<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1916 to 1930.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/global-censorship-conference"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/first-post-february-3-2017-nimish-sawant-giving-out-your-fingerprint-for-aadhar-payments-is-as-bad-as-telling-the-seller-your-banking-password"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/girls-schools-womens-pgs-the-shocking-results-when-you-google-bitches-near-me"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/telegraphindia-march-8-2014-girls-just-wanna-have-a-voice"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/first-post-nov-19-2012-girls-arrested-for-facebook-post-on-thackeray-get-bail"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-arun-dev-nov-20-2012-girl-arrest-draws-flak-on-social-media"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/giga-conference"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/directions-cyber-digital-europe-arindrajit-basu-september-16-2022-getting-the-digital-indo-pacific-economic-framework-right"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/open-up-tim-davies-november-3-2014-getting-strategic-about-openness-and-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/social-media"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-march-27-2017-priya-nair-and-sanjay-kumar-singh-get-an-aadhaar-card-if-you-dont-have-one"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindu-businessline-may-10-2016-varun-aggarwal-geospatial-info-regulation-bill-will-hurt-start-ups-small-firms"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/open-magazine-august-7-2015-ullekh-np-genetic-profiling"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/gender-and-privacy-countering-the-patriarchal-gaze"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/global-censorship-conference">
    <title>Global Censorship Conference</title>
    <link>https://cis-india.org/internet-governance/global-censorship-conference</link>
    <description>
        &lt;b&gt;The Abrams Institute for Freedom of Expression at Yale Law School is holding a conference on global censorship from March 30 to April 1, 2012, at Yale Law School. The programme is sponsored by the Information Society Project at Yale Law School and Thomson Reuters. &lt;/b&gt;
        
&lt;p&gt;"This conference is the first major event for the Abrams Institute 
for Freedom of Expression, and it brings together an exciting group of 
thinkers from law, political science, computer science, business and the
 non-profit sector to discuss the lessons of the past few years,” 
explained Yale Law Professor Jack Balkin, director of the Abrams 
Institute and the Information Society Project. “We think the study of 
free expression in the digital age should be international and 
interdisciplinary."&lt;a href="https://cis-india.org/internet-governance/global-censorship-conference#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Rishabh Dara, Google Policy Fellow who worked at CIS office in 
Bangalore on freedom of expression and internet-related policy issues is
 participating in the event as a speaker in the panel on Case Studies of
 Censorship. The panel will explore recent instances of censorship in 
the United States, Egypt, Syria, Brazil, and India and the common themes
 and important differences that emerged.&lt;/p&gt;
&lt;p&gt;This conference will consider how censorship has changed in a networked world, exploring how networks have altered the practices of both governments and their citizens. Panels will include discussions of how governments can and do censor and how speakers can command technical and legal tools to preserve their ability to speak.&amp;nbsp; The conference will conclude with a discussion of new controversies in censorship, including laws designed to prevent online bullying and intellectual property infringement.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Agenda&lt;/h2&gt;
&lt;h3&gt;&lt;strong&gt;Friday March 30, 2012 &lt;/strong&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;2:00&lt;/td&gt;
&lt;td&gt;Begin Registration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:15 – 4:45&lt;/td&gt;
&lt;td&gt;The Means of Change, Familiar and New&lt;br /&gt;
(&lt;em&gt;co-sponsored by Sponsored by the Orville H. Schell, Jr. Center for International Human Rights&lt;/em&gt;) &lt;br /&gt;
In the popular story of the political upheavals in the Middle East and 
North Africa, information technology stands out as the new factor that 
was critical to rapid mass mobilization for demanding change. The media 
have been credited with making popular demands for change contagious. 
Enthusiasts for the potential of technology to foster progressive change
 have labeled these apparently sudden developments a Facebook 
revolution. Governments responded by seeking to curtail the use of 
mobile phones and the Internet. What role has technology played in 
igniting, sustaining and shaping recent political changes in the Arab 
world? &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Anupam Chander, Professor of Law, University of California, Davis and Director, California International Law Center&lt;/li&gt;&lt;li&gt;Rebecca MacKinnon, Bernard L. Schwartz Senior Fellow, New America Foundation&amp;nbsp;&lt;/li&gt;&lt;li&gt;John Pollock, journalist &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5:00–&lt;br /&gt;
6:30&lt;/td&gt;
&lt;td&gt;Keynote Lecture &lt;br /&gt;

(&lt;em&gt;co-sponsored by Sponsored by the Orville H. Schell, Jr. Center for International Human Rights&lt;/em&gt;)&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Irwin Cotler, Canadian Parliament, former Attorney General of Canada &lt;/li&gt;&lt;/ul&gt;
&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6:30– 9:00&lt;/td&gt;
&lt;td&gt;Reception for Panelists of the Global Censorship Conference &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Saturday March 31, 2012&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9:00 – 10:00&lt;/td&gt;
&lt;td&gt;&amp;nbsp;Registration and Breakfast&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00–&lt;br /&gt;
11:30&lt;/td&gt;
&lt;td&gt;Panel One: Old and New Forms of Censorship &lt;br /&gt;
Years ago, activists met in person to plan protests and quietly shared 
subversive texts. Now, events can be planned over social networking 
sites, and arguments for change are posted online. How have governments 
responded to these changes? How have activist practices and governments’
 reactions changed the way we conceptualize censorship? &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Jack Balkin, Yale Law School&lt;/li&gt;&lt;li&gt;Yochai Benkler, Harvard Law School&amp;nbsp;&lt;/li&gt;&lt;li&gt;Navid Hassanpour, Yale Political Science Deptartment&amp;nbsp;&lt;/li&gt;&lt;li&gt;Rebecca MacKinnon, Bernard L. Schwartz Senior Fellow, New America Foundation &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:45 – 1:15&lt;/td&gt;
&lt;td&gt;Panel Two: Technical Architectures of Censorship&lt;br /&gt;
There are a number of choke points across the Internet and a number of 
different censorship mechanisms that can be deployed at various points 
across the network. Censorship can be executed at the router level, the 
Internet Service Provider (ISP) level, the Internet Content Provider 
(ICP) level, or the device level. Additionally, countries can employ a 
number of different technologies at each level. This panel will explore 
the many technical options for censorship and the strategic value of 
different choices. &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Laura DeNardis, Associate Professor of Communication at American 
University, and Affiliated Fellow, Information Society Project at Yale 
Law School&lt;/li&gt;&lt;li&gt;Nagla Rizk, American University in Cairo&amp;nbsp;&lt;/li&gt;&lt;li&gt;Hal Roberts, Fellow at Berkman Center for Internet &amp;amp; Technology&amp;nbsp;&lt;/li&gt;&lt;li&gt;Ashkan Soltani, Independent Researcher and Consultant on Privacy and Security &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1:15 – 2:15&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2:15 – 3:45&lt;/td&gt;
&lt;td&gt;Panel Three: Case Studies of Censorship &lt;br /&gt;

In the wake of censorship both domestically and abroad, many questions 
emerged about how the censorship was executed, what effects it had, if 
and how activists were able to route around the it, and how, if it all, 
it was eventually stopped. This panel will explore recent instances of 
censorship in the United States, Egypt, Syria, Brazil, and India and the
 common themes and important differences that emerged. &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Sherwin Siy, Deputy Legal Director and the Kahle/Austin Promise Fellow at Public Knowledge&lt;/li&gt;&lt;li&gt;Lina Attalah, Journalist, Managing Editor of Al-Masry Al-Youm&amp;nbsp;&lt;/li&gt;&lt;li&gt;Anas Qtiesh, Blogger, Editor of Global Voices&amp;nbsp;&lt;/li&gt;&lt;li&gt;Carlos Affonso Pereira de Souza, Vice-Coordinator of the Center for 
Technology &amp;amp; Society (CTS) at the Fundação Getulio Vargas (FGV) Law 
School&lt;/li&gt;&lt;li&gt;Rishabh Dara, Researcher at Indian Institute of Management, Ahmedabad &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4:00 –&lt;br /&gt;
5:30&lt;/td&gt;
&lt;td&gt;&amp;nbsp;Panel Four: Technical Methods of Circumventing Censorship &lt;br /&gt;

New technology may provide governments with new tools to censor, but it 
also creates opportunities for speakers and “hactivists” everywhere. How
 can individuals evade identification online and access blocked content?
 Can activists circumvent attempts to shut down the internet during 
periods of political unrest? What new methods are being developed to 
preserve free speech online?&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Roger Dingledine, The Tor Project&lt;/li&gt;&lt;li&gt;Peter Fein, Telecomix&lt;/li&gt;&lt;li&gt;Alex Halderman, University of Michigan, Dept. of Computer Science&lt;/li&gt;&lt;li&gt;Sascha Meinrath, Open Technology Initiative Director, New America Foundation&lt;/li&gt;&lt;li&gt;Wendy Seltzer, Senior Fellow, Information Society Project at Yale Law School &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6:00 – 9:00&lt;/td&gt;
&lt;td&gt;Dinner for Speakers &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Sunday, April 1, 2012&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9:00 – 9:30&lt;/td&gt;
&lt;td&gt;&amp;nbsp;Breakfast&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30 – 11:00&lt;/td&gt;
&lt;td&gt;Panel Five: Legal Solutions to Censorship &lt;br /&gt;

Given the way censorship technologies have slowly crept into acceptable 
use because of concerns like piracy, child pornography, or national 
security, there is much debate about the role and capacity of law in 
combatting these new, digital forms of government censorship, 
domestically and internationally. This panel will discuss if and how 
legal solutions to censorship can be deployed most effectively.&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Derek Bambauer, Brooklyn Law School&lt;/li&gt;&lt;li&gt;Jim Dempsey, Vice President of Public Policy at the Center for Democracy and Technology&amp;nbsp;&lt;/li&gt;&lt;li&gt;Molly Land, New York Law School&amp;nbsp;&lt;/li&gt;&lt;li&gt;Linda Lye, ACLU Northern California&amp;nbsp;&lt;/li&gt;&lt;li&gt;Jillian York, Director for International Freedom of Expression at the Electronic Frontier Foundation &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:15 – 12:45&lt;/td&gt;
&lt;td&gt;Panel Six: New Controversies in Censorship &lt;br /&gt;

Does new technology change the appropriate scope of free expression 
rights? Can policing intellectual property infringement burden free 
speech interests? Does surveillance ever have a censoring effect? This 
panel will wrestle with whether a variety of government activities 
constitutes inappropriate censorship or necessary actions to protect the
 public interest. &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Rebecca Bolin, Fellow at Information Society Project, Yale Law School&lt;/li&gt;&lt;li&gt;Mark MacCarthy, Vice President for Public Policy, Software and 
Information Industry Association; Adjunct Professor, Communication, 
Culture and Technology Program, Georgetown University&amp;nbsp;&lt;/li&gt;&lt;li&gt;Preston Padden, Senior Fellow at the Silicon Flatirons Center and an
 Adjunct Professor at the University Of Colorado's Law School and 
Interdisciplinary Telecommunications Program&amp;nbsp;&lt;/li&gt;&lt;li&gt;David Post, Temple University, Beasley School of Law&amp;nbsp;&lt;/li&gt;&lt;li&gt;Christopher Soghoian, Graduate Fellow, Center for Applied Cybersecurity Research, Indiana University &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:45&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&amp;nbsp; Bagged Lunch Available&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
[&lt;a href="https://cis-india.org/internet-governance/global-censorship-conference#fr1" name="fn1"&gt;1&lt;/a&gt;].Global
 Censorship Conference to be Held March 30-April 1 at Yale Law School | 
Yale Law School, last accessed on March 30, 2012, &lt;a class="external-link" href="http://www.law.yale.edu/news/15140.htm"&gt;http://www.law.yale.edu/news/15140.htm&lt;/a&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.law.yale.edu/intellectuallife/censorship12.htm"&gt;Read the original posted in Yale Law School website&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/global-censorship-conference'&gt;https://cis-india.org/internet-governance/global-censorship-conference&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-30T11:34:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw">
    <title>Glaring Errors in UIDAI's Rebuttal</title>
    <link>https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw</link>
    <description>
        &lt;b&gt;This response note by Pranesh Prakash questions Unique Identification Authority of India’s reply to Hans Verghese Mathews' article titled “Flaws in the UIDAI Process” (EPW, March 12, 2016), which found “serious mathematical errors” in the article.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The article was &lt;a class="external-link" href="http://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebuttal.html"&gt;published in Economic &amp;amp; Political Weekly&lt;/a&gt; Vol. 51, Issue No. 36, September 3, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;While I am not a statistician, I have followed the technical debate between Hans Verghese Mathews and the UIDAI closely, and see a number of glaring errors in the latter’s so-called rebuttal in EPW (March 12, 2016).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The UIDAI alleges Mathews to have ignored the evidence that the Receiver Operating Characteristic (ROC) "flattens" with more factors. However, Mathews cannot be accused of ignorance if the flattening of the ROC is not relevant to his argument. To explain this in simple terms, the ROC curve is used to choose the appropriate "threshold distance" which determines false positives and false negatives, and belongs to a stage which precedes the estimation of the false positive identification rates (FPIR).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, Mathews has used the FPIR estimates provided by the UIDAI (based on evidence from the enrolment of 84 million persons), and calculated how the FPIR changes when extrapolated for a population of 1.2 billion persons. In other words, he did not need to look at the ROC curve as that factor is not relevant to his argument, since he has used UIDAI data (which has presumably been estimated on the basis of all 12 factors : 10 fingerprints and 2 irises). &lt;br /&gt;&lt;br /&gt;Further, UIDAI asks why Mathews has assumed a linear curve for his extrapolation. Mathews has done no such thing. In fact, in their paper "Role of Biometric Technology in Aadhaar Enrollment," the UIDAI states: "FPIR rate grows linearly with the database size" (nd, 19). Thus, this is an assumption formerly made by them (without providing rationale for it to be a linear curve as opposed to anything else).&amp;nbsp; Mathews mathematically derives bounds for the FPIR in his paper, that is, the range within which the FPIR lies. One gets a linear curve only if they use the upper bound and not on the usage of anything else. So while Mathews does, as he explains, provide the results of the calculation based on the upper bound for the sake of simplicity, he nowhere asserts nor assumes a linear curve.&lt;br /&gt;&lt;br /&gt;If, as the UIDAI claims, one cannot perform such an extrapolation and needs to depend on “empirical evidence” instead, the question arises as to how the UIDAI decided to scale up the programme to 1.3 billion people given the error rates. One could also ask if the machines being used to capture biometrics are good enough for the enlargement. Surely they would have performed some extrapolations to decide this.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In their paper they note that "although it [FPIR] is expected to grow as the database size increases, it is not expected to exceed manageable values even at full enrolment of 120 crores" (UIDAI nd, 13). They do not illustrate the extent to which the FPIR is expected to grow—neither in their initial paper, nor in their rebuttal to Mathews—whereas Mathews provides a method of estimating the increase of FPIR. Even if UIDAI is correct in its appraisal of FPIR and that it will not exceed "manageable values," they need to either exemplify their calculations or release the latest data. They have done neither, and that is quite unfortunate.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;/p&gt;
&lt;div id="stcpDiv" style="text-align: justify;"&gt;UIDAI  (nd): “Role of Biometric Technology in Aadhaar Enrollment,” Unique  Identification Authority of India, Government of India, New Delhi,  viewed on 18 August 2016,  &lt;a class="external-link" href="https://uidai.gov.in/images/FrontPageUpdates/role_of_biometric_technology"&gt;https://uidai.gov.in/images/FrontPageUpdates/role_of_biometric_technology&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Related Links&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div id="stcpDiv"&gt;
&lt;ol&gt;
&lt;li&gt;Flaws in the UIDAI Process &lt;a href="http://www.epw.in/journal/2016/9/special-articles/flaws-uidai-process.html"&gt;http://www.epw.in/journal/2016/9/special-articles/flaws-uidai-process.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Erring on Aadhaar &lt;a href="http://www.epw.in/journal/2016/11/discussion/erring-aadhaar.html"&gt;http://www.epw.in/journal/2016/11/discussion/erring-aadhaar.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Request for Specifics &lt;a href="http://www.epw.in/journal/2016/36/documents/request-specifics-rebuttal-uidai.html"&gt;http://www.epw.in/journal/2016/36/documents/request-specifics-rebuttal-u...&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Glaring Errors in UIDAI's Rebuttal &lt;a href="http://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebuttal.html"&gt;http://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebutt...&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Overlooking the UIDAI Process &lt;a href="http://www.epw.in/journal/2016/36/documents/response-hans-verghese-mathews-and-pranesh-prakashs-rebuttal.html"&gt;http://www.epw.in/journal/2016/36/documents/response-hans-verghese-mathe...&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw'&gt;https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-09-18T03:22:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/first-post-february-3-2017-nimish-sawant-giving-out-your-fingerprint-for-aadhar-payments-is-as-bad-as-telling-the-seller-your-banking-password">
    <title>Giving out your fingerprint for Aadhar payments is as bad as telling the seller your banking password</title>
    <link>https://cis-india.org/internet-governance/news/first-post-february-3-2017-nimish-sawant-giving-out-your-fingerprint-for-aadhar-payments-is-as-bad-as-telling-the-seller-your-banking-password</link>
    <description>
        &lt;b&gt;PRS India recently released a report card enlisting the status of all the major policy announcements made by the President on India in his address to the Parliament on 23 February 2016. The policies cover all the major sectors including economy and finance, industry and manufacturing, governance and legal reform, skill development, science and innovation among others.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Nimish Sawant was published by &lt;a class="external-link" href="http://tech.firstpost.com/news-analysis/giving-out-your-fingerprint-for-aadhar-payments-is-as-bad-as-telling-the-seller-your-banking-password-360658.html"&gt;First Post Tech 2&lt;/a&gt; on February 3, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Ever since the current government has come into power, there has     been a concerted effort to take India on the information highway     with technology-backed initiatives. Projects such as Digital India,     Smart City Project, Startup India to the latest policy announcements     post the demonetisation on 8 November 2016, a lot of has been said     about technology.&lt;br /&gt; &lt;br /&gt; But there are still areas of improvement, for instance we are yet to     have a privacy and data protection law, there is an alarming     shortage of cybersecurity experts and we have seen our fair share of     government as well as personal data being under jeopardy in the     years gone by.&lt;br /&gt; &lt;br /&gt; Pranesh Prakash, policy director of the Centre for Internet and     Society, has his reservations against the speed at which we are     moving towards the dream of a digitised India, without covering the     core policies on security, legal frameworks and more. Here is what     Prakash has to say.&lt;br /&gt; &lt;br /&gt; “All in all, we in India are in a really precarious situation when     it comes to Digital India, especially from a legal and regulatory     perspective. While the push for digitisation is to be welcome, it     should make this more convenient for citizens and that can’t be     accomplished by forcing digitisation on people without giving them     options.&lt;br /&gt; &lt;img src="https://cis-india.org/home-images/copy_of_Tweet.jpg" alt="Tweet" class="image-inline" title="Tweet" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Planning Commission put together a group of experts chaired by     Justice AP Shah, which came out with a report on privacy principles     which were to inform a privacy and data protection law that the     government was to introduce in Parliament. That report came out in     2012. In 2017, we are no closer to a privacy and data protection     law. The data security practices at the levels of the government and     of the private sector are very worrying.&lt;br /&gt; &lt;br /&gt; For instance, the Narendra Modi app, which is operated by the BJP,     for many months was leaking the personal details of more than 7     million users.&lt;br /&gt; &lt;br /&gt; Another example: the government, as per press reports, is going     ahead with using fingerprints for authentication of Aadhaar Enabled     Payment Systems (AEPS) transactions. While the security architecture     of AEPS might in itself be good, the idea of providing your     fingerprints to merchants for financial transactions is a terrible     idea since that is like asking you to give your bank password to a     merchant, and the merchant can reuse that password, and you can’t     ever change the password.&lt;br /&gt; &lt;br /&gt; Last year Symantec revealed that for more than two years a     cyberespionage project (that Symantec called “SuckFly“) had     penetrated deep into Indian systems, including Indian government and     banking systems.  Yet, the government didn’t conduct an enquiry     about this and reassure the public on actions being taken to     mitigate this.&lt;br /&gt; &lt;br /&gt; So while digitisation initiatives are great, there also needs to be     a concerted effort to have a secure framework, and there has to be     an ease in onboarding the non tech-savvy population as well.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/first-post-february-3-2017-nimish-sawant-giving-out-your-fingerprint-for-aadhar-payments-is-as-bad-as-telling-the-seller-your-banking-password'&gt;https://cis-india.org/internet-governance/news/first-post-february-3-2017-nimish-sawant-giving-out-your-fingerprint-for-aadhar-payments-is-as-bad-as-telling-the-seller-your-banking-password&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-07T16:09:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/girls-schools-womens-pgs-the-shocking-results-when-you-google-bitches-near-me">
    <title>Girls' schools, women's PGs: The shocking results when you Google 'bitches near me'</title>
    <link>https://cis-india.org/internet-governance/news/girls-schools-womens-pgs-the-shocking-results-when-you-google-bitches-near-me</link>
    <description>
        &lt;b&gt; Considering the monopoly and clout that Google enjoys, it must be held accountable for promoting such stereotypes and values, experts say.
&lt;/b&gt;
        &lt;p&gt;The blog post by Geetika Mantri was published in &lt;a class="external-link" href="https://www.thenewsminute.com/article/girls-schools-women-s-pgs-shocking-results-when-you-google-bitches-near-me-92244"&gt;News Minute&lt;/a&gt; on November 26, 2018. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;If there’s a question you don’t know the answer to, more often than  not, you’ll turn to Google. The search engine’s monopoly over the  market, and data pool at hand, are almost unparalleled in public  perception – which makes it all the more alarming when it tends to feed  into dangerous and misogynistic values.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is what seems to have happened, as pointed out by Twitter user  @AHappyChipmunk, when someone opened Google Maps and typed “bitches near  me.” The results show up addresses of girls’ schools, women’s and  girls’ hostels and PGs, and women’s clothing shops. Not only is this  shocking because ‘bitches’ is often used as a derogatory phrase for  women, but also these Google search results of schools put minors at  risk.&lt;/p&gt;
&lt;p&gt;The tweet caused much outrage and alarm among people, who did the  search themselves and posted screenshots of the real time results that  they got.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Why would Google show these results?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, a fellow at the Centre for Internet and Society,  points out that this was telling of the fact that Google knows that  ‘bitches’ can be a slang for women. “For many years now, Google has been  trying to understand and search for what you meant, than what you may  have typed,” he explains. “However, if you enclose this search phrase in  quotes, you will not get the same results, because then it will look  for the phrase.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He also notes that if you were to look for “girls near me”, you would  get similar search results on Google Maps, though more specific to  women’s accommodations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In contrast, it you were to Google, “bitch near me”, you would not get  Google Map results. “I think that’s because Google understands that  ‘bitches’ is more likely to mean women, than singular ‘bitch’,” Pranesh  says.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Tech giants need to be held accountable&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Pranesh thinks that the search results are not ‘dangerous’ per  se in the sense that a potential abuser was more likely to Google ‘girls  schools’ than ‘bitches near me’, he agrees that these search results  are telling of the misogynistic language in use online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, is it okay for tech giants to wash the responsibility off  their hands because this is the language that their algorithm picked up?  Nayantara R, who works with the Internet Democracy Project in  Bengaluru, says, “This reminds me of the book &lt;i&gt;Algorithms of Oppression: How Search Engines Reinforce Racism&lt;/i&gt;."  The book challenges the idea that platforms like Google are level  playing fields for different ideas and ideologies. Author Safiya Umoja  Noble argues that due to data discrimination, private interests in  promoting certain sites, as well as the monopoly of a few online search  engines, results in biased search algorithms which discriminate against  women of colour while painting favourable portraits of whiteness.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One such bias came to light in July last year where many people,  including Congress MP Shashi Tharoor pointed out how a Google search for  ‘south Indian masala’ led to a pictures of skimpily clad women, while  ‘north Indian masala’ led to photos of spices and dishes. At the time,  Google had maintained that this wasn’t its fault and that Google’s  search worked by learning from the keywords people use and the results  they click on to predict just what people are searching for.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Nayantara asserts that considering the monopoly and clout  that Google enjoys, it must be held accountable for promoting such  stereotypes and values. “The Google page ranking is one of the most  protected patents. No one knows how or why certain pages come before the  others. In this case, certain search results coming first does not mean  that Google is misogynistic. But the algorithmic decision that is taken  by someone at Google to rank certain pages which promote certain values  before others does have a social impact. All technology is a result of  how it is used. Accountability is required there,” she argues.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A conversation about what search results mean&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nayantara also points out that apart from accountability, there needs  to be a conversation about what these search results mean. “Search  results do embed political values. However, people need to understand  that if they Google something and some pages are ranked before the  others, it is not reflective of the truth or right or wrong, but  reflection of an opinion,” she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We need popular perception to wrap its head around what a search  engine is, and that there are alternatives to Google. We also need more  algorithmic diversity in search results,” she adds.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/girls-schools-womens-pgs-the-shocking-results-when-you-google-bitches-near-me'&gt;https://cis-india.org/internet-governance/news/girls-schools-womens-pgs-the-shocking-results-when-you-google-bitches-near-me&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-11-28T01:34:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/telegraphindia-march-8-2014-girls-just-wanna-have-a-voice">
    <title>Girls just wanna have... a voice </title>
    <link>https://cis-india.org/news/telegraphindia-march-8-2014-girls-just-wanna-have-a-voice</link>
    <description>
        &lt;b&gt;Many Indian women have taken to Twitter, the micro-blogging site, to air their views. And some of them have become social media celebrities by virtue of their wise and witty tweets. Prasun Chaudhuri looks at the women who matter in India’s Twitterverse.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.telegraphindia.com/1140308/jsp/calcutta/story_18064724.jsp"&gt;published in the Telegraph&lt;/a&gt; on March 8, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Everyone knows that movie stars like Priyanka Chopra and Deepika Padukone, media celebs like Barkha Dutt and Sagarika Ghose have hundreds of thousands of followers on social media who hang on to their every word. But Malini Agarwal, Priyanka Sachar? Vidyut Kale? You may not have heard of them otherwise, but these women are rockstars of India’s Twitterverse too — not because they are famous in their day jobs, but because their tweets have that special something that keeps the followers coming.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Take Malini Agarwal (@MissMalini), a former radio jockey and head of digital content for Channel V in India, who has over 2,00,000 followers on Twitter. In fact, she has a larger-than-life presence on virtually all social media platforms. Agarwal tweets about Bollywood, the fashion world and the Page 3 circuit. Her Twitter bio says: “She who controls the spice, controls the universe. Bollywood, Fashion &amp;amp; Lifestyle with a Desi Girl Twist.” This “desi girl” with the insider’s take on the glamour world is now an industry of sorts. She has her own website called missmalini.com in which she has employed nine enthusiastic young bloggers — “a happy mix of Bollywood Junkies, Fashionistas and Party Animals” representing “the young, modern (and pretty!) face of India”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Far removed from the glamour circuit is Vidyut Kale (@Vidyut), a stay-at-home mom raising an infant with cerebral palsy. She has over 14,000 followers for her unusual takes on “issues of socio-political interest”. Says Kale, who describes herself as an “intellectual anarchist”, “Twitter is just amazing because I can actually comment on something and get instant replies. I think I get followed mainly because I say what many will tiptoe around, and that can feel like a big relief when an issue is bugging you badly.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Her “firebrand” tweeting — on women’s issues, politics, and indeed, pretty much everything under the sun — has turned her into quite a celebrity and she often gets invited to speak at events. Even though she avoids most of these “real-life” gatherings, sometimes her fans force her to attend them. She says, “I have been paid travel expenses to attend an event when I said I couldn’t afford the travel. I have been interviewed, I have had people make an effort to understand a [social] cause if I bring it up.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clearly, a social media platform like Twitter has become a fantastic forum for women — a section of society that has traditionally been voiceless. Those who shine on it, says Sunil Abraham, Centre for Internet and Society (a Bangalore-based organisation that researches the impact of digital media), do so by virtue of their “authentic voice”. He adds, “Unlike in the traditional media, there’s no editor to moderate their views and they don’t have any guidelines to follow.” In other words, what their fans get to read or see are unfiltered views — something that’s often missing in mainstream media. Besides, their tweets are often edgy and politically incorrect. And men — and women — fed on the traditional image of women propagated by the mainstream media, find that refreshing and engaging.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Adds social media enthusiast and avid blogger Harsh Ajmera, “People appreciate the bold and politically incorrect approach of these Twitter stars, as opposed to the sugar-coated comments aired in news channels and various other media outlets.” Agrees Kale, “Unlike in lengthy blog posts or newspaper columns, it is easier to make comments on news or challenge views through Twitter. It also enables direct interaction with readers.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ask Chinmayi Sripada (@chinmayi), a Chennai-based singer whose bold and frank tweets have earned her more than 2,40,000 Twitter followers. And a fair number of trolls and abusive enemies too. When she spoke out in support of Tamil Nadu fishermen who were attacked by the Sri Lankan Navy, she was flooded with abusive tweets that were tantamount to sexual harassment. But she took on her abusers (one of them was a professor at a top fashion institute) head on. “I filed a case under Section 66A of the IT Act and they were in jail for about two weeks. That was when I saw the full extent of cyber bullying on the basis of caste and community.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of course, Sripada doesn’t owe her fame to Twitter alone. She is a popular playback singer in south India and got famous across India for her recent Bollywood hit in Chennai Express. “I haven’t become famous because of social media. I am recognised primarily as a singer.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Actress and former Miss India Gul Panag (@GulPanag) is yet another Twitter star who was already a celebrity. But with a staggering 7,84,000 followers, and with tweets that are unfailingly sharp and intelligent, maybe her Twitter stardom outshines her Bollywood one. A recent survey by an agency named her as one of the most influential persons on the micro-blogging site. News anchor Barkha Dutt — one of the country’s top media celebrities — also boasts a whopping 12.3 lakh followers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Kaveri Ahuja (@ikaveri) is a regular wife and mom who has gone on to become a Twitter celeb. A cancer survivor, her takes on everyday life and the stories of her battle against colorectal cancer (“I love a good fight. How else would I have kicked the big C’s butt?”) attract over 25,000 followers. She even runs a separate Twitter handle for her fan club (@ikaverifc). “Being recognised on Twitter has expanded my offline social circle as well. I can count many online friends as my real-life friends now,” she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of India’s earliest Twitter stars was Priyanka Sachar. If her real name doesn’t ring a bell, her Twitter handle, @TwilightFairy, might. This erstwhile IT professional and part-time wedding photographer left her day job riding on the fame earned by her 140-character tweets. Her quirky takes on a wide range of topics — ranging from everyday outrages (“Bought passionfruit cake for parents’ anniversary from jaypeehotels and got long human hair baked in it for free. Never again!”) to instant reaction to news (“Sahara boss gets ink on his face. Reminds me of school time ink pen wars!”) — are lapped up by her 21,000+ followers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thanks to her fame on Twitter, she is often recognised by strangers. “It is a strange experience and I really don’t know how to react, except to say ‘yes, that’s me, how did you know!’… Twitter has made sure that so many interesting (and seemingly inaccessible) people are accessible instantly.” Apart from these “life-altering changes”, she keeps getting invited to some activity or the other, organised by brands that regularly invite “influencers”. “The recognition on Twitter/social media has affected me in massive ways. I left my IT industry job in order to figure out if I can take up a different profession and be a freelancer. And the moment I left my job, an opportunity landed straight in my lap, simply because of my Twitter id! I got offered a job as a social media consultant at a digital media agency,” she says.&lt;br /&gt;So have social media platforms such as Twitter really done wonders for women’s empowerment? Yes and no.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Sachar, Twitter did offer unprecedented freedom of speech in its early days. But now that a lot of politicians and political parties have come on board and the Indian IT laws are being tweaked, tweets can be misused by anyone in power. “Even though one can say what one wants, people do tread a tad more cautiously compared to, let’s say, two year back,” says Sachar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chinmayi agrees. “There is nothing called total freedom of speech. Even if one chooses that path, the trolls are waiting to see who can be cut to size. I am guarded about what I write on social media.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/telegraphindia-march-8-2014-girls-just-wanna-have-a-voice'&gt;https://cis-india.org/news/telegraphindia-march-8-2014-girls-just-wanna-have-a-voice&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-01T11:21:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/first-post-nov-19-2012-girls-arrested-for-facebook-post-on-thackeray-get-bail">
    <title>Girls arrested for Facebook post on Thackeray get bail</title>
    <link>https://cis-india.org/news/first-post-nov-19-2012-girls-arrested-for-facebook-post-on-thackeray-get-bail</link>
    <description>
        &lt;b&gt;Two girls who were arrested for making a Facebook comment protesting the closure of shops in the wake of Shiv Sena supremo Bal Thackeray‘s death, have been released on bail bonds of Rs 15,000 each.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article was &lt;a class="external-link" href="http://www.firstpost.com/india/girls-arrested-for-facebook-post-on-thackeray-get-bail-528178.html"&gt;published in the FirstPost&lt;/a&gt; on November 19, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The duo, one of whom had reportedly updated her Facebook status to read  “People like Thackeray are born and die daily and one should not observe  a bandh for that” and the other one who ‘liked’ it, were initially  booked under section 295A (hurting the religious sentiment of others)  and were reportedly remanded to judicial custody for 14 days, &lt;a href="http://www.ndtv.com/article/world/two-girls-arrested-for-facebook-post-on-mumbai-shutdown-granted-bail-294239?pfrom=home-lateststories" rel="nofollow" target="_blank"&gt;NDTV reported.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;The two girls were arrested after a complaint made to the Palghar police station in neighbouring Thane district by a local Sena leader. &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;A group of Shiv Sainiks attacked and ransacked the girl’s uncle’s orthopaedic clinic at Palghar, even though she withdrew her comment and apologised. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;In comments to &lt;/span&gt;&lt;/span&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Firstpost&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt;&lt;span&gt;, Pranesh Prakash of the Centre for Internet and Society, said that the arrest was a gross misapplication of the Indian Penal Code, and said that this particular provision had been misused on multiple occasions by the state of Maharashtra. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;“What makes this seem ironic, and almost a parodic news report, is the fact that &lt;a href="http://www.firstpost.com/topic/person/bal-thackeray-profile-22424.html" target="_blank"&gt;Bal Thackeray&lt;/a&gt; probably violated this provision more times than most other politicians, but was only charged under it once or twice”, he said. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;The arrest has predictably elicited outrage from across the spectrum. Many took to social media to express their disgust, while &lt;/span&gt;&lt;/span&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;NDTV&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt;&lt;span&gt; reported that Maharashtra police HQ in Mumbai was very upset with the action taken by the Palghar police.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Press Council of India Chairman Markandey Katju had also called for the immediate release of the girls and wrote to Maharashtra Chief Minister Prithviraj Chavan asking him to ensure it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pointing out that people were not living under a fascist dictatorship, he said that the act of arrest appeared to be a criminal act since it was a violation under sections of the Indian Penal Code to wrongfully arrest or confine anyone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The PCI chief said that legal consequences would follow if the Chief Minister failed to take action.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/first-post-nov-19-2012-girls-arrested-for-facebook-post-on-thackeray-get-bail'&gt;https://cis-india.org/news/first-post-nov-19-2012-girls-arrested-for-facebook-post-on-thackeray-get-bail&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-11-30T05:18:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-arun-dev-nov-20-2012-girl-arrest-draws-flak-on-social-media">
    <title>Girl's arrest draws flak on social media</title>
    <link>https://cis-india.org/news/times-of-india-arun-dev-nov-20-2012-girl-arrest-draws-flak-on-social-media</link>
    <description>
        &lt;b&gt;The arrest of a 21-year-old girl by Mumbai police for criticizing the shutting down of the city following the death of Bal Thackeray come under fire from netizens.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Arun Dev's article was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/bangalore/Girls-arrest-draws-flak-on-social-media/articleshow/17286575.cms"&gt;published in the Times of India&lt;/a&gt; on November 20, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;Many tweets and  &lt;a href="http://timesofindia.indiatimes.com/topic/Facebook"&gt;Facebook&lt;/a&gt; posts popped up soon after the news of her arrest played on TV and  social media networks, some even reposting what she first posted on her  page.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, programme manager, Centre for Internet and Society, told TOI this case was a clear case of misapplication of Section 295A of the Indian Penal Code. "This provision has been frivolously used numerous times in Maharashtra. Even the banning of James Laine's book, 'Shivaji: Hindu King in Islamic India', happened this section. The ban was subsequently deemed unlawful by both the Bombay high court and the Supreme Court. Indeed, Section 295A has not been applied in cases where it's more apparent," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the CIS blog, he commented, "Interestingly, the question arises of the law under which the friend who 'liked' the Facebook status update was arrested. It would take a highly clever lawyer and a highly credulous judge to make 'liking' of a Facebook status update an act capable of being charged with electronically sending ... any information that is grossly offensive or has menacing character".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It is absolutely ridiculous. Regardless of the fact she was given bail, she was sent to 14 days of judicial custody for a mere comment. We have allowed our social media to be free and open but we have laws which are ancient," said Lawrence Liang, a lawyer working on media laws with the Alternative Law Forum in Bangalore. "Such cases don't stand a chance in a court of law. We need procedural safeguards which will ensure cases which are not relevant are not be allowed to be filed," he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The open letter to the chief minister of the Maharashtra by Justice Katju, Chairman, Press Council of India, and former Judge, &lt;a href="http://timesofindia.indiatimes.com/topic/Supreme-Court"&gt;Supreme Court&lt;/a&gt; of India too was widely circulated on social media. Some posted this excerpt: "We are living in a democracy, not a fascist dictatorship. In fact this arrest itself appears to be a criminal act since under sections 341 and 342 it is a crime to wrongfully arrest or wrongfully confine someone who has committed no crime."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-arun-dev-nov-20-2012-girl-arrest-draws-flak-on-social-media'&gt;https://cis-india.org/news/times-of-india-arun-dev-nov-20-2012-girl-arrest-draws-flak-on-social-media&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-11-20T11:04:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/giga-conference">
    <title>GIGA International Conference Series - 1</title>
    <link>https://cis-india.org/news/giga-conference</link>
    <description>
        &lt;b&gt;The Institute of Global Internet Governance and Advocacy (GIGA) at NALSAR University will hold the first International Conference in association with Department of Electronics and Information Technology (DEIT) of Government of India on the theme "Revisiting Internet Governance - Lessons Learnt and Road Ahead" at NALSAR University of Law, Justice City Campus, Shameerpet on April 5 &amp; 6 of 2012.  &lt;/b&gt;
        
&lt;p&gt;Lex Witness, India's first magazine on legal and corporate affairs is the media partner for the conference, Sunil Abraham will be speaking in this conference,&lt;/p&gt;
&lt;p&gt;The first International Conference on Internet Governance of GIGA aims to:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;To map the emergence of Internet Governance globally in the last two decades and to analyse its high points and low points in terms of its development, dynamism, diversity, divide and deficit.&lt;/li&gt;&lt;li&gt;To map the multiple definitions of Internet Governance and its rapid evolutionary trajectory of consolidating convergence and confronting challenges of divergence.&lt;/li&gt;&lt;li&gt;To critically evaluate the creative disruption of processes of accountability, empowerment and governance processes.&lt;/li&gt;&lt;li&gt;To levitate the legislative landscape for connecting the real life citizens and virtual life netizens.&lt;/li&gt;&lt;li&gt;To reshape the emergent issues of privacy vs. social responsibility, freedom of expression vs.social &amp;amp; cultural harmony, self conduct vs. legislative intervention, adolescence vs. adult behavior.&lt;/li&gt;&lt;li&gt;To reconcile the sovereign principles with Universal principles.&lt;/li&gt;&lt;/ol&gt;
&lt;hr /&gt;
&lt;h2&gt;&amp;nbsp;Conference Schedule&lt;/h2&gt;
&lt;h3&gt;Day 1, April 5, 2012&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;S.No.&lt;/td&gt;
&lt;td&gt;Time&lt;/td&gt;
&lt;td&gt;Inaugural&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;9.00-10.15&lt;/td&gt;
&lt;td&gt;Welcome Address by&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Prof. V. C. Vivekanandan Director, GIGA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Address by&lt;/td&gt;
&lt;td&gt;Prof. Faizan Mustafa&lt;br /&gt;Vice Chancellor, NALSAR&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Address by&lt;/td&gt;
&lt;td&gt;Mr. N. Ravi Shanker Additional Secretary, DOT, Govt. of India&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Address by&lt;/td&gt;
&lt;td&gt;Dr. Ajay Kumar&lt;br /&gt;Jt. Secretary DEIT, Govt. of India&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Key Note Address by&lt;/td&gt;
&lt;td&gt;Mr. J. Satyanarayana&lt;br /&gt;Secretary, DEIT Govt. of India&lt;br /&gt;(to be confirmed)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Vote of Thanks by&lt;/td&gt;
&lt;td&gt;Prof. M. Sridhar&lt;br /&gt;Faculty, GIGA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;10.15-10.45&lt;/td&gt;
&lt;td&gt;Coffee Confluence&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Theme&lt;/td&gt;
&lt;td&gt;Chair / Speaker&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Internet-Comparative Perspective&lt;br /&gt;&lt;/strong&gt;&lt;br /&gt;Opening Remarks from the Chair&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Mr. Ajit Balakrishnan&lt;br /&gt;Chairman-Board of Governors, IIM Calcutta &amp;amp; CEO-Rediff.com&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;A. Internet as key to development-an African perspective&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Mr. Jean Jacques SUBRENAT&lt;br /&gt;ALAC Member, ICANN&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;B. Adding a Billion-Challenges in Asia Pacific world&lt;/td&gt;
&lt;td&gt;Dr. Katim Seringe Touray&lt;br /&gt;Former Board Member, ICANN&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;C. Indian policy response to Internet Governance&lt;/td&gt;
&lt;td&gt;Prof. Hong Xue&lt;br /&gt;Director- IIPL- Beijing&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Netizen speak&lt;/td&gt;
&lt;td&gt;Dr. Govind&lt;br /&gt;Sr.Director, DEIT, CEO-NIXI&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Closing remarks of the Chair&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Theme&lt;/td&gt;
&lt;td&gt;Chair / Speaker&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Internet Governance &amp;amp; Technology&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Opening Remarks from the Chair&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Mr. Sanjay Jaju&lt;br /&gt;Secretary (IT) AP Govt.&lt;br /&gt;(to be confirmed)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Key Note Address&lt;br /&gt;gTLDs- Managing the genie out of the bottle-Techno-Legal issues&lt;/td&gt;
&lt;td&gt;Mr. N. Ravi Shanker Additional Secretary, DOT&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;A. The business of gTLDS-Roses &amp;amp; Thorns&lt;/td&gt;
&lt;td&gt;Prof.V.C.Vivekanandan&lt;br /&gt;Director, GIGA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;B. IDN Challenges – Unity in Diversity- Indian Response&lt;/td&gt;
&lt;td&gt;Mr. Akshat Joshi&lt;br /&gt;GIST, CDAC-Pune&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Closing remarks of the Chair&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Theme&lt;/td&gt;
&lt;td&gt;Chair / Speaker&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Internet Governance &amp;amp; Society&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Opening Remarks from the Chair&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Prof. Ranbir Singh&lt;br /&gt;Vice Chancellor, NLU, Delhi&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Key Note Address&lt;br /&gt;Balancing the Privacy-Transparency Conundrum in Internet Governance&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Mr. Carlton A. Samuels&lt;br /&gt;ALAC Member, ICANN&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;A. Brahma-Vishnu-Shiva- Trinity as the State&lt;/td&gt;
&lt;td&gt;Mr.U.Ramamohan&lt;br /&gt;SP, Cyber Crimes, A.P.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;B. Digital Natives Vs. Digital Naivety&lt;/td&gt;
&lt;td&gt;Mr. Sunil Abraham&lt;br /&gt;Executive Director, CIS&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;C. A development agenda for global Internet governance&lt;/td&gt;
&lt;td&gt;Mr. Parminder Jeet Singh&lt;br /&gt;Executive Director,&lt;br /&gt;IT for Change&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Netizen Speak&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Closing remarks of the Chair&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Coffee Confluence&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Theme &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Chair / Panelist&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Panel Panorama - Internet Governance - Crossroads or crossing the Road&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Opening Remarks from the Chair&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Panelists - 15 minutes each&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Prof. Amita Dhanda&lt;br /&gt;Professor of Law, NALSAR&lt;br /&gt;&lt;br /&gt;Dr. Anindya Sircar&lt;br /&gt;AVP &amp;amp; Head IP , Infosys&lt;br /&gt;&lt;br /&gt;Prof. Srividhya Ragavan&lt;br /&gt;Professor of Law, University of Oklahoma College of Law&lt;br /&gt;&lt;br /&gt;Prof. S. Matilal&lt;br /&gt;RGSOIPL-IIT, Kharagpur&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Netizen Speak&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Closing Remarks of the Chair&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Day 2, April 6, 2012&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1.&lt;/td&gt;
&lt;td&gt;9.00-9.05&lt;/td&gt;
&lt;td&gt;Internet Governance &amp;amp; Law&lt;br /&gt;Opening Remarks from the Chair&lt;/td&gt;
&lt;td&gt;Prof. R. Venkata Rao&lt;br /&gt;Vice Chancellor&lt;br /&gt;NLSIU, Bangalore&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;9.05-9.25&lt;/td&gt;
&lt;td&gt;Key Note Address&lt;br /&gt;Whose Privacy is it Anyway?&lt;/td&gt;
&lt;td&gt;Prof. Graham Greenleaf&lt;br /&gt;Co-Director, Aust LII&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;9.25-9.40&lt;/td&gt;
&lt;td&gt;A. Netizen vs. Citizen-the Sumo Game&lt;/td&gt;
&lt;td&gt;Prof.Izumi AIZU&lt;br /&gt;TAMA University,Japan&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;9.40-9.55&lt;/td&gt;
&lt;td&gt;B. Number or Name- Shift in Domain Names&lt;/td&gt;
&lt;td&gt;Dr. V. K. Unni&lt;br /&gt;Associate Prof., IIM,Calcutta&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;9.55-10.10&lt;/td&gt;
&lt;td&gt;C. Dial M for Internet Governance&lt;/td&gt;
&lt;td&gt;Mr. Pavan Duggal&lt;br /&gt;Advocate, Supreme Court of India&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;10.10-10.25&lt;/td&gt;
&lt;td&gt;D. Chartering rights in Unchartered waters&lt;/td&gt;
&lt;td&gt;Mr.Na.Vijaya Shankar&lt;br /&gt;Cyber Law Consultant&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;10.25-10.35&lt;/td&gt;
&lt;td&gt;Netizen Speak&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;10.35-10.45&lt;/td&gt;
&lt;td&gt;Closing Remarks of the Chair&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;10.45-11.15&lt;/td&gt;
&lt;td&gt;Coffee Confluence&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Theme&lt;/td&gt;
&lt;td&gt;Chair / Speaker&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2. &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;11.15-11.20&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Internet Governance &amp;amp; Media&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Opening Remarks from the Chair&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Prof.V.Vijaya Kumar&lt;br /&gt;Vice Chancellor, TNDALU-Chennai&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;11.20-11.40&lt;/td&gt;
&lt;td&gt;Keynote Address&lt;br /&gt;&lt;br /&gt;Social Media- a New Wine in a New Bottle&lt;/td&gt;
&lt;td&gt;Prof. Ang Peng Hwa&lt;br /&gt;NTU, Singapore&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;11.40-11.55&lt;/td&gt;
&lt;td&gt;A. The Republic of Facebook –The Bill of Frights&lt;/td&gt;
&lt;td&gt;Prof.V.C.Vivekanandan&lt;br /&gt;Director, GIGA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;11.55-12.10&lt;/td&gt;
&lt;td&gt;B. Objecting the Objectionable-the chronicles of criminology&lt;/td&gt;
&lt;td&gt;Dr.K.V.K.Santhy&lt;br /&gt;Co-investigator, GIGA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;12.10-12.25&lt;/td&gt;
&lt;td&gt;C. Street Talk vs. Social Talk-Loud Decibels&lt;/td&gt;
&lt;td&gt;Prof. M. Sridhar&lt;br /&gt;Co-investigator, GIGA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;12.25-12.35&lt;/td&gt;
&lt;td&gt;Netizen Speak&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;12.35-12.45&lt;/td&gt;
&lt;td&gt;Closing remarks from the Chair&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;12.45 -2.00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Theme&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.&lt;/td&gt;
&lt;td&gt;2.00-2.05&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Wrap Up – Internet dreams &amp;amp; delusions – Setting the agenda for the new decade&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Opening remarks from the Chair&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Prof. S. Sivakumar&lt;br /&gt;Director In-charge,&lt;br /&gt;Indian Law Institute&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;2.05 – 3.20&lt;/td&gt;
&lt;td&gt;Panelists -15 minutes each&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Mr.G.R.Raghavender&lt;br /&gt;Registrar of Copyrights&lt;br /&gt;Copyright office&lt;br /&gt;&lt;br /&gt;Ms. Ankhi Das&lt;br /&gt;Head of Public Policy, Facebook India&lt;br /&gt;&lt;br /&gt;Ms. Tulika Pandey&lt;br /&gt;Addl.Director- DEIT&lt;br /&gt;&lt;br /&gt;Mr.R.Muralidharan&lt;br /&gt;Advocate- Bangalore&lt;br /&gt;&lt;br /&gt;Mr. Raman Jit Singh Chima&lt;br /&gt;Policy Analyst , Google India Pvt Ltd&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;3.20 –3.30&lt;/td&gt;
&lt;td&gt;Netizen Speak&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;3.30 – 3.40&lt;/td&gt;
&lt;td&gt;Closing remarks of the Chair&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;3.40 – 4.00&lt;/td&gt;
&lt;td&gt;Summing Up - The Hyderabad Declaration&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Prof.V.C.Vivekanandan&lt;br /&gt;Director, GIGA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;4.00&lt;/td&gt;
&lt;td&gt;Coffee Musings &amp;amp; Farewell&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/giga-conference'&gt;https://cis-india.org/news/giga-conference&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Conference</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-04-03T06:18:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/directions-cyber-digital-europe-arindrajit-basu-september-16-2022-getting-the-digital-indo-pacific-economic-framework-right">
    <title>Getting the (Digital) Indo-Pacific Economic Framework Right</title>
    <link>https://cis-india.org/internet-governance/blog/directions-cyber-digital-europe-arindrajit-basu-september-16-2022-getting-the-digital-indo-pacific-economic-framework-right</link>
    <description>
        &lt;b&gt;On the eve of the Tokyo Quad Summit in May 2022, President Biden unveiled the Indo-Pacific Economic Framework (IPEF), visualising cooperation across the Indo-Pacific based on four pillars: trade; supply chains; clean energy, decarbonisation and infrastructure; and tax and anti-corruption. Galvanised by the US, the other 13 founding members of the IPEF are Australia, Brunei Darussalam, India, Indonesia, Japan, Republic of Korea, Malaysia, New Zealand, Philippines, Singapore, Thailand and Vietnam. The first official in-person Ministerial meeting was held in Los Angeles on 9 September 2022.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="https://directionsblog.eu/getting-the-digital-indo-pacific-economic-framework-right/"&gt;originally published in Directions&lt;/a&gt; on 16 September 2022.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;It is still early days. Given the broad and noncommittal scope of the &lt;a href="http://indiamediamonitor.in/ViewImg.aspx?rfW3mQFhdxZsqXnJzK5Xi5+XYlnW6zXnPDF3Ad56Y/KdgI1zvICzrodtLI85MPKdVO1fIh79GUlPfyXY2/bE2g==" rel="noreferrer noopener" target="_blank"&gt;economic arrangement&lt;/a&gt;, it is unlikely that the IPEF will lead to a trade deal among members in the short run. Instead, experts believe that this new arrangement is designed to serve as a ‘&lt;a href="https://indianexpress.com/article/opinion/columns/building-on-common-ground-7963518/" rel="noreferrer noopener" target="_blank"&gt;framework or starting point&lt;/a&gt;’ for members to cooperate on geo-economic issues relevant to the Indo-Pacific, buoyed in no small part by the United States’ desire to make up lost ground and counter Chinese economic influence in the region.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;United States Trade Representative (USTR) Katherine Tai has underscored the relevance of the Indo-Pacific digital economy to the US agenda with the IPEF. She has emphasized the &lt;a href="https://www.whitehouse.gov/briefing-room/press-briefings/2022/05/23/on-the-record-press-call-on-the-launch-of-the-indo-pacific-economic-framework/" rel="noreferrer noopener" target="_blank"&gt;importance of&lt;/a&gt; collaboratively addressing key connectivity and technology challenges, including standards on cross-border data flows, data localisation and online privacy, as well as the discriminatory and unethical use of artificial intelligence. This is an ambitious agenda given the divergence among members in terms of technological advancement, domestic policy preferences and international negotiating stances at digital trade forums. There is a significant risk that imposing external standards or values on this evolving and politically-contested digital economy landscape will not work, and may even undermine the core potential of the IPEF in the Indo-Pacific. This post evaluates the domestic policy preferences and strategic interests of the Framework’s member states, and how the IPEF can navigate key points of divergence in order to achieve meaningful outcomes.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;State of domestic digital policy among IPEF members&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Data localisation is a core point of divergence in global digital policymaking. It continues to dominate discourse and trigger dissent at all &lt;a href="https://www.ikigailaw.com/the-data-localization-debate-in-international-trade-law/#acceptLicense" rel="noreferrer noopener" target="_blank"&gt;international trade forums&lt;/a&gt;, including the World Trade Organization. IPEF members have a range of domestic mandates restricting cross-border flows, which vary in scope, format and rigidity (see table below)&lt;strong&gt;. &lt;/strong&gt;Most countries only have a conditional data localisation requirement, meaning data can only be transferred to countries where it is accorded an equivalent level of protection – unless the individual whose data is being transferred consents to said transfer. &lt;a href="https://www.lexology.com/library/detail.aspx?g=ee977f2e-ecfb-45cf-9f63-186a78a49512#:~:text=Australia%20has%20no%20broad%20data,transferred%20or%20processed%20outside%20Australia." rel="noreferrer noopener" target="_blank"&gt;Australia &lt;/a&gt;and the &lt;a href="https://www.acq.osd.mil/dpap/pdi/docs/FAQs_Network_Penetration_Reporting_and_Contracting_for_Cloud_Services_(01-27-2017).pdf" rel="noreferrer noopener" target="_blank"&gt;United States&lt;/a&gt; have sectoral localisation requirements for health and defence data respectively. India presently has multiple sectoral data localisation requirements. In particular, a 2018 Reserve Bank of India (RBI) &lt;a href="https://www.rbi.org.in/Scripts/NotificationUser.aspx?Id=11244&amp;amp;Mode=0" rel="noreferrer noopener" target="_blank"&gt;directive&lt;/a&gt; imposed strict local storage requirements along with a 24-hour window for foreign processing of payments data generated in India. The RBI imposed a &lt;a href="https://theprint.in/economy/what-is-data-localisation-why-mastercard-amex-diners-club-cant-add-more-customers-in-india/703790/" rel="noreferrer noopener" target="_blank"&gt;moratorium&lt;/a&gt; on the issuance of new cards by several US-based card companies until compliance issues with the data localisation directive were resolved. Furthermore, several iterations of India’s recently &lt;a href="https://www.thehindu.com/sci-tech/technology/internet/explained-why-has-the-government-withdrawn-the-personal-data-protection-bill-2019/article65736155.ece" rel="noreferrer noopener" target="_blank"&gt;withdrawn &lt;/a&gt;Personal Data Protection Bill contained localisation requirements for some categories of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indonesia and Vietnam have &lt;a href="https://thediplomat.com/2020/01/the-retreat-of-the-data-localization-brigade-india-indonesia-and-vietnam/" rel="noreferrer noopener" target="_blank"&gt;diluted&lt;/a&gt; the scopes of their data localisation mandates to apply, respectively, only to companies providing public services and to companies not complying with other local laws. These dilutions may have occurred in response to concerted pushback from foreign technology companies operating in these countries. In addition to sectoral restrictions on the transfer of geospatial data, South Korea&lt;a href="https://carnegieendowment.org/2021/08/17/korean-approach-to-data-localization-pub-85165" rel="noreferrer noopener" target="_blank"&gt; retains &lt;/a&gt;several procedural checks on cross-border flows, including formalities regarding providing notice to individual users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moving onto another issue flagged by USTR Tai, while all IPEF members recognise the right to information privacy at an overarching or constitutional level, the legal and policy contours of data protection are at different stages of evolution in different countries. &lt;a href="https://www.dlapiperdataprotection.com/index.html?t=law&amp;amp;c=JP#:~:text=Personal%20Information%20Protection%20Commission,-Kasumigaseki%20Common%20Gate&amp;amp;text=Japan%20does%20not%20have%20a%20central%20registration%20system.&amp;amp;text=There%20is%20no%20specific%20legal,(eg%20Chief%20Privacy%20Officer)." rel="noreferrer noopener" target="_blank"&gt;Japan&lt;/a&gt;, &lt;a href="https://www.dlapiperdataprotection.com/index.html?t=law&amp;amp;c=KR" rel="noreferrer noopener" target="_blank"&gt;South Korea&lt;/a&gt;, &lt;a href="https://www.pdp.gov.my/jpdpv2/assets/2020/01/Introduction-to-Personal-Data-Protection-in-Malaysia.pdf" rel="noreferrer noopener" target="_blank"&gt;Malaysia&lt;/a&gt;, &lt;a href="https://www.linklaters.com/en/insights/data-protected/data-protected---new-zealand#:~:text=There%20is%20no%20data%20portability%20right%20in%20New%20Zealand.&amp;amp;text=While%20there%20is%20no%20%22right,a%20correction%20to%20that%20information." rel="noreferrer noopener" target="_blank"&gt;New Zealand,&lt;/a&gt; &lt;a href="https://www.privacy.gov.ph/data-privacy-act/#:~:text=%E2%80%93%20(a)%20The%20personal%20information,against%20any%20other%20unlawful%20processing." rel="noreferrer noopener" target="_blank"&gt;Philippines&lt;/a&gt;, &lt;a href="https://www.pdpc.gov.sg/Overview-of-PDPA/The-Legislation/Personal-Data-Protection-Act#:~:text=What%20is%20the%20PDPA%3F,Banking%20Act%20and%20Insurance%20Act." rel="noreferrer noopener" target="_blank"&gt;Singapore&lt;/a&gt; and &lt;a href="https://www.trade.gov/market-intelligence/thailand-personal-data-protection-act#:~:text=The%20legislation%20mandates%20that%20data,1%20million%20in%20criminal%20fines." rel="noreferrer noopener" target="_blank"&gt;Thailand &lt;/a&gt;have data protection frameworks in place. Data protection frameworks in India and Brunei are under consultation. Notably, the US does not have a comprehensive federal framework on data privacy, although there are patchworks of data privacy regulations at both the federal and state levels.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regulation and strategic thinking on artificial intelligence (AI) are also at varying levels of development among IPEF members. India has produced a slew of policy papers on Responsible Artificial Intelligence. The most recent &lt;a href="https://www.niti.gov.in/sites/default/files/2021-08/Part2-Responsible-AI-12082021.pdf" rel="noreferrer noopener" target="_blank"&gt;policy paper&lt;/a&gt; published by NITI AAYOG (the Indian government’s think tank) refers to constitutional values and endorses a risk-based approach to AI regulation, much like that adopted by the EU. The US National Security Commission on Artificial Intelligence (NSCAI), chaired by Google CEO Eric Schmidt, expressed concerns about the US ceding AI leadership ground to China. The NSCAI’s final &lt;a href="https://www.nscai.gov/" rel="noreferrer noopener" target="_blank"&gt;report &lt;/a&gt;emphasised the need for US leadership of a ‘coalition of democracies’ as an alternative to China’s autocratic and control-oriented model. Singapore has also made key strides on trusted AI, launching &lt;a href="https://www.pdpc.gov.sg/news-and-events/announcements/2022/05/launch-of-ai-verify---an-ai-governance-testing-framework-and-toolkit" rel="noreferrer noopener" target="_blank"&gt;A.I. verify&lt;/a&gt; – the world’s first AI Governance Testing Framework for companies that wish to demonstrate their use of responsible AI through a minimum verifiable product.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;IPEF and pipe dreams of digital trade&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some members of the IPEF are signatories to other regional trade agreements. With the exception of Fiji, India and the US, all the IPEF countries are members of the Regional Comprehensive Economic Partnership &lt;a href="https://www.dfat.gov.au/trade/agreements/in-force/rcep#:~:text=RCEP%20entered%20into%20force%20on,Australia%20as%20an%20original%20party." rel="noreferrer noopener" target="_blank"&gt;(RCEP)&lt;/a&gt;, which also includes China. Five IPEF member countries are also members of the &lt;a href="https://www.dfat.gov.au/trade/agreements/in-force/cptpp/comprehensive-and-progressive-agreement-for-trans-pacific-partnership" rel="noreferrer noopener" target="_blank"&gt;Comprehensive and Progressive Trans-Pacific Partnership (CPTPP)&lt;/a&gt; that President Trump backed out of in 2017. Several IPEF members also have bilateral or trilateral trading agreements among themselves, an example being the &lt;a href="https://www.mfat.govt.nz/en/trade/free-trade-agreements/free-trade-agreements-in-force/digital-economy-partnership-agreement-depa/" rel="noreferrer noopener" target="_blank"&gt;Digital Economic Partnership Agreement (DEPA)&lt;/a&gt; between Singapore, New Zealand and Chile.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Pie.png" alt="Pie" class="image-inline" title="Pie" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All these ‘mega-regional’ trading agreements contain provisions on data flows, including prohibitions on domestic legal provisions that mandate local computing facilities or restrict cross-border data transfers. Notably, these agreements also incorporate &lt;a href="https://publications.clpr.org.in/the-philosophy-and-law-of-information-regulation-in-india/chapter/indias-engagement-with-global-trade-regimes-on-cross-border-data-flows/" rel="noreferrer noopener" target="_blank"&gt;exceptions&lt;/a&gt; to these rules. The CPTPP includes within its ambit an exception on the grounds of ‘legitimate public policy objectives’ of the member, while the RCEP incorporates an additional exception for ‘essential security interests’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IPEF members are also spearheading &lt;a href="https://www.hinrichfoundation.com/research/article/wto/can-the-wto-build-consensus-on-digital-trade/" rel="noreferrer noopener" target="_blank"&gt;multilateral efforts &lt;/a&gt;related to the digital economy: Australia, Japan and Singapore are working as convenors of the plurilateral Joint Statement Initiative (JSI) at the World Trade Organization (WTO), which counts 86 WTO members as parties. India (along with South Africa) vehemently &lt;a href="https://docs.wto.org/dol2fe/Pages/SS/directdoc.aspx?filename=q:/WT/GC/W819.pdf&amp;amp;Open=True" rel="noreferrer noopener" target="_blank"&gt;opposes&lt;/a&gt; this plurilateral push on the grounds that the WTO is a multilateral forum functioning on consensus and a plurilateral trade agreement should not be negotiated within the aegis of the WTO. They fear, rightly, that such gambits close out the domestic policy space, especially for evolving digital economy regimes where keen debate and contestation exist among domestic stakeholders. While wary of the implications of the JSI, other IPEF members, such as Indonesia, have cautiously joined the initiative to ensure that they have a voice at the table.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is unlikely that the IPEF will lead to a digital trade arrangement in the short run. Policymaking on issues as complex as the digital economy that must respond to specific social, economic and (geo)political realities cannot be steamrolled through external trade agreements. For instance, after the Los Angeles Ministerial India &lt;a href="https://www.business-standard.com/article/economy-policy/india-opts-out-of-joining-ipef-trade-pillar-to-wait-for-final-contours-122091000344_1.html" rel="noreferrer noopener" target="_blank"&gt;opted out&lt;/a&gt; of the IPEF trade pillar citing both India’s evolving domestic legislative framework on data and privacy as well as a broader lack of consensus among IPEF members on several issues, including digital trade. Commerce Minister Piyush Goyal explained that India would wait for the “&lt;a href="https://pib.gov.in/PressReleasePage.aspx?PRID=1858243" rel="noreferrer noopener" target="_blank"&gt;final contours&lt;/a&gt;” of the digital trade track to emerge before making any commitments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides, brokering a trade agreement through the IPEF runs a risk of redundancy. Already, there exists a ‘&lt;a href="https://www.rieti.go.jp/en/columns/a01_0193.html" rel="noreferrer noopener" target="_blank"&gt;spaghetti bowl’&lt;/a&gt; of regional trading agreements that IPEF members can choose from, in addition to forming bilateral trade ties with each other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is why Washington has been clear about calling the IPEF an ‘&lt;a href="https://theprint.in/diplomacy/india-set-to-join-us-led-indo-pacific-economic-arrangement-next-week-with-aim-to-counter-china/963795/" rel="noreferrer noopener" target="_blank"&gt;economic arrangement&lt;/a&gt;’ and not a trade agreement. Membership does not imply any legal obligations. Rather than duplicating ongoing efforts or setting unrealistic targets, the IPEF is an opportunity for all players to shape conversations, share best practices and reach compromises, which could feed back into ongoing efforts to negotiate trade deals. For example, several members of RCEP have domestic data localisation mandates that do not violate trade deals because the agreement carves out exceptions that legitimise domestic policy decisions. Exchanges on how these exceptions work in future trade agreements could be a part of the IPEF arrangement and nudge states towards framing digital trade negotiations through other channels, including at the WTO. Furthermore, states like Singapore that have launched AI self-governance mechanisms could share best practices on how these mechanisms were developed as well as evaluations of how they have helped policy goals be met. And these exchanges shouldn’t be limited to existing IPEF members. If the forum works well, countries that share strategic interests in the region with IPEF members, including, most notably, the European Union, may also want to get involved and further develop partnerships in the region.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Countering China&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Talking shop on digital trade should certainly not be the only objective of the IPEF. The US has made it clear that they want the message emanating from the IPEF ‘&lt;a href="https://www.business-standard.com/article/international/biden-to-visit-japan-for-quad-summit-to-have-bilateral-meetings-with-modi-122051900128_1.html" rel="noreferrer noopener" target="_blank"&gt;to be heard in Beijing&lt;/a&gt;’. Indeed, the IPEF offers an opportunity for the reassertion of US economic interests in a region where President Trump’s withdrawal from the CPTPP has left a vacuum for China to fill. Accordingly, it is no surprise that the IPEF has representation from several regions of the Indo-Pacific: South Asia, Southeast Asia and the Pacific.&lt;/p&gt;
&lt;p&gt;This should be an urgent policy priority for all IPEF members. Since its initial announcement in 2015, the &lt;a href="https://www.cfr.org/china-digital-silk-road/" rel="noreferrer noopener" target="_blank"&gt;Digital Silk Road (DSR)&lt;/a&gt;, the digital arm of China’s Belt and Road Initiative, has spearheaded &lt;a href="https://www.iiss.org/blogs/research-paper/2021/02/china-digital-silk-road-implications-for-defence-industry" rel="noreferrer noopener" target="_blank"&gt;massive investments&lt;/a&gt; by the Chinese private sector (allegedly under close control of the Chinese state) in e-commerce, fintech, smart cities, data centres, fibre optic cables and telecom networks. This expansion has also happened in the Indo-Pacific, unhampered by China’s aggressive geopolitical posturing in the region through maritime land grabs in the South China Sea. With the exception of &lt;a href="https://www.scmp.com/news/asia/southeast-asia/article/3024479/vietnam-shuns-huawei-it-seeks-build-aseans-first-5g" rel="noreferrer noopener" target="_blank"&gt;Vietnam&lt;/a&gt;, which remains wary of China’s economic expansionism, countries in Southeast Asia welcome Chinese investments, extolling their developmental benefits. Several IPEF members – &lt;a href="https://www.iseas.edu.sg/wp-content/uploads/2022/05/ISEAS_Perspective_2022_57.pdf" rel="noreferrer noopener" target="_blank"&gt;including&lt;/a&gt; Indonesia, Malaysia and Singapore – have associations with Chinese private sector companies, predominantly Huawei and ZTE. A &lt;a href="https://carnegieendowment.org/2022/07/11/localization-and-china-s-tech-success-in-indonesia-pub-87477" rel="noreferrer noopener" target="_blank"&gt;study&lt;/a&gt; evaluating Indonesia’s response to such investments indicates that while they are aware of the risks posed by Chinese infrastructure, their calculus remains unaltered: development and capacity building remain their primary focuses. Furthermore, on the specific question of surveillance, given evidence of other countries such as the US and Australia also using digital infrastructure for surveillance, the threat from China is not perceived as a unique risk.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Setting expectations and approaches&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Still, the risks of excessive dependence on one country for the development of digital infrastructure are well known. While the IPEF cannot realistically expect to displace the DSR, it can be utilised to provide countries with alternatives. This can only be done by issuing carrots rather than sticks. A US narrative extolling ‘digital democracy’ is unlikely to gain traction in a region characterised by a diversity of political systems that is focused on economic and development needs. At the same time, an excessive focus on thorny domestic policy issues – such as data localisation and the pipe dream of yet another mega-regional trade deal – could risk derailing the geo-economic benefits of the IPEF.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead, the IPEF must focus on capacity building, training and private sector investment in infrastructure across the Indo-Pacific. The US must position itself as a geopolitically reliable ally, interested in the overall stability of the digital Indo-Pacific, beyond its own economic or policy preferences. This applies equally to other external actors, like the EU, who may be interested in engaging with or shaping the digital economic landscape in the Indo-Pacific.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Countering Chinese economic influence and complementing security agendas set through other fora – such as the Quadrilateral Security Dialogue – should be the primary objective of the IPEF. It is crucial that unrealistic ambitions seeking convergence on values or domestic policy do not undermine strategic interests and dilute the immense potential of the IPEF in catalysing a more competitive and secure digital Indo-Pacific.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Table: Domestic policy positions on data localisation and data protection&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Table.png/@@images/8e9a5192-5f6c-4666-8d78-e0863111534a.png" alt="Table" class="image-inline" title="Table" /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/directions-cyber-digital-europe-arindrajit-basu-september-16-2022-getting-the-digital-indo-pacific-economic-framework-right'&gt;https://cis-india.org/internet-governance/blog/directions-cyber-digital-europe-arindrajit-basu-september-16-2022-getting-the-digital-indo-pacific-economic-framework-right&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>arindrajit</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    

   <dc:date>2022-10-03T14:56:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/open-up-tim-davies-november-3-2014-getting-strategic-about-openness-and-privacy">
    <title>Getting Strategic about Openness and Privacy</title>
    <link>https://cis-india.org/internet-governance/news/open-up-tim-davies-november-3-2014-getting-strategic-about-openness-and-privacy</link>
    <description>
        &lt;b&gt;This blog post by Tim Davies, Open Data Research Lead at Web Foundation was published in Open Up? on November 3, 2014.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Click to read the original post &lt;a class="external-link" href="http://www.openup2014.org/getting-strategic-openness-privacy/"&gt;here&lt;/a&gt;. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Information is powerful.&lt;/b&gt; And in a world where the  amount of information generated, captured and stored has grown  exponentially in recent decades, getting hold of the information you  need, when you need it, relies upon having access to the data that  describes it. That makes the control of data especially powerful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modern transparency initiatives, promoting the idea of open data,  have been seeking to break the data-monopoly of privileged actors within  the state — unlocking key datasets and making them available for public  scrutiny and reducing the information inequalities that undermine open  public discourse. Opening up government data is *one* way in which  citizens can reclaim some power and reestablish the principle that “they  work for us”. Open government data gives us power to know how the  government is spending money, what companies are getting public sector  contracts and licenses, who owns these companies, what profits they make  and what royalties and taxes they pay. Yet, progress has been slow, and  we have faced substantial challenges in securing reliable and  standardised flows of public data that can be joined-up to give a true  picture of how public resources are being used, and key decisions made.  Although millions of public datasets have been placed online, the most  politically salient are often lacking. The &lt;a href="http://www.opendatabarometer.org" target="_blank"&gt;2013 Open Data Barometer &lt;/a&gt;found fewer than 1 in 10 accountability datasets were truly open.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, advocates of building a more open government need  to grapple with three other trends that are shaping discussions of data,  power and the state:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Firstly, and most important, the revelations brought to our  attention by whistleblower Edward Snowden have confirmed the extent of  the secret state and the profound imbalance of power between citizens  and their state created through mass surveillance. Whilst projects to  disclose even basic data on the state like public spending are  underfunded and ad hoc, billions of dollars are poured into tools and  technologies that violate basic human rights and that threaten trust and  security on the Web. Fundamentally the problem with secret mass  surveillance is that it destroys the checks and balances that are meant  to limit the power of the state over citizens.&lt;/li&gt;
&lt;li&gt;Secondly, and in part due to the discussion spared by Snowden,  public awareness of the data, and consequently power, held by  corporations has grown. The Web has become increasingly centralised, and  large companies now harvest large amounts of data on any individual  technology user. In parallel, in some countries such as the UK,  governments have sought to use open data agendas as cover for increased  proprietary sharing of public data with private firms, seeking to go  around established principles of consent to share publicly held health,  tax or student records with profit-making firms. Such data-sharing is  not inherently wrong if there are public benefits, but building citizen  trust in the state’s stewardship of personal data, and ensuring  safeguards are in place to warrant that trust, is a major challenge.&lt;/li&gt;
&lt;li&gt;Thirdly, concerns have been raised that some of the data  released through open data initiatives may also affect the privacy of  citizens. Some aggregated and anonymised datasets can be combined with  other data to reverse engineer identifiable information. Although early  calls for “raw data now” were clear that they were not calling for open  personal information, in practice the divide between personal and public  can be a narrow one.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;So, do these trends mean we should be more cautious about opening up?  Should the balance swing back towards a focus on protecting privacy?  Ultimately, a simple opposition of privacy and openness is a false  dichotomy. The question is not should we focus on openness, or should we  protect privacy: but is &lt;i&gt;Who should be open? And how?&lt;/i&gt; &lt;i&gt;And whose privacy should be protected, and how?&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, of the Centre for Internet and Society in Bangalore, has offered a key solution in the idea that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Transparency should be proportional to power, privacy inversely so.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is on this basis that organisations working for a fairer future,  with more vibrant public discourse, greater freedom, and better  governments, can campaign for both privacy and openness together. Those  who occupy public office, own companies, or tender for public contracts  must accept that there is a legitimate public interest in information  about their activities in these roles, whilst independent citizens must  be afforded space to form views and live lives without constant state  surveillance. Companies should not be considered to have a right to  privacy: their interests are already protected by other laws and  provisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To deliver effective openness through open data, the Web Foundation is working to &lt;a href="http://www.opendataresearch.org/reports/" target="_blank"&gt;understand how data gets used on the ground in different settings across the world&lt;/a&gt;,  and, with Omidyar support, is working on the creation of inclusive open  data standards for public contracting data. Standards like the &lt;a href="http://standard.open-contracting.org/" target="_blank"&gt;Open Contracting Data Standard&lt;/a&gt; are part of building a new infrastructure of open governance, making it  possible to join-up data from different places, helping tilt the  balance of power towards citizens when it comes to scrutinising  governments and corporations. Through the &lt;a href="http://www.opendatabarometer.org" target="_blank"&gt;Open Data Barometer&lt;/a&gt; we keep track of the availability of key datasets that can be used for accountability, and we’re co-chairing the &lt;a href="http://www.opengovpartnership.org/groups/opendata/" target="_blank"&gt;Open Government Partnership Open Data Working Group&lt;/a&gt;, seeking to set high standards for relevant and usable data disclosures by governments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By focussing on the civic use of data, we can better identify those  datasets that must be in the public domain. And by thinking about  relative power when considering privacy we can address genuine privacy  concerns, whilst not allowing corporations claiming privacy rights, or  public figures trying to hide their financial interests, from  diminishing the power of data to enable accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, the Web Foundation leads the &lt;a href="http://www.google.com/url?q=http://webwewant.org/&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNFavRxYWPtWx7osZ9Psx24eNHkmWw" target="_blank"&gt;Web We Want campaign&lt;/a&gt;,  challenging mass surveillance and seeking to secure a Web where  individuals have the right to privacy, and the tools to secure it. And  increasingly transparency of what the state and companies do with  personal data can help increase the capacity of citizens to respond to  threats to their autonomy, and can increase oversight and safeguards on  state or corporate capacity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ultimately, our ongoing efforts to open up, and to protect individual  freedoms, have to be strategic. And keeping an analysis of power, and  Sunil’s maxim, in mind, provides a good starting point to guide the  strategy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/open-up-tim-davies-november-3-2014-getting-strategic-about-openness-and-privacy'&gt;https://cis-india.org/internet-governance/news/open-up-tim-davies-november-3-2014-getting-strategic-about-openness-and-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-11-09T09:19:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/social-media">
    <title>Getting Connected</title>
    <link>https://cis-india.org/news/social-media</link>
    <description>
        &lt;b&gt;Nishant Shah of the Centre for Internet &amp; Society talks about the growing adoption of social media, and what can constitute a "social media network" &lt;/b&gt;
        
&lt;p&gt;See the video in livemint &lt;a class="external-link" href="http://videos.livemint.com/video/5223036-getting-connected"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/social-media'&gt;https://cis-india.org/news/social-media&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T17:03:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-march-27-2017-priya-nair-and-sanjay-kumar-singh-get-an-aadhaar-card-if-you-dont-have-one">
    <title>Get an Aadhaar card if you don't have one</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-march-27-2017-priya-nair-and-sanjay-kumar-singh-get-an-aadhaar-card-if-you-dont-have-one</link>
    <description>
        &lt;b&gt;The Aadhaar number has been made compulsory for filing tax return. With both the government and private parties insisting on it for various activities despite the Supreme Court's assertion that is not mandatory, you need to get one at the earliest.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Priya Nair and Sanjay Kumar Singh was published in the &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/from-i-t-returns-to-phone-connections-aadhaar-gets-more-teeth-117032600717_1.html"&gt;Business Standard&lt;/a&gt; on March 27, 2017. Udbhav Tiwari was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Until now the need for an Aadhaar card arose if someone wanted to avail of the LPG subsidy, or if senior citizens wanted to enjoy a concession on train tickets. This 12-digit number, which is a proof of identity, is largely used by the government to distribute cash benefits and other subsidies under its welfare schemes. Since submitting the Aadhaar card at the time of opening a bank account, investing in a mutual fund, etc is optional (you can submit another proof of identity), many people have still not bothered to get one. That ambivalent attitude will now have to change.  &lt;br /&gt;&lt;br /&gt;This year onwards all those filing income tax returns will have to furnish their Aadhaar number. There is a field in the income tax return form for Aadhaar number. Don’t forget to fill it this year. If you do not have an Aadhaar number, you will have to submit the enrolment number of your application for Aadhaar. "In case of failure to intimate the Aadhaar number, the PAN allotted to the person shall be deemed invalid and the other provisions of the Income Tax Act shall apply, as if the person has not applied for allotment of PAN," says Amarpal Chadha, tax partner, people advisory services, EY India.&lt;br /&gt;&lt;br /&gt;Experts say that this step has been taken to deal with the problem of duplicate permanent account numbers (PAN) and to control black money. Says Kuldip Kumar, partner and leader-personal tax at PwC India: “Many people have more than one PAN, even though there is a penalty under the Income Tax Act for doing so. The government is linking PAN to Aadhaar to deal with this problem. This step will also help control black money. Whether you invest in stocks, shares, or do any other high-value transaction, over a period of time the tax department will be able to see all this information at the click of a button." Other experts also agree that this step will create an audit trail for various transactions. “Linking of Aadhaar and PAN will throw up any discrepancies in reported transactions and provide a ready database to the revenue authorities for necessary action,” says Vikas Vasal, partner, Grant Thornton India.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Interim problems&lt;/b&gt;&lt;br /&gt;This measure is expected to create a slew of problems for people. Many individuals may still not have an Aadhaar card. They should apply for one post-haste. Everyone needs to check if their Aadhaar and PAN details match. If there are discrepancies between the two, get either your Aadhaar or PAN details updated so that you do not face problems at the time of filing returns. Details on how to update the Aadhaar and PAN are available on the web sites of UID and the IT department respectively (see box).  &lt;br /&gt;&lt;br /&gt;Non-Resident Indians (NRI) and foreign nationals may also need to obtain an Aadhaar number now. Many NRIs have an income (before claiming any deduction) that exceeds the basic exemption limit of Rs 2.5 lakh, and hence file a tax return in India. Foreign nationals who have spent time in India and earned an income also need to file a tax return. Indian residents who have been sent by their companies to work abroad will also have to scramble for the card. "March is about to end and tax returns will have to be filed by the end of July. Persons who have to file a tax return but are abroad will face a challenge getting the Aadhaar card made in time since you have to be physically present in India for this purpose,’’ says Kumar. The government may possibly grant some leeway to such people.  &lt;br /&gt;&lt;br /&gt;Even though the Supreme Court has said that Aadhaar is not mandatory, there are several instances where the authorities are insisting on it. Those applying for domicile proof and those who want to get their property registered are being asked to provide this number. Some telecom providers also insist on it before giving a connection. Schools are asking for it from students. You need it to appear for competitive exams like IIT JEE. Online providers of financial products insist on Aadhaar since it makes KYC easier. With the government moving strongly towards making Aadhaar compulsory, one can't escape complying with this regulation.  &lt;br /&gt;&lt;br /&gt;&lt;b&gt;Risks of an Aadhaar-centric system&lt;/b&gt;&lt;br /&gt;There are several risks associated with Aadhaar, whose basic purpose is authentication and authorisation. The first problem arises from the fact that it is easily accessible to miscreants. Aadhaar numbers of thousands of people have been uploaded on the Internet. "Since the Aadhaar number has to be given at so many places, it can be misused to pull information about people from the centralised database. In the case of credit and debit cards, we are told not to shares these numbers publicly as the number is the first thing required for carrying out a transaction. That is not the case with Aadhaar. UID's position is that you should treat your Aadhaar number carefully. But the fact is that the Aadhaar number is not used carefully either by consumers or businesses. It is a fairly public number. With Aadhaar too much power is being vested in a number that is quite public,’’ says Udbhav Tiwari, policy officer, Centre for Internet and Society, Bengaluru.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, Aadhaar has a centralised database, and all centralised databases are vulnerable to hacking. Third, biometrics are not a very secure form of authentication. "Fingerprints are easy to forge. The UID says that the device (used to check the fingerprint) should not remember the biometrics but should only transfer it to UID which will verify the information. But miscreants could use a device that captures your biometrics," says Tiwari.  &lt;br /&gt;&lt;br /&gt;Other documents used for identification like PAN and passport are not easy to duplicate because of their security features. PAN, for instance, has a hologram. The power of the passport lies not in the passport number but in the document. Without the passport one cannot travel internationally. But in case of Aadhaar one can go on the Internet and print a new Aadhaar card. “If somebody has managed to capture my fingerprint and has my Aadhaar number, he can use it wherever Aadhaar is required,’’ says Tiwari.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-march-27-2017-priya-nair-and-sanjay-kumar-singh-get-an-aadhaar-card-if-you-dont-have-one'&gt;https://cis-india.org/internet-governance/news/business-standard-march-27-2017-priya-nair-and-sanjay-kumar-singh-get-an-aadhaar-card-if-you-dont-have-one&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-04T15:39:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindu-businessline-may-10-2016-varun-aggarwal-geospatial-info-regulation-bill-will-hurt-start-ups-small-firms">
    <title>Geospatial Info Regulation Bill will hurt start-ups, small firms </title>
    <link>https://cis-india.org/internet-governance/news/hindu-businessline-may-10-2016-varun-aggarwal-geospatial-info-regulation-bill-will-hurt-start-ups-small-firms</link>
    <description>
        &lt;b&gt;The Geospatial Information Regulation Bill, 2016, whose draft outlaws the acquisition of geospatial information without the government’s permission, is expected to impact smaller companies rather more than the large ones. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Varun Aggarwal was published in &lt;a class="external-link" href="http://www.thehindubusinessline.com/info-tech/geospatial-info-regulation-bill-will-hurt-startups-small-firms/article8580732.ece"&gt;Hindu BusinessLine&lt;/a&gt; on May 10, 2016. Sumandro Chattapadhyay was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Experts said that the law is being created to keep large corporates in check, but if implemented in its current form, its biggest impact would be on start-ups and smaller firms that use or create geospatial data.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“While companies such as Uber and Google can survive by getting all their maps vetted by the government, smaller companies will be impacted. This will act as a big entry barrier in favour of the dominant players such as Google and Microsoft,” said Sumandro Chattapadhyay, research director at Centre for Internet and Society.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Smaller companies have no means to know what kind of geospatial information they can store and what they cannot. Moreover, if a start-up requires three months to get approvals for your data before you can use it, it’ll be as good as dead,” Chattapadhyay said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Google declined to comment on the draft Bill.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;strong&gt;U-turn by Centre&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; Sanjay Kumar, president of the Association of Geospatial Industries, recalled that Prime Minister Narendra Modi had in a speech in September last highlighted the importance of geospatial data in everyday life of the common man. “But now, the government seems to be taking a U-turn,” he said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Association has hundreds of members, including Google, offering various geospatial services.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“The PM’s campaigns on skill development, digital India and enhancement of the transport sector are heavily dependent on geospatial data. There are several private sector companies that provide services for these projects. If this Bill is passed as drafted, all this development process will be stalled,” said Kumar.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindu-businessline-may-10-2016-varun-aggarwal-geospatial-info-regulation-bill-will-hurt-start-ups-small-firms'&gt;https://cis-india.org/internet-governance/news/hindu-businessline-may-10-2016-varun-aggarwal-geospatial-info-regulation-bill-will-hurt-start-ups-small-firms&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-05-13T15:46:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/open-magazine-august-7-2015-ullekh-np-genetic-profiling">
    <title>Genetic Profiling: Is it all in the DNA? </title>
    <link>https://cis-india.org/internet-governance/news/open-magazine-august-7-2015-ullekh-np-genetic-profiling</link>
    <description>
        &lt;b&gt;A Bill seeks to make genetic profiling mandatory for the fight against crime—and generates a debate about the clash of ethics, freedom, science and data.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Ullekh NP was &lt;a class="external-link" href="http://www.openthemagazine.com/article/nation/genetic-profiling-is-it-all-in-the-dna"&gt;published in Open Magazine&lt;/a&gt; on August 7, 2015. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;When British geneticist Sir Alec Jeffreys first developed the DNA  profiling test 31 years ago in his laboratory at Leicester University,  he didn’t help the police prove a man guilty. His test—back then it took  weeks to complete DNA profiling procedures as opposed to a few hours  now—proved that a rape suspect in police custody was innocent. Details  from the whole exercise also subsequently helped the local police nab  the real criminal, who had killed his teenaged rape victim. Later, the  police found that he was the one who had committed a similar crime three  years earlier in a village nearby. Britain was destined to make great  gains in solving crimes thanks to DNA identification, while the rest of  the developed world, including the US, caught up later, but only after  lagging initially thanks to the relentless—and sometimes  ill-founded—opposition from civil liberties activists. In India, the  Human DNA Profiling Bill, 2015, a proposed law that envisages collecting  DNA finger prints—which are unique to an individual—especially of  criminals, has been in the making for the past 12 years. The draft bill,  which will shortly be placed before the Union Cabinet for its nod, has  been prepared by the Department of Biotechnology and the Centre for DNA  Fingerprinting &amp;amp; Diagnostics (CDFD), a Hyderabad-based Central  Government-run agency, after examining and reviewing submissions by a  panel of experts, holding consultations with various stakeholders and  getting responses from the public. Notwithstanding the claims of  safeguards against any misuse of the intended DNA data base, activists,  lawyers, internet freedom fighters, civil liberty activists and  columnists have been up in arms against the Government, arguing that the  DNA profiling bill is ill- conceived and naïve—to the extent that it  would destroy an individual’s right to privacy as it lacks provisions to  check data tampering.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The international experience has proved otherwise. Ever since Sir  Jeffreys extracted DNA from human muscle tissue, identified and  processed genetic markers (which are unique to individuals except in the  case of identical twins) from what was until then considered ‘seemingly  purposeless segments of the human DNA’ in the words of writers Peter  Reinharz and Howard Safir, more than 500,000 ‘otherwise unsolvable’  cases have been solved in the developed world thanks to the DNA  identification, note CDFD scientists. DNA is the hereditary material in  the human body. It is found in blood, saliva, urine, strands of hair,  semen, tears, skin, etcetera.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dr Madhusudan Reddy Nandineni, staff scientist and group leader,  laboratory of DNA fingerprinting services and laboratory of genomics and  profiling applications, CDFD, is worried that opposition to the Bill is  gaining momentum in India due to a raft of reasons. Of course, the  West, too, has witnessed sharp protests against DNA profiling laws. One  of the key reasons anti-profiling activists have an edge, says a senior  Home Ministry official who asks not to be named, is that there is a  “general public anxiety” over “anything to do with disclosing personal  details”. He agrees that the tests are going to be intrusive, because  muscle tissue may have to be collected from private parts. The procedure  of DNA sample collection—as explained in the draft Bill submitted in  January by a committee headed by TS Rao, senior adviser to the  department of biotechnology—talks about obtaining intimate body samples  of living persons (on page 6-7 of the 48- page document) from ‘the  genital or anal area, the buttocks and also breasts in the case of a  female’. According to the draft Bill, it also involves external  examination of private parts, taking samples from pubic hair or by swabs  or washing or by vacuum suction, by scraping or by lifting by tape and  taking of a photograph or video recording of, or an impression or cast  of a wound in those areas. “But then, it is par for the course,” says  the Home Ministry official by way of justification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;American military historian and author Edward Luttwak agrees that DNA  profiling is a significant intrusion into the “very body of a citizen”.  That is the price one has to pay in the choice between liberty and  equality before investigation, he posits. Luttwak is glad that in the  US, as well as in other countries that have such profiling laws, DNA  identification has yielded results. “It protects suspicious/ low status  but innocent people from false accusations and helps to catch  clever/high-status law-breakers,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;+++&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For his part, Dr Nandineni says that every aspect of the Human  DNA Profiling Bill for India is based on similar legislation that has  already been implemented in the US, Canada, UK, Australia and  Continental Europe for more than 20 years. He also contends that the  benefits that have accrued there are enormous, which India has missed  out on for all these years. “In all these countries, the concerns of the  general public on privacy matters have been allayed in their  legislation,” he adds. He points out that the retention of DNA profiles  in a ‘DNA Data Bank’ is meant to apprehend repeat offenders and thus  serve a larger societal good. As regards privacy concerns, Dr Nandineni  says that consultations on the preparations of the Bill lasted for 2-3  years and took into account the views of an expert committee whose  members included representatives of NGOs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dr Nandineni is of the view that the opponents of the Bill have  managed to get an upper hand in a national debate thanks to their  media-savvy backgrounds. Agrees the Home Ministry official: “Perhaps the  drafters of the Bill have not been communicative enough in getting  their points across to the public and the media. Which might explain why  the Bill has come under tremendous attack in the media. Even otherwise,  global trends also show that civil liberty rights activists have had  great initial advantage in their campaign against DNA profiling.” After  all, the potential for misuse of DNA samples is not restricted to  biological material collected under the provisions of the DNA Bill  alone, Nandineni offers. “Any and every blood sample collected by a  clinical laboratory has the same potential for misuse,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Dr J Gowrishankar, director, CDFD, has been vocal about the  positives of the Bill, its opponents have been louder. Many of those  who oppose the Bill say the question is not one of being loud or feeble,  but about being naïve or not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The likes of Sunil Abraham, executive director of Bangalore-based  internet research organisation Centre for Internet and Society (CIS),  have no argument against DNA profiling being the gold standard for all  forensic investigations. “There is nothing wrong with using DNA evidence  for forensic purposes,” says Abraham, “However, the draft Bill is  filled with techno-utopianism; it assumes that the people and machines  that leverage DNA technologies are infallible.” He goes on, “This is not  true. It is easier to tamper with DNA evidence than it is to tamper  with a video recording. Therefore, all we are asking for are process  checks that prevent compromised persons and machines from using DNA  evidence to convict or exonerate the wrong person.” His contention is  that if the DNA sample is sent to two different labs and both labs come  back with exactly the same result, then the courts can be convinced of  the veracity of the result. “Also the Bill says that DNA labs will give  courts ‘yes’ or ‘no’ answers to questions related to DNA matching. But  ideally, the lab must give the exact match percentage along with all the  detailed information that emerges from the match process so that the  court can fully appreciate the significance of the DNA evidence,” he  suggests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham and legal scholar Usha Ramanathan—both members of the  expert panel who filed notes of dissent and disagreed with various  aspects of the Bill—have a problem with the claim that the proposed DNA  data bank will cover only criminals and not the general public. Points  out Ramanathan: “The Bill does not restrict the data base to criminals  alone, not by a long shot. The provision in the proposed Bill reads:  ‘(Clause 31(4)) Every DNA Data Bank shall maintain following indices for  various categories of data, namely: (a) a crime scene index; (b) a  suspects’ index; (c) an offenders’ index; (d) a missing persons’ index;  (e) unknown deceased persons’ index; (f) a volunteers’ index; and (g)  such other DNA indices as may be specified by regulations.’ That is an  elaborate set of indices. There is certainly a lot of the ‘general  public’ in it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Supporters of the DNA Profiling Bill have maintained that a DNA  data bank is not for the public but only for a limited category of  individuals. The proposed law also provides for storing profiles with  the consent of relatives of missing children and grownups so that  relationship identities can be established.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ramanathan is also worried that apart from purposes of criminal  justice, DNA profiling may be extended to parental disputes (maternity  or paternity), issues related to pedigree, those related to assisted  reproductive technologies (surrogacy, in vitro fertilisation or IVF,  intrauterine implantation or IUI, and so on), to transplantation of  human organs (donor and recipient) under the Transplantation of Human  Organs Act, 1994, and also related to immigration or emigration. She had  objected to the requirement of revealing a person’s caste in the  application form for offering blood samples. “This Bill is certainly not  a convict data base. The ambitions are much much vaster, and little to  do with crime control,” she alleges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham agrees that some safeguards have been built in the  proposed law to prevent any misuse of DNA data under pressure from  expert panel members such as him. However, he says, cyber security and  privacy-related issues are not addressed in a comprehensive manner. “The  Bill basically hopes that the Privacy Bill will address all of this  when it becomes law. But unfortunately, a bill could take 7-10 years  before it becomes law,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dr Gowrishankar of CDFD and others have conceded that it was the  decision of the expert panel to include an enabling provision for the  privacy issues of DNA profiling to comply with the proposed Privacy  Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham says that various measures to prevent ‘privacy harms’ to  volunteers are missing in the latest draft of the Bill. “Given that  biometric technology works on probabilistic matching, the larger the  size of the database, the larger the incidence of mistaken  identification. Therefore it is important that the database remain as  small as necessary,” he asserts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;+++&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The estimated cost of the Bill is Rs 20 crore—to create the  infrastructure for the DNA Profiling Board and the data bank, which  includes buildings, furniture, computer servers and so on. Among other  things, the DNA Profiling Board is tasked with the responsibility of  laying down and implementing standards for laboratories and proper  protocols for ‘Data Bank’ operations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CDFD scientists and government officials are keen to highlight  the ‘under- hyped’ benefits of DNA profiling –similar to the Innocence  Project in the US, which was aimed at securing the release of people who  were erroneously convicted on the basis of other lines of evidence.  Abraham has no patience for such comparisons. “DNA profiling for  forensic purposes is very advanced and sophisticated, but technologies  do not exist in a vacuum,” he says, “These advanced technologies have to  work within traditional institutions with vulnerabilities and flaws. We  need to, therefore, have non-technological procedural fixes that ensure  that these technologies are not compromised by money and power. The  choice is between the right to privacy and the rights and requirements  of the criminal justice process.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ramanathan agrees with that view. “In the Indian context, the  state of investigation is so poor that we have been looking for ways of  circumventing our problems, not addressing them. That is how  narco-analysis began to be used, till the court struck it down. DNA may  be more reliable than most other scientific tools available to us today,  but it is not all about the science. We also have to worry about  contamination, what happens in the chain of custody, its potential for  being planted or otherwise abused, and the errors even in the  laboratory. You may remember the avowed mix-up of results in the Aarushi  [Talwar murder] case, something the lab said they noticed over two  years after they had given it to the investigators. The danger of  treating DNA as conclusive and not needing corroboration is exacerbated  in this kind of a vulnerable system. Which is why bringing this into a  DNA data base law and not putting any checks on criminal procedure is  less than wise,” she elaborates. She is least impressed with the ‘idea’  of ‘pedigree’ and of ‘population genetics’ in the Bill. “Institutions  like the CDFD have been collecting DNA from suspects and asking for the  caste of the person on the form. How does this seem innocent and  safeguarded?” she asks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, columnist and author Salil Tripathi says that it is  sheer hubris to think that technology will provide all the answers to  crime-fighting. “Tech- nology is enormously useful and powerful, but it  is value-neutral; it can be used for good or bad ends… There have to be  sufficient safeguards, overseen not only by technologists, law  enforcement officers and bureaucrats, but also by lawyers and civil  liberties experts, who can point out potential flaws and misuse and  prevent those.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tripathi, too, is piqued that one of the markers sought is of  caste. “Why?” he asks, emphatic that the country’s people should be  concerned about allowing the state so much power over their lives. “And  it may not be only the state; given that the scope of its future  expansion is undefined, what guarantees are there that private actors  won’t have access to the data, and if so, what security protocols would  apply?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dr Gowrishankar and Dr Nandineni are right in saying that without DNA  fingerprinting, many international criminals would still be at liberty,  and the opponents of the Bill do not disagree with the efficacy of the  technique developed by Sir Jeffreys. Instead, they are placing the  spotlight on various objectionable aspects in the proposed law. In a  country which first needs—according to former RAW chief Vikram Sood—to  ensure access to Photofit (a technique to create an accurate image of a  person that gels with a witness’ description) for its ground-level  police operatives to combat crime, critics of the Bill seem to have won  the war of words.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/open-magazine-august-7-2015-ullekh-np-genetic-profiling'&gt;https://cis-india.org/internet-governance/news/open-magazine-august-7-2015-ullekh-np-genetic-profiling&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>DNA Profiling</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-09-13T09:47:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/gender-and-privacy-countering-the-patriarchal-gaze">
    <title>Gender and Privacy: Countering the Patriarchal Gaze</title>
    <link>https://cis-india.org/internet-governance/news/gender-and-privacy-countering-the-patriarchal-gaze</link>
    <description>
        &lt;b&gt;Ambika Tandon participated in a workshop on privacy and gender which was organized by Privacy International in United Kingdom on September 13 and 14, 2018. Ambika was part of a panel on reproductive rights and privacy in India. She also recorded a podcast on the same topic, as part of a series on privacy and gender being hosted by Privacy International.&lt;/b&gt;
        &lt;p&gt;Read the Agenda &lt;a class="external-link" href="https://cis-india.org/internet-governance/files/gender-and-privacy-workshop"&gt;here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/gender-and-privacy-countering-the-patriarchal-gaze'&gt;https://cis-india.org/internet-governance/news/gender-and-privacy-countering-the-patriarchal-gaze&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-09-19T01:48:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
