society&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Assigned Panellists:&lt;/b&gt;&lt;a href="http://wsms1.intgovforum.org/2012/panellist/crandall-marc"&gt;&lt;br /&gt;Smith - Bill&lt;br /&gt;Servida - Andrea&lt;br /&gt;Jayaram - Malavika&lt;br /&gt;Lefkovitz - Naomi&lt;br /&gt;Wilton - Robin&lt;br /&gt;Kuerbis - Brenden&lt;br /&gt;Chango - Mawaki&lt;br /&gt;Crandall - Marc&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Read the original published on the &lt;a class="external-link" href="http://www.intgovforum.org/cms/w2012/proposals"&gt;IGF website&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/intgovforum-cms-w2012-proposals-governing-identity-on-the-internet'&gt;https://cis-india.org/news/intgovforum-cms-w2012-proposals-governing-identity-on-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-10-04T09:06:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/governing-id-use-of-digital-id-in-the-healthcare-sector">
    <title>Governing ID: Use of Digital ID in the Healthcare Sector</title>
    <link>https://cis-india.org/internet-governance/blog/governing-id-use-of-digital-id-in-the-healthcare-sector</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;In our third case-study, we use our Evaluation Framework for Digital ID to examine the use of Digital ID in the healthcare sector.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/internet-governance/image-digital-id-healthcare-case-study/" alt="null" width="100%" /&gt;&lt;/p&gt;
&lt;p&gt;Read the &lt;a class="external-link" href="https://digitalid.design/evaluation-framework-case-studies/healthcare.html"&gt;case-study&lt;/a&gt; or download as &lt;a href="https://cis-india.org/internet-governance/digital-id-healthcare-case-study" class="internal-link" title="Digital ID Healthcare Case Study"&gt;PDF&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/governing-id-use-of-digital-id-in-the-healthcare-sector'&gt;https://cis-india.org/internet-governance/blog/governing-id-use-of-digital-id-in-the-healthcare-sector&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shruti Trikanad</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2020-03-02T13:21:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/governing-id-kenya2019s-huduma-namba-programme">
    <title>Governing ID: Kenya’s Huduma Namba Programme</title>
    <link>https://cis-india.org/internet-governance/blog/governing-id-kenya2019s-huduma-namba-programme</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;In our fourth case-study, we use our Evaluation Framework for Digital ID to examine the use of Digital ID in Kenya.&lt;/p&gt;
&lt;p&gt;Read the &lt;a class="external-link" href="https://digitalid.design/evaluation-framework-case-studies/kenya.html"&gt;case-study&lt;/a&gt; or download as &lt;a href="https://cis-india.org/internet-governance/digital-id-kenya-case-study" class="internal-link" title="Digital ID Kenya Case Study"&gt;PDF&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/governing-id-kenya2019s-huduma-namba-programme'&gt;https://cis-india.org/internet-governance/blog/governing-id-kenya2019s-huduma-namba-programme&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2020-03-02T13:19:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework">
    <title>Governing ID: Introducing our Evaluation Framework</title>
    <link>https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;div class="content"&gt;
&lt;p&gt;With the rise of national digital identity systems (Digital ID) across the world, there is a growing need to examine their impact on human rights. In several instances, national Digital ID programmes started with a specific scope of use, but have since been deployed for different applications, and in different sectors. This raises the question of how to determine appropriate and inappropriate uses of Digital ID. In April 2019, our research began with this question, but it quickly became clear that a determination of the legitimacy of uses hinged on the fundamental attributes and governing structure of the Digital ID system itself. Our evaluation framework is intended as a series of questions against which Digital ID may be tested. We hope that these questions will inform the trade-offs that must be made while building and assessing identity programmes, to ensure that human rights are adequately protected.&lt;/p&gt;
&lt;h4&gt;Rule of Law Tests&lt;/h4&gt;
&lt;p&gt;Foundational Digital ID must only be implemented along with a 
legitimate regulatory framework that governs all aspects of Digital ID, 
including its aims and purposes, the actors who have access to it, etc. 
In the absence of this framework, there is nothing that precludes 
Digital IDs from being leveraged by public and private actors for 
purposes outside the intended scope of the programme. Our rule of law 
principles mandate that the governing law should be enacted by the 
legislature, be devoid of excessive delegation, be clear and accessible 
to the public, and be precise and limiting in its scope for discretion. 
These principles are substantiated by the criticism that the Kenyan 
Digital ID, the Huduma Namba, was met with when it was legalized through
 a Miscellaneous Amendment Act, meant only for small or negligible 
amendments and typically passed without any deliberation. These set of 
tests respond to the haste with which Digital ID has been implemented, 
often in the absence of an enabling law which adequately addresses its 
potential harms.&lt;/p&gt;
&lt;h4&gt;Rights based Tests&lt;/h4&gt;
&lt;p&gt;Digital ID, because of its collection of personal data and 
determination of eligibility and rights of users, intrinsically involves
 restrictions on certain fundamental rights. The use of Digital ID for 
essential functions of the State, including delivery of benefits and 
welfare, and maintenance of civil and sectoral records, enhance the 
impact of these restrictions. Accordingly, the entire identity 
framework, including its architecture, uses, actors, and regulators, 
must be evaluated at every stage against the rights it is potentially 
violating. Only then will we be able to determine if such violation is 
necessary and proportionate to the benefits it offers. In Jamaica, the 
National Identification and Registration Act, which mandated citizens’ 
biometric enrolment at the risk of criminal sanctions, was held to be a 
disproportionate violation of privacy, and therefore unconstitutional.&lt;/p&gt;
&lt;h4&gt;Risk based Tests&lt;/h4&gt;
&lt;p&gt;Even with a valid rule of law framework that seeks to protect 
rights, the design and use of Digital ID must be based on an analysis of
 the risks that the system introduces. This could take the form of 
choosing between a centralized and federated data-storage framework, 
based on the effects of potential failure or breach, or of restricting 
the uses of the Digital ID to limit the actors that will benefit from 
breaching it. Aside from the design of the system, the regulatory 
framework that governs it should also be tailored to the potential risks
 of its use. The primary rationale behind a risk assessment for an 
identity framework is that it should be tested not merely against 
universal metrics of legality and proportionality, but also against an 
examination of the risks and harms it poses. Implicit in a risk based 
assessment is also the requirement of implementing a responsive 
mitigation strategy to the risks identified, both while creating and 
governing the identity programme.&lt;/p&gt;
&lt;p&gt;Digital ID programmes create an inherent power imbalance 
between the State and its residents because of the personal data they 
collect and the consequent determination of significant rights, 
potentially creating risks of surveillance, exclusion, and 
discrimination. The accountability and efficiency gains they promise 
must not lead to hasty or inadequate implementation.&lt;/p&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework'&gt;https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shruti Trikanad</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2020-03-02T08:03:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/governing-id-india2019s-unique-identity-programme">
    <title>Governing ID: India’s Unique Identity Programme</title>
    <link>https://cis-india.org/internet-governance/governing-id-india2019s-unique-identity-programme</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;div class="content"&gt;
&lt;p&gt;In our second case-study, we use our Evaluation Framework for Digital ID to assess India’s Unique Identity Programme.&lt;/p&gt;
&lt;p&gt;Read the &lt;a class="external-link" href="https://digitalid.design/evaluation-framework-case-studies/india.html"&gt;case-study&lt;/a&gt; or download as &lt;a href="https://cis-india.org/internet-governance/digital-id-india-case-study" class="internal-link" title="Digital ID India Case Study"&gt;PDF&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/governing-id-india2019s-unique-identity-programme'&gt;https://cis-india.org/internet-governance/governing-id-india2019s-unique-identity-programme&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vrinda Bhandari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2020-03-02T11:38:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity">
    <title>Governing ID: A Framework for Evaluation of Digital Identity</title>
    <link>https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;As governments across the globe implement new and foundational 
digital identification systems (Digital ID), or modernize existing ID 
programs, there is an urgent need for more research and discussion about
 appropriate uses of Digital ID systems. This significant momentum for 
creating Digital ID has been accompanied with concerns about privacy, 
surveillance and exclusion harms of state-issued Digital IDs in several 
parts of the world, resulting in campaigns and litigations in countries,
 such as UK, India, Kenya, and Jamaica. Given the sweeping range of 
considerations required to evaluate Digital ID projects, it is necessary
 to formulate evaluation frameworks that can be used for this purpose.&lt;/p&gt;
&lt;p&gt;This work began with the question of what the appropriate uses
 of Digital ID can be, but through the research process, it became clear
 that the question of use cannot be divorced from the fundamental 
attributes of Digital ID systems and their governance structures. This 
framework provides tests, which can be used to evaluate the governance 
of Digital ID across jurisdictions, as well as determine whether a 
particular use of Digital ID is legitimate. Through three kinds of 
checks — Rule of Law tests, Rights based tests, and Risks based tests — 
this scheme is a ready guide for evaluation of Digital ID.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/internet-governance/image-governing-id-principles-for-evalution/" alt="null" width="100%" /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;View the &lt;a class="external-link" href="https://digitalid.design/evaluation-framework-02.html"&gt;framework&lt;/a&gt; or download as&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/governing-id-principles-for-evalution" class="internal-link" title="Governing ID: Principles for Evalution"&gt;PDF&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity'&gt;https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vrinda Bhandari, Shruti Trikanad, and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2020-03-02T13:22:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/governing-id-2028use-of-digital-id-for-verification">
    <title>Governing ID:  Use of Digital ID for Verification</title>
    <link>https://cis-india.org/internet-governance/blog/governing-id-2028use-of-digital-id-for-verification</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;This is the first in a series of case studies, using our recently-published &lt;a href="https://digitalid.design/evaluation-framework-02.html"&gt;Evaluation Framework for Digital ID&lt;/a&gt;. It looks at the use of digital identity programmes for the purpose of verification, often using the process of deduplication.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/internet-governance/image-governing-id-use-of-digital-id-for-verification/" alt="null" width="100%" /&gt;&lt;/p&gt;
Read the &lt;a class="external-link" href="https://digitalid.design/evaluation-framework-case-studies/verification.html"&gt;case-study&lt;/a&gt; or download as &lt;a href="https://cis-india.org/internet-governance/use-of-digital-id-for-verification" class="internal-link" title="Use of Digital ID for Verification"&gt;PDF.&lt;/a&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/governing-id-2028use-of-digital-id-for-verification'&gt;https://cis-india.org/internet-governance/blog/governing-id-2028use-of-digital-id-for-verification&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shruti Trikanad</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2020-03-02T11:16:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/governance-issues-for-private-data-stores">
    <title>Governance issues for private data stores</title>
    <link>https://cis-india.org/news/governance-issues-for-private-data-stores</link>
    <description>
        &lt;b&gt;Malavika Jayaram is a speaker at this event co-hosted by Harvard Faculty Club and Web Science Trust at 20 Quincy Street, Cambridge on March 28, 2014.&lt;/b&gt;
        &lt;h3&gt;Agenda&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8.30: Introductory remarks&lt;/b&gt; - Meeting in the shadow of the Presidents 90 day plan for Big Data and Privacy: are we right to have a hopeful expectation that algorithms can resolve questions that algorithms pose?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Prof. Jim Waldo, CTO, Harvard University, Sun Distinguished Engineer&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Prof. Andreas Weigend, Stanford University (past Chief Scientist Amazon)&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8.45 - 10.00: The network is always on: and you are always on the network.&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The worker and the workplace - Anna Burger (past Secretary Treasurer, SEIU)/Carol Rose, Director Ma., ACLU&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Personalised messages - targeted advertising - George Pappachen (WPP) /Mike Smith (Hearst Corpn.)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sensor sensibility:Smart metering/Transport/Home - Yves Alexandre de Montjoye, MIT /John Taysom&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Personal medicine - John Wilbanks, Chief Commons Officer, Sage Bionetworks, Senior Fellow, Ewing&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Marion Kaufman Foundation&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Education - Prof. Jim Waldo, CTO Harvard&lt;/li&gt;
&lt;li&gt;National Security - Dr. Malavika Jayaram, Berkman Centre, Harvard, The Indian national id system.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;10.00-10.15: Coffee&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;10.15 - 11.30: The dual nature of the web - publisher and data gatherer&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Is the problem a web protocol problem? Is there a protocol solution?&lt;br /&gt;Brendan Eich, CEO Mozilla&lt;br /&gt;Steve MacBeath Product Lead, Microsoft Personal Cloud&lt;br /&gt;John Taysom, Can we build a DMZ for individual id information?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;11.30 - 12.30: Governance systems for private data stores - what wont work, and what might?&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;An example of multi-generational national asset management : Sir Henry Studholme, Chair, UK Forestry Commission.&lt;/li&gt;
&lt;li&gt;Mozilla.com and Mozilla.org - Denelle Dixon-Thayer, GC Mozilla&lt;/li&gt;
&lt;li&gt;DigiTrust - Jordan Mitchell&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;12.30: working lunch: Privacy as a competitive advantage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The Microsoft view - Steve MacBeath&lt;/li&gt;
&lt;li&gt;The Mozilla view - Brendan Eich&lt;/li&gt;
&lt;li&gt;The SalesForce view - JPRangaswami, Chief Scientist, Salesforce.com&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;1.30 - 2.15: Essential additional policy considerations&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Is “privacy” anyway the wrong target - did we really mean “intimacy”? Dorothy Zinberg, Harvard/ How would we police privacy policies anyway? Adam Towvim, TrustLayers&lt;/li&gt;
&lt;li&gt;AOB from the floor&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;2.15 - 2.30: Interim Conclusions&lt;/b&gt; - John Taysom&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2.30 - 3.00: Discussion and critique of interim conclusions&lt;/b&gt; - Prof. Nico Mele, Harvard/ Prof. Dame Wendy Hall, WST&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3.00- 3.30: Conclusions and proposed draft recommendations&lt;/b&gt; - J Taysom&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/governance-issues-for-private-data-stores'&gt;https://cis-india.org/news/governance-issues-for-private-data-stores&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-04T10:30:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/inet-bangkok-june-8-2013-governance-in-the-age-of-internet-and-fta">
    <title>Governance in the Age of the Internet and Free Trade Agreements</title>
    <link>https://cis-india.org/news/inet-bangkok-june-8-2013-governance-in-the-age-of-internet-and-fta</link>
    <description>
        &lt;b&gt;Sunil Abraham was a speaker at this event organized by Thai Netizen Network on June 8, 2013 at Queen Sirikit National Convention Center. The Ministry of Information and Communication  and the National Science and Technology Development Agency were co-hosts for the event.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://internetsociety.org/inet-bangkok/"&gt;Click to read the details of the event published on Internet Society website&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the age of accelerated international trade and the promotion of free  flowing cross-border data transactions, countries and regions are  working towards forming a commonly agreed modus operandi and protocols.  These protocols seek to facilitate the growth of e-trade, ensure a  secure data flow(economic transactions) and protection of its data in  the network. In the recent, there has been strong attention by consumers  and businesses with the growing scope and content of these agreements  addressing Intellectual Property (IP). Emerging trend studies show that  there is a growing practices to incorporate mutually exclusive  arrangements without involving other stakeholders which happens in  closed door negotiations i.e. government to government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, the European’s Anti-Counterfeiting Trade Agreement  (ACTA) proposal and the U.S. Trans-Pacific Partnership Agreement (TPP).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bigger concern raised by other stakeholders has been the secrecy  of these arrangements and the insufficient protection of consumers and  citizens rights in its consideration. So far, the lack of legitimacy and  proportionality of legal policy measures has created unintended  consequences and collateral damages in far reaching manners whether  socially, economically or technologically. Citing practices of filtering  technology, deep packet inspection, and Internet cut-off, are  introduced by internet service providers to meet legal requirements.  Activities in question may vary from country to country, some focus on  violations of intellectual property, some on the control of political  voices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notably, list of concerns have been raised explicitly by UN Special  Rapporteur to adhere to the promotion and protection of the right to  freedom of opinion and expression were recommended.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This workshop is aim to create discussion on the related topics among  stakeholders both in Thailand and in the region of the direct and  indirect implications of various developments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Target:&lt;/b&gt; Regulators, consumer rights, human rights activities, Lawyers&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Expected Outcomes&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Understanding the dynamics of free trade agreements (i.e. APEC, TPP,  and    ACTA) and its implications on Internet regulations, national  sovereignty, and civil rights from various perspectives. (Big picture)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Basic understanding of how various policy and technology related  measures or solutions (i.e. digital rights management technology and  deep-packet inspection) are used to address Intellectual Property (IP)  and how it directly impacts freedom of expression and individual  privacy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Looking Ahead: The developments and upcoming legislations/regulation  challenges in both Thailand and the region i.e. new draft of  Computer-related Crime Act, new draft of Copyright Act, and the Personal  Data Protection Bill.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Panelists&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Sunil Abraham, Executive Director, Centre for Internet and Society, Bangalore&lt;/li&gt;
&lt;li&gt;Konstantinos Komaitis, Policy Advisor, Internet Society, Geneva&lt;/li&gt;
&lt;li&gt;Nakorn Serirak, Policy Advisor, Thai Netizen Network, Bangkok&lt;/li&gt;
&lt;li&gt;Sawatree Suksri, Lecturer, Faculty of Law, Thammasat University, Bangkok&lt;/li&gt;
&lt;li&gt;Lokman Tsui, Policy Advisor, Google Asia Pacific, Hong Kong&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Moderator&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Mike Hayes, Chair, International MA Program in Human Rights, Mahidol University&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click the PDFs below to download the full details and the presentation:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blogs/governance-in-the-age-of-internet-and-fta.pdf" class="internal-link"&gt;Governance in the Age of the Internet and Free Trade Agreements&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blogs/internet-and-open-public-data-ppp.pdf" class="internal-link"&gt;Internet and Open Public Data&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/inet-bangkok-june-8-2013-governance-in-the-age-of-internet-and-fta'&gt;https://cis-india.org/news/inet-bangkok-june-8-2013-governance-in-the-age-of-internet-and-fta&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2013-07-03T05:04:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/google2019s-privacy-policy-raises-hackles">
    <title>Google’s privacy policy raises hackles</title>
    <link>https://cis-india.org/news/google2019s-privacy-policy-raises-hackles</link>
    <description>
        &lt;b&gt;Have you ever used Google to search for a restaurant while you were logged in its network using your Google id? Or shared information about your trip to Goa with your friends on Google +? Or watched belly dance on YouTube? Or looked for Sunny Leone pictures on Google images? If yes, Google knows about it. Javed Anwer wrote on article on this. It is published in the Times of India on 26 January 2012.&lt;/b&gt;
        
&lt;p&gt;And according to its new &lt;a class="external-link" href="http://timesofindia.indiatimes.com/topic/privacy-policy"&gt;privacy policy&lt;/a&gt; it is going to put this information to some use.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The &lt;a class="external-link" href="http://timesofindia.indiatimes.com/topic/web-giant"&gt;web giant&lt;/a&gt; says the new privacy policy will allow it to offer better services, including more relevant search results. But web experts have raised concerns over potential &lt;a href="https://cis-india.org/news/timesofindia.indiatimes.com/topic/misuse" class="external-link"&gt;misuse&lt;/a&gt; of data and breach of privacy. According to Google's new privacy policy that will come into effect from March 1, the company is "getting rid of over 60 different privacy policies across Google services and replacing them with one that's shorter, easier to read" and something that will enable it to "create intuitive experience across Google" . Unlike in the past when Google had allowed users to choose personalized services, this time there is no option to opt out.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For an end-user this means that whatever information he shares through Google searches, Gmail, Google +, Picassa etc will be used to customize Google services for him. That the move is significant can be gauged from the fact that Google has provided a link to the new policy directly under its search engine on main page, something that the company rarely does. Google users will also be notified about the policy change through an email. "Our new privacy policy makes clear that, if you're signed in, we may combine information you've provided from one service with information from other services. In short, we'll treat you as a single user across all our products, which will mean a simpler, more intuitive Google experience," said Alma Whitten, Google's director of privacy, in a post on the company's official blog.&lt;/p&gt;
&lt;p&gt;Whitten gave some example of how this information will be used. "We can make search better - figuring out what you really mean when you type in Apple, Jaguar or Pink. We can provide more relevant ads too," she wrote. "We can provide reminders that you're going to be late for a meeting based on your location , your calendar and an understanding of what the traffic is like that day. Or ensure that our spelling suggestions, even for your friends' names, are accurate because you've typed them before."&lt;br /&gt;&lt;br /&gt;The privacy policy from Google is at the heart of its new business strategy as it works to keep the search engine relevant and its services fresh in the face of social networking websites like Twitter and Facebook. It is also prompted by the proliferation of devices like smartphones and tablets. However, privacy experts are not amused. Sunil Abraham, director of Centre for Internet and Society, said the new changes are not good for a consumer's privacy.&lt;br /&gt;&lt;br /&gt;"I understand that Google collects the data so that it can build a 360 degree profile of a user and based on the information serve relevant advertisements . But there is no reason for them to store this data for long. Storing data makes it prone to misuse by authorities as well as corporations," said Abraham. Another, problem, he said is that different services are used for different purposes. "I don't want my bakery shop owner to know what kind of medicines Ibuy from the nearby medical store," said Abraham.&lt;/p&gt;
&lt;p&gt;Are you being watched?&lt;br /&gt;&lt;br /&gt;What |&lt;br /&gt;&lt;br /&gt;For an end-user the new policy means that whatever information he shares through Google searches, Gmail, Google+, Picassa, etc will be used to customize Google services for him&lt;br /&gt;&lt;br /&gt;Why |&lt;br /&gt;&lt;br /&gt;The privacy policy is at the heart of Google's business strategy as it tries to keep the search engine relevant in the face of social networking websites like Twitter and Facebook&lt;br /&gt;&lt;br /&gt;Concerns |&lt;br /&gt;&lt;br /&gt;It's instrusive as online activity is tracked; storing data makes it prone to misuse by authorities as well as corporations&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://timesofindia.indiatimes.com/business/india-business/Googles-privacy-policy-raises-hackles/articleshow/11635794.cms"&gt;The original was published in the Times of India&lt;/a&gt;. Sunil Abraham has been quoted in it.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/google2019s-privacy-policy-raises-hackles'&gt;https://cis-india.org/news/google2019s-privacy-policy-raises-hackles&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-01-30T03:58:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/axios-may-16-2017-google-and-facebook-artificial-intelligence-group-adds-new-members">
    <title> Google, Facebook's AI group adds new members </title>
    <link>https://cis-india.org/internet-governance/news/axios-may-16-2017-google-and-facebook-artificial-intelligence-group-adds-new-members</link>
    <description>
        &lt;b&gt;CIS is one of the organizations. &lt;/b&gt;
        &lt;div class="widget__body"&gt;
&lt;div class="is--expanded clearfix body"&gt;
&lt;p&gt;Written by Jens Meyer from AP this was &lt;a class="external-link" href="https://www.axios.com/google-and-facebook-artificial-intelligence-group-adds-new-members-2410262014.html"&gt;mirrored by Axios&lt;/a&gt; on May 16, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;A group &lt;a href="http://thehill.com/policy/technology/298804-tech-giants-try-to-calm-fears-over-artificial-intelligence" target="_blank"&gt;&lt;span&gt;trying to demystify&lt;/span&gt;&lt;/a&gt; artificial intelligence with backing from companies like Google, Facebook, Apple and Microsoft is bolstering its ranks with &lt;a href="https://www.partnershiponai.org/2017/05/pai-announces-new-partners-and-initiatives/" target="_blank"&gt;22 organizations in total.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New members in the Partnership on AI include:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Companies like Salesforce, Sony and Intel.&lt;/li&gt;
&lt;li&gt;Non-profit  advocacy groups including the Electronic Frontier Foundation, the  Center for Democracy and Technology and the Future of Privacy Forum. &lt;/li&gt;
&lt;li&gt;The  list also includes Washington-based consultancy Upturn, which has  worked on issues related to how big data collides with civil rights. The  ACLU was already involved as a partner in the group.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Why it matters: &lt;/b&gt;The  new corporate members of the partnership show how widespread interest  in AI has become. And the high-level advocacy non-profits joining the  partnership shows how AI is on a collision course with questions about  privacy and discrimination.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/axios-may-16-2017-google-and-facebook-artificial-intelligence-group-adds-new-members'&gt;https://cis-india.org/internet-governance/news/axios-may-16-2017-google-and-facebook-artificial-intelligence-group-adds-new-members&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-05-19T08:56:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cio-november-14-2016-john-riberio-google-facebook-will-not-place-ads-on-sites-distributing-fake-news">
    <title>Google, Facebook will not place ads on sites distributing fake news</title>
    <link>https://cis-india.org/internet-governance/news/cio-november-14-2016-john-riberio-google-facebook-will-not-place-ads-on-sites-distributing-fake-news</link>
    <description>
        &lt;b&gt;Google plans to update its AdSense program policies to prevent placement of its ads on sites distributing fake news.&lt;/b&gt;
        &lt;p&gt;The article by John Riberio &lt;a class="external-link" href="http://www.cio.com/article/3141545/internet/google-will-not-place-its-ads-on-sites-distributing-fake-news.html"&gt;originally published by IDG News Service was mirrored on CIO&lt;/a&gt; on November 14, 2016. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Facebook also said Monday it had updated the policy for its Audience Network, which places ads on websites and mobile apps, to explicitly clarify that it applies to fake news.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In accordance with the Audience Network Policy, we do not integrate or display ads in apps or sites containing content that is illegal, misleading or deceptive, which includes fake news,” Facebook said in a statement. The company said its team will continue to closely vet all prospective publishers and monitor existing ones to ensure compliance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;False news stories have become a sore point after the U.S. presidential elections with critics blaming internet companies like Twitter and Facebook for having had an influence on the outcome of the elections as a result of the fake content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The controversy also reflects concerns about the growing power of social  networks to influence people and events, as well as help people to  communicate and organize. Facebook &lt;a href="http://computerworld.com/article/3140723/internet/zuckerberg-says-fake-news-on-facebook-didn-t-tilt-the-elections.html"&gt;promotes democracy by letting candidates communicate directly&lt;/a&gt; with people, Facebook CEO Mark Zuckerberg said recently in an interview.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google had its own embarrassing moments on Sunday with a false story  that claimed that President-elect Donald Trump had won the popular vote  in the U.S. presidential elections &lt;a href="http://www.mediaite.com/uncategorized/now-even-google-search-aiding-in-scourge-of-fake-inaccurate-news-about-election-2016/"&gt;figuring atop some Google search results&lt;/a&gt;. Trump’s Democratic rival Hillary Clinton is leading in the popular vote.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We've been working on an update to our publisher policies and will  start prohibiting Google ads from being placed on misrepresentative  content, just as we disallow misrepresentation in our ads policies,”  Google said Monday in a statement. “Moving forward, we will restrict ad  serving on pages that misrepresent, misstate, or conceal information  about the publisher, the publisher's content, or the primary purpose of  the web property.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google evidently expects that the threat of a cut in revenue from ads will dissuade sites from publishing fake content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Zuckerberg has described as “crazy” the criticism that fake news on  Facebook's news feed had influenced the vote in favor of Trump. “Of all  the content on Facebook, more than 99% of what people see is authentic.  Only a very small amount is fake news and hoaxes,” Zuckerberg &lt;a href="https://www.facebook.com/zuck/posts/10103253901916271"&gt;said in a post over the weekend&lt;/a&gt;. The hoaxes are not limited to one partisan view, or even to politics, he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Identifying the "truth" is complicated, as while some hoaxes can be  clearly identified, a greater amount of content, including from  mainstream sources, often gets the basic idea right but some details  wrong or omitted, or expresses a view that some people will disagree  with and flag as incorrect even when it is factual, Zuckerberg wrote.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are concerns that the monitoring of sites for fake news and the  penalties could give internet companies more power. "We have to be wary  of Facebook and Google being allowed to decide what's 'fake' and what's  'true' news. &lt;a href="https://twitter.com/pranesh/status/798372967637884929"&gt;That only increases their power,&lt;/a&gt;" said Pranesh Prakash, policy director at the Centre for Internet &amp;amp; Society in Bangalore.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cio-november-14-2016-john-riberio-google-facebook-will-not-place-ads-on-sites-distributing-fake-news'&gt;https://cis-india.org/internet-governance/news/cio-november-14-2016-john-riberio-google-facebook-will-not-place-ads-on-sites-distributing-fake-news&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-11-15T13:59:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
