<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2216 to 2230.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/didp-31-diversity-of-employees-at-icann"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/dialogue-cafe"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/developing-location-based-services"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/major-security-flaw-namo-app"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hoyen-tv-may-20-2017-cirilo-laguardia-developer-releases-wanna-cry-key-recovery-tool-for-windows-xp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-may-2-2017-details-of-135-million-aadhaar-card-holders-may-have-leaked-claims-cis-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/www-the-hindu-com-aug-24-2012-details-emerge-on-govt-blockade-of-websites"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-september-7-2016-despite-sc-order-thousands-booked-under-scrapped-sec-66a-of-it-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/hindu-january-6-2014-deepa-kurup-despite-apex-court-order-ioc-proceeds-with-aadhar-linked-dbt"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/designing-a-human-rights-impact-assessment-for-icann2019s-policy-development-processes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/design-concerns-in-creating-privacy-notices"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/digtial-identities-research-plan"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/deployment-of-digital-health-policies-and-technologies-during-covid-19"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/didp-31-diversity-of-employees-at-icann">
    <title>DIDP #31 Diversity of employees at ICANN</title>
    <link>https://cis-india.org/internet-governance/blog/didp-31-diversity-of-employees-at-icann</link>
    <description>
        &lt;b&gt;We have requested ICANN to disclose information pertaining to the diversity of employees based on race and citizenship.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;This data is being requested to verify ICANN’s claim of being an equal opportunities employer. ICANN’s employee handbook states that they “...provide equal opportunities and are committed to the principle of equality regardless of race, colour, ethnic or national origin, religious belief, political opinion or affiliation, sex, marital status, sexual orientation, gender reassignment, age or disability.” The data on the diversity of employees based on race and nationality of their employees will depict how much they have stuck to their commitment to delivering equal opportunities to personnel in ICANN and potential employees.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The request filed by CIS can be &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/didp-request"&gt;accessed here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/didp-31-diversity-of-employees-at-icann'&gt;https://cis-india.org/internet-governance/blog/didp-31-diversity-of-employees-at-icann&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Akash Sriram</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-08-21T09:26:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/dialogue-cafe">
    <title>Dialogue Cafe @ Centre for Internet and Society</title>
    <link>https://cis-india.org/internet-governance/dialogue-cafe</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society announces the launch of its dialogue cafe, where every month, we approach seminal thinkers, scholars and practitioners to help explore knowledge paradigms that help us understand and research techno-social realities through innovative thought, concepts and frameworks.&lt;/b&gt;
        
&lt;p&gt;The dialogue cafe draws upon different disciplines, histories, perspectives and intellectual legacies in order to respond to a seminal piece of writing that has changed, challenged and shaped the contours of interdisciplinary science and technology studies.&lt;/p&gt;
&lt;p&gt;The dialogue cafe initiates several strands of dialogues — between critical thinkers and canonical texts, between different paradigm of knowledges that interact with digital and internet technologies, and between interlocutors located in different disciplines, to initiate critical thought/work for new and innovative research in the field of Internet and Society.&lt;/p&gt;
&lt;p&gt;For its first brew of conversations, the Dialogue Cafe serves you...&lt;/p&gt;
&lt;h3&gt;Computation and the Humanities: Revisiting a Silent Revolution&lt;/h3&gt;
&lt;p&gt;Steve Jobs’ comments on how “technology married with liberal arts, married with the humanities” made Apple hearts sing is today widely re-circulated, but not fully comprehended. We often take this to be the mark of one man’s genius, rather than the symptom of a broader interdisciplinary history. Noted Artificial Intelligence scholar Philip Agre recalls, “When I was a graduate student in artificial intelligence, the humanities were not held in high regard. They were vague and woolly, they employed impenetrable jargons, and they engaged in "meta-level bickering that never decides anything".&lt;/p&gt;
&lt;p&gt;What happened, in the formative decades of Jobs and Agre’s generation, to bring technology and the humanities into conversation? What have the results been, other than well-designed personal computational devices, and what is the significance for us? On December 2, 2011, the Centre for Internet and Society invites you to a Dialogue Cafe, where we engage in exploring what this all means and what kinds of labour it might take to ‘marry’ these disparate ways of knowing.&lt;/p&gt;
&lt;p&gt;As a response to Philip Agre’s seminal essay on “Critical Technology Practice”, the cafe will begin with an exposition by Kavita Philip (University of California, Irvine), opening up into a critical response spearheaded by Cherry Matthew, and leading to a larger dialogue with the audience, exploring fault lines of interdisciplinary research and challenges of integrated technology studies.&lt;/p&gt;
&lt;p&gt;For more background on these questions, audience is encouraged (but not required) to explore the materials at Agre’s home page &lt;a class="external-link" href="http://polaris.gseis.ucla.edu/pagre/"&gt;http://polaris.gseis.ucla.edu/pagre/&lt;/a&gt;, and STSrelated links from Wikipedia’s page &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Science,_technology_and_society"&gt;http://en.wikipedia.org/wiki/Science,_technology_and_society&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://en.wikipedia.org/wiki/Science,_technology_and_society"&gt;&lt;strong&gt;VIDEOS&lt;/strong&gt;&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYLh614A.html" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLh614A" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLigncA.html" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLigncA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/dialogue-cafe'&gt;https://cis-india.org/internet-governance/dialogue-cafe&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Lecture</dc:subject>
    
    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-07T11:10:08Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/developing-location-based-services">
    <title>Developing location-based services</title>
    <link>https://cis-india.org/news/developing-location-based-services</link>
    <description>
        &lt;b&gt;For mapping enthusiasts, geeks and neogeographers in Bangalore, here's something to look forward to. Cartonama, a workshop that offers intensive hands-on training on tools to build and manage location data for location-based services, will be held in the city on March 2 and 3.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.thehindu.com/sci-tech/technology/article2932531.ece"&gt;The article was published in the Hindu on February 26, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This workshop, being organised by city-based tech event management firm HasGeek, is open to developers, neogeographers and entrepreneurs working on location-based services who want to understand how to use advanced tools to manage and represent their geographic data. &lt;br /&gt;&lt;br /&gt;The workshop will be conducted by Mikel Maron and Schuyler Erle, both from the OpenStreetMap project. The event is being held at the Centre for Internet and Society in Domlur.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For more on this, log on to &lt;a class="external-link" href="http://workshop.cartonama.com/"&gt;workshop.cartonama.com&lt;/a&gt; or contact &lt;a class="external-link" href="mailto:sajjad@hasgeek.com"&gt;sajjad@hasgeek.com&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Cloud 20/20: online technical paper contest &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Unisys India announced the results of Cloud 20/20 Version 3.0, the third edition of one of India's largest technical paper contests, designed to encourage innovative ideas and recognise emerging technical talent from among the country's leading engineering colleges. &lt;br /&gt;&lt;br /&gt;Following several rigorous rounds of evaluation, the judges selected Dharmesh Kakadia from International Institute of Information Technology, Hyderabad, as the first prize winner for his entry on ‘Network Virtualisation and Cloud Computing'. The runner-ups were Sridhar S. from Anna University, Chennai, and Poornima J.R. from M.S. Ramaiah Institute of Technology.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;A system to protect confidential data &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Xerox and computer security firm McAfee have teamed up to design a security system to help companies protect against threats to confidential data, a release from McAfee stated.&lt;/p&gt;
&lt;p&gt;This involves integrating embedded McAfee software into Xerox technology. The two companies plan to use a whitelisting method that allows only approved files to run, offering significantly more protection than traditional blacklisting tactics, where a user has to be aware of and proactively block viruses, spyware and other malicious software.&lt;/p&gt;
&lt;p&gt;Additionally, the solution provides an audit trail to track and investigate the time and origin of security events, and take action on them, the release added. The companies claim that the decision to partner on this was a result of a survey commissioned by the two firms that found that 54 per cent employees in India do not follow their company's IT security policies, even fewer (33 per cent) are aware of these policies.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Automating healthcare and insurance&lt;/h3&gt;
&lt;p&gt;&lt;br /&gt;IT major Wipro Infotech announced that it has successfully implemented the digitisation of the Employees' State Insurance Corporation's (ESIC) Project, Panchdeep, the healthcare administration programme that automates healthcare services to over six crore beneficiaries across the country.&lt;/p&gt;
&lt;p&gt;This is the largest e-governance programme in this sector, providing online facilities to employers and insured people for registration, payment of premium and disbursement of cash benefits.&lt;/p&gt;
&lt;p&gt;It also automates medicare services to all insured people, and an estimated 75,000 people use this every day.&lt;/p&gt;
&lt;h3&gt;HP launches new press&lt;/h3&gt;
&lt;p&gt;Hewlett-Packard announced the launch of HP Indigo W7200 Digital Offset press for the Indian market. This has been installed at Bangalore-based printing press, the KolorKode digital press. With its robust productivity this new press offers the ability to address a wider range of long-run jobs. It will be able to deliver a broader range of jobs for a dynamic market place meeting the demands of monochrome to seven-color jobs, from spot to highlight color during a single run, without stopping or changing the settings, a press release from HP stated.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/developing-location-based-services'&gt;https://cis-india.org/news/developing-location-based-services&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-02-28T09:31:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/major-security-flaw-namo-app">
    <title>Developer team fixed vulnerabilities in Honorable PM's app and API</title>
    <link>https://cis-india.org/internet-governance/blog/major-security-flaw-namo-app</link>
    <description>
        &lt;b&gt;The official app of Narendra Modi, the Indian Prime Minister, was found to contain a security flaw in 2015 that exposed millions of people's personal data.  A few days ago a very similar flaw was reported again.  This post by Bhavyanshu Parasher, who found the flaw and sought to get it fixed last year, explains the technical details behind the security vulnerability.&lt;/b&gt;
        &lt;p&gt;&lt;strong&gt;This blog post has been authored by Bhavyanshu Parasher&lt;/strong&gt;. The original post can be&lt;a class="external-link" href="https://bhavyanshu.me/major-security-flaw-pm-app/09/29/2015"&gt; read here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;What were the issues?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The main issue was how the app was communicating with the API served by narendramodi.in.&lt;/span&gt;&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;ol&gt;
&lt;li&gt;I was able to extract private data, like email addresses, of each registered user just by iterating over user IDs.&lt;/li&gt;
&lt;li&gt;There was no authentication check for API endpoints. Like, I was able to comment as any xyz user just by hand-crafting the requests.&lt;/li&gt;
&lt;li&gt;The API was still being served over HTTP instead of HTTPS.&lt;/li&gt;
&lt;/ol&gt;&lt;/div&gt;
&lt;h3 style="text-align: justify; "&gt;Fixed&lt;/h3&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The most important issue of all. Unauthorized access to personal info, like email addresses, is fixed. I have tested it and can confirm it.&lt;/li&gt;
&lt;li&gt;A check to verify if a valid user is making the request to API endpoint is fixed. I have tested it and can confirm it.&lt;/li&gt;
&lt;li&gt;Blocked HTTP. Every response is served over HTTPS. The people on older versions (which was serving over HTTP) will get a message regarding this. I have tested it. It says something like “Please update to the latest version of the Narendra Modi App to use this feature and access the latest news and exciting new features”. It’s good that they have figuered out a way to deal with people running older versions of the app. Atleast now they will update the app.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style="text-align: justify; "&gt;Detailed Vulnerability Disclosure&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Found major security loophole in how the app accesses the “api.narendramodi.in/api/” API. At the time of disclosure, API was being served over “HTTP” as well as “HTTPS”. People who were still using the older version of the app were accessing endpoints over HTTP. This was an issue because data (passwords, email addresses) was being transmitted as plain text. In simple terms, your login credentials could easily be intercepted. MITM attack could easily fetch passwords and email addresses. Also, if your ISP keeps log of data, which it probably does, then they might already have your email address, passwords etc in plain text. So if you were using this app,&lt;strong&gt; I would suggest you to change your password immediately&lt;/strong&gt;. Can’t leave out a possibility of it being compromised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another major problem was that the token needed to access API was giving a false sense of security to developers. The access token could easily be fetched &amp;amp; anyone could send hand-crafted HTTP requests to the server. It would result in a valid JSON response without authenticating the user making the request. This included accessing user-data (primarily email address, fb profile pictures of those registered via fb) for any user and posting comments as any registered user of the app. There was no authentication check on the API endpoint. Let me explain you with a demo.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The API endpoint to fetch user profile information (email address) was getprofile. Before the vulnerability was fixed, the endpoint was accessible via “http://www.narendramodi.in/api/getprofile?userid=useridvalue&amp;amp;token=sometokenvalue”. As you can see, it only required two parameters. userid, which we could easily iterate on starting from 1 &amp;amp; token which was a fixed value. There was no authentication check on API access layer. Hand-crafting such requests resulted in a valid JSON response which exposed critical data like email addresses of each and every user. I quickly wrote a very simply script to fetch some data to demonstrate. Here is the sample output for xrange(1,10).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/App.png/@@images/7bec3ca6-0808-4d19-9711-bc084b507f61.png" alt="App" class="image-inline" title="App" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Not just email addresses, using this method you could spam on any article pretending to be any user of the app. There was no authentication check as to who was making what requests to the API. See,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/copy_of_App.png/@@images/2e499adb-b621-4bc4-a490-f8957c9ac1d7.png" alt="App" class="image-inline" title="App" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They have fixed all these vulnerabilities. I still believe it wouldn’t have taken so long if I would have been able to get in touch with team of engineers directly right from the beginning. In future, I hope they figure out an easier way to communicate. Such issues must be addressed as soon as they are found but the communication gap cost us lot of time. The team did a great job by fixing the issues and that’s what matters.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h2 style="text-align: justify; "&gt;Disclosure to officials&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The email address provided on Google play store returned a response stating “The email account that you tried to reach is over quota”. Had to get in touch with authorities via twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vulnerability disclosed to authorities on 30th sep, 2015 around 5:30 AM&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Tweet1.png" alt="Tweet 1" class="image-inline" title="Tweet 1" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After about 30 hours of reporting the vulnerabillity&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Tweet2.png" alt="Tweet 2" class="image-inline" title="Tweet 2" /&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Proposed Solution&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Consulted &lt;/span&gt;&lt;a href="https://twitter.com/pranesh_prakash"&gt;@pranesh_prakash&lt;/a&gt;&lt;span&gt; as well regarding the issue.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;img src="https://cis-india.org/home-images/Tweet3.png" alt="Tweet 3" class="image-inline" title="Tweet 3" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After this, I mailed them a solution regarding the issues.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion with developer&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Received &lt;strong&gt;phone call&lt;/strong&gt; from a developer. Discussed possible solutions to fix it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;The solution that I proposed could not be implemented &lt;/strong&gt;since the vulnerability is caused by a design flaw that should have been thought about right from the beginning when they started developing the app. It just proved how difficult it is to fix such issues for mobile apps. For web apps, it’s lot easier. Why? Because for mobile apps, you need to consider backward compatibility. If they applied my proposed solution, it would crash app for people running the older versions. Main problem is that &lt;strong&gt;people don’t upgrade to latest versions leaving themselves vulnerable to security flaws&lt;/strong&gt;. The one I proposed is a better way of doing it I think but it will break for people using older versions as stated by the developer. Though, they (developers) have come up with solutions that I think would fix most of the issues and can be considered an alternative.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Tweet4.png" alt="Tweet 4" class="image-inline" title="Tweet 4" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Oct 3rd, I received mail from one of the developers who informed me they have fixed it. I could not check it out at that time as I was busy but I checked it around 5 PM. &lt;strong&gt;I can now confirm they have fixed all three issues&lt;/strong&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h2 style="text-align: justify; "&gt;Update 12/02/2016&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.dailyo.in/variety/narendra-modi-namo-app-hacker-security-concerns-javed-khatri-demonetisation-survey-bjp-voter-data/story/1/14347.html"&gt;This vulnerability&lt;/a&gt; in NM app is similar to the one I got fixed last year. Like I said before also, the vulnerability is because of how the API has been designed. They released the same patch which they did back then. Removing email addresses from the JSON output is not really a patch. I wonder why would they introduce personal information in JSON output again if they knew that’s a privacy problem and has been reported by me a year back. He showed how he was able to follow any user being any user. Similarly, I was able to comment on any post using account of any user of the app. When I talked to the developer back then he mentioned it will be difficult to migrate users to a newer/secure version of the app so they are releasing this patch for the meantime. It was more of a backward compatibility issue because of how API was designed. The only solution to this problem is to rewrite the API from scratch and add standard auth methods for API. That should take care of most of vulnerabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also read:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.newindianexpress.com/nation/2016/dec/02/narendra-modi-app-hacked-by-youngster-points-out-risk-to-7-million-users-data-1544933--1.html"&gt;Narendra Modi app hacked by youngster, points out risk to 7 million users’ data&lt;/a&gt; (New Indian Express; December 2, 2016)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://indiatoday.intoday.in/story/security-22-year-old-hacks-modi-app-private-data-7-million/1/825661.html"&gt;Security flaw: 22-year-old hacks Modi app and accesses private data of 7 million people&lt;/a&gt; (India Today; December 2, 2016)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://thewire.in/84148/tech-security-namo-api/"&gt;The NaMo App Non-Hack is Small Fry – the Tech Security on Government Apps Is Worse&lt;/a&gt; (The Wire; December 3, 2016)&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/major-security-flaw-namo-app'&gt;https://cis-india.org/internet-governance/blog/major-security-flaw-namo-app&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Hacking</dc:subject>
    
    
        <dc:subject>Mobile Apps</dc:subject>
    
    
        <dc:subject>Data Management</dc:subject>
    

   <dc:date>2016-12-04T19:08:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hoyen-tv-may-20-2017-cirilo-laguardia-developer-releases-wanna-cry-key-recovery-tool-for-windows-xp">
    <title>Developer releases WannaCry key-recovery tool for Windows XP</title>
    <link>https://cis-india.org/internet-governance/news/hoyen-tv-may-20-2017-cirilo-laguardia-developer-releases-wanna-cry-key-recovery-tool-for-windows-xp</link>
    <description>
        &lt;b&gt;However, a cyber security expert working with the Centre for Internet and Society, Udbhav Tiwari working on vulnerabilities such as these, said as most ATMs in the country especially of the public-sector banks run on outdated operating systems, or are not updated regularly, they can be easily compromised. Unfortunately, however, a new variant of the program is already in the wild.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Cirilo Laguardia was published by &lt;a class="external-link" href="http://hoyentv.com/2017/05/20/developer-releases-wannacry-key-recovery-tool-for-windows-xp.html"&gt;Hoyen TV&lt;/a&gt; on May 20, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Meaning, as he &lt;a href="https://www.nominum.com/tech-blog/wannacry-views-dns-frontline/"&gt;wrote&lt;/a&gt; &lt;a href="https://blogs.microsoft.com/on-the-issues/2017/05/14/need-urgent-collective-action-keep-people-safe-online-lessons-last-weeks-cyberattack/"&gt;in a blog post&lt;/a&gt; this past weekend, agencies like that &lt;b&gt;NSA&lt;/b&gt; should have a "new requirement" to &lt;a href="http://economictimes.indiatimes.com/tech/internet/no-serious-impact-in-india-due-to-ransomware-ravi-shankar-prasad/articleshow/58685287.cms" target="_blank"&gt;report&lt;/a&gt; vulnerabilities they find to software makers like Microsoft, instead of  stockpiling or selling or exploiting them. Eternal Blue was technically  created to spy on key &lt;a href="https://theintercept.com/2017/03/07/wikileaks-dump-shows-cia-could-turn-smart-tvs-into-listening-devices/"&gt;target&lt;/a&gt; points that the &lt;b&gt;NSA&lt;/b&gt; deems necessary to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Smith says cyberweapons require a new approach, and &lt;b&gt;governments must "consider the damage to civilians that comes from hoarding these vulnerabilities and the use of these exploits&lt;/b&gt;".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We're  looking at many decades of building complex systems - one on top of the  other - with no effort to go back to fix what we did wrong along the  way", said Wendy Nather, principal security strategist at Duo Security,  who has worked in security for 22 years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And while Smith says  Microsoft and other tech companies need to take the lead on combatting  these widespread attacks, he highlights the shared responsibility  required to protect, detect and respond to threats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately,  numerous millions of computers now still running the 2001 operating  system never received those updates because their owners refused to pay  for it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;WannaCry doesn't seem to be any more virulent or more expensive than other ransomware.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Make sure that your computer is up to date with its &lt;b&gt;Windows updates&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In both cases, these computer owners are the digital equivalent of medical vaccine deniers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While  businesses that failed to update Microsoft's Windows-based computer  systems could be sued over lax cyber security, Microsoft itself enjoys  strong immunity from lawsuits. When a user clicks on the link, their  computer and the information on it is held for ransom while being used  to further &lt;a href="http://www.reuters.com/article/us-cyber-attack-puzzle-idUSKCN18C12S" target="_blank"&gt;spread&lt;/a&gt; the &lt;b&gt;ransomware&lt;/b&gt;. Without doing a thing, when &lt;b&gt;WannaCry&lt;/b&gt; came along nearly 2 months later, the machine was protected because the exploit it targeted had already been patched.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According  to the company, "customers who are running supported versions of the  operating system (Windows Vista, Windows Server 2008, Windows 7, Windows  Server 2008 R2, Windows 8.1, Windows Server 2012, Windows 10, Windows  Server 2012 R2, &lt;b&gt;Windows Server 2016&lt;/b&gt;) will have received the &lt;a href="https://docs.microsoft.com/en-us/msrc/customer-guidance-for-wannacrypt-attacks"&gt;security update&lt;/a&gt; MS17-010 in March". These are valid explanations for using obsolete  software, but they are not excuses. Unfortunately, far too few people  even bother.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;WannaCry&lt;/b&gt;, developed in part with  hacking techniques that were either stolen or leaked from the United  States National Security Agency, has &lt;a href="http://economictimes.indiatimes.com/tech/internet/ransomware-wannacry-hits-bengal-power-utility/articleshow/58682739.cms"&gt;infected&lt;/a&gt; over 300,000 computers since last Friday, locking up their data and demanding a ransom payment to &lt;a href="https://arstechnica.com/security/2017/04/nsa-leaking-shadow-brokers-just-dumped-its-most-damaging-release-yet/" target="_blank"&gt;release&lt;/a&gt; it. This is to prevent the &lt;b&gt;ransomware&lt;/b&gt; from using the unprotected Windows XP unit as a gateway.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government agencies running obsolete software is also a huge problem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the federal government mostly avoided &lt;b&gt;WannaCry&lt;/b&gt; infections, its processes highlight how hard it is for large organizations to modernize.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hoyen-tv-may-20-2017-cirilo-laguardia-developer-releases-wanna-cry-key-recovery-tool-for-windows-xp'&gt;https://cis-india.org/internet-governance/news/hoyen-tv-may-20-2017-cirilo-laguardia-developer-releases-wanna-cry-key-recovery-tool-for-windows-xp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-06-07T01:02:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-may-2-2017-details-of-135-million-aadhaar-card-holders-may-have-leaked-claims-cis-report">
    <title>Details of 135 million Aadhaar card holders may have leaked, claims CIS report</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-may-2-2017-details-of-135-million-aadhaar-card-holders-may-have-leaked-claims-cis-report</link>
    <description>
        &lt;b&gt;The disclosure came as part of a CIS report titled ‘Information Security Practices of Aadhaar (or lack thereof): A Documentation of Public Availability of Aadhaar Numbers with Sensitive Personal Financial Information’.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The news from the Press Trust of India was published in the &lt;a class="external-link" href="http://www.hindustantimes.com/india-news/details-of-135-million-aadhaar-card-holders-may-have-leaked-claims-cis-report/story-39nojShtnAmr3EruCKbdrL.html"&gt;Hindustan Times&lt;/a&gt; on May 2, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar numbers and personal information of as many as 135 million Indians could have been leaked from four government portals due to lack of IT security practices, the Centre for Internet and Society has claimed.&lt;br /&gt;&lt;br /&gt;“Based on the numbers available on the websites looked at, estimated number of Aadhaar numbers leaked through these four portals could be around 130-135 million,” the report by CIS said.&lt;br /&gt;&lt;br /&gt;Further, as many as 100 million bank account numbers could have been “leaked” from the four portals, it added.&lt;br /&gt;&lt;br /&gt;The portals where the purported leaks happened were those of National Social Assistance Programme, National Rural Employment Guarantee Scheme, as well as two websites of the Andhra Pradesh government.&lt;br /&gt;&lt;br /&gt;“Over 23 crore beneficiaries have been brought under Aadhaar programme for DBT (Direct Benefit Transfer), and if a significant number of schemes have mishandled data in a similar way, we could be looking at a data leak closer to that number,” it cautioned.&lt;br /&gt;&lt;br /&gt;The disclosure came as part of a CIS report titled ‘Information Security Practices of Aadhaar (or lack thereof): A Documentation of Public Availability of Aadhaar Numbers with Sensitive Personal Financial Information’.&lt;br /&gt;&lt;br /&gt;When contaced, a senior official of the Unique Identification Authority of India (UIDAI) said that there was no breach in its own database. The UIDAI issues Aadhaar to citizens.&lt;br /&gt;&lt;br /&gt;The CIS report claimed that the absence of “proper controls” in populating the databases could have disastrous results as it may divulge sensitive information about individuals, including details about address, photographs and financial data.&lt;br /&gt;&lt;br /&gt;“The lack of consistency of data masking and de- identification standard is an issue of great concern...the masking of Aadhaar numbers does not follow a consistent pattern,” the report added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-may-2-2017-details-of-135-million-aadhaar-card-holders-may-have-leaked-claims-cis-report'&gt;https://cis-india.org/internet-governance/news/hindustan-times-may-2-2017-details-of-135-million-aadhaar-card-holders-may-have-leaked-claims-cis-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T08:42:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/www-the-hindu-com-aug-24-2012-details-emerge-on-govt-blockade-of-websites">
    <title>Details emerge on government blockade of websites</title>
    <link>https://cis-india.org/news/www-the-hindu-com-aug-24-2012-details-emerge-on-govt-blockade-of-websites</link>
    <description>
        &lt;b&gt;Facebook pages, Twitter handles among 300 unique web addresses blocked by ISPs.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Pranesh Prakash's analysis is quoted in this article &lt;a class="external-link" href="http://www.thehindu.com/news/national/article3812819.ece"&gt;published&lt;/a&gt; in the Hindu on August 24, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;span&gt;Over  the past week, the Ministry of Communications and IT has sent out  orders to ISPs (Internet service providers) to block over 300 unique  addresses on the Web, cracking down on websites, Facebook pages, YouTube  videos and even Twitter handles, ostensibly to prevent incitement to  communal tension and rioting.&lt;/span&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;span&gt;But  a closer look at the specific URLs (web addresses) blocked by the  government has given rise to doubts whether the government may have  acted high-handedly, in some instances cracking down on parody Twitter  handles.&lt;/span&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;span&gt;Through  four orders, one issued a day from August 18 to 21, the government sent  out lists of specific URLs to be blocked by the Internet service  providers.&lt;/span&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;span&gt;An  analysis of the leaked government orders by blogger Pranesh Prakash of  the Center for Internet and Society (www.cis-india.org) revealed the  extent of the government missive: in specific cases, it had asked for  blocking of some portions of a website — like Facebook pages or Twitter  handles — and in other instances asked for entire websites.&lt;/span&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;span&gt;The  government orders carried no specific reasons for the blockades. But in  the backdrop of the paranoia surrounding the exodus of northeast people  from South Indian cities, it appears that it may have been to disallow  the use of the Web for spreading information that incites communal  violence and rioting.&lt;/span&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;span&gt;Cyber  law expert N. Vijayashankar said though the government seemed to have  acted within the Rules of IT Act 2008, the onus fell on it to justify  the reasons why the specific websites were blocked and dispel doubts  that there may have been some political motives at least pertaining to  specific sites, especially in the blocking of some parody Twitter  accounts spoofing the official Twitter account of the Prime Minister’s  office (@PMOIndia).&lt;/span&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;span&gt;“No  website can be blocked permanently. Any blocked website must be taken  up for review by a committee in a span of two months,” Mr. Vijayashankar  added. “But sadly the review committee does not have any public  representatives. It comprises only the secretaries to government.”&lt;/span&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;span&gt;If  the websites had indeed been blocked considering the emergency of the  situation and keeping in mind national security, then the responsibility  for preparing the list falls with the Home Ministry.&lt;/span&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;span&gt;“Whatever be the case, this cannot pave the way for clamping down on websites at one swipe,” Mr. Vijayashankar added.&lt;/span&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;span&gt;The  news about the clampdown set the social networks abuzz through  Thursday. Popular humour Twitter account holder Ramesh Srivats tweeted:  “Am slightly worried that some government guy will notice that all the  offending sites have “http” in them, and then go ban that.”&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/www-the-hindu-com-aug-24-2012-details-emerge-on-govt-blockade-of-websites'&gt;https://cis-india.org/news/www-the-hindu-com-aug-24-2012-details-emerge-on-govt-blockade-of-websites&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-28T09:51:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-september-7-2016-despite-sc-order-thousands-booked-under-scrapped-sec-66a-of-it-act">
    <title>Despite SC order, thousands booked under scrapped Sec 66A of IT Act</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-september-7-2016-despite-sc-order-thousands-booked-under-scrapped-sec-66a-of-it-act</link>
    <description>
        &lt;b&gt;College student Danish Mohammed’s arrest this March under the scrapped Section 66A of the Information Technology Act for allegedly sharing a morphed picture of RSS chief Mohan Bhagwat wasn’t an exception.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aloke Tikku was published in the &lt;a href="http://www.hindustantimes.com/india-news/despite-sc-order-thousands-booked-under-scrapped-section-66a-of-it-act/story-DisRxFDBJTXvkz6ZW4fRHK.html"&gt;Hindustan         Times&lt;/a&gt; on September 7, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Police arrested more than 3,000 people under the section in 2015, triggering concerns that the law was abused well after it was struck down by the Supreme Court in March last year. The top court had ruled Section 66A violated the constitutional freedom of speech and expression.&lt;br /&gt;&lt;br /&gt;The exact number of people arrested after it was scrapped is not available. But the National Crime Records Bureau’s (NCRB) Crime in India report released last month shows 3,137 arrests under the section in 2015 against 2,423 the previous year.&lt;br /&gt;&lt;br /&gt;On an average, four people were arrested every 12 hours in 2015 as compared to three in 2014.&lt;br /&gt;&lt;br /&gt;“I am shocked,” said Supreme Court lawyer Karuna Nundy, who represented the People’s Union for Civil Liberties, among the petitioners in Supreme Court seeking removal of Section 66A.&lt;br /&gt;&lt;br /&gt;“Making sure that our guardians of law know their law is absolutely basic... Whether it is training or notifying every police officer, we need action on it immediately,” she said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="http://www.hindustantimes.com/rf/image_size_800x600/HT/p2/2016/09/07/Pictures/_7befc902-7467-11e6-86aa-b218fe1cd668.jpg" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is unlikely that all 3,000-plus arrests were made before the provision was struck down in March. Sunil Abraham, executive director of the Bengaluru-headquartered advocacy group Centre for Internet and Society, said it was obvious that the police had not made these arrests before the SC ruling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lawyer Manali Singhal said once the Supreme Court struck off a provision of law, “any arrest under that provision would be per se illegal and void”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Police also appeared to be on an overdrive to file charge sheets against people booked before the SC verdict – in 1,500 cases last year, almost twice the 2014 figure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;NCRB statistics suggest that trials too did not end.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There were 575 people still in jail on January 1, 2016, twice as many as the 275 in prison when the law was in force a year earlier. In 2015, the courts also convicted accused in 143 cases.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-september-7-2016-despite-sc-order-thousands-booked-under-scrapped-sec-66a-of-it-act'&gt;https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-september-7-2016-despite-sc-order-thousands-booked-under-scrapped-sec-66a-of-it-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-07T15:31:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/hindu-january-6-2014-deepa-kurup-despite-apex-court-order-ioc-proceeds-with-aadhar-linked-dbt">
    <title>Despite apex court order, IOC proceeds with Aadhaar-linked DBT</title>
    <link>https://cis-india.org/news/hindu-january-6-2014-deepa-kurup-despite-apex-court-order-ioc-proceeds-with-aadhar-linked-dbt</link>
    <description>
        &lt;b&gt;Once DBT starts, there is no other method to avail of subsidy: IOC official.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Deepa Kurup was &lt;a class="external-link" href="http://www.thehindu.com/news/cities/bangalore/despite-apex-court-order-ioc-proceeds-with-aadhaar-seeding/article5542193.ece"&gt;published in the Hindu&lt;/a&gt; on January 6, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Despite an interim order by the Supreme Court disallowing the government from making the Aadhaar number mandatory for accessing State subsidies and benefits, Indian Oil Corporation (IOC) Ltd. continues to inform consumers that they will not get their LPG subsidy if they do not seed their Aadhaar-linked bank accounts to the IOC database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;SMSes and publicity material released by IOC in the past week indicate that the company is going ahead with the Union government’s deadlines for the Direct Benefit Transfer scheme for LPG. While the deadline for Udupi and Dharwad districts has been extended till January-end, the “grace period” for Bangalore Urban will expire on March 1.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the past week, LPG consumers have been receiving frequent SMSes requesting them to submit their Aadhaar number to their LPG distributor and their bank, with “no further delay”. Though the SMS does not state whether or not this is mandatory, frequent messages have been instilling a sense of urgency and panic among consumers. Further, several consumers told &lt;i&gt;The Hindu&lt;/i&gt; that, upon enquiry, distributors had been telling them that they would have to forego their subsidy amount (for nine cylinders a year) if they failed to register their details with the IOC database. Once the DBT scheme is enforced, the IOC will migrate customers entirely to the new system — that is, consumers will have to pay the market price, and the subsidy amount will be credited to their bank accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;‘&lt;b&gt;No other method’&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Senior IOC officials said that while the oil manufacturing company was desisting from making statements on whether or not this was mandatory, in effect those whose details would not be seeded to the database would not be able to avail of the benefit. “Basically, once the DBT scheme starts there is no other method to receive or avail of the subsidy. As of now, there is no alternative method,” said R.K. Arora, executive director, Karnataka State office. He pointed out that in rural areas several other subsidies were already linked to Aadhaar, and the DBT scheme was at 100 per cent in Tumkur and Mysore districts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As of January 1, an IOC official said, only 30 per cent of LPG consumers in the Bangalore Circle had ‘seeded’ their accounts to the IOC database, while in Udupi and Dharwad it was roughly around 50 per cent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We are not claiming it’s mandatory, and currently all companies have submitted an affidavit seeking the order be reconsidered. Meanwhile, we have just asked people to submit the details to the distributor as soon as they can,” the official said. He added that IOC was likely to keep extending the deadline to “be on the safe side”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, there is confusion among consumers on the issue. Krishnan Pillai, a resident of R.T. Nagar here, said Aadhaar numbers were being delayed, and there was huge anxiety among people. “Last week, I saw an advertisement that implied that I will lose subsidy if I don’t submit my number. Is the Supreme Court verdict not applicable?” he said. Sumitra Gupta, a charted accountant from Majestic, said distributors were telling them to “ignore news report on the Supreme Court verdict”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is arm twisting,” she said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;‘&lt;b&gt;So-called voluntary’&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham of the Centre for Internet and Society, a Bangalore-based NGO that has been part of the anti-Aadhaar campaign, said IOC was “pushing the boundary”. “From the very beginning, people have been objecting to the so-called voluntary nature of the scheme. It’s unfortunate that the will of the Supreme Court in its interim order on such as a critical component of our citizenship is also being ignored,” he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hindu-january-6-2014-deepa-kurup-despite-apex-court-order-ioc-proceeds-with-aadhar-linked-dbt'&gt;https://cis-india.org/news/hindu-january-6-2014-deepa-kurup-despite-apex-court-order-ioc-proceeds-with-aadhar-linked-dbt&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-01-31T06:50:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening">
    <title>DesiSec: Episode 1 - Film Release and Screening</title>
    <link>https://cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society is pleased to to announce the release of the first documentary film on cybersecurity in India - DesiSec. 
We hope you can join us for a special screening of the first episode of DesiSec, on 11th December, at CIS!&lt;/b&gt;
        
&lt;div&gt;Early 2013, the Centre for Internet and Society began shooting its first documentary film project.&amp;nbsp;After months of researching and interviewing activists and experts, CIS is thrilled to announce the release of the first documentary film on cybersecurity in India - &lt;strong&gt;DesiSec: Cybersecurity and Civi Society in India&lt;/strong&gt;.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Trailer link:&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer"&gt;http://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;CIS is hosting a special screening of &lt;strong&gt;DesiSec: Episode 1&lt;/strong&gt; on &lt;strong&gt;11th December, 2013, 6 pm&lt;/strong&gt; and invites you to this event. The first episode is centered around the issue of privacy and surveillance in cyber space and how it affects Indian society.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;We look forward to seeing you there!&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;RSVP:&amp;nbsp;&lt;a href="mailto:purba@cis-india.org" target="_blank"&gt;purba@cis-india.org&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;Venue:&amp;nbsp;http://osm.org/go/yy4fIjrQL?m=&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening'&gt;https://cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2013-12-17T08:13:32Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india">
    <title>DesiSec: Cybersecurity and Civil Society in India</title>
    <link>https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india</link>
    <description>
        &lt;b&gt;As part of its project on mapping cyber security actors in South Asia and South East Asia, the Centre for Internet &amp; Society conducted a series of interviews with cyber security actors. The interviews were compiled and edited into one documentary. The film produced by Purba Sarkar, edited by Aaron Joseph, and directed by Oxblood Ruffin features Malavika Jayaram, Nitin Pai, Namita Malhotra, Saikat Datta, Nishant Shah, Lawrence Liang, Anja Kovacs, Sikyong Lobsang Sangay and, Ravi Sharada Prasad.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Originally the idea was to do 24 interviews with an array of international experts: Technical, political, policy, legal, and activist. The project was initiated at the University of Toronto and over time a possibility emerged. Why not shape these interviews into a documentary about cybersecurity and civil society? And why not focus on the world’s largest democracy, India? Whether in India or the rest of the world there are several issues that are fundamental to life online: Privacy, surveillance, anonymity and, free speech. DesiSec includes all of these, and it examines the legal frameworks that shape how India deals with these  challenges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the time it was shot till the final edit there has only been one change in the juridical topography: the dreaded 66A of the IT Act has been struck down. Otherwise, all else is in tact. DesiSec was produced by Purba Sarkar, shot and edited by Aaron Joseph, and directed by Oxblood Ruffin. It took our team from Bangalore to Delhi and, Dharamsala. We had the honour of interviewing: Malavika Jayaram, Nitin Pai, Namita Malhotra, Saikat Datta, Nishant Shah, Lawrence Liang, Anja Kovacs, Sikyong Lobsang Sangay and, Ravi Sharada Prasad. Everyone brought something special to the discussion and we are grateful for their insights. Also, we are particularly pleased to include the music of Charanjit Singh for the intro/outro of DesiSec. Mr. Singh is the inventor of acid house music, predating the Wikipedia entry for that category by five years. Someone should correct that.&lt;/p&gt;
&lt;p&gt;DesiSec is released under the Creative Commons License Attribution 3.0 Unported (CC by 3.0). You can watch it on Vimeo: &lt;a href="https://vimeo.com/123722680" target="_blank"&gt;https://vimeo.com/123722680&lt;/a&gt; or download it legally and free of charge via torrent. Feel free to show, remix, and share with your friends. And let us know what you think!&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Video&lt;/h2&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/8N3JUqRRvys" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india'&gt;https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Laird Brown</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2015-06-29T16:25:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/designing-a-human-rights-impact-assessment-for-icann2019s-policy-development-processes">
    <title>Designing a Human Rights Impact Assessment for ICANN’s Policy Development Processes</title>
    <link>https://cis-india.org/internet-governance/blog/designing-a-human-rights-impact-assessment-for-icann2019s-policy-development-processes</link>
    <description>
        &lt;b&gt;As co-chairs of Cross Community Working Party on Human Rights (CCWP-HR) at International Corporation of Names and Numbers (ICANN), Akriti Bopanna and Collin Kurre executed a Human Rights Impact Assessment for ICANN's processes. It was the first time such an experiment was conducted, and unique because of being a multi-stakeholder attempt. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This report outlines the iterative research-and-design process carried  out between November 2017 and July 2019, focusing on successes and  lessons learned in anticipation of the ICANN Board’s long-awaited  approval of the Work Stream 2 recommendations on Accountability. The  process, findings, and recommendations will be presented by Akriti and  Austin at CCWP-HR’s joint session with the Government Advisory Council  at ICANN66 in Montreal during 2nd-8th November.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click to download the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/designing-a-human-rights-impact-assessment-for-icann2019s-policy-development-processes"&gt;full research paper here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/designing-a-human-rights-impact-assessment-for-icann2019s-policy-development-processes'&gt;https://cis-india.org/internet-governance/blog/designing-a-human-rights-impact-assessment-for-icann2019s-policy-development-processes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Collin Kure, Akriti Bopanna and Austin Ruckstuhl</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-10-03T14:43:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/design-concerns-in-creating-privacy-notices">
    <title>Design Concerns in Creating Privacy Notices</title>
    <link>https://cis-india.org/internet-governance/blog/design-concerns-in-creating-privacy-notices</link>
    <description>
        &lt;b&gt;The purpose of privacy notices and choice mechanisms is to notify users of the data practices of a system, so they can make informed privacy decisions. &lt;/b&gt;
        
&lt;p&gt;This blog post was edited by Elonnai Hickok.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;The Role of Design in Enabling Informed Consent&lt;/h2&gt;
&lt;p align="left"&gt;Currently, privacy notices and choice mechanisms, are largely ineffective. Privacy and security researchers have concluded that privacy notices not only fail to help consumers make informed privacy decisions but are mostly ignored by them. [1] They have been reduced to being a mere necessity to ensure legal compliance for companies. The design of privacy systems has an essential role in determining whether the users read the notices and understand them. While it is important to assess the data practices of a company, the communication of privacy policies to users is also a key factor in ensuring that the users are protected from privacy threats. If they do not read or understand the privacy policy, they are not protected by it at all.&lt;/p&gt;
&lt;p align="left"&gt;The visual communication of a privacy notice is determined by the User Interface (UI) and User Experience (UX) design of that online platform. User experience design is broadly about creating the logical flow from one step to the next in any digital system, and user interface design ensures that each screen or page that the user interacts with has a consistent visual language and styling. This compliments the path created by the user experience designer. [2] UI/UX design still follows the basic principles of visual communication where information is made understandable, usable and interesting with the use of elements such as colours, typography, scale, and spacing.&lt;/p&gt;
&lt;p align="left"&gt;In order to facilitate informed consent, the design principles are to be applied to ensure that the privacy policy is presented clearly, and in the most accessible form. A paper by Batya Friedman, Peyina Lin, and Jessica K. Miller, ‘Informed Consent By Design’, presents a model of informed consent for information systems. [3] It mentions the six components of the model; Disclosure, Comprehension, Voluntariness, Competence, Agreement, Minimal Distraction. The design of a notice should achieve these components to enable informed consent. Disclosure and comprehension lead to the user being ‘informed’ while ‘consent’ encompasses voluntariness, competence, and agreement. Finally, The tasks of being informed and giving consentshould happen with minimal distraction, without diverting users from their primary taskor overwhelming them with unnecessary noise.[4]&lt;/p&gt;
&lt;p align="left"&gt;UI/UX design builds upon user behaviour to anticipate their interaction with the platform. It has led to practices where the UI/UX design is directed at influencing the user to respond in a way that is desired by the system. For instance, the design of default options prompts users to allow the system to collect their data when the ‘Allow’ button is checked by default. Such practices where the interface design is used to push users in a particular direction are called “dark patterns”.[5] These are tricks used in websites and apps that make users buy or sign up for things that they did not intend to. [6] Dark patterns are often followed as UI/UX trends without the consequences on users being questioned. This has had implications on the design of privacy systems as well. Privacy notices are currently being designed to be invisible instead of drawing attention towards them.&lt;/p&gt;
&lt;p align="left"&gt;Moreover, most communication designers believe that privacy notices are beyond their scope of expertise. They do not consider themselves accountable for how a notice comes across to the user. Designers also believe that they have limited agency when it comes to designing privacy notices as most of the decisions have been already taken by the company or the service. They can play a major role in communicating privacy concerns at an interface level, but the issues of privacy are much deeper. Designers tend to find ways of informing the user without compromising the user experience, and in the process choose aesthetic decisions over informed consent.&lt;/p&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Issues with Visual Communication of Privacy Notices&lt;/h2&gt;
&lt;p align="left"&gt;The ineffectiveness of privacy notices can be attributed to several broad issues such as the complex language and length, their timing, and location. In 2015, the Center for Plain Language [7] published a privacy-policy analysis report [8] for TIME.com [9], evaluating internet-based companies’ privacy policies to determine how well they followed plain language guidelines. The report concluded that among the most popular companies, Google and Facebook had the more accessible notices, while Apple, Uber, and Twitter were ranked as less accessible. The timing of notices is also crucial in ensuring that it is read by the users. The primary task for the user is to avail the service being offered. The goals of security and privacy are valued but are only secondary in this process. [10] Notices are presented at a time when they are seen as a barrier between the user and the service. People thus, choose to ignore the notices and move on to their primary task. Another concern is disassociated notices or notices which are presented on a separate website or manual. The added effort of going to an external website also gets in the way of the users which leads to them not reading the notice. While most of these issues can be dealt with at the strategic level of designing the notice, there are also specific visual communication design issues that are required to be addressed.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Invisible Structure and Organisation of Information&lt;/h3&gt;
&lt;p align="left"&gt;Long spells of text with no visible structure or content organisation is the lowest form of privacy notices. These are the blocks of text where the information is flattened with no visual markers such as a section separator, or contrasting colour and typography to distinguish between the types of content. In such notices, the headings and subheadings are also not easy to locate and comprehend. For a user, the large block of text appears to be pointless and irrelevant, and they begin to dismiss or ignore it. Further, the amount of time it would take for the user to read the entire text and comprehend it successfully, is simply impractical, considering the number of websites they visit regularly.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/CollectionandUseofPersonalInformation.jpg" alt="null" class="image-inline" title="Collection and Use of Personal Information" /&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;em&gt;The privacy policy notice by Apple [11] with no use of colours or visuals.&lt;/em&gt;&lt;/p&gt;
&lt;p align="center"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/PrivacyPolicyTwitter.jpg" alt="null" class="image-inline" title="Privacy Policy Twitter" /&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;em&gt;The privacy policy notice by Twitter [12] no visual segregator&lt;/em&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify;"&gt;Visual Contrast Between Front Interface and Privacy Notices&lt;/h3&gt;
&lt;p align="left"&gt;The front facing interface of an app or website is designed to be far more engaging than the privacy notice pages. There is a visible difference in the UI/UX design of the pages, almost as if the privacy notices were not designed at all. In case of Uber’s mobile app, the process of adding a destination, selecting the type of cab and confirming a ride has been made simple to do for any user. This interface has been thought through keeping in mind the users’ behaviour and needs. It allows for quick and efficient use of the service. As opposed to the process of buying into the service, the privacy notice on the app is complex and unclear.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img class="image-inline image-inline" src="UberApp.jpg" alt="Uber App Interface 2" height="397" width="224" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;img class="image-inline image-inline" src="UberApp_PrivacyNotice.jpg" alt="Uber App Interface" height="397" width="224" /&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;em&gt;Uber mobile app screenshots of the front interface (left) and the policy notice page (right)&lt;/em&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify;"&gt;Gaining Trust Through the Initial Pitch&lt;/h3&gt;
&lt;p align="left"&gt;A pattern in the privacy notices of most companies is that they attempt to establish credibility and gain confidence by stating that they respect the users’ privacy. This can be seen in the introductory text of the privacy notices of Apple and LinkedIn. The underlying intent seems to be that since the company understands that the users’ privacy is important, the users can rely on them and not read the full notice.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/ApplePrivacyNote.jpg" alt="null" class="image-inline" title="Apple Privacy Note" /&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;em&gt;Introduction text to Apple’s privacy policy notice [13]&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/LinkedInPrivacyNote.jpg" alt="null" class="image-inline" title="LinkedIn Privacy Note" /&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;em&gt;Introduction text to LinkedIn’s privacy policy notice [14]&lt;/em&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify;"&gt;Low Navigability&lt;/h3&gt;
&lt;p align="left"&gt;The text heavy notices need clear content pockets which can be navigated through easily using mechanisms such as menu bar. Navigability of a document allows for quick locating of sections, and moving between them. Several companies miss to follow this. Apple and Twitter privacy notices (shown above), have low navigability as the reader has no prior indication of how many sections there are in the notice. The reader could have summarised the content based on the titles of the sections if it were available in a table of contents or a menu. Lack of a navigation system leads to endless scrolling to reach the end of the page.&lt;/p&gt;
&lt;p align="left"&gt;Facebook privacy notice, on the other hand is an example of good navigability. It uses typography and colour to build a clear structure of information that can be navigated through easily using the side menu. The menu doubles up as a table of contents for the reader. The side menu however, does not remain visible while scrolling down the page. This means while the user is reading through a section, they cannot switch to a different section from the menu directly. They will need to click on the ‘Return to top’ button and then select the section from the menu.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/DataPolicy.jpg" alt="null" class="image-inline" title="Data Policy" /&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;em&gt;Navigation menu in the Facebook Data Policy page [15]&lt;/em&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify;"&gt;Lack of Visual Support&lt;/h3&gt;
&lt;p align="left"&gt;Privacy notices can rely heavily on visuals to convey the policies more efficiently. These could be visual summaries or supporting infographics. The data flow on the platform and how it would affect the users can be clearly visualised using infographics. But, most notices fail to adopt them. The Linkedin privacy notice [16] page shows a video at the beginning of its privacy policy. Although this could have been an opportunity to explain the policy in the video, LinkedIn only gives an introduction to the notice and follows it with a pitch to use the platform. The only visual used in notices currently are icons. Facebook uses icons to identify the different sections so that they can be located easily. But, apart from being identifiers of sections, these icons do not contribute to the communication of the policy. It does not make reading of the full policy any easier.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify;"&gt;Icon Heavy ‘Visual’ Privacy Notices&lt;/h3&gt;
&lt;p align="left"&gt;The complexity of privacy notices has led to the advent of online tools and generators that create short notices or summaries for apps and websites to supplement the full text versions of policies. Most of these short notices use icons as a way of visually depicting the categories of data that is being collected and shared. iubenda [17], an online tool, generates policy notice summary and full text based on the inputs given by the client. It asks for the services offered by the site or app, and the type of data collection. Icons are used alongside the text headings to make the summary seem more ‘visual’ and hence more easily consumable. It makes the summary more inviting to read, but does not reduce the time for reading.&lt;/p&gt;
&lt;p align="left"&gt;Another icon-based policy summary generator was created by KnowPrivacy. [18] They developed a policy coding methodology by creating icon sets for types of data collected, general data practices, and data sharing. The use of icons in these short notices is more meaningful as they show which type of data is collected or not collected, shared or not shared at a glance without any text. This facilitates comparison between data practices of different apps.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/Google.jpg" alt="null" class="image-inline" title="Google" /&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;em&gt;Icon based short policy notice created for Google by KnowPrivacy [19]&lt;/em&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2 style="text-align: justify;"&gt;Initiatives to Counter Issues with the Design of Privacy Notices&lt;/h2&gt;
&lt;p align="left"&gt;Several initiatives have called out the issues with privacy notices and some have even countered them with tools and resources. The TIME.com ranking of internet-based companies’ privacy policies brought attention to the fact that some of the most popular platforms have ineffective policy notices. A user rights initiative called Terms of Services; Didn’t Read [20] rates and labels websites’ terms &amp;amp; privacy policies.&amp;nbsp;There is also the Usable Privacy Policy Project which develops techniques to semi-automatically analyze privacy policies with crowdsourcing, natural language processing, and machine learning. [21] It uses artificial intelligence to sift through the most popular sites on the Internet, including Facebook, Reddit, and Twitter, and annotate their privacy policies. They realise that it is not practical for people to read privacy policies. Thus, their aim is to use technology to extract statements from the notices and match them with things that people care about. However, even AI has not been fully successful in making sense of the dense documents and missed out some important context. [22]&lt;/p&gt;
&lt;p align="left"&gt;One of the more provocative initiatives is the Me and My Shadow ‘Lost in Small Print’ [23] project. It shows the text for the privacy notices of companies like LinkedIn, Facebook, WhatsApp, etc. and then ‘reveals’ the data collection and use information that would closely affect the users.&lt;/p&gt;
&lt;p align="left"&gt;Issues with notices have also been addressed by standardising their format, so people can interpret the information faster. The Platform for Privacy Preferences Project (P3P) [24] was one of the initial efforts in enabling websites to share their privacy practices in a standard format. Similar to KnowPrivacy’s policy coding, there are more design initiatives that are focusing on short privacy notice design. An organisation offering services in Privacy Compliance and Risk Management Solutions called TrustArc, [25] is also in the process of designing an interactive icon-based privacy short notice.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/PrivacySummary.jpg" alt="null" class="image-inline" title="Privacy Summary" /&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;em&gt;TrustArc’s proposed design [26] for the short notice for a sample site&lt;/em&gt;&lt;/p&gt;
&lt;p align="left"&gt;Most efforts have been done in simplifying the notices so as to decode the complex terminology. But, there have been very few evaluations and initiatives to improve the design of these notices.&lt;/p&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;Recommendations&lt;/h2&gt;
&lt;h3&gt;Multilayered Privacy Notices&lt;/h3&gt;
&lt;p align="left"&gt;One of the existing suggestions on increasing usability of privacy notices are multilayered privacy notices. [27] Multilayered privacy notices comprise a very short notice designed for use on portable digital devices where there is limited space, condensed notice that contains all the key factors in an easy to understand way, and a complete notice with all the legal requirements. [28] Some of the examples above use this in the form of short notices and summaries. The very short notice layer consists of who is collecting the information, primary uses of information, and contact details of the organisation.[29] Condensed notice layer covers scope or who does the notice apply to, personal information collected, uses and sharing, choices, specific legal requirements if any, and contact information. [30] In order to maintain consistency, the sequence of topics in the condensed and the full notice must be same. Words and phrases should also be consistent in both layers. Although an effective way of simplifying information, multi-layered notices must be reconsidered along with the timing of notices. For instance, it could be more suitable to show very short notices at the time of collection or sharing of user data.&lt;/p&gt;
&lt;h3 align="left"&gt;Supporting Infographics&lt;/h3&gt;
&lt;p align="left"&gt;Based on their visual design, the currently available privacy notices can be broadly classified into 4 categories; (i) the text only notices which do not have a clearly visible structure, (ii) the text notices with a contents menu that helps in informing of the structure and in navigating, (iii) the notices with basic use of visual elements such as icons used only to identify sections or headings, (iv) multilayered notices or notices with short summary before giving out the full text. There is still a lack of visual aid in all these formats. The use of visuals in the form of infographics to depict data flows could be more helpful for the users both in short summaries and complete text of policy notices.&lt;/p&gt;
&lt;h3 align="left"&gt;Integrating the Privacy Notices with the Rest of the System&lt;/h3&gt;
&lt;p align="left"&gt;The design of privacy notices usually seems disconnected to the rest of the app or website. The UI/UX design of privacy notices requires as much attention as the consumer-facing interface of a system. The contribution of the designer has to be more than creating a clean layout for the text of the notice. The integration of privacy notices with the rest of the system is also related to the early involvement of the designer in the project. The designer needs to understand the information flows and data practices of a system in order to determine whether privacy notices are needed, who should be notified, and about what. This means that decisions such as selecting the categories to be represented in the short or condensed notice, the datasets within these categories, and the ways of representing them would all be part of the design process. The design interventions cannot be purely visual or UI/UX based. They need to be worked out keeping in mind the information architecture, content design, and research. By integrating the notices, strategic decisions on the timing and layering of content can be made as well, apart from the aesthetic decisions. Just as the aim of the front face of the interface in a system makes it easier for the user to avail the service, the policy notice should also help the user in understanding the consequences, by giving them clear notice of the unexpected collection or uses of their data.&lt;/p&gt;
&lt;h3 align="left"&gt;Practice Based Frameworks on Designing Privacy Notices&lt;/h3&gt;
&lt;p align="left"&gt;There is little guidance available to communication designers for the actual design of privacy notices which is specific to the requirements and characteristics of a system. [31] The UI/UX practice needs to be expanded to include ethical ways of designing privacy notices online. The paper published by Florian Schaub, Rebecca Balebako, Adam L. Durity, and Lorrie Faith Cranor, called, ‘A Design Space for Effective Privacy Notice’ in 2015 offers a comprehensive design frame­work and standardised vocabulary for describing privacy notice options. [32] The objective of the paper is to allow designers to use this framework and vocabulary in creating effective privacy notices. The design space suggested has four key dimensions, ‘timing’, ‘channel’, ‘modality’ and ‘control’. [33] It also provides options for each of these dimensions. For example, ‘timing’ options are ‘at setup’, ‘just in time’, ‘context-dependent’, ‘periodic’, ‘persistent’, and ‘on demand’. The dimensions and options in the design space can be expanded to accommodate new systems and interaction methods.&lt;/p&gt;
&lt;h3 align="left"&gt;Considering the Diversity of Audiences&lt;/h3&gt;
&lt;p align="left"&gt;For the various mobile apps and services, there are multiple user groups who use them. The privacy notices are hence not targeted to one kind of an audience. There are diverse audiences who have different privacy preferences for the same system. [34] The privacy preferences of these diverse groups of users’ must be accommodated. In a typical design process for any system, multiple user personas are identified. The needs and behaviour of each persona is used to determine the design of the interface. Privacy preferences must also be observed as part of these considerations for personas, especially while designing the privacy notices. Different users may need different kinds of notices based on which data practices affect them.[35] Thus, rather than mandating a single mechanism for obtaining informed consent for all users in all situations, designers need to provide users with a range of mechanisms and levels of control. [36]&lt;/p&gt;
&lt;h3 align="left"&gt;Ethical Framework for Design Practitioners&lt;/h3&gt;
&lt;p align="left"&gt;An ethical framework is required for design practitioners that can be followed at the level of both deciding the information flow and the experience design. With the prevalence of ‘dark patterns’, the visual design of notices is used to trick users into accepting it. Design ethics can play a huge role in countering such practices. Will Dayable, co-director at Squareweave, [37] a developer of web and mobile apps, suggests that UI/UX designers should “Design Like They’re (Users are) Drunk”. [38]&amp;nbsp;&amp;nbsp;He asks designers to imagine the user to be in a hurry and still allow them access to all the information necessary for making a decision. He concludes that good privacy UX and UI is about actually trying to communicate with users rather than trying to slip one past them. In principle, an ethical design practice would respect the rights of the users and proactively design to facilitate informed consent.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2 style="text-align: justify;"&gt;Reconceptualising Privacy Notices&lt;/h2&gt;
&lt;p align="left"&gt;Based on the above recommendations, a guiding sample for multilayered privacy notices has been created. Each system would need its own structure and mechanisms for notices, which are integrated with its data practice, audiences, and medium, but this sample notice provides basic guidelines for creating effective and accessible privacy notices. The aesthetic decisions would also vary based on the interface design of a system.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/SampleEye.jpg" alt="null" class="image-inline" title="Sample Eye" /&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;em&gt;Sample Fixed Icon for Privacy Notifications&lt;/em&gt;&lt;/p&gt;
&lt;p align="left"&gt;A fixed icon can appear along with all privacy notifications on the system, so that the users can immediately know that the notification is about a privacy concern. This icon should capture attention instantly and suggest a sense of caution. Besides its use as a call to attention, the icon can also lead to a side panel for privacy implications from all actions that the user takes.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/SampleVeryShortNotice.jpg" alt="null" class="image-inline" title="Sample Very Short Notice" /&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;em&gt;Sample Very Short Notice on Desktop and Mobile Platforms&lt;/em&gt;&lt;/p&gt;
&lt;p align="left"&gt;The very short notices can be shown when an action from the user would lead to data collection or sharing. The notice mechanism should be designed to provide notices at different times tailored to a user’s needs in that context. The styling and placement of the ‘Allow’ and ‘Don’t Allow’ buttons should not be biased towards the ‘Allow’ option. The text used in very short and condensed notice layers should be engaging yet honest in its communication.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/DataCollected.jpg" alt="null" class="image-inline" title="Data Collected" /&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;em&gt;Sample Summary Notice&lt;/em&gt;&lt;/p&gt;
&lt;p align="left"&gt;The summary or the condensed notice layer should allow the user to gauge at a glance, how the data policy is going to affect them. This can be combined with a menu that lists the topics covered in the full notice. The menu would double up as a navigation mechanism for users. It should be visible to users even as they scroll down to the full notice. The condensed notice can also be supported by an infographic depicting the flow of data in the system.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/DataCollection.jpg" alt="null" class="image-inline" title="Data Collection" /&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;em&gt;Sample Navigation Menu&lt;/em&gt;&lt;/p&gt;
&lt;p align="left"&gt;All the images in this section use sample text for the purpose of illustrating the structure and layout&lt;/p&gt;
&lt;p align="left"&gt;The full notice can be made accessible by creating a clear information hierarchy in the text. The menu which is available on the side while scrolling down the text would facilitate navigation and familiarity with the structure of the notice.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2 style="text-align: justify;"&gt;Conclusion&lt;/h2&gt;
&lt;p align="left"&gt;The presentation of privacy notices directly influences the decisions of users online and ineffective notices make users vulnerable to their data being misused. But currently, there is little conversation about privacy and data protection among designers. Design practice has to become sensitive to privacy and security requirements. Designers need to take the accountability of creating accessible notices which are beneficial to the users, rather than to the companies issuing them. They must prioritise the well-being of users over aesthetics and user experience even. The aesthetics of a platform must be directed at achieving transparency in the privacy notice by making it easily readable.&lt;/p&gt;
&lt;p align="left"&gt;The design community in India has a more urgent task at hand of building a design practice that is informed by privacy. Comparing the privacy notices of Indian and global companies, Indian companies have an even longer way to go in terms of communicating the notices effectively. Most Indian companies such as Swiggy, [39] 99acres, [40] and Paytm [41] have completely textual privacy policy notices with no clear information hierarchy or navigation. Ola Cabs [42]&amp;nbsp; provides an external link to their privacy notice, which opens as a pdf, making it even more inaccessible. Thus, there is a complete lack of design input in the layout of these notices.&lt;/p&gt;
&lt;p align="left"&gt;Designers must engage in conversations with technologists and researchers, and include privacy and other user rights in design education in order to prepare practitioners for creating more valuable digital platforms.&lt;/p&gt;
&lt;hr /&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://www.ftc.gov/system/files/documents/public_comments/2015/10/00038-97832.pdf"&gt;https://www.ftc.gov/system/files/documents/public_comments/2015/10/00038-97832.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fastcodesign.com/3032719/ui-ux-who-does-what-a-designers-guide-to-the-tech-industry"&gt;https://www.fastcodesign.com/3032719/ui-ux-who-does-what-a-designers-guide-to-the-tech-industry&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vsdesign.org/publications/pdf/Security_and_Usability_ch24.pdf"&gt;https://vsdesign.org/publications/pdf/Security_and_Usability_ch24.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vsdesign.org/publications/pdf/Security_and_Usability_ch24.pdf"&gt;https://vsdesign.org/publications/pdf/Security_and_Usability_ch24.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://fieldguide.gizmodo.com/dark-patterns-how-websites-are-tricking-you-into-givin-1794734134"&gt;https://fieldguide.gizmodo.com/dark-patterns-how-websites-are-tricking-you-into-givin-1794734134&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://darkpatterns.org/"&gt;https://darkpatterns.org/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://centerforplainlanguage.org/"&gt;https://centerforplainlanguage.org/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://centerforplainlanguage.org/wp-content/uploads/2016/11/TIME-privacy-policy-analysis-report.pdf"&gt;https://centerforplainlanguage.org/wp-content/uploads/2016/11/TIME-privacy-policy-analysis-report.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://time.com/3986016/google-facebook-twitter-privacy-policies/"&gt;http://time.com/3986016/google-facebook-twitter-privacy-policies/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.safaribooksonline.com/library/view/security-and-usability/0596008279/ch04.html"&gt;https://www.safaribooksonline.com/library/view/security-and-usability/0596008279/ch04.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.apple.com/legal/privacy/en-ww/?cid=wwa-us-kwg-features-com"&gt;https://www.apple.com/legal/privacy/en-ww/?cid=wwa-us-kwg-features-com&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/privacy?lang=en"&gt;https://twitter.com/privacy?lang=en&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.apple.com/legal/privacy/en-ww/?cid=wwa-us-kwg-features-com"&gt;https://www.apple.com/legal/privacy/en-ww/?cid=wwa-us-kwg-features-com&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.linkedin.com/legal/privacy-policy"&gt;https://www.linkedin.com/legal/privacy-policy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.facebook.com/privacy/explanation"&gt;https://www.facebook.com/privacy/explanation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.linkedin.com/legal/privacy-policy"&gt;https://www.linkedin.com/legal/privacy-policy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.iubenda.com/blog/2013/06/13/privacy%C2%ADpolicy%C2%ADfor%C2%ADandroid%C2%ADapp/"&gt;http://www.iubenda.com/blog/2013/06/13/privacy­policy­for­android­app/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://knowprivacy.org/policies_methodology.html"&gt;http://knowprivacy.org/policies_methodology.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://knowprivacy.org/profiles/google"&gt;http://knowprivacy.org/profiles/google&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://tosdr.org/"&gt;https://tosdr.org/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://explore.usableprivacy.org/"&gt;https://explore.usableprivacy.org/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://motherboard.vice.com/en_us/article/a3yz4p/browser-plugin-to-read-privacy-policy-carnegie-mellon"&gt;https://motherboard.vice.com/en_us/article/a3yz4p/browser-plugin-to-read-privacy-policy-carnegie-mellon&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://myshadow.org/lost-in-small-print"&gt;https://myshadow.org/lost-in-small-print&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.w3.org/P3P/"&gt;https://www.w3.org/P3P/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.trustarc.com/blog/2011/02/17/privacy-short-notice-designpart-i-background/"&gt;http://www.trustarc.com/blog/2011/02/17/privacy-short-notice-designpart-i-background/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.trustarc.com/blog/?p=1253"&gt;http://www.trustarc.com/blog/?p=1253&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.ftc.gov/system/files/documents/public_comments/2015/10/00038-97832.pdf"&gt;https://www.ftc.gov/system/files/documents/public_comments/2015/10/00038-97832.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/ten_steps_to_develop_a_multilayered_privacy_notice__white_paper_march_2007_.pdf"&gt;https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/ten_steps_to_develop_a_multilayered_privacy_notice__white_paper_march_2007_.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/ten_steps_to_develop_a_multilayered_privacy_notice__white_paper_march_2007_.pdf"&gt;https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/ten_steps_to_develop_a_multilayered_privacy_notice__white_paper_march_2007_.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/ten_steps_to_develop_a_multilayered_privacy_notice__white_paper_march_2007_.pdf"&gt;https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/ten_steps_to_develop_a_multilayered_privacy_notice__white_paper_march_2007_.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.ftc.gov/system/files/documents/public_comments/2015/10/00038-97832.pdf"&gt;https://www.ftc.gov/system/files/documents/public_comments/2015/10/00038-97832.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.ftc.gov/system/files/documents/public_comments/2015/10/00038-97832.pdf"&gt;https://www.ftc.gov/system/files/documents/public_comments/2015/10/00038-97832.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.ftc.gov/system/files/documents/public_comments/2015/10/00038-97832.pdf"&gt;https://www.ftc.gov/system/files/documents/public_comments/2015/10/00038-97832.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.safaribooksonline.com/library/view/security-and-usability/0596008279/ch04.html"&gt;https://www.safaribooksonline.com/library/view/security-and-usability/0596008279/ch04.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.ftc.gov/system/files/documents/public_comments/2015/10/00038-97832.pdf"&gt;https://www.ftc.gov/system/files/documents/public_comments/2015/10/00038-97832.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://vsdesign.org/publications/pdf/Security_and_Usability_ch24.pdf"&gt;https://vsdesign.org/publications/pdf/Security_and_Usability_ch24.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.squareweave.com.au/"&gt;https://www.squareweave.com.au/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://iapp.org/news/a/how-ui-and-ux-can-ko-privacy/"&gt;https://iapp.org/news/a/how-ui-and-ux-can-ko-privacy/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.swiggy.com/privacy-policy"&gt;https://www.swiggy.com/privacy-policy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.99acres.com/load/Company/privacy"&gt;https://www.99acres.com/load/Company/privacy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://pages.paytm.com/privacy.html"&gt;https://pages.paytm.com/privacy.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://s3-ap-southeast-1.amazonaws.com/ola-prod-website/privacy_policy.pdf"&gt;https://s3-ap-southeast-1.amazonaws.com/ola-prod-website/privacy_policy.pdf&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/design-concerns-in-creating-privacy-notices'&gt;https://cis-india.org/internet-governance/blog/design-concerns-in-creating-privacy-notices&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>saumyaa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-06-06T13:45:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/digtial-identities-research-plan">
    <title>Design and Uses of Digital Identities - Research Plan</title>
    <link>https://cis-india.org/internet-governance/blog/digtial-identities-research-plan</link>
    <description>
        &lt;b&gt;In our research project about uses and design of digital identity systems, we ask two core questions: a) What are appropriate uses of ID?, and b) How should we think about the technological design of ID? Towards the first research question, we have worked on first principles and will further develop definitions, legal tests and applications of these principles. Towards the second research question, we have first identified a set of existing and planned digital identity systems that represent a paradigm of how such a system can be envisioned and implemented, and will look to identify key design choices which are causing divergence in paradigm.&lt;/b&gt;
        
&lt;h4&gt;Read the research plan &lt;a class="external-link" href="https://digitalid.design/research-plan.html"&gt;here&lt;/a&gt;.&lt;/h4&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/digtial-identities-research-plan'&gt;https://cis-india.org/internet-governance/blog/digtial-identities-research-plan&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha and Pooja Saxena</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Appropriate Use of Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2019-08-17T07:58:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/deployment-of-digital-health-policies-and-technologies-during-covid-19">
    <title>Deployment of Digital Health Policies and Technologies: During Covid-19</title>
    <link>https://cis-india.org/internet-governance/blog/deployment-of-digital-health-policies-and-technologies-during-covid-19</link>
    <description>
        &lt;b&gt;In the last twenty years or so, the Indian government has adopted several digital mechanisms to deliver services to its citizens. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Digitisation of public services in India began with taxation, land record keeping, and passport details recording, but it was soon extended to cover most governmental services - with the latest being public health. The digitisation of healthcare system in India had begun prior to the pandemic. However, given the push digital health has received in recent years especially with an increase in the intensity of activity during the pandemic, we thought it is important to undertake a comprehensive study of India's digital health policies and implementation. The project report comprises a desk-based research review of the existing literature on digital health technologies in India and interviews with on-field healthcare professionals who are responsible for implementing technologies on the ground.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The report by Privacy International and the Centre for Internet &amp;amp; Society can be &lt;a href="https://cis-india.org/internet-governance/deployment-of-digital-health-policies-and-technologies" class="internal-link"&gt;&lt;strong&gt;accessed here&lt;/strong&gt;&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/deployment-of-digital-health-policies-and-technologies-during-covid-19'&gt;https://cis-india.org/internet-governance/blog/deployment-of-digital-health-policies-and-technologies-during-covid-19&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pallavi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Digitalisation</dc:subject>
    
    
        <dc:subject>Digital Health</dc:subject>
    
    
        <dc:subject>Digital Knowledge</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Digital Technologies</dc:subject>
    
    
        <dc:subject>Digitisation</dc:subject>
    

   <dc:date>2022-07-21T14:49:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
