<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2346 to 2360.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/news-minute-sanyukta-dharmadhikari-january-10-2019-creeped-out-by-netflixs-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cpdp-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/cpdp-2014-reforming-data-protection-global-perspective"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cpdp-computers-privacy-and-data-protection-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/quint-shweta-mohandas-and-pallavi-bedi-june-19-2023-cowin-data-breach-health-sensitive-details-policies-solution"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-october-18-2012-surabhi-agarwal-courts-approval-needed-to-tap-phones"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/counter-proposal-by-cis-draft-it-intermediary-due-diligence-and-information-removal-rules-2012.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/counter-proposal-by-cis-draft-it-intermediary-due-diligence-and-information-removal-rules-2012.odt"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/counter-surveillance-panel-disco-tech-hackathon"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/counter-comments-on-trais-consultation-paper-on-privacy-security-and-ownership-of-data-in-telecom-sector"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/first-post-pallavi-polanki-oct-11-2012-could-better-dna-testing-facilities-in-india-have-saved-the-talwars"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/co-spying-on-competitors-staff"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-statesman-rakesh-kumar-july-13-2015-corporate-push-modis-billion-digital-dream"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/digital-identity/shruti-trikanand-and-amber-sinha-september-13-2019-core-concepts-processes"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/news-minute-sanyukta-dharmadhikari-january-10-2019-creeped-out-by-netflixs-you">
    <title>Creeped out by Netflix's 'You'? Here's how you can avoid online stalkers, data thieves</title>
    <link>https://cis-india.org/internet-governance/news/news-minute-sanyukta-dharmadhikari-january-10-2019-creeped-out-by-netflixs-you</link>
    <description>
        &lt;b&gt; Several social media users have no idea of how much of their information is stored on the Internet and what kind of information they are allowing the applications to access.
&lt;/b&gt;
        &lt;p dir="ltr" style="text-align: justify; "&gt;The blog post by Sanyukta Dharmadhikari was published by the &lt;a class="external-link" href="https://www.thenewsminute.com/article/creeped-out-netflix-s-you-here-s-how-you-can-avoid-online-stalkers-data-thieves-94814"&gt;New Minute&lt;/a&gt; on January 10, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Imagine someone knowing exactly where you are,  where you live, what your routine is, where you will be and then waiting  there for a ‘chance encounter’ to happen. This near-horror phenomenon  is something Netflix’s new show &lt;i&gt;You&lt;/i&gt; delves into. It follows a  seemingly charming bookstore manager and his ‘love story’ with an  aspiring writer – except he stalks her, breaks into her home, steals her  phone and keeps tabs on her location in an attempt to be ‘at the right  place at the right time’ and weasel into her life.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The nightmarish experience of the woman he pursues in the  series led many users to check their own privacy settings on social  media. But several users still have no idea of how much of their  information is stored on the cloud and what kind of information they are  allowing the applications to access.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;How social media uses your data&lt;/b&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“There might be much more information about you out there  on the Internet than you sign up for. People do not really realise how  much of their data is out there. Things are made out to be very opaque,  so it is difficult to know who stores how much of your data,” says Anja  Kovacs, director at Delhi-based Internet Democracy Project.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Pranesh Prakash, a fellow at the Centre for Internet and  Society, explains that most websites put the onus of privacy onto the  user but recently, there have been some features that social media  giants have introduced after privacy concerns were voiced.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“On Twitter, I think you don’t need to use your real name  and you do not have to use your location. On Facebook, apart from your  name, you can restrict other information to friends only or use the  option ‘Only Me’. With these kinds of possibilities existing, one just  needs to know how to navigate through these tools,” Pranesh says.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The problem with this, he adds, is that the onus of privacy  is put onto the user. “It is a difficult situation for social networks.  One of Facebook’s most used feature is the ‘people you may know’  feature. Sometimes, that can go really bad, sometimes it may throw up  your ex as a suggestion or let your stalker see your profile or it may  allow people who visit a common psychologist to see each other as  suggestions without knowing why,” he says.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;While it is difficult for social media giants to calibrate  such settings, the users have recently been given options to help  control what kind of audience sees what information.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;After Google Plus was launched, Facebook introduced a  feature that allows users to choose who can see their status updates.  Pranesh adds that users should make use of such features.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Understanding your data online&lt;/b&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Not many users realise that basic information about them  can be used against them. Seemingly harmless information like your date  of birth, your birthplace or the pages that you follow on social media  may contain leads for identity thefts.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“All the information that you put up publicly can be used  by police, future employees or even your stalkers as well. For example,  your date of birth, which most users add to their social media profiles,  is usually used to verify bank accounts. If that is public, anyone can  pretend to be you,” says Pranesh.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;A way out is to relay this information only to people you  trust. Another thing is to remember that on the internet, information  received from one website can be used to access information on another  website.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“You might upload a picture with your pet and name your pet  in that post. However, that name could be the answer to one of the  security questions asked on another website. If you use the same email  address and username across social media profiles, it is easier to find  information about you. Users should be aware that websites can be  connected,” Pranesh explains.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Apps and permissions&lt;/b&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Another crucial thing to remember is that users must always look into privacy settings of social networks that they use.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;When you install new applications on your mobile phones,  they often ask for certain permissions – like seeking access to your  location – and users usually mechanically click on allow.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Most of these permissions apps request are often based on  the type of application – for example, it is natural for Google Maps to  ask permission to access your location – and users need to be vigilant  if apps ask for absurd permissions.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“I once saw a torchlight app that sought access to my  address book. Why would my flashlight need access to my contacts? There  are a lot of apps who don't read these permissions. It is quite easy to  figure out what kind of permissions an app needs and users need to apply  their mind when installing the apps,” Anja adds.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;She states that there are a lot of people who do not read  through the terms and conditions of a particular website or app or the  permissions they seek. And once access is granted, there is no way of  taking your data back.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Last year, it was revealed that a Facebook breach had  exposed data of 50 million people. Last month, Facebook reported another  security breach where nearly 6.8 million users risked their private  photos being exposed to third-party apps.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Facebook also found itself refuting serious claims of  wrongdoings in giving access to user information to certain device  makers, including China-based Huawei, and certain large technology  companies and popular apps like Netflix or Spotify.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Anja says users should be more critical of such companies and organisations that store data or sell users' data.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“People feel that things can’t change, but that is because  they don't make enough noise. You must ask whether companies can store  your data and not just who has what data – ask who can access it,” Anja  said. “Think more critically about which companies you trust and why you  trust them.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/news-minute-sanyukta-dharmadhikari-january-10-2019-creeped-out-by-netflixs-you'&gt;https://cis-india.org/internet-governance/news/news-minute-sanyukta-dharmadhikari-january-10-2019-creeped-out-by-netflixs-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-01-12T02:13:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme">
    <title>CPRsouth 2016 – Young Scholars Programme</title>
    <link>https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme</link>
    <description>
        &lt;b&gt;Rohini Lakshané, Amber Sinha and Vidushi Marda have been selected to attend the two-day Young Scholars' Programme to be held in Zanzibar, Tanzania in early September this year. The programme is a part of the CPRSouth conference.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Read the original announcement published by CPRSouth &lt;a class="external-link" href="http://www.cprsouth.org/cprsouth-2016-young-scholars-programme/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following highly successful joint Afro-Asian CPR conferences in Mauritius in 2012, and India in 2013, CPRafrica and CPRsouth formally merged under the banner of CPRsouth in 2014. Since then, CPRsouth has hosted conferences in the Cradle of Humankind in South Africa (2014), and at the Innovation Center for Big Data and Digital Convergence at Yuan Ze University, Taiwan (2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This year’s conference is co-hosted by&lt;em&gt; COSTECH &lt;/em&gt;and&lt;em&gt; TCRA &lt;/em&gt;in Zanzibar, and will include sessions on cutting-edge developments on ICT policy and regulation in the South and discussion of the research-policy interface.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;30 Young Scholars from Africa and the Asia-Pacific region will be selected to participate in a tutorial programme taught by recognised scholars and practitioners from Africa and Asia, and they will attend the main conference thereafter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Tutorials are scheduled to be held on the 6&lt;sup&gt;th&lt;/sup&gt; and 7&lt;sup&gt;th&lt;/sup&gt; of September 2016, prior to the main CPR&lt;em&gt;south&lt;/em&gt; conference.&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; Who will qualify?&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Masters/PhD students in Economics, Public policy, Communications and Journalism&lt;/li&gt;
&lt;li&gt;Officers of government/regulatory agencies undertaking ICT policy research, developing/gathering indicators (monitoring and evaluation)&lt;/li&gt;
&lt;li&gt;Staff of private companies in the communication industries working in regulatory affairs&lt;/li&gt;
&lt;li&gt;Officers in NGOs/INGOs working in policy and regulation&lt;/li&gt;
&lt;li&gt;Researchers from think tanks, university research centres&lt;/li&gt;
&lt;li&gt;Journalists covering communication public policy and regulation&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Seminar&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The seminar will cover a number of topics of the two days, such as:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;policy analysis using supply-side or demand-side data;&lt;/li&gt;
&lt;li&gt;ICT impact analysis;&lt;/li&gt;
&lt;li&gt;convergence, net neutrality;&lt;/li&gt;
&lt;li&gt;funding broadband network extension, open access networks, spectrum;&lt;/li&gt;
&lt;li&gt;sector and competition regulation;&lt;/li&gt;
&lt;li&gt;research to policy interventions;&lt;/li&gt;
&lt;li&gt;Internet governance – privacy, surveillance, human rights online; and&lt;/li&gt;
&lt;li&gt;introduction to big data, open data.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;(2016 tutorial programme still to be confirmed)&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous tutorial presentations can be accessed at &lt;a href="http://www.cprsouth.org/"&gt;&lt;span style="text-decoration: underline;"&gt;http://www.cprsouth.org/&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Application deadline: 22 April 2016&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Application guidelines&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://form.myjotform.com/60813291616555" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;Applications should be submitted via this link&lt;/span&gt;&lt;/a&gt; by 22 April 2016, and must contain the following:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;one-page curriculum vitae; and&lt;/li&gt;
&lt;li&gt;one-page write-up outlining why you wish to become an African or Asia-Pacific based expert capable of contributing to ICT related policy and regulatory reform in the region&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Applicants’ &lt;strong&gt;write-ups and biographies should be in a single word document&lt;/strong&gt;, and named: CPRsouth2016_YoungScholar_ApplicantLastName.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;em&gt;Kindly note:&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt; Late applications and applications that do not conform to the prescribed format above will automatically be disqualified.&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Review Criteria&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Applications will be reviewed according to the following criteria:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;content of application;&lt;/li&gt;
&lt;li&gt;evidence of interest in, and commitment to, policy-relevant research for Africa or the Asia-Pacific region;&lt;/li&gt;
&lt;li&gt;quality of writing; and&lt;/li&gt;
&lt;li&gt;gender and country representation&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The selection committee may contact your supervisor or mentor before making the final selections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Candidates selected to participate in the tutorial programme must:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;provide a one-page research proposal &lt;em&gt;upon acceptance onto the tutorial programme&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;participate in all tutorial sessions&lt;/li&gt;
&lt;li&gt;participate in the entire CPR&lt;em&gt;south&lt;/em&gt; 2016 conference&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Funding&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Selected young scholars who are passport holders of, and travelling from, low and middle income countries within the Asia Pacific and Africa (as classified by the World Bank http://data.worldbank.org/about/country-classifications/country-and-lending-groups#Low_income) will be provided with:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;lowest-cost economy airfare to conference destination (less USD 150 registration fee);&lt;/li&gt;
&lt;li&gt;ground transfers between the conference venue and airport; and&lt;/li&gt;
&lt;li&gt;twin sharing accommodation on bed and breakfast basis, 5 lunches and 1 dinner for the duration of the conference and tutorials (6 – 10 September 2016). &lt;em&gt;Not all meals are covered.&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The registration fee for young scholars to attend the conference and tutorials is USD150, and airfares will be reimbursed less this registration fee.  Participants will be required to cover:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;transport to and from airports in their home countries;&lt;/li&gt;
&lt;li&gt;visa fees (if any);&lt;/li&gt;
&lt;li&gt;meals not provided; and&lt;/li&gt;
&lt;li&gt;any other incidental costs&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;As the registration fee is so low and should be met personally even if there is no institutional support for attendance of the course and conference, please note that only under exceptional circumstances of extreme financial hardship may the organisers consider a waiver of the conference registration fee. Such waivers will be considered on a case-by-case basis and only where a scholar would otherwise be prevented from attending the YS programme and conference.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Visas&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Letters of invitation will be provided for purposes of visa applications after participant selections have been made. Participants are responsible for securing their own visas to enter Tanzania, and are strongly advised to initiate visa approval procedures immediately on receipt of confirmation of their participation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kindly direct all enquiries to Ondine Bello: admin@researchictafrica.net  orinfo@CPRsouth.org&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme'&gt;https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2016-05-30T02:01:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cpdp-2015">
    <title>CPDP 2015</title>
    <link>https://cis-india.org/internet-governance/news/cpdp-2015</link>
    <description>
        &lt;b&gt;The eighth international conference on computers, privacy and data protection will be held in Brussels from January 21 to 23, 2015. The Centre for Internet and Society is a moral supporter of CPDP. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;CPDP is a non-profit platform originally founded in 2007 by research groups from the Vrije Universiteit Brussel, the Université de Namur and Tilburg University and has grown into a platform carried by 20 academic centers of excellence from the EU, the US and beyond. As a world-leading multidisciplinary conference CPDP offers the cutting edge in legal, regulatory, academic and technological development in privacy and data protection. Within an atmosphere of independence and mutual respect, CPDP gathers academics, lawyers, practitioners, policy-makers, computer scientists and civil society from all over the world in Brussels offering them an arena to exchange ideas and discuss the latest emerging issues and trends. This unique multidisciplinary formula has served to make CPDP one of the leading data protection and privacy conferences in Europe and around the world. CPDP2014 welcomed 854 guests including 343 speakers from 43 different countries dispersed over more than 60 panels which took place during three full days. It attracted another 500 people in several public evening events including debates, a pecha kucha evening and an art exhibition. CPDP2015 aims to repeat the success of last year and will stage panels within the following main topical themes: Data Protection Reform: European and Global Developments, Mobility (mobile technologies, wearable technologies, border surveillance), EU-US developments concerning the regulation of government surveillance, Health, privacy and data protection, Love and lust in the digital age, Internet governance and privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2015 CPDP will take place from January 21 to 23, 2015 in the Halles de Schaerbeek, Brussels, Belgium. &lt;span&gt;Registrations are already open:&lt;/span&gt;&lt;i&gt;&lt;span&gt; &lt;/span&gt;&lt;/i&gt;&lt;span&gt;&lt;a href="http://www.cpdpconferences.org/Registration.html" target="_blank"&gt;http://www.cpdpconferences.org/Registration.html&lt;/a&gt;. For more details &lt;a class="external-link" href="http://www.cpdpconferences.org/Callforpapers.html"&gt;see here&lt;/a&gt;.&lt;/span&gt;&lt;i&gt;&lt;span&gt; &lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cpdp-2015'&gt;https://cis-india.org/internet-governance/news/cpdp-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-30T09:52:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/cpdp-2014-reforming-data-protection-global-perspective">
    <title>CPDP 2014 Reforming Data Protection: The Global Perspective</title>
    <link>https://cis-india.org/events/cpdp-2014-reforming-data-protection-global-perspective</link>
    <description>
        &lt;b&gt;Already in its 7th edition, the annual Computer Privacy and Data Protection conference (organised by CPDP) is being held in Brussels from January 22 to 24, 2014. Malavika Jayaram will be speaking at this event.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The Centre for Internet and Society is &lt;a class="external-link" href="http://www.cpdpconferences.org/wednesday22january2014.html"&gt;one of the sponsors&lt;/a&gt; for this event. Click &lt;a class="external-link" href="http://www.cpdpconferences.org/wednesday22january2014.html"&gt;here&lt;/a&gt; to read the full programme.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;CPDP is a &lt;b&gt;non-profit platform&lt;/b&gt; originally founded in 2007 by research groups from the Vrije Universiteit Brussel, the Université de Namur and Tilburg University, which has now grown significantly and incorporates a consortium of 21 conference partners.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CPDP offers the &lt;b&gt;cutting edge in legal, regulatory, academic and technological development in privacy and data protection&lt;/b&gt;. In an atmosphere of independence and mutual respect, CPDP gathers academics, lawyers, practitioners, policy-makers, computer scientists and civil society from all over the world to exchange ideas and discuss the latest emerging issues and trends. This unique multidisciplinary formula has served to make CPDP &lt;b&gt;one of the leading data protection and privacy conferences in Europe and around the world&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CPDP2014 has become &lt;b&gt;truly global&lt;/b&gt;: it is co-organized by conference partners from Europe and the United States, and devotes panels to Latin-America and India. Moreover, CPDP is reaching out to the Asia-Pacific with speakers coming from all over the region.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The progressive growth of CPDP will culminate in an unprecedented 7&lt;sup&gt;th&lt;/sup&gt; edition. A terrific programme will include &lt;b&gt;more than 60 panels&lt;/b&gt; held over three consecutive days. The panels will focus on key issues that cover &lt;b&gt;all current debates&lt;/b&gt;: The data protection reform in the European Union, PRISM, big data, cybercrime, data retention, cloud computing, enforcement by Data Protection Authorities, biometrics, e-health, privacy by design, and much, much more. In addition, there will be a day event on the ethical issues of data collection on minorities, and the use of technology to advance the status of Roma.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CPDP will offer valuable contributions from the &lt;b&gt;leading names in the field&lt;/b&gt;, including key &lt;b&gt;representatives from all the major European institutions&lt;/b&gt; - the European Commission, the European Parliament, the European Data Protection Supervisor, and the Council of Europe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the well-known classic &lt;b&gt;Pecha Kucha&lt;/b&gt; side event, there will be several &lt;b&gt;public debates&lt;/b&gt; held in the evenings – both in Dutch and English.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CDP2014 will continue to pay particular attention to &lt;b&gt;high-level and innovative research from PhD Students and outstanding junior researchers &lt;/b&gt;by organizing sessions completely devoted to their work. CPDP2014 will also remain home to several &lt;b&gt;award ceremonies,&lt;/b&gt; such as the award for the best Multidisciplinary Privacy Paper and the EPIC International Champion of Freedom Award.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whether you are involved in the Conference as a sponsor, supporter, partner or participant or not, CPDP2014 welcomes you to join the event and contribute to the debate on emerging privacy and data protection issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For up to date information, registration and the programme, please visit &lt;a href="http://www.cpdpconferences.org/"&gt;http://www.cpdpconferences.org/&lt;/a&gt; and follow CPDP on Facebook (cpdpconferences) and Twitter (@cpdpconferences).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If you have any questions please contact: &lt;a href="mailto:info@cpdpconferences.org"&gt;info@cpdpconferences.org&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/cpdp-2014-reforming-data-protection-global-perspective'&gt;https://cis-india.org/events/cpdp-2014-reforming-data-protection-global-perspective&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-12-11T03:39:50Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cpdp-computers-privacy-and-data-protection-2017">
    <title>CPDP (Computers, Privacy and Data Protection) 2017 </title>
    <link>https://cis-india.org/internet-governance/news/cpdp-computers-privacy-and-data-protection-2017</link>
    <description>
        &lt;b&gt;Amber Sinha participated as a panelist in a panel on 'EU Adequacy Status for International Data Transfers' in Brussels, Belgium on January 26, 2017. The event was organized by Privacy International.&lt;/b&gt;
        &lt;h3&gt;EU Adequacy Status for International Data Transfers&lt;/h3&gt;
&lt;p&gt;According to EU data protection laws, countries only have blanket freedoms to receive and process personal data from the EU if they have been awarded an adequacy status by the Commission. Given the vital importance of data transfers between countries in the global economy, having such a status is a valuable asset, as other available legal means of transfer are more limited.  India, for e.g. is said to be losing in excess of Euro 30 billion per year through lost trade with the EU, as it lacks such adequacy status.  In the 20+ years since the data protection Directive was passed, only 11 states  have been decided to be ‘adequate’ by the Commission – which include the US with its recently awarded Privacy Shield. The Commission methodology and procedures for granting adequacy to countries is increasingly under scrutiny – for e.g. a recent study found that the way it makes adequacy decisions for its trade partners could be accused of being obscure, inconsistent and without clear criteria or rules or timeframes. This also makes EU data protection laws vulnerable to challenge under world trade rules. This panel will address the following questions:&lt;br /&gt;&lt;br /&gt;Questions to be considered:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;On what basis does the EU and the Commission make decisions on whom to grant adequacy status?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;In the light of the Schrems judgement defining adequacy as ‘essentially equivalent’, should all past decision be revised?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Given that more than 100 countries now have general data protection laws, how should countries be chosen for adequacy judgements?&lt;/li&gt;
&lt;li&gt;What criteria and methodologies should be used to ensure all countries are treated equally,  to ensure fundamental rights are equally upheld, and to avoid possible challenge under WTO rules?&lt;/li&gt;
&lt;li&gt;(New) What are your views on the EC proposal to facilitate international transfers of personal data, recently published?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;Panel:&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Chair: &lt;/b&gt;Jan           Albrecht MEP&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Panel: &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Kristina Irion&lt;/b&gt;, Institute of           Information Law (IVIR), University of Amsterdam:&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Kristina is expert academic in both data             protection and related trade issues, author of recent study&lt;/i&gt; ‘&lt;a href="http://www.ivir.nl/publicaties/download/1807"&gt;Trade             and Privacy: complicated bedfellows&lt;/a&gt;’&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Amber Sinha&lt;/b&gt;,             Centre for Internet and Society (CIS), India&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Amber is policy researcher               specialising in privacy and big data ; CIS is an India NGO               and partner organisation of Privacy International&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Daniel Cooper&lt;/b&gt;,             Covington and Burling ;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Dan is partner at this global               law firm, which advises both business and government               clients round the world ; he leads the data protection               practice in London &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Bruno Gencarelli&lt;/b&gt;,             European Commission DG Justice ;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Bruno is the head of the new DG               Justice unit on data flows and data protection, and as               such the Commission boss of adequacy&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Veronica Perez-Asinari&lt;/b&gt;,             European Data Protection Supervisor (EDPS).&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Veronica is the EDPS head of               unit for supervision and enforcement; she has also             recently spent some months working with the Argentina DPA             (Argentina has EU adequacy). &lt;/i&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Moderator: &lt;/b&gt;Anna           Fielder, Privacy International&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cpdp-computers-privacy-and-data-protection-2017'&gt;https://cis-india.org/internet-governance/news/cpdp-computers-privacy-and-data-protection-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-03T02:02:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/quint-shweta-mohandas-and-pallavi-bedi-june-19-2023-cowin-data-breach-health-sensitive-details-policies-solution">
    <title>CoWIN Breach: What Makes India's Health Data an Easy Target for Bad Actors?</title>
    <link>https://cis-india.org/internet-governance/blog/quint-shweta-mohandas-and-pallavi-bedi-june-19-2023-cowin-data-breach-health-sensitive-details-policies-solution</link>
    <description>
        &lt;b&gt;Recent health data policies have failed to even mention the CoWIN platform.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="https://www.thequint.com/opinion/cowin-data-breach-health-sensitive-details-policies-solution#read-more"&gt;originally published in the Quint&lt;/a&gt; on 19 June 2023.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last week, it was reported that due to an alleged breach of &lt;a href="https://www.thequint.com/fit/cowin-data-breach-private-information-covid-vaccine-telegram-bot"&gt;the CoWIN platform&lt;/a&gt;, details such as Aadhaar and passport numbers of Indians were made public via a Telegram bot.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Minister of State for Information Technology &lt;a href="https://www.thequint.com/fit/cowin-data-breach-telegram-bot-covid-19-vaccine-unanswered-questions"&gt;Rajeev Chandrashekar&lt;/a&gt; put out information acknowledging that there was some form of a data breach, there is no information on how the breach took place or when a past breach may have taken place.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;This data leak is yet another example of &lt;a href="https://www.thequint.com/opinion/cowin-breach-shows-us-the-structural-problem-with-digital-indias-infrastructure"&gt;our health records&lt;/a&gt; being exposed in the recent past – during the pandemic, there were reports of COVID-19 test results being leaked online. The leaked information included patients’ full names, dates of birth, testing dates, and names of centres in which the tests were held.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;In December last year, five servers of the &lt;a href="https://www.thequint.com/fit/aiims-ayushman-bharat-digital-mission-health-data"&gt;All India Institute of Medical Science&lt;/a&gt; (AIIMS) in Delhi were under a cyberattack, leaving sensitive personal data of around 3-4 crore patients compromised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In such cases, the Indian Computer Emergency Response Team (CERT-In) is the agency responsible for looking into the vulnerabilities that may have led to them. However, till date, CERT-In has not made its technical findings into such attacks &lt;a href="https://www.thequint.com/topic/data-breach"&gt;publicly available&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The COVID-19 Pandemic Created Opportunity&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The pandemic saw a number of digitisation policies being rolled out in the health sector; the most notable one being the National Digital Health Mission (or NDHM, later re-branded as the Ayushman Bharat Digital Mission).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mobile phone apps and web portals launched by the central and state governments during the pandemic are also examples of this health digitisation push. The rollout of the COVID-19 vaccinations also saw the deployment of the CoWIN platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Initially, it was mandatory for individuals to register on CoWIN to get an appointment for vaccination, and there was no option for walk-in-registration or to book an appointment. But, the Centre subsequently modified this rule and walk-in appointments and registrations on CoWIN became permissible from June 2021.&lt;/p&gt;
&lt;blockquote&gt;However, a study conducted by the Centre for Internet and Society (CIS) found that states such as Jharkhand and Chhattisgarh, which have low internet penetration, permitted on-site registration for vaccinations from the beginning.&lt;/blockquote&gt;
&lt;p&gt;The rollout of the NDHM also saw Health IDs being generated for citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In several reported cases across states, this rollout happened during the COVID-19 vaccination process – without the informed consent of the concerned person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;b&gt;beneficiaries who have had their Health IDs created through the vaccination process had not been informed&lt;/b&gt; about the creation of such an ID or their right to opt out of the digital health ecosystem.&lt;/p&gt;
&lt;h3&gt;A Web of Health Data Policies&lt;/h3&gt;
&lt;p&gt;Even before the pandemic, India was working towards a Health ID and a health data management system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The components of the umbrella National Digital Health Ecosystem (NDHE) are the National Digital Health Blueprint published in 2019 (NDHB) and the NDHM.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Blueprint was created to implement the National Health Stack (published in 2018) which facilitated the creation of Health IDs. Whereas the NDHM was drafted to drive the implementation of the Blueprint, and promote and facilitate the evolution of NDHE.&lt;/p&gt;
&lt;p&gt;The National Health Authority (NHA), established in 2018, has been given the responsibility of implementing the National Digital Health Mission.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;2018 also saw the Digital Information Security in Healthcare Act (DISHA), which was to regulate the generation, collection, access, storage, transmission, and use of Digital Health Data ("DHD") and associated personal data.&lt;/blockquote&gt;
&lt;p&gt;However, since its call for public consultation, &lt;b&gt;no progress has been made&lt;/b&gt; on this front.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to documents that chalk out the functioning and the ecosystem of a digitised healthcare system, the NHA has released policy documents such as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;the Health Data Management Policy (which was revised three times; the latest version released in April 2022)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;the Health Data Retention Policy (released in April 2021)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Consultation paper on the Unified Health Interface (UHI) (released in December 2022)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Along with these policies, in 2022, the NHA released the NHA Data Sharing Guidelines for the Pradhan Mantri Jan Aarogya Yojana (PM-JAY) – India’s state health insurance policy.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;However these &lt;b&gt;draft guidelines repeat the pattern of earlier policies&lt;/b&gt; &lt;b&gt;on health data&lt;/b&gt;, wherein there is no reference to the policies that predated it; the PM-JAY’s Data Sharing Guidelines, published in August 2022, did not even refer to the draft National Digital Health Data Management Policy (published in April 2022).&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interestingly, the recent health data policies do not mention CoWIN.&lt;/b&gt; Failing to cross-reference or mention preceding policies creates a lack of clarity on which documents are being used as guidelines by healthcare providers.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Can a Data Protection Bill Be the Solution?&lt;/h3&gt;
&lt;p&gt;The draft Data Protection Bill, 2021, defined health data as “…the data related to the state of physical or mental health of the data principal and &lt;b&gt;includes records regarding the past, present or future state of the health of such data principal&lt;/b&gt;, data collected in the course of registration for, or provision of health services, data associated with the data principal to the provision of specific health services.”&lt;/p&gt;
&lt;p&gt;However, this definition as well as the definition of sensitive personal data was removed from the current version of the Bill (Digital Personal Data Protection Bill, 2022).&lt;/p&gt;
&lt;blockquote&gt;Omitting these definitions from the Bill removes a set of data which, if collected, warrants increased responsibility and increased liability. Handling of health data, financial data, government identifiers, etc, need to come with a higher level of responsibility as they are a list of sensitive details of a person.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;The threats posed as a result of this data being leaked are not limited to spam messages or fraud and impersonation, but also of companies that can get a hand on this coveted data and gather insights and train their systems and algorithms, without the need to seek consent from anyone, or without facing the consequences of harm caused.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the current version of the draft DPDP Bill states that the data fiduciary shall notify the data principal of any breach, the draft Bill also states that the Data Protection Board “may” direct the data fiduciary to adopt measures that remedy the breach or mitigate harm caused to the data principal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bill also prescribes penalties of upto Rs 250 crore if the data fiduciary fails to take reasonable security safeguards to prevent a personal data breach, and a penalty of upto Rs 200 crore if the fiduciary fails to notify the data protection board and the data principal of such breach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While &lt;b&gt;these steps, if implemented through legislation, would make organisations processing data take their data security more seriously&lt;/b&gt;, the removal of sensitive personal data from the definition of the Bill, would mean that data fiduciaries processing health data will not have to take additional steps other than reasonable security safeguards.&lt;/p&gt;
&lt;p&gt;The &lt;b&gt;absence of a clear indication of security standards&lt;/b&gt; will affect data principals and fiduciaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Looking to bring more efficiency to governance systems, the Centre launched the Digital India Mission in 2015. The press release by the central government reporting the approval of the programme by the Cabinet of Ministers speaks of ‘cradle to grave’ digital identity as one of its vision areas.&lt;/p&gt;
&lt;p&gt;The ambitious Universal Health ID and health data management policies are an example of this digitisation mission.&lt;/p&gt;
&lt;blockquote&gt;However breaches like this are reminders that without proper data security measures, and a system for having a person responsible for data security, the data is always vulnerable to an attack.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;While the UK and Australia have also seen massive data breaches in the past, India is at the start of its health data digitisation journey and has the ability to set up strong security measures, employ experienced professionals, and establish legal resources to ensure that data breaches are minimised and swift action can be taken in case of a breach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The first step&lt;/b&gt; to understand the vulnerabilities would be to present the CERT-In reports of this breach, and guide other institutions to check for the same so that they are better prepared for future breaches and attacks.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/quint-shweta-mohandas-and-pallavi-bedi-june-19-2023-cowin-data-breach-health-sensitive-details-policies-solution'&gt;https://cis-india.org/internet-governance/blog/quint-shweta-mohandas-and-pallavi-bedi-june-19-2023-cowin-data-breach-health-sensitive-details-policies-solution&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas and Pallavi Bedi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2023-07-04T09:39:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-october-18-2012-surabhi-agarwal-courts-approval-needed-to-tap-phones">
    <title>Court’s approval needed to tap phones: Panel</title>
    <link>https://cis-india.org/news/livemint-october-18-2012-surabhi-agarwal-courts-approval-needed-to-tap-phones</link>
    <description>
        &lt;b&gt;Investigators can monitor a person for 15-20 days on executive orders in case of emergencies, suggests panel.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Surabhi Agarwal's article was published in &lt;a class="external-link" href="http://www.livemint.com/Politics/TKvdGjj2mMcp2FNgwIVLeP/Courts-approval-needed-to-tap-phones.html"&gt;LiveMint&lt;/a&gt; on October 18, 2012. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Government agencies need judicial permission before intercepting any communication or starting surveillance of any individual, a panel on the proposed privacy law suggested on Thursday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If there is any urgency, investigators can tap phones or monitor a person’s movements for 15-20 days on executive orders but will then have to approach the courts to continue, the committee led by retired Delhi high court judge &lt;a href="http://www.livemint.com/Search/Link/Keyword/Ajit%20P.%20Shah"&gt;Ajit P. Shah&lt;/a&gt; recommended.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Phone tapping under the present regime is done under executive permission whereas in other countries it is done only with the permission of the courts,” Shah said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Security agencies currently require permission from home secretaries, either at the Centre or the states, to set up wiretaps or monitor emails. An oversight group of the cabinet, law and telecom secretaries at the Centre reviews all such authorizations.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt; &lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/LntqxttkTuE" width="300"&gt;&lt;/iframe&gt; &lt;/th&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The government established the Shah committee in Feburary under the Planning Commission to study international best practices on privacy and surveillance after concerns arose on misuse of information collected by official agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shah said on Thursday that the committee was “not interested” in preparing a privacy law but has only laid down the principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The department of personnel and training will deliberate on the panel’s recommendations and then draft a legislation, said &lt;a href="http://www.livemint.com/Search/Link/Keyword/Ashwani%20Kumar"&gt;Ashwani Kumar&lt;/a&gt;, junior minister in the Planning Commission.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The Shah panel has recommended appointing privacy commissioners and a system under which organizations will have to develop privacy standards that will be approved by a commissioner as a means of self-regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sectoral industry associations would form a code of conduct for companies that will comply with law as they will be approved by the privacy commissioner, according to &lt;a href="http://www.livemint.com/Search/Link/Keyword/Kamlesh%20Bajaj"&gt;Kamlesh Bajaj&lt;/a&gt;, chief executive officer of Data Security Council of India, one of the members of the committee. “These associations could also act as alternative dispute-resolution mechanisms,” Bajaj said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The committee’s other recommendations include giving individuals a choice to provide personal information, collection of only critical personal information, use of data only for the purpose for which it has been collected, and a penalty for violations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Without a comprehensive horizontal regulatory framework and the office of the regulator both private and public entities in India have been trampling on the rights of citizens without complying to any of the international best practices when it comes to protecting the right to privacy,” said &lt;a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;, executive director of Centre for Internet and Society, a Bangalore-based advocacy group. After the privacy law is enacted and the office of a privacy commissioner is created, people will be able to seek redressal against these erring pubic and private entities if their rights are violated, he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has been looking to enact a privacy law to ensure data collected by various programmes such as the National Population Register, Unique Identification Authority of India and National Intelligence Grid was not misused. It was expected to scotch criticism of these programmes by privacy and Internet activists. It later expanded the scope of the proposed legislation after catching flak for a leak of tapped conversations between corporate lobbyist &lt;a href="http://www.livemint.com/Search/Link/Keyword/Niira%20Radia"&gt;Niira Radia&lt;/a&gt;, industrialists and journalists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government now aims to uphold the right of all Indians against any misuse of personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication. That means it effectively covers everything from the misuse of data collected by the government to spam.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there could be opposition from law enforcement agencies if the privacy law mandates that prior permission of the courts will be required before intercepting communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If judges begin taking a call on interception requests, there could be chances of leakage, “since there are so many judges at so many levels”, said &lt;a href="http://www.livemint.com/Search/Link/Keyword/Rumel%20Dahiya"&gt;Rumel Dahiya&lt;/a&gt;, deputy director general at Institute of Defence Studies and Analyses, a New delhi-based think tank. “The government carries out surveillance to gain fool-proof intelligence. That purpose will be defeated.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last week, Prime Minister &lt;a href="http://www.livemint.com/Search/Link/Keyword/Manmohan%20Singh"&gt;Manmohan Singh&lt;/a&gt; said a fine balance needs to be maintained between the right to information and the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Shah committee included representatives from the private sector, the department of information technology, ministry of home affairs, department of telecommunication, the law ministry and the department of personnel and training.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Kirthi V. Rao contributed to this story.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-october-18-2012-surabhi-agarwal-courts-approval-needed-to-tap-phones'&gt;https://cis-india.org/news/livemint-october-18-2012-surabhi-agarwal-courts-approval-needed-to-tap-phones&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-10-22T07:02:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/counter-proposal-by-cis-draft-it-intermediary-due-diligence-and-information-removal-rules-2012.pdf">
    <title>Counter-proposal by the Centre for Internet and Society: Draft Information Technology (Intermediary Due Diligence and Information Removal) Rules, 2012 </title>
    <link>https://cis-india.org/internet-governance/counter-proposal-by-cis-draft-it-intermediary-due-diligence-and-information-removal-rules-2012.pdf</link>
    <description>
        &lt;b&gt;Any restriction on freedom of speech should embody and be guided by the following principles, as identified by the UN Special Rapporteur on Freedom of Opinion and Expression&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/counter-proposal-by-cis-draft-it-intermediary-due-diligence-and-information-removal-rules-2012.pdf'&gt;https://cis-india.org/internet-governance/counter-proposal-by-cis-draft-it-intermediary-due-diligence-and-information-removal-rules-2012.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-04-24T11:48:49Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/counter-proposal-by-cis-draft-it-intermediary-due-diligence-and-information-removal-rules-2012.odt">
    <title>Counter-proposal by the Centre for Internet and Society: Draft Information Technology (Intermediary Due Diligence and Information Removal) Rules, 2012</title>
    <link>https://cis-india.org/internet-governance/counter-proposal-by-cis-draft-it-intermediary-due-diligence-and-information-removal-rules-2012.odt</link>
    <description>
        &lt;b&gt;Any restriction on freedom of speech should embody and be guided by the following principles, as identified by the UN Special Rapporteur on Freedom of Opinion and Expression.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/counter-proposal-by-cis-draft-it-intermediary-due-diligence-and-information-removal-rules-2012.odt'&gt;https://cis-india.org/internet-governance/counter-proposal-by-cis-draft-it-intermediary-due-diligence-and-information-removal-rules-2012.odt&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-04-24T11:56:49Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/counter-surveillance-panel-disco-tech-hackathon">
    <title>Counter Surveillance Panel: DiscoTech &amp; Hackathon</title>
    <link>https://cis-india.org/events/counter-surveillance-panel-disco-tech-hackathon</link>
    <description>
        &lt;b&gt;We invite you to a Counter Surveillance DiscoTech and Hackathon at the Centre for Internet and Society in Bangalore on Saturday, March 1, 2014 (9.00 a.m. to 5.00 p.m.). The event is being co-organized by the Centre for Internet and Society in tandem with the MIT Centre for Civic Media Co-Design Lab, with support from members of Tactical Technology Collective, Hackteria.org and Srishti School of Art Design and Technology. Registrations begin at 9.00 a.m. The event shall close with a featured talk by renown information activist and maker lab innovator Smari McCarthy, titled "Privacy for Humanity" at 5.00 p.m.&lt;/b&gt;
        &lt;h2&gt;Overview&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Mirroring the call by MIT Civic Media Lab &lt;a href="http://codesign.mit.edu/discotechs/"&gt;Co-Design Studio&lt;/a&gt;, this event brings together  students, technologists, designers and citizens to explore counter-surveillance strategies. The event will be held simultaneously across various locations including Boston, Palestine, Lisbon and Buenos Aires. Click here for the definition of &lt;a href="http://codesign.mit.edu/discotechs/"&gt;DiscoTech&lt;/a&gt;.(Discovering Technology)&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Agenda&lt;/h2&gt;
&lt;p class="Default" style="text-align: justify; "&gt;We shall begin with brief contextualized introductions catalyzed by researchers in the field of privacy &amp;amp; surveillance, followed by workshops and hackathons led by expert practitioners. Participants are welcome from diverse backgrounds looking to be involved in designing engaging and creative ways to counter surveillance. The event shall close with a featured talk by renown information activist and maker lab innovator &lt;a href="http://en.wikipedia.org/wiki/Sm%C3%A1ri_McCarthy"&gt;&lt;b&gt;Smari McCarthy&lt;/b&gt;&lt;/a&gt; , titled "&lt;b&gt;Privacy for Humanity&lt;/b&gt;" at 5.00 p.m.&lt;/p&gt;
&lt;h3 class="Default" style="text-align: justify; "&gt;Introductory Catalyst Sessions&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Malavika Jayaram&lt;/b&gt;: Fellow at &lt;a class="external-link" href="http://cyber.law.harvard.edu/people/mjayaram"&gt;Berkman Center for Internet and Society at Harvard University&lt;/a&gt; and the &lt;a class="external-link" href="http://www.cis-india.org/"&gt;Centre for Internet and Society, Bangalore&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Laird Brown&lt;/b&gt;: DesiSec Project at the &lt;a href="https://cis-india.org/" class="external-link"&gt;Centre for Internet and Society, Bangalore&lt;/a&gt; and University of Toronto&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Kaustubh Srikant&lt;/b&gt;: Head of Technology, &lt;a class="external-link" href="https://tacticaltech.org/kaustubh-srikanth-head-technology"&gt;Tactical Technology Collective&lt;/a&gt; and &lt;b&gt;Maya Indira Ganesh&lt;/b&gt; (Program Director)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Abhay Raj Naik&lt;/b&gt;: Assistant Professor,&lt;a class="external-link" href="http://www.azimpremjiuniversity.edu.in/abhayraj-naik"&gt; Azim Premji University&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Design and Hackathon Lead Catalysts&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://hackteria.org/?p=278"&gt;&lt;b&gt;Yashas&lt;/b&gt;&lt;/a&gt;&lt;a href="http://hackteria.org/?p=278"&gt;&lt;b&gt; &lt;/b&gt;&lt;/a&gt;&lt;a href="http://hackteria.org/?p=278"&gt;&lt;b&gt;Shetty&lt;/b&gt;&lt;/a&gt;:Faculty@ &lt;a href="http://www.srishti.ac.in/"&gt;www.srishti.ac.in&lt;/a&gt; and Co-Founder &lt;a href="http://www.hackteria.org/"&gt;Hackteria.org&lt;/a&gt; (DNA Spoofing, Surveillance Camera:  Avoidance, Microscopic Re-Appropriation &amp;amp; Bacterial Discotheque)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Hari Dilip Kumar&lt;/b&gt;: Co, Founder, &lt;a class="external-link" href="http://www.fluxgentech.com/people"&gt;FluxGen&lt;/a&gt;: (Introducing data transmission protocols, Software Defined Radio (SDR) design and surveillance detection )&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Sharath Chandra Ram&lt;/b&gt;: Researcher @ CIS &lt;a class="external-link" href="http://dorkbot.org/dorkbotbangalore/"&gt;Open Lab&lt;/a&gt; and Faculty@&lt;a class="external-link" href="http://www.srishti.ac.in/"&gt;Srishti&lt;/a&gt; (Civic Media solutions using open citizen networks and the web, spectrum scanning, visual communication design strategies, finger print mash-up publishing) &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Featured Talk and Interactive Closing Session by &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Sm%C3%A1ri_McCarthy"&gt;Smari McCarthy&lt;/a&gt;&lt;b&gt;&lt;a class="external-link" href="http://en.wikipedia.org/wiki/Sm%C3%A1ri_McCarthy"&gt; &lt;/a&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(Executive Director, International Modern Media Institute and Founder, Icelandic Pirate Party &amp;amp; Icelandic Digital Freedom Society)&lt;/b&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;b&gt;Title of Talk: PRIVACY for HUMANITY - 5.00 p.m.&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/counter-surveillance.pdf" class="internal-link"&gt; &lt;/a&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/counter-surveillance.pdf" class="internal-link"&gt;Click to download the flyer invite&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;Date: Saturday, March 1, 2014&lt;br /&gt;Time: 9.00 a.m. to 5.00 p.m. (Registration 9.00 a.m. sharp)&lt;br /&gt;Venue: Centre for Internet and Society, Bangalore&lt;br /&gt;Map : &lt;a href="http://bit.ly/1fcDDLG"&gt;http://&lt;/a&gt;&lt;a href="http://bit.ly/1fcDDLG"&gt;bit.ly&lt;/a&gt;&lt;a href="http://bit.ly/1fcDDLG"&gt;/1fcDDLG&lt;/a&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;a href="mailto:sharath@cis-india.org"&gt;&lt;br /&gt;&lt;/a&gt;&lt;i&gt;Please RSVP due to limited space and logistics for lunch and refreshments&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/counter-surveillance-panel-disco-tech-hackathon'&gt;https://cis-india.org/events/counter-surveillance-panel-disco-tech-hackathon&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-28T05:36:15Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/counter-comments-on-trais-consultation-paper-on-privacy-security-and-ownership-of-data-in-telecom-sector">
    <title>Counter Comments on TRAI's Consultation Paper on Privacy, Security and Ownership of Data in Telecom Sector</title>
    <link>https://cis-india.org/internet-governance/blog/counter-comments-on-trais-consultation-paper-on-privacy-security-and-ownership-of-data-in-telecom-sector</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) has commented on the Consultation Paper on Privacy, Security and Ownership of Data in Telecom Sector published by the Telecom Regulatory Authority of India on August 9, 2017.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The submission is divided in three main parts. The first part 'Preliminary' introduces the document. The second part 'About CIS' is an overview of the organization. The third part contains the 'Counter Comments' on the Consultation Paper taking into account the submission made by other stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Download the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/counter-comments.pdf"&gt;full submission here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/counter-comments-on-trais-consultation-paper-on-privacy-security-and-ownership-of-data-in-telecom-sector'&gt;https://cis-india.org/internet-governance/blog/counter-comments-on-trais-consultation-paper-on-privacy-security-and-ownership-of-data-in-telecom-sector&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-23T14:29:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/first-post-pallavi-polanki-oct-11-2012-could-better-dna-testing-facilities-in-india-have-saved-the-talwars">
    <title>Could better DNA testing facilities in India have saved the Talwars?</title>
    <link>https://cis-india.org/news/first-post-pallavi-polanki-oct-11-2012-could-better-dna-testing-facilities-in-india-have-saved-the-talwars</link>
    <description>
        &lt;b&gt;Over the last decade, the use of DNA tests to solve crimes has seen a significant rise in crime investigation in India. But forensic experts warn that the absence of standard practices, quality checks and regulation has resulted in irresponsible and inaccurate application of the technology.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Pallavi Polanki was originally published in FirstPost on October 11, 2012. CIS press statement is mentioned.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The use of outdated technology and lack of expertise to competently collect and analyse DNA samples from the crime scene has compromised investigation and  led to instances where courts have rejected DNA evidence as being unreliable or inconclusive.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Says GV Rao, DNA analyst and formerly chief staff scientist at the Hyderabad-based Centre For DNA Fingerprinting and Diagnostics (CDFD), “Today we are very much behind the rest of the World in upgradation of technology as required…Further, the backlog of cases is quite large in each of the DNA labs in India and not much is being done about it. Still we have not obtained or adopted the DNA techniques to identify difficult samples. The recent example of Bhanwari Devi case, where the CBI had to send the victim’s bones to FBI, USA for identification to get it identified. This is a sad reflection of the present status of DNA technology in India.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most recently, the demand for more advanced DNA tests to be conducted was unsuccessfully made by dentist couple Rajesh and Nupur Talwar, who have been charged with the murder of their teenage daughter Aarushi and domestic help Hemraj.&lt;br /&gt;&lt;br /&gt;Perhaps, no other case has so fully exposed the pathetic state of the crime-scene investigation in India. With most of the crucial evidence either destroyed or contaminated due to shoddy police work, the prosecution’s case has come to depend entirely on circumstantial evidence, without a shred of material evidence to support it.&lt;br /&gt;&lt;br /&gt;The police force’s lack of expertise to collect DNA evidence was flagged recently by senior scientist at the All India Institute of Medical Sciences (AIIMS) Anupama Raina at a public meeting by the Bangalore-based Centre for Internet and Society on the DNA profiling Bill, in the Capital.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Raina, speaking at the meeting, emphasized the usefulness of the technology but cautioned that the police were still perfecting the use of DNA samples for forensic purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.firstpost.com/india/dna-experts-could-also-be-guilty-of-giving-false-results-486289.html" target="_blank"&gt;Elaborating on the inadequate training to cops on collecting DNA evidence, &lt;/a&gt;Rao said, “In India, there are no special crime case investigators. We have a law and order police station for each area and from &lt;i&gt;bandobast&lt;/i&gt; duty to control crowds. It is a tall order expecting them to collect samples. In some states there are special teams which collect samples for DNA testing and then hand it over to the police….Till date none of the DNA labs have made any sample collection kits made available to police stations or other agencies.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And what after the samples reach the DNA labs?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Painting a rather bleak picture of existing conditions under which many of the DNA labs are operating, Rao says “There is lack of standards, guidelines, accreditation, proficiency testing of the DNA labs and its experts. Each DNA lab is issuing DNA reports in its own style. Each DNA lab is again following different procedures for conducting the test. ”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“No proper records of the tests conducted are being maintained for production in a court of law for its inspection. DNA experts are not being tested for their proficiency in their expertise by a third party and presently they are getting away with such minimal expertise,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Will the new draft DNA Profiling Bill fix the problems that beset the use of DNA evidence for forensic purposes in India? And what is the context to the draft DNA profiling bill?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“India currently does not have a legislation specifically regulating the collection, use, and storage of DNA samples for forensics purposes. To address this gap, in 2007 a draft DNA Profiling Bill was created by the Centre for DNA Fingerprinting and Diagnostics. In February 2012 a new draft of the bill from the department of biotechnology was been leaked. The draft Bill envisions creating state level DNA databases that will feed into a national level DNA database for the purposes of solving crime.” (Read the &lt;a href="https://cis-india.org/internet-governance/blog/public-meeting-on-dna-profiling-bill" target="_blank"&gt;full press statement by CIS here&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Raina endorsed the passing of the bill but with necessary safe-guards. The Bill has raised a degree of alarm for its sweeping proposals to collect DNA profiles and create DNA databases – a move experts believe violates the privacy of citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Helen Wallace, director of GeneWatch UK (a not-for-profit group that monitors developments in genetic technologies from a public interest perspective), who participated in the public meeting on the DNA profiling bill, underlined the absence of a clear purpose for the DNA profiling system as proposed by the bill and its lack of clarity on the collection policy that wishes to profile not just those involved in criminal cases but also civil cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jeremy Gruber, president and executive director of the US-based Council for Responsible Genetics, also warned against the bill’s blind faith in DNA results as the gospel truth and ignoring very real possibilities of false matches, cross-contamination and laboratory errors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Expressing his disappointment with the draft bill, Rao said, “Unfortunately this bill does not provide for standardization, quality control and regulation except for collection of DNA samples of everybody involved in all civil and criminal cases, including suspects… We need standards, protocols, guidelines, amendments to IPC and CrPC for effective implementation of DNA testing.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/first-post-pallavi-polanki-oct-11-2012-could-better-dna-testing-facilities-in-india-have-saved-the-talwars'&gt;https://cis-india.org/news/first-post-pallavi-polanki-oct-11-2012-could-better-dna-testing-facilities-in-india-have-saved-the-talwars&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-10-11T09:44:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/co-spying-on-competitors-staff">
    <title>Cos spying on competitors, staff: Study </title>
    <link>https://cis-india.org/news/co-spying-on-competitors-staff</link>
    <description>
        &lt;b&gt;Most companies are spying on their competitors and their own employees, according to a recent survey conducted by the Associated Chambers of Commerce and Industry of India (Assocham). &lt;/b&gt;
        
&lt;p&gt;The &lt;a class="external-link" href="http://www.thestatesman.net/index.php?option=com_content&amp;amp;view=article&amp;amp;id=413934:cos-spying-on-competitors-staff-study&amp;amp;catid=40:business&amp;amp;from_page=search"&gt;Statesman published this article&lt;/a&gt; on June 19, 2012. Sunil Abraham is quoted in it.&lt;/p&gt;
&lt;p&gt;The survey's results raise questions about whether employees have enough privacy in the workplace. Rubbishing the survey's findings, head of the Indian Council of Corporate Investigators, Mr Kunwar Vikram Singh, said businesses are not spying but verifying facts.&lt;/p&gt;
&lt;p&gt;The Assocham survey said almost 1,200 of 1,500 executives surveyed admitted to hiring people to spy on their employees and monitor their lifestyles. They said they watch former employees, too, especially those who had been laid off or kicked out for fraud.&lt;/p&gt;
&lt;p&gt;In the survey, which was done between January and May this year in Ahmedabad, Bangalore, Chennai, the Delhi-National Capital Region and Mumbai, about 900 top industry officials said they carry out corporate espionage, bug the offices of their rivals and plant moles in other companies. About a quarter of respondents said they have hired computer experts to hack networks and track e-mails of their rivals.&lt;/p&gt;
&lt;p&gt;Many more respondents — 1,110 of those questioned — said they use social media sites to track their rival companies and employees. “Most of the companies have mentioned their sensitive details including their data, plans, clients’ details, products and other confidential and trade-related secrets on their page and unknowingly share the same in the social media circuit,” said Mr DS Rawat, national secretary-general of Assocham, “which is why it is the most favoured spying activity being carried out by the companies.”&lt;/p&gt;
&lt;p&gt;The practice of companies pilfering trade secrets and ideas may be bad for the country's business environment, said Mr Rawat. It “might dampen the spirit of innovation in the long-run,” he said.&lt;/p&gt;
&lt;p&gt;The Indian Council of Corporate Investigators’ Mr Singh, however, disputed Assocham's picture of rampant corporate espionage. “I totally deny that corporates are spying on their employees,” he said. “It is not spying. It is verification of facts.”&lt;/p&gt;
&lt;p&gt;Mr Singh said that when companies look into their employees or other companies, for example, before they enter into joint ventures, they are just carrying out “due diligence”. He said they legally gather information needed for companies to survive. He also denied there were any privacy issues.&lt;/p&gt;
&lt;p&gt;Mr Sunil Abraham, executive director of the Centre for Internet and Society, though, said there are growing concerns about privacy in the workplace, including about intense video surveillance. “Managers started to object to this,” he said. “What they started saying was it really undermines the morale of these locations ... friends and relatives would ask, 'In spite of you being so educated, it's funny your companies don't trust you at all.'”&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Companies need to develop more nuanced ways to deal with these problems — perhaps something more similar to the military's multiple levels of clearance — and different ways for people to acquire and lose trust, Mr Abraham said.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Whether or not surveillance is legal, depends on the type, Mr Abraham said. There is some private information a person will expect to remain private, and some information that is expected to be public — like Twitter feeds.&lt;/p&gt;
&lt;p&gt;There is no law against monitoring this second type, known as “clear view surveillance”, he said, and blanket legislation could clash with freedom of expression. He said an ideal law for this should include a “proportional relation to power” clause, which would limit the legal ability of the powerful to monitor, but allow individual citizens more leeway.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/co-spying-on-competitors-staff'&gt;https://cis-india.org/news/co-spying-on-competitors-staff&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-06-20T08:46:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-statesman-rakesh-kumar-july-13-2015-corporate-push-modis-billion-digital-dream">
    <title>Corporate push to Modi’s Rs.4.5-billion digital dream</title>
    <link>https://cis-india.org/internet-governance/news/the-statesman-rakesh-kumar-july-13-2015-corporate-push-modis-billion-digital-dream</link>
    <description>
        &lt;b&gt;Prime Minister Narendra Modi’s Rs. 4.5-billion digital dream seems to find favour with the corporate world, which calls it a “very progressive step” and “massive tech push”.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Rakesh Kumar was &lt;a class="external-link" href="http://www.thestatesman.com/news/business/corporate-push-to-modi-s-rs-4-5-billion-digital-dream/75451.html"&gt;published in the Statesman on July 13, 2015&lt;/a&gt;. Sumandro Chattapadhyay was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Modi shared his dreams at the recent Digital India Week in the capital and the event saw big names from the business world—Reliance Industries Ltd chairman Mukesh Ambani, Tata group chairman Cyrus Mistry, Wipro Ltd chairman Azim Premji, among others—supporting the initiative.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Showing its faith in Modi’s dream, Reliance Industries is all set to invest over Rs.2.5 lakh crore in the initiative that would focus on cloud computing and mobile applications, empowering every citizen with access to digital services, knowledge and information. &lt;br /&gt;&lt;br /&gt;The initiative could boost the IT sector, which according to NASSCOM  witnesses a robust growth in 2015, with the calculated revenue for FY 2015 at $147 billion, and a growth of 13 per cent from the corresponding period 2014.&lt;br /&gt;&lt;br /&gt;“From an IT perspective, this is a sincere approach to problem solving with growth, realism and long-term transformation at the core,” said Manish Sharma, president, Consumer Electronics and Appliances Manufacturers Association (CEAMA) and managing director, Panasonic India, in an exclusive interview to thestatesman.com.&lt;br /&gt;&lt;br /&gt;“Empowering citizens with the use of IT, we believe Digital India is a massive tech push to provide electronic governance and universal phone connectivity across the country,” he added.&lt;br /&gt;&lt;br /&gt;CEAMA and Panasonic are willing to contribute to Digital India through technological expertise and commitment.&lt;br /&gt;&lt;br /&gt;The Indian information Technology (IT) industry is reportedly pegged at $118-billion and DS Rawat, secretary general, ASSOCHAM, feels the Digital India initiative could be a “game-changer”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commenting on PM’s pledge to bring Internet connectivity to all Indians, Rawat told thestatesman.com: “The initiative is possible, provided the implementation of the schemes is done in a mission mode.”&lt;br /&gt;&lt;br /&gt;“The business and industry will be the major beneficiary in terms of quality of governance, which is possible through digital initiative. Besides, the industry itself has to prepare to deal with new emerging business models such as e-commerce,” he added.&lt;br /&gt;&lt;br /&gt;Modi, at the Digital India launch, said that “e-governance will be quickly changed into m-governance, and ‘M’ does not mean Modi governance, it means mobile governance.”&lt;br /&gt;&lt;br /&gt;Both, big corporate houses and small players hailed the PM’s remark. &lt;br /&gt;&lt;br /&gt;“It is good initiative for the railway sector in terms of passenger amenities, online procurement and technological up gradation,” said Amit Goel of Aggarwal Engineers in an interview to thestatesman.com.&lt;br /&gt;&lt;br /&gt;The company is active in the railway sector.&lt;br /&gt;&lt;br /&gt;When asked how Digital India initiative would help small companies, Goel said: “It will help us in many ways. By adopting e-governance, small companies can check and bid for the online procurement and will be able to interact with the concerned department through digital technology.”&lt;br /&gt;&lt;br /&gt;Anil Valluri of NetApp India said: “Digital India is one of the most significant transformations the country will witness by eventually connecting over a billion people of India, with technology as its focal point.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When it comes to IT transformation, cyber security emerges as a vital issue.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;Sumandro Chattapadhyay, Research Director, The Centre for Internet and Society (CIS), described the issue of digital security as the key to the “operationalisation and sustainability of the Digital India initiative”. “We expect the government not only to build administrative structures for ensuring cyber-security of the information systems, but also enable legal frameworks for protecting citizens from unlawful and unforeseen abuses of their digital identities as well as their digital assets.” Having said that, he praised the PM’s move, saying it will bring together various existing and new initiatives for building “network infrastructures for expanded public access, electronic governance systems for effective delivery of services, under the national policy umbrella of 'Digital India’”.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Rajiv Kapur, managing director, Broadcom India, pointed out another benefit of the ubiquitous broadband sector, which according to a report, faces certain challenges such as low rural penetration, stagnant data usage over the years and limited broadband services.&lt;br /&gt;&lt;br /&gt;“It will help bring parity between the rural and urban India,” he said and added: “Today, we need solutions that allow the majority of rural Indian population to continue to stay at their homes, and not migrate to cities.”&lt;br /&gt;&lt;br /&gt;In a knowledge economy, the biggest difference that will make an impact is education.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Healthcare is another area where having connectivity can make big difference in quality of life," he said.&lt;br /&gt;&lt;br /&gt;“E-delivery of governance and services is important for the efficient use of government resources, and allows for collaborative, transparent and more efficient governance," the Broadcom managing director added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-statesman-rakesh-kumar-july-13-2015-corporate-push-modis-billion-digital-dream'&gt;https://cis-india.org/internet-governance/news/the-statesman-rakesh-kumar-july-13-2015-corporate-push-modis-billion-digital-dream&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-07-16T02:26:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/digital-identity/shruti-trikanand-and-amber-sinha-september-13-2019-core-concepts-processes">
    <title>Core Concepts and Processes</title>
    <link>https://cis-india.org/internet-governance/digital-identity/shruti-trikanand-and-amber-sinha-september-13-2019-core-concepts-processes</link>
    <description>
        &lt;b&gt;When we embarked on this research project, we began with the primary questions of what constitutes a digital identity system. In the last few years, with the rise in national digital identity projects, there has been significant academic and media attention to the idea, benefits and risks of a digital identity system.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;However, there have been relatively few attempts to critically look at what makes an identity system digital, and what are its defining elements and characteristics. Through a preliminary study of existing identity systems, we have arrived at these core set of concepts and processes that mark a digital identity system. In arriving at this list, we have relied upon and referred to the works by &lt;a href="http://www.chyp.com/wp-content/uploads/2016/07/Digital-Identity-Issue-Analysis-Report.pdf" target="_blank"&gt;Dave Birch et al&lt;/a&gt;, &lt;a href="http://documents.worldbank.org/curated/en/248371559325561562/pdf/ID4D-Practitioner-Guide-Draft-for-Consultation.pdf" target="_blank"&gt;World Bank’s ID4D initiative&lt;/a&gt;, &lt;a href="https://www.semanticscholar.org/paper/Becoming-Artifacts-Medieval-Seals%2C-Passports-and-of-Chango/42cf3a5a5a2db067327298e7d8c540c9691171d2" target="_blank"&gt;Mawaki Chango&lt;/a&gt;, &lt;a href="https://identitywoman.net/domains-of-identity/" target="_blank"&gt;Kaliya Young&lt;/a&gt; and &lt;a href="https://medium.com/@kezike/the-evolution-of-digital-identity-6c13aca128c0" target="_blank"&gt;Kayode Ezike&lt;/a&gt;.&lt;/p&gt;
&lt;p class="indent" style="text-align: justify; "&gt;By publishing this, we hope to arrive at a shared vocabulary to discuss and critically analyse digital identity systems, both within our team and in engagements with other stakeholders. This illustrated and interactive glossary can serve as an easy reference for anyone seeking an introduction to the core aspects of digital identity. Even though this is essentially a list of definitions with examples, it does not follow an alphabetical order like most glossaries, but the logical flow of concepts as they build upon each other in a working identity system. We have paid special emphasis to the core processes of &lt;a href="https://digitalid.design/core-concepts-processes.html#identification-diagram"&gt;Identification&lt;/a&gt; and &lt;a href="https://digitalid.design/core-concepts-processes.html#authentication-diagram"&gt;Authentication&lt;/a&gt;, elucidating them through diagrams.&lt;/p&gt;
&lt;p class="indent"&gt;&lt;a class="external-link" href="https://digitalid.design/core-concepts-processes.html"&gt;Click to read more&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Credentials:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Research by Shruti Trikanad and Amber Sinha &lt;/li&gt;
&lt;li&gt; Conceptualization by Pooja Saxena and Amber Sinha &lt;/li&gt;
&lt;li&gt;Illustrations by Akash Sheshadri and Pooja Saxena&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/digital-identity/shruti-trikanand-and-amber-sinha-september-13-2019-core-concepts-processes'&gt;https://cis-india.org/internet-governance/digital-identity/shruti-trikanand-and-amber-sinha-september-13-2019-core-concepts-processes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shruti Trikanand and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2019-10-17T16:06:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
