<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 206 to 220.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/unbox-2019-festival"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/un-special-rapporteur-report-on-freedom-of-expression-and-the-private-sector-a-significant-step-forward"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/un-special-rapporteur-on-the-right-to-privacy-consultation-on-privacy-and-gender"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/un-questionnaire-digital-innovation-technologies-right-to-health"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-december-27-2012-surabhi-agarwal-un-agrees-to-review-agencies-governing-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/uk-dna-database-and-european-court-of-human-rights-lessons-that-india-can-learn-from-mistakes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/uidais-virtual-id-limited-kyc-does-little-to-protect-aadhaar-data-already-collected-say-critics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-mayank-jain-march-27-2018-uidai-servers-or-third-parties-aadhaar-leaks-are-dangerous-experts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-august-3-2018-uidai-says-asked-nobody-to-add-the-helpline-number-to-contacts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/newslaundry-shruti-menon-may-2-2017-uidai-remains-silent-on-aadhaar-leaks-of-users-through-govt-portals"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/financial-express-may-19-2017-pti-uidai-puts-posers-to-cis-over-aadhaar-data-leak-claim"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-january-11-2018-uidai-introduces-new-two-layer-security-system-to-improve-aadhaar-privacy"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/unbox-2019-festival">
    <title>Unbox Festival 2019: CIS organizes two Workshops</title>
    <link>https://cis-india.org/internet-governance/blog/unbox-2019-festival</link>
    <description>
        &lt;b&gt;Centre for Internet &amp; Society organized two workshops at the Unbox Festival 2019, in Bangalore, on 15 and 17 February 2019. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;'What is your Feminist Infrastructure Wishlist?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The first workshop 'What is your Feminist Infrastructure Wishlist?' was on Feminist Infrastructure Wishlists that was conducted by P.P. Sneha and Saumyaa Naidu on  15 February 2019. The objective of the workshop was to explore what it means to have infrastructure that is feminist. How do we build spaces, networks, and systems that are equal, inclusive, diverse, and accessible? We will also reflect on questions of network configurations, expertise, labour and visibility. For reading material &lt;a class="external-link" href="https://feministinternet.org/"&gt;click here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;AI for Good&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;With a backdrop of AI for social good, we explore existing applications of artificial intelligence, how we interact and engage with this technology on a daily basis. A discussion led by Saumyaa Naidu and Shweta Mohandas invited participants to examine current narratives around AI and imagine how these may transform with time. Questions around how we can build an AI for the future will become the starting point to trace its implications relating to social impact, policy, gender, design, and privacy. For reading materials see &lt;a class="external-link" href="https://ainowinstitute.org/AI_Now_2018_Report.pdf"&gt;AI Now Report 2018&lt;/a&gt;, &lt;a class="external-link" href="https://www.propublica.org/article/machine-bias-risk-assessments-in-criminal-sentencing"&gt;Machine Bias&lt;/a&gt;, and &lt;a class="external-link" href="https://www.theatlantic.com/technology/archive/2016/03/why-do-so-many-digital-assistants-have-feminine-names/475884/"&gt;Why Do So Many Digital Assistants Have Feminine Names?&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For info on Unbox Festival, &lt;a class="external-link" href="http://unboxfestival.com/"&gt;click here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/unbox-2019-festival'&gt;https://cis-india.org/internet-governance/blog/unbox-2019-festival&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>saumyaa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2019-02-26T01:53:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/un-special-rapporteur-report-on-freedom-of-expression-and-the-private-sector-a-significant-step-forward">
    <title>UN Special Rapporteur Report on Freedom of Expression and the Private Sector: A Significant Step Forward</title>
    <link>https://cis-india.org/internet-governance/un-special-rapporteur-report-on-freedom-of-expression-and-the-private-sector-a-significant-step-forward</link>
    <description>
        &lt;b&gt;On 6 June 2016, the UN Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, David Kaye, released a report on the Information and Communications Technology (“ICT”) sector and freedom of expression in the digital age. Vidushi Marda and Pranesh Prakash highlight the most important aspects of the report.&lt;/b&gt;
        
&lt;h2 dir="ltr"&gt;Background&lt;/h2&gt;
&lt;p dir="ltr"&gt;Today, the private sector is more closely linked to the freedom of expression than it has ever been before. The ability to speak to a mass audience was at one time a privilege restricted to those who had access to mass media. &amp;nbsp;However, with digital technologies, that privilege is available to far more people than was ever possible in the pre-digital era. As private content created on these digital networks is becoming increasingly subject to state regulation, it is crucial to examine the role of the private sector in respect of the freedom of speech and expression.&lt;/p&gt;
&lt;p dir="ltr"&gt;The first foray by the Special Rapporteur into this broad area has resulted in a sweeping report, that covers almost every aspect of freedom of expression within the ICT sector, except competition which we will elaborate on later in this post.&lt;/p&gt;
&lt;h2 dir="ltr"&gt;Introduction&lt;/h2&gt;
&lt;p dir="ltr"&gt;The report aims to “provide guidance on how private actors should protect and promote freedom of expression in a digital age”. It identifies the relevant international legal framework as Article 19 of the &lt;a href="https://treaties.un.org/doc/Publication/UNTS/Volume%20999/volume-999-I-14668-English.pdf"&gt;International Covenant on Civil and Political Rights&lt;/a&gt;, and Article 19 of the &lt;a href="http://www.un.org/en/udhrbook/pdf/udhr_booklet_en_web.pdf"&gt;Universal Declaration of Human Rights&lt;/a&gt;. &amp;nbsp;The UN “Protect, Respect and Remedy” Framework and Guiding Principles, also known as the &lt;a href="http://business-humanrights.org/sites/default/files/reports-and-materials/Ruggie-report-7-Apr-2008.pdf"&gt;Ruggie Principles&lt;/a&gt; provide the framework for private sector responsibilities on business and human rights.&lt;/p&gt;
&lt;p dir="ltr"&gt;The report categorises different roles of the private sector in organising, accessing, regulating and populating the internet. This is important because the manner in which the ICT sector affects the freedom of expression is far more complicated than traditional communication industries. The report identifies the distinct impact of internet service providers, hardware and software companies, domain name registries and registrars, search engines, platforms, web hosting services, platforms, data brokers and e-commerce facilities on the freedom of expression.&lt;/p&gt;
&lt;h2&gt;Legal and Policy Issues&lt;/h2&gt;
&lt;div&gt;The Special Rapporteur discusses four distinct legal and policy issues that find relevance in respect of this problem statement: Content Regulation, Surveillance and Digital Security, Transparency and Remedies.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;Content Regulation&lt;/h3&gt;
&lt;p dir="ltr"&gt;The report identifies two main channels through which content regulation takes place: the state, and internal processes.&lt;/p&gt;
&lt;p&gt;Noting that digital content made on private networks is increasingly subject to State regulation, the report highlights the competing interests of intermediaries who manage platforms and States which demand for regulation of this content on grounds of defamation, blasphemy, protection of national security etc. This tension is demonstrated through vague laws that compel individuals and private corporations to over-comply and err on the side of caution “in order to avoid onerous penalties, filtering content of uncertain legal status and engaging in other modes of censorship and self-censorship.” Excessive intermediary liability forces intermediaries to over-comply with requests in order to ensure that local access to their platforms are not blocked. States attempt at regulating content outside the law through extra legal restrictions, and push private actors to take down content on their own initiative. Filtering content is another method, wherein States block and filter content through the private sector. Government blacklists, illegal content and suspended accounts are methods employed, and these have sometimes raised concerns of necessity and proportionality. &lt;a href="http://scroll.in/article/807277/whatsapp-in-kashmir-when-big-brother-wants-to-go-beyond-watching-you"&gt;Network or service shutdowns&lt;/a&gt; are classified as a “particularly pernicious” method of content regulation. Non neutral networks also are a method of content regulation with the possibilities of internet service providers throttling traffic. Zero rating is a potential issue, although the report acknowledges that “it remains a subject of debate whether they may be permissible in areas genuinely lacking Internet access”.&lt;/p&gt;
&lt;p&gt;The other node of content regulation has been identified as internal policies and practices of the private sector. &lt;a href="https://consentofthenetworked.com/author/rebeccamackinnon/"&gt;Terms of service&lt;/a&gt; restrictions are often tailored to the jurisdiction’s laws and policies and don’t always address the needs and interests of vulnerable groups. Further, the report notes, &lt;a href="http://www.catchnews.com/tech-news/facebook-free-basics-gatekeeping-powers-extend-to-manipulating-public-discourse-1452077063.html"&gt;design and engineering choices&lt;/a&gt; of how private players choose to curate content are algorithmically determined and increasingly control the information that we consume. &amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Transparency&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;The report notes that transparency enables those entities subject to internet regulation to take informed decisions about their responsibilities and liabilities in a digital sphere and points out, that there is a severe lack of transparency about government requests to restrict or remove content. Some states even prohibit the publication of such information, with India being one example. In respect of the private sector, content hosting platforms sometimes at least reveal the circumstances under which content is removed due to a government request, although this is rather erratic. The report recognises the need to balance transparency with competing concerns like security and trade secrecy, and this is a matter of continued debate.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3 dir="ltr"&gt;Surveillance and Digital Security&lt;/h3&gt;
&lt;p&gt;Freedom of expression concerns arise as data transmitted on private networks is gradually being subjected to surveillance and interference from the State and private actors. The report finds that several internet companies have reported an increase in government requests for customer data and user information. According to the Special Rapporteur, effective resistance strategies include inclusion of human rights guarantees, restrictively interpreting government requests negotiations. Private players also make surveillance and censorship equipment that enable States to intercept communications. Covert surveillance has been previously reported, with States tapping into communications as and when necessary. When private entities become aware of interception and covert surveillance, their human rights responsibilities arise. As private entities work towards enhancing encryption, anonymity and user security, states respond by &lt;a href="http://www.cnbc.com/2016/03/29/apple-vs-fbi-all-you-need-to-know.html"&gt;compelling companies&lt;/a&gt; to create loopholes for them to circumvent such privacy and security enhancing technology.&lt;/p&gt;
&lt;h3 dir="ltr"&gt;Remedies&lt;/h3&gt;
&lt;p&gt;Unlawful content removal, opaque suspensions, data security breaches are commonplace occurrences in the digital sphere. The ICCPR guarantees that all people whose rights have been violated must have an effective remedy, and similarly, the Ruggie principles require that remedial and grievance mechanisms must be provided by corporations. There is some ambiguity on how these complaint or appeal mechanisms should be designed and implemented, and the nature and structure of these mechanisms is also unclear. &amp;nbsp;The report states that it is necessary to investigate the role of the state in supplementing/regulating corporate mechanisms, its role in ensuring that there is a mechanism for remedies, and its responsibility to make sure that more easily and financially accessible alternatives exist for remedial measures.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h2&gt;&amp;nbsp;Special Rapporteur’s priorities for future work and thematic developments&lt;/h2&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Investigating laws, policies and extralegal measures that equip governments to impose restrictions on the provision of telecommunications and internet services. Examining the responsibility of companies to respond in a way that respects human rights, mitigates harm, and provides avenues for redress.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Evaluating content restrictions under terms of service and community standards. Private actors face substantial pressure from governments and individuals to restrict expression, and a priority is to evaluate the interplay of private and state actions on freedom of expression in light of human rights obligations and responsibilities.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Focusing on the legitimacy of rationales for intermediary liability for content hosting, restrictions, conditions for removing third party content.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Exploring censorship and surveillance within the human rights framework, and encouraging greater scrutiny before using these technologies for purposes that undermine the freedom of expression.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Identifying ways to balance an increasing scope of freedom of expression with the need to address governmental interests in national security and public order.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Internet access - &amp;nbsp;Future work will explore issues around access and private sector engagement and investment in ensuring affordability and accessibility, particularly considering marginalized groups.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Internet governance - Internet governance frameworks and reform efforts are sensitive to the needs of women, sexual minorities and other vulnerable communities. Throughout this future work, the Special Rapporteur will pay particular attention to legal developments (legislative, regulatory, and judicial) at national and regional levels.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h2&gt;Conclusions and Recommendations&lt;/h2&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;States: The report recommends that states should not pressurise the private sector to interfere with the freedom of speech and expression in a manner that does not meet the condition of necessary and proportionate principles. Any request to take down content or access customer information must be based on validly enacted law, subject to oversight, and demonstrate necessary and proportionate means of achieving the aims laid down in Article 19(3) of the ICCPR.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Private Actors: The Special Rapporteur recommends that private actors develop and implement transparent human rights assessment procedures, and develop policies keeping in mind their human rights impact. Apart from this, private entities should integrate commitments to the freedom of expression into internal processes and ensure the “greatest possible transparency”.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;International Organisations: The report recommends that organisations make resources and educational material on internet governance publicly accessible. The Special Rapporteur also recommends encouraging meaningful civil society participation in multi-stakeholder policy making and standard setting processes, with an increased focus on sensitivity to human rights.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h2&gt;CIS Comments&lt;/h2&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;CIS strongly agrees with the expansion of the Special Rapporteur’s scope that this report represents. &amp;nbsp;He is no longer looking solely at states but at the private sector too.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;CIS also notes that competition is an important aspect of the freedom of expression, but has not been discussed in this report. Viable alternatives to platforms, networks, internet service providers etc., will ensure a healthy, competitive marketplace, and will have a positive impact in resolving the issues identified above.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Our &lt;a href="http://cis-india.org/internet-governance/intermediary-liability-in-india.pdf/view"&gt;work&lt;/a&gt; has called for maintaining a balanced approach to liability of intermediaries for their users’ actions, since excessive liability or strict liability would lead to over-caution and removal of legitimate speech, while having no liability at all would make it difficult to act effectively against harmful speech, e.g., revenge porn.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;a href="http://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality"&gt;CIS’ work&lt;/a&gt; on network neutrality has highlighted the importance of neutrality for freedom of speech, and has advocated for an evidence-based approach that ensures there is neither under-regulation, nor over-regulation. &amp;nbsp;The Special Rapporteur suggests that ‘Zero-Rating’ practices always violate Net Neutrality, but the majority of the definitions of Net Neutrality proposed by academics and followed by regulators across the world often do not include Zero-Rating. &amp;nbsp;Similarly, he suggests that the main exception for Zero-Rating is for areas genuinely lacking access to the Internet, whereas the potential for some forms of Zero-Rating to further freedom of expression, especially of minorities, even in areas with access to the Internet, provides sufficient reason for the issue to merit greater debate.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;(Pranesh Prakash was invited by the Special Rapporteur to provide his views and took part in a meeting that contributed to this report)&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/un-special-rapporteur-report-on-freedom-of-expression-and-the-private-sector-a-significant-step-forward'&gt;https://cis-india.org/internet-governance/un-special-rapporteur-report-on-freedom-of-expression-and-the-private-sector-a-significant-step-forward&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vidushi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>UNHRC</dc:subject>
    
    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2016-06-08T17:27:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/un-special-rapporteur-on-the-right-to-privacy-consultation-on-privacy-and-gender">
    <title>UN Special Rapporteur on the Right to Privacy Consultation on 'Privacy and Gender'</title>
    <link>https://cis-india.org/internet-governance/news/un-special-rapporteur-on-the-right-to-privacy-consultation-on-privacy-and-gender</link>
    <description>
        &lt;b&gt;Ambika Tandon was a speaker at the Consultation on Privacy and Gender organised by the UN Special Rapporteur on the right to privacy held at New York University, New York on October 30 - 31, 2019. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The consultation was held to receive feedback on the report on privacy and gender towards which Pallavi, Aayush, Pranav and Ambika sent comments. Ambika was a speaker in t&lt;span&gt;he session 'The Body: as Data, as Identity, as &lt;/span&gt;&lt;span&gt;Money Maker', chaired by Eva Blum-Dumontet from Privacy &lt;/span&gt;&lt;span&gt;International, with co-panelists Anja Kovacs, Director, Internet &lt;/span&gt;&lt;span&gt;Democracy Project, and Joana Varon, Director, Coding Rights.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/un-special-rapporteur-on-the-right-to-privacy-consultation-on-privacy-and-gender'&gt;https://cis-india.org/internet-governance/news/un-special-rapporteur-on-the-right-to-privacy-consultation-on-privacy-and-gender&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-11-02T06:39:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/un-questionnaire-digital-innovation-technologies-right-to-health">
    <title>UN Questionnaire on Digital Innovation, Technologies and Right to Health</title>
    <link>https://cis-india.org/internet-governance/un-questionnaire-digital-innovation-technologies-right-to-health</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) contributed to the questionnaire put out by the Office of the United Nations High Commissioner for Human Rights, on digital innovation, technologies and the right to health. The responses were authored by Pahlavi and Shweta Mohandas, and edited by Indumathi Manohar. &lt;/b&gt;
        &lt;h3 style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/United.png" alt="United" class="image-inline" title="United" /&gt;&lt;/h3&gt;
&lt;h3 style="text-align: center; "&gt;&lt;span style="text-decoration: underline;"&gt;&lt;span&gt;&lt;b&gt;Questionnaire&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;&lt;b&gt;1. What are benefits of increased use of digital technologies in the planning and delivery of health information, services and care? Consider the use of digital technologies for healthcare services, the collection and use of health-related data, the rise of social media and mobile phones, and the use of artificial intelligence specifically to plan and deliver healthcare. Please share examples of how such technologies benefited specific groups. How have digital technologies contributed to availability, accessibility, acceptability and quality of healthcare? Has the use of artificial intelligence improved access to health information, services and care? Please comment on existing or emerging biases in health information, services and care.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The use of digital technologies and forms of digital health interventions has seen an increase in interest from governments, industries, as well as individuals since the beginning of the pandemic. The lockdowns, and other social distancing measures created a push towards telemedicine and online consultations. Digital health services provide a number of people the opportunity to seek medical help without traveling, which particularly help people with accessibility needs, the elderly, and anyone else that has difficulty in movement.1 Telemedicine can also help meet the challenges of healthcare delivery to rural and remote areas, in addition to serving as a means of training and education.2&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The pandemic brought about a push towards telehealth and telemedicine and the telemedicine market has been reported to touch $5.4 Bn by 2025,3 with a number of applications working to make it more accessible to people in India. With respect to AI there has been some adoption of AI in India to help the most vulnerable group of people. For example: Microsoft has teamed up with the Government of Telangana to use cloud-based analytics for the Rashtriya Bal Swasthya Karyakram program by adopting MINE (Microsoft Intelligent Network for Eyecare), an AI platform to reduce avoidable blindness in children.4 Similarly Philips Innovation Campus (PIC) in Bengaluru, Karnataka is harnessing technology to make solutions for TB detection from chest x-rays, and a software solution (Mobile Obstetrics Monitoring) to identify and manage high-risk pregnancies.5 More recently IWill by ePsyClinic, a mental-health platform in India, has received a grant from Microsoft's 'AI for Accessibility' program to accelerate the building of a Hindi-based AI Mental Health conversational program.6&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However the use of digital technologies and online medical interventions has also widened the increasing gap between those who can afford a smart phone and internet and those who cannot. A digital-only health intervention also results in excluding a wide number of people who do not have a smartphone, for example the Indian contact-tracing app, Aarogya Setu, which was a mandatory download to access public places during the lockdown was initially only available via a smartphone. Additionally, the app initially was not compatible with screen readers.7 The disparities in digital access and infrastructure is not limited to individuals— a report by the Ministry of Electronics and Information Technology India highlighted that the government hospitals and dispensaries have very little ICT infrastructure with only some major public hospitals having computers and connectivity.8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As stated above, the adoption of digital health technologies is not uniform around the world, and the people who are not able to access these technologies missed being included in the data that is being collected by these systems, further excluding from the data set which might be used to train future interventions. In the same light, digital technologies such as AI based screening are based on historical data that have been proved to contain biases against&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;marginalised communities. Continuing to use these systems without addressing these biases and or including more diverse dataset results in the same people being marginalised and misdiagnosed further. For example, safety apps where data is provided by limited people could identify Dalit and Muslim areas as unsafe, reflecting the prejudices of the app’s middleand upper-class users.9 While this has not been revealed in healthcare apps, the growing use of CCTVs and subsequent use of facial recognition in only certain pockets of the city reveal the historical biases in the police system that lead to targeted surveillance.10&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. How has the rise of web platforms and social media increased access to health information and services, or conversely, increased risk of misdiagnosis or other harms? Please share examples of ways in which social media and web platforms facilitated innovation in access to evidence-based health information and services, or created new threats of discrimination, mental health harms, or online or offline violence.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media platforms have helped people immensely during the pandemic. For example, when people reached out to strangers for help for hospital beds and oxygen. However, the benefits of such were limited to people who were on social media and had the reach and networks to share such information.11Furthermore, social media and messaging apps such as Whatsapp also led to the spread of misinformation during the pandemic. For example a Whatsapp message claiming to be from the Ministry of Aayush which permitted homeopathy doctors to treat Covid19 spread significantly, leading to the official government channels clarifying that it is fake and cautioning people against it.12 It was also noted that at times when women shared requests for beds or oxygen during covid on social media, they were faced with fake calls, stalking and trolling on social media, making it harder for them to seek help.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. How has the right to privacy been impacted by the use of digital technologies for health? Please share examples of ways in which data gathered from digital technologies have been used by States, commercial entities or other third parties to either benefit or harm groups regarding the right to health.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2006, the National e-Governance Plan (NeGP) was approved by the Indian State wherein a massive infrastructure was developed to reach the remotest corners and facilitate easy access of government services efficiently at affordable costs.13There has been a paradigm shift in the Indian state’s governance strategy, with severe implications for privacy and inclusion. However, this shift has been undertaken primarily through a series of administrative orders with no real legislative mandate and minimal judicial oversight. This digitisation began with services such as taxation, land record, passport details, but it soon extended its ambit, and it now covers most services for which the citizen is dependent upon the state— the latest being digital health.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the Indian context, there have been a number of policies that have been published which dealt with digital health. The policies looked at creating a digital health ID, digitisation of health data, and the management of health data. However these policies are being introduced without the existence of a comprehensive data protection legislation. While there are certain safeguards mentioned in each policy, without privacy and data protection legislation it is impossible to ensure compliance and the rights of the data owners. This issue became a reality when during the vaccination for Covid, some vaccination centres created Health ID for people without their consent.14&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. What are current strengths or weaknesses of digital health governance at national, regional and global levels? Please provide examples of laws, regulations or other safeguards that has been put in place to protect and fulfill the rights to health, privacy, and confidentiality within the use of digital technologies for health? Do restrictive laws or law enforcement create any specific challenges for persons using digital technologies to access health information or services?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Digitisation of the healthcare system in India had started prior to the pandemic. However, the pandemic also saw a slew of digitisation policies being rolled out, the most notable being the National Digital Health Mission (re-designed as the Aayushman Bharat Digital Mission) which empowered and saw the government use the vaccination process to generate Health IDs for citizens, in several reported cases without their knowledge or consent.15 The entire digitisation process has been undertaken in the absence of any legislative mandate or judicial oversight. It has primarily been undertaken through issuance of executive notifications and resulting in absent or inadequate grievance redressal mechanisms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rollout of the NDHM also saw health IDs being generated for citizens. In several reported cases across states, this rollout happened during the Covid-19 vaccination process— without the informed consent of the concerned person. All of these developments took place in the absence of a data protection law and a law regulating the digital health sphere, raising critical concerns around citizens’ privacy and the governance and oversight mechanisms for digital health initiatives.&lt;/p&gt;
&lt;hr /&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt; Valdez, R. S., Rogers, C. C., Claypool, H., Trieshmann, L., Frye, O., Wellbeloved-Stone, C., &amp;amp; Kushalnagar, P. (2021). Ensuring full participation of people with disabilities in an era of telehealth. Journal of the American Medical Informatics Association, 28(2), 389-392.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Paul, Hickok, Sinha, &amp;amp; Tiwari. (2018). Artificial Intelligence in the Healthcare Industry in India. Centre for Internet and Society India. Retrieved November 15, 2022, from https://cis-india.org/internet-governance/ai-and-healthcare-report/view&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Dayalani, V., K., H., S., G., R., T., &amp;amp; M., L. (2021, February 15). 1mg Rises In Indian Telemedicine Space As Sector Set To Touch $5.4 Bn Market Size by 2025. Inc42 Media. Retrieved November 15, 2022, from https://inc42.com/datalab/telemedicine-a-post-covid-reality-in-india/&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Government of Telangana adopts Microsoft Cloud and becomes the first state to use Artificial Intelligence for eye care screening for children - Microsoft Stories India. (2017, August 3). Microsoft Stories India. Retrieved November 15, 2022, from https://news.microsoft.com/en-in/governmenttelangana-adopts-microsoft-cloud-becomes-first-state-use-articial-intelligence-eye-care-screeningchildren/&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;D’Monte, L. (2017, February 15). &lt;i&gt;How Philips is using AI to transform healthcare&lt;/i&gt;. Mint. Retrieved November 15, 2022, from https://www.livemint.com/Science/yxgekz1jJJ3smvvRLwmaAL/How-Philips-is-using-AI-to-transformhealthcare.html&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;PTI. (2022, November 11). Microsoft supports IWill with “AI for Accessibility” grant to develop AI CBT mental health program for 615 million Hindi users. Microsoft Supports IWill With “AI for Accessibility”Grant to Develop AI CBT Mental Health Program for 615 Million Hindi Users. Retrieved November 15,2022, from https://www.ptinews.com/pti/Microsoft-supports-IWill-with--AI-for-Accessibility--grant-todevelop-AI-CBT-mental-health-program-for-615-million-Hindi-users/58238.html&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Nath. (2020, May 2). &lt;i&gt;Coronavirus | Mandatory Aarogya Setu app not accessible to persons with disabilities&lt;/i&gt;.Coronavirus | Mandatory Aarogya Setu App Not Accessible to Persons With Disabilities - the Hindu. Retrieved November 15, 2022, from https://www.thehindu.com/news/national/coronavirus-mandatory-aarogya-setu-app-notaccessible-to-persons-with-disabilities/article31489933.ece&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sharma, N. C. (2018, July 16). &lt;i&gt;Adoption of e-medical records facing infra hurdles: Report&lt;/i&gt;. Mint. Retrieved November 15, 2022, from https://www.livemint.com/Politics/CucBmKaoWLZuSf1Y9VaafM/Adoption-of-emedical-recordsfacing-infra-hurdles-Report.html&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;https://www.livemint.com/news/world/ai-algorithms-far-from-neutral-in-india-11613617957200.html&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Vipra. (n.d.). &lt;i&gt;The Use of Facial Recognition Technology for Policing in Delhi&lt;/i&gt;. Vidhi Centre for Legal Policy. Retrieved November 15, 2022, from https://vidhilegalpolicy.in/research/the-use-of-facial-recognition-technology-for-policingin-delhi/&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kalra, A., &amp;amp; Ghoshal, D. (2021, April 21). Twitter becomes a platform of hope amid the despair of India’s COVID crisis. Reuters. Retrieved November 15, 2022, from https://www.reuters.com/world/india/twitterbecomes- platform-hope-amid-despair-indias-covid-crisis-2021-04-21/&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Times of India . (2020, April 29). WhatsApp message on Homeopathy and coronavirus treatment is fake- Times of India. The Times of India. Retrieved November 15, 2022, from https://timesondia.indiatimes.com/gadgets-news/whatsapp-message-on-homeopathy-and-coronavirustreatment-is-fake/articleshow/75425274.cms&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Amber Sinha, Pallavi Bedi and Amber Sinha, “Techno-Solutinist Responses to Covid 19”, EPW, Vol LVI, No. 29, July 17, 2021 Retrieved from: https://www.epw.in/journal/2021/29/commentary/technosolutionist-responses-covid-19.html&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Rana, C. (2021, October 1). &lt;i&gt;COVID-19 vaccine beneficiaries were assigned unique health IDs without their consent&lt;/i&gt;.The Caravan. Retrieved November 15, 2022, from https://caravanmagazine.in/health/covid-19-vaccinebeneficiaries-were-assigned-unique-health-ids-without-their-consent&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/un-questionnaire-digital-innovation-technologies-right-to-health'&gt;https://cis-india.org/internet-governance/un-questionnaire-digital-innovation-technologies-right-to-health&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pahlavi and Shweta Mohandas</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Digital Technologies</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    

   <dc:date>2022-11-21T16:10:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online">
    <title>UN Human Rights Council urged to protect human rights online</title>
    <link>https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online</link>
    <description>
        &lt;b&gt;63 civil society groups urged the UN Human Rights Council to address global challenges to freedom of expression, privacy and other human rights on the Internet. Centre for Internet &amp; Society joined in the statement, delivered on behalf of the 63 groups by Article 19. 
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The 26th session of the United Nations Human Rights Council (UNHRC) is currently ongoing (June 10-27, 2014). &lt;span&gt;On June 19, 2014, 63 civil society groups joined together to urge the United Nations Human Rights Council to protect human rights online and address global challenged to their realization. Centre for Internet &amp;amp; Society joined in support of the statement ("&lt;strong&gt;the Civil Society Statement&lt;/strong&gt;"), which was delivered by Article 19 on behalf of the 63 groups.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its consensus resolution &lt;a class="external-link" href="http://ap.ohchr.org/documents/dpage_e.aspx?si=A/HRC/RES/20/8"&gt;A/HRC/20/8 (2012)&lt;/a&gt;, the UNHRC affirmed that the "&lt;span&gt;&lt;i&gt;same rights that people have offline must also be protected online, in particular freedom of expression, which is applicable regardless of frontiers and through any media of one’s choice&lt;/i&gt;". India, a current member of the UNHRC, stood in support of resolution 20/8. The protection of human rights online was also a matter of popular agreement at &lt;a class="external-link" href="http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf"&gt;NETmundial 2014&lt;/a&gt;, which similarly emphasised the importance of protecting human rights online in accordance with international human rights obligations. Moreover, the WSIS+10 High Level Event, organised by the ITU in collaboration with other UN entities, emphasized the criticality of expanding access to ICTs across the globe, including infrastructure, affordability and reach.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Civil Society Statement at HRC26 highlights the importance of retaining the Internet as a global resource - a democratic, free and pluralistic platform. However, the recent record of freedom of expression and privacy online have resulted in a deficit of trust and free, democratic participation. &lt;a class="external-link" href="http://www.nytimes.com/2014/03/21/world/europe/turkish-officials-block-twitter-in-leak-inquiry.html"&gt;Turkey&lt;/a&gt;, &lt;a class="external-link" href="http://www.bbc.com/news/blogs-trending-25756864"&gt;Malaysia&lt;/a&gt;, &lt;a class="external-link" href="http://www.washingtonpost.com/blogs/monkey-cage/wp/2014/05/27/thailands-cybercoup/"&gt;Thailand&lt;/a&gt;, &lt;a class="external-link" href="http://www.theguardian.com/world/2014/jun/02/egypt-police-monitor-social-media-dissent-facebook-twitter-protest"&gt;Egypt&lt;/a&gt; and &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/Facebook-under-fire-for-blocking-pages-in-Pakistan/articleshow/36194872.cms"&gt;Pakistan&lt;/a&gt; have blocked web-pages and social media content, while Edward Snowden's &lt;a class="external-link" href="https://www.eff.org/deeplinks/2014/05/looking-back-one-year-after-edward-snowden-disclosures-international-perspective"&gt;revelations&lt;/a&gt; have heightened awareness of human rights violations on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At a time when governance of the Internet and its institutions is evolving, a human rights centred perspective is crucial. Openness and transparency - both in the governance of Internet institutions and rights online - are crucial to continuing growth of the Internet as a global, democratic and free resource, where freedom of expression, privacy and other rights are respected regardless of location or nationality. In particular, the Civil Society Statement calls attention to &lt;a class="external-link" href="https://en.necessaryandproportionate.org/take-action/EFF"&gt;principles of necessity and proportionality&lt;/a&gt; to regulate targeted interception and collection of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UNHRC, comprising 47 member states, is called upon to address these global challenges. Guided by resolutions A/HRC/20/8 and &lt;a class="external-link" href="http://www.un.org/ga/search/view_doc.asp?symbol=A/C.3/68/L.45/Rev.1"&gt;A/RES/68/167&lt;/a&gt;, the WSIS+10 High Level Event &lt;a class="external-link" href="http://www.itu.int/wsis/implementation/2014/forum/inc/doc/outcome/362828V2E.pdf"&gt;Outcome Documents&lt;/a&gt; (especially operative paragraphs 2, 8 and 11 of the Vision Document) and the &lt;a class="external-link" href="http://www.ohchr.org/EN/Issues/DigitalAge/Pages/DigitalAgeIndex.aspx"&gt;forthcoming report&lt;/a&gt; of the UN High Commissioner for Human Rights regarding privacy in the digital age, the UNHRC as well as other states may gather the opportunity and intention to put forth a strong case for human rights online in our post-2015 development-centred world.&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Civil Society Statement:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The full oral statement can be accessed &lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/unhrc-civil-society-statement-26th-session" class="internal-link"&gt;here&lt;/a&gt;&lt;/b&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online'&gt;https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Human Rights Online</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>UNHRC</dc:subject>
    

   <dc:date>2014-06-19T13:28:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-december-27-2012-surabhi-agarwal-un-agrees-to-review-agencies-governing-internet">
    <title>UN agrees to review agencies governing Internet</title>
    <link>https://cis-india.org/news/livemint-december-27-2012-surabhi-agarwal-un-agrees-to-review-agencies-governing-internet</link>
    <description>
        &lt;b&gt;Although India’s proposal has been criticized as an effort to control the Net, govt says this will ensure it has more say in policymaking.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Surabhi Agarwal was &lt;a class="external-link" href="http://www.livemint.com/Industry/noxrdKdOmZMnXGpXyGzXUO/UN-agrees-to-review-agencies-governing-Internet.html"&gt;published in Livemint on December 27, 2012&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the fierce debate on who governs the Internet, the Indian government can claim a small victory of sorts after the UN decided to establish a working group to review the mandate of agencies administering the worldwide network of computers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India last year proposed creating an UN agency, dubbed the Committee on Internet-Related Policies (CIRP), that would decide on issues related to the Internet, including control of resources such as domain names and Internet Protocol (IP) addresses. The Internet Corporation for Assigned Names and Numbers (Icann), a non-governmental organization based in the US, currently administers these.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The US, the UK and Canada refused to sign a new communications treaty proposed at the 3-14 December Dubai conference of the International Telecommunications Union (ITU), which sets global telecom technical standards, on fears that it will give national governments greater control over the Internet and may restrict free speech. India, too, hasn’t signed the pact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Even though the United Nations has not yet accepted India’s proposal for constituting CIRP, it (the formation of a working group) is a step forward, as now the working group on enhanced cooperation will deliberate on the need for CIRP,” a government official said, requesting anonymity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although India’s proposal has been criticized as an effort to control the Internet, the government has said this will ensure it has a greater say in Internet policymaking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Commission on Science and Technology for Development, a UN body, has been asked to establish a working group on enhanced cooperation to examine the mandate of the World Summit on the Information Society, which issues non-binding guidelines on the Internet, “through seeking, compiling and reviewing inputs from all member states and all other stakeholders,” according to a 12 December letter from the UN to the Indian government. The working group has been asked to submit its report to the commission in 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mint &lt;/i&gt;has reviewed a copy of the letter and also India’s response to the UN welcoming the move.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UN’s move reflected India’s growing influence in multilateral policymaking bodies, according to &lt;a href="http://www.livemint.com/Search/Link/Keyword/Rajat%20Kathuria"&gt;Rajat Kathuria&lt;/a&gt;, chief executive and director of Indian Council for Research on International Economic Relations, a think tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“India’s increasing clout not only in the WTO (World Trade Organisation) but also in these kinds of forums is fairly obvious,” he said. The country should be able to stand its ground and use its negotiating powers well, he added. “Everybody is looking at India now and it should not be forced into getting into things it doesn’t want to.” Kathuria also agreed with India’s decision to consider in detail the new global telecom pact, which contains a resolution on the Internet, before signing it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We don’t have enough information on the impact of signing this treaty,” Kathuria said. “I agree with what India has done. We need to do our homework and understand clearly what it means.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the treaty is restricted to telecom standards, it contained a non-binding resolution on the Internet. The treaty stated that its purview doesn’t include content over telecommunications networks or the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there have been divergent views on its implications. While some have argued that signing it would mean giving the ITU dominance over Internet governance, others dismiss it as harmless.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This wasn’t an ITU takeover of the Internet and India’s signing of the treaty will not make it one,” said &lt;a href="http://www.livemint.com/Search/Link/Keyword/Pranesh%20Prakash"&gt;Pranesh Prakash&lt;/a&gt;, policy director at Centre for Internet Studies, a Bangalore-based think tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, India’s cautious approach is a good sign, he said. “I hope civil society is consulted before the decision is taken whether to support ITR (International Telecommunication Regulations) and the resolutions which were passed in Dubai.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Critical Internet resources such as domain names and IP addresses are like natural resources and no one country should monetize them or have control over them, said another government official.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is of utmost importance for India to have a say in the matters of the Internet as the country has huge untapped potential in the area of Internet and technology,” said the official, who too declined to be named.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A white paper on Internet governance by Research and Information System for Developing Countries, chaired by &lt;a href="http://www.livemint.com/Search/Link/Keyword/Shyam%20Saran"&gt;Shyam Saran&lt;/a&gt;, former Indian diplomat, has said the Internet continues to be managed by private entities such as Icann “under contractual arrangements with the US government”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Icann is not controlled by the US government, an official of the Internet administrator said on condition of anonymity. It follows a multi-stakeholder model.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The paper on Internet governance argued against the allegation that India’s proposal of CIRP will lead to government’s control of the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“India’s proposal for CIRP, a multilateral and multi-stakeholder mechanism, is not intended to control content,” it said. “It does not insist that the governments have the last word in regulating the Internet.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The paper had argued that India should pursue the establishment of a working group on enhanced cooperation, which will pave the way for further consideration of India’s proposal for the establishment of CIRP.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-december-27-2012-surabhi-agarwal-un-agrees-to-review-agencies-governing-internet'&gt;https://cis-india.org/news/livemint-december-27-2012-surabhi-agarwal-un-agrees-to-review-agencies-governing-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-12-31T02:40:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability">
    <title>UK’s Interception of Communications Commissioner — A Model of Accountability</title>
    <link>https://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability</link>
    <description>
        &lt;b&gt;The United Kingdom maintains sophisticated electronic surveillance operations through a number of government agencies, ranging from military intelligence organizations to police departments to tax collection agencies. However, all of this surveillance is governed by one set of national laws outlining specifically what surveillance agencies can and cannot do.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The primary law that governs government investigations is the Regulation of Investigatory Powers Act 2000, abbreviated as RIPA 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To ensure that this law is being followed and surveillance operations in the United Kingdom are not conducted illegally, the RIPA 2000 Part I establishes an Interception of Communications Commissioner, who is tasked with inspecting the surveillance operations, assessing their legality, and compiling an annual &lt;a href="http://www.iocco-uk.info/docs/2013%20Annual%20Report%20of%20the%20IOCC%20Accessible%20Version.pdf"&gt;report&lt;/a&gt; to for the Prime Minister.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On April 8, 2014 the current Commissioner, Rt Hon. Sir Anthony May, laid the 2013 annual report before the House of Commons and the Scottish Parliament. In its introduction, the report notes that it is responding to concerns raised as a result of Edward Snowden’s actions, especially misuse of powers by intelligence agencies and invasion of privacy. The report also acknowledges that the laws governing surveillance, and particularly RIPA 2000, are difficult for the average citizen to understand, so the report includes a narrative outline of relevant provisions in an attempt to make the legislation clear and accessible. However, the report points out that while the Commissioner had complete access to any documents or investigative records necessary to construct the report, the Commissioner was unable to publish surveillance details indiscriminately, due to confidentiality concerns in a report being issued to the public. (It is worth noting here that though the Commissioner is one man, he has an entire agency working under him, so it is possible that he himself did not do or write all of that the report attributes to him). As a whole, the report outlines a series of thorough audits of surveillance operations, and reveals that the overwhelming majority of surveillance in the UK is conducted entirely legally, and that the small minority of incorrectly conducted surveillance appears to be unintentional. Looking beyond the borders of the United Kingdom, the report represents a powerful model of a government initiative to ensure transparency in surveillance efforts across the globe.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Role of the Commissioner&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The report begins in the first person, by outlining the role of the Commissioner. May’s role, he writes, is primarily to audit the interception of data, both to satisfy his own curiosity and to prepare a report for the Prime Minister. Thus, his primary responsibility is to review the lawfulness of surveillance actions, and to that end, his organization possesses considerable investigative powers. He is also tasked with ensuring that prisons are legally administrated, though he makes this duty an afterthought in his report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Everyone associated with surveillance or interception in the government must disclose whatever the commissioner asks for. In short, he seems well equipped to carry out his work. The Commissioner has a budget of £1,101,000, almost all of which, £948,000 is dedicated to staff salaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report directly addresses questions about the Commissioner’s ability to carry out his duties. Does the Commissioner have full access to whatever materials or data it needs to conduct its investigations, the report asks, and it answers bluntly, yes. It is likely, the report concludes, that the Commissioner also has sufficient resources to adequately carry out his duties. Yes, the Commissioner is fully independent from other government interests; the commissioner answers his own question. Finally, the report asks if the Commissioner should be more open in his reports to the public about surveillance, and he responds that the sensitivity of the material prohibits him from disclosing more, but that the report adequately addresses public concern regardless. There is a degree to which this question and answer routine seems self-congratulatory, but it is good to see that the Commissioner is considering these questions as he carries out his duties.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Interception of Communications&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The report first goes into detail about the Commissioner’s audits of communications interception operations, where interception means wiretapping or reading the actual content of text messages, emails, or other communications, as opposed to the metadata associated with communications, such as timestamps and numbers contacted. In this section, the report outlines the steps necessary to conduct an interception, outlining that an interception requires a warrant, and only a Secretary of State (one of five officials) can authorize an interception warrant. Moreover, the only people who can apply for such warrants are the directors of various intelligence, police, and revenue agencies. In practice, the Secretaries of State have senior staff that read warrant applications and present those they deem worthy to the Secretary for his or her signature, as their personal signature is required for authorization.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For a warrant to be granted, it must meet a number of criteria. First, interception warrants must be &lt;i&gt;necessary&lt;/i&gt; in the interests of national security, to prevent or detect serious crime, or to safeguard economic wellbeing of the UK. Additionally, a warrant can be granted if it is necessary for similar reasons in other countries with mutual assistance agreements with the UK. Warrants must be &lt;i&gt;proportionate &lt;/i&gt;to the ends sought. Finally, interception warrants for communications inside the UK must specify either a person or a location where the interception will take place. Warrants for communications outside of the UK require no such specificity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2013, 2760 interception warrants were authorized, 19% fewer warrants than in 2012. The Commissioner inspected 26 different agencies and examined 600 different warrants throughout 2013. He gave inspected agencies a report on his findings after each inspection, so they could see whether or not they were following the law. He concluded that the agencies that undertake interception “do so lawfully, conscientiously, effectively, and in our national interest.” Thus, all warrants adequately meet the application and authorization requirements outlined in RIPA 2000.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Communications Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The report goes on to discuss communications data collection, where communications data refers to metadata–not the content of the communications itself, but data associated with it, such as call durations, or a list of email recipients. The Commissioner explains that metadata is easier to obtain than an interception warrant. Designated officials in their respective surveillance organization read and grant metadata warrant applications, instead of one of the Secretaries of State who could grant interception warrants. Additionally, the requirements for a metadata warrant are looser than for interception warrants. Metadata warrants must still be necessary, but necessary for a broader range of causes, ranging from collecting taxes, protecting public health, or for &lt;i&gt;any&lt;/i&gt; purpose specified by a Secretary of State.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The relative ease of obtaining a metadata warrant is consistent with a higher number of warrants approved. In 2013, 514,608 metadata warrants were authorized, down from 570,135 in 2012. Local law enforcement applied for 87.5% of those warrants while intelligence agencies accounted for 11.5%. Only a small minority of requests was sent from the revenue office or other departments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The purposes of these warrants were similarly concentrated. 76.9% of metadata warrants were issued for prevention or detection of crime. Protecting national security justified 11.4% of warrants and another 11.4% of warrants were issued to prevent death or injury. 0.2% of warrants were to identify people who had died or otherwise couldn’t identify themselves, 0.11% of warrants were issued to protect the economic wellbeing of the United Kingdom, and 0.02% of warrants were associated with tax collection. The Commissioner identified less than 0.01% of warrants as being issued in a miscarriage of justice, a very low proportion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Commissioner inspected metadata surveillance efforts, conducting 75 inspections in 2013, and classified the practices of those operations inspected as good, fair or poor. 4% of operations had poor practices. He noticed two primary errors. The first was that data was occasionally requested on an incorrect communications address, and the second was that he could not verify that some metadata was not being stored past its useful lifetime. May highlighted that RIPA 2000 does not give concrete lengths for which data should be stored, as Section 15(3) states only that data must be deleted “as soon as there are no longer grounds for retaining it as necessary for any of the authorized purposes.”  He noted that he was only concerned because some metadata was being stored for longer periods than associated interception data. As May put it, “I have yet to satisfy myself fully that some of these periods are justified and in those cases I required the agencies to shorten their retention periods or, if not, provide me with more persuasive reasons.” The Commissioner seems determined that this practice will either be eliminated or better justified to him in the near future.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Indian Applications&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The United Kingdom’s Interception of Communications Commissioner has similar powers to the Indian Privacy Commissioner suggested by the &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report&lt;/a&gt; of the Group of Experts on Privacy.  Similar to the United Kingdom, it is recommended that a Privacy Commissioner in India have investigative powers in the execution of its charter, and that the Privacy Commissioner represent citizen interests, ensuring that data controllers are in line with the stipulated regulations. The Report also broadly states that “with respect to interception/access, audio &amp;amp; video recordings, the use of personal identifiers, and the use of bodily or genetic material, the Commissioner may exercise broad oversight functions.”  In this way, the Report touches upon the need for oversight of surveillance, and suggests that this responsibility may be undertaken by the Privacy Commissioner, but does not clearly place this responsibility with the Privacy Commissioner. This raises the question of if India should adopt a similar model to the United Kingdom – and create a privacy commissioner – responsible primarily for overseeing and enforcing data protection standards, and a separate surveillance commissioner – responsible for overseeing and enforcing standards relating to surveillance measures. When evaluating the different approaches there are a number of considerations that should be kept in mind:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Law enforcement and security agencies are the exception to a number of data protection standards including access and disclosure.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;There is a higher level of ‘sensitivity’ around issues relating to surveillance than data protection and each needs to be handled differently. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ‘competence’ required to deliberate on issues related to data protection is different then the ‘competence’ required deliberating on issues related to surveillance.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Additionally, this raises the question of whether India needs a separate regulation governing data protection and a separate regulation governing surveillance.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Allegations of Wrongdoing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It is worth noting that though May describes surveillance operations conducted in compliance with the law, many other organizations have accused the UK government of abusing their powers and spying on citizens and internet users in illegal ways. The GCHQ, the government’s communications surveillance center has come under particular fire. The organization has been accused indiscriminate spying and introducing malware into citizen’s computers, among other things. Led by the NGO Privacy International, internet service providers around the world have &lt;a href="http://www.theguardian.com/world/2014/jul/02/isp-gchq-mass-surveillance-privacy-court-claim"&gt;recently&lt;/a&gt; lodged complaints against the GCHQ, alleging that it uses malicious software to break into their networks. Many of these &lt;a href="http://www.theguardian.com/uk-news/2014/may/13/gchq-spy-malware-programme-legal-challenge-privacy-international"&gt;complaints&lt;/a&gt; are based on the information brought to light in Edward Snowden’s document leaks. Privacy International alleges that malware distributed by GCHQ enables access to any stored content, logging keystrokes and “the covert and unauthorized photography or recording of the user and those around him,” which they claim is similar to physically searching through someone’s house unbeknownst to them and without permission. They also accuse GCHQ malware of leaving devices open to attacks by others, such as identity thieves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Snowden’s files also indicate a high level of collaboration between GCHQ and the NSA. According to the &lt;a href="http://www.theguardian.com/uk-news/2013/aug/02/gchq-accused-selling-services-nsa"&gt;Guardian&lt;/a&gt;, which analyzed and reported on many of the Snowden files, the NSA has in past years paid GCHQ to conduct surveillance operations through the US program called Prism. Leaked documents &lt;a href="http://www.theguardian.com/uk-news/2013/aug/02/gchq-accused-selling-services-nsa"&gt;report&lt;/a&gt; that the British intelligence agency used Prism to generate 197 intelligence reports in the year to May 2012. Prism is not mentioned at all in the Interception of Communications Commissioner’s report. In fact, while the report’s introduction explains that it will attempt to address details revealed in Snowden’s leaked documents, very little of what those documents indicate is later referenced in the report. May ignores the plethora of accusations of GCHQ wrongdoing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, while May’s tone appears genuine and sincere, the details of his report do little to dispel fears of widespread surveillance. It is unclear whether May is being totally forthcoming in his report, especially when he devotes so little energy to directly responding to concerns raised by Snowden’s leaks.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;May wrapped up his report with some reflections on the state of surveillance in the United Kingdom. He concluded that RIPA 2000 protects consumers in an internet age, though small incursions are imaginable, and especially lauds the law for it’s technological neutrality. That is, RIPA 2000 is a strong law because it deals with surveillance in general and not with any specific technologies like telephones or Facebook, use of which changes over time. The Commissioner also was satisfied that powers were not being misused in the United Kingdom. He reported that there have been a small number of unintentional errors, he noted, and some confusion about the duration of data retention. However, any data storage mistakes seemed to stem from an unspecific law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite May’s report of surveillance run by the books, other UK groups have accused GCHQ, the government’s communications surveillance center, of indiscriminate spying and introducing malware into citizen’s computers. &lt;a href="https://www.privacyinternational.org/press-releases/privacy-international-files-legal-challenge-against-uk-government-over-mass"&gt;Privacy International has submitted a claim arguing that a litany of malware is employed by the GCHQ to log detailed personal data such as keystrokes.&lt;/a&gt; The fact that May’s report does little to disprove these claims casts the Commissioner in an uncertain light.  It is unclear whether surveillance is being conducted illegally or, as the report suggests, all surveillance of citizens is being conducted as authorized.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Still, the concept of a transparency report and audit of a nation’s surveillance initiatives report is a step towards government accountability done right, and should serve as a model for enforcement methods in other nations. May’s practice of giving feedback to the organizations he inspects allows them to improve, and the public report he releases serves as a deterrent to illegal surveillance activity. The Interception of Communications Commissioner–provided he reports truthfully and accurately–is what gives the safeguards built into the UK’s interception regime strength and accountability. In other nations looking to establish privacy protections, a similar role would make their surveillance provisions balanced with safeguards and accountability to ensure that the citizens fundamental rights–including the right to privacy–are not compromised.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability'&gt;https://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>joe</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-24T06:08:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/uk-dna-database-and-european-court-of-human-rights-lessons-that-india-can-learn-from-mistakes">
    <title>UK DNA Database and the European Court of Human Rights: Lessons that India can Learn from Its Mistakes</title>
    <link>https://cis-india.org/internet-governance/uk-dna-database-and-european-court-of-human-rights-lessons-that-india-can-learn-from-mistakes</link>
    <description>
        &lt;b&gt;On September 24, 2012, the Centre for Internet &amp; Society in collaboration with the Alternative Law Forum invites the public to a talk with international experts, Helen Wallace from GeneWatch, UK and Jeremy Gruber from the Council for Responsible Genetics in the United States. The meeting will be held at the Centre for Internet &amp; Society office in Bangalore from 5.00 p.m. to 7.30 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The UK National DNA Database was the first to be established, in 1995, and is the largest per capita in the world. A major DNA expansion programme began in 2000 but is now being rolled back by the implementation of a new Protection of Freedoms Act, following a judgment against the UK government by the European Court of Rights. The lessons for the UK experience for the DNA Bill in India will be discussed, including the need for safeguards to protect privacy and rights, maintain public trust in police use of DNA, and prevent miscarriages of justice.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;Dr. Helen Wallace&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Dr. Helen Wallace is Director of GeneWatch UK, a not-for-profit organisation which aims to engage members of the public in ensuring that genetic science and technologies are used in the public interest. She is the author of numerous articles and book chapters on the social and ethical issues raised by DNA databases and is widely quoted in the UK press. Helen provided expert evidence to the applicants in the case of &lt;i&gt;S. and Marper v. the UK&lt;/i&gt; at the European Court of Human Rights, in which the Court ruled unanimously that the indefinite retention of innocent people's DNA database records was in breach of the European Convention on Human Rights. She has supplied both oral and written evidence on this issue to numerous parliamentary committees including the Scottish Parliament’s Justice Committee and the UK Science and Technology, Home Affairs and Constitutional Committees, as well as the scrutiny committee for the Protection of Freedoms Act, 2012. This new Act requires the removal of about a million innocent people's records from the UK National DNA Database and the destruction of all stored biological samples.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;Jeremy Gruber&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Jeremy Gruber is the President and Executive Director of Council for Responsible Genetics. Jeremy joined CRG in March 2009.  Previously he served as the legal director of the National Workrights Institute, a human rights organization dedicated to the rights of American workers. Prior to that he served as the field director for the ACLU’s National Taskforce on Civil Liberties in the Workplace. Jeremy has worked for over a decade on genetic non-discrimination legislation at the state and Federal level. He helped author and pass numerous state laws on genetic non-discrimination. Jeremy is a founder and executive committee member of the Coalition for Genetic Fairness, a group of 500 organizations that advocated for genetic non-discrimination legislation on Capitol Hill and played a major role in the recently passed Genetic Information Non-Discrimination Act (GINA) by Congress. He worked closely with members of Congress and staff on GINA language as well as strategy and support. He is a prolific writer on privacy issues and is often consulted by state legislatures. He is regularly featured in print, radio and television.  Jeremy holds a Juris Doctor (J.D.) from St. John’s University School of Law and a B.A. in Politics from Brandeis University.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="visualHighlight"&gt;&lt;a href="https://cis-india.org/internet-governance/indian-draft-dna-profiling-act.pdf" class="internal-link"&gt;Overview and Concerns Regarding the Indian Draft DNA Profiling Act&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Forensic DNA: A Human Rights Challenge&lt;/h3&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/JwSdJ0dUH7E" width="315"&gt;&lt;/iframe&gt;&lt;br /&gt;The &lt;a class="external-link" href="http://www.youtube.com/watch?feature=player_embedded&amp;amp;v=JwSdJ0dUH7E"&gt;above video&lt;/a&gt; was originally posted in YouTube&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/uk-dna-database-and-european-court-of-human-rights-lessons-that-india-can-learn-from-mistakes'&gt;https://cis-india.org/internet-governance/uk-dna-database-and-european-court-of-human-rights-lessons-that-india-can-learn-from-mistakes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-09-17T03:40:07Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/uidais-virtual-id-limited-kyc-does-little-to-protect-aadhaar-data-already-collected-say-critics">
    <title>UIDAI's Virtual ID, limited KYC does little to protect Aadhaar data already collected, say critics</title>
    <link>https://cis-india.org/internet-governance/news/uidais-virtual-id-limited-kyc-does-little-to-protect-aadhaar-data-already-collected-say-critics</link>
    <description>
        &lt;b&gt;Aadhaar-issuing body, Unique Identification Authority of India (UIDAI), had barely started patting itself on the back for introducing the Virtual ID concept, what CEO Ajay Bhushan Pandey called "one of biggest recent innovations in this field", when detractors came crawling out of the woodwork, all guns blazing.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.businesstoday.in/current/economy-politics/uidais-virtual-id-limited-kyc-little-protect-aadhaar-data-collected-critics/story/267924.html"&gt;Business Today&lt;/a&gt; on January 12, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;"Under compulsion, millions of persons have already shared Aadhaar number with many service providers. New security layer is like locking the stable after horses have bolted," tweeted P. Chidambaram, Congress veteran and former finance minister. This is not just an opposition party member taking potshots at the government. As of last month, close to 14 crore out of about 30 crore Permanent Account Numbers (PANs) had already been linked to Aadhaar and 70% of the estimated 100 crore bank accounts had been seeded. This will be the case for insurance policies as well as all government-sponsored welfare schemes and services since the Supreme Court ruling to extend the deadline for mandatory Aadhaar linking came just a fortnight before the government's December 21 deadline. So how does the new two-tier security system protect all that Aadhaar data already collected by sundry agencies?&lt;/span&gt;&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;The short answer is that it does not. According to media reports, banks and other service providers have not been asked to delete stored Aadhaar data from their databases. The only directive is to enforce the new security system within the June 1 deadline. In the absence of a legal mandate, agencies can very well choose to retain any Aadhaar data previously collected on their servers, leaving it open to any number of security breaches in the future.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;So, it would appear that the new VID and limited KYC norms are good ideas, just too late in arriving. Only procrastinators putting off linking Aadhaar to essential services stand to gain, unless the government decides to revoke all existing Aadhaar cards and issue fresh 12-digit unique identification numbers post June 1.&lt;/div&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;Where the new security system definitely scores is on the privacy front. To remind you, VID a temporary, 16-digit, randomly-generated number that an Aadhaar holder can use for authentication or KYC services along with his/her fingerprint instead in lieu of the Aadhaar number. The VID together with biometrics of the user would give any authorized agency, say, a mobile company, limited details like name, address and photograph, which are enough for any verification. You can generate/replace Virtual IDs on the UIDAI website, Aadhaar mobile app and at enrolment centres.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;Since the system-generated VID will be mapped to an individual's Aadhaar number at the back end, it will do away with the need for the user to share Aadhaar number with sundry service agencies. This will, in turn, reduce the collection of Aadhaar numbers by various agencies. VIDs being temporary cannot be de-duplicated and as an added precaution, agencies that undertake authentication will not be allowed to generate VIDs on behalf of Aadhaar holders.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;Furthermore, under limited KYC, UIDAI will evaluate all Authentication User Agencies (AUAs) and split them into two categories: Global AUAs and Local AUAs. Only agencies whose services, by law, require them to store the Aadhaar number-qualified as Global AUAs-will enjoy access to full demographic details of an individual. All the remaining AUAs will be branded as Local AUAs and will neither get access to full KYC, nor can they store the Aadhaar number on their systems. Instead, they will get a tokenised number issued by UIDAI to identify their customers. The 72 character alphanumeric 'UID Token' for your Aadhaar number will reportedly be different for every authentication body you approach so agencies will no longer be able to merge databases, thus enhancing privacy substantially.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;However, there's a problem here, too. As Pranesh Prakash, Policy Director of Bengaluru-based Centre for Internet and Society, told The Hindu, "unless all entities are required to use VIDs or UID tokens, and are barred from storing Aadhaar numbers, the new measures won't really help."&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;In a recent online survey, conducted by social engagement platform LocalCircles, 52% of 15,000 respondents said they feared that their Aadhaar data might not be safe from unauthorised access by hackers and information sellers. The UIDAI's latest move does little to allay this doubt.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Under compulsion, millions of persons have already shared Aadhaar number with many service providers. New security layer is like locking the stable after horses have bolted," tweeted P. Chidambaram, Congress veteran and former finance minister. This is not just an opposition party member taking potshots at the government. As of last month, close to 14 crore out of about 30 crore Permanent Account Numbers (PANs) had already been linked to Aadhaar and 70% of the estimated 100 crore bank accounts had been seeded. This will be the case for insurance policies as well as all government-sponsored welfare schemes and services since the Supreme Court ruling to extend the deadline for mandatory Aadhaar linking came just a fortnight before the government's December 21 deadline. So how does the new two-tier security system protect all that Aadhaar data already collected by sundry agencies?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The short answer is that it does not. According to media reports, banks and other service providers have not been asked to delete stored Aadhaar data from their databases. The only directive is to enforce the new security system within the June 1 deadline. In the absence of a legal mandate, agencies can very well choose to retain any Aadhaar data previously collected on their servers, leaving it open to any number of security breaches in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So, it would appear that the new VID and limited KYC norms are good ideas, just too late in arriving. Only procrastinators putting off linking Aadhaar to essential services stand to gain, unless the government decides to revoke all existing Aadhaar cards and issue fresh 12-digit unique identification numbers post June 1.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Where the new security system definitely scores is on the privacy front. To remind you, VID a temporary, 16-digit, randomly-generated number that an Aadhaar holder can use for authentication or KYC services along with his/her fingerprint instead in lieu of the Aadhaar number. The VID together with biometrics of the user would give any authorized agency, say, a mobile company, limited details like name, address and photograph, which are enough for any verification. You can generate/replace Virtual IDs on the UIDAI website, Aadhaar mobile app and at enrolment centres.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the system-generated VID will be mapped to an individual's Aadhaar number at the back end, it will do away with the need for the user to share Aadhaar number with sundry service agencies. This will, in turn, reduce the collection of Aadhaar numbers by various agencies. VIDs being temporary cannot be de-duplicated and as an added precaution, agencies that undertake authentication will not be allowed to generate VIDs on behalf of Aadhaar holders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, under limited KYC, UIDAI will evaluate all Authentication User Agencies (AUAs) and split them into two categories: Global AUAs and Local AUAs. Only agencies whose services, by law, require them to store the Aadhaar number-qualified as Global AUAs-will enjoy access to full demographic details of an individual. All the remaining AUAs will be branded as Local AUAs and will neither get access to full KYC, nor can they store the Aadhaar number on their systems. Instead, they will get a tokenised number issued by UIDAI to identify their customers. The 72 character alphanumeric 'UID Token' for your Aadhaar number will reportedly be different for every authentication body you approach so agencies will no longer be able to merge databases, thus enhancing privacy substantially.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there's a problem here, too. As Pranesh Prakash, Policy Director of Bengaluru-based Centre for Internet and Society, told The Hindu, "unless all entities are required to use VIDs or UID tokens, and are barred from storing Aadhaar numbers, the new measures won't really help."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a recent online survey, conducted by social engagement platform LocalCircles, 52% of 15,000 respondents said they feared that their Aadhaar data might not be safe from unauthorised access by hackers and information sellers. The UIDAI's latest move does little to allay this doubt.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/uidais-virtual-id-limited-kyc-does-little-to-protect-aadhaar-data-already-collected-say-critics'&gt;https://cis-india.org/internet-governance/news/uidais-virtual-id-limited-kyc-does-little-to-protect-aadhaar-data-already-collected-say-critics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-16T23:51:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-mayank-jain-march-27-2018-uidai-servers-or-third-parties-aadhaar-leaks-are-dangerous-experts">
    <title>UIDAI servers or third parties, Aadhaar leaks are dangerous: Experts</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-mayank-jain-march-27-2018-uidai-servers-or-third-parties-aadhaar-leaks-are-dangerous-experts</link>
    <description>
        &lt;b&gt;Even though the UIDAI has denied these reports, its arguments rest on shaky grounds, according to experts.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Mayank Jain was published in &lt;a class="external-link" href="http://www.business-standard.com/article/current-affairs/uidai-servers-or-third-parties-aadhaar-leaks-are-dangerous-experts-118032601008_1.html"&gt;Business Standard&lt;/a&gt; on March 27, 2018. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The government has told the Supreme Court that the Aadhaar data “remains safely behind 13-feet high walls” and it will take “the age of the universe” to break one key in the Unique Identification Authority of India’s (UIDAI’s) encryption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if this claim is taken at face value, experts suggest leaks from third-party databases seeded with Aadhaar numbers are equally dangerous and the UIDAI is responsible for the damage. &lt;span&gt;The most recent case came from a report published online and it said random numbers could provide access to the Aadhaar data, which also includes people’s financial information, from a state-owned company’s database. &lt;/span&gt;&lt;span&gt;Even though the UIDAI has denied these reports, its arguments rest on shaky grounds, according to experts.“There is no truth in this story as there has been absolutely no breach of the UIDAI’s Aadhaar database.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar remains safe and secure,” the UIDAI said on Twitter shortly after the story broke on ZDNet.The authority added even if the report was taken to be true, “it would raise security concerns on the database of that Utility Company and has nothing to do with the security of the UIDAI’s Aadhaar database”.This has been the authority’s defence in several such cases but those in the know of things say it doesn’t hold water simply because the Aadhaar data is not concentrated in the UIDAI’s complexes anymore and has spread across various databases.“Publishing this by the state entities is a violation under the Aadhaar Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if you publish your Aadhaar number, it is a violation of the law,” said Pranesh Prakash, policy director at the Centre for Internet and Society.“Saying that the UIDAI has not been compromised is thoroughly insufficient because for customers, it doesn’t matter if the leak comes from servers operated by the UIDAI or from others holding copies of the UIDAI database.”Prakash said it should be the authority’s responsibility to help others comply with the law and prevent data leaks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He gave the example of biometric leaks from Gujarat government servers and how criminals used them to forge fingerprints.The possibility of data leaks was demonstrated when Robert Baptiste, purportedly a French app developer, announced on Twitter how he got access to thousands of scanned Aadhaar card copies through simple Google searches.In an interview to Business Standard, Baptiste said the major threat was data handling by third parties, which could lead to identity theft.Even the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016, has provisions that debar making public citizens’ Aadhaar-related information public unless required for certain purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Whoever intentionally discloses, transmits, copies or otherwise disseminates any identity information collected in the course of enrolment or authentication to any person not authorised under this Act” can be in jail for three years and pay a fine of ~10,000 under the Act.A lawyer appearing on the petitioners’ side in the ongoing Supreme Court case on the constitutional validity of Aadhaar said only the UIDAI had the powers to file cases against people who published Aadhaar information. Hence everyone else is helpless despite the leaks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI’s argument that Aadhaar information can’t be misused is duplicitous because the regulations under the Aadhaar Act assure individuals that if biometric authentication fails, they should have other means of identifying themselves, says Kiran Jonnalagadda, founder of HasGeek.“So the regulations guarantee that anyone in possession of stolen identity information will be able to misuse it without biometric authentication,” he said.Prakash agreed with this. He said demographic authentication, which is an acceptable authentication method under the Aadhaar Act, was prone to misuse as long as Aadhaar numbers remained public.“Aadhaar is used as just a piece of paper, unlike security features embedded in passports or even permanent account number cards. Thus, demographic authentication merely involves providing Aadhaar numbers and details like addresses, which can be used even for things like getting entry into an airport by just printing a ticket and having a fake Aadhaar,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;Queries sent to the UIDAI were not answered till the time of going to press&lt;/em&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-mayank-jain-march-27-2018-uidai-servers-or-third-parties-aadhaar-leaks-are-dangerous-experts'&gt;https://cis-india.org/internet-governance/news/business-standard-mayank-jain-march-27-2018-uidai-servers-or-third-parties-aadhaar-leaks-are-dangerous-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-03-27T02:16:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-august-3-2018-uidai-says-asked-nobody-to-add-the-helpline-number-to-contacts">
    <title>UIDAI says asked nobody to add the helpline number to contacts</title>
    <link>https://cis-india.org/internet-governance/news/livemint-august-3-2018-uidai-says-asked-nobody-to-add-the-helpline-number-to-contacts</link>
    <description>
        &lt;b&gt;UIDAI says the toll free number 1800-300-1947 in the contact list of Android phones is an ‘outdated and invalid number’&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Komal Gupta was published in&lt;a class="external-link" href="https://www.livemint.com/Politics/5yeCLwAYPfoQF9SVr7oqKJ/UIDAI-says-tollfree-number-not-issued-to-telecom-firms-han.html"&gt; Livemint&lt;/a&gt; on August 3, 2018. Amber Sinha was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;After the Unique Identification Authority of India’s (UIDAI’s)  helpline number was added to the contact list of users through an update  available on the Android platform, the government agency in charge of  the Aadhaar database of over one billion Indians, stepped in to defend  the unique ID project, saying that “some vested interest are trying to  create unwarranted confusion in the public”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The toll free number  1800-300-1947 in the contact list of Android phones is an “outdated and  invalid number,” UIDAI said on Friday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI has not asked or  advised anyone, including any telecom service provider or mobile  manufacturer or Android, to include 18003001947 or 1947 in the default  list of public service numbers, it said. “UIDAI’s valid toll free number  is 1947, which is functional for more than the last two years.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On  Thursday, French security expert Elliot Alderson took to Twitter to  ask: “Do you have @UIDAI in your contact list by default?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  news stormed social media and people checked their phones to find  UIDAI’s helpline number pre-saved on their device without their  knowledge. Based on a series of tweets that followed, it was established  that the number entered users’ phones through an update on the Android  platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We are aware of this and are looking into it,” said Google in response to queries from &lt;i&gt;Mint&lt;/i&gt;. Calls to the Department of Telecommunications (DoT) seeking comments on the issue remained unanswered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  an apparent dig at UIDAI and the telcos, Alderson tweeted on Friday:  “People noticed that the @UIDAI number is saved by default on their  phone: @UIDAI: This is not me! Telecom providers: No, this is not us!  ... Do I have to ask to Harry Potter if he magically added this number  to people phones?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Giving a clean chit to the telcom companies,  Cellular Operators Association of India (COAI) director general Rajan S.  Mathews said: “The inclusion of a certain unknown number in the  phonebooks of various mobile handsets is not from any telecom service  provider.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This doesn’t seem to be a malware- or hacking-related  instance,” said Amber Sinha, lawyer and senior programme manager at the  Centre for Internet and Society (CIS), a Bengaluru-based think tank.  “There are some pre-saved numbers, which comes with the operating system  and its update. If the UIDAI claims that it did not ask telecom service  providers or mobile manufacturers or Android to include the number,  then only Google or the operating system developers can give clarity on  this.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is not the first time that privacy warriors  have launched a crusade against UIDAI and challenged the security  framework put in place by it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last week, Twitter users publicly  shared personal details, including bank accounts, email IDs, PAN and  frequent flyer number of Telecom Regulatory Authority of India (Trai)  chairman R.S. Sharma, after he posted his 12-digit Aadhaar number and  dared people to harm him.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sharma, himself a former chairman of  UIDAI, had revealed his Aadhaar number on Twitter, prompting many of his  followers to dig up information about him.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following this,  UIDAI on Tuesday advised people to refrain from revealing their Aadhaar  numbers on public platforms, including on social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  draft Personal Data Protection Bill, 2018, submitted to the government  on 27 July by the expert panel headed by former Supreme Court judge B.N.  Srikrishna, categorises the Aadhaar number as sensitive personal  information. There are more than 1.21 billion Aadhaar number holders in  the country.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-august-3-2018-uidai-says-asked-nobody-to-add-the-helpline-number-to-contacts'&gt;https://cis-india.org/internet-governance/news/livemint-august-3-2018-uidai-says-asked-nobody-to-add-the-helpline-number-to-contacts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-08-13T15:47:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/newslaundry-shruti-menon-may-2-2017-uidai-remains-silent-on-aadhaar-leaks-of-users-through-govt-portals">
    <title>UIDAI remains silent on #Aadhaarleaks of 13 crore users through government portals</title>
    <link>https://cis-india.org/internet-governance/news/newslaundry-shruti-menon-may-2-2017-uidai-remains-silent-on-aadhaar-leaks-of-users-through-govt-portals</link>
    <description>
        &lt;b&gt;As the arguments for making Aadhaar mandatory go on, is there any way to stem the leaks and identify who exactly has all this information.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Shruti Menon was &lt;a class="external-link" href="https://www.newslaundry.com/2017/05/02/uidai-remains-silent-on-aadhaarleaks-of-13-crore-users-through-government-portals"&gt;published by Newslaundry&lt;/a&gt; on May 2, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The verdict on linking Aadhaar with Permanent Account Number (PAN) and  making it mandatory for filing income tax returns (ITRs) will be out  soon. Attorney General Mukul Rohatgi had a tough challenge ahead of him  in the Supreme Court as the state presented its argument today. Rohatgi  defended the &lt;a href="http://www.livemint.com/Politics/3FcQ9lHm7TWX5B0Hn7ZXiO/Aadhaar-to-be-mandatory-for-income-tax-returns-getting-PAN.html" target="_blank"&gt;amendment in income tax law&lt;/a&gt; allowing this after senior lawyer Shyam Divan made a &lt;a href="http://www.livemint.com/Politics/sN0S5mYYx641tgrctGf03H/Shyam-Divan-concludes-arguments-in-Aadhaar-case-in-Supreme-C.html" target="_blank"&gt;strong case&lt;/a&gt; against  it on April 26 and 27. Divan became a hero to many overnight after he  presented compelling arguments against the amendment citing facets of  right to privacy - informational self-determination, personal autonomy,  and bodily integrity - as he did so. Though the court has &lt;a href="https://www.thequint.com/opinion/2017/05/01/aadhaar-case-privacy-and-bodily-integrity" target="_blank"&gt;refused to entertain&lt;/a&gt; arguments pertaining to privacy, he managed to argue these concerns without couching them under right to privacy laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Advocate Gautam Bhatia posted &lt;a href="https://barandbench.com/aadhar-hearing-number-tagging-nazi-concentration-camps/" target="_blank"&gt;minute-by-minute developments from the courtroom&lt;/a&gt;, and soon, #ThankYouMrDivan became one of the top trends on Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A day before the state presented its arguments, the Centre for Internet and Society (CIS) published a &lt;a href="http://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1" target="_blank"&gt;report &lt;/a&gt;titled  “Information, Security Practices of Aadhaar (or lack thereof): A  documentation of public availability of Aadhaar numbers with sensitive  personal financial information” late on Monday. Authored by Amber Sinha  and Srinivas Kodali, the report documents the leaks of over 13 crore  Aadhaar numbers and resulting information of beneficiaries through four  government portals-two at the centre and two at the state. “We are  primarily talking of lack of standards and data fact-checking, storage  and how all of this information- account numbers, phone numbers plus,  Aadhaar numbers- in public domain increases the nature of risk of the  backbone of digital payments,” Kodali told &lt;i&gt;Newslaundry. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The four portals studied by the two are National Social Assistance  Programme (NSAP), National Rural Employment Guarantee Act (NREGA) and  two databases of Andhra Pradesh- NREGA and their scheme called Chandranna Bima.  The report claims that the aforementioned public portals compromised  personally identifiable information (PII) including “Aadhaar numbers and  financial details such as bank account numbers” of 13 crore people due  to a lack of security controls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While the details were masked for public view, someone with login  access could get the details,” the report read. “When one of the url  query parameters of the website showing the masked personal details was  modified from ‘nologin’ to ‘login’, that is, control access to login  based pages were allowed providing unmasked details without the need for  a password.” What this essentially means is that these portals allow  people to explore lists organised by states, districts, area,  sub-district, and municipalities which contain the personal information  of the people who are enrolled into the schemes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report also  cites legal framework under the Aadhaar Act that allows the government  or private entities to store Aadhaar numbers on the grounds that they  won’t be used for purposes other than those listed in the act. CIS’s  study, however, reveals that information pertaining to religion, caste,  race, tribe or even income is sometimes collected and published on such  portals with little in the way of security checks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speaking to &lt;i&gt;Newslaundry,&lt;/i&gt; Anupam Saraph, professor and former governance and IT advisor to Goa’s  Chief Minister, Manohar Parrikar, said that the data exposed could be  significantly more than what the report shows. “Many more Aadhaar  numbers have been exposed on websites relating to Pension Schemes, PDS,  Ministry of Water and Sanitation, Ministry of Human Resource  Development, Scholarships, Schools, Colleges, Universities, Kendriya  Sainik board, PM Avas Yojana to name a few,” he said. “Besides this  Registrars to the UIDAI (State Governments and various ministries of the  Central government, some Public Sector undertakings) were allowed to  retain the Aadhaar number, demographic and biometric data (associated  with the Aadhaar number). While this may not be exposed on websites, it  is unsecured and possibly accessible to data brokers within and outside  government,” said Saraph who has designed delivery channels and ID  schemes for better governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What’s worth noting is that the  people whose data has been breached are unaware that their information  is available on public platforms and vulnerable to data theft. “It is  UIDAI’s [Unique Identification Authority of India] job to investigate  and inform them,” Kodali told &lt;i&gt;Newslaundry. “&lt;/i&gt;At some point of time, everybody is going to have everybody’s information,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, the government has an &lt;a href="https://data.gov.in/" target="_blank"&gt;open data portal&lt;/a&gt;. It  describes itself as a platform “intended to be used by Government  Ministries/Departments and their organisation to publish datasets,  documents, services, tools and applications collected by them for public  use”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So is it feasible to have open data portals for  transparency and accountability? “Having certain government data being  publicly accessible is certainly desirable.” Saraph continued that the  problem was, data on public expenditure should ideally be openly  accessible but it’s also where the most leakage occurs. “Making Aadhaar  mandatory is meaningless,” he said, as India does not have a policy on  open data portals yet, which can subject Aadhaar data to “misuse”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given  that the UIDAI is responsible for investigating and making people aware  of any data breach or theft, they have remained silent for an oddly  long time. It is unclear whether the UIDAI is itself aware of who has  accessed the data that is insecurely published on these government  portals. “They’re letting everybody collect this information but they  were not aware themselves that who had access to this information,  that’s the main problem,” Kodali said. While the Aadhaar ecosystem was  to ensure social inclusion and transparency, in its current form, the  system looks so opaque that the people who are running it may not be  aware themselves of what is going on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What does it mean to have access to someone else’s Aadhaar?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With  an increasing number of social welfare schemes being linked to Aadhaar,  it was touted as an attempt to remove the middlemen, frauds and  corruption with the government. According to the report, "A cumulative  amount of Rs 1,78,694.75 has been transferred using DBT for 138 schemes  under 27 ministries since 2013. Various financial frameworks like  Aadhaar Payments Bridge (APB) and Aadhaar Enabled Payment Systems (AePS)  have been built by National Payment Corporation of India to support DBT  and also to allow individuals use Aadhaar for payments."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given  that such systems are in place to ensure easier and accessible banking,  research shows that the Aadhaar seeding process led to government  portals putting personal information of so many people under various  schemes in the "absence of information security practices to handle so  much PII", as per the research. This is not only a breach of privacy but  also makes a person vulnerable to financial fraud in cases where their  bank details are public. "One of the prime examples is individuals  receiving phone calls from someone claiming to be from the bank. Aadhaar  data makes this process much easier for fraud and increases the risk  around transactions," the report reads.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI on silent mode&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately,  UIDAI has not addressed this concern, let alone acknowledge it. It has  been cracking down on people by filing first information reports (FIRs)  against those tracking and exposing the vulnerabilities of the Aadhaar  system. Recently, UIDAI’s Chief Executive Officer (CEO), ABP Pandey was  accused of blocking twitter handles of prominent security researchers  and analysts who have been extensively reporting about vulnerabilities  in the Aadhaar system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the handles was blocked was Saraph’s. “I do not know why they  blocked me. I have been vocal about the problems associated with the UID  and its use,” he said&lt;i&gt;. &lt;/i&gt;He added that he served several &lt;a href="http://www.moneylife.in/article/resisting-violations-of-the-supreme-court-orders-on-aadhaar/49121.html," target="_blank"&gt;notices&lt;/a&gt; of  contempt of court to the CEO of UIDAI and has been questioning the  verification and audit of UID database. “Perhaps [he] was annoyed with  my efforts to make them accountable and responsible,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On  April 18, however, in a response to Right to Information (RTI) query  filed by Sushil Kambampati, UIDAI denied having blocked any twitter  handles. Almost immediately, it was called out on twitter for ‘lying’ in  the RTI response as many users claimed it had.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saraph declared that such a move, the blocking of users asking  questions, was indicative of UIDAI’s cluelessness. Apar Gupta, a  Delhi-based lawyer working on cyber security, had told &lt;i&gt;Newslaundry &lt;/i&gt;that  it was unethical and unconstitutional of government bodies (such as the  UIDAI) to block people. He reiterated that in one of his tweets  recently.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today, however, the Pandey’s individual twitter profile no longer  exists. It has now been changed to “ceo_office”. CIS’s report states  that the UIDAI has been pushing for more databases to get in sync with  Aadhaar, but with little or no accountability. “While the UIDAI has been  involved in proactively pushing for other databases to get seeded with  Aadhaar numbers, they take a little responsibility in ensuring the  security and privacy of such data,” the report reads. Kodali, however,  told &lt;i&gt;Newslaundry &lt;/i&gt;that the report was not aimed at questioning the  security of such seeding. “We’re not saying it is not really secure but  we’re just saying it increases the risk factors,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI has also not responded to several queries filed by vulnerability testers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Newslaundry &lt;/i&gt;reached out to the UIDAI with the following questions:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;p&gt; &lt;/p&gt;
&lt;li&gt;&lt;i&gt; According to the report published, four government portals have  personally identifiable information of about 13 crore people including  their Aadhaar numbers and bank account details. What is being done about  this?&lt;/i&gt;&lt;/li&gt;
&lt;p&gt; &lt;/p&gt;
&lt;li&gt;&lt;i&gt; If a person's privacy has been breached, what are the steps UIDAI would take for redressal?&lt;/i&gt;&lt;/li&gt;
&lt;p&gt; &lt;/p&gt;
&lt;li&gt;&lt;i&gt; Is UIDAI investigating the 13 crore Aadhaar leaks?&lt;/i&gt;&lt;/li&gt;
&lt;p&gt; &lt;/p&gt;
&lt;li&gt;&lt;i&gt; The report states "When one of the url query parameters of website  showing the masked personal details was modified from “nologin” to  “login”, that is control access to login based pages were allowed  providing unmasked details without the need for a password." Is this  true, and if so, what is your statement?&lt;/i&gt;&lt;/li&gt;
&lt;p&gt; &lt;/p&gt;
&lt;li&gt;&lt;i&gt; How do you ensure data security on open data portals?&lt;/i&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This piece will be updated if and when they respond.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While  UIDAI remains silent, A-G Rohatgi argued today that close to 10 lakh  PAN cards were found to be fake. "Are they propagating a general public  interest or propagating the fraud (fake PANs) which is going in," he  said at the court today while suggesting that Aadhaar was the only way  of preventing fake or duplicate cards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Senior advocate Arvind  Datar, who is also appearing for one of the three petitioners in the  case said that the government could not take away his right to chose  whether or nor to have an Aadhaar. "The Supreme Court had directed them  that they cannot make it mandatory. The mandate of the Supreme Court can  not be undone. My right of not to have an Aadhaar can not be taken away  indirectly."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though there are problems with the Aadhaar system  and apparently very little redressal at the citizen’s end, Aadhaar is  here to stay. As Divan and Rohatgi argue the constitutionality of making  Aadhaar mandatory at the Supreme Court, the pertinent question that  only the UIDAI can answer is whether they are technologically capable of  keeping data secure given how aggressively Aadhaar linkage is being  promoted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Rohatgi's argument in court today, according to  a Business Standard report was that the government cannot destroy the  Aadhaar cards of people even after their death. Instead of being  reassuring, this only seems to increase the possibilities for identity  theft, as if there is little in the way of redressal mechanisms in life,  what choices do the dead have?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The author can be contacted on Twitter &lt;a href="https://twitter.com/shrutimenon10" target="_blank"&gt;@shrutimenon10&lt;/a&gt;.&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/newslaundry-shruti-menon-may-2-2017-uidai-remains-silent-on-aadhaar-leaks-of-users-through-govt-portals'&gt;https://cis-india.org/internet-governance/news/newslaundry-shruti-menon-may-2-2017-uidai-remains-silent-on-aadhaar-leaks-of-users-through-govt-portals&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T11:06:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/financial-express-may-19-2017-pti-uidai-puts-posers-to-cis-over-aadhaar-data-leak-claim">
    <title>UIDAI puts posers to CIS over Aadhaar data leak claim</title>
    <link>https://cis-india.org/internet-governance/news/financial-express-may-19-2017-pti-uidai-puts-posers-to-cis-over-aadhaar-data-leak-claim</link>
    <description>
        &lt;b&gt;Aadhaar-issuing authority UIDAI has asked research firm Centre for Internet and Society (CIS) to explain its sensational claim that 13 crore Aadhaar numbers were "leaked" and provide details of servers where they are stored.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article originally published by PTI was also &lt;a class="external-link" href="http://www.financialexpress.com/economy/uidai-puts-posers-to-cis-over-aadhaar-data-leak-claim/675814/"&gt;published by the Financial Express&lt;/a&gt; on May 19, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar-issuing authority UIDAI has asked research firm Centre for  Internet and Society (CIS) to explain its sensational claim that 13  crore Aadhaar numbers were “leaked” and provide details of servers where  they are stored. In a precursor to initiating a probe into the matter,  the Unique Identification Authority of India (UIDAI) also wants CIS to  clarify just how much of such “sensitive data” are still with it or  anyone else. The UIDAI — which has vehemently denied any breach of its  database — shot off a letter to CIS yesterday asking for the details,  including the servers where the downloaded “sensitive data” are residing  and information about usage or sharing of such data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Underscoring the importance of bringing to justice those involved in  “hacking such sensitive information”, the UIDAI sought CIS’ “assistance”  in this regard and has given it time till May 30 to revert on the  issue. “Your report mentions 13 crore people’s data have been leaked.  Please specify how much (of) this data have been downloaded by you or  are in your possession, or in the possession of any other persons that  you know,” the UIDAI said in its communication to CIS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, in what market watchers described as an apparent  flip-flop, CIS has now clarified that there was no leak’ or ‘breach’ of  Aadhaar numbers, but rather ‘public disclosure’. Meanwhile, the UIDAI  has quoted sections of the Information Technology Act, 2000, and the  Aadhaar Act to emphasise that violation of the clauses are punishable  with rigorous imprisonment of up to 10 years. “While your report  suggests that there is a need to strengthen IT security of the  government websites, it is also important that persons involved in  hacking such sensitive information are brought to justice for which your  assistance is required under the law,” it said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI has  also sought technical details on how access was gained for the National  Social Assistance Programme (NSAP) site — one of the four portals where  the alleged leak happened. When contacted, UIDAI CEO Ajay Bhushan Pandey  said, “We do not comment on individual matters.” The UIDAI has also  asked for details of systems that were involved in downloading and  storing of the sensitive data so that forensic examination of such  machines can be conducted to assess the quantum and extent of damage to  privacy of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI letter comes after a CIS’ report early this month which  claimed that Aadhaar numbers and personal information of as many as 135  million Indians could have been leaked from four government portals due  to lack of IT security practices. “Based on the numbers available on the  websites looked at, estimated number of Aadhaar numbers leaked through  these four portals could be around 130-135 million,” the report had  said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in a apparent course correction on May 16, a day before the  UIDAI’s letter went out — CIS updated its report and clarified that  although the term ‘leak’ was originally used 22 times in its report, it  is “best characterised as an illegal data disclosure or publication and  not a breach or a leak”. CIS has also claimed that some of its findings  were “misunderstood or misinterpreted” by the media, and that it never  suggested that the biometric database had been breached. “We completely  agree with both Dr Pandey (UIDAI CEO) and Sharma (Trai Chairman R S  Sharma) that CIDR (Aadhaar central repository) has not been breached,  nor is it suggested anywhere in the report,” CIS said in its latest  update.&lt;/p&gt;
&lt;div class="youmaylike" style="text-align: justify; "&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/financial-express-may-19-2017-pti-uidai-puts-posers-to-cis-over-aadhaar-data-leak-claim'&gt;https://cis-india.org/internet-governance/news/financial-express-may-19-2017-pti-uidai-puts-posers-to-cis-over-aadhaar-data-leak-claim&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UIDAI</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-19T09:28:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules">
    <title>UIDAI Practices and the Information Technology Act, Section 43A and Subsequent Rules</title>
    <link>https://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules</link>
    <description>
        &lt;b&gt;UIDAI practices and section 43A of the IT Act are analyzed in this post.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the 52&lt;sup&gt;nd&lt;/sup&gt; Report on Cyber Crime, Cyber Security, and the Right to Privacy – in evidence provided, the Department of Electronics and Information Technology stated &lt;i&gt;“...Section 43A and the rules published under that Section cover the entire privacy in case of digital data. These are being followed by UIDAI also and other organisations...”&lt;/i&gt; (pg.46) &lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This blog post explains the requirements found under Section 43A of the Information Technology Act 2000 and the subsequent Information Technology “ Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules 2011&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; and analyses publicly available documents from the UIDAI website&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; as well as the UIDAI enrolment form&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; to demonstrate the ways in which:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;UIDAI practices &lt;b&gt;are &lt;/b&gt;in line with section 43A and the Rules, &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;UIDAI practices &lt;b&gt;are not&lt;/b&gt; in line with section 43A and the Rules, &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;UIDAI practices &lt;b&gt;are partially&lt;/b&gt; in with section 43A and the Rules &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Where more information&lt;/b&gt; is needed to draw a conclusion. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Applicability and Scope&lt;/h3&gt;
&lt;p&gt;Section 43A of the Information Technology Act 2008 and subsequent Rules apply only to Body Corporate and to digital information.&lt;/p&gt;
&lt;p&gt;Body Corporate under the Information Technology Act 2008 is defined as:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; “Any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities” &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - not in line&lt;/b&gt;: The UIDAI is not a body corporate. The UIDAI is an attached office under the aegis of the Planning Commission that was set up by an executive order.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI collects, processes, stores, and shares both digital and non-digital information. As section 43A and subsequent Rules apply only to digital information, there is not sufficient protection provided over all the information collected, processed, stored, and used by the UIDAI.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy Policy on Website&lt;/h3&gt;
&lt;p&gt;Rule 4 requires body corporate to provide a privacy policy on their website. The privacy policy must include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Clear and easily accessible statements of its practices and policies&lt;/li&gt;
&lt;li&gt;Type of personal or sensitive personal data or information collected&lt;/li&gt;
&lt;li&gt;Purpose of collection and usage of such information &lt;/li&gt;
&lt;li&gt;Disclosure of information including sensitive personal information &lt;/li&gt;
&lt;li&gt;Reasonable security practices and procedures as provided under rule 8&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;UIDAI Practices - Partially in Line&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Though the UIDAI has placed a privacy policy&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; on their website, the privacy policy only addresses the use of website and does not comprehensively provide clear and accessible statements about all of the UIDAI’s practices and policies.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The UIDAI privacy policy does not state the specific types of personal or sensitive data that could be collected, but instead states &lt;i&gt;“As a general rule, this website does not collect Personal Information about you when you visit the site. You can generally visit the site without revealing Personal Information, unless you choose to provide such information.”&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Features on the UIDAI website that require individuals to provide personal information and sensitive personal information include: Booking an appointment, checking aadhaar status, enrolling for e-aadhaar, enrolling for aadhaar, updating aadhaar data. Types of information required for these services include: mobile number, name, address, gender, date of birth, and enrolment ID.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The privacy policy goes on to state: &lt;i&gt; “If you are asked for any other Personal Information you will be informed how it will be used if you choose to give it. If at any time you believe the principles referred to in this privacy statement have not been followed, or have any other comments on these principles, please notify the webmaster through the Contact Us page. Note: The use of the term "Personal Information" in this privacy statement refers to any information from which your identity is apparent or can be reasonably ascertained.”&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The UIDAI privacy policy does explain the purpose for collection of information on the website and the use of collected information.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The UIDAI privacy policy does not address the possibility of disclosure of information collected by the UIDAI from the use of its website, except in the case of when an individual provides his/her email at which point the privacy policy states&lt;i&gt; “Your e-mail address will not be used for any other purpose, and will not be disclosed without your consent.”&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The UIDAI privacy policy does not provide information about the security practices adopted by the UIDAI. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Consent&lt;i&gt; &lt;/i&gt;&lt;/h3&gt;
&lt;p&gt;Rule 5 requires that prior to the collection of sensitive personal data, the body corporate must obtain consent, either in writing or through fax regarding the purpose of usage before collection of such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - in Line&lt;/b&gt;&lt;br /&gt;The UIDAI collects written consent from individuals through the enrolment form  for the issuance of an Aadhaar number.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Collection Limitation&lt;/h3&gt;
&lt;p&gt;Rule 5 (2) requires that body corporate only collect sensitive personal data if it is connected to a lawful purpose and if it is considered necessary for that purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - in Line&lt;/b&gt;&lt;br /&gt;The Aadhaar enrolment form requires only the necessary sensitive personal data for the issuance of an Aadhaar number. Individuals are given the option to provide banking and financial information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Notice During Direct Collection&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 5(3) requires that while collecting information directly from an individual the body corporate must provide the following information:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The fact that the information is being collected&lt;/li&gt;
&lt;li&gt;The purpose for which the information is being collected&lt;/li&gt;
&lt;li&gt;The intended recipients of the information &lt;/li&gt;
&lt;li&gt;The name and address of the agency that is collecting the information&lt;/li&gt;
&lt;li&gt;The name and address of the agency that will retain the information&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;UIDAI Practices - Partially in Line&lt;br /&gt;&lt;/b&gt;The Aadhaar enrolment form does not provide the following information:&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The intended recipients of the information&lt;/li&gt;
&lt;li&gt;The name and address of the agency collecting the information &lt;/li&gt;
&lt;li&gt;The name and address of the agency that will retain the information &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Retention Limitation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 5(4) requires that body corporate must retain sensitive personal data only for as long as it takes to fulfil the stated purpose or otherwise required under law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Unclear&lt;/b&gt;&lt;br /&gt;It is unclear from publicly available information what the UIDAI retention practices are.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Use Limitation&lt;/h3&gt;
&lt;p&gt;Rule 5(5) requires that information must be used for the purpose that it was collected for.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;UIDAI Practices - Unclear&lt;br /&gt;&lt;/b&gt;It is unclear from publicly available information if the UIDAI is using collected information only for the purpose for which it was collected for. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;Right to Access and Correct&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Rule 5(6) requires body corporate to provide individuals with the ability to review the information they have provided and access and correct  personal or sensitive personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Partially in Line&lt;br /&gt;&lt;/b&gt;Though the UIDAI provides individuals with the ability to access and correct personal information, as stated on the enrolment form, correction is free only if changed within 96 hours of enrolment. Additionally, as stated on the enrolment form, if an individual chooses to allow for the UIDAI to facilitate the opening of a bank account and link present bank accounts to the UID number, this information, after being provided, cannot be corrected. The UIDAI website has a portal for updating information, but only name, address, gender, data of birth, and mobile number can be updated through this method.&lt;b&gt; &lt;/b&gt;&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Right to ‘Opt Out’ and Withdraw Consent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 5(7) requires that body corporate must provide individuals with the option of 'opting out' of providing data or information sought. Individuals also have the right to withdraw consent at any point of time.  Body corporate has the right to withdraw services if consent is withdrawn.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Partially in Line&lt;br /&gt;&lt;/b&gt;The UID enrolment form provides individuals with one ‘optional’ field  - the option of having the UIDAI open a bank account and link it to the individuals UID number or having the UIDAI link present bank accounts to individuals UID number. No other option to ‘opt out’ or withdraw consent is present on the enrolment form or the UIDAI privacy policy, terms of use, or website.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Security of Information&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 8 requires that body corporate must secure information in accordance with the ISO  27001 standard. These practices must be audited on an annual basis or when the body corporate undertakes a significant up gradation of its process and computer resource.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Unclear&lt;br /&gt;&lt;/b&gt;The security practices adopted by the UIDAI are not mentioned in the website privacy policy, on the website, or on the enrolment form, thus it is unclear from publicly available information if the UID is compliant with ISO 27001 standards. Though the UIDAI has been functioning since 2010, and it is unclear from publicly available information if annual audits of the UIDAI security practices have been undertaken.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Disclosure with Consent&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 6 requires that body corporate must have consent before disclosing sensitive personal data to any third person or party, except in the case with Government agencies for the purpose of verification of identity, prevention, detection, investigation, including cyber incidents and prosecution and punishment of offenses, on receipt of a written request. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Partially in Line&lt;/b&gt;&lt;br /&gt;In the enrolment form, consent for disclosure is stated as&lt;i&gt; ‘‘I have no objection to the UIDAI sharing information provided by me to the UIDAI with agencies engaged in delivery of welfare services.” &lt;/i&gt;This is a blanket statement and allows for all future possibilities of sharing and disclosure of information provided with any organization that the UIDAI deems as ‘engaged in the delivery of welfare services’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI privacy policy only addresses the disclosure of an individual’s email address with consent. Though not directly addressing disclosure, the UIDAI privacy policy also states &lt;i&gt;“&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;We will not identify users or their browsing activities, except when a law enforcement agency may exercise a warrant to inspect the service provider's logs.”&lt;/i&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Prohibition on Publishing and Further Disclosure&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 6(3) and 6(4) prohibit the body corporate from publishing sensitive personal  data or information. Similarly, organizations receiving sensitive personal data are not allowed to disclose it further.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - in Line&lt;/b&gt;&lt;br /&gt;The UDAI does not publish sensitive personal data. It is unclear what practices and standards registrars and enrolment agencies are functioning under.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Requirements for Transfer of Sensitive Personal Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 7 requires that body corporate may transfer sensitive personal data into another jurisdiction only if the country ensures the same level of protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Unclear&lt;br /&gt;&lt;/b&gt;It is unclear from publicly available information if information collected by the UIDAI is transferred outside of India. &lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Establishment of Grievance Officer&lt;b&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 5(9) requires that body corporate must establish a grievance officer and the details must be posted on the body corporates website and grievances must be addressed within a month of receipt. &lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - in Line&lt;br /&gt;&lt;/b&gt;The website of the UIDAI provides details of a grievance officer that individuals can contact.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; It is unclear from publicly available information if grievances are addressed within a month.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. &lt;a class="external-link" href="http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technology_52.pdf"&gt;http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technology_52.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;a class="external-link" href="http://dispur.nic.in/itact/it-procedures-sensitive-personal-data-rules-2011.pdf"&gt;http://dispur.nic.in/itact/it-procedures-sensitive-personal-data-rules-2011.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. &lt;a class="external-link" href="http://uidai.gov.in/"&gt;http://uidai.gov.in/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;a class="external-link" href="http://www.jharkhand.gov.in/marpdf/Aadhar-enrolmentform.pdf"&gt;http://www.jharkhand.gov.in/marpdf/Aadhar-enrolmentform.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. &lt;a class="external-link" href="http://uidai.gov.in/organization-details.html"&gt;http://uidai.gov.in/organization-details.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;a class="external-link" href="http://uidai.gov.in/privacy-policy.html"&gt;http://uidai.gov.in/privacy-policy.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;a class="external-link" href="http://resident.uidai.net.in/home"&gt;http://resident.uidai.net.in/home&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. &lt;a class="external-link" href="http://www.jharkhand.gov.in/marpdf/Aadhar-enrolmentform.pdf"&gt;http://www.jharkhand.gov.in/marpdf/Aadhar-enrolmentform.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. &lt;a class="external-link" href="https://ssup.uidai.gov.in/web/guest/ssup-home"&gt;https://ssup.uidai.gov.in/web/guest/ssup-home&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. &lt;a class="external-link" href="http://uidai.gov.in/contactus.html"&gt;http://uidai.gov.in/contactus.html&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules'&gt;https://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-06T07:00:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-january-11-2018-uidai-introduces-new-two-layer-security-system-to-improve-aadhaar-privacy">
    <title>UIDAI introduces new two-layer security system to improve Aadhaar privacy</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-january-11-2018-uidai-introduces-new-two-layer-security-system-to-improve-aadhaar-privacy</link>
    <description>
        &lt;b&gt;The Unique Identification Authority of India (UIDAI) has introduced a system of virtual authentication for citizens enrolled on its database and limited the access available to service providers in a move aimed at allaying widespread concern over security breaches that have dogged the world's largest repository of citizen data. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://economictimes.indiatimes.com/news/economy/policy/uidai-introduces-new-two-layer-security-system-to-improve-aadhaar-privacy/articleshow/62442873.cms"&gt;Economic Times&lt;/a&gt; on January 11, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;In one of the most significant security upgrades by the eightyear old agency, the UIDAI announced the creation of a "virtual ID" which can be used in lieu of the 12-digit Aadhaar number at the time of authentication for any service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI has also limited access to stored personal information and mandated the use of unique tokens through which authenticating agencies can access required data. It claims that the measures will strengthen privacy and also prevent combining of databases linked to Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ET was the first to report about the UIDAI plan to introduce virtual numbers to address security concerns in its November 20 edition last year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A top government official told ET that UIDAI has been working on this technology since July of 2016. "This is going to be one of the biggest innovations ever, people can change their virtual ID whenever they want or after every authentication or every 10 seconds." He added that this will silence most critics of Aadhaar.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;"The Aadhaar number being the permanent ID for life, there is need to provide a mechanism to ensure its continued use while optimally protecting the collection and storage in many databases," the UIDAI said in a notification on Wednesday while announcing the new measures.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;More Needed to be Done: Experts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;"The collection and storage of Aadhaar number by various entities has heightened privacy concerns," it stated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the new regime, for every Aadhaar number, the authority will issue a 16-digit virtual identity number which will be "temporary and revocable at any time."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This virtual ID can be generated only by the individual Aadhaar holder and can be replaced by a new one after a minimum validity period.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, while some Authentication User Agencies (AUA) — categorised by the UIDAI as 'Global' — will have access to all the details or the e-KYC of a specific Aadhaar number, all other agencies will only have access to limited data through the virtual identity number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"So this is a very very significant thing and I think this is a great step forward," said Nandan Nilekani, former chairman of UIDAI, in an interview to television channel ET Now on Wednesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nilekani, widely regarded as the architect of Aadhaar, said that through these new security measures the possibility of the Aadhaar number being stored in many databases also goes away.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It will make a huge difference in allaying the concerns and it really "eliminates all the arguments against Aadhaar," he told ET Now.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last week, Chandigarh-based daily The Tribune reported that demographic data from the Aadhaar database could be accessed for as little as Rs 500. The expose led to the UIDAI barring over 5,000 officials from accessing its portal through login ids and passwords. It also introduced biometric authentication for future access, as reported by ET on Tuesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The widespread fear of misuse of demographic data is heightened by the fact that India still does not have a data protection legislation. The country's apex court is scheduled to resume its hearing on the validity of the Aadhaar scheme next week on January 17.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kamlesh Bajaj, former CEO of the Data Security Council of India said by limiting access to only those agencies mandated by law, the UIDAI has ensured that "someone will not be able to combine database. It's a positive development in my view and technologically feasible," he said&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Expert Views&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Privacy experts and activists were of the view that more needs to be done to ensure foolproof security for critical personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bengaluru-based research organisation Centre for Internet and Society has suggested that all the Aadhaar seeding with all the existing databases should be revoked. "Until then, it is one step ahead and but not enough," said Sunil Abraham, executive director of CIS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To enable a speedy rollout of the new safety standards, the UIDAI plans to release the required technical updates by March 1, 2018 and all the Authentication agencies using the Aadhaar database will need to upgrade their systems latest by June 1, 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its circular, UIDAI has also said that agencies not allowed to use or store the Aadhaar number should make changes inside their systems to replace Aadhaar number within their databases with UID Token.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Unless there is complete revocation, some database with Aadhaar numbers will still float around and secondly there is no reason why some data controllers should be trusted, the tokenisation should be implemented for everyone," said CIS's Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The circular said that authentication using virtual ID will be performed in the same manner as the Aadhaar number and people can generate or retrieve their virtual numbers (in case they forget) at the UIDAI's resident portal, Aadhaar Enrolment Centers, or through the Aadhaar mobile application.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the virtual numbers, UIDAI will also provide "unique tokens" to each agency against an Aadhaar number to ensure that they are to establish the uniqueness of beneficiaries in their database such as for distributing government subsidies under cooking gas or scholarships.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Activists argue that most service providers — even digital ones — work with a paper ID card system. "They don't cross-check it with the UIDAI database. UIDAI is not issuing virtual ids for paper cards, and a new category of so called Global AUAs are exempted from using the virtual ids, so citizens are not protected almost anywhere that they need to use Aadhaar," said Kiran Jonnalagadda, co-founder of the Internet Freedom Foundation, who said the change doesn't help enough to secure the ecosystem.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-january-11-2018-uidai-introduces-new-two-layer-security-system-to-improve-aadhaar-privacy'&gt;https://cis-india.org/internet-governance/news/economic-times-january-11-2018-uidai-introduces-new-two-layer-security-system-to-improve-aadhaar-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-16T23:08:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
