<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2236 to 2250.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/democracy-and-the-internet-in-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/tele-analysis-gyana-ranjan-swain-delhi-govt-sets-up-wifi-task-force"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-harsimran-julka-february-25-2015-delhi-government-in-consultation-with-centre-to-block-ubers-internet-address"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-december-29-2012-delhi-gang-rape"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/gulf-today-aug-25-2012-delhi-defends-internet-blocking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/deity-says-143-urls-blocked-in-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-sanjay-vijaykumar-may-10-2015-pranesh-prakash-on-definition-of-net-neutrality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-july-14-2019-rajmohan-sudhakar-deepfakes-algorithms-at-war-trust-at-stake"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/deep-packet-inspection-how-it-works-and-its-impact-on-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/deconstructing-2018internet-addiction2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-october-3-2013-javed-anwer-decline-in-web-freedom-steepest-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/deceptive-design-in-voice-interfaces-impact-on-inclusivity-accessibility-and-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/december-2018-newsletter"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/democracy-and-the-internet-in-2017">
    <title>Democracy and the Internet in 2017</title>
    <link>https://cis-india.org/internet-governance/news/democracy-and-the-internet-in-2017</link>
    <description>
        &lt;b&gt;Vidushi Marda gave a talk at St. Joseph's College of Commerce in Bengaluru on January 25, 2017. Vidushi spoke about democracy and the internet. The 50 minute talk was followed by 20 minutes of questions/comments.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Undergraduate students from a variety of disciplines such as social science, engineering, business, etc. attended the lecture. The talk broadly focused on:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The relationship between democracy and the internet. Why/how are they are closely related.&lt;/li&gt;
&lt;li&gt;The internet's role in changing information exchange and communication. I drew on examples like the Arab Spring/Elections/Political change.&lt;/li&gt;
&lt;li&gt;The growing usage of internet platforms for elections and also governance. Problematising the fact that these few private platforms seem to monopolise the internet, are only restricted to a certain elite audience, cannot be conflated with actual governance etc.&lt;/li&gt;
&lt;li&gt;Fake News.&lt;/li&gt;
&lt;li&gt;Algorithmic curation and filter bubbles.&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/democracy-and-the-internet-in-2017'&gt;https://cis-india.org/internet-governance/news/democracy-and-the-internet-in-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-03-28T15:19:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights">
    <title>Delhi High Court Orders Blocking of Websites after Sony Complains Infringement of 2014 FIFA World Cup Telecast Rights</title>
    <link>https://cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights</link>
    <description>
        &lt;b&gt;Of late the Indian judiciary has been issuing John Doe orders to block websites, most recently in Multi Screen Media v. Sunit Singh and Others. The order mandated blocking of 472 websites, out of which approximately 267 websites were blocked as on July 7, 2014. This trend is an extremely dangerous one because it encourages flagrant censorship by intermediaries based on a judicial order which does not provide for specific blocking of a URL, instead provides for blocking of the entire website. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The High Court of Delhi on June 23, 2014 issued a &lt;a class="external-link" href="http://delhihighcourt.nic.in/dhcqrydisp_o.asp?pn=119642&amp;amp;yr=2014"&gt;John Doe injunction&lt;/a&gt; restraining more than 400 websites from broadcasting 2014 FIFA world cup matches. &lt;a href="http://www.khelnama.com/140624/football/news/delhi-high-court-bans-400-websites-live-streaming-fifa-wold-cup/16001"&gt;News reports&lt;/a&gt; indicate that the Single judge bench of Justice V. Kameswar Rao directed the &lt;a class="external-link" href="http://www.dot.gov.in/"&gt;Department of Telecom&lt;/a&gt; to issue appropriate directions to ISPs to block the websites that Multi Screen Media provided, as well as &lt;b&gt;“any other website identified by the plaintiff”&lt;/b&gt; in the future. &lt;b&gt;On July 4, Justice G. S. Sistani permitted &lt;a href="http://ibnlive.in.com/news/airtel-blocks-219-websites-for-infringing-on-sonys-world-cup-2014-telecast-rights/484439-11.html"&gt;reducing the list to 219 websites&lt;/a&gt;&lt;/b&gt;. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Background&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Multi Screen Media (MSM) is the official broadcaster for the ongoing 2014 FIFA World Cup tournament. FIFA (the Governing body) had exclusively licensed rights to MSM which included live, delayed, highlights, on demand, and repeat broadcast of the FIFA matches. MSM complained that the defendants indulged in hosting, streaming, providing access to, etc, thereby infringing the exclusive rights and broadcast and reproduction rights of MSM.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The court in the instant order held that the defendants had &lt;b&gt;&lt;i&gt;prima facie&lt;/i&gt;&lt;/b&gt; infringed MSM’s broadcasting rights, which are guaranteed by section 37 of the &lt;a class="external-link" href="http://copyright.gov.in/Documents/CopyrightRules1957.pdf"&gt;Copyright Act, 1957&lt;/a&gt;.  In an over-zealous attempt to pre-empt infringement the court called for a blanket ban on all websites identified by MSM. Further, the court directed the concerned authorities to ensure ISPs complied with this order and block the websites mentioned by MSM presently, and other websites which may be subsequently be notified by MSM.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Where the Court went Wrong&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The court stated that MSM successfully established a &lt;b&gt;prima facie case&lt;/b&gt;, and on its basis granted a sweeping injunction to MSM ordering &lt;b&gt;blocking 471 second level domains&lt;/b&gt;. I’d like to point out numerous flaws with the order-&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Dissatisfactory "Prima facie case"&lt;/b&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;div style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;In my opinion the court could have scrutinised the list of websites provided by MSM more carefully. There is nothing in the order to suggest that evidence was proffered by MSM in support of the list. The order reveals that the list was prepared by &lt;/span&gt;&lt;a href="http://www.markscan.co.in/index.php" style="text-align: justify; "&gt;MarkScan&lt;/a&gt;&lt;span style="text-align: justify; "&gt;, a &lt;/span&gt;&lt;i style="text-align: justify; "&gt;“consulting boutique dedicated to (the client’s) IP requirements in the cyberspace and the Indian sub-continent.”&lt;/i&gt;&lt;span style="text-align: justify; "&gt; The list throws up names such as docs.google.com, goo.gl &amp;amp; ad.ly (provide URL shortening service &lt;/span&gt;&lt;i style="text-align: justify; "&gt;only&lt;/i&gt;&lt;span style="text-align: justify; "&gt;), torrent indexing websites, IP addresses, online file streaming websites, etc., at a cursory glance. Evidently, perfectly legitimate websites have been targeted by an ill conducted search and shoddily prepared list which may lead to blocking of legitimate content on account of no verification by the court. &lt;/span&gt;&lt;b style="text-align: justify; "&gt;471 websites out of 472 mentioned in the first list are second level domains&lt;/b&gt;&lt;span style="text-align: justify; "&gt; and &lt;/span&gt;&lt;b style="text-align: justify; "&gt;23&lt;/b&gt;&lt;span style="text-align: justify; "&gt; websites have been &lt;/span&gt;&lt;b style="text-align: justify; "&gt;listed twice&lt;/b&gt;&lt;span style="text-align: justify; "&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b style="text-align: justify; "&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;2. &lt;/span&gt;&lt;b style="text-align: justify; "&gt;Generic order which abysmally fails to identify specific infringing URLS&lt;/b&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Out of the 472 websites (list provided in the order by MarkScan)-&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align: justify; "&gt;471 are file streaming websites, video sharing websites, file lockers, URL shorteners, file storage websites; &lt;b&gt;only one is a specific URL&lt;/b&gt; [&lt;a href="http://www.24livestreamtv.com/brazil-2014-fifa-world-cup-football-%20%C2%A0%C2%A0live-streaming-online-t"&gt;http://www.24livestreamtv.com/brazil-2014-fifa-world-cup-football-%20%C2%A0%C2%A0live-streaming-online-t&lt;/a&gt; ].&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/copy_of_Untitled.jpg/image_preview" alt="Breakdown of the list in the July 23rd Order" class="image-inline image-inline" title="Breakdown of the list in the July 23rd Order" /&gt;&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align: justify; "&gt;The order calls for blocking of complete websites. This is in complete contradiction to the 2012 Madras High Court’s order in &lt;a href="https://cis-india.org/internet-governance/blog/internet-governance/resources/john-doe-order-r.k.-productions-v.-bsnl-mtnl-and-ors.-movie-3"&gt;R K Productions v BSNL&lt;/a&gt; which held that only a particular URL where the infringing content is kept should be blocked, rather than the entire website. The Madras High Court order had also made it mandatory for the complainants to provide exact URLs where they find illegal content, such that ISPs could block only that content and not the entire site. MSM did not adhere to this and I have serious doubts if the defendants brought the distinguishing Madras High Court judgment to the attention of the bench. The entire situation is akin to MarkScan scamming MSM by providing their clients a dodgy list, and MSM scamming the court and the public at large.&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align: justify; "&gt;3.&lt;b&gt; Lack of Transparency – Different blocking messages on different ISPs&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align: justify; "&gt;The message displayed uniformly on blocked websites was:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"This website/URL has been blocked until further notice either pursuant to court orders or on the directions issued by the Department of Telecommunications."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I observed that a few websites showed the message &lt;b&gt;“Error 404 – File or Directory not found”&lt;/b&gt; without the blocking message (above) on the network provider Reliance, and same Error 404 with the blocking message on the network provider Airtel highlighting the non-transparent manner of adherence to the order. Further, both the messages do not indicate the end period of the block.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Legality of John Doe orders in Website Blocking&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It is pertinent to reiterate the ‘misuse’ of John Doe orders to block websites in India. The judiciary has erred in applying the John Doe order to protect copyrightable content on the internet. While the &lt;i&gt;R K Productions v BSNL&lt;/i&gt; case appears reasonable in terms of permitting blocking of only URL specific content, the application of John Doe order to block websites remains unfounded in law. Ananth Padmanabhan in a three part study (&lt;a href="https://cis-india.org/internet-governance/blog/a2k/blog/john-doe-orders-isp-blocking-websites-copyright-1"&gt;Part I&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/a2k/blog/john-doe-orders-isp-blocking-websites-copyright-2"&gt;II&lt;/a&gt; and &lt;a href="https://cis-india.org/internet-governance/blog/a2k/blog/john-doe-orders-isp-blocking-websites-copyright-3"&gt;III&lt;/a&gt;) had earlier analysed the improper use of John Doe injunctions to block websites in India. The John Doe order was conceived by US courts to pre-emptively remedy the irreparable damages suffered by copyright holders on account of unidentified/unnamed infringers. The interim injunction allowed collection of evidence from infringers, who were identified later as certain defendants and the final relief was accordingly granted. The courts routinely advocated judicious use of the order, and ensured that the identified defendants were provided and informed of their right to apply to the court within twenty four hours for a review of the order and a right to claim damages in an appropriate case. Therefore, the John Doe order applied against &lt;i&gt;primary&lt;/i&gt; infringers &lt;i&gt;per se.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, whilst extending this remedy in India the &lt;b&gt;courts have unfortunately placed onus on the conduit i.e. the ISP to block websites&lt;/b&gt;. This is &lt;a href="https://cis-india.org/internet-governance/blog/a2k/blog/john-doe-orders-isp-blocking-websites-copyright-1"&gt;tantamount to providing final relief at the interim stage&lt;/a&gt;, since all content definitely gets blocked; however, this hardly helps in identifying the actual infringer on the internet. &lt;b&gt;The court is prematurely doling out blocking remedies to the complaining party, which, legally speaking should be meted out only during the final disposition of the case after careful examination of the evidence available.&lt;/b&gt; Thus, the intent of a John Doe order is miserably lost in such an application. Moreover, this lends an arbitrary amount of power in the hands of intermediaries since ISPs may or may not choose to approach the court for directions to specifically block URLs which provide access to infringing content only.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights'&gt;https://cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2014-07-08T07:02:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/tele-analysis-gyana-ranjan-swain-delhi-govt-sets-up-wifi-task-force">
    <title>Delhi Govt Sets Up WiFi Task Force</title>
    <link>https://cis-india.org/internet-governance/news/tele-analysis-gyana-ranjan-swain-delhi-govt-sets-up-wifi-task-force</link>
    <description>
        &lt;b&gt;Delhi government is believed to have set up a task force to enable WiFi in the city. The task force, which has been recently constituted, includes entrepreneur and start-up advisor Mahesh Murthy, Medianama founder Nikhil Pahwa and Center for Internet Society director Pranesh Prakash, as per a report by PTI.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Originally published by Press Trust of India, the news was mirrored by &lt;a class="external-link" href="http://www.teleanalysis.com/news/delhi-govt-sets-up-wifi-task-force-14023.html"&gt;TeleAnalysis&lt;/a&gt; on March 18, 2015.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Wifi task force was set up by Delhi Dialogue Commission (DDC),  which besides this, will also look after various initiatives that can  make Delhi a better place to live. The commission, in the past, has  sought suggestions, expert opinions and proposals from domain experts in  various issues related to Delhi. The DDC is evaluating various  proposals and will act accordingly, the report said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DDC is inviting proposals and suggestions, comments and ideas  over email at ddc.delhi@gov.in and the Whatsapp helpline +919643327265.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“These have received tremendous response with over 400 emails and  thousands of Whatsapp messages coming in from Delhi citizens, who sent  in their requests and needs and also detailed technical assistance and  support in the implementation of this project,” the government said in a  statement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the above email Id is active and we got an instant automated  response, when sent a query, the Whatsapp number seems to be dead, as it  was last seen on ‘1/25/2015′.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Providing free WiFi in Delhi was a part of the manifesto of the Aam Aadmi Party.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/tele-analysis-gyana-ranjan-swain-delhi-govt-sets-up-wifi-task-force'&gt;https://cis-india.org/internet-governance/news/tele-analysis-gyana-ranjan-swain-delhi-govt-sets-up-wifi-task-force&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-04-03T07:06:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-harsimran-julka-february-25-2015-delhi-government-in-consultation-with-centre-to-block-ubers-internet-address">
    <title>Delhi government in consultation with Centre to block Uber's Internet address</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-harsimran-julka-february-25-2015-delhi-government-in-consultation-with-centre-to-block-ubers-internet-address</link>
    <description>
        &lt;b&gt;The Delhi transport department has started consultation with the central government to block the internet address of taxi hailing app Uber if the San Francisco-based startup does not obtain a radio taxi licence to ply its cabs in the national capital.&lt;/b&gt;
        &lt;p&gt;The article by Harsimran Julka was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2015-02-25/news/59499984_1_delhi-high-court-radio-taxi-licence-transport-department"&gt;published in the Economic Times&lt;/a&gt; on February 25, 2015. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Blocking Uber's IP will mean the company's website and mobile phone  application will no longer be accessible in India, effectively shutting  down operations in a country which the startup estimates is its largest  market outside the &lt;a href="http://economictimes.indiatimes.com/topic/United%20States"&gt;United States&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Uber has operations across 10 cities in India with over 10,000 cabs  registered on its platform."We have initiated a process with the central  government to block (Uber's) IP address in India if the company doesn't  abide by law," said a senior official in the Delhi transport  department.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Uber and other taxi app companies were banned from  operating in Delhi after the alleged rape of a passenger by a driver on  the Uber network in December 2014. Subsequently, the transport  department modified radio taxi laws and directed Uber and rivals &lt;span&gt;OlaCabs&lt;/span&gt; and Taxiforsure to obtain licences to operate legally in the city.  While Ola has obtained a licence, Uber, which terms itself as a  technology company and not a transport provider, has been demanding that  it be regulated under the Information Technology Act. "There has to be  an end to the matter somewhere," said the official quoted above. The  department has given Uber time until February 25 to submit a revised  application for a radio taxi licence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We are waiting to see if they comply and apply for a licence before  issuing a written request (to block the IP address),' said a second  official who confirmed that the transport department had already begun  discussions with the department of IT. Zubeda Begum, the standing  counsel for the Delhi government is likely to submit an affidavit on  Wednesday in the Delhi High Court on the method to be adopted to block  the IP address.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The court, which is hearing the case of the  alleged rape, had raised the issue of banning IP addresses of taxi app  companies after the state government complained that the companies  continued to ply in the national despite the ban.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It is the  central government which will have to block the website. The Delhi  government just has to make a request," Begum told ET.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pawan Duggal, cyber law expert and a &lt;a href="http://economictimes.indiatimes.com/topic/Supreme%20Court"&gt;Supreme Court&lt;/a&gt; advocate, said that the blocking of websites in India can be done under Section 69A of the &lt;a href="http://economictimes.indiatimes.com/topic/Information%20Technology%20Act"&gt;Information Technology Act&lt;/a&gt; but the rules to get them unblocked are unclear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"A court order may be needed to get it unblocked," said Duggal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A spokeswoman for Uber said the company will continue to work with the  authorities and is "evaluating the perceived deficiencies in the time  period provided to us by the government."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is not the first time that the website of a foreign company  will be banned in India. Last December, about 32 websites including &lt;a href="http://economictimes.indiatimes.com/topic/SourceForge"&gt;SourceForge&lt;/a&gt;, &lt;a href="http://economictimes.indiatimes.com/topic/Archive"&gt;Archive&lt;/a&gt;, &lt;a href="http://economictimes.indiatimes.com/topic/Vimeo"&gt;Vimeo&lt;/a&gt;, &lt;a href="http://economictimes.indiatimes.com/topic/Dailymotion"&gt;Dailymotion&lt;/a&gt; were banned on grounds of national security. Uber itself has had its IP  address blocked in countries such as Spain. Last December, a Madrid  Court ordered Spain's telcos to block access to Uber.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Any state  government department can request the designated authority to block a  website. The authority has to then forward the request to a committee,  which takes the decision," said Pranesh Prakash, at the Centre for  Internet and Society in Bengaluru.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-harsimran-julka-february-25-2015-delhi-government-in-consultation-with-centre-to-block-ubers-internet-address'&gt;https://cis-india.org/internet-governance/news/economic-times-harsimran-julka-february-25-2015-delhi-government-in-consultation-with-centre-to-block-ubers-internet-address&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-03-09T02:12:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-december-29-2012-delhi-gang-rape">
    <title>Delhi gang rape: What Facebook, Twitter expose about govt</title>
    <link>https://cis-india.org/news/times-of-india-december-29-2012-delhi-gang-rape</link>
    <description>
        &lt;b&gt;When constable Subhash Tomar collapsed during the anti-rape agitation in New Delhi, the government was keen to say he suffered injuries inflicted by the protesters. But the administration's version of events was challenged soon on social media, and the mainstream media latched onto the mystery and started pressurising the government to come clean.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/social-media/Delhi-gang-rape-What-Facebook-Twitter-expose-about-govt/articleshow/17806247.cms"&gt;published in the Times of India&lt;/a&gt; on December 29, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;The Tomar episode, when  &lt;a href="http://timesofindia.indiatimes.com/topic/social-media"&gt;social media&lt;/a&gt; set the agenda and put the government on the back foot, is one more  example of rise of people's power online. The political class in India  has been shaken by the speed and efficiency with which the recent  protests were coordinated. Some of them, like Abhijit Mukherjee, have  ended up putting their foot in their mouth while others like Congress'  youth icon and heir apparent Rahul Gandhi have not even cared to react. &lt;br /&gt;&lt;br /&gt; The reason for Tomar's death is still unclear, but the post-mortem report has attributed it to external injuries. &lt;br /&gt;&lt;br /&gt; "Frankly, right now, we haven't figured out how to deal with this phenomenon," said Congress Party Spokesman Sandeep Dikshit. &lt;br /&gt;&lt;br /&gt; The anti-corruption movement of Anna Hazare, the Occupy Wall Street  movement in the US, and the Arab Spring were all largely organised  through  &lt;a href="http://timesofindia.indiatimes.com/topic/social-networking-sites"&gt;social networking sites&lt;/a&gt;.  Even in neighbouring Pakistan, the raid that killed al-Qaeda chief  Osama bin Laden was first reported on microblogging site Twitter,  further highlighting social media's growing importance as a source of  information. Such is the influence and impact of social media that many  are increasingly referring to it as the "fifth pillar of democracy".&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Influence bound to grow&lt;span id="advenueINTEXT"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;India has over 120 million internet users - Twitter has about 16 million and  &lt;a href="http://timesofindia.indiatimes.com/topic/Facebook"&gt;Facebook&lt;/a&gt; over 60 million - but this is still just one-tenth of the population.&lt;/span&gt;&lt;span id="advenueINTEXT"&gt; &lt;/span&gt;&lt;span id="advenueINTEXT"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;Also, as 3G penetration increases, data becomes accessible on more  feature phones. While about 221 million mobiles were sold in India in  2012, sales are expected to touch 251 million units in 2013, according  to technology market researcher Gartner. With so much of growth still  left to come, the influence of social media is only bound to grow. &lt;br /&gt;&lt;br /&gt; Minister of State for Human Resource Development Shashi Tharoor, one of  the early converts to social media and inveterate tweeter, said the  social media space is a "parallel universe to the mainstream media" and  that stories on these platforms have a "resonance of their own". &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;"It is a medium that allows big issues to be made out of issues that  mainstream media ignores but politicians cannot," he said. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;Brand guru Harish Bijoor is of the view that the political class must  pay attention to the information revolution as India is a very young  country in terms of demographics. "The political class appears a  gerontocracy while 54% of the population is below 25 and 70% below 35.  There is a disconnect that must be addressed." &lt;br /&gt;&lt;br /&gt; Kedar Gavane,  director at Internet analytics company ComScore India, said an average  Indian Facebook user has about 300 friends. "That's the kind of reach an  individual and his messages have on social networks," he said. "Twitter  has helped us identify the common man's feelings. For instance, when a  candlelight protest is organised, you get to know what the protesters  are thinking." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;But the real question, he said, is whether people  are actually willing to go beyond these platforms. "Whether it can  become the Fifth Estate or not is hard to say because at the end of the  day, this is just a channel for communication." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;With the government  struggling for a credible response to the growing influence of social  media, it has often resorted to blocking user accounts and web pages.  The government, which blocked 663 webpages in 2012, asked Indian  Internet service providers to block 16 Twitter accounts, including those  of right-wing leaders and journalists. &lt;br /&gt;&lt;br /&gt; In the first half of  2012, the government made 2,319 requests for information on 3,467 user  accounts of search engine giant Google.  &lt;a href="http://timesofindia.indiatimes.com/topic/Google"&gt;Google&lt;/a&gt; complied with 64% of these. &lt;br /&gt;&lt;br /&gt; While the influence of social media is not lost on those such as  Dikshit, he said the problem is "how to break in with an alternative  view". "It is like a community of people who think the same way and  validate each others' opinions. The number of people who validate your  opinion does not make it the right opinion, but that fine distinction is  getting lost somewhere." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;There are others who feel  the role of social media in protests is often exaggerated. "The agency  for change resides first in people and only secondarily in platforms,"  according to Pranesh Prakash, policy director at the Centre for Internet  and Society.&lt;/span&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(With inputs from Joji Thomas Philip in New Delhi)&lt;/b&gt; &lt;span id="storyendpath"&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-december-29-2012-delhi-gang-rape'&gt;https://cis-india.org/news/times-of-india-december-29-2012-delhi-gang-rape&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-31T01:02:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/gulf-today-aug-25-2012-delhi-defends-internet-blocking">
    <title>Delhi defends Internet blocking</title>
    <link>https://cis-india.org/news/gulf-today-aug-25-2012-delhi-defends-internet-blocking</link>
    <description>
        &lt;b&gt;India on Friday defended itself against accusations of heavy-handed online censorship, saying it had been successful in blocking content blamed for fuelling ethnic tensions.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Published in &lt;a class="external-link" href="http://gulftoday.ae/portal/6b2874ab-3e6d-4049-bf2f-a89594fad170.aspx"&gt;Gulf Today&lt;/a&gt; on August 25, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The government over the past week has ordered Internet service providers to block 309 webpages, images and links on sites including Facebook, Twitter, Wikipedia, news channel ABC of Australia and Qatar-based Al Jazeera.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The orders were an effort to halt the spread of “hateful” material and rumours that Muslims planned to attack students and workers who have migrated from the northeast region to live in Bangalore and other southern cities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We have met with success. These pages were a threat to India’s national security and we demanded their immediate deletion,” Kuldeep Singh Dhatwalia, a spokesman for India’s home ministry said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Spreading rumours to encourage violence or cause tension will not be tolerated. The idea is not to restrict communication.” But Twitter users, legal experts and analysts criticised the government’s approach, which appeared to have resulted in only partial blocking of material, much of which was still accessible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The officials who are trusted with this don’t know the law or modern technology well enough,” Pranesh Prakash, programme manager at the Centre for Internet and Society research group, told AFP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is counter-productive. I accuse them of monumental incompetence, given that the main problem is that they are getting really bad advice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I hope that this fiasco shows the folly of excessive censorship and encourages the government to make better use of social networks and technology to reach out to people.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a strange irony, account of none other than Minister of State for Communication and Information Technology Milind Deora was suspended by Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But at the same time, a fake account similar to Deora’s remained active.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The followers of Deora on Twitter were in for a surprise when they found a search for his name showed “No people results for Milind Deora.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Deora’s tweets gave the government’s version on the crackdown on the microblogging site and other social networking websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Deora in his tweet on Thursday night had defended the government’s efforts to block hate content on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Ironically, let me clarify on Twitter that there is absolutely no intent of the government to curb freedom of social media platforms,” Deora’s tweet read.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Account suspended. The profile you are trying to view has been suspended...,” was the automated message that was seen on the Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The news of Deora’s account suspension spread like wild fire on the microblogging site with some making sarcastic comments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Communication Minister Milind Deora’s Twitter Account ‘Suspended.’ It’s like the home minister losing his house key,” read one of the tweets, while another user’s tweet read: “Ah! I know what happened. Milind Deora sent Twitter a list of people to (be) banned and signed his name under it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has asked Internet service providers to block select 16 Twitter accounts, including that of some journalists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twitter has also removed six accounts, which resembled that of the Prime Minister’s Office (PMO) amid government’s assertion that action would be taken against those allowing objectionable content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a communication to the PMO, Twitter has said it has “removed the reported profile(s) from circulation due to violation of our Terms of Service regarding impersonation.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/gulf-today-aug-25-2012-delhi-defends-internet-blocking'&gt;https://cis-india.org/news/gulf-today-aug-25-2012-delhi-defends-internet-blocking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-27T04:13:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/deity-says-143-urls-blocked-in-2015">
    <title>DeitY says 143 URLs have been Blocked in 2015; Procedure for Blocking Content Remains Opaque and in Urgent Need of Transparency Measures</title>
    <link>https://cis-india.org/internet-governance/blog/deity-says-143-urls-blocked-in-2015</link>
    <description>
        &lt;b&gt;Across India on 30 December 2014, following an order issued by the Department of Telecom (DOT), Internet Service Providers (ISPs) blocked 32 websites including Vimeo, Dailymotion, GitHub and Pastebin.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;In February 2015, the Centre for Internet and Society (CIS) requested the Department of Electronics and Information Technology (DeitY) under the Right to Information Act, 2005 (RTI Act) to provide information clarifying the procedures for blocking in India. We have received a response from DeitY which may be &lt;a href="https://cis-india.org/internet-governance/blog/response-deity.clarifying-procedures-for-blocking.pdf" class="external-link"&gt;seen here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In this post, I shall elaborate on this response from DeitY and highlight some of the accountability and transparency measures that the procedure needs. To stress the urgency of reform, I shall also touch upon two recent developments—the response from Ministry of Communication to questions raised in Parliament on the blocking procedures and the Supreme Court (SC) judgment in Shreya Singhal v. Union of India.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Section 69A and the Blocking Rules&lt;/h2&gt;
&lt;p align="JUSTIFY" class="western"&gt;Section 69A of the Information Technology Act, 2008 (S69A hereinafter) grants powers to the central government to issue directions for blocking of access to any information through any computer resource. In other words, it allows the government to block any websites under certain grounds. The Government has notified rules laying down the procedure for blocking access online under the Procedure and Safeguards for Blocking for Access of Information by Public Rules, 2009 (Rules, 2009 hereinafter). CIS has produced a poster explaining the blocking procedure (&lt;a href="http://cis-india.org/internet-governance/blog/blocking-websites.pdf/at_download/file"&gt;download PDF&lt;/a&gt;, 2.037MB).&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;There are &lt;em&gt;three key aspects&lt;/em&gt; of the blocking rules that need to be kept under consideration:&lt;/p&gt;
&lt;h3 align="JUSTIFY" class="western"&gt;Officers and committees handling requests&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Designated Officer (DO)&lt;/strong&gt; – Appointed by the Central government, officer not below the rank of Joint Secretary.&lt;br /&gt;&lt;strong&gt;Nodal Officer (NO)&lt;/strong&gt; – Appointed by organizations including Ministries or Departments of the State governments and Union Territories and any agency of the Central Government. &lt;br /&gt;&lt;strong&gt;Intermediary contact&lt;/strong&gt;–Appointed by every intermediary to receive and handle blocking directions from the DO.&lt;br /&gt;&lt;strong&gt;Committee for Examination of Request (CER)&lt;/strong&gt; – The request along with printed sample of alleged offending information is examined by the CER—committee with the DO serving as the Chairperson and representatives from Ministry of Law and Justice; Ministry of Home Affairs; Ministry of Information and Broadcasting and representative from the Indian Computer Emergency Response Team (CERT-In). The CER is responsible for examining each blocking request and makes recommendations including revoking blocking orders to the DO, which are taken into consideration for final approval of request for blocking by the Secretary, DOT. &lt;br /&gt;&lt;strong&gt;Review Committee (RC) &lt;/strong&gt;– Constituted under rule 419A of the Indian Telegraph Act, 1951, the RC includes the Cabinet Secretary, Secretary to the Government of India (Legal Affairs) and Secretary (Department of Telecom). The RC is mandated to meet at least once in 2 months and record its findings and has to validate that directions issued are in compliance with S69A(1).&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Provisions outlining the procedure for blocking&lt;/h3&gt;
&lt;p&gt;Rules 6, 9 and 10 create three distinct blocking procedures, which must commence within 7 days of the DO receiving the request.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a) Rule 6 lays out the first procedure, under which any person may approach the NO and request blocking, alternatively, the NO may also raise a blocking request. After the NO of the approached Ministry or Department of the State governments and Union Territories and/or any agency of the Central Government, is satisfied of the validity of the request they forward it to the DO. Requests when not sent through the NO of any organization, must be approved by Chief Secretary of the State or Union Territory or the Advisor to the Administrator of the Union Territory, before being sent to the DO.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The DO upon receiving the request places, must acknowledge receipt within 24 four hours and places the request along with printed copy of alleged information for validation by the CER. The DO also, must make reasonable efforts to identify the person or intermediary hosting the information, and having identified them issue a notice asking them to appear and submit their reply and clarifications before the committee at a specified date and time, within forty eight hours of the receipt of notice.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Foreign entities hosting the information are also informed and the CER gives it recommendations after hearing from the intermediary or the person has clarified their position and even if there is no representation by the same and after examining if the request falls within the scope outlined under S69A(1). The blocking directions are issued by the Secretary (DeitY), after the DO forwards the request and the CER recommendations. If approval is granted the DO directs the relevant intermediary or person to block the alleged information.&lt;/p&gt;
&lt;p style="text-align: justify;" class="western"&gt;b) Rule 9 outlines a procedure wherein, under emergency circumstances, and after the DO has established the necessity and expediency to block alleged information submits recommendations in writing to the Secretary, DeitY. The Secretary, upon being satisfied by the justification for, and necessity of, and expediency to block information may issue an blocking directions as an interim measure and must record the reasons for doing so in writing.&lt;/p&gt;
&lt;p style="text-align: justify;" class="western"&gt;Under such circumstances, the intermediary and person hosting information is not given the opportunity of a hearing. Nevertheless, the DO is required to place the request before the CER within forty eight hours of issuing of directions for interim blocking. Only upon receiving the final recommendations from the committee can the Secretary pass a final order approving the request. If the request for blocking is not approved then the interim order passed earlier is revoked, and the intermediary or identified person should be directed to unblock the information for public access.&lt;/p&gt;
&lt;p style="text-align: justify;" class="western"&gt;c) Rule 10 outlines the process when an order is issued by the courts in India. The DO upon receipt of the court order for blocking of information submits it to the Secretary, DeitY and initiates action as directed by the courts.&lt;/p&gt;
&lt;h3 style="text-align: justify;" class="western"&gt;Confidentiality clause&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Rule 16 mandates confidentiality regarding all requests and actions taken thereof, which renders any requests received by the NO and the DO, recommendations made by the DO or the CER and any written reasons for blocking or revoking blocking requests outside the purview of public scrutiny. More detail on the officers and committees that enforce the blocking rules and procedure can be found &lt;a href="http://cis-india.org/internet-governance/blog/is-india2019s-website-blocking-law-constitutional-2013-i-law-procedure"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Response on blocking from the Ministry of Communication and Information Technology&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The response to our RTI from E-Security and Cyber Law Group is timely, given the recent clarification from the Ministry of Communication and Information Technology to a number of questions, raised by parliamentarian  Shri Avinash Pande in the Rajya Sabha. The questions had been raised in reference to the Emergency blocking order under IT Act, the current status of the Central Monitoring System, Data Privacy law and Net Neutrality. The Centre for Communication Governance (CCG), National Law University New Delhi have extracted a set of 6 questions and you can read the full article &lt;a href="https://ccgnludelhi.wordpress.com/2015/04/24/governments-response-to-fundamental-questions-regarding-the-internet-in-india/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;The governments response as quoted by CCG, clarifies under rule 9—the Government has issued directions for emergency blocking of &lt;em&gt;a total number of 216 URLs from 1st January, 2014 till date &lt;/em&gt;and that &lt;em&gt;a total of 255 URLs were blocked in 2014 and no URLs has been blocked in 2015 (till 31 March 2015)&lt;/em&gt; under S69A through the Committee constituted under the rules therein. Further, a total of 2091 URLs and 143 URLs were blocked in order to comply with the directions of the competent courts of India in 2014 and 2015 (till 31 March 2015) respectively. The government also clarified that the CER, had recommended not to block 19 URLs in the meetings held between 1&lt;sup&gt;st&lt;/sup&gt;&lt;sup&gt; &lt;/sup&gt;January 2014 upto till date and so far, two orders have been issued to revoke 251 blocked URLs from 1st January 2014 till date. Besides, CERT-In received requests for blocking of objectionable content from individuals and organisations, and these were forwarded to the concerned websites for appropriate action, however the response did not specify the number of requests.&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;We have prepared a table explaining the information released by the government and to highlight the inconsistency in their response.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;colgroup&gt; &lt;col width="331"&gt; &lt;col width="90"&gt; &lt;col width="91"&gt; &lt;col width="119"&gt; &lt;/colgroup&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p align="LEFT"&gt;&lt;strong&gt;Applicable rule and procedure outlined under the Blocking Rules&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="3"&gt;
&lt;p align="CENTER"&gt;&lt;strong&gt;Number of websites&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;&lt;em&gt;2014&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;&lt;em&gt;2015&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;&lt;em&gt;Total&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="LEFT"&gt;Rule 6 - Blocking requests from NO and others&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;255&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;None&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;255&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="LEFT"&gt;Rule 9 - Blocking under emergency circumstances&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;216&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="LEFT"&gt;Rule 10 - Blocking orders from Court&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;2091&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;143&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;2234&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="LEFT"&gt;Requests from individuals and orgs forwarded to CERT-In&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="LEFT"&gt;Recommendations to not block by CER&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;19&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="LEFT"&gt;Number of blocking requests revoked&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="CENTER"&gt;251&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;In a &lt;a href="http://sflc.in/deity-says-2341-urls-were-blocked-in-2014-refuses-to-reveal-more/"&gt;response &lt;/a&gt;to an RTI filed by the Software Freedom Law Centre, DeitY said that 708 URLs were blocked in 2012, 1,349 URLs in 2013, and 2,341 URLs in 2014.&lt;/p&gt;
&lt;h2&gt;Shreya Singhal v. Union of India&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;In its recent judgment, the SC of India upheld the constitutionality of 69A, stating that it was a narrowly-drawn provision with adequate safeguards. The constitutional challenge on behalf of the People’s Union for Civil Liberties (PUCL) considered the manner in which the blocking is done and the arguments focused on the secrecy present in blocking.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The rules may indicate that there is a requirement to identify and contact the originator of information, though as an expert &lt;a href="http://indianexpress.com/article/opinion/columns/but-what-about-section-69a/"&gt;has pointed out&lt;/a&gt;, there is no evidence of this in practice. The court has stressed the importance of a written order so that writ petitions may be filed under Article 226 of the Constitution. In doing so, the court seems to have assumed that the originator or intermediary is informed, and therefore held the view that any procedural inconsistencies may be challenged through writ petitions. However, this recourse is rendered ineffective not only due to procedural constraints, but also because of the confidentiality clause. The opaqueness through rule 16 severely reigns in the recourse that may be given to the originator and the intermediary. While the court notes that rule 16 requiring confidentality was argued to be unconstitutional, it does not state its opinion on this question in the judgment. One expert, holds the &lt;a href="https://indconlawphil.wordpress.com/2015/03/25/the-supreme-courts-it-act-judgment-and-secret-blocking/"&gt;view&lt;/a&gt; that this, by implication, requires that requests cannot be confidential. However, such a reading down of rule 16 is yet to be tested.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Further, Sunil Abraham has &lt;a href="http://cis-india.org/internet-governance/blog/economic-and-political-weekly-sunil-abraham-april-11-2015-shreya-singhal-and-66a"&gt;pointed&lt;/a&gt; out, “block orders are unevenly implemented by ISPs making it impossible for anyone to independently monitor and reach a conclusion whether an internet resource is inaccessible as a result of a S69A block order or due to a network anomaly.” As there are no comprehensive list of blocked websites or of the legal orders through which they are blocked exists, the public has to rely on media reports and filing RTI requests to understand the censorship regime in India. CIS has previously &lt;a href="http://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism"&gt;analysed&lt;/a&gt; the leaked block lists and lists received as responses to RTI requests which have revealed that the block orders are full of errors and blocking of entire platforms and not just specific links has taken place.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While the state has the power of blocking content, doing so in secrecy and without judical scrutiny, mark deficiencies that remain in the procedure outlined under the provisions of the blocking rules . The Court could read down rule 16 except for a really narrow set of exceptions, and in not doing so, perhaps has overlooked the opportunities for reform in the existing system. The blocking of 32 websites, is an example of the opaqueness of the system of blocking orders, and where the safeguards assumed by the SC are often not observed such as there being no access to the recommendations that were made by the CER, or towards the revocation of the blocking orders subsequently. CIS filed the RTI to try and understand the grounds for blocking and related procedures and the response has thrown up some issues that must need urgent attention.&lt;/p&gt;
&lt;h2&gt;Response to RTI filed by CIS&lt;/h2&gt;
&lt;p align="JUSTIFY" class="western"&gt;Our first question sought clarification on the websites blocked on 30&lt;sup&gt;th&lt;/sup&gt;&lt;sup&gt; &lt;/sup&gt;December 2014 and the response received from DeitY, E-Security and Cyber Law Group reveals that the websites had been blocked as “they were being used to post information related to ISIS using the resources provided by these websites”. The response also clarifies that the directions to block were issued on &lt;em&gt;18-12-2014 and as of 09-01-2015&lt;/em&gt;, after obtaining an undertaking from website owners, stating their compliance with the Government and Indian laws, the sites were unblocked.&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;It is not clear if ATS, Mumbai had been intercepting communication or if someone reported these websites. If the ATS was indeed intercepting communication, then as per the rules, the RC should be informed and their recommendations sought. It is unclear, if this was the case and the response evokes the confidentiality clause under rule 16 for not divulging further details. Based on our reading of the rules, court orders should be accessible to the public and without copies of requests and complaints received and knowledge of which organization raised them, there can be no appeal or recourse available to the intermediary or even the general public.&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;We also asked for a list of all requests for blocking of information that had been received by the DO between January 2013 and January 2015, including the copies of all files that had accepted or rejected. We also specifically, asked for a list of requests under rule 9. The response from DeitY stated that since January 1, 2015 to March 31, 2015 directions to block 143 URLs had been issued based on court orders. The response completely overlooks our request for information, covering the 2 year time period. It also does not cover all types of blocking orders under rule 6 and rule 9, nor the requests that are forwarded to CERT-In, as we have gauged from the ministry's response to the Parliament. Contrary to the SC's assumption of contacting the orginator of information, it is also clear from DeitY's response that only the websites had been contacted and the letter states that the “websites replied only after blocking of objectionable content”.&amp;nbsp;&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;Further, seeking clarification on the functioning of the CER, we asked for the recent composition of members and the dates and copies of the minutes of all meetings including copies of the recommendations made by them. The response merely quotes rule 7 as the reference for the composition and does not provide any names or other details. We ascertain that as per the DeitY website Shri B.J. Srinath, Scientist-G/GC is the appointed Designated Officer, however this needs confirmation. While we are already aware of the structure of the CER which representatives and appointed public officers are guiding the examination of requests remains unclear. Presently, there are 3 Joint Secretaries appointed under the Ministry of Law and Justice, the Home Ministry has appointed 19, while 3 are appointed under the Ministry of Information and Broadcasting. Further, it is not clear which grade of scientist would be appointed to this committee from CERT-In as the rules do not specify this. While the government has clarified in their answer to Parliament that the committee had recommended not to block 19 URLs in the meetings held between 1st January 2014 to till date, it is remains unclear who is taking these decisions to block and revoke blocked URLs. The response from DeitY specifies that the CER has met six times between 2014 and March 2015, however stops short on sharing any further information or copies of files on complaints and recommendations of the CER, citing rule 16.&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;Finally, answering our question on the composition of the RC the letter merely highlights the provision providing for the composition under 419A of the Indian Telegraph Rules, 1951. The response clarifies that so far, the RC has met once on 7th December, 2013 under the Chairmanship of the Cabinet Secretary, Department of Legal Affaits and Secretary, DOT. Our request for minutes of meetings and copies of orders and findings of the RC is denied by simply stating that “minutes are not available”. Under 419A, any directions for interception of any message or class of messages under sub-section (2) of Section 5 of the Indian Telegraph Act, 1885 issued by the competent authority shall contain reasons for such direction and a copy of such order shall be forwarded to the concerned RC within a period of seven working days. Given that the RC has met just once since 2013, it is unclear if the RC is not functioning or if the interception of messages is being guided through other procedures. Further, we do not yet know details or have any records of revocation orders or notices sent to intermediary contacts. This restricts the citizens’ right to receive information and DeitY should work to make these available for the public.&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;Given the response to our RTI, the Ministry's response to Parliament and the SC judgment we recommend the following steps be taken by the DeitY to ensure that we create a procedure that is just, accountable and follows the rule of law.&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;The revocation of rule 16 needs urgent clarification for two reasons:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Under Section 22 of the RTI Act provisions thereof, override all conflicting provisions in any other legislation.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;In upholding the constitutionality of S69A the SC cites the requirement of reasons behind blocking orders to be recorded in writing, so that they may be challenged by means of writ petitions filed under &lt;a href="http://indiankanoon.org/doc/1712542/"&gt;A&lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/1712542/"&gt;rticle 226&lt;/a&gt; of the Constitution of India.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;If the blocking orders or the meetings of the CER and RC that consider the reasons in the orders are to remain shrouded in secrecy and unavailable through RTI requests, filing writ petitions challenging these decisions will not be possible, rendering this very important safeguard for the protection of online free speech and expression infructuous. In summation, the need for comprehensive legislative reform remains in the blocking procedures and the government should act to address the pressing need for transparency and accountability. Not only does opacity curtial the strengths of democracy it also impedes good governance. We have filed an RTI seeking a comprehensive account of the blocking procedure, functioning of committees from 2009-2015 and we shall publish any information that we may receive.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/deity-says-143-urls-blocked-in-2015'&gt;https://cis-india.org/internet-governance/blog/deity-says-143-urls-blocked-in-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>RTI</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>69A</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Transparency</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Blocking</dc:subject>
    

   <dc:date>2015-04-30T07:37:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-sanjay-vijaykumar-may-10-2015-pranesh-prakash-on-definition-of-net-neutrality">
    <title>Definition of Net Neutrality should be flexible: Pranesh Prakash</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-sanjay-vijaykumar-may-10-2015-pranesh-prakash-on-definition-of-net-neutrality</link>
    <description>
        &lt;b&gt;Critics argue that Facebook’s Internet.org violates the principle of Net Neutrality.&lt;/b&gt;
        &lt;p&gt;The article by Sanjay Vijaykumar was published in &lt;a class="external-link" href="http://www.thehindu.com/business/Industry/pranesh-prakash-on-definition-of-net-neutrality/article7188661.ece"&gt;the Hindu&lt;/a&gt; on May 10, 2015. Pranesh Prakash is extensively quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The definition of Net Neutrality should be flexible enough to allow for experimentation with different models of providing cheaper Internet access and such experimentation needs to be regulated by the telecom regulator, Telecom and Regulatory Authority of India (TRAI) according to Internet expert Pranesh Prakash.&lt;br /&gt;&lt;br /&gt;Mr. Prakash was reacting to the business model of Boston-based start-up Jana, which said it had figured out a way to offer billions of people in the emerging world free access to the Internet, without violating the web’s open nature. The firm has launched Jana Loyalty, a product that seeks to reward its smartphone users in two ways. One, it reimburses users the cost of downloading and using an app of Jana’s clients. Two, it gives free additional data with which the user can access any content online.&lt;br /&gt;&lt;br /&gt;“While Jana is like Internet.org, since it is Internet service-specific zero-rating, Jana Loyalty is what my colleague Sunil Abraham dubs a ‘leaky walled garden’. The walled garden (site-specific access) exists, but you also get free access to the whole of the Web in return. Given that there is no one universal definition of Net Neutrality, and given India currently doesn’t have a definition, I can’t answer if this is a violation of Net Neutrality,” said Mr. Prakash, who is Policy Director at The Centre for Internet and Society (CIS), a Bangalore-based, non-profit, research and policy advocacy.&lt;br /&gt;&lt;br /&gt;Facebook’s attempts to provide a limited version of the Internet free has been attracting criticism from supporters of Net Neutrality, especially in India. Critics argue that Facebook’s Internet.org, which offers users free access to a bouquet of pre-selected Web sites, violates the principle of Net Neutrality by choosing what is accessible and what isn’t. Facebook has reacted to this by opening up Internet.org to all developers who meet its guidelines. Mr. Prakash said the definition of Net Neturality should be flexible enough to allow for experimentation with different models of providing cheaper Internet access, including Jana Loyalty.&lt;/p&gt;
&lt;p&gt;“However, such experimentation ought to be regulated by the telecom regulator. To minimise harm, they should be allowed on a case-by-case basis after the regulator has had an opportunity to conduct risk-benefit analysis against four goals it should seek to promote — universal and affordable access; effective competition; protection of consumers against harm; and diversity that arises from the openness and interconnectedness of the Internet,” he added.&lt;/p&gt;
&lt;p&gt;Net neutrality is a principle that says Internet Service Providers (ISPs) should treat all traffic and content on their networks equally.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_ISP.png" alt="ISP" class="image-inline" title="ISP" /&gt;&lt;/p&gt;
&lt;h3&gt;Why now?&lt;/h3&gt;
&lt;p&gt;Late last month, Trai released a draft consultation paper seeking views from the industry and the general public on the need for regulations for over-the-top (OTT) players such as Whatsapp, Skype, Viber etc, security concerns and net neutrality. The objective of this consultation paper, the regulator said, was to analyse the implications of the growth of OTTs and consider whether or not changes were required in the current regulatory framework.&lt;/p&gt;
&lt;h3&gt;What is an OTT?&lt;/h3&gt;
&lt;p&gt;OTT or over-the-top refers to applications and services which are accessible over the internet and ride on operators' networks offering internet access services. The best known examples of OTT are Skype, Viber, WhatsApp, e-commerce sites, Ola, Facebook messenger. The OTTs are not bound by any regulations. The Trai is of the view that the lack of regulations poses a threat to security and there’s a need for government’s intervention to ensure a level playing field in terms of regulatory compliance.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-sanjay-vijaykumar-may-10-2015-pranesh-prakash-on-definition-of-net-neutrality'&gt;https://cis-india.org/internet-governance/news/the-hindu-sanjay-vijaykumar-may-10-2015-pranesh-prakash-on-definition-of-net-neutrality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-06-19T01:43:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-july-14-2019-rajmohan-sudhakar-deepfakes-algorithms-at-war-trust-at-stake">
    <title>Deepfakes: Algorithms at war, trust at stake</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-july-14-2019-rajmohan-sudhakar-deepfakes-algorithms-at-war-trust-at-stake</link>
    <description>
        &lt;b&gt;A case in point is the video that surfaced of an Indian journalist not so long ago.&lt;/b&gt;
        &lt;p&gt;The article by Rajmohan Sudhakar was published in &lt;a class="external-link" href="https://www.deccanherald.com/metrolife/metrolife-on-the-move/deepfakes-algorithms-at-war-trust-at-stake-747042.html"&gt;Deccan Herald&lt;/a&gt; on July 14, 2019. Elonnai Hickok was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Now machines are learning to manipulate imagery. That is a real worry. Deepfakes for instance. They are AI-manipulated videos achieved by machine learning. Products of the humongous volume of images and videos now available online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The danger is, this imagery could be yours or mine. Imagine artificial intelligence of neural networks creating convincing identities of our real counterparts, and starts posting videos. Absurd.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Society has grappled with spurious and specious content in media over time. Media has been modified for various reasons, usually by those with access to significant resources and influence in the past,” says Elonnai Hickok, COO of the Bengaluru-based Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From an AI and machine learning perspective, deepfakes could be understood by what is known as GAN -- generative adversarial networks, essentially two algorithms at war. One is a generator, the other a discriminator. They compete with each other based on set inputs, in time bettering the version they together help create. These are behind what are now known as deepfakes of popular figures floating around online. Barack Obama is seen saying in a purported deepfake, “stay woke bitches”, which of course he did not say.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another deepfake has Mark Zuckerberg boasting: “I have total control of billions of people’s stolen data, all their secrets, their lives, their futures.” “Deepfakes are media modified by current technology and techniques. Easy availability of technology and media allows anyone to create, tailor or manipulate media for their own ends. Deepfakes present an opportunity for introspection and research into the contours of freedom of expression as well as societal frameworks for dealing with fake content,” explains Hickok.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the horrid instances of a deepfake-like attack was the video that surfaced of an Indian woman journalist not so long ago. Or the child-kidnapping rumours that spread through WhatsApp and the subsequent mob lynchings. However, there’s the view that in post-truth times, deepfakes would be seen with caution in the inherent dilemma over believing what one views online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In India, people do not take these so seriously, especially on social media. It is mostly entertainment for many. Now, we are seeing people with diametrically opposing views. They often view content which they like to see. It would rather work as a reinforcer of views than a transformer,” feels political analyst Sandeep Shastri.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Open source software can create basic deepfakes if someone wanted to hurt somebody. The potential scale of danger and damage looms larger for influential figures and nations at war.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While deep fakes can be used to damage societies, it is important that collectively society takes steps to become sensitised to ways that media can be used to manipulate opinions and choices, and allow people to develop skills that build awareness and context to what they see and believe,” adds Hickok.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A video emerged recently of an ‘Iranian’ boat near an attacked oil tanker in the Persian Gulf. Deepfake or not, the authenticity of the video was questionable. If used wily, it could have triggered a war.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Hickok, society has to get more resilient to manipulation. “This includes spoken, written, seen as well as heard information. We have to learn to question the basis on which we confirm trust. Multiple forms of verification may help to address spurious media and information,” she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Deepfakes are no surprise as social media feed into the small and large divisions and differences of multitudes. Emergence of such potentially dangerous AIs isn’t taken quite seriously by the tech czars. In fact, it is a matter of economy for them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Oscar Schwartz writes in The Guardian that ‘technological solutionism’ in the ‘attention economy’ may not be the real approach. “And herein lies the problem: by formulating deepfakes as a technological problem, we allow social media platforms to promote technological solutions to those problems – cleverly distracting the public from the idea that there may be more fundamental problems with powerful Silicon Valley tech platforms,” Schwartz warns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The measures do not fall on the regulators alone. I think, individuals (by introspection and building awareness), society (through education), the legal system (stringent evidentiary requirements and capacity building) industry (differentiating recreational and prejudicial content, tagging content that is manipulated, etc.) and regulators (enabling accountability, oversight, transparency and redress) can all contribute to a more resilient society,” observes Hickok.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, viewing a video is still considered close to truth, almost sacred by the vast majority. Necessarily, it would not require a technologically advanced deepfake, especially in the backward rural pockets, to rile up and aggravate biases and prejudices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Deepfakes can further existing biases and manipulate opinions and choices. They can disrupt trust inherent in societal groups to co-exist and politically, they can breed distrust in leadership and capability. That said, deepfakes can be used for humour and satire. Ultimately, the impact will be shaped by a number of factors including pre-existing biases, individual response, etc.,” Hickok elaborates.&lt;/p&gt;
&lt;p&gt;On a lighter note, deepfakes could be helpful too. We could very well do away with some of our television news presenters.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-july-14-2019-rajmohan-sudhakar-deepfakes-algorithms-at-war-trust-at-stake'&gt;https://cis-india.org/internet-governance/news/deccan-herald-july-14-2019-rajmohan-sudhakar-deepfakes-algorithms-at-war-trust-at-stake&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Rajmohan Sudhakar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2019-07-21T15:42:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/deep-packet-inspection-how-it-works-and-its-impact-on-privacy">
    <title>Deep Packet Inspection: How it Works and its Impact on Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/deep-packet-inspection-how-it-works-and-its-impact-on-privacy</link>
    <description>
        &lt;b&gt; In the last few years, there has been extensive debate and discussion around network neutrality in India. The online campaign in favor of Network Neutrality was led by Savetheinternet.in in India. The campaign was a spectacular success and facilitated sending  over a million emails supporting the cause of network neutrality, eventually leading to ban on differential pricing. Following in the footsteps of the Shreya Singhal judgement, the fact that the issue of net neutrality has managed to attract wide public attention is an encouraging sign for a free and open Internet in India. Since the debate has been focused largely on zero rating, other kinds of network practices impacting network neutrality have yet to be comprehensively explored in the Indian context, nor their impact on other values. In this article, the author focuses on network management, in general, and deep packet inspection, in particular and how it impacts the privacy of users.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;a name="_ek69t4linon1"&gt;&lt;/a&gt; Background&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the last few years, there has been extensive debate and discussion around network neutrality in India. The online campaign in favor of Network Neutrality was led by Savetheinternet.in in India. The campaign, captured in detail by an article in Mint,	&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; was a spectacular success and facilitated sending over a million emails supporting 	the cause of network neutrality, eventually leading to ban on differential pricing. Following in the footsteps of the Shreya Singhal judgement, the fact 	that the issue of net neutrality has managed to attract wide public attention is an encouraging sign for a free and open Internet in India. Since the 	debate has been focused largely on zero rating, other kinds of network practices impacting network neutrality have yet to be comprehensively explored in 	the Indian context, nor their impact on other values. In this article, I focus on network management, in general, and deep packet inspection, in particular 	and how it impacts the privacy of users.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_ft3wpj7p1jf1"&gt;&lt;/a&gt; The Architecture of the Internet&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Internet exists as a network acting as an intermediary between providers of content and it users.	&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Traditionally, the network did not distinguish between those who provided content 	and those who were recipients of this service, in fact often, the users also functioned as content providers. The architectural design of the Internet 	mandated that all content be broken down into data packets which were transmitted through nodes in the network transparently from the source machine to the 	destination machine.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; As discussed in detail later, as per the OSI model, the network 	consists of 7 layers. We will go into each of these layers in detail below, however is important to understand that at the base is the physical layer of 	cables and wires, while at the top is application layer which contains all the functions that people want to perform on the Internet and the content 	associated with it. The layers in the middle can be characterised as the protocol layers for the purpose of this discussion. What makes the architecture of 	the Internet remarkable is that these layers are completely independent of each other, and in most cases, indifferent to the other layers. The protocol 	layer is what impacts net neutrality. It is this layer which provides the standards for the manner in which the data must flow through the network. The 	idea was for the it to be as simple and feature free as possible such that it is only concerned with the transmission data as fast as possible ('best 	efforts principle') while innovations are pushed to the layers above or below it.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This aspect of the Internet's architectural design, which mandates that network features are implemented as the end points only (destination and source 	machine), i.e. at the application level, is called the 'end to end principle'.&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This 	means that the intermediate nodes do not differentiate between the data packets in any way based on source, application or any other feature and are only concerned with transmitting data as fast as possible, thus creating what has been described as a 'dumb' or neutral network.	&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This feature of the Internet architecture was also considered essential to what 	Jonathan Zittrain has termed as the 'generative' model of the Internet.&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Since, the 	Internet Protocol remains a simple layer incapable of discrimination of any form, it meant that no additional criteria could be established for what kind 	of application would access the Internet. Thus, the network remained truly open and ensured that the Internet does not privilege or become the preserve of 	a class of applications, nor does it differentiate between the different kinds of technologies that comprise the physical layer below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the above model speaks of a dumb network not differentiating between the data packets that travel through it, in truth, the network operators engage 	in various kinds of practices that priorities, throttle or discount certain kinds of data packets. In her thesis essay at the Oxford Internet Institute, 	Alissa Cooper&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; states that traffic management involves three different set of 	criteria- a) Some subsets of traffic needs to be managed, and arriving at a criteria to identify those subsets the criteria can be based on source, 	destination, application or users, b) Trigger for the traffic management measure which - could be based upon time of the day, usage threshold or a specific 	network condition, and c) the traffic treatment put into practice when the trigger is met. The traffic treatment can be of three kinds. The first is 	Blocking, in which traffic is prevented from being delivered. The second is Prioritization under which identified traffic is sent sooner or later. This is 	usually done in cases of congestion and one kind of traffic needs to be prioritized. The third kind of treatment is Rate limiting where identified traffic 	is limited to a defined sending rate.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The dumb network does not interfere with an 	application's operation, nor is it sensitive to the needs of an application, and in this way it treats all information sent over it as equal. In such a 	network, the content of the packets is not examined, and Internet providers act according to the destination of the data as opposed to any other factor. 	However, in order to perform traffic management in various circumstances, Deep packet Inspection technology, which does look at the content of data packets 	is commonly used by service providers.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_r7ojhgh467u5"&gt;&lt;/a&gt; Deep Packet Inspection&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Deep packet inspection (DPI) enables the examination of the content of a data packets being sent over the Internet. Christopher Parsons explains the header 	and the payload of a data packet with respect to the OSI model. In order to understand this better, it is more useful to speak of network in terms of the 	seven layers in the OSI model as opposed to the three layers discussed above.&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the OSI model, the top layer, the Application Layer is in contact with the software making a data request. For instance, if the activity in question 	is accessing a webpage, the web-browser makes a request to access a page which is then passed on to the lower layers. The next layer is the Presentation 	Layer which deals with the format in which the data is presented. This lateral performs encryption and compression of the data. In the above example, this 	would involve asking for the HTML file. Next comes the Session Layer which initiates, manages and ends communication between the sender and receiver. In 	the above example, this would involve transmitting and regulating the data of the webpage including its text, images or any other media. These three layers 	are part of the 'payload' of the data packet.&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next four layers are part of the 'header' of the data packet. It begins with the Transport Layer which collects data from the Payload and creates a 	connection between the point of origin and the point of receipt, and assembles the packets in the correct order. In terms of accessing a webpage, this 	involves connecting the requesting computer system with the server hosting the data, and ensuring the data packets are put together in an arrangement which 	is cohesive when they are received. The next layer is the Data Link Layer. This layer formats the data packets in such a way that that they are compatible 	with the medium being used for their transmission. The final layer is the Physical Layer which determines the actual media used for transmitting the 	packets.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The transmission of the data packet occurs between the client and server, and packet inspect occurs through some equipment placed between the client and 	the server. There are various ways in which packet inspection has been classified and the level of depth that the inspection needs to qualify in order to 	be categorized as Deep Packet Inspection. We rely on Parson's classification system in this article. According to him, there are three broad categories of 	packet inspection - shallow, medium and deep.&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shallow packet inspection involves the inspection of the only the header, and usually checking it against a blacklist. The focus in this form of inspection 	is on the source and destination (IP address and packet;s port number). This form of inspection primarily deals with the Data Link Layer and Network Layer 	information of the packet. Shallow Packet Inspection is used by firewalls.&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Medium Packet Inspection involves equipment existing between computers running the applications and the ISP or Internet gateways. They use application 	proxies where the header information is inspected against their loaded parse-list and used to look at a specific flows. These kinds of inspections 	technologies are used to look for specific kinds of traffic flows and take pre-defined actions upon identifying it. In this case, the header and a small 	part of the payload is also being examined.&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, Deep Packet Inspection (DPI) enables networks to examine the origin, destination as well the content of data packets (header and payload). These 	technologies look for protocol non-compliance, spam, harmful code or any specific kinds of data that the network wants to monitor. The feature of the DPI 	technology that makes it an important subject of study is the different uses it can be put to. The use cases vary from real time analysis of the packets to 	interception, storage and analysis of contents of a packets.&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_pi28w1745j15"&gt;&lt;/a&gt; The different purposes of DPI&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Network Management and QoS&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The primary justification for DPI presented is network management, and as a means to guarantee and ensure a certain minimum level of QoS (Quality of 	Service). Quality of Service (QoS) as a value conflicting with the objectives of Network Neutrality, has emerged as a significant discussion point in this 	topic. Much like network neutrality, QoS is also a term thrown around in vague, general and non-definitive references. The factors that come into play in 	QoS are network imposed delay, jitter, bandwidth and reliability. Delay, as the name suggests, is the time taken for a packet to be passed by the sender to the receiver. Higher levels of delay are characterized by more data packets held 'in transit' in the network.	&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; A paper by Paul Ferguson and Geoff Huston described the TCP as a 'self clocking' 	protocol.&lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This enables the transmission rate of the sender to be adjusted as per 	the rate of reception by the receiver. As the delay and consequent stress on the protocol increases, this feedback ability begins to lose its sensitivity. 	This becomes most problematic in cases of VoIP and video applications. The idea of QoS generally entails consistent service quality with low delay, low 	jitter and high reliability through a system of preferential treatment provided to some traffic on a criteria formulated around the need of such traffic to 	have greater latency sensitivity and low delay and jitter. This is where Deep Packet Inspection comes into play. In 1991, Cisco pioneered the use of a new 	kind of router that could inspect data packets flowing through the network. DPI is able to look inside the packets and its content, enabling it to classify 	packets according to a formulated policy. DPI, which was used a security tool, to begin with, is a powerful tool as it allows ISPs to limit or block 	specific applications or improve performances of applications in telephony, streaming and real-time gaming. Very few scholars believe in an all-or-nothing approach to network neutrality and QoS and debate often comes down to what forms of differentiations are reasonable for service providers to practice.	&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Security&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Deep Packet inspection was initially intended as a measure to manage the network and protect it from transmitting malicious programs . As mentioned above, Shallow Packet Inspection was used to secure LANs and keep out certain kinds of unwanted traffic.	&lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Similarly, DPI is used for identical purposes, where it is felt useful to 	enhance security and complete a 'deeper' inspection that also examines the payload along with the header information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Surveillance&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third purpose of DPI is what concerns privacy theorists the most. The fact that DPI technologies enable the network operators to have access to the actual content of the data packets puts them a position of great power as well as making them susceptible to significant pressure from the state.	&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For instance, in US, the ISPs are required to conform to the provisions of the 	Communications Assistance for Law Enforcement Act (CALEA) which means they need to have some surveillance capacities designed into their systems. What is 	more disturbing for privacy theorists compared to the use of DPI for surveillance under legislation like CALEA, are the other alleged uses by organisation 	like the National Security Agency through back end access to the information via the ISPs. Aside from the US government, there have been various reports of use of DPI by governments in countries like China,&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Malaysia&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and Singapore.	&lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Behavioral targeting&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;DPI also enables very granular tracking of the online activities of Internet users. This information is invaluable for the purposes of behavioral targeting 	of content and advertising. Traditionally, this has been done through cookies and other tracking software. DPI allows new way to do this, so far exercised 	only through web-based tools to ISPs and their advertising partners. DPI will enable the ISPs to monitor contents of data packets and use this to create profiles of users which can later be employed for purposes such as targeted advertising.	&lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_gn60r7ifwcge"&gt;&lt;/a&gt; Impact on Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Each of the above use-cases has significant implications for the privacy of Internet users as the technology in question involves access, tracking or 	retention of their online communication and usage activity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Alyssa Cooper compares DPI with other technologies carrying out content inspection such as caching services and individual users employing firewalls or packet sniffers. She argues that one of the most distinguishing feature of DPI is the potential for "mission-creep."	&lt;a href="#_ftn26" name="_ftnref26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Kevin Werbach writes that while networks may deploy DPI for implementation under 	CALEA or traffic peer-to-peer shaping, once deployed DPI techniques can be used for completely different purposes such as pattern matching of intercepted 	content and storage of raw data or conclusions drawn from the data.&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This scope of 	mission creep is even more problematic as it is completely invisible. As opposed to other technologies which rely on cookies or other web-based services, 	the inspection occurs not at the end points, but somewhere in the middle of the network, often without leaving any traces on the user's system, thus 	rendering them virtually undiscoverable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much like other forms of surveillance, DPI threatens the sense that the web is a space where people can engage freely with a wide range of people and 	services. For such a space to continue to exist, it is important for people to feel secure about their communication and transaction on medium. This notion 	of trust is severely harmed by a sense that users are being surveilled and their communication intercepted. This has obvious chilling effect on free speech 	and could also impact electronic commerce.&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Allyssa Cooper also points out another way in which DPI differs from other content tracking technologies. As the DPI is deployed by the ISPs, it creates a 	greater barrier to opting out and choosing another service. There are only limited options available to individuals as far as ISPs are concerned. 	Christopher Parsons does a review of ISPs using DPI technology in UK, US and Canada and offers that various ISPs do provide in their terms of services that 	they use DPI for network management purposes. However, this information is often not as easily accessible as the terms and conditions of online services. 	A;so, As opposed to online services, where it is relatively easier to migrate to another service, due to both presence of more options and the ease of 	migration, it is a much longer and more difficult process to change one's ISP.&lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_n5w8euzb4xhb"&gt;&lt;/a&gt; Measures to mitigate risk&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Currently, there are no existing regulatory frameworks in India which deal govern DPI technology in any way. The International Telecommunications Union 	(ITU) prescribes a standard for DPI&lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; however, the standard does not engage with 	any questions of privacy and requires all DPI technologies to be capable of identifying payload data, and prescribing classification rules for specific 	applications, thus, conflicting with notions of application agnosticism in network management. More importantly, the requirements to identify, decrypt and 	analyse tunneled and encrypted data threaten the reasonable expectation of privacy when sending and receiving encrypted communication. In this final 	section, I look at some possible principles and practices that may be evolved in order to mitigate privacy risks caused due to DPI technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Limiting 'depth' and breadth&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has been argued that inherently what DPI technology intends to do is matching of patterns in the inspected content against a pre-defined list which is 	relevant to the purpose how which DPI is employed. Much like data minimization principles applicable to data controllers and data processors, it is 	possible for network operators to minimize the depth of the inspection (restrict it to header information only or limited payload information) so as to 	serve the purpose at hand. For instance, in cases where the ISP is looking to identify peer-to-peer traffic, there are protocols which declare their names 	in the application header itself. Similarly, a network operators looking to generate usage data about email traffic can do so simply by looking at port 	number and checking them against common email ports.&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, this mitigation 	strategy may not work well for other use-cases such as blocking malicious software or prohibited content or monitoring for the sake of behavioral 	advertising.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While depth referred to the degree of inspection within data packets, breadth refers to the volume of packets being inspected. Alyssa Cooper argues that 	for many DPI use cases, it may be possible to rely on pattern matching on only the first few data packets in a flow, in order to arrive at sufficient data 	to take appropriate response. Cooper uses the same example about peer-to-peer traffic. In some cases, the protocol name may appear on the header file of 	only the first packet of a flow between two peers. In such circumstances, the network operators need not look beyond the header files of the first packet 	in a flow, and can apply the network management rule to the entire flow.&lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Data retention&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aside from the depth and breadth of inspection, another important question whether and for along is there a need for data retention. All use cases may not 	require any kind of data retention and even in case where DPI is used for behavioral advertising, only the conclusions drawn may be retained instead of 	retaining the payload data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Transparency&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the issues is that DPI technology is developed and deployed outside the purview of standard organizations like ISO. Hence, there has been a lack of 	open, transparent standards development process in which participants have deliberated the impact of the technology. It is important for DPI to undergo 	these process which are inclusive, in that there is participation by non-engineering stakeholders to highlight the public policy issues such as privacy. Further, aside from the technology, the practices by networks need to be more transparent.	&lt;a href="#_ftn33" name="_ftnref33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Disclosure of the presence of DPI, the level of detail being inspected or retained and the purpose for deployment of DPI can be done. Some ISPs provide some of these details in their terms of service and website notices.	&lt;a href="#_ftn34" name="_ftnref34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, as opposed to web-based services, users have limited interaction with 	their ISP. It would be useful for ISPs to enable greater engagement with their users and make their practices more transparent.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The very nature of of the DPI technology renders some aspects of recognized privacy principles like notice and consent obsolete. The current privacy frameworks under FIPP&lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and OECD	&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; rely on the idea of empowering the individual by providing them with knowledge 	and this knowledge enables them to make informed choices. However, for this liberal conception of privacy to function meaningfully, it is necessary that 	there are real and genuine choices presented to the alternatives. While some principles like data minimisation, necessity and proportionality and purpose 	limitation can be instrumental in ensuring that DPI technology is used only for legitimate purposes, however, without effective opt-out mechanisms and 	limited capacity of individual to assess the risks, the efficacy of privacy principles may be far from satisfactory.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ongoing Aadhaar case and a host of surveillance projects like CMS, NATGRID, NETRA&lt;a href="#_ftn37" name="_ftnref37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and NMAC	&lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; have raised concerns about the state conducting mass-surveillance, particularly 	of online content. In this regard, it is all the more important to recognise the potential of Deep Packet Inspection technologies for impact on privacy 	rights of individuals. Earlier, the Centre for Internet and Society had filed Right to Information applications with the Department of Telecommunications, Government of India regarding the use of DPI, and the government had responded that there was no direction/reference to the ISPs to employ DPI technology.	&lt;a href="#_ftn39" name="_ftnref39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Similarly, MTNL also responded to the RTI Applications and denied using the 	technology.&lt;a href="#_ftn40" name="_ftnref40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It is notable though, that they did not respond to the questions 	about the traffic management policies they follow. Thus, so far there has been little clarity on actual usage of DPI technology by the ISPs.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Ashish Mishra, "India's Net Neutrality Crusaders", available at 			&lt;a href="http://mintonsunday.livemint.com/news/indias-net-neutrality-crusaders/2.3.2289565628.html"&gt; http://mintonsunday.livemint.com/news/indias-net-neutrality-crusaders/2.3.2289565628.html &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.livinginternet.com/i/iw_arch.htm"&gt;http://www.livinginternet.com/i/iw_arch.htm&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Vinton Cerf and Robert Kahn, "A protocol for packet network intercommunication", available at 			&lt;a href="https://www.semanticscholar.org/paper/A-protocol-for-packet-network-intercommunication-Cerf-Kahn/7b2fdcdfeb5ad8a4adf688eb02ce18b2c38fed7a"&gt; https://www.semanticscholar.org/paper/A-protocol-for-packet-network-intercommunication-Cerf-Kahn/7b2fdcdfeb5ad8a4adf688eb02ce18b2c38fed7a &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Paul Ganley and Ben Algove, "Network Neutrality-A User's Guide", available at			&lt;a href="http://wiki.commres.org/pds/NetworkNeutrality/NetNeutrality.pdf"&gt;http://wiki.commres.org/pds/NetworkNeutrality/NetNeutrality.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; J H Saltzer, D D Clark and D P Reed, "End-to-End arguments in System Design", available at			&lt;a href="http://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf"&gt;http://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 4.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Jonathan Zittrain, The future of Internet - and how to stop it, (Yale University Press and Penguin UK, 2008) available at 			&lt;a href="https://dash.harvard.edu/bitstream/handle/1/4455262/Zittrain_Future%20of%20the%20Internet.pdf?sequence=1"&gt; https://dash.harvard.edu/bitstream/handle/1/4455262/Zittrain_Future%20of%20the%20Internet.pdf?sequence=1 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Alissa Cooper, How Regulation and Competition Influence Discrimination in Broadband Traffic Management: A Comparative Study of Net Neutrality in 			the United States and the United Kingdom available at 			&lt;a href="http://ora.ox.ac.uk/objects/uuid:757d85af-ec4d-4d8a-86ab-4dec86dab568"&gt; http://ora.ox.ac.uk/objects/uuid:757d85af-ec4d-4d8a-86ab-4dec86dab568 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Christopher Parsons, "The Politics of Deep Packet Inspection: What Drives Surveillance by Internet Service Providers?", available at 			&lt;a href="https://www.christopher-parsons.com/the-politics-of-deep-packet-inspection-what-drives-surveillance-by-internet-service-providers/"&gt; https://www.christopher-parsons.com/the-politics-of-deep-packet-inspection-what-drives-surveillance-by-internet-service-providers/ &lt;/a&gt; at 15.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; at 16.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; at 19.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Jay Klein, "Digging Deeper Into Deep Packet Inspection (DPI)", available at			&lt;a href="http://spi.unob.cz/papers/2007/2007-06.pdf"&gt;http://spi.unob.cz/papers/2007/2007-06.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Tim Wu, "Network Neutrality: Broadband Discrimination", available at			&lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=388863"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=388863&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Paul Ferguson and Geoff Huston, "Quality of Service on the Internet: Fact, Fiction,&lt;/p&gt;
&lt;p&gt;or Compromise?", available at &lt;a href="http://www.potaroo.net/papers/1998-6-qos/qos.pdf"&gt;http://www.potaroo.net/papers/1998-6-qos/qos.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Barbara van Schewick, "Network Neutrality and Quality of Service: What a non-discrimination Rule should look like", available at 			&lt;a href="http://cyberlaw.stanford.edu/downloads/20120611-NetworkNeutrality.pdf"&gt; http://cyberlaw.stanford.edu/downloads/20120611-NetworkNeutrality.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 14.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Paul Ohm, "The Rise and Fall of Invasive ISP Surveillance," available at 			&lt;a href="http://paulohm.com/classes/infopriv10/files/ExcerptOhmISPSurveillance.pdf"&gt; http://paulohm.com/classes/infopriv10/files/ExcerptOhmISPSurveillance.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Ben Elgin and Bruce Einhorn, "The great firewall of China", available at 			&lt;a href="http://www.bloomberg.com/news/articles/2006-01-22/the-great-firewall-of-china"&gt; http://www.bloomberg.com/news/articles/2006-01-22/the-great-firewall-of-china &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Mike Wheatley, "Malaysia's Web Heavily Censored Before Controversial Elections", available at 			&lt;a href="http://siliconangle.com/blog/2013/05/06/malaysias-web-heavily-censored-before-controversial-elections/"&gt; http://siliconangle.com/blog/2013/05/06/malaysias-web-heavily-censored-before-controversial-elections/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Fazal Majid, "Deep packet inspection rears it ugly head" available at			&lt;a href="https://majid.info/blog/telco-snooping/"&gt;https://majid.info/blog/telco-snooping/&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Alissa Cooper, "Doing the DPI Dance: Assessing the Privacy Impact of Deep Packet Inspection," in W. Aspray and P. Doty (Eds.), Privacy in America: 			Interdisciplinary Perspectives, Plymouth, UK: Scarecrow Press, 2011 at 151.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; at 148.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Kevin Werbach, "Breaking the Ice: Rethinking Telecommunications Law for the Digital Age", Journal of Telecommunications and High Technology, 			available at &lt;a href="http://www.jthtl.org/articles.php?volume=4"&gt;http://www.jthtl.org/articles.php?volume=4&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; Note 25 at 149.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; Note 25 at 147.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; International Telecommunications Union, Recommendation ITU-T.Y.2770, Requirements for Deep Packet Inspection in next generation networks, available 			at &lt;a href="https://www.itu.int/rec/T-REC-Y.2770-201211-I/en"&gt;https://www.itu.int/rec/T-REC-Y.2770-201211-I/en&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; Note 25 at 154.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; at 156.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Paul Ohm, "The Rise and Fall of Invasive ISP Surveillance", available at 			&lt;a href="http://paulohm.com/classes/infopriv10/files/ExcerptOhmISPSurveillance.pdf"&gt; http://paulohm.com/classes/infopriv10/files/ExcerptOhmISPSurveillance.pdf &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.nist.gov/nstic/NSTIC-FIPPs.pdf"&gt;http://www.nist.gov/nstic/NSTIC-FIPPs.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm"&gt; https://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; "India's Surveillance State" Software Freedom Law Centre, available at 			&lt;a href="http://sflc.in/indias-surveillance-state-our-report-on-communications-surveillance-in-india/"&gt; http://sflc.in/indias-surveillance-state-our-report-on-communications-surveillance-in-india/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Amber Sinha, "Are we losing our right to privacy and freedom on speech on Indian Internet", DNA, available at 			&lt;a href="http://www.dnaindia.com/scitech/column-are-we-losing-the-right-to-privacy-and-freedom-of-speech-on-indian-internet-2187527"&gt; http://www.dnaindia.com/scitech/column-are-we-losing-the-right-to-privacy-and-freedom-of-speech-on-indian-internet-2187527 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://cis-india.org/telecom/use-of-dpi-technology-by-isps.pdf"&gt;http://cis-india.org/telecom/use-of-dpi-technology-by-isps.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Smita Mujumdar, "Use of DPI Technology by ISPs - Response by the Department of Telecommunications" available at 			&lt;a href="http://cis-india.org/telecom/dot-response-to-rti-on-use-of-dpi-technology-by-isps"&gt; http://cis-india.org/telecom/dot-response-to-rti-on-use-of-dpi-technology-by-isps &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/deep-packet-inspection-how-it-works-and-its-impact-on-privacy'&gt;https://cis-india.org/internet-governance/blog/deep-packet-inspection-how-it-works-and-its-impact-on-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-16T23:14:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns">
    <title>Decrypting Automated Facial Recognition Systems (AFRS) and Delineating Related Privacy Concerns</title>
    <link>https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns</link>
    <description>
        &lt;b&gt;Arindrajit Basu and Siddharth Sonkar have co-written this blog as the first of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems?&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The use of aggregated Big Data by governments has the potential to 
exacerbate power asymmetries and erode civil liberties like few 
technologies of the past. In order to guard against the aggressive&amp;nbsp; 
aggregation&amp;nbsp;and manipulation of&amp;nbsp;the data generated by individuals&amp;nbsp;who 
are branded&amp;nbsp;as suspect, it is critical that our firmly established 
constitutional rights protect human dignity in the face of this 
potential erosion.&lt;/p&gt;
&lt;p&gt;The increasing ubiquity of Automated Facial Recognition Systems 
(AFRS) serve as a prime example of the rising desire of governments to 
push fundamental rights to the brink. With AFRS, the core fundamental 
right in question is privacy, although questions have been posed 
regarding the potential violation of&amp;nbsp;other related rights, such as the 
Right to Equality and the Right to Free Speech and Expression, as well.&lt;/p&gt;
&lt;p&gt;There is a rich corpus of literature, (see &lt;a href="https://indianexpress.com/article/opinion/columns/digital-identification-facial-recognition-system-ncrb-5859072/" rel="noreferrer noopener" target="_blank"&gt;here&lt;/a&gt;, &lt;a href="http://www.unswlawjournal.unsw.edu.au/wp-content/uploads/2017/09/40-1-11.pdf" rel="noreferrer noopener" target="_blank"&gt;here&lt;/a&gt; and an excellent recent paper by Smriti Parsheera &lt;a href="http://datagovernance.org/report/adoption-and-regulation-of-facial-recognition-technologies-in-india" rel="noreferrer noopener" target="_blank"&gt;here)&lt;/a&gt;
 from a diverse coterie of scholars that call out the challenges posed 
by AFRS, particularly with respect to its proportionality as a 
restriction over the right to privacy. Our contribution to this 
discourse focuses on a very specific question around a ‘reasonable 
expectation of privacy’ — the standard identified for the protection of 
privacy in public spaces across jurisdictions, including in India. This 
is because at this juncture, the precise nature of the AFRS which will 
eventually be used and the regulations it will be subject to are not 
clear.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In &lt;a href="https://indiankanoon.org/doc/91938676/'"&gt;Retd. K.S &lt;/a&gt;&lt;a href="https://indiankanoon.org/doc/91938676/" rel="noreferrer noopener" target="_blank"&gt;Puttaswamy (Retd.) v. Union of India&lt;/a&gt;:
 Justice Chandrachud (Puttaswamy I), the Indian Supreme Court was 
concerned with the question whether there exists a fundamental right to 
privacy under the Indian Constitution. A nine-judge bench of the Court 
recognized that the right to privacy is a fundamental right implicit 
inter alia in the right to life within Article 21 of the Constitution.&lt;/p&gt;
&lt;p&gt;The right to privacy protects people and not places. Every person is 
entitled, however, to a reasonable expectation of privacy. The 
expectation of privacy must be twofold. First, the person must prove 
that the alleged act could inflict some harm. Such harm must be real and
 not be speculative or imaginary. Second, society must recognize this 
expectation as reasonable. The test of reasonable expectations is 
contextual, i.e., the extent to which it safeguards privacy depends on 
the place at which the individual is.&lt;/p&gt;
&lt;p&gt;In order to pass any constitutional test, therefore, AFRS must 
satisfy the ‘reasonable expectation’ test articulated in Puttaswamy. 
However, in this context, the test itself has multiple contours. Do we 
have a right to privacy in a public place? Is AFRS collecting any data 
that specifically violates a right to privacy? Is the aggregation of 
that data a potential violation?&lt;/p&gt;
&lt;p&gt;After providing a brief introduction to the use cases of AFRS in 
India and across the world, we embark upon answering all these 
questions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Primer on Automated Facial Recognition Systems (AFRS)&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Facial recognition is a biometric technology that utilises cameras to
 match stored or live footage of individuals (including both stills and 
moving footage) with images or video&amp;nbsp;from an existing database. Some 
systems might also be used to analyze broader demographic trends or 
conduct sentiment analysis through crowd scanning.&lt;/p&gt;
&lt;p&gt;While the use of photographs and video footage have been core 
components of police investigation, the use of algorithms to process 
vast tracts of Big Data (characterized by ‘Volume, Velocity, and 
Variety), and compare disparate and discrete data points allows for the 
derivation of hitherto unfeasible insights on the subjects of Big Data.&lt;/p&gt;
&lt;p&gt;The utilisation of AFRS for law enforcement is rapidly spreading around the world. &lt;a href="https://carnegieendowment.org/2019/09/17/global-expansion-of-ai-surveillance-pub-79847" rel="noreferrer noopener" target="_blank"&gt;A Global AI Surveillance Index&lt;/a&gt;
 compiled by the Carnegie Endowment for International Peace found that 
at least sixty-four countries are incorporating facial recognition 
systems into their AI surveillance programs.&lt;/p&gt;
&lt;p&gt;Chinese technology company Yitu has entered into a partnership with 
security forces in Malaysia to equip police officers with facial 
recognition body cameras that, powered by enabling technologies, would 
allow a comparison of images caught by the live body cameras with images
 from several central databases.&lt;/p&gt;
&lt;p&gt;In &lt;a href="https://news.sky.com/story/met-polices-facial-recognition-tech-has-81-error-rate-independent-report-says-11755941" rel="noreferrer noopener" target="_blank"&gt;England and Wales&lt;/a&gt;,
 London Metropolitan Police, South Wales Police, and Leicestershire 
Police are all in the process of developing technologies that allow for 
the identification and comparison of live images with those stored in a 
database.&lt;/p&gt;
&lt;p&gt;The technology is being developed by Japanese firm NEC and the police
 force has limited ability to oversee or modify the software, given its 
proprietary nature. The Deputy Chief of South Wales Police stated that 
“the tech is given to [them] as a sealed box… [and the police force 
themselves] have no input – whatever it does, it does what it does.”&lt;/p&gt;
&lt;p&gt;In the US, &lt;a href="https://www.americanbar.org/groups/criminal_justice/publications/criminal-justice-magazine/2019/spring/facial-recognition-technology/" rel="noreferrer noopener" target="_blank"&gt;Baltimore’s police&lt;/a&gt;
 set up facial recognition cameras to track and arrest protestors — a 
system that reached its zenith during the 2018 riots in the city.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It is suspected that authorities in &lt;a href="https://www.japantimes.co.jp/news/2019/10/23/asia-pacific/hong-kong-protests-ai-facial-recognition-tech/#.Xf1Fs_zhVPY" rel="noreferrer noopener" target="_blank"&gt;Hong Kong&lt;/a&gt; are also using AFRS to clamp down on the ongoing pro-democracy protests.&lt;/p&gt;
&lt;p&gt;In India, the Ministry of Home Affairs, through the National Crime Records Bureau put out a &lt;a href="http://ncrb.gov.in/TENDERS/AFRS/RFP_NAFRS.pdf" rel="noreferrer noopener" target="_blank"&gt;tender for a new AFRS&lt;/a&gt;,
 whose stated objective is to “act as a foundation for national level 
searchable platform of facial images.” The AFRS will pull facial image 
data from CCTV feeds and compare these with existing records across 
databases including the Crime and Criminal Tracking Networks and Systems
 (CCTNS), Inter-operable Criminal Justice System (or ICJS), Immigration 
Visa Foreigner Registration Tracking (IVFRT), Passport, Prisons and 
state police records.&lt;/p&gt;
&lt;p&gt;Plans are also afoot to integrate this with the yet to be deployed 
National Automated Fingerprint Identification System (NAFIS), thereby 
creating a multi-faceted surveillance system.&lt;/p&gt;
&lt;p&gt;Despite raising eyeballs due to its potential all-pervasive scope, 
this tender is not the first instance of AFRS being used by Indian 
authorities. Punjab Police, &lt;a href="https://www.livemint.com/AI/DIh6fmR6croUJps6x7JW5K/Meet-Staqu-a-startup-helping-Indian-law-enforcement-agencie.html" rel="noreferrer noopener" target="_blank"&gt;in partnership with Gurugram-based start-up Staqu&lt;/a&gt;
 has launched and commenced implementation of&amp;nbsp; the Punjab Artificial 
Intelligence System (PAIS) which uses digitised criminal records and 
automated facial recognition to retrieve information on a suspected 
criminal and essentially tracks their public whereabouts, which poses 
potential constitutional questions.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This was published by &lt;a class="external-link" href="https://aipolicyexchange.org/2019/12/26/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns/"&gt;AI Policy Exchange&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns'&gt;https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu, Siddharth Sonkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-01-02T14:01:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/deconstructing-2018internet-addiction2019">
    <title>Deconstructing ‘Internet addiction’ </title>
    <link>https://cis-india.org/news/deconstructing-2018internet-addiction2019</link>
    <description>
        &lt;b&gt;An article by Sruthi Krishnan and Shyam Ranganathan in The Hindu on August 30th,'09 &lt;/b&gt;
        
&lt;p&gt;CHENNAI: Earlier this week, the first rehabilitation centre for ‘Internet addicts’ was opened in the United States. De-addiction camps in China were in the news recently for the death of a teenager because of the brutal methods used there to cure ‘Internet addiction.’&lt;/p&gt;
&lt;p&gt;‘Internet addiction’ for now is a catch-all term that not only stands for addiction to specific activities such as gambling or gaming but also refers to longer hours devoted to the computer network at the expense of other activities.&lt;/p&gt;
&lt;p&gt;Though the Internet is only a medium of communication and information transmission like the printed book or television, ‘addiction’ is being used in this case with concern because of a fundamental dialectic: ‘quantity becomes quality.’&lt;/p&gt;
&lt;p&gt;“A whole new world is just a click away with the Internet. It is a medium just like books and TV, but the amount of interaction it makes possible with others, sometimes replacing the need for real world interaction, makes it vastly different,” says E.S. Krishnamoorthy, consultant neuropsychiatrist, Voluntary Health Services, Chennai.&lt;/p&gt;
&lt;p&gt;Though chemical changes may not be induced by the broadly repetitive action involved in gaming and general ‘Internet addiction,’ social behavioural modifications do take place, including sleep deprivation and aggression towards the depriver of access to the Internet, he says.&lt;/p&gt;
&lt;p&gt;“It is somewhat between Obsessive Compulsive Disorder (OCD) and addiction due to substance abuse. Substance abuse-led addiction focusses on gratification which this form of attachment provides, though there is no chemical ingestion. At the same time, the behavioural modifications are similar to those with OCD. It is almost like the ‘rush’ gamblers get out of a purely gratification-oriented repetitive action,” Dr. Krishnamoorthy adds.&lt;/p&gt;
&lt;h3&gt;Generational gap&lt;/h3&gt;
&lt;p align="justify"&gt;Sunil Abraham, director-policy, Centre for Internet and Society, Bangalore, says what constitutes ‘Internet addiction’ is sometimes misunderstood because of a generational gap between those who grew up immersed in technology and those who adopted technology later in their lives.&lt;/p&gt;
&lt;p&gt;Can a teenager’s extensive use of social networking be categorised as ‘addiction’? Not necessarily. Social networking could lead to forging new relationships which could be beneficial.&lt;/p&gt;
&lt;p&gt;For now, such activities may not be the norm, but it could be the way our society is configured in the future, says Mr. Abraham.&lt;/p&gt;
&lt;p&gt;The Internet itself offers solutions to balance your real and virtual activities. For instance, ‘Freedom’ is an application that disables networking on an Apple computer for up to eight hours at a time. In the settings of Google mail, you can enable ‘Email addict’ (a Google Labs feature) that disables your screen and makes you invisible on chat for 15 minutes. There are many such timer software that let you set a period for which a certain activity would be banned.&lt;/p&gt;
&lt;p&gt;Dr. Krishnamoorthy advocates counselling and concerted effort to increase real world social interactions for “treating” Internet addiction. He warns that the problem is larger in that we are creating an “inward-looking society.”&lt;/p&gt;
&lt;p&gt;“There is a big problem on hand if many people replace the real world with the Internet instead of using it as a device to enhance interactions,” he says.&lt;/p&gt;
&lt;p&gt;Mr. Abraham says controls should come from a more open and informed discussion, of which even children are a part. Dubbing an activity not fully understood an “addiction” and imposing old-fashioned controls are not the right approach, he adds.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/deconstructing-2018internet-addiction2019'&gt;https://cis-india.org/news/deconstructing-2018internet-addiction2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>radha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T15:09:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-october-3-2013-javed-anwer-decline-in-web-freedom-steepest-in-india">
    <title>Decline in web freedom steepest in India: Report</title>
    <link>https://cis-india.org/news/times-of-india-october-3-2013-javed-anwer-decline-in-web-freedom-steepest-in-india</link>
    <description>
        &lt;b&gt;In a report on the state of internet in 60 countries, Freedom House, a US-based organization, said that in 2013 India saw the "most significant year-on-year decline" in terms of the web freedom.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Javed Anwer was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-10-03/internet/42663467_1_web-freedom-anja-kovacs-internet-democracy-project"&gt;published in the Times of India&lt;/a&gt; on October 3, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The report said that that the internet in India was "partly free". This  is the same status that India had in 2012. But the country's score is  now 47 points (higher means more censorship) in 2013 compared to 39 in  2012. The 8-point fall is the steepest Freedom House found among all 60  countries that the group surveyed. Freedom House said it recorded  5-point fall in Brazil, Venezuela and the US.&lt;/p&gt;
&lt;div class="mod-articletext mod-timesofindiaarticletext mod-timesofindiaarticletextwithadcpc" id="mod-a-body-after-first-para" style="text-align: justify; "&gt;
&lt;p&gt;Despite mass surveillance revealed by Edward Snowden, a former  contractor for National Security Agency in the US, Freedom House calls  the web in the country "free".&lt;/p&gt;
&lt;p&gt;The Freedom House report said that  in 2013 India "suffered from deliberate interruptions of mobile and  internet service to limit unrest, excessive blocks on content during  rioting in northeastern states, and an uptick in the filing of criminal  charges against ordinary users for posts of social media sites".&lt;/p&gt;
&lt;p&gt;In 2013, India's commitment to the web freedom has not only been worse  than developed countries but has also been inferior to countries like  Malawi, Tunisia and Mexico.&lt;/p&gt;
&lt;p&gt;In the case of India, Freedom House  particularly singles out Central Monitoring System, which Indian  government is putting in place to regulate and monitor the web usage  within the country. "Surveillance (under CMS) requires no judicial  oversight. While some of this activity might be justifiable, the lack of  transparency surrounding the system, which was never reviewed by  Parliament, is concerning," it notes in the report. "The system's  potential for abuse is also disquieting, as is its inadequate legal  framework.&lt;/p&gt;
&lt;p&gt;The report cites the case of the girl who was arrested for liking a Facebook post in Maharashtra, blocking of some &lt;a href="http://timesofindia.speakingtree.in/topics/thoughts/twitter"&gt;Twitter&lt;/a&gt; accounts belonging to Indian users, overly broad court directives that  have resulted in blocking of websites and a general lack of transparency  in how Indian government blocks or filters content reach a conclusion  that Indians now have less freedom on how they use the web.&lt;/p&gt;
&lt;p&gt;Sunil  Abraham, director at Bangalore-based Centre for Internet and Society,  says that Freedom House reports are not very accurate because they don't  factor in censorship by copyright holders. But he agreed with its basic  premise that in India conditions for web users are getting more  difficult.&lt;/p&gt;
&lt;p&gt;"The report is absolutely right in pointing out that  censorship and surveillance in India is increasing. Despite protests  from many quarters, it is a real pity that the government is not taking  steps to amend the IT act and has joined other nation states in the  global race to the bottom of the internet freedom," said Abraham.&lt;/p&gt;
&lt;p&gt;Anja Kovacs, founder of Delhi-based Internet Democracy Project, agrees.  "I have some issues with Freedom House reports due to how they are  prepared and their methodologies. But yes I can say that last year has  been very eventful and difficult," said. "But at the same time, there  has also been a lot of push back from web users and activists. There  have been conversations around the issue of web censorship, which is  good."&lt;/p&gt;
&lt;p&gt;Globally, the web surveillance is on the rise. "Broad  surveillance, new laws controlling web content, and growing arrests of  social-media users drove a worldwide decline in internet freedom in the  past year," noted Freedom House.&lt;/p&gt;
&lt;p&gt;Overall, 34 out of 60 countries part of the report saw a decline in  the web freedom. "Vietnam and Ethiopia continued on a worsening cycle of  repression; Venezuela stepped up censorship during presidential  elections; and three democracies—India, the United States, and  Brazil—saw troubling declines," noted the report.&lt;/p&gt;
Iceland and  Estonia topped the list of countries with the greatest degree of  internet freedom. China, Cuba, and Iran were found to be the most  repressive countries.&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-october-3-2013-javed-anwer-decline-in-web-freedom-steepest-in-india'&gt;https://cis-india.org/news/times-of-india-october-3-2013-javed-anwer-decline-in-web-freedom-steepest-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-10-24T03:50:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/deceptive-design-in-voice-interfaces-impact-on-inclusivity-accessibility-and-privacy">
    <title>Deceptive Design in Voice Interfaces: Impact on Inclusivity, Accessibility, and Privacy </title>
    <link>https://cis-india.org/internet-governance/blog/deceptive-design-in-voice-interfaces-impact-on-inclusivity-accessibility-and-privacy</link>
    <description>
        &lt;b&gt;This article was commissioned by the Pranava Institute, as part of their project titled Design Beyond Deception, supported by the University of Notre Dame - IBM's Tech Ethics Lab.” The article examines the design of voice interfaces (VI) to anticipate potential deceptive design patterns in VIs. It also presents design and regulatory recommendations to mitigate these practices. &lt;/b&gt;
        &lt;p&gt;The original blog post can be accessed &lt;a class="external-link" href="https://www.design.pranavainstitute.com/post/deceptive-design-in-voice-interfaces-impact-on-inclusivity-accessibility-and-privacy"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;Voice Interfaces (VIs) have come a long way in recent years and are easily available as inbuilt technology with smartphones, downloadable applications, or standalone devices. In line with growing mobile and internet connectivity, there is now an increasing interest in India in internet-based multilingual VIs which have the potential to enable people to access services that were earlier restricted by language (primarily English) and interface (text-based systems). This current interest has seen even global voice applications such as Google Home and Amazon’s Alexa being available in &lt;a class="itht3 TWoY9" href="https://www.businesstoday.in/technology/news/story/now-talk-to-alexa-seamlessly-in-hindi-english-and-hinglish-231469-2019-10-09" rel="noopener noreferrer" target="_blank"&gt;Hindi&lt;/a&gt; (Singal, 2019) as well as the &lt;a class="itht3 TWoY9" href="https://voice.cis-india.org/#mapping-actors" rel="noopener noreferrer" target="_blank"&gt;growth&lt;/a&gt; of multilingual voice bots for certain banks, hotels, and hospitals (Mohandas, 2022).&lt;/p&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;The design of VIs can have a significant impact on the behavior of the people using them. Deceptive design patterns or design practices that trick people into taking actions they might otherwise not take (Tech Policy Design Lab, n.d.), have gradually become pervasive in most digital products and services. Their use in visual interfaces has been widely &lt;a class="itht3 TWoY9" href="https://dl.acm.org/doi/pdf/10.1145/3400899.3400901" rel="noopener noreferrer" target="_blank"&gt;criticized&lt;/a&gt; by researchers (Narayanan, Mathur, Chetty, and Kshirsagar, 2020), along with recent &lt;a class="itht3 TWoY9" href="https://tacd.org/manipulative-design-practices-online-what-policy-solutions-for-the-eu-and-the-u-s/" rel="noopener noreferrer" target="_blank"&gt;policy interventions&lt;/a&gt; (Schroeder and Lützow-Holm Myrstad, 2022) as well. As VIs become more relevant and mainstream, it is critical to anticipate and address the use of deceptive design patterns in them. This article, based on our learnings from the &lt;a class="itht3 TWoY9" href="http://voice.cis-india.org/index.html" rel="noopener noreferrer" target="_blank"&gt;study&lt;/a&gt; of VIs in India, examines the various types of deceptive design patterns in VIs and focuses on their implications in terms of linguistic barriers, accessibility, and privacy.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Potential deceptive design patterns in VIs&lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;Our research findings suggest that VIs in India are still a long way off from being inclusive, accessible and privacy-preserving. While there has been some development in multilingual VIs in India, their compatibility has been limited to a few Indian languages (Mohandas, 2022) (Naidu, 2022)., The potential of VIs as a tool for people with vision loss and certain cognitive disabilities such as dyslexia is widely recognized (Pradhan, Mehta, and Findlater, 2018), but our conversations suggest that most developers and designers do not consider accessibility when conceptualizing a voice-based product, which leads to interfaces that do not understand non standard speech patterns, or have only text-based privacy policies (Mohandas, 2022). Inaccessible privacy policies full of legal jargon along with the lack of regulations specific to VIs,  also make people vulnerable to privacy risks.&lt;/p&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;Deceptive design patterns can be used by companies to further these gaps in VIs. As with visual interfaces, the affordances and attributes of VI can determine the way in which they can be used to manipulate behavior. Kentrell Owens, et.al in their recent &lt;a class="itht3 TWoY9" href="https://homes.cs.washington.edu/~kentrell/static/papers/owensEuroUSEC2022-preprint.pdf" rel="noopener noreferrer" target="_blank"&gt;research&lt;/a&gt; lay down six unique properties of VIs that may be used to implement deceptive design patterns (Owens, Gunawan, Choffnes, Emami-Naeini, Kohno, and Roesner, 2022). Expanding upon these properties, and drawing from our research, we look at how they can be exacerbated in India.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Making processes cumbersome&lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;VIs are often limited by their inability to share large amounts of information through voice. They thus operate in combination with a smartphone app or a website. This can be intentionally used by platforms to make processes such as changing privacy settings or accessing the full privacy notice inconvenient for people to carry out. In India, this is experienced while unsubscribing from services such as Amazon Prime (Owens et al., 2022). Amazon Echo Dot presently allows individuals to subscribe to an Amazon Prime membership using a voice command, but directs them to use the website in order to unsubscribe from the membership. This can also manifest in the form of canceling orders and changing privacy settings.&lt;/p&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;VIs follow a predetermined linear structure that ensures a tightly controlled interaction. People make decisions based on the information they are provided with at various steps. Changing their decision or switching contexts could involve going back several steps. People may accept undesirable actions from the VI in order to avoid this added effort (Owens et al., 2022). The urgency to make decisions on each step can also cause people to make unfavorable choices such as allowing consent to third party apps. The VI may prompt advertisements and push for the company’s preferred services in this controlled conversation structure, which the user cannot side-step. For example, while setting up the Google voice assistant on any device, it nudges people to sign into their Google account. This means the voice assistant gets access to their web and app activity and location history at this step. While the data management of Google accounts can be tweaked through the settings, it may get skipped during a linear set-up structure. Voice assistants can also push people to opt into features such as ads personalisation, default news sources, and location tracking.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Making options difficult to find&lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;Discoverability is another challenge for VIs. This means that people might find it difficult to discover available actions or options using just voice commands. This gap can be misused by companies to trick people into making undesirable choices. For instance, while purchasing items, the VI may suggest products that have been sponsored and not share full information on other cheaper products, forcing people to choose without complete knowledge of their options. Many mobile based voice apps in India use a combination of images or icons with the voice prompts to enable discoverability of options and potential actions, which excludes people with vision loss (Naidu, 2022). These apps comprise a voice layer added to an otherwise touch-based visual platform so that people are able to understand and navigate through all available options using the visual interface, and use voice only for purposes such as searching or narrating. This means that these apps cannot be used through voice alone, making them disadvantageous for people with vision loss.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Discreet integration with third parties&lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;VIs can use the same voice for varying contexts. In the case of Alexa, Skills, which are apps on its platform, have the same voice output and invocation phrases as its own in-built features. End users find it difficult to differentiate between an interaction with Amazon and that with Skills which are third-party applications. This can cause users to share information that they otherwise would not have with third parties (Mozilla Foundation, 2022). There are numerous Amazon Skills inHindi and people might not be aware that the developers of these Skills are &lt;a class="itht3 TWoY9" href="https://www.theverge.com/2021/3/5/22315211/amazon-alexa-skills-how-to-remove-security-privacy-problems" rel="noopener noreferrer" target="_blank"&gt;not vetted &lt;/a&gt;by Amazon. This misunderstanding can create significant privacy or security risks if Skills are linked to contacts, banking, or social media accounts.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Lack of language inclusivity &lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;The lack of local language support, colloquial translations, and accents can lead to individuals not receiving clear and complete information. VI’s failure to understand certain accents can also make people feel isolated (Harwell, 2018). While in India voice assistants and even voice bots are available in few Indic languages, the default initial setup, privacy policies, and terms and conditions are still in English. The translated policies also use literary language which is difficult for people to understand, and miss out on colloquial terms. This could mean that the person might have not fully understood these notices and hence not have given informed consent. Such use of unclear language and unavailability of information in Indic languages can be viewed as a deceptive design pattern.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Making certain choices more apparent &lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;The different dimensions of voice such as volume, pitch, rate, fluency, pronunciation, articulation, and emphasis can be controlled and manipulated to implement deceptive design patterns. VIs may present the more privacy-invasive options more loudly or clearly, and the more privacy-preserving options more softly or quickly. It can use tone modulations to shame people into making a specific choice (Owens et al., 2022). For example, media streaming platforms may ask people to subscribe for a premium account to avoid ads in normal volume and mention the option to keep ads in a lower volume. Companies have also been observed to discreetly integrate product advertisements in voice assistants using tone. SKIN, a neurotargeting advertising strategy business, used a change of tone of the voice assistant to suggest a dry throat to advertise a drink (Chatellier, Delcroix, Hary, and Girard-Chanudet, 2019).&lt;/p&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;The attribution of gender, race, class, and age through stereotyping can create a persona of the VI for the user. This can extend to personality traits, such as an extroverted or an introverted, docile or aggressive character (Simone, 2020). The default use of female voices with a friendly and polite persona for voice assistants has drawn criticism for perpetuating harmful gender stereotypes (Cambre and Kulkarni, 2019). Although there is an option to change the wake word “Alexa” in Amazon’s devices, certain devices and third party apps do not work with another wake word (Ard, 2021). Further, projection of demographics can also be used to employ deceptive design patterns. For example, a VI persona that is constructed to create a perception of intelligence, reliability, and credibility can have a stronger influence on people’s decisions. Additionally, the effort to make voice assistants as human sounding as possible without letting people know they are human, could create a number of &lt;a class="itht3 TWoY9" href="https://www.nytimes.com/2019/05/22/technology/personaltech/ai-google-duplex.html" rel="noopener noreferrer" target="_blank"&gt;issues&lt;/a&gt; (X. Chen and Metz, 2019). First time users might divulge sensitive information thinking that they are interacting with a person. This becomes more ethically challenging when persons with vision loss are not able to know who they are interacting with.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Recording without notification &lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;Owens et al speak about VIs occupying physical domains due to which they have a much wider impact as opposed to a visual interface (Owens et al., 2022). The always-on nature of virtual assistants could result in personal information of a guest being recorded without their knowledge or consent as consent is only given at the setup stage by the owner of the device or smartphone.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Making personalization more convenient through data collection&lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;VIs are trained to adapt to the experience and expertise of the user. Virtual assistants provide personalization and the possibility to download a number of skills, save payment information, and phone contacts. In order to facilitate differentiation between multiple users on the same VI, individuals talking to the device are profiled based on their speech patterns and/or voice biometrics. This also helps in controlling or restricting content for children (Naidu, 2022). There is also tracking of commands to identify and list their intent for future use. The increase of specific and verified data can be used to provide better targeted advertisements, as well possibly be shared with law enforcement agencies in certain cases. &lt;a class="itht3 TWoY9" href="https://www.business-standard.com/article/current-affairs/razorpay-shared-donor-data-with-police-claims-alt-news-122070501255_1.html" rel="noopener noreferrer" target="_blank"&gt;Recently&lt;/a&gt;, a payment gateway company was made to share customer information to the law enforcement without their customer’s knowledge. This included not just the information about the client but also revealed sensitive personal data of the people who had used the gateway for transactions to the customer. While providing such details are not illegal and companies are meant to comply with requests from law enforcement, if more people knew of the possibility of every conversation of the house being accessible to law enforcement they would make more informed choices of what the VI records.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Reducing friction in actions desired by the platform&lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;One of the fundamental advantages of VIs is that it can reduce several steps to perform an action using a single command. While this is helpful to people interacting with it, the feature can also be used to reduce friction from actions that the platform wants them to take. These actions could include sharing sensitive information, providing consent to further data sharing, and making purchases. An &lt;a class="itht3 TWoY9" href="http://insider.com/kids-alexa-buy-700-worth-of-toys-moms-credit-card-2019-12" rel="noopener noreferrer" target="_blank"&gt;&lt;span class="D-jZk"&gt;example&lt;/span&gt;&lt;/a&gt; of this can be seen where children have found it very easy to purchase items using Alexa (BILD, 2019).&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Recommendations for Designers and Policymakers&lt;/b&gt;&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;Through these deceptive design patterns, VIs can obstruct and control information according to the preferences of the platform. This can result in a heightened impact on people with less experience with technology. Presently, profitability is a key driving factor for development and design of VI products. There is more importance given to data-based and technical approaches, and interfaces are often conceptualized by people with technical expertise with lack of inputs from designers at the early stages (Naidu, 2022). Designers also focus more on the usability and functionality of the interfaces by enabling personalization, but are often not as sensitive to safeguarding the rights of individuals using them. In order to tackle deceptive design, designers must work towards prioritizing ethical practice, and building in more agency and control for people who use VIs.&lt;/p&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;Many of the potential deceptive design patterns can be addressed by designing for accessibility and inclusivity in a privacy preserving manner. This includes vetting third-party apps, providing opt-outs, and clearly communicating privacy notices. Privacy implications can also be prompted by the interface at the time of taking actions. There should be clear notice mechanisms such as a prominent visual cue to alert people when a device is on and recording, along with an easy way to turn off the ‘always listening’ mode. The use of different voice outputs for third party apps can also signal to people about who they are interacting with and what information they would like to share in that context.&lt;/p&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;Training data that covers a diverse population should be built for more inclusivity. A linear and time-efficient architecture is helpful for people with cognitive disabilities. But, this linearity can be offset by adding conversational markers that let the individual know where they are in the conversation (Pearl, 2016). This could address discoverability as well, allowing people to easily switch between different steps. Speech-only interactions can also allow people with vision loss to access the interface with clarity.&lt;/p&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 bCMSCT yMZv8w lnyWN OZy-3 bCMSCT Y9Dpf xVISr" style="text-align: justify; "&gt;A number of policy documents including the 2019 version of India’s Personal Data Protection Bill, emphasize on the need for privacy by design. But, they do not mention how deceptive design practices could be identified and avoided, or prescribe penalties for using these practices (Naidu, Sheshadri, Mohandas, and Bidare, 2020). In the case of VI particularly, there is a need to look at it as biometric data that is being collected and have related regulations in place to prevent harm to users. In terms of accessibility as well, there could be policies that require not just websites but also apps (including voice based apps) to be compliant with international accessibility guidelines , and to conduct regular audits to ensure that the apps are meeting the accessibility threshold.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/deceptive-design-in-voice-interfaces-impact-on-inclusivity-accessibility-and-privacy'&gt;https://cis-india.org/internet-governance/blog/deceptive-design-in-voice-interfaces-impact-on-inclusivity-accessibility-and-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Saumyaa Naidu and Shweta Mohandas</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2023-08-08T15:22:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/december-2018-newsletter">
    <title>December 2018 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/december-2018-newsletter</link>
    <description>
        &lt;b&gt;We at the Centre for Internet &amp; Society (CIS) wish you all a great year ahead and welcome you to the twelfth issue of its newsletter (December) for the year 2018: &lt;/b&gt;
        &lt;h3&gt;&lt;b&gt;Highlights&lt;/b&gt;&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;CIS &lt;a href="https://cis-india.org/a2k/blogs/cis-signs-mou-with-odia-virtual-academy"&gt;signed a MoU&lt;/a&gt; with Odia Virtual Academy to      work on drafting an open content policy for the state, to promote use of      Wikimedia projects by various user types and to ensure sustainability of      Wikimedia projects, and to facilitate development of relevant free and      open source software projects. This partnership between OVA and CIS will      be carried out from December 2018 to November 2019.&lt;/li&gt;
&lt;li&gt;Natalia Khaniejo, in a &lt;a href="https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity"&gt;four-part report&lt;/a&gt; has attempted to document      the various approaches that are being adopted by different stakeholders      towards incentivizing cybersecurity and the economic challenges of      implementing the same. The literature review was edited by Amber Sinha.&lt;/li&gt;
&lt;li&gt;Arindrajit Basu, Karan Saini,      Aayush Rathi and Swaraj Barooah &lt;a href="https://cis-india.org/internet-governance/blog/arindrajit-basu-karan-saini-aayush-rathi-and-swaraj-paul-barooah-december-23-mapping-cyber-security-in-india-infographic"&gt;created an infographic&lt;/a&gt; which has mapped the      key stakeholder, areas of focus and threat vectors that impact      cybersecurity policy in India. The authors have stated that broadly      policy-makers should concentrate on establishing a framework where      individuals feel secure and trust the growing digital ecosystem.&lt;/li&gt;
&lt;li&gt;In April 2018 European Union      issued the proposal for a new regime dealing with cross border sharing of      data and information by issuing two draft instruments, an E-evidence      Regulation (“Regulation”) and an E-evidence Directive (“Directive”),      (together the “E-evidence Proposal”). Vipul Kharbanda &lt;a href="https://cis-india.org/internet-governance/blog/vipul-kharbanda-december-23-2018-european-e-evidence-proposal-and-indian-law"&gt;has analysed&lt;/a&gt; how service providers based in      India whose services are also available in Europe would be affected by      these proposals.&lt;/li&gt;
&lt;li&gt;Feminist research methodology      is a vast body of knowledge, spanning across multiple disciplines      including sociology, media studies, and critical legal studies. A &lt;a href="https://cis-india.org/internet-governance/blog/ambika-tandon-december-23-2018-feminist-methodology-in-technology-research"&gt;literature review by Ambika Tandon&lt;/a&gt; aims to      understand key aspects of feminist methodology across these disciplines,      with a particular focus on research on technology and its interaction with      society.&lt;/li&gt;
&lt;li&gt;CIS and design collective      Design Beku came together &lt;a href="https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu"&gt;for a workshop on Illustrations&lt;/a&gt; and Visual      Representations of Cybersecurity. The authors Paromita Bathija, Padmini      Ray Murray, and Saumyaa Naidu have stated that images play a vital role in      the public’s perception of cybercrime and cybersecurity. &lt;/li&gt;
&lt;li&gt;A list of selected sessions and      papers for the Internet Researchers' Conference 2019 (IRC19) &lt;a href="https://cis-india.org/raw/irc19-list-selected-sessions-papers"&gt;has been published&lt;/a&gt;. IRC19 will be held in      Lamakaan, Hyderabad, from Jan 30 to Feb 1, 2019.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Articles&lt;/b&gt;&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security"&gt;Private-public partnership for cyber security&lt;/a&gt; (Arindrajit Basu; Hindu Businessline; December 24, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle"&gt;Is the new ‘interception’ order old wine in a new      bottle?&lt;/a&gt; (Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and      Pranav M. Bidare; Newslaundry.com; December 27, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/indian-express-nishant-shah-december-30-2018-digital-native-system-needs-a-robot"&gt;Digital Native: System Needs a Reboot&lt;/a&gt; (Nishant Shah; Indian Express; December 30, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/deccan-herald-rajitha-menon-december-6-2018-many-sites-bypass-porn-ban"&gt;Many sites bypass porn ban&lt;/a&gt; (Rajitha Menon;      Deccan Herald; December 6, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook"&gt;How data privacy and governance issues have battered      Facebook ahead of 2019 polls&lt;/a&gt; (Rahul Sachitanand; Economic      Times; December 6, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/bloomberg-quint-december-16-2018-is-aadhaar-essential-to-achieve-error-free-electoral-rolls"&gt;Is Aadhaar Essential To Achieve Error-Free Electoral      Rolls?&lt;/a&gt; (Bloomberg Quint; December 16, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy"&gt;Centre’s order on computer surveillance threatens right      to privacy, experts say&lt;/a&gt; (Abhishek Dey; Scroll.in; December 22,      2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/scroll-nehaa-chaudhari-and-tuhina-joshi-december-23-2018-centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards"&gt;Centre’s order on computer surveillance is backed by      law – but the law lacks adequate safeguards&lt;/a&gt; (Nehaa Chaudhari      and Tuhina Joshi; Scroll.in; December 23, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/vpn-compare-david-spencer-december-24-2018-ten-government-agencies-can-now-snoop-on-peoples-internet-data"&gt;Ten Indian government agencies can now snoop on      people’s internet data&lt;/a&gt; (David Spenser; VPN Compare; December      24, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete"&gt;Big Brother is here: Amid snooping row, govt report      says monitoring system 'practically complete'&lt;/a&gt; (Keerthana      Sankaran; New Indian Express; December 26, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content"&gt;MHA snoop order &amp;amp; bid to amend IT rules: China-like      clampdown or tracking unlawful content?&lt;/a&gt; (Fatima Khan; The Print      December 28, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/hindustan-times-dipanjan-sinha-december-29-2018-the-dark-side-of-future-tech"&gt;The dark side of future tech: Where are we headed on      privacy, security, truth? &lt;/a&gt;(Dipanjan Sinha; Hindustan Times; December      29, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/nehaa-chaudhari-asian-age-december-30-2018-constitutionality-of-mha-surveillance-order"&gt;The constitutionality of MHA surveillance order&lt;/a&gt; (Nehaa Chaudhari; Asian Age; December 30, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our Access to Knowledge programme currently consists of two projects. The Pervasive Technologies project, conducted under a grant from the International Development Research Centre (IDRC), aims to conduct research on the complex interplay between low-cost pervasive technologies and intellectual property, in order to encourage the proliferation and development of such technologies as a social good. The Wikipedia project, which is under a grant from the Wikimedia Foundation, is for the growth of Indic language communities and projects by designing community collaborations and partnerships that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Wikipedia&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/punjabi-wikisource-training-workshop-patiala"&gt;Punjabi Wikisource Training Workshop, Patiala&lt;/a&gt; (Jayanta Nath; December 6, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/indic-wikisource-community-consultation-2018"&gt;Indic Wikisource Community Consultation 2018&lt;/a&gt; (Jayanta Nath; December 8, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blogs/cis-signs-mou-with-odia-virtual-academy"&gt;CIS Signs MoU with Odia Virtual Academy&lt;/a&gt; (Sailesh      Patnaik; December 19, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Our work in the Openness programme focuses on open data, especially open government data, open access, open education resources, open knowledge in Indic languages, open media, and open technologies and standards - hardware and software. We approach openness as a cross-cutting principle for knowledge production and distribution, and not as a thing-in-itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Guest Lecture&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/news/lecture-on-open-access-and-open-content-licensing-at-icar-short-course"&gt;Lecture on Open Access and Open Content Licensing at      ICAR (short course)&lt;/a&gt; (Organized by ICAR-Indian Institute of      Horticultural Research (IIHR) a constituent establishment of Indian      Council of Agricultural Research; November 13 - 22, 2018). Anubha Sinha      delivered a lecture.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Privacy&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Guest Lecture&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/teaching-at-shristi-interlude"&gt;Teaching at Shristi Interlude&lt;/a&gt; (Organised by      Shristi; Bangalore; December 7, 2018). Shweta Mohandas participated as a      mentor.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Gender &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Research Paper&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/ambika-tandon-december-23-2018-feminist-methodology-in-technology-research"&gt;Feminist Methodology in Technology Research: A      Literature Review&lt;/a&gt; (Ambika Tandon with contributions from Mukta      Joshi; research assistance by by Kumarjeet Ray and Navya Sharma; design by      Saumyaa Naidu; December 23, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/intermediary-liability-and-gender-based-violence"&gt;Event Report on Intermediary Liability and Gender Based      Violence &lt;/a&gt;(Akriti Bopanna; edited by Ambika Tandon; December 20,      2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/international-network-on-feminist-approaches-to-bioethics-2018"&gt;International Network on Feminist Approaches to      Bioethics 2018&lt;/a&gt; (Co-organized by Feminist Approaches to      Bioethics and Sama; St. John's Medical College; Bangalore; December 3 - 5,      2018). Aayush Rathi and Ambika Tandon were speakers at the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Cyber Security&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Research Papers&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/vipul-kharbanda-december-23-2018-european-e-evidence-proposal-and-indian-law"&gt;European E-Evidence Proposal and Indian Law&lt;/a&gt; (Vipul Kharbanda; December 23, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity"&gt;Economics of Cybersecurity: Literature Review      Compendium&lt;/a&gt; (Natalia Khaniejo; edited by Amber Sinha; December      31, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Infographic&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/arindrajit-basu-karan-saini-aayush-rathi-and-swaraj-paul-barooah-december-23-mapping-cyber-security-in-india-infographic"&gt;Mapping cybersecurity in India: An infographic&lt;/a&gt; (information contributed by Arindrajit Basu, Karan Saini, Aayush Rathi and      Swaraj Barooah; designed by Saumyaa Naidu; December 23, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu"&gt;A Critical Look at the Visual Representation of      Cybersecurity&lt;/a&gt; (Paromita Bathija, Padmini Ray Murray, and      Saumyaa Naidu; December 11, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/india-china-tech-forum"&gt;India-China Tech Forum 2018&lt;/a&gt; (Organised by      ORF and Peking University at the Ji Xianlin Centre for India-China      Studies; Mumbai; December 11 - 12, 2018). Arindrajit Basu was a speaker.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Artificial Intelligence &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/future-tech-and-future-law"&gt;Future Tech and Future Law&lt;/a&gt; (Organised by      Dept. of IT &amp;amp; BT, Government of Karnataka; Palace Grounds; Bangalore;      November 29 - December 1, 2018). Arindrajit Basu was a speaker.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/unescap-and-google-ai-december-13-bangkok-ai-for-social-good-summit"&gt;AI for Social Good Summit&lt;/a&gt; (Co-organised by      Google AI and United Nations ESCAP; Bangkok; December 13, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Selected Papers&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/irc19-list-selected-sessions-papers"&gt;Internet Researchers' Conference 2019&lt;/a&gt; (IRC19): #List - Selected Sessions and Papers (P.P. Sneha; January 2,      2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;hr size="2" style="text-align: justify; " width="100%" /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;&lt;br /&gt; &lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt; &lt;b&gt;----------------------------------- &lt;/b&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with disabilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;E-Mail - Access to Knowledge:      a2k@cis-india.org &lt;/li&gt;
&lt;li&gt;E-Mail - Researchers at Work:      raw@cis-india.org &lt;/li&gt;
&lt;li&gt;List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer and citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, write to Tanveer Hasan, Programme Officer, at tanveer@cis-india.org.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/december-2018-newsletter'&gt;https://cis-india.org/about/newsletters/december-2018-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2019-01-08T16:15:38Z</dc:date>
   <dc:type>Page</dc:type>
   </item>




</rdf:RDF>
