<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1986 to 2000.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-july-20-2018-rajitha-menon-firms-find-wealth-in-your-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/aayush-rathi-and-shweta-mohandas-april-30-2019-fintech-in-india-a-study-of-privacy-and-security-commitments"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/finding-needles-in-haystacks-discussing-the-role-of-automated-filtering-in-the-new-indian-intermediary-liability-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-september-20-2018-find-ways-to-trace-origin-of-messages-govt-to-whatsapp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/privacy_uidfinancialinclusion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/financial-express-april-24-2015-net-neutrality-debate"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/financial-express-may-9-2015-financial-express-hosts-net-neutrality-debate"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/finance-and-privacy.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/filtering-content-on-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/figi-symposium-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-nikhil-varma-september-2-2014-fighting-battles-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/fifth-meeting-of-two-sub-groups-on-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-telegraph-august-26-2016-festival-scan-on-social-media"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-july-20-2018-rajitha-menon-firms-find-wealth-in-your-data">
    <title>Firms find wealth in your data</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-july-20-2018-rajitha-menon-firms-find-wealth-in-your-data</link>
    <description>
        &lt;b&gt;Data collection and theft is quite prevalent and there is little an individual can do right now.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Data protection and  privacy are the new buzzwords in the corridors of power in India. While a  Ministry of Electronics and Technology committee led by retired Supreme  Court Justice B N Srikrishna is working on a draft Data Protection  Bill, the Telecom Regulatory Authority of  India (TRAI) has come out with its own recommendations regarding  privacy, security, and ownership of data in the telecom sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How is your data  collected? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Every minute you spend online leads  to your data being generated,  collected and collated somewhere. “There  is data that we volunteer. If I  create an account for myself on any  website I will provide my name,  age, banking and so on,” says Amber Sinha, senior programme manager, Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Then there is data which gets collected by telecom companies and companies which provide OTT (Over-The-Top) services, like Google Chrome. Much of this data is collected automatically — my browsing history, what links were open, what ads did I click on in Facebook etc. Most websites use trackers and cookies that continue working in the background. Even when you have closed the link and move on to another website, they still continue to collect data about you,” he adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is the method behind this?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In order to provide a service, there is some data that they need to collect. For example, a cab aggregator has to get my location in order to connect me to nearest cabs. Yet most companies collect data beyond what might be needed. Suppose you are availing an online service which involves a payment aspect. For authentication, an OTP is sent in the form of a text message. The online services will seek permission to read our messages so that they can automatically pull the OTP, saving us the trouble of having to key it in manually. But the system is designed in such a way that the permission they seek is for my entire message box,” explains Amber.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="https://www.deccanherald.com/metrolife/metrolife-your-bond-bengaluru/firms-find-wealth-your-data-682471.html"&gt;Read the complete article by Rajitha Menon in Deccan Herald&lt;/a&gt; published on July 20, 2018. Amber Sinha has been quoted.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-july-20-2018-rajitha-menon-firms-find-wealth-in-your-data'&gt;https://cis-india.org/internet-governance/news/deccan-herald-july-20-2018-rajitha-menon-firms-find-wealth-in-your-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-07-25T16:06:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/aayush-rathi-and-shweta-mohandas-april-30-2019-fintech-in-india-a-study-of-privacy-and-security-commitments">
    <title>FinTech in India: A Study of Privacy and Security Commitments</title>
    <link>https://cis-india.org/internet-governance/blog/aayush-rathi-and-shweta-mohandas-april-30-2019-fintech-in-india-a-study-of-privacy-and-security-commitments</link>
    <description>
        &lt;b&gt;The unprecedented growth of the fintech space in India has concomitantly come with regulatory challenges around inter alia privacy and security concerns. This report studies the privacy policies of 48 fintech companies operating in India to better understand some of these concerns. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Access the full report: &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/Hewlett%20A%20study%20of%20FinTech%20companies%20and%20their%20privacy%20policies.pdf"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;p&gt;The report by Aayush Rathi and Shweta Mohandas was edited by Elonnai Hickok. Privacy policy testing was done by Anupriya Nair and visualisations were done by Saumyaa Naidu. The project is supported by the William and Flora Hewlett Foundation.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;In India, the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (subsequently referred to as SPD/I Rules) framed under the Information Technology Act, 2000 make privacy policies a ubiquitous feature of websites and mobile applications of firms operating in India. Privacy policies are drafted in order to allow consumers to make an informed choice about the privacy commitments being made vis-à-vis their information, and is often the sole document that lays down a companies’ privacy and security practices.In India, the Information Technology (Reasonable Security Practices andProcedures and Sensitive Personal Data or Information) Rules, 2011 (subsequently referred to as SPD/I Rules) framed under the Information Technology Act, 2000 make privacy policies a ubiquitous feature of websites and mobile applications of firms operating in India. Privacy policies are drafted in order to allow consumers to make an informed choice about the privacy commitments being made vis-à-vis their information, and is often the sole document that lays down a companies’ privacy and security practices.&lt;/p&gt;
&lt;p&gt;The objective of this study is to understand privacy commitments undertaken by fintech companies operating in India as documented in their public facing privacy policies. This exercise will be useful to understand what standards of privacy and security protection fintech companies are committing to via their organisational privacy policies. The research will do so by aiming to understand the alignment of the privacy policies with the requirements mandated under the SPD/I Rules. Contingent on the learnings from this exercise, trends observed in fintech companies’ privacy and security commitments will be culled out.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/aayush-rathi-and-shweta-mohandas-april-30-2019-fintech-in-india-a-study-of-privacy-and-security-commitments'&gt;https://cis-india.org/internet-governance/blog/aayush-rathi-and-shweta-mohandas-april-30-2019-fintech-in-india-a-study-of-privacy-and-security-commitments&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi and Shweta Mohandas</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-05-02T11:20:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata">
    <title>FinFisher in India and the Myth of Harmless Metadata</title>
    <link>https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata</link>
    <description>
        &lt;b&gt;In this article, Maria Xynou argues that metadata is anything but harmless, especially since FinFisher — one of the world's most controversial types of spyware — uses metadata to target individuals. &lt;/b&gt;
        &lt;p align="JUSTIFY"&gt;In light of PRISM, the Central Monitoring System (CMS) and other such surveillance projects in India and around the world, the question of whether the collection of metadata is “harmless” has arisen.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; In order to examine this question, FinFisher&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; — surveillance spyware — has been chosen as a case study to briefly examine to what extent the collection and surveillance of metadata can potentially violate the right to privacy and other human rights. FinFisher has been selected as a case study not only because its servers have been recently found in India&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; but also because its “remote monitoring solutions” appear to be very pervasive even on the mere grounds of metadata.&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;FinFisher in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;FinFisher is spyware which has the ability to take control of target computers and capture even encrypted data and communications. The software is designed to evade detection by anti-virus software and has versions which work on mobile phones of all major brands.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; In many cases, the surveillance suite is installed after the target accepts installation of a fake update to commonly used software.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; Citizen Lab researchers have found three samples of FinSpy that masquerades as Firefox.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;FinFisher is a line of remote intrusion and surveillance software developed by Munich-based Gamma International. FinFisher products are sold exclusively to law enforcement and intelligence agencies by the UK-based Gamma Group.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; A few months ago, it was reported that command and control servers for FinSpy backdoors, part of Gamma International´s FinFisher “remote monitoring solutions”, were found in a total of 25 countries, including India.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The following map, published by the Citizen Lab, shows the 25 countries in which FinFisher servers have been found.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Map.png" alt="Map" class="image-inline" title="Map" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;The above map shows the results of scanning for characteristics of FinFisher command and control servers&lt;/i&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="JUSTIFY"&gt;FinFisher spyware was not found in the countries coloured blue, while the colour green is used for countries not responding. The countries using FinFisher range from shades of orange to shades of red, with the lightest shade of orange ranging to the darkest shade of red on a scale of 1-6,  and with 1 representing the least active servers and 6 representing the most active servers in regards to the use of FinFisher. On a scale of 1-6, India is marked a 3 in terms of actively using FinFisher.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Research published by the Citizen Lab reveals that FinSpy servers were recently found in India, which indicates that Indian law enforcement agencies may have bought this spyware from Gamma  Group and might be using it to target individuals in India.&lt;a href="#fn11" name="fr11"&gt;[11] &lt;/a&gt;According to the Citizen Lab, FinSpy servers in India have been detected through the HostGator operator and the first digits of the IP address are: 119.18.xxx.xxx. Releasing complete IP addresses in the past has not proven useful, as the servers are quickly shut down and relocated, which is why only the first two octets of the IP address are revealed.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Citizen Lab's research reveals that FinFisher “remote monitoring solutions” were found in India, which, according to Gamma Group's brochures, include the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinSpy: &lt;/b&gt;hardware or software which monitors targets that regularly change location, use encrypted and anonymous communications channels and reside in foreign countries. FinSpy can remotely monitor computers and encrypted communications, regardless of where in the world the target is based. FinSpy is capable of bypassing 40 regularly tested antivirus systems, of monitoring the calls, chats, file transfers, videos and contact lists on Skype, of conducting live surveillance through a webcam and microphone, of silently extracting files from a hard disk, and of conducting a live remote forensics on target systems. FinSpy is hidden from the public through anonymous proxies.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinSpy Mobile:&lt;/b&gt; hardware or software which remotely monitors mobile phones. FinSpy Mobile enables the interception of mobile communications in areas without a network, and offers access to encrypted communications, as well as to data stored on the devices that is not transmitted. Some key features of FinSpy Mobile include the recording of common communications like voice calls, SMS/MMS and emails, the live surveillance through silent calls, the download of files, the country tracing of targets and the full recording of all BlackBerry Messenger communications. FinSpy Mobile is hidden from the public through anonymous proxies.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly USB: &lt;/b&gt;hardware which is inserted into a computer and which can automatically install the configured software with little or no user-interaction and does not require IT-trained agents when being used in operations. The FinFly USB can be used against multiple systems before being returned to the headquarters and its functionality can be concealed by placing regular files like music, video and office documents on the device. As the hardware is a common, non-suspicious USB device, it can also be used to infect a target system even if it is switched off.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly LAN: &lt;/b&gt;software which can deploy a remote monitoring solution on a target system in a local area network (LAN). Some of the major challenges law enforcement faces are mobile targets, as well as targets who do not open any infected files that have been sent via email to their accounts. FinFly LAN is not only able to deploy a remote monitoring solution on a target´s system in local area networks, but it is also able to infect files that are downloaded by the target, by sending fake software updates for popular software or to infect the target by injecting the payload into visited websites. Some key features of the FinFly LAN include: discovering all computer systems connected to LANs, working in both wired and wireless networks, and remotely installing monitoring solutions through websites visited by the target. FinFly LAN has been used in public hotspots, such as coffee shops, and in the hotels of targets.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly Web:&lt;/b&gt; software which can deploy remote monitoring solutions on a target system through websites. FinFly Web is designed to provide remote and covert infection of a target system by using a wide range of web-based attacks. FinFly Web provides a point-and-click interface, enabling the agent to easily create a custom infection code according to selected modules. It provides fully-customizable web modules, it can be covertly installed into every website and it can install the remote monitoring system even if only the email address is known.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly ISP:&lt;/b&gt; hardware or software which deploys a remote monitoring solution on a target system through an ISP network. FinFly ISP can be installed inside the Internet Service Provider Network, it can handle all common protocols and it can select targets based on their IP address or Radius Logon Name. Furthermore, it can hide remote monitoring solutions in downloads by targets, it can inject remote monitoring solutions as software updates and it can remotely install monitoring solutions through websites visited by the target.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;Although FinFisher is supposed to be used for “lawful interception”, it has gained notoriety for targeting human rights activists.&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt; &lt;span&gt;According to &lt;/span&gt;Morgan Marquis-Boire, a security researcher and technical advisor at the Munk School and a security engineer at Google, FinSpy has been used in Ethiopia to target an opposition group called Ginbot.&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; Researchers have argued that FinFisher has been sold to Bahrain's government to target activists, and such allegations were based on an examination of malicious software which was emailed to Bahraini activists.&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; Privacy International has argued that FinFisher has been deployed in Turkmenistan, possibly to target activists and political dissidents.&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Many questions revolving around the use of FinFisher and its “remote monitoring solutions” remain   vague, as there is currently inadquate proof of whether this spyware is being used to target individuals by law enforcement agencies in the countries where command and control servers have been found, such as India.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt; However, FinFisher's brochures which were circulated in the ISS world trade shows and leaked by WikiLeaks do reveal some confirmed facts: Gamma International claims that its FinFisher products are capable of taking control of target computers, of capturing encrypted data  and of evading mainstream anti-virus software.&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt; Such products are exhibited in the world's largest surveillance trade show and probably sold to law enforcement agencies around the world.&lt;a href="#fn25" name="fr25"&gt;[25] &lt;/a&gt;This alone unveils a concerning fact: spyware which is so sofisticated that it even evades encryption and anti-virus software is currently in the market and law enforcement agencies can potentially use it to target activists and anyone who does not comply with social conventions.&lt;a href="#fn26" name="fr26"&gt;[26] &lt;/a&gt;A few months ago, two Indian women were arrested after having questioned the shutdown of Mumbai for Shiv Sena patriarch Bal Thackeray's funeral.&lt;a href="#fn27" name="fr27"&gt;[27] &lt;/a&gt;Thus, it remains unclear what type of behaviour is targeted by law enforcement agencies and whether spyware, such as FinFisher, would be used in India to track individuals without a legally specified purpose.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, India lacks privacy legislation which could safeguard individuals from potential abuse, while sections 66A and 69 of the Information Technology (Amendment) Act, 2008, empower Indian authorities with extensive surveillance capabilites.&lt;a href="#fn28" name="fr28"&gt;[28] &lt;/a&gt;While it remains unclear if Indian law enforcement agencies are using FinFisher spy products to unlawfully target individuals, it is a fact that FinFisher control and command servers have been found in India and that, if used, they could potentially have severe consequences on individuals' right to privacy and other human rights.&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;The Myth of Harmless Metadata&lt;/h2&gt;
&lt;p align="JUSTIFY"&gt;Over the last months, it has been reported that the Central Monitoring System (CMS) is being implemented in India, through which all telecommunications and Internet communications in the country are being centrally intercepted by Indian authorities. This mass surveillance of communications in India is enabled by the omission of privacy legislation and Indian authorities are currently capturing the metadata of communications.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Last month, Edward Snowden leaked confidential U.S documents on PRISM, the top-secret  National Security Agency (NSA) surveillance programme that collects metadata through telecommunications and Intenet communications. It has been reported that through PRISM, the NSA has tapped into the servers of nine leading Internet companies: Microsoft, Google, Yahoo, Skype, Facebook, YouTube, PalTalk, AOL and Apple.&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; While the extent to which the NSA is actually tapping into these servers remains unclear, it is certain that the NSA has collected metadata on a global level.&lt;a href="#fn32" name="fr32"&gt;[32]&lt;/a&gt; Yet, the question of whether the collection of metadata is “harmful” remains ambiguous.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;According to the National Information Standards Organization (NISO), the term “metadata” is defined as “structured information that describes, explains, locates or otherwise makes it easier to retrieve, use or manage an information resource”. NISO claims that metadata is “data about data” or “information about information”.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt; Furthermore, metadata is considered valuable due to its following functions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Resource discovery&lt;/li&gt;
&lt;li&gt;Organizing electronic resources&lt;/li&gt;
&lt;li&gt;Interoperability&lt;/li&gt;
&lt;li&gt;Digital Identification&lt;/li&gt;
&lt;li&gt;Archiving and preservation&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;Metadata can be used to find resources by relevant criteria, to identify resources, to bring similar resources together, to distinguish dissimilar resources and to give location information. Electronic resources can be organized through the use of various software tools which can automatically extract and reformat information for Web applications. Interoperability is promoted through metadata, as describing a resource with metadata allows it to be understood by both humans and machines, which means that data can automatically be processed more effectively. Digital identification is enabled through metadata, as most metadata schemes include standard numbers for unique identification. Moreover, metadata enables the archival and preservation of large volumes of digital data.&lt;a href="#fn34" name="fr34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Surveillance projects, such as PRISM and India's CMS, collect large volumes of metadata, which include the numbers of both parties on a call, location data, call duration, unique identifiers, the International Mobile Subscriber Identity (IMSI) number, email addresses, IP addresses and browsed webpages.&lt;a href="#fn35" name="fr35"&gt;[35]&lt;/a&gt; However, the fact that such surveillance projects may not have access to content data might potentially create a false sense of security.&lt;a href="#fn36" name="fr36"&gt;[36]&lt;/a&gt; When Microsoft released its report on data requests by law enforcement agencies around the world in March 2013, it revealed that most of the  disclosed data was metadata, while relatively very little content data was allegedly disclosed.&lt;a href="#fn37" name="fr37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;imilarily, Google's transparency report reveals that the company disclosed large volumes of metadata to law enforcement agencies, while restricting its disclosure of content data.&lt;a href="#fn38" name="fr38"&gt;[38]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Such reports may potentially provide a sense of security to the public, as they reassure that the content of  personal emails, for example, has not been shared with the government, but merely email addresses – which might be publicly available online anyway. However, is content data actually more “harmful” than metadata? Is metadata “harmless”? How much data does metadata actually reveal?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Guardian recently published an article which includes an example of how individuals can be tracked through their metadata. In particular, the example explains how an individual is tracked – despite using an anonymous email account – by logging in from various hotels' public Wi-Fi and by leaving trails of metadata that include times and locations. This example illustrates how an individual can be tracked through metadata alone, even when anonymous accounts are being used.&lt;a href="#fn39" name="fr39"&gt;[39]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Wired published an article which states that metadata can potentially be more harmful than content data because “unlike our words, metadata doesn't lie”. In particular, content data shows what an individual says – which may be true or false – whereas metadata includes what an individual does. While the validity of the content within an email may potentially be debateable, it is undeniable that an individual logged into specific websites – if that is what that individuals' IP address shows. Metadata, such as the browsing habits of an individual, may potentially provide a more thorough and accurate profile of an individual than that individuals' email content, which is why metadata can potentially be more harmful than content data.&lt;a href="#fn40" name="fr40"&gt;[40]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, voice content is hard to process and written content in an email or chat communication may not always be valid. Metadata, on the other hand, provides concrete patterns of an individuals' behaviour, interests and interactions. For example, metadata can potentially map out an individuals' political affiliation, interests, economic background, institution, location, habits and the people that individual interacts with. Such data can potentially be more valuable than content data, because while the validity of email content is debateable, metadata usually provides undeniable facts. Not only is metadata more accurate than content data, but it is also ideally suited to automated analysis by a computer. As most metadata includes numeric figures, it can easily be analysed by data mining software, whereas content data is more complicated.&lt;a href="#fn41" name="fr41"&gt;[41]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;FinFisher products, such as FinFly LAN, FinFly Web and FinFly ISP, provide solid proof that the collection of metadata can potentially be “harmful”. In particular, FinFly LAN can be deployed in a target system in a local area network (LAN) by infecting files that are downloaded by the target, by sending fake software updates for popular software or by infecting the payload into visited websites. The fact that FinFly LAN can remotely install monitoring solutions through websites visited by the target indicates that metadata alone can be used to acquire other sensitive data.&lt;a href="#fn42" name="fr42"&gt;[42]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;FinFly Web can deploy remote monitoring solutions on a target system through websites. Additionally, FinFly Web can be covertly installed into every website and it can install the remote monitoring system even if only the email address is known.&lt;a href="#fn43" name="fr43"&gt;[43]&lt;/a&gt; FinFly ISP can select targets based on their IP address or Radius Logon Name. Furthermore, FinFly ISP can remotely install monitoring solutions through websites visited by the target, as well as inject remote monitoring solutions as software updates.&lt;a href="#fn44" name="fr44"&gt;[44]&lt;/a&gt; In other words, FinFisher products, such as FinFly LAN, FinFly Web and FinFly ISP, can target individuals, take control of their computers and their data, and capture even encrypted data and communications with the help of metadata alone.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The example of FinFisher products illustrates that metadata can potentially be as “harmful” as content data, if acquired unlawfully and without individual consent.&lt;a href="#fn45" name="fr45"&gt;[45]&lt;/a&gt; Thus, surveillance schemes, such as PRISM and India's CMS, which capture metadata without individuals' consent can potentially pose a major threat to the right to privacy and other human rights.&lt;a href="#fn46" name="fr46"&gt;[46]&lt;/a&gt; Privacy can be defined as the claim of individuals, groups or institutions to determine when, how and to what extent information about them is communicated to others.&lt;a href="#fn47" name="fr47"&gt;[47]&lt;/a&gt; Furthermore, privacy is at the core of human rights because it protects individuals from abuse by those in power.&lt;a href="#fn48" name="fr48"&gt;[48]&lt;/a&gt; The unlawful collection of metadata exposes individuals to the potential violation of their human rights, as it is not transparent who has access to their data, whether it is being shared with third parties or for how long it is being retained.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;It is not clear if Indian law enforcement agencies are actually using FinFisher products, but the Citizen Lab did find FinFisher command and control servers in the country which indicates that there is a high probability that such spyware is being used.&lt;a href="#fn49" name="fr49"&gt;[49] &lt;/a&gt;This probability is highly concerning not only because the specific spy products have such advanced capabilities that they are even capable of capturing encrypted data, but also because India currently lacks privacy legislation which could safeguard individuals.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Thus, it is recommended that Indian law enforcement agencies are transparent and accountable if they are using spyware which can potentially breach their citizens' human rights and that privacy legislation is enacted into law. Lastly, it is recommended that all surveillance technologies are strictly regulated with regards to the protection of human rights and that Indian authorities adopt the principles on communication surveillance formulated by the Electronic Frontier Foundation and Privacy International.&lt;a href="#fn50" name="fr50"&gt;[50]&lt;/a&gt; The above could provide a decisive first step in ensuring that India is the democracy it claims to be.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Robert Anderson (2013), &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;a class="external-link" href="http://bit.ly/fnkGF3"&gt;http://bit.ly/fnkGF3&lt;/a&gt;&lt;a href="http://www.finfisher.com/FinFisher/en/index.php"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Michael Lewis, &lt;i&gt;“FinFisher Surveillance Spyware Spreads to Smartphones”, &lt;/i&gt;&lt;span&gt;The Star: Business, 30 August 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14sF2IQ"&gt;http://bit.ly/14sF2IQ&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Marcel Rosenbach, &lt;i&gt;“Troublesome Trojans: Firm Sought to Install Spyware Via Faked iTunes Updates”, &lt;/i&gt;&lt;span&gt;Der Spiegel, 22 November 2011, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14sETVV"&gt;http://bit.ly/14sETVV&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Intercept Review, &lt;i&gt;Mozilla to Gamma: stop disguising your FinSpy as Firefox, &lt;/i&gt;&lt;span&gt;02 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/131aakT"&gt;http://bit.ly/131aakT&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Intercept Review, &lt;i&gt;LI Companies Review (3) – Gamma, &lt;/i&gt;&lt;span&gt;05 April 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/Hof9CL"&gt;http://bit.ly/Hof9CL&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/zaknq5"&gt;http://bit.ly/zaknq5&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy Mobile: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19pPObx"&gt;http://bit.ly/19pPObx&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly USB: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cJSu4h"&gt;http://bit.ly/1cJSu4h&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly LAN: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J70Hi"&gt;http://bit.ly/14J70Hi&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly Web: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19fn9m0"&gt;http://bit.ly/19fn9m0&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly ISP: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt;http://bit.ly/13gMblF&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Gerry Smith, &lt;i&gt;“FinSpy Software Used To Surveil Activists Around The World, Reports Says”, &lt;/i&gt;&lt;span&gt;The Huffington Post, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://huff.to/YmmhXI"&gt;http://huff.to/YmmhXI&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Jeremy Kirk, &lt;i&gt;“FinFisher Spyware seen Targeting Victims in Vietnam, Ethiopia”, &lt;/i&gt;&lt;span&gt;Computerworld: IDG News, 14 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J8BwW"&gt;http://bit.ly/14J8BwW&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. Reporters without Borders: For Freedom of Information (2012), &lt;i&gt;The Enemies of the Internet: Special Edition: Surveillance, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/10FoTnq"&gt;http://bit.ly/10FoTnq&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. Privacy International, &lt;i&gt;FinFisher Report, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/QlxYL0"&gt;http://bit.ly/QlxYL0&lt;/a&gt;&lt;span&gt;&lt;a href="https://www.privacyinternational.org/finfisherreport"&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013,&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/zaknq5"&gt;http://bit.ly/zaknq5&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. Adi Robertson, &lt;i&gt;“Paranoia Thrives at the ISS World Cybersurveillance Trade Show”, &lt;/i&gt;&lt;span&gt;The Verge, 28 December 2011, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/tZvFhw"&gt;http://bit.ly/tZvFhw&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. Gerry Smith, &lt;i&gt;“FinSpy Software Used To Surveil Activists Around The World, Reports Says”, &lt;/i&gt;&lt;span&gt;The Huffington Post, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://huff.to/YmmhXI"&gt;http://huff.to/YmmhXI&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. BBC News, &lt;i&gt;“India arrests over Facebook post criticising Mumbai shutdown”, &lt;/i&gt;&lt;span&gt;19 November 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bbc.in/WoSXkA"&gt;http://bbc.in/WoSXkA&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. Indian Ministry of Law, Justice and Company Affairs, &lt;i&gt;The Information Technology (Amendment) Act, 2008, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/19pOO7t"&gt;http://bit.ly/19pOO7t&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. Phil Muncaster, &lt;i&gt;“India introduces Central Monitoring System”, &lt;/i&gt;&lt;span&gt;The Register, 08 May 2013,&lt;a class="external-link" href="http://bit.ly/ZOvxpP"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZOvxpP"&gt;http://bit.ly/ZOvxpP&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. Glenn Greenwald &amp;amp; Ewen MacAskill, &lt;i&gt;“NSA PRISM program taps in to user data of Apple, Google and others”, &lt;/i&gt;&lt;span&gt;The Guardian, 07 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1baaUGj"&gt;http://bit.ly/1baaUGj&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. BBC News, &lt;i&gt;“Google, Facebook and Microsoft seek data request transparency”, &lt;/i&gt;&lt;span&gt;12 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bbc.in/14UZCCm"&gt;http://bbc.in/14UZCCm&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. National Information Standards Organization (2004), &lt;i&gt;Understanding Metadata, &lt;/i&gt;&lt;span&gt;NISO Press, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/LCSbZ"&gt;http://bit.ly/LCSbZ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;]. The Hindu, &lt;i&gt;“In the dark about 'India's PRISM'”, &lt;/i&gt;&lt;span&gt;16 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1bJCXg3"&gt;http://bit.ly/1bJCXg3&lt;/a&gt;&lt;span&gt;&lt;a href="http://www.thehindu.com/sci-tech/technology/in-the-dark-about-indias-prism/article4817903.ece"&gt;&lt;/a&gt; ; Glenn Greenwald, &lt;/span&gt;&lt;i&gt;“NSA collecting phone records of millions of Verizon customers daily”, &lt;/i&gt;&lt;span&gt;The Guardian, 06 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/16L89yo"&gt;http://bit.ly/16L89yo&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr36" name="fn36"&gt;36&lt;/a&gt;]. Robert Anderson, &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, 01 July 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr37" name="fn37"&gt;37&lt;/a&gt;]. Microsoft: Corporate Citizenship, &lt;i&gt;2012 Law Enforcement Requests Report,&lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/Xs2y6D"&gt;http://bit.ly/Xs2y6D&lt;/a&gt;&lt;a href="http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/"&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr38" name="fn38"&gt;38&lt;/a&gt;]. Google, &lt;i&gt;Transparency Report&lt;/i&gt;&lt;span&gt;, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J7hKp"&gt;http://bit.ly/14J7hKp&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr39" name="fn39"&gt;39&lt;/a&gt;]. Guardian US Interactive Team, &lt;i&gt;A Guardian Guide to your Metadata, &lt;/i&gt;&lt;span&gt;The Guardian, 12 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZJLkpy"&gt;http://bit.ly/ZJLkpy&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr40" name="fn40"&gt;40&lt;/a&gt;]. Matt Blaze, &lt;i&gt;“Phew, NSA is Just Collecting Metadata. (You Should Still Worry)”, &lt;/i&gt;&lt;span&gt;Wired, 19 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1bVyTJF"&gt;http://bit.ly/1bVyTJF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr41" name="fn41"&gt;41&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr42" name="fn42"&gt;42&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly LAN: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J70Hi"&gt;http://bit.ly/14J70Hi&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr43" name="fn43"&gt;43&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly Web: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19fn9m0"&gt;http://bit.ly/19fn9m0&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr44" name="fn44"&gt;44&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly ISP: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files,&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt;http://bit.ly/13gMblF&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr45" name="fn45"&gt;45&lt;/a&gt;]. Robert Anderson, &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, 01 July 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr46" name="fn46"&gt;46&lt;/a&gt;]. Shalini Singh, &lt;i&gt;“India's surveillance project may be as lethal as PRISM”, &lt;/i&gt;&lt;span&gt;The Hindu, 21 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/15oa05N"&gt;http://bit.ly/15oa05N&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr47" name="fn47"&gt;47&lt;/a&gt;]. Cyberspace Law and Policy Centre, &lt;i&gt;Privacy, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/14J5u7W"&gt;http://bit.ly/14J5u7W&lt;/a&gt;&lt;span&gt;&lt;a href="http://www.cyberlawcentre.org/genl0231/privacy.htm"&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr48" name="fn48"&gt;48&lt;/a&gt;]. Bruce Schneier, &lt;i&gt;“Privacy and Power”, &lt;/i&gt;&lt;span&gt;Schneier on Security, 11 March 2008, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/i2I6Ez"&gt;http://bit.ly/i2I6Ez&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr49" name="fn49"&gt;49&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr50" name="fn50"&gt;50&lt;/a&gt;]. Elonnai Hickok, &lt;i&gt;“Draft International Principles on Communications Surveillance and Human Rights”, &lt;/i&gt;&lt;span&gt;The Centre for Internet and Society, 16 January 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/XCsk9b"&gt;http://bit.ly/XCsk9b&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata'&gt;https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-13T11:30:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/finding-needles-in-haystacks-discussing-the-role-of-automated-filtering-in-the-new-indian-intermediary-liability-rules">
    <title>Finding Needles in Haystacks - Discussing the Role of Automated Filtering in the New Indian Intermediary Liability Rules </title>
    <link>https://cis-india.org/internet-governance/blog/finding-needles-in-haystacks-discussing-the-role-of-automated-filtering-in-the-new-indian-intermediary-liability-rules</link>
    <description>
        &lt;b&gt;On the 25th of February this year The Government of India notified the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021. The new Rules broaden the scope of which entities can be considered as intermediaries to now include curated-content platforms (Netflix) as well as digital news publications. This blogpost analyzes the rule on automated filtering, in the context of the growing use of automated content moderation. 
&lt;/b&gt;
        
&lt;p class="p1"&gt;&lt;span class="s1"&gt;This article first &lt;a class="external-link" href="https://www.law.kuleuven.be/citip/blog/finding-needles-in-haystacks/"&gt;appeared&lt;/a&gt; on the KU Leuven's Centre for IT and IP (CITIP) blog. Cross-posted with permission.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;----&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Mathew Sag in his 2018 &lt;a href="https://scholarship.law.nd.edu/cgi/viewcontent.cgi?article=4761&amp;amp;context=ndlr"&gt;&lt;span class="s2"&gt;paper&lt;/span&gt;&lt;/a&gt; on internet safe harbours discussed how the internet resulted in a shift from the traditional gatekeepers of knowledge (publishing houses) that used to decide what knowledge could be showcased, to a system where everybody who has access to the internet can showcase their work. A “&lt;em&gt;content creator&lt;/em&gt;” today ranges from legacy media companies to any person who has access to a smartphone and an internet connection. In a similar trajectory, with the increase in websites and mobile apps and the functions that they serve, the scope of what is an internet intermediary has widened all over the world.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;&lt;strong&gt;Who is an Intermediary?&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;In India the definition of “&lt;em&gt;intermediary&lt;/em&gt;” is found under Section 2(w) of the &lt;a href="https://www.meity.gov.in/writereaddata/files/itbill2000.pdf"&gt;&lt;span class="s2"&gt;Information Technology (IT) Act 2000&lt;/span&gt;&lt;/a&gt;, which defines an Intermediary as &lt;em&gt;“with respect to any particular electronic records, means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecoms service providers, network service providers, internet service providers, web-hosting service providers, search engines, online payment sites, online-auction sites, online-marketplaces and cyber cafes”.&lt;/em&gt; The all-encompassing nature of the definition has allowed the dynamic nature of intermediaries to be included under the definition of the Act, and the Guidelines that have been&amp;nbsp; published periodically (&lt;a href="https://www.meity.gov.in/writereaddata/files/GSR314E_10511%25281%2529_0.pdf"&gt;&lt;span class="s2"&gt;2011&lt;/span&gt;&lt;/a&gt;, &lt;a href="https://www.meity.gov.in/writereaddata/files/Draft_Intermediary_Amendment_24122018.pdf"&gt;&lt;span class="s2"&gt;2018&lt;/span&gt;&lt;/a&gt; and &lt;a href="https://www.meity.gov.in/writereaddata/files/Intermediary_Guidelines_and_Digital_Media_Ethics_Code_Rules-2021.pdf"&gt;&lt;span class="s2"&gt;2021&lt;/span&gt;&lt;/a&gt;). With more websites and social media companies, and even more content creators online today, there is a need to look at ways in which intermediaries can remove illegal content or content that goes against their community guidelines.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Along with the definition of an intermediary, the IT Act, under Section 79, provides exemptions which grant safe harbours to internet intermediaries, from liability from third-party content, and further empowers the central government to make Rules that act as guidelines for the intermediaries to follow. The Intermediary Liability Rules hence seek to regulate content and lay down safe harbour provisions for intermediaries and internet service providers. To keep up with the changing nature of the internet and internet intermediaries, India relies on the Intermediary Liability Rules to regulate and provide a conducive environment for intermediaries. In view of this provision India has as of now published three versions of the Intermediary Liability (IL) Rules. The first Rules came out in&lt;a href="https://www.meity.gov.in/writereaddata/files/GSR314E_10511%25281%2529_0.pdf"&gt;&lt;span class="s2"&gt; 2011&lt;/span&gt;&lt;/a&gt;, followed by the introduction of draft amendments to the law in&lt;a href="https://www.meity.gov.in/writereaddata/files/Draft_Intermediary_Amendment_24122018.pdf"&gt;&lt;span class="s2"&gt; 2018&lt;/span&gt;&lt;/a&gt; and finally the latest &lt;a href="https://www.meity.gov.in/writereaddata/files/Intermediary_Guidelines_and_Digital_Media_Ethics_Code_Rules-2021.pdf"&gt;&lt;span class="s2"&gt;2021 &lt;/span&gt;&lt;/a&gt;version, which would supersede the earlier Rules of 2011.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;&lt;strong&gt;The Growing Use of Automated Content Moderation&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;With each version of the Rules there seemed to be changes that ensured that they were abreast with the changing face of the internet and the changing nature of both content and content creator. Hence the 2018 version of the Rules showcase a push towards automated content filtering. The text of Rule 3(9) reads as follows: “&lt;em&gt;The Intermediary shall deploy technology based automated tools or appropriate mechanisms, with appropriate controls, for proactively identifying and removing or disabling public access to unlawful information or content&lt;/em&gt;”.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Under Rule 3(9), intermediaries were required to deploy automated tools or appropriate mechanisms to proactively identify, remove or disable public access to unlawful content. However, neither the 2018 IL Rules, nor the parent Act (the IT Act) specified which content can be deemed unlawful. The 2018 Rules also failed to establish the specific responsibilities of the intermediaries, instead relying on vague terms like “&lt;em&gt;appropriate mechanisms&lt;/em&gt;” and with “&lt;em&gt;appropriate controls&lt;/em&gt;”. Hence it can be seen that though the Rules mandated the use of automated tools, neither them nor the IT Act provided clear guidelines on what could be removed.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;The lack of clear guidelines and list of content that can be removed had&amp;nbsp; left the decision up to the intermediaries to decide which content, if not actively removed, could cost them their immunity. It has been previously documented that the lack of clear guidelines in the 2011 version of the &lt;a href="https://cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet"&gt;&lt;span class="s2"&gt;Rules&lt;/span&gt;&lt;/a&gt;, led to intermediaries over complying with take down notices, often taking down content that did not warrant it. The existing tendency to over-comply, combined&amp;nbsp; with automated filtering could have resulted in a number of &lt;a href="https://cis-india.org/internet-governance/how-india-censors-the-web-websci#:~:text=One%2520of%2520the%2520primary%2520ways,certain%2520websites%2520for%2520its%2520users."&gt;&lt;span class="s2"&gt;unwarranted take downs&lt;/span&gt;&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;While the 2018 Rules mandated the deployment of automated tools, the year 2020, (possibly due to the pandemic induced work from home safety protocols and global lockdowns) saw major social media companies announcing the move towards a fully automated system of content&lt;a href="https://www.medianama.com/2020/03/223-facebook-content-moderation-coronavirus-medianamas-take/"&gt;&lt;span class="s2"&gt; moderation&lt;/span&gt;&lt;/a&gt;. Though the use of automated content removal seems like the right step considering the &lt;a href="https://www.businessinsider.in/tech/news/facebook-content-moderator-who-quit-reportedly-wrote-a-blistering-letter-citing-stress-induced-insomnia-among-other-trauma/articleshow/82075608.cms"&gt;&lt;span class="s2"&gt;trauma &lt;/span&gt;&lt;/a&gt;that human moderators had to go through,&amp;nbsp; the algorithms that are being used now to remove content are relying on the parameters, practices and data from earlier removals made by the human moderators. More recently, in India with the emergence of the second wave of the COVID19&amp;nbsp; wave, the Ministry of Electronics and Information Technology has &lt;a href="https://www.thehindu.com/news/national/govt-asks-social-media-platforms-to-remove-100-covid-19-related-posts/article34406733.ece"&gt;&lt;span class="s2"&gt;asked &lt;/span&gt;&lt;/a&gt;social media platforms to remove “&lt;em&gt;unrelated, old and out of the context images or visuals, communally sensitive posts and misinformation about COVID19 protocols&lt;/em&gt;”.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;&lt;strong&gt;The New IL Rules - A ray of hope?&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p3"&gt;&lt;span class="s3"&gt;The 2021 version of the IL Rules provides a more nuanced approach to the use of automated content filtering compared to the earlier version. Rule 4(4) now requires only “&lt;/span&gt;&lt;span class="s1"&gt;significant social media intermediaries” to use automated tools to identity and take down content pertaining to “child sexual abuse material”, or “depicting rape”, or any information which is identical to a content that has already been removed through a take-down notice. The Rules define a social media intermediary as “&lt;em&gt;intermediary which primarily or solely enables interaction between two or more users and allows them to create, upload, share, disseminate, modify or access information using its services”&lt;/em&gt; .The Rules also go a step further to create another type of intermediary, the&amp;nbsp; significant social media intermediary. A significant social media intermediary is defined as one “&lt;em&gt;having a number of registered users in India above such threshold as notified by the Central Government&lt;/em&gt;''. Hence what can be considered as a social media intermediary that qualifies as a significant one could change at any time.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s4"&gt;Along with adding a new threshold (qualifying as a significant social media intermediary) the Rules, in contrast to the 2018 version, also emphasises the need of such removal to be &lt;/span&gt;&lt;span class="s1"&gt;proportionate to the interests of freedom of speech and expression and privacy of users. The Rules also call for “&lt;em&gt;appropriate human oversight&lt;/em&gt;” as well as a periodic review of the tools used for content moderation. The Rules by using the term “&lt;em&gt;shall endeavor&lt;/em&gt;” aids in reducing the pressure on the intermediary to set up these mechanisms. This also means&amp;nbsp; that the requirement is now on a best effort basis, as opposed to the word “&lt;em&gt;shall&lt;/em&gt;” in the 2018 version of the Rules, which made it mandatory.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Although the Rules now narrow down the instances where automated content removal can take place, the concerns around over compliance and censorship still loom. One of the reasons for concern is that the Rules still fail to require the intermediaries to set up a mechanism for redress or for appeals to such removal. Additionally, the provision that states that automated systems could remove content that have been previously taken down, creates a cause for worry as the propensity of the intermediaries to over comply and take down content has already been documented. This then brings us back to the previous issue where the social media company’s automated systems were removing legitimate news sources. Though the 2021 Rules tries to clarify certain provisions related to automated filtering, like the addition of the safeguards, the Rules also suffer from vague provisions that could cause issues related to compliance. The use of terms such as “&lt;em&gt;proportionate&lt;/em&gt;”, “&lt;em&gt;having regard to free speech&lt;/em&gt;” etc. fail to lay down definitive directions for the intermediaries (in this case SSMI) to comply with. Additionally, as earlier stated, being qualified&amp;nbsp; as a SSMI can change at any time, either based on the change in the number of users, or the change in the threshold of users, mandated by the government. The absence of human intervention during removal, vague guidelines and fear of losing out on safe harbour provisions, add to the already increasing trend of censorship in social media. With the use of automated means and the fast, and almost immediate removal of content would mean that certain content creators might not even be able to post their content &lt;a href="https://www.eff.org/wp/unfiltered-how-youtubes-content-id-discourages-fair-use-and-dictates-what-we-see-online"&gt;&lt;span class="s2"&gt;online.&lt;/span&gt;&lt;span class="s5"&gt; With the use of proactive filtering through automated means the content can be removed almost immediately.&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span class="s6"&gt; &lt;/span&gt;&lt;span class="s1"&gt;With India’s current trend of new internet users, some of these creators would also be &lt;a href="https://timesofindia.indiatimes.com/business/india-business/for-the-first-time-india-has-more-rural-net-users-than-urban/articleshow/75566025.cms"&gt;&lt;span class="s2"&gt;first time users&lt;/span&gt;&lt;/a&gt; of the internet.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p3"&gt;&lt;span class="s1"&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p3"&gt;&lt;span class="s1"&gt;The need for automated removal of content is understandable, based not only on&amp;nbsp; the sheer volume of content but also&amp;nbsp; the nightmare stories of the toll it takes on human content moderators, who otherwise have to go through hours of disturbing content. Though the Indian Intermediary Liability Guidelines have improved from the earlier versions in terms of moving away from mandating proactive filtering, there still needs to be consideration of how these technologies are used, and the laws should understand the shift in the definition of who a content creator is. There needs to be ways of recourse to unfair removal of content and a means to get an explanation of why the content was removed, via notices to the user. In the case of India, the notices should be in Indian languages as well, so that the people are able to understand them.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p2"&gt;&lt;span class="s1"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p3"&gt;&lt;span class="s1"&gt;In the absence of further clear guidelines, the perils of over-censorship by the intermediaries in order to stay out of trouble could lead to further stifling of not just freedom of speech but also access to information. In addition, the fear of content being taken down or even potential prosecution could mean that people resort to self-censorship, preventing them from exercising their fundamental rights to freedom of speech and expression, as guaranteed by the Indian Constitution. We hope that the next version of the Rules take a more nuanced approach to automated content removal and ensure adequate and specific safeguards to ensure a conducive environment for both intermediaries and content creators.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/finding-needles-in-haystacks-discussing-the-role-of-automated-filtering-in-the-new-indian-intermediary-liability-rules'&gt;https://cis-india.org/internet-governance/blog/finding-needles-in-haystacks-discussing-the-role-of-automated-filtering-in-the-new-indian-intermediary-liability-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas and Torsha Sarkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2021-08-03T07:28:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-september-20-2018-find-ways-to-trace-origin-of-messages-govt-to-whatsapp">
    <title>Find ways to trace origin of messages: Government to WhatsApp</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-september-20-2018-find-ways-to-trace-origin-of-messages-govt-to-whatsapp</link>
    <description>
        &lt;b&gt;Unhappy with the steps taken so far by WhatsApp, the government plans to trace the origins of incendiary messages spread on its platform.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surabhi Agarwal was published in &lt;a class="external-link" href="https://economictimes.indiatimes.com/tech/internet/find-ways-to-trace-origin-of-messages-government-to-whatsapp/articleshow/65880372.cms"&gt;Economic Times&lt;/a&gt; on September 20, 2018. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Ministry of Electronics and IT (MeitY) is drafting a letter — its third since July to the Facebook-owned platform — asking it to design a technology-led solution to the issue that in the past has led to mob lynching or riots in the country. Since India first raising its concerns, WhatsApp has announced measures such as limiting forwards to five groups at a time from the earlier 250, identifying forwarded messages, and a publicity campaign against fake news.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government says these measures may not be enough. “It’s a reasonable demand from us, and very much doable. The third letter will reiterate that WhatsApp is not meeting all our concerns,” said a top government official, who did not want to be identified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If WhatsApp feels the solution given by the government for traceability goes against its end-to-end encryption policy, then the company should be able to find a solution on its own which is technically feasible without compromising on its offering, the official said. “We are not asking them to look into the contents of the message, but if some message has been forwarded, say, 100 times and has caused some law and order problem, then they should be able to identify where it originated from,” he said, adding that WhatsApp cannot absolve itself from responsibility in the name of user privacy. “We are not being unfair since we can’t allow anonymous publishing.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;WhatsApp could not be immediately reached for comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some analysts say the government’s demand from WhatsApp is reasonable and the company could provide traceability using metadata without compromising on encryption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“For basic level of traceability, storing the metadata is enough,” said Sunil Abraham, executive director of Center of Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“For the kind of traceability that the Indian government is asking for, WhatsApp may have to break its end-toend encryption. But other kind of traceablity, such as who is messaging whom, how many times, who are the propagators of messages, and who are receivers, can all be seen through storing just metadata.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just like every organisation used to store copies of end-of-end encrypted emails on their own servers, similarly WhatsApp can either store copies of encrypted messages or the metadata, he said. Last month, at a meeting between Union minister for electronics and IT Ravi Shankar Prasad and WhatsApp CEO Chris Daniels, the government asked the company to appoint a grievance officer in India, set up an Indian entity, and ensure traceability of messages.&lt;br /&gt;While the company agreed to register a corporate entity and build a team here, a stalemate over the issue of traceability continues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“(WhatsApp) needs to find solutions to deal with sinister developments like mob lynching and revenge porn and has to follow Indian law,” Prasad said in August. “It does not take rocket science to locate a message being circulated in hundreds and thousands...&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(WhatsApp) must have a mechanism to find a solution.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;WhatsApp has maintained that people rely on the platform for all kinds of sensitive conversations, including with their doctors, banks and families. “Building traceability would undermine end-to-end encryption and the private nature of WhatsApp, creating the potential for serious misuse. WhatsApp will not weaken the privacy protections we provide,” the company’s spokesperson said in August after the demand from the Indian government on traceability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The official quoted earlier reiterated that the government is notasking the company to break its end-to-end encryption, adding that if the company could find ways to tag non-original content with ‘forward’ labels and flag some links as spurious, it could also find a way around this problem.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-september-20-2018-find-ways-to-trace-origin-of-messages-govt-to-whatsapp'&gt;https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-september-20-2018-find-ways-to-trace-origin-of-messages-govt-to-whatsapp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-09-24T02:53:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/privacy_uidfinancialinclusion">
    <title>Financial Inclusion and the UID</title>
    <link>https://cis-india.org/internet-governance/privacy_uidfinancialinclusion</link>
    <description>
        &lt;b&gt;Since 2009, when Nandan Nilekani began to envision and implement the Unique Identification Project,
the UID authority has promoted the UID/Aadhaar scheme as a tool of development for India - arguing that an identity will assist in bringing benefits to the poor, promote financial inclusion in India, and allow for economic and social development. In this blog entry I will focus on the challenges and possibilities of the UID number providing the residents of India a viable method of access to financial services across the country.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Why the UID could bring financial inclusion&lt;/h3&gt;
&lt;p&gt;In their strategy document “Exclusion to Inclusion with Micro payments” the UIDAI argues that a few&amp;nbsp;of many challenges to successful financial inclusion in India for the poor have been: lack of identity,&amp;nbsp;lack of accessibility of financial outlets, unreliability of infrastructure, high costs of banking, and the&amp;nbsp;common presence of a middle man. For Indian banks the UID sites challenges such as: the high cost of&amp;nbsp;transactions for banks servicing clients in rural areas, lack of infrastructure, costly processes of cash&amp;nbsp;management, and high costs of IT.(UIDAI, 2010)The UID's solution to these obstacles is a system of&amp;nbsp;financial services and micro payments based off of an individuals UID number, in which an individual&amp;nbsp;with a UID number would be able to: open a bank account, make a payment, withdraw money, deposit&amp;nbsp;money, and send remittances. The hope is that this system will allow banks to scale up their branch&amp;nbsp;less banking, and reach out to larger populations. Residents having a bank account linked to their UID&amp;nbsp;number is also key to the UID's larger scheme for subsidy delivery to the poor. Until all consumers who&amp;nbsp;rely on government subsidies have a bank account linked to their UID number, the UID will not be&amp;nbsp;able to implement a system of direct transfer of cash subsidies.(CNBC-TV18, 2011) For example, the&amp;nbsp;UIDAI has started conducting a pilot disbursement of funds under the Mahatma Gandhi National Rural&amp;nbsp;Employment Guarantee Scheme (MNREGS) to Jharkhand through Union Bank, ICICI Bank and Bank&amp;nbsp;of India branches.(IBN-Live, 2011)&lt;/p&gt;
&lt;h3&gt;How the UID will bring financial inclusion&lt;/h3&gt;
&lt;p&gt;In their vision, the UIDAI has designed a system that involves bank branches enrolling individuals,&amp;nbsp;bank branches establishing relationships with BC organizations, the use of Micro ATM's, and the use of&amp;nbsp;the UID numbers for authentication in all financial transactions. In short the system of financial&amp;nbsp;inclusion would work as follows:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Step 1. Enroll and obtain UID number&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An individual enrolls for a UID number. During enrollment an individual shares his/her KYC&amp;nbsp;information with the UIDAI. The UIDAI verifies the individuals KYC information, along with their&amp;nbsp;other information, and issues the individual a UID number. If an individual already has a bank account&amp;nbsp;at the time of enrollment they have the option to link their UID number to their bank account [1]&lt;/p&gt;
&lt;p&gt;In India every bank must verify and confirm an individuals KYC information. This is to help reduce&amp;nbsp;tax evasion and fraud. In December 2011, India's Ministry of Finance recognized the Aadhaar number&amp;nbsp;has an officially valid identification to satisfy the KYC norms for opening bank accounts. By verifying&amp;nbsp;an individuals KYC information at the enrollment stage the UIDAI is hoping reduce the amount of&amp;nbsp;paperwork and time needed for an individual to open a bank account. In addition to satisfying KYC&amp;nbsp;norms, the Government of India has also recognized the Aadhaar number as an acceptable form of&amp;nbsp;identity for the purpose of obtaining a mobile connection. By having the UID number accepted for&amp;nbsp;establishing both mobile connections and bank accounts, financial inclusion through mobile banking is&amp;nbsp;encouraged as it allows for individuals who previously had no identity, to join the financial system and&amp;nbsp;mobile network – thus allowing bank accounts to be more accessible than before, and aiding banks by&amp;nbsp;simplifying the process of account opening.(Akhand Tiawari, Anurodh Giri, 2011)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Step 2. Open UID Enabled Bank Account&lt;/strong&gt;&lt;br /&gt;Now that the individual has a UID number they can open a bank account by presenting their UID&amp;nbsp;number and thumb print to the bank branch for authentication. Currently the one bank enrolling citizens&amp;nbsp;and issuing UID numbers and UID based ATM cards is the Bank of India.(Aggarwal, 2011) Bank of&amp;nbsp;Maharashtra, State Bank of India and Indian Overseas Bank are currently waiting for approval from the&amp;nbsp;UIDAI.(Chavan, 2011) In this scenario the UID number will be the only form of identification needed&amp;nbsp;to open a bank account.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.Make financial transactions with UID number&lt;/strong&gt;&lt;br /&gt;Once a UID Enabled Bank Account (UEBA) is opened, individuals can begin making financial&amp;nbsp;transactions using their UID number and fingerprint. Individuals can access their UEBA through BC&amp;nbsp;institutions. With a UEBA individuals have the option of using four basic banking services:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Store cash for savings through electronic deposits and withdraw only small amounts of cash&lt;/li&gt;&lt;li&gt;Make payments&lt;/li&gt;&lt;li&gt;Send and receive remittances&lt;/li&gt;&lt;li&gt;Acquire balance and transaction history&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Transactions completed through the UID-enabled bank account work similarly to a prepaid mobile&amp;nbsp;system. BC organizations, or Bank Correspondents, are organizations such as SHGs, kirana stores,&amp;nbsp;dairy agents that larger banks develop a business relationship with. The BC organizations handle all&amp;nbsp;transactions at the local level. Using BC organizations as financial outlets is meant to increase the&amp;nbsp;penetration of financial outlets and make financial services more accessible in rural areas. How the&amp;nbsp;process works is: a BC institution begins by depositing a certain amount of money with a larger&amp;nbsp;banking institution. This ‘ prepaid balance’ paid by the BC institution changes with every transaction&amp;nbsp;the BC institution makes. For example, when an individual makes a deposit it decreases as that money&amp;nbsp;is then transferred into an individuals account, and increases when an individual withdraws money,&amp;nbsp;because of the transaction fee that is charged to the individual. When the individual is making a&amp;nbsp;deposit, he pays physical cash to the BC, who in turn makes an electronic transfer from the BC account&amp;nbsp;to the individual's account. When making a withdrawal, the electronic transfer is made from the&amp;nbsp;individual's account to the BC account, and the BC hands out physical cash to the customer, (UIDAI,&amp;nbsp;2010).&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;The micro ATM that is to be used at BC institutions is a hand held device, in this case a mobile phone,&amp;nbsp;attached to a finger print reader. The micro ATM is meant to replace larger ATM’s and reduce the cost&amp;nbsp;that banks incur when establishing full fledged ATM machines. The hand held device will be remotely&amp;nbsp;accessed to the central server of the bank. Currently Italian tech company Telit Communication SpA, is&amp;nbsp;hoping to provide the GSM wireless M2M modules that will allow the wireless device and the wired&amp;nbsp;server to communicate with each other. (Kanth, 2011) The most significant difference between the&amp;nbsp;micro ATM system and the traditional ATM system is that the BC employee executes the transaction.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Though having BC employees carry out financial transactions might eliminate the possibility of a&amp;nbsp;fraudulent ATM being set up, it opens many possibly corrupt doors. How will it be ensured that the&amp;nbsp;transaction is completed without fraud, and how can it be ensured that the Micro-ATM is not&amp;nbsp;fraudulent, or that the BC organization itself is not fraudulent. Though this scenario might sound&amp;nbsp;unlikely, the UID has already experienced difficulties with fake enrollment centers being set up, such as&amp;nbsp;in Pune. (Gadkari, 2011), fake UID papers being issued, as was done in Patna(Tripathi, 2011) and&amp;nbsp;enrollment centers illegally outsourcing work, as the IT company Tera Software was found doing&amp;nbsp;(Prajakta, 2011). If these scenarios have all been tried, it is not unreasonable to see the same being tried&amp;nbsp;with financial institutions.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Challenges to a system of authentication for financial transactions with the biometric based UID number&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Not withstanding the fact that financial inclusion cannot be achieved only through an identity, focusing&amp;nbsp;on the identity component of financial inclusion - in the report Low Cost Secure Transaction Model for&amp;nbsp;Financial Services, published by Nitin Munjal, Ashish Paliwal, and Rajat Moona, from the Indian&amp;nbsp;Institute of Technology, the authors note that present challenges in India to financial inclusion through&amp;nbsp;access to financial institutions include(Munjal, Nitin Paliwal, Ashish Moona, 2011):&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Currently financial transactions require network connectivity to take place. For financial transactions made in rural areas this has lead to both high costs for each transaction and to high fixed IT costs.&lt;/li&gt;&lt;li&gt;Current financial schemes such as mobile banking depend on network connectivity, making the network indispensable, yet 70% of the Indian population is rurally located with limited or no network connectivity.&lt;/li&gt;&lt;li&gt;Current financial service outlets are densely located in urban areas and not rural areas. Rural populations are financially excluded, as in most cases the completion of financial transaction require the presence of financial outlets.&lt;/li&gt;&lt;li&gt;Currently there are no easy safeguards to protect against fake ATMS or fraud, because the current Financial Service Model is based on blind trust of the service outlet – this allows for high rates of fake ATM’s being installed and fraud.&lt;/li&gt;&lt;li&gt;For an individual to access financial services, an identity is required. In most cases the poor lack an identity.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;Clearly there are many obstacles that the UID identity card must overcome to successfully authenticate&amp;nbsp;individuals in financial transactions and facilitate financial inclusion. For the system to be successful&amp;nbsp;the UID must at the minimum do the following:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Accurately generate unique numbers&lt;/li&gt;&lt;li&gt;Capture accurate personal information&lt;/li&gt;&lt;li&gt;Ensure security of the database&lt;/li&gt;&lt;li&gt;Ensure that the technology is secure and accurate&lt;/li&gt;&lt;li&gt;Ensure that only necessary information is collected&lt;/li&gt;&lt;li&gt;Verify BC centers&lt;/li&gt;&lt;li&gt;Provide a secure network that can handle large numbers of transactions&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Possible ways in which the system can go wrong include:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Inaccurate authentication&lt;/li&gt;&lt;li&gt;Delays in authentication&lt;/li&gt;&lt;li&gt;Fraud at the level of the BC institution&lt;/li&gt;&lt;li&gt;Over collection of personal information by banks&lt;/li&gt;&lt;li&gt;Linking of databases by banks, or other agencies&lt;/li&gt;&lt;li&gt;Network failure&lt;/li&gt;&lt;li&gt;Down time of the database&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Though UID enabled bank accounts have yet to be officially established the UID is already&amp;nbsp;experiencing many of the listed difficulties. For instance, in an Indian Express article published on June&amp;nbsp;15th, it was reported that banks are issuing additional UID forms that ask if individuals have credit&amp;nbsp;cards, operate mobile or internet banking accounts, own a two wheeler or four wheeler, or live in a&amp;nbsp;rented or personally owned accommodation. (Indian Express, 2011) Even more alarming is a recent&amp;nbsp;news item from the Deccan Herald, which details the efforts that have been taken by NATGRID to&amp;nbsp;access banking clients personal information, and NATGRID's proposal to tie banking information to a&amp;nbsp;linked database containing information from bank accounts, railways, airlines, stock exchanges,&amp;nbsp;income tax, credit card, immigration records, and telecom service providers. (Arun, 2011)The banks&lt;br /&gt;have refused to give NATGRID access to clients personal information, but the ease at which NATGRID&amp;nbsp;could track and collect information about individuals with the UID is chilling – especially if the UID is&amp;nbsp;linked to almost every bank account in India. Several news reports have also shared experiences of&amp;nbsp;confusion, inconsistent requirements, and unorganized enrollment centers, which place doubt in the&amp;nbsp;accuracy of the information collected and the accuracy of the UID numbers issued.(Tripathi, 2011).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;Looking at the technology and operational design of the UEBA system, though the scheme relies on&amp;nbsp;mobile networks, it fails to eliminate the need for connectivity to the central server, because&amp;nbsp;authentication of individuals biometric must be done through comparison of one fingerprint to the&amp;nbsp;central server of all fingerprints. This will not only complicate the effectiveness of delivery of services,&amp;nbsp;as it is possible for connectivity to be limited and slow, but it will also incur large network overhead&amp;nbsp;costs for each transaction that is verified. Furthermore, even though the use of BC institutions as&amp;nbsp;financial service outlets is meant to increases the availability of financial outlets, a dependency is&amp;nbsp;created on BC institutions – as they must be present for any financial transaction to take place.&lt;br /&gt;Additionally, individuals have no way of authenticating and verifying BC institutions. As mentioned&amp;nbsp;earlier this allows for possible scenarios of fraud. Additionally, the UID has not provided any&amp;nbsp;alternative method of identification in the case that the network or technology fails, or if an individuals&amp;nbsp;biometrics are incorrectly rejected.&lt;/p&gt;
&lt;h3&gt;Could the SCOSTA standard be an option?&lt;/h3&gt;
&lt;p&gt;Many developing countries, like Kenya and Brazil, that face similar challenges to financial inclusion&amp;nbsp;have looked towards smart cards as secure methods for authenticating individuals. In 2003 India also&amp;nbsp;implemented a smart card approach to identity management. The SCOSTA standard smart card was&amp;nbsp;introduced with the MNIC national identification scheme. Though the scheme was eventually dropped&amp;nbsp;by the Indian Government, the SCOSTA smart card standard is still a valid option for authentication&amp;nbsp;of individuals in financial transactions. A SCOSTA standard based approach for financial inclusion&amp;nbsp;would include:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Authentication of an individuals key, pass-phrase, and pin. This is known as public keyinfrastructure. This will allow a person to protect their password and easily replace it if stolen.&lt;/li&gt;&lt;li&gt;&amp;nbsp;Authentication through public key infrastructure would not depend on connectivity to thenetwork. This would allow for financial inclusion of populations not connected to networks and not be fully dependent on working networks.&lt;/li&gt;&lt;li&gt;&amp;nbsp;Authentication through public key infrastructure establishes mutual trust of user and institution. This would lower the presence of fraudulent institutions and corrupt transactions.&lt;/li&gt;&lt;li&gt;&amp;nbsp;Connection to a central server is not required for the authentication of an individual in a financial transaction. This will lower the cost of transactions and lower IT overhead costs (ibid Munjal, Nitin Paliwal, Ashish Moona, 2011)&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;Though it is hard to say that a fool proof system of authentication can easily be made, and that system&amp;nbsp;will indeed promote financial inclusion, when comparing the biometric UID number with the SCOSTA&amp;nbsp;standard smart card, there are many benefits to the SCOSTA standard such as ability of individuals to&amp;nbsp;verify banking institutions, no need for connectivity to the central server, and the ability to easily&amp;nbsp;replace lost or stolen pins and passwords. No matter what standard is implemented though, it is&amp;nbsp;important to clearly look at the current implementation, technological, and operational challenges that&amp;nbsp;identification schemes face and the possible ramifications of such challenges before adapting it as a&amp;nbsp;ubiquitous system.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/privacy_uidfinancialinclusion'&gt;https://cis-india.org/internet-governance/privacy_uidfinancialinclusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-08-23T10:36:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/financial-express-april-24-2015-net-neutrality-debate">
    <title>Financial Express hosts #NetNeutralityDebate: ‘Price discrimination can be allowed, but not for the same packet of data’</title>
    <link>https://cis-india.org/internet-governance/news/financial-express-april-24-2015-net-neutrality-debate</link>
    <description>
        &lt;b&gt;Trying to cut through the noise on Net Neutrality in India, FICCI in partnership with Financial Express is hosting a panel discussion titled ‘Decoding Net Neutrality’ in New Delhi on Wednesday.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was &lt;a class="external-link" href="http://www.financialexpress.com/article/tech/financial-express-to-host-netneutralitydebate/65828/"&gt;published in the Financial Express&lt;/a&gt; on April 24, 2015. Pranesh Prakash participated in the discussion.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Moderated by Sunil Jain, the guests on the Net Neutrality debate  panel are Rajya Sabha MP Rajeev Chandrasekhar, Lok Sabha MP Baijayant  Jay Panda along with ICRIER chief executive Dr Rajat Kathuria, IAMAI  president Dr Subho Ray, Facebook’s head of public policy for South and  Central Asia Ankhi Das, COAI director general Rajan S Mathew, Com First  director Dr Mahesh Uppal and Policy Director of the Centre for Internet  and Society  Pranesh Prakash.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Highlights of the debate:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Starting off the discussion, &lt;b&gt;Rajeev Chandrasekhar&lt;/b&gt; said that this issue is all about market abuse and market power and not  as utopian as it sounds. He said that this debate is nothing new as  regulators identified the problem long ago. Chandarasekhar added, “TRAI  had recognized in 2006 that there is an opportunity to abuse by access  providers.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Joining the conversation, COAI director general &lt;b&gt;Rajan S Mathew&lt;/b&gt; said, “We have put the cart before the horse. What needs to be addressed first is online governance.”&lt;/p&gt;
&lt;p&gt;Looking forward, ICRIER chief executive &lt;b&gt;Rajat Kathuria&lt;/b&gt; said that we need to figure out the best way to use this privately funded public good. He added, “We still haven’t so far.”&lt;/p&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/-kTsnxtboSU" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;Com First director &lt;b&gt;Dr Mahesh Uppal&lt;/b&gt; tries to find a common ground and said, “Everyone is against ‘arbitrary commercial’ prioritisation or throttling.”&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Subho Ray&lt;/b&gt; agreed and said, “There should be no blocking, throttling and preferential treatment.”&lt;/p&gt;
&lt;p&gt;Facebook India’s&lt;b&gt; Ankhi Das&lt;/b&gt; said that Internet.org is  not for people who are already on the Internet. She explained, “Our  objective is that it should be free and non-exclusive.”&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Watch video: It’s free, no one has to pay to join the app, says Ankhi Das, Facebook India, on internet.org&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/3z70Q1-p7Xw" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash,&lt;/b&gt; Policy Director of the Centre  for Internet and Society intervened to add, “An universally affordable  model is important. We must ensure that the diversity that Internet  provides is not lost.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Taking the conversation further, &lt;b&gt;Rajeev Chandrasekhar&lt;/b&gt; said, “I don’t believe data packets can be discriminated except in terms of speed and bandwidth.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rajan Mathews&lt;/b&gt; interjected, “We do not discriminate, we differentiate. And all businesses differentiate.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On this point, &lt;b&gt;Rajat Kathuria&lt;/b&gt; said, “Price discrimination is something that should be allowed within boundaries of regulation.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian Express New Media Editor &lt;b&gt;Nandagopal Rajan&lt;/b&gt; said that, “#NetNeutralityDebate panel agrees that price discrimination can be allowed, but not for the same packet of data.”&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Jay Panda&lt;/b&gt;, Lok Sabha MP now also joins the  discussion and says, “I have come out in favour of net neutrality  despite the fact that my family will be benefiting from the lack of it.  Whether fragmentation is desirable on the Internet or not, it needs to  be debated. I am not in favour of fragmented access to the Internet.”&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Watch video: There should be no prioritisation of one brand over another, says Baijayant Jay Panda on Net Neutrality&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/TIN0jiXtVPY" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Underlining his views, &lt;b&gt;Jay Panda&lt;/b&gt; reiterated, “Spectrum may be limited but access won’t be in the future. I am against prioritizing packets over others.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash&lt;/b&gt; gave an overarching view and said,  “Everyone benefits from Internet. What we need to figure out is whether  everyone is getting paid enough.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jay Panda&lt;/b&gt; said, “It is possible for access providers to make money.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rajan Mathews&lt;/b&gt; said, “I think it is not fair to say that telcos can influence the govt.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On this &lt;b&gt;Jay Panda&lt;/b&gt; quipped, “The govt has to chip in its share to make the Internet accessible to all.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jay Panda&lt;/b&gt; says govts have been behind the curve in #NetNeutralityDebate and telcos have benefitted from it.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/financial-express-april-24-2015-net-neutrality-debate'&gt;https://cis-india.org/internet-governance/news/financial-express-april-24-2015-net-neutrality-debate&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-04-27T02:18:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/financial-express-may-9-2015-financial-express-hosts-net-neutrality-debate">
    <title>Financial Express hosts #NetNeutralityDebate: ‘Price discrimination can be allowed, but not for the same packet of data’</title>
    <link>https://cis-india.org/internet-governance/news/financial-express-may-9-2015-financial-express-hosts-net-neutrality-debate</link>
    <description>
        &lt;b&gt;Trying to cut through the noise on Net Neutrality in India, FICCI in partnership with Financial Express is hosting a panel discussion titled “Decoding Net Neutrality” in New Delhi on Wednesday.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.financialexpress.com/article/tech/financial-express-to-host-netneutralitydebate/65828/"&gt;published in Financial Express&lt;/a&gt; on April 24, 2015. Pranesh Prakash participated in the discussion.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Trying to cut through the noise on &lt;a href="http://www.financialexpress.com/article/industry/tech/be-neutral-on-the-net/64791/" target="_blank"&gt;Net Neutrality&lt;/a&gt; in India, FICCI in partnership with Financial Express is hosting a  panel discussion titled ‘Decoding Net Neutrality’ in New Delhi on  Wednesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moderated by Sunil Jain, the guests on the Net Neutrality debate  panel are Rajya Sabha MP Rajeev Chandrasekhar, Lok Sabha MP Baijayant  Jay Panda along with ICRIER chief executive Dr Rajat Kathuria, IAMAI  president Dr Subho Ray, Facebook’s head of public policy for South and  Central Asia Ankhi Das, COAI director general Rajan S Mathew, Com First  director Dr Mahesh Uppal and Policy Director of the Centre for Internet  and Society  Pranesh Prakash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Highlights of the debate:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Starting off the discussion, &lt;b&gt;Rajeev Chandrasekhar&lt;/b&gt; said that this issue is all about market abuse and market power and not  as utopian as it sounds. He said that this debate is nothing new as  regulators identified the problem long ago. Chandarasekhar added, “TRAI  had recognized in 2006 that there is an opportunity to abuse by access  providers.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Joining the conversation, COAI director general &lt;b&gt;Rajan S Mathew&lt;/b&gt; said, “We have put the cart before the horse. What needs to be addressed first is online governance.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Looking forward, ICRIER chief executive &lt;b&gt;Rajat Kathuria&lt;/b&gt; said that we need to figure out the best way to use this privately funded public good. He added, “We still haven’t so far.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Com First director &lt;b&gt;Dr Mahesh Uppal&lt;/b&gt; tries to find a common ground and said, “Everyone is against ‘arbitrary commercial’ prioritisation or throttling.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Subho Ray&lt;/b&gt; agreed and said, “There should be no blocking, throttling and preferential treatment.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook India’s&lt;b&gt; Ankhi Das&lt;/b&gt; said that Internet.org is  not for people who are already on the Internet. She explained, “Our  objective is that it should be free and non-exclusive.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash,&lt;/b&gt; Policy Director of the Centre  for Internet and Society intervened to add, “An universally affordable  model is important. We must ensure that the diversity that Internet  provides is not lost.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Taking the conversation further, &lt;b&gt;Rajeev Chandrasekhar&lt;/b&gt; said, “I don’t believe data packets can be discriminated except in terms of speed and bandwidth.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rajan Mathews&lt;/b&gt; interjected, “We do not discriminate, we differentiate. And all businesses differentiate.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On this point, &lt;b&gt;Rajat Kathuria&lt;/b&gt; said, “Price discrimination is something that should be allowed within boundaries of regulation.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian Express New Media Editor &lt;b&gt;Nandagopal Rajan&lt;/b&gt; said that, “#NetNeutralityDebate panel agrees that price discrimination can be allowed, but not for the same packet of data.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jay Panda&lt;/b&gt;, Lok Sabha MP now also joins the  discussion and says, “I have come out in favour of net neutrality  despite the fact that my family will be benefiting from the lack of it.  Whether fragmentation is desirable on the Internet or not, it needs to  be debated. I am not in favour of fragmented access to the Internet.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Underlining his views, &lt;b&gt;Jay Panda&lt;/b&gt; reiterated, “Spectrum may be limited but access won’t be in the future. I am against prioritizing packets over others.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash&lt;/b&gt; gave an overarching view and said,  “Everyone benefits from Internet. What we need to figure out is whether  everyone is getting paid enough.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jay Panda&lt;/b&gt; said, “It is possible for access providers to make money.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rajan Mathews&lt;/b&gt; said, “I think it is not fair to say that telcos can influence the govt.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On this &lt;b&gt;Jay Panda&lt;/b&gt; quipped, “The govt has to chip in its share to make the Internet accessible to all.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jay Panda&lt;/b&gt; says govts have been behind the curve in #NetNeutralityDebate and telcos have benefitted from it.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/financial-express-may-9-2015-financial-express-hosts-net-neutrality-debate'&gt;https://cis-india.org/internet-governance/news/financial-express-may-9-2015-financial-express-hosts-net-neutrality-debate&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-05-09T10:05:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs">
    <title>Financial CERT to combat cyber threats, says MoS home affairs</title>
    <link>https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs</link>
    <description>
        &lt;b&gt;To tackle cyber threats to India’s financial institutions, the central government is mulling to establish a financial Computer Emergency Response Team (CERT).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published by &lt;a class="external-link" href="https://www.cisomag.com/financial-cert-combat-cyber-threats-says-mos-home-affairs/"&gt;CISO MAG&lt;/a&gt; on November 17, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Addressing the 15th Asia Pacific Computer Emergency Response Team (APCERT) Open Conference in New Delhi on November 15, 2017, IT Secretary Ajay Prakash Sawhney said, “right now, the one which is directly being worked on is the financial CERT. We are getting the framework in place and once that is there, we will look at other sectors. It will oversee the entire financial sector including banks and financial institutions.”&lt;br /&gt;&lt;br /&gt;In March this year, the power ministry had announced to create four sectoral CERTs for cybersecurity in power systems: CERT (Transmission), CERT (Thermal), CERT (Hydro), and CERT (Distribution).&lt;br /&gt;&lt;br /&gt;Udbhav Tiwari, program manager at the Centre for Internet and Society, a Bengaluru-based think tank, highlighted the responsibilities of the financial CERT in a conversation with Live Mint.  “The biggest task of sectoral CERT is to share information with the others in the industry. For example, if a bank undergoes an attack, normally the bank will perform all the necessary actions to limit the attack and to prevent it from happening in the future. But the obligation of sharing how the attack happened with all the other banks in India to make sure that they can protect their respective systems from such an attack, can be carried out by a financial CERT,” he said.&lt;br /&gt;&lt;br /&gt;Cybersecurity Chief Gulshan Rai, who was also present at the event, said “from April to October 2017, around 50,000 cyber security incidents have been handled by CERT-In; including phishing, malware attacks, attacks on digital payments and targeted attacks on some of the critical industries.”&lt;br /&gt;&lt;br /&gt;On August 1, 2017, MoS home affairs Hansraj Gangaram Ahir had said “as per the information by the Indian computer emergency response team (CERT-In), 50 incidents affecting 19 financial organizations have been reported during the period of November, 2016 to June, 2017.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs'&gt;https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-23T16:07:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/finance-and-privacy.pdf">
    <title>Finance and Privacy</title>
    <link>https://cis-india.org/internet-governance/finance-and-privacy.pdf</link>
    <description>
        &lt;b&gt;Financial privacy involves the protection of consumers from unlawful access to financial accounts by private and public bodies, and the unlawful disclosure, sharing, or commercial use of financial information.
&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/finance-and-privacy.pdf'&gt;https://cis-india.org/internet-governance/finance-and-privacy.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-02-28T04:40:27Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/filtering-content-on-the-internet">
    <title>Filtering content on the internet</title>
    <link>https://cis-india.org/internet-governance/blog/filtering-content-on-the-internet</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;hr /&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The op-ed was &lt;a class="external-link" href="http://www.thehindu.com/todays-paper/tp-opinion/filtering-content-on-the-internet/article5967959.ece"&gt;published in the Hindu&lt;/a&gt; on May 2, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;On May 5, the Supreme Court will hear Kamlesh Vaswani’s infamous anti-pornography petition again. The petition makes some rather outrageous claims. Watching pornography ‘puts the country’s security in danger’ and it is ‘worse than Hitler, worse than AIDS, cancer or any other epidemic,’ it says. This petition has been pending before the Court since February 2013, and seeks a new law that will ensure that pornography is exhaustively curbed.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Disintegrating into binaries&lt;/b&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The petition assumes that pornography causes violence  against women and children. The trouble with such a claim is that the  debate disintegrates into binaries; the two positions being that  pornography causes violence or that it does not. The fact remains that  the causal link between violence against women and pornography is yet to  be proven convincingly and remains the subject of much debate.  Additionally, since the term pornography refers to a whole range of  explicit content, including homosexual adult pornography, it cannot be  argued that all pornography objectifies women or glamorises violent  treatment of them.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Allowing even for the petitioner’s legitimate concern about  violence against women, it is interesting to note that of all the  remedies available, he seeks the one which is authoritarian but may not  have any impact at all. Mr. Vaswani could have, instead, encouraged the  state to do more toward its international obligations under the  Convention on the Elimination of Discrimination against Women (CEDAW).  CEDAW’s General Recommendation No. 19 is about violence against women  and recommends steps to be taken to reduce violence against women. These  include encouraging research on the extent, causes and effects of  violence, and adopting preventive measures, such as public information  and education programmes, to change attitudes concerning the roles and  status of men and women.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Child pornography&lt;/b&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Although different countries disagree about the necessity  of banning adult pornography, there is general international consensus  about the need to remove child pornography from the Internet. Children  may be harmed in the making of pornography, and would at the very  minimum have their privacy violated to an unacceptable degree. Being  minors, they are not in a position to consent to the act. Each act of  circulation and viewing adds to the harmful nature of child pornography.  Therefore, an argument can certainly be made for the comprehensive  removal of this kind of content.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Indian policy makers have been alive to this issue. The  Information Technology Act (IT Act) contains a separate provision for  material depicting children explicitly or obscenely, stating that those  who circulate such content will be penalised. The IT Act also  criminalises watching child pornography (whereas watching regular  pornography is not a crime in India).&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Intermediaries are obligated to take down child pornography  once they have been made aware that they are hosting it. Organisations  or individuals can proactively identify and report child pornography  online. Other countries have tried, with reasonable success, systems  using hotlines, verification of reports and co-operation of internet  service providers to take down child pornography. However, these systems  have also sometimes resulted in the removal of other legitimate  content.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Filtering speech on the Internet&lt;/b&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Child pornography can be blocked or removed using the IT  Act, which permits the government to send lists of URLs of illegal  content to internet service providers, requiring them to remove this  content. Even private parties can send notices to online intermediaries  informing them of illegal content and thereby making them legally  accountable for such content if they do not remove it. However, none of  this will be able to ensure the disappearance of child pornography from  the Internet in India.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Technological solutions like filtering software that  screens or blocks access to online content, whether at the state,  service provider or user level, can at best make child pornography  inaccessible to most people. People who are more skilled than amateurs  will be able to circumvent technological barriers since these are  barriers only until better technology enables circumvention.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Additionally, attempts at technological filtering usually  even affect speech that is not targeted by the filtering mechanism.  Therefore, any system for filtering or blocking content from the  Internet needs to build in safeguards to ensure that processes designed  to remove child pornography do not end up being used to remove political  speech or speeches that are constitutionally protected.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;In the Vaswani case, the government has correctly explained  to the Supreme Court that any greater attempt to monitor pornography is  not technologically feasible. It has pointed out that human monitoring  of content will delay transmission of data substantially, will slow down  the Internet, and will also be ineffective, since the illegal content  can easily be moved to other servers in other countries.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Making intermediaries liable for the content they host will  undo the safe harbour protection granted to them by the IT Act. Without  it, intermediaries like Facebook will actually have to monitor all the  content they host, and the resources required for such monitoring will  reduce the content that makes its way online. This would seriously  impact the extensiveness and diversity of content available on the  Internet in India. Additionally, when demands are made for the removal  of legitimate content, profit-making internet companies will be  disinclined to risk litigation much in the same way as Penguin was  reluctant to defend Wendy Doniger’s book.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;If the Supreme Court makes the mistake of creating a  positive obligation to monitor Internet content for intermediaries, it  will effectively kill the Internet in India.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;i&gt;(Chinmayi Arun &lt;/i&gt;is &lt;i&gt;research director, Centre for  Communication Governance, National Law University, Delhi, and fellow,  Centre for Internet and Society, &lt;/i&gt;Bangalore)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/filtering-content-on-the-internet'&gt;https://cis-india.org/internet-governance/blog/filtering-content-on-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-05-06T09:33:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/figi-symposium-2017">
    <title>FIGI Symposium 2017</title>
    <link>https://cis-india.org/internet-governance/news/figi-symposium-2017</link>
    <description>
        &lt;b&gt;Innovative Approaches to Digital Financial Inclusion Challenges. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The        &lt;strong&gt;first edition of the Financial Inclusion Global Initiative (FIGI) Symposium &lt;/strong&gt;was held in Bangalore, India, from 29 November to 1 December 2017. The Symposium was organized jointly by the Telecommunication Standardization Bureau (TSB) of the International Telecommunication Union (ITU), jointly with  the Bill &amp;amp; Melinda Gates Foundation, the World Bank and the Committee on Payments and Market Infrastructure (CPMI) and the kind support of the Government of India. ​​​​​​​​​​​​​​​​​​&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Elonnai Hickok participated in the symposium and spoke in the "Security, Infrastructure, and Trust" working group on big data and privacy in DFS. For more info on the symposium, &lt;a class="external-link" href="https://www.itu.int/en/ITU-T/extcoop/figisymposium/2017/Pages/default.aspx"&gt;see here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/figi-symposium-2017'&gt;https://cis-india.org/internet-governance/news/figi-symposium-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-01T16:29:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-nikhil-varma-september-2-2014-fighting-battles-online">
    <title>Fighting battles online</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-nikhil-varma-september-2-2014-fighting-battles-online</link>
    <description>
        &lt;b&gt;Internet policy maverick Sunil Abraham feels that accessibility is key to democratising the Internet space.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nikhil Varma was &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/technology/internet/internet-policy-maverick-feels-that-accessibility-is-key-to-democratising-the-internet-space/article6369766.ece"&gt;published in the Hindu&lt;/a&gt; on September 2, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Forty-year-old Sunil Abraham essays many roles, of a social  entrepreneur, free software advocate and as policy director of the  Bangalore-based Centre for Internet and Society that focuses on  accessibility, access to knowledge, internet governance, telecom and  digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When he finished his engineering degree and was job hunting in  Bangalore, the internet was an entity he had heard about, but never  worked on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Family constraints meant that I had to look for jobs that paid me more  than the salaries offered by industries for a 9 to 6 job. I decided to  knock doors in the non profit sector. I met T. Pradeep, who ran Samuha,  an NGO in Northern Karnataka that focused on integrated rural  development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil says, “He offered me a job provided I learnt to work on the  Internet. My job was to set up the organisation’s website. By 1998, I  became the head of the IT department. Many spinoffs from Samuha were  also becoming very successful. Pradeep gave us Rs.14 lakh and asked us  to spin off and create a new organisation called Mahiti, with a mandate  to serve non profits and provide them with affordable IT services. I  just came into the picture to fulfil someone else’s dream. We provided  email services to non-profit organisations at affordable rates. We ran a  bulletin board service and also offered a free webpage for select  NGOs.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 99, Sunil was offered an Ashoka fellowship. “It is a US non-profit  that that supports social entrepreneurs. The idea that won me the  fellowship was exploring the democratic potential of the internet. It is  very similar to the work that I do at the CIS. The internet remains a  tool that can be used for empowering and disempowering purposes that  could have hegemonic implications for society. I also worked with the  UNDP, after giving a speech about free and open software at one of their  meetings. I was hired as a consultant.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Till June 07’, Sunil worked with the UNDP, managing the open-source  network spanning 42 countries. “I cut my policy teeth in the UN and  learnt to work with governments and had a better idea of free software  and open content. I made a lot of contacts in the course of my work.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was at the end of the UN stint that philanthropist Anurag Dikshit  decided to set up the Centre for Internet and society in India and Sunil  decided to take up the assignment. “Anurag has been a great help from  the start. His funds have been very vital for the organization.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS deals with a host of issues, ranging from making the internet and  mobile phones disabled friendly to creating more Wikipedia pages in  Indic languages and enhancing internet penetration in rural India. The  organization is also&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With government surveillance taking on newer dimensions in the internet  Sunil says, “Surveillance is like adding salt in cooking. It is  essential in small quantities, but counter productive even if it is  slightly in excess. While surveillance may be a good idea to keep public  servants occupying high office under scrutiny, employing mass  surveillance on everybody may not work well.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He adds, “A rational approach is needed. We believe that privacy is  inversely proportional to the power a person yields, while transparency  is directly proportional to the power a person yields.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil is deeply apprehensive about some of the steps governments take to  stem the flow of information. “A couple of years ago, the government  had banned text messages beyond a certain limit to prevent rumours from  circulating. This resulted in people moving to Whatsapp, which is more  difficult to monitor. The government agencies ended up being the actual  losers. The more unrestricted surveillance, better chances that it could  be compromised.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another vital issue that plagues our times are the limits to free speech  and expression. “Different countries have different sets of laws and  traditions that govern all aspects of life. We have not managed to  arrive on a consensus on food habits, mankind is a long way from  developing a uniform policy about internet usage. In India, there are  some limits on free speech.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He says, “If something is illegal offline, it is bound to illegal  online. I do not think we need specific laws to police the internet. If  you try to ban something, it may end up getting more consumed. It  happened in the case of Wendy Doniger’s book being withdrawn by Penguin.  The sales of the book skyrocketed when it was published by another  publisher.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil adds, “It is an important that good laws are made and these laws  have been enforced properly. Enforceability must also be taken into  account during framing laws.”&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A scanned version of the article published in the newspaper can be found below:&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/CIS.png" alt="CIS" class="image-inline" title="CIS" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-nikhil-varma-september-2-2014-fighting-battles-online'&gt;https://cis-india.org/internet-governance/news/the-hindu-nikhil-varma-september-2-2014-fighting-battles-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-09-16T04:19:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/fifth-meeting-of-two-sub-groups-on-privacy">
    <title>Fifth Meeting of the two Sub-Groups on Privacy Issues under the Chairmanship of Justice AP Shah</title>
    <link>https://cis-india.org/news/fifth-meeting-of-two-sub-groups-on-privacy</link>
    <description>
        &lt;b&gt;The fifth meeting of the two sub-groups on privacy issues will be held on July 22, 2012 under the chairmanship of Justice AP Shah, former chief justice of Delhi High Court.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The next meeting of the two Sub-Groups (5th Meeting) on privacy issues under the Chairmanship of Justice A.P. Shah, former Chief Justice of Delhi High Court is scheduled to be held on July 22, 2012 at 11.00 a.m. This was announced vide notice No. M-13040/47/2011-CIT&amp;amp;I, dated the 10th June, 2012.&lt;/p&gt;
&lt;p&gt;A copy of the notice was sent to the following individuals:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Justice AP Shah, Chairman&lt;/li&gt;
&lt;li&gt;Dr. Kamlesh Bajaj&lt;/li&gt;
&lt;li&gt;Usha Ramanathan&lt;/li&gt;
&lt;li&gt;Sunil Abraham&lt;/li&gt;
&lt;li&gt;Prashant Reddy&lt;/li&gt;
&lt;li&gt;Prof. Arghya Sengupta&lt;/li&gt;
&lt;li&gt;Shri Som Mittal&lt;/li&gt;
&lt;li&gt;Shri Gulshan Rai&lt;/li&gt;
&lt;li&gt;Mala Dutt&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/fifth-meeting-of-two-sub-groups-on-privacy'&gt;https://cis-india.org/news/fifth-meeting-of-two-sub-groups-on-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Meeting</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-08-07T10:11:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-telegraph-august-26-2016-festival-scan-on-social-media">
    <title>Festival scan on social media</title>
    <link>https://cis-india.org/internet-governance/news/the-telegraph-august-26-2016-festival-scan-on-social-media</link>
    <description>
        &lt;b&gt;Authorities in a south Karnataka district have started keeping tighter watch on rumour-mongering and hate messages on social media platforms ahead of religious festivals.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published &lt;a class="external-link" href="http://www.telegraphindia.com/1160826/jsp/nation/story_104570.jsp#.V7-0ANeE3oM"&gt;in the Telegraph&lt;/a&gt; on August 26, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Police in the communally sensitive Dakshina Kannada district have cautioned people not to start or circulate any hate message or rumours that could affect law and order.&lt;br /&gt;&lt;br /&gt;"Anyone spreading rumours or hate messages can be charged under IPC Section 505 as we have all the technical capability to find out the origins of such messages," said Mangalore city police commissioner M. Chandra Sekhar.&lt;br /&gt;&lt;br /&gt;This section is applied in the event of any statement or rumour with the intent to cause alarm among the public. "We do get several messages that later turn out to be a hoax," the officer said, citing instances of false rumours.&lt;br /&gt;&lt;br /&gt;The officer exhorted citizens to alert the police the moment they get any such messages so that it could minimise or even prevent any damage, especially if the content is communally sensitive.&lt;br /&gt;&lt;br /&gt;The district authorities have already ramped up police presence to prevent anything untoward in view of the activities of cow vigilantes who recently lynched a BJP worker for transporting calves in neighbouring Udupi district.&lt;br /&gt;&lt;br /&gt;A source in the state police department hinted the measure could be replicated across the state, although other districts are not as communally sensitive like Dakshina Kannada.&lt;br /&gt;&lt;br /&gt;The district - Mangalore is its administrative headquarters - had been in the thick of communal tension for decades.&lt;br /&gt;&lt;br /&gt;Bhushan Gulabrao Borase, superintendent of police in charge of the Dakshina Kannada rural district, that is the rest of the district except Mangalore city, said keeping a watch on social media had become imperative. "Rural people may be using social media less frequently. But even then we need to be careful," he said.&lt;br /&gt;&lt;br /&gt;Cow vigilantism by Hindutva groups is a major concern.&lt;br /&gt;&lt;br /&gt;He said people could land in trouble for a seemingly harmless message if it causes some serious issue. "It is better not to start such messages. But it's also important not to forward if one receives them," said Borase.&lt;br /&gt;&lt;br /&gt;Sunil Abraham, executive director of The Centre for Internet and Society, had a word of caution, although he appreciated the intent behind the police move.&lt;br /&gt;&lt;br /&gt;"It's a reasonable approach if they stick to the scope of the law (Section 505). The problem is only if police overstep their limits, like we have seen on several occasions."&lt;br /&gt;&lt;br /&gt;But he agreed there was a need to keep an eye on what goes on in social media since many users abuse messaging platforms like WhatsApp.&lt;br /&gt;&lt;br /&gt;"What we don't want is a Nazi Germany where the wife is asked to spy on her husband and the son on the father. But we also don't want the opposite when citizens just ignore everything," he said, asserting that it was the duty of civil society to inform the police if they found anything dangerous being circulated.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-telegraph-august-26-2016-festival-scan-on-social-media'&gt;https://cis-india.org/internet-governance/news/the-telegraph-august-26-2016-festival-scan-on-social-media&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-08-26T03:20:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
