<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2526 to 2540.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/pallavi-bedi-and-shweta-mohandas-cis-comments-on-data-protection-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/akriti-bopanna-february-8-2019-comment-on-icann-draft-fy-20-operating-plan-and-budget"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-business-line-may-5-2013-cis-anniversary"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cii-digital-india-summit"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cii-conference-on-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-august-9-2013-moulishree-srivastava-anirban-sen-chinese-hackers-baiting-indian-govt-corporate-employees"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/www-firstpost-com-sep-6-2012-china-outranks-india-in-worlds-first-ever-web-index"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/chilling-effects-frozen-words"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-july-9-2018-69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/wsj-march-4-2013-dhanya-ann-thoppil-chidambaram-to-talk-budget-on-google-hangout"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cryptoparty-chennai"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/vivek-narayanan-and-r-sivaraman-the-hindu-september-18-2019-chennai-residents-rue-fuzzy-cctv-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/pallavi-bedi-and-shweta-mohandas-cis-comments-on-data-protection-bill">
    <title>CIS Comments and Recommendations on the Data Protection Bill, 2021</title>
    <link>https://cis-india.org/internet-governance/blog/pallavi-bedi-and-shweta-mohandas-cis-comments-on-data-protection-bill</link>
    <description>
        &lt;b&gt;This document is a revised version of the comments we provided on the 2019 Bill on 20 February 2020, with updates based on the amendments in the 2021 Bill.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;After nearly two years of deliberations and a few changes in its composition, the Joint Parliamentary Committee (JPC), on 17 December 2021, submitted its report on the Personal Data Protection Bill, 2019  (2019 Bill). The report also contains a new version of the law titled the Data Protection Bill, 2021 (2021 Bill). Although there were no major revisions from the previous version other than the inclusion of all data under the ambit of the bill, some provisions were amended.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This document is a revised version of the&lt;a href="https://cis-india.org/accessibility/blog/cis-comments-pdp-bill-2019"&gt; comments&lt;/a&gt; we provided on the 2019 Bill on 20 February 2020, with updates based on the amendments in the 2021 Bill. Through this document we aim to shed light on the issues that we highlighted in our previous comments that have not yet been addressed, along with additional comments on sections that have become more relevant since the pandemic began. In several instances our previous comments have either not been addressed or only partially been addressed; in such instances, we reiterate them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These general comments should be read in conjunction with our previous recommendations for the reader to get a comprehensive overview of what has changed from the previous version and what has remained the same. This document can also be read while referencing the new Data Protection Bill 2021 and the JPC’s report to understand some of the significant provisions of the bill.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;a href="https://cis-india.org/internet-governance/general-comments-data-protection-bill.pdf" class="internal-link"&gt;Read on to access the comments&lt;/a&gt; | &lt;/strong&gt;&lt;span&gt;Review and editing by Arindrajit Basu. Copy editing: The Clean Copy; Shared under Creative Commons Attribution 4.0 International license&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/pallavi-bedi-and-shweta-mohandas-cis-comments-on-data-protection-bill'&gt;https://cis-india.org/internet-governance/blog/pallavi-bedi-and-shweta-mohandas-cis-comments-on-data-protection-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pallavi Bedi and Shweta Mohandas</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2022-02-14T16:07:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/akriti-bopanna-february-8-2019-comment-on-icann-draft-fy-20-operating-plan-and-budget">
    <title>CIS Comment on ICANN's Draft FY20 Operating Plan and Budget </title>
    <link>https://cis-india.org/internet-governance/blog/akriti-bopanna-february-8-2019-comment-on-icann-draft-fy-20-operating-plan-and-budget</link>
    <description>
        &lt;b&gt;At the Centre for Internet and Society, we are grateful for the opportunity to provide our comments on the proposed draft of ICANN’s FY20 Operating Plan and Budget along with their Five-Year Operating Plan Update. As part of the public comment process, ICANN provided a list of documents which can be found here that included their highlights of the budget, the total draft budget for FY20, an operating plan segregated by portfolios, amongst others.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The following  are our comments on relevant aspects from the different documents:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are several significant undertakings which have not found adequate support in this budget, chief among them being the implementation of the ICANN Workstream 2 recommendations on Accountability. The budget accounts for any expenses that arise from WS2 as emanating from its contingency fund which is a mere 4%. Totalling more than 100 recommendations across 8 sub groups, execution of these would require significant expenditure. Ideally, this should have been budgeted for in the FY20 budget considering the final report was submitted in June, 2018 and conversations about its implementation have been carried out ever since. It is wondered if this is because the second Workstream does not have the effectuation of its recommendations in its mandate and hence it is easier for ICANN to be slow on it.&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; As a member of the community deeply interested in integrating human rights better in ICANN’s various processes, it is concerning to note the glacial pace of the approval of the aforementioned recommendations especially coupled with the lack of funds allocated to it. Further, there is 1 one person assigned to work on the WS2 implementation work which seems insufficient for the magnitude of work involved.&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A topical issue with ICANN currently is its tussle with the implementation of the General Data Protection Regulation (GDPR) and despite the prominence and extent of the legal burden involved, resources to complying with it have not been allocated. Again, it is within the umbrella of the contingency budget.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Cross Community Working Group on New gTLD Auction Proceeds is also, presently, developing recommendations on how to distribute the proceeds. It is unclear where these will be funded from since their work is funded by the core ICANN budget yet it is assumed that the recommendations will be funded by the auction proceeds. Almost 7 years after the new gTLD round was open, it is alarming that ICANN has not formulated a plan for the proceeds and are still debating the merits of the entity which would resolve this question, as recently as the last ICANN meeting in October, 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another important policy development process being undertaken right now is the Working Group who is reviewing the current new gTLD policies to improve the process by proposing changes or new policies. There are no resources in the FY20 budget to implement the changes that will arise from this but only those to support the Working Group activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lastly, the budgets lack information on how much each individual RIR contributes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Staff costs&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN’s internal costs on their personnel have been rising for years and slated to account for more than half their annual budget with an estimated 56% or $76.3 million in the next financial year. The community has been consistent in calling upon them to revise their staff costs with many questioning if the growth in staff is justified.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; There was criticism from all quarters such as the GNSO Council who stated that it is “&lt;i&gt;not convinced that the proposed budget funds the policy work it needs to do over the coming year”.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt;The excessive use of professional service consultants has come under fire too.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As pointed out in a mailing list, in comments on the FY19 budget, &lt;i&gt;every single constituency and stakeholder group&lt;/i&gt; remarked that personnel costs presented too high a burden on the budget. One of the suggestions presented by the NCSG was to relocate positions from from the LA headquarters to less expensive countries such as those in Asia. This can be seen from the high increase this budget of $200,000 in operational costs though no clear breakdown of that entails was given.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The view seems to be that ICANN repeatedly chooses to retain higher salaries while reducing funding for the community. This is even more of an issue since there employment remuneration scheme is opaque. In a DIDP I filed enquiring about the average salary across designations, gender, regions and the frequency of bonuses, the response was either to refer to their earlier documents which do not have concrete information or that the relevant documents were not in their possession.&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;ICANN Fellowship&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The budget of the fellowship has been reduced which is an important initiative to involve individuals in ICANN who cannot afford the cost of flying to the global ICANN meetings. The focus should be not only be on arriving at a suitable figure for the funding but also to ensure that people who either actively contribute or are likely to are supported as opposed to individuals who are already known in this circle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Again, our attempts at understanding the Fellowship selection were met with resistance from ICANN. In a DIDP filed regarding it with questions such as if anyone had received it more than the maximum limit of thrice and details on the selection criteria, no clarity was provided.&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Lobbying and Sponsorship&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At ICANN 63 in Barcelona, I enquired about ICANN’s sponsorship strategies and how the decision making is done with respect to which all events in each region to sponsor and for a comprehensive list of all sponsorship ICANN undertakes and receives. I was told such a document would be published soon but in the 4 months since then, none can be found. It is difficult to comment on the budget for such a team where there is not much information on the work it specifically carries out and the impact of such sponsoring activities. When questioned to someone on their team, I was told that it depends on the needs of each region and events that are significant in such regions. However without public accountability and transparency about these, sponsorship can be seen as a vague heading which could be better spent on community initiatives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Talking of Transparency, it has also been pointed out that the Information Transparency Initiative has 3 million dollars set aside for its activities in this budget. It sounds positive yet with no deliverables to show in the past 2 years, it is difficult to ascertain the value of the investment in this initiative.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lobbying activities do not find any mention in the budget and neither do the nature of sponsorship from other entities in terms of whether it is travel and accommodation of personnel or any other kind of institutional sponsorship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://cis-india.org/internet-governance/blog/icann-work-stream-2-recommendations-on-accountability&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.icann.org/en/system/files/files/proposed-opplan-fy20-17dec18-en.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://domainincite.com/22680-community-calls-on-icann-to-cut-staff-spending&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Ibid&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;https://cis-india.org/internet-governance/blog/didp-request-30-enquiry-about-the-employee-pay-structure-at-icann&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://cis-india.org/internet-governance/blog/didp-31-on-icanns-fellowship-program&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/akriti-bopanna-february-8-2019-comment-on-icann-draft-fy-20-operating-plan-and-budget'&gt;https://cis-india.org/internet-governance/blog/akriti-bopanna-february-8-2019-comment-on-icann-draft-fy-20-operating-plan-and-budget&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>akriti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-12T23:44:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-business-line-may-5-2013-cis-anniversary">
    <title>CIS anniversary</title>
    <link>https://cis-india.org/news/the-hindu-business-line-may-5-2013-cis-anniversary</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society will celebrate five years of its existence with an exhibition showcasing its works and accomplishments. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;This was published in &lt;a class="external-link" href="http://www.thehindubusinessline.com/news/cis-anniversary/article4686344.ece"&gt;Hindu Business Line&lt;/a&gt; on May 5, 2013&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The exhibition will be held concurrently at both Bangalore and Delhi offices from May 20 to 24, 2013, said a press release.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“To promote transparency, we're getting the general public to be our  auditors by throwing open our account books and contracts which show how  we have spent the Rs 8.3 crore received from our donors.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The exhibition will also see artists like Kiran Subbaiah, Tara Kelton,  Navin Thomas, Abhishek Hazra, among others exhibiting their works, as  well as lectures.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-business-line-may-5-2013-cis-anniversary'&gt;https://cis-india.org/news/the-hindu-business-line-may-5-2013-cis-anniversary&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2013-05-06T07:28:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy">
    <title>CIS and International Coalition Calls upon Governments to Protect Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) along with the International Coalition has called upon governments across the globe to protect privacy.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;On September 20 in Geneva, CIS joined a huge international coalition in calling upon countries across the globe, including India to assess whether national surveillance laws and activities are in line with their international human rights obligations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society has endorsed a set of international principles against unchecked surveillance. The 13 Principles set out for the first time an evaluative framework for assessing surveillance practices in the context of international human rights obligations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A group of civil society organizations officially presented the 13 Principles this past Friday in Geneva at a side event attended by Navi Pillay, the United Nations High Commissioner for Human Rights and the United Nations Special Rapporteur on Freedom of Expression and Opinion, Frank LaRue, during the 24th session of the Human Rights Council. The side event was hosted by the Permanent Missions of Austria, Germany, Liechtenstein, Norway, Switzerland and Hungary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Elonnai Hickok, Programme Manager at the Centre for Internet and Society has noted that "the 13 Principles are an important first step towards informing governments, corporates, and individuals across jurisdictions, including India, about needed safeguards for surveillance practices and related policies to ensure that they are necessary and proportionate."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Navi Pillay, the United Nations High Commissioner for Human Rights, speaking at the Human Rights Council stated in her opening statement on September 9:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"Laws and policies must be adopted to address the potential for dramatic intrusion on individuals’ privacy which have been made possible by modern communications technology."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Navi Pillay, the United Nations High Commissioner for Human Rights, speaking at the event, said that:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"technological advancements have been powerful tools for democracy by giving access to all to participate in society, but increasing use of data mining by intelligence agencies blurs lines between legitimate surveillance and arbitrary mass surveillance."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Frank La Rue, the United Nations Special Rapporteur on Freedom of Expression and Opinion &lt;a href="http://www.google.com/url?q=http%3A%2F%2Fwww.ohchr.org%2FDocuments%2FHRBodies%2FHRCouncil%2FRegularSession%2FSession23%2FA.HRC.23.40_EN.pdf&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNEwtpzwnl_1_j_UoSnoE048kX-LYA"&gt;made clear &lt;/a&gt;the case for a direct relationship between state surveillance, privacy and freedom of expression in this latest report to the Human Rights Council:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"The right to privacy is often understood as an essential requirement for the realization of the right to freedom of expression. Undue interference with individuals’ privacy can both directly and indirectly limit the free development and exchange of ideas. … An infringement upon one right can be both the cause and consequence of an infringement upon the other."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Speaking at the event, the UN Special Rapporteur remarked that:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"previously surveillance was carried out on targeted basis but the Internet has changed the context by providing the possibility for carrying out mass surveillance. This is the danger."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Representatives of the Centre for Internet and Society, &lt;a href="https://www.privacyinternational.org"&gt;Privacy International&lt;/a&gt;, the &lt;a href="https://eff.org"&gt;Electronic Frontier Foundation&lt;/a&gt;,&lt;a href="https://accessnow.org"&gt;Access&lt;/a&gt;,&lt;a href="http://www.hrw.org/"&gt;Human Rights Watch&lt;/a&gt;,&lt;a href="http://en.rsf.org/"&gt;Reporters Without Borders&lt;/a&gt;, &lt;a href="http://www.apc.org/"&gt;Association for Progressive Communications&lt;/a&gt;, and the&lt;a href="https://www.cdt.org/"&gt;Center&lt;/a&gt;&lt;a href="https://www.cdt.org/"&gt; for Democracy and Technology &lt;/a&gt;all are taking part in the event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Find out more about the Principles at &lt;a href="https://necessaryandproportionate.org"&gt;https://NecessaryandProportionate.org&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Contacts&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;NGOs currently in Geneva for the 24&lt;sup&gt;th&lt;/sup&gt; Human Rights Council:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Access&lt;/b&gt;&lt;br /&gt;Fabiola Carrion: &lt;a class="mail-link" href="mailto:fabiola@accessnow.org"&gt;fabiola@accessnow.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Association for Progressive Communication&lt;/b&gt;&lt;br /&gt;Shawna Finnegan: &lt;a href="mailto:shawna@apc.org"&gt;shawna@apc.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Center for Democracy and Technology&lt;/b&gt;&lt;br /&gt;Matthew Shears: &lt;a href="mailto:mshears@cdt.org"&gt;mshears@cdt.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Electronic Frontier Foundation&lt;/b&gt;&lt;br /&gt;Katitza Rodriguez:  &lt;a href="mailto:katitza@eff.org"&gt;katitza@eff.org&lt;/a&gt; - @txitua&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Human Rights Watch&lt;/b&gt;&lt;br /&gt;Cynthia Wong: &lt;a class="mail-link" href="mailto:wongc@hrw.org"&gt;wongc@hrw.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Privacy International&lt;/b&gt;&lt;br /&gt;Carly Nyst: &lt;a href="mailto:carly@privacy.org"&gt;carly@privacy.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reporters Without Borders&lt;/b&gt;&lt;br /&gt;Lucie Morillon: &lt;a href="mailto:lucie.morillon@rsf.org"&gt;lucie.morillon@rsf.org&lt;/a&gt;&lt;br /&gt;Hélène Sackstein: &lt;a href="mailto:helsack@gmail.com"&gt;helsack@gmail.com&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Signatories&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Argentina&lt;/b&gt;&lt;br /&gt;Ramiro Alvarez: &lt;a href="mailto:rugarte@adc.org.ar"&gt;rugarte@adc.org.ar&lt;/a&gt;&lt;br /&gt;Asociación por los Derechos Civiles&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Argentina&lt;/b&gt;&lt;br /&gt;Beatriz Busaniche&lt;b&gt;: &lt;/b&gt;&lt;a class="mail-link" href="mailto:bea@vialibre.org.ar"&gt;bea@vialibre.org.ar&lt;/a&gt;&lt;br /&gt;Fundación Via Libre&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Colombia&lt;/b&gt;&lt;br /&gt;Carolina Botero: &lt;a class="mail-link" href="mailto:carobotero@gmail.com"&gt;carobotero@gmail.com&lt;/a&gt;&lt;br /&gt;Fundación Karisma&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Egypt&lt;/b&gt;&lt;br /&gt;Ahmed Ezzat: &lt;a href="mailto:ahmed.ezzat@afteegypt.org"&gt;ahmed.ezzat@afteegypt.org&lt;/a&gt;&lt;br /&gt;Afteegypt&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Honduras&lt;/b&gt;&lt;br /&gt;Hedme Sierra-Castro: &lt;a href="mailto:hedme.sc@gmail.com"&gt;hedme.sc@gmail.com&lt;/a&gt;&lt;br /&gt;ACI-Participa&lt;/p&gt;
&lt;p&gt;&lt;b&gt;India&lt;/b&gt;&lt;br /&gt;Elonnai Hickok: &lt;a href="mailto:elonnai@cis-india.org"&gt;elonnai@cis-india.org&lt;/a&gt;&lt;br /&gt;Center for Internet and Society&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Korea&lt;/b&gt;&lt;br /&gt;Prof. Park:  &lt;a href="mailto:kyungsinpark@korea.ac.kr"&gt;kyungsinpark@korea.ac.kr&lt;/a&gt;&lt;br /&gt;Open Net Korea&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Macedonia&lt;/b&gt;&lt;br /&gt;Bardhyl Jashari: &lt;a href="mailto:info@metamorphosis.org.mk"&gt;info@metamorphosis.org.mk&lt;/a&gt;&lt;br /&gt;Metamorphosis Foundation for Internet and Society&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mauritania, Senegal, Tanzania&lt;/b&gt;&lt;br /&gt;Abadacar Diop: &lt;a href="mailto:jonction_jonction@yahoo.fr"&gt;jonction_jonction@yahoo.fr&lt;/a&gt;&lt;br /&gt;Jonction&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Portugal&lt;/b&gt;&lt;br /&gt;Andreia Martins&lt;b&gt;: &lt;/b&gt;&lt;a class="mail-link" href="mailto:andreia@coolpolitics.pt"&gt;andreia@coolpolitics.pt&lt;/a&gt;&lt;br /&gt;ASSOCIAÇÃO COOLPOLITICS&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Peru&lt;/b&gt;&lt;br /&gt;Miguel Morachimo: &lt;a href="mailto:morachimo@gmail.com"&gt;morachimo@gmail.com&lt;/a&gt;&lt;br /&gt;Hiperderecho&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Russia&lt;/b&gt;&lt;br /&gt;Andrei Soldatov: &lt;a href="mailto:soldatov@agentura.ru"&gt;soldatov@agentura.ru&lt;/a&gt;&lt;br /&gt;Agentura.ru&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Serbia&lt;/b&gt;&lt;br /&gt;Djordje Krivokapic: &lt;a href="mailto:krivokapic@gmail.com"&gt;krivokapic@gmail.com&lt;/a&gt;&lt;br /&gt;SHARE Foundation&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Western Balkans&lt;/b&gt;&lt;br /&gt;Valentina Pellizer: &lt;a href="mailto:valentina.pellizzer@oneworldsee.org"&gt;valentina.pellizzer@oneworldsee.org&lt;/a&gt;&lt;br /&gt;Oneworldsee&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Brasil&lt;/b&gt;&lt;br /&gt;Marcelo Saldanha: &lt;a href="mailto:instituto@bemestarbrasil.org.br"&gt;instituto@bemestarbrasil.org.br&lt;/a&gt;&lt;br /&gt;IBEBrasil&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy'&gt;https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-25T07:21:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cii-digital-india-summit">
    <title>CII Digital India Summit</title>
    <link>https://cis-india.org/internet-governance/news/cii-digital-india-summit</link>
    <description>
        &lt;b&gt;The Digital India Summit was organized at the Taj Mahal Hotel and Pragati Maidan in New Delhi on April 21 and 24, 2015. Pranesh Prakash participated in it.&lt;/b&gt;
        &lt;p align="center"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt; &lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Day 1 - 21 April 2015: Taj Mahal Hotel, New Delhi&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;&lt;i&gt;&lt;span style="text-decoration: underline;"&gt;Programme &lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;0900 - 1000 hrs&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;i&gt;Registration&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;1000 - 1030 hrs&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;Inaugural Session&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;1000 - 1015 hrs&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Opening Remarks&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Mr Kiran Karnik&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Chairman&lt;/p&gt;
&lt;p&gt;CII National Mission on Digital India&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;1015 - 1030 hrs&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Setting the Context, Goals&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Mr Bhaskar Pramanik&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Chairman&lt;/p&gt;
&lt;p&gt;CII National Committee on IT &amp;amp; ITes &amp;amp; Chairman&lt;/p&gt;
&lt;p&gt;Microsoft India Private Limited&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;1030 - 1100 hrs&lt;/i&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;i&gt;Tea Break&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;1100 - 1315 hrs&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Breakout Sessions&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Group 1&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1100 - 1315 hrs&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;Tackling Structural Issues and Developing Business Models for Digital India&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Moderated by&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Mr Sanjeev Gupta, &lt;/b&gt; Joint Secretary - IT, Department of Agriculture &amp;amp; Cooperation, Ministry of Agriculture &lt;/li&gt;
&lt;li&gt; &lt;b&gt;Mr Kiran Karnik, &lt;/b&gt; Chairman, CII National Mission on Digital India &lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="3"&gt;
&lt;p&gt;According to a DeitY estimate INR 100,000 cr. is needed just for funding the existing schemes. The achievement of the vision will need 					finance, expertise &amp;amp; intent from the private as well as the government. Given the different credo &amp;amp; objective for each sector, the 					need will be to build effective, collaborative &amp;amp; sustainable business models which provide a return on their investment while 					harnessing their strengths. Some of the key questions which will need to be answered are :&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;· What is the role of public-private partnerships towards overcoming each of these five challenges?&lt;/p&gt;
&lt;p&gt;· How can we coordinate multi-stakeholder discussions and stimulate a collaborative approach towards shared goals of Digital India?&lt;/p&gt;
&lt;p&gt;· What are the sustainable business models that guarantee significant commercial (business feasibility) and social returns (such as 					inclusive growth, rural skill-building and employment generation)?&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Group 2&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1100 - 1315 hrs&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt; Overcoming India's Last Mile Challenge-Creating Access through Network Reach, Innovative Business Models and Affordable Data-Enabled 						Devices/Internet plans &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Moderated by&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Ms Aruna Sundararajan, &lt;/b&gt; Additional Secretary &amp;amp; Administrator (USOF) and Chairman-cum- Managing Director, BBNL&lt;b&gt; &lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="3"&gt;
&lt;p&gt;Given India's size &amp;amp; demographics providing digital reach to the people at the right price is one of the most piquant issues that we 					face. Bringing every citizen on the digital backbone will increase empowerment &amp;amp; inclusion. Reaching out to the 2.5 lakh villages as 					envisaged in the plan will require intent, innovation &amp;amp; investment. Some of the questions that we need to discuss are:&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;· What are the roadblocks in increasing internet penetration in India?&lt;/p&gt;
&lt;p&gt;· What are the alternate technologies that may be used to offer cost-effective internet in rural areas?&lt;/p&gt;
&lt;p&gt;· What are the regulatory changes that need to be in place?&lt;/p&gt;
&lt;p&gt;· What are the prerequisites for creating practical business models?&lt;/p&gt;
&lt;p&gt;· How do we stimulate internet usage through affordable service delivery in rural India?&lt;/p&gt;
&lt;p&gt;· What can the government do to encourage such business models?&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Group 3 &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1100 - 1315 hrs&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;Developing a Digital Workforce -&lt;/b&gt; &lt;b&gt;Empowering the Current and Future Workforce through Digital Literacy&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Moderated by&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Mr Pramod Bhasin, &lt;/b&gt; Non-Executive Vice Chairman and former President and CEO, Genpact &lt;/li&gt;
&lt;li&gt; &lt;b&gt;Mr Atul Bhatnagar&lt;/b&gt; , Chief Operating officer, National Skill Development Corporation* &lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="3"&gt;
&lt;p&gt;India's success in the technology sector has been based on our strength in skilled workforce. There are significant challenges in creating 					similar program to help build out the Made in India campaign in the manufacturing sector. The key questions are:&lt;/p&gt;
&lt;p&gt;· How should we define Digital Literacy? What does this mean and how much is still left to be done. What should we target to achieve 					over the next 3, 5 and 10 years? 					&lt;br /&gt; &lt;br /&gt;&lt;/p&gt;
&lt;p&gt;· What are the most effective measures Govt can take to enhance digital literacy and what kind of PPPs can we build to really take 					this to a completely different level? What are the biggest roadblocks to achieving digital literacy and how do we overcome these? 					&lt;br /&gt; &lt;br /&gt;&lt;/p&gt;
&lt;p&gt;· What is the role schools, colleges and vocational institutions, skills training providers can play in this area? How can that role 					be made much more effective and impact many more people? 					&lt;br /&gt; &lt;br /&gt;&lt;/p&gt;
&lt;p&gt;· How can digital literacy empower the unorganised sectors and entrepreneurship across India--in areas that are not touched by it 					normally--agriculture, farmers, construction, etc? How can this help bring a real revolution to these sectors which represent the majority 					of the work force? 					&lt;br /&gt; &lt;br /&gt;&lt;/p&gt;
&lt;p&gt;· How can digital literacy help create employability and access to jobs? How can it empower women and the hard to reach communities 					across India and bring them into the mainframe? 					&lt;br /&gt; &lt;br /&gt;&lt;/p&gt;
&lt;p&gt;· How can we use Digital literacy to substantially improve Governance and Transparency specially in public services and delivery of 					these across the population?&lt;/p&gt;
&lt;p&gt;· How can we use digital literacy to solve substantive problems such as Healthcare, Swatch Bharat, Build Smart Cities, increase 					Employability.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Group 4 &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1100 - 1315 hrs&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;Delivering Critical Services through a Universal, Verifiable Digital Identity&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Moderated by&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Mr Rajesh Bansal&lt;/b&gt; , Assistant Director General, UIDAI &lt;/li&gt;
&lt;li&gt; &lt;b&gt;Mr Bhaskar Pramanik, &lt;/b&gt; Chairman, CII National Committee on IT and ITes and Chairman, Microsoft &lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="3"&gt;
&lt;p&gt;The UID is already the largest program of its kind in the world. The real benefits will accrue when we build on this program to create add 					on programs which will harness what has been created and co-ordinate with financial, telecom &amp;amp; regulatory entities to create a 					collaborative model around direct benefit transfer and universal banking. Some of the key points that need to be discussed are:&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;· What are the top 3 high-impact applications that would leverage the UID platform to offer critical services?&lt;/p&gt;
&lt;p&gt;· How can the govt. foster public and private sector innovation, and entrepreneurial creativity to foster UID-linked application to 					access services?&lt;/p&gt;
&lt;p&gt;· What is the potential for cross-sector collaboration and new business opportunities? For example, leveraging UID for enabling direct 					subsidies would require an effective partnership between financial services and energy sectors. What other avenues are worth exploring?&lt;/p&gt;
&lt;p&gt;· What is the action plan for different stakeholders and enablers?&lt;/p&gt;
&lt;p&gt;o Government and regulators&lt;/p&gt;
&lt;p&gt;o Corporates and institutions&lt;/p&gt;
&lt;p&gt;o Financial ecosystem partners&lt;/p&gt;
&lt;p&gt;o Telecom and IT companies&lt;/p&gt;
&lt;p&gt;o Individuals&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;1315 - 1415 hrs&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;i&gt;Networking Lunch&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;1415 - 1435 hrs&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;Report back by Group 1&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;1435 - 1455 hrs&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;Report back by Group 2&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;1455 - 1515 hrs&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;Report back by Group 3&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;1515 - 1535 hrs&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;Report back by Group 4&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;1535 - 1550 hrs&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;i&gt;Tea/ Coffee Break&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;1550 - 1700 hrs&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Summing up and finalization of recommendation of each group by Mr Kiran Karnik&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Day 2 - 24 April 2015: Hall No. 14, Pragati Maidan, New Delhi&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;1100 hrs&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Inauguration of Digital Pavilion by Mr Ravi Shankar Prasad, Minister for Communications &amp;amp; Information Technology.&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;1130 - 1300 hrs &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Panel Discussion on "Accelerating the Digital transition"&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;The Panel Discussion will focus on the imperatives required to ensure digitization across the value chain and what stakeholders must do to 					ensure that digitization supports sustainable growth.&lt;/p&gt;
&lt;p&gt;Outcomes from the discussions on Day 1 will be presented by each of the Session Chair to Hon'ble Minister&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt; &lt;i&gt; "Release of the CII Compendium on cross company best practices / success stories on Digital India by Mr Ravi Shankar Prasad, 							Hon'ble Minister of Communications and Information Technology" &lt;/i&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="center"&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cii-digital-india-summit'&gt;https://cis-india.org/internet-governance/news/cii-digital-india-summit&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-05-02T03:56:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cii-conference-on-act">
    <title>CII Conference on "ACT": Achieve Cyber Security Together"</title>
    <link>https://cis-india.org/internet-governance/blog/cii-conference-on-act</link>
    <description>
        &lt;b&gt;The Confederation of Indian Industries (CII) organized a conference on facing cyber threats and challenges at Hotel Hilton in Chennai on July 13, 2013. Kovey Coles attended this conference and shares a summary of the event in this blog post.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The conference hosted by CII in the Hotel Hilton, was well attended, and featured a range of industry experts, researches and developers, and members of the Indian armed forces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participants focused on the importance of Indian entities reaching new, adequate levels of cyber security. It was stated early in the event that India is one of the world's most targeted areas for cyber-attacks, and its number of domestic internet users is known to be rapidly increasing in an age which many view as a new era of international information warfare. Despite this, the speakers considered India to be too far behind other countries in its understanding of cyber security. In the opening remarks, CII Chairman Santhanam implored "We need hard core techies in this field… we are not producing them." Another speaker, Savitha Kesav Jagadeesan, a practicing lawyer in Chennai, asked if India would wait until the "9/11 of cyberspace" occurrence before we establish the same level of precautionary measures online as it exists now in transportation security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the presence of both the government’s executive forces and the private industries, the aura circulating the conference room was that of a collective Indian defense, a secure nation only achieved through both secure governmental and industrial aspects. Similar to the previous day’s DSCI cyber security conference, many speakers discussed security issues pertinent to the financial and banking industries, and other cyber crimes which had pecuniary goals. For people seeking to avoid the array of scams and frauds online, some talks shared some of the most basic advice, like safe password practices. "Passwords are like toothbrushes," said A.S. Murthy of the CDAC, "use them often, never share them with anyone, change them often." Other talks went into the intricacies of various hacking schemes, including tab-nabbing and Designated Denial of Service (DDoS) attacks, describing their tactics and how to moderate them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the end, the conference had certainly informed the attendees of the goals, and the challenges, that India will face in the coming months and years. The speakers (all of them) showed how the world of cyber security was quickly evolving, and demonstrated the imperative in government and industry entities evolving their own practices and defenses in stride. The ambitions of several presentations matched the well-publicized "5 lakh cyber professionals in 5 years" plan, placing a strong emphasis in the current and future training of young students in cyber security. Ultimately, I think, the conference helped convince that cyber security is neither a futile, nor completely infallible concept. As CISCO Vice President Col. K.P.M. Das said towards the end of the evening, the most ideal form of cyber security is truly "all about trust, the ability to recover, and transparency/visibility."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cii-conference-on-act'&gt;https://cis-india.org/internet-governance/blog/cii-conference-on-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>kovey</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-26T08:17:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack">
    <title>Chinese state media says U.S. should take some blame for cyber attack</title>
    <link>https://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack</link>
    <description>
        &lt;b&gt;"WannaCry is far and away the most severe malware attack so far in 2017, and the spread of this troubling ransomware is far from over". Since the global attack was launched on Friday, several thousand more computers were discovered to be infected, particularly in Asia as the work day began on Monday. "We've seen that the slowdown of the infection rate over Friday night, after a temporary fix around it, has now been overcome by a second variation the criminals have released".&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Ellis Neal was published in the &lt;a class="external-link" href="http://thevillagessuntimes.com/2017/05/21/chinese-state-media-says-u-s-should-take-some-blame-for/"&gt;Villages Suntimes&lt;/a&gt; on May 21, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Microsoft called the incident a "wake-up" call for governments and customers to take security seriously, but in a letter to the Times Sir David Omand, GCHQ director from 1996 to 1997, pins the blame squarely on the technology firm for failing to maintain support for its ageing Windows XP platform. If they wanted their files decrypted, the program said all they had to do was pay $300 worth of Bitcoin to the specified address.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, a cyber security expert working with the Centre for Internet  and Society, Udbhav Tiwari working on vulnerabilities such as these,  said as most ATMs in the country especially of the public-sector banks  run on outdated operating systems, or are not updated regularly, they  can be easily compromised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When Microsoft sells its operating  system software it does so through a licence agreement that states the  company is not liable for any security breaches, thus shielding it from  any legal complaints, &lt;a href="https://securelist.com/blog/incidents/78351/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/" target="_blank"&gt;points out&lt;/a&gt; Michael Scott, a professor at Southwestern Law School.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Microsoft  has blamed the U.S. government for creating the software code that was  used by hackers to launch the cyber-attacks. USA and European officials  did not rule out North Korea as a possible suspect in the cyberattack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://blogs.microsoft.com/on-the-issues/2017/05/14/need-urgent-collective-action-keep-people-safe-online-lessons-last-weeks-cyberattack/"&gt;In a blog post&lt;/a&gt;,  Microsoft admonished governments around the world for keeping software  vulnerabilities to themselves, instead of reporting them to the  developers. EternalBlue and DoublePulsar, two tools the NSA used to  infiltrate computer networks, were stolen from the agency and &lt;a href="https://techcrunch.com/2017/04/14/the-shadow-brokers-april-exploits-swift-windows/"&gt;leaked online in April as part of a massive data dump by the Shadow Brokers hacker group&lt;/a&gt;. An investigation is on-going regarding how the codes got out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  cyber experts have warned of a huge risk in near future as most  institutions and individuals in Bangladesh use pirated software. We can  not expect criminal hackers to be held accountable for their actions,  but we should hold our government agencies accountable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since  China and Russian Federation are two of the countries where a major  share of computers are running pirated Windows, these are also the  countries with the biggest rate of &lt;b&gt;WannaCry&lt;/b&gt; infections, as stated by F-Secure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Malware  cases have been spreading in recent years as the malicious software  trend has been gaining ground, with new forms of ransomware hitting the  scene.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack'&gt;https://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T01:12:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-august-9-2013-moulishree-srivastava-anirban-sen-chinese-hackers-baiting-indian-govt-corporate-employees">
    <title>Chinese hackers baiting Indian govt, corporate employees: report</title>
    <link>https://cis-india.org/news/livemint-august-9-2013-moulishree-srivastava-anirban-sen-chinese-hackers-baiting-indian-govt-corporate-employees</link>
    <description>
        &lt;b&gt;Hackers using fake subject headings to get users to open virus-laden email attachments.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Moulishree Srivastava and Anirban Sen was &lt;a class="external-link" href="http://www.livemint.com/Politics/NILcUWKLyogvHPit5kIrgP/Chinese-hackers-baiting-Indian-govt-corporate-employees-re.html"&gt;published in Livemint on August 9, 2013&lt;/a&gt;. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Using faked subject headings as diverse as Gujarat chief minister &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Narendra%20Modi"&gt;Narendra Modi&lt;/a&gt;&lt;/span&gt; and the Jallianwala Bagh Massacre, Chinese hackers have been baiting  Indian government officials and corporate employees to open virus-laden  emailed attachments and expose themselves to the risk of cyber attacks, a  new report says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report on “advanced persistent cyber attacks” is based on an investigation conducted by security research firm &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Research%20Bundle"&gt;Research Bundle&lt;/a&gt;&lt;/span&gt; in collaboration with CERT-ISAC. ISAC is a certification body for  information technology (IT) security professionals that handles India’s  National Security Database (NSD). CERT (Computer Emergency Response  Team)-ISAC deals with mobile and electronic security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Some time back, there were a couple of high-profile  cyber attacks that came to our notice when we were approached by  corporates as well as government entities to look into them,” said  Rajshekhar Murthy, director at CERT-ISAC, NSD, at the report’s release  on Friday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“First we thought it might be just these few incidents,  but as we went deeper into it, it came to light that these threats were  far more (widely) spread than we had initially perceived. During the  course of our research, we got proof that the threats originated from  China,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;NSD, managed by ISAC and the government, is a programme  that provides certification to IT professionals who have capability to  protect critical infrastructure and the economy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Chinese hackers have been persistent in their attacks.  According to our analysis, they have also made a separate wing for these  operations,” Murthy said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report says, “It’s also a known fact the Indian  government and other important sectors from India were heavily targeted  during this campaign...focused on stealing confidential documents and  sensitive information.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The threat came in the form of emails with attached  documents targeting government and corporate entities. “These documents  exploited previously known vulnerabilities to drop ‘Travnet’ malware on  to the systems,” said the report, prepared by 20 Internet security  professionals over a period of six months.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“These emails showed that China has been gathering  information about India and keeping up with current issues, and using  those to entice people to open the attachments,” Murthy said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the attachments had names such as Army Cyber  Security Policy 2013.doc, Jallianwala bagh massacre - a deeply shameful  act.doc, Report - Asia Defense Spending Boom.doc, His Holiness the Dalai  Lama’s visit to Switzerland day 3.doc, and BJP won’t dump Modi for  Nitish NDA headed for split.doc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The malware Travnet was specifically designed to search  for “doc, docx, xls, xlsx, txt, rtf and pdf” files on the hacked  computer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This provides enough hints that this malware was  designed to steal confidential information, unlike the usual botnet  variants that focus primarily on providing remote access to the system,”  the report said. “The malware initially collects system information, a  list of files on the victim machine among others, then sends this data  to the remote Command &amp;amp; Control server...”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to industry estimates, losses due to cyber theft from reported attacks alone amount to $8-10 billion (&lt;span&gt;&lt;span class="WebRupee"&gt;Rs.&lt;/span&gt;&lt;/span&gt;48,800-61,000 crore). But experts say the figure could be much higher as many threats go unreported.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Worryingly, the security infrastructure of Indian  government websites has reportedly failed to keep pace with cyber  attackers, who are becoming more focused on stealing information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Many of the servers that host ‘gov.in’ sites are running  outdated software versions, with poorly managed Web servers that do not  follow even the most basic Web application security guidelines,” said  the report. “Even important government sites, access to which can lead  to much deeper intrusion, seem to be managed with little care. While  defacements are usually carried out by hackers just for fun or fame,  serious hackers can cause much more damage and remain unnoticed for a  very long time...”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Slowly but steadily, serious APT (advanced, persistent  attacks) campaigns are on the rise,” the report added. “It’s very  important for the nation to start upgrading its IT infrastructure to  keep up with the latest security guidelines and practices.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Cyber security has become one of the crucial areas for  us and we are focusing on putting capacity and capability in place to  strengthen the cyber security infrastructure,” said Alok Vijayant,  director of the National Technical Research Organisation. “We want to  bring IT security professionals under one entity to enhance our existing  capability instead of just focusing on putting in additional security  infrastructure.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“India has one of the largest talent pools of IT  professionals, but our biggest concern remains the young talent in IT,  as most professionals prefer to go abroad to work,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the use of proprietary rather than  open-source software increases the vulnerability of Indian entities,  according to &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;&lt;/span&gt;, executive director of Bangalore-based research organization Centre for Internet and Society. “There’s a lack of use of &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Linux"&gt;Linux&lt;/a&gt;&lt;/span&gt; and other kinds of free software at both the desktop level and also the front end... They’re using &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Microsoft"&gt;Microsoft&lt;/a&gt;&lt;/span&gt; both at the server end and on the client end. Most of these attacks  take advantage of that operating system dependency. If one were to look  at it at a macro level, we’re vulnerable across the board—vulnerable to  the US, we’re vulnerable to attackers from Europe, Pakistan, etc.,”  Abraham said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-august-9-2013-moulishree-srivastava-anirban-sen-chinese-hackers-baiting-indian-govt-corporate-employees'&gt;https://cis-india.org/news/livemint-august-9-2013-moulishree-srivastava-anirban-sen-chinese-hackers-baiting-indian-govt-corporate-employees&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-05T10:31:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/www-firstpost-com-sep-6-2012-china-outranks-india-in-worlds-first-ever-web-index">
    <title>China outranks India in world’s first ever web index</title>
    <link>https://cis-india.org/news/www-firstpost-com-sep-6-2012-china-outranks-india-in-worlds-first-ever-web-index</link>
    <description>
        &lt;b&gt;India has been ranked 33rd on a list of 61 countries in a brand new web index that seeks to measure how effectively countries are using the Internet to improve people’s lives. And Indian Internet activists say that given the increasing level of control the government seeks to exercise over the net, that is no great surprise.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.firstpost.com/tech/china-outranks-india-in-worlds-first-ever-web-index-446123.html"&gt;published&lt;/a&gt; in FirstPost on September 6, 2012. Nishant Shah is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The index, which has been compiled by Tim Berners-Lee, the inventor of the World wide web, measures the economic, social and political impact of the internet, on criteria ranging from the proportion of people online to the amount of useful content available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sweden has topped the list ahead of the US and UK, while amongst Asian countries, the Republic of Korea came in at 13th. Interestingly, China ranked 20, 13 places ahead of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speaking to Firstpost about the index and India’s ranking, Nishant Shah of the Centre for Internet and Society said that given the increasingly disturbing nature of the government’s response to the Internet in India, it was no surprise that the country had not fared well on the index.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The Internet today doesn’t work according to the idealistic principles of openness, and democracy of information that Berners-Lee envisioned for it, and in India in particular, although the Internet has helped us rethink what the government can do, the attitude is that that Internet can only be used in ways that the government sees fit”, said Shah&lt;br /&gt;&lt;br /&gt;The methodology of the ranking has rated countries on the basis of three parameters:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Web Readiness&lt;/b&gt;: The quality and extent of Communications Infrastructure (facilitating connectivity to the Web) and Institutional Infrastructure (policies regulating Web access and skill and educational levels enabling the full benefit of the Web).&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Web Use&lt;/b&gt;: The Index looks both at Web usage within countries (such as the percentage of individuals who use the Internet) and the content available to these Web users.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;The Impact of the Web&lt;/b&gt;: The Index uses social, economic and political indicators to evaluate the impact of the Web on these dimensions. This includes measures of social networks, business internet use and e-participation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/www-firstpost-com-sep-6-2012-china-outranks-india-in-worlds-first-ever-web-index'&gt;https://cis-india.org/news/www-firstpost-com-sep-6-2012-china-outranks-india-in-worlds-first-ever-web-index&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-09-07T09:08:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/chilling-effects-frozen-words">
    <title>Chilling Effects and Frozen Words</title>
    <link>https://cis-india.org/internet-governance/chilling-effects-frozen-words</link>
    <description>
        &lt;b&gt;What if the real danger is not that we lose our freedom of speech and expression but our sense of humour as a nation? Lawrence Liang's op-ed was published in the Hindu on April 30, 2012. &lt;/b&gt;
        
&lt;p&gt;While freedom of speech and expression is an individual right, its actualisation often relies on a vast infrastructure of intermediaries.&lt;/p&gt;
&lt;p&gt;In the offline world, this includes newspapers, television channels, public auditoriums, etc. It is often assumed that the internet has created a more robust public sphere of speech by doing away with many structural barriers to free speech. But the fact of the matter is that even if the internet enables a shift from a ‘few to many' to a ‘many to many' model of communication, intermediaries continue to remain important players in facilitating free speech. Can one imagine free speech on the internet being the same without Twitter, social networks or Youtube?&lt;/p&gt;
&lt;p&gt;One way of thinking of the infrastructure of communication is in terms of ecology, and in the ecology of speech — as in the environment — an adverse impact on any component threatens the well-being of all. The idea of cyberspace as a commons is a much cherished myth and in the early days of the internet we were perhaps given a glimpse into its utopian possibility. But we would be deluding ourselves if we believed that the problems that plague free speech in the offline world (including ownership of the avenues of speech) are absent in cyberspace. Recall in recent times that one of the most effective ways in which various governments retaliated to the leaking of official secrets on WikiLeaks was by freezing Julian Assange's PayPal account.&lt;/p&gt;
&lt;h3&gt;Direct &amp;amp; Indirect Controls&lt;/h3&gt;
&lt;p&gt;It may be useful to distinguish between direct controls on free speech and indirect or structural controls on free speech. India has had a long history of battling direct and indirect controls on free speech and with a few exceptions the interests of the press have often coincided with the interests of a robust public sphere of debate and criticism.&lt;/p&gt;
&lt;p&gt;In the late 1950s and early 1960s, a number of large media houses battled restrictions imposed on the press by way of control of the number of pages of a newspaper, regulation of the size of advertisements and the price of imported newsprint. On the face of it, some of these restrictions may have seemed like commercial disputes but the Supreme Court rightly recognised that indirect controls could adversely impact the individual's right to express himself or herself as well as to receive information freely.&lt;/p&gt;
&lt;p&gt;In the online context, there has also been a similar recognition of the role of intermediaries in providing platforms of speech and it is with this view in mind that a number of countries have incorporated safe harbour provisions in their information technology laws.&lt;/p&gt;
&lt;p&gt;Section 79 of the Information Technology Act is one such safe harbour provision in India which provides that intermediaries shall not be liable for any third party action if they are able to prove that the offence or contravention was committed without their knowledge or that they had exercised due diligence to prevent the commission of such offence or contravention. But this safe harbour has effectively been undone with the passing of the Information Technology (Intermediaries guidelines) Rules, 2011.&lt;/p&gt;
&lt;p&gt;The rules clarify what standard of due diligence has to be met by intermediaries and Sec. 3(2) of the rules obliges intermediaries to have rules and conditions of usage which ensure that users do not host, display, upload, modify, publish, transmit, update or share any information that is in contravention of the Section. This includes the all too familiar ones (defamatory, obscene, pornographic content) but also a whole host of new categories which could be invoked to restrict speech (“grossly harmful,” “blasphemous,” “harassing,” “hateful”).&lt;/p&gt;
&lt;p&gt;As is well known, any restriction on speech in India has to comply with both the test of reasonableness under Article 19(2) of the Constitution, as well as ensuring that the grounds of censorship are located within 19(2). Even though there are laws regulating hate speech in India, blasphemy is not a category under Art. 19(2) and has hitherto not been a part of Indian law. Some of the other categories such as “grossly harmful” suggest the people who drafted the rules seem to have taken a constitutional nap at the drafting board.&lt;/p&gt;
&lt;p&gt;Sec. 3(4) of the rules provides that any intermediary who receives a notice by an aggrieved person about any violation of sub rule (2) will have to act within 36 hours and where applicable will ensure that the information is disabled. In the event that it fails to act or to respond, the intermediary cannot claim exemption for liability under Sec. 70 of the IT Act. It is worth noting that most intermediaries receive from hundreds to thousands of requests from individuals on a daily basis asking for the removal of objectionable material. The Centre for Internet and Society conducted a “sting operation” to determine whether the criteria, procedure and safeguards for administration of the takedowns as prescribed by the Rules lead to a chilling effect on free expression.&lt;/p&gt;
&lt;p&gt;In the course of the study, frivolous takedown notices were sent to seven intermediaries and their response to the notices was documented. Different policy factors were permuted in the takedown notices in order to understand at what points in the process of takedown, free expression is being chilled. The takedown notices which were sent by the researcher were intentionally defective as they did not establish how they were interested parties, did not specifically identify and discuss any individual URL on the websites, or present any cause of action, or suggest any legal injury. Of the seven intermediaries to which takedown notices were sent, six over-complied with the notices, despite the apparent flaws in them.&lt;/p&gt;
&lt;h3&gt;Caution&lt;/h3&gt;
&lt;p&gt;Even in cases where the intermediaries challenged the validity of the takedowns, they erred on the side of caution and took down the material. While a number of intermediaries would see themselves as allies in the fight against censorship, more often than not intermediaries are also large commercial organisations whose primary concern is the protection of their business interests. In the face of any potential legal threat, especially from the government, they prefer to err on the side of caution. The people whose content was removed were not told, nor was the general public informed that the content was removed.&lt;/p&gt;
&lt;p&gt;The procedural flaws (subjective determination, absence of the right to be heard, the short response time) coupled with the vague grounds on which such takedowns can be claimed, clearly point to a highly flawed situation in which we will see many more trigger happy demands for offending materials to be taken down.&lt;/p&gt;
&lt;p&gt;We have already slipped into a state of being a republic of over sensitivity where any politician, religious group or individual can claim their sentiments have been hurt or they have been portrayed disparagingly, as evidenced by the recent attack and subsequent arrest of Professor Ambikesh Mahapatra of Jadavpur University for posting cartoons lampooning Mamata Banerjee.&lt;/p&gt;
&lt;h3&gt;Nervous State&lt;/h3&gt;
&lt;p&gt;In the era of global outsourcing it was inevitable that the state censorship machinery would also learn a lesson or two from the global trends and what better way of ensuring censorship than outsourcing it to individuals and to corporations. The renowned anthropologist, Michael Taussig, once compared the state to a nervous system and it seems that the Intermediary rules live up to the expectations of a nervous state ever ready to respond to criticism and disparaging cartoons.&lt;/p&gt;
&lt;p&gt;What if the real danger is not even that we lose our freedom of speech and expression but we lose our sense of humour as a nation?&lt;/p&gt;
&lt;p&gt;The evident flaws of the rules have been acknowledged even by lawmakers, with P. Rajeeve, the CPI(M) M.P., introducing a motion for the annulment of the rules. The annulment motion is going to be debated in the coming weeks and one hopes that the parliamentarians will seriously reconsider the rules in their current form.&lt;/p&gt;
&lt;p&gt;When faced with conundrums of the present it is always useful to turn to history and there is reason to believe that while censorship has a very respectable genealogy in Indian thought, it has also been accompanied in equal measure by a tradition of the right to offend.&lt;/p&gt;
&lt;p&gt;In his delightful reading of the &lt;em&gt;Arthashastra&lt;/em&gt;, Sibaji Bandyopadhay alerts us to the myriad restrictions that existed to control Kusilavas (the term for entertainers which included actors, dancers, singers, storytellers, minstrels and clowns). These regulations ranged from the regulation of their movement during monsoon to prohibitions placed on them, ensuring that they shall not “praise anyone excessively nor receive excessive presents”. While some of the regulations appear harsh and unwarranted, Bandyopadhay says that in contrast to Plato's &lt;em&gt;Republic&lt;/em&gt;, which banished poets altogether from the ideal republic, the &lt;em&gt;Arthashastra&lt;/em&gt; goes so far as to grant to Kusilavas what we could now call the right to offend. Verse 4.1.61 of the &lt;em&gt;Arthashastra&lt;/em&gt; says, “In their performances, [the entertainers] may, if they so wish, make fun of the customs of regions, castes or families and the practices or love affairs (of individuals)”. One hopes that our lawmakers, even if they are averse to reading the Indian Constitution, will be slightly more open to the poetic licence granted by Kautilya.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.thehindu.com/opinion/lead/article3367917.ece?homepage=true"&gt;Click&lt;/a&gt; for the original published in the Hindu on April 30, 2012. Lawrence Liang is a lawyer and researcher based at Alternative Law Forum, Bangalore. He can be contacted at &lt;a class="external-link" href="mailto:lawrence@altlawforum.org"&gt;lawrence@altlawforum.org&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/chilling-effects-frozen-words'&gt;https://cis-india.org/internet-governance/chilling-effects-frozen-words&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Lawrence Liang</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-04-30T07:32:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-july-9-2018-69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that">
    <title>Child-lifting rumours caused 69 mob attacks, 33 deaths in last 18 months</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-july-9-2018-69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that</link>
    <description>
        &lt;b&gt;45 persons were killed in 40 cases of mob lynching across nine states between 2014 and 3 March 2018 according to data.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="https://www.business-standard.com/article/current-affairs/69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that-118070900081_1.html"&gt;Business Standard&lt;/a&gt; on July 9, 2018. Swaraj Paul Barooah was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Two incidents of mob violence reported from Dima Hasao in Assam and  Mangaluru in Karnataka on July 6, 2018, take to 61 the number of &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=mob+attacks" target="_blank"&gt;mob attacks &lt;/a&gt;sparked by rumours of child-lifting circulated on social media since beginning of the year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So far this year, 24 persons have been killed in such mob attacks, an &lt;b&gt;IndiaSpend&lt;/b&gt; &lt;a href="http://bit.ly/attacks-childlifting"&gt;analysis&lt;/a&gt; of news reports from across India shows. This is more than 4.5 times  rise in attacks and two-fold rise in deaths of this kind over 2017, when  11 persons were killed in eight separate attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Between January 1, 2017, and July 5, 2018, 33 persons have been killed  and at least 99 injured in 69 reported cases. In the first six days of  July alone, there have been nine cases of mob violence over &lt;a class="storyTags" href="https://www.business-standard.com/topic/child-lifting" target="_blank"&gt;child lifting &lt;/a&gt;rumours and five deaths, which amounts to more than one attack recorded every day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In all cases, the victims were assaulted on mere suspicion and no evidence of &lt;a class="storyTags" href="https://www.business-standard.com/topic/child-lifting" target="_blank"&gt;child lifting &lt;/a&gt;was  found later. So far, police across states have arrested at least 181  persons in connection with 21 cases, according to information from the  news reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On July 5, 2018, the central home ministry had &lt;a href="https://www.firstpost.com/india/mha-asks-states-uts-to-check-mob-lynching-incidents-tells-them-to-detect-child-lifting-rumours-early-4672261.html/amp?__twitter_impression=true"&gt;directed&lt;/a&gt; all states and union territories to contain mob-lynchings fuelled by  rumours of child-lifting on social media. Nevertheless, two attacks were  reported on July 6, 2018–a father travelling with his own son in  Karnataka, and three &lt;i&gt;sadhus&lt;/i&gt; or ‘holy men’ travelling in Assam.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prior to 2017, one mob &lt;a class="storyTags" href="https://www.business-standard.com/topic/lynching" target="_blank"&gt;lynching &lt;/a&gt;was  recorded in August 2012, in which a driver was killed in Patna, Bihar,  on suspicion of kidnapping a minor, according to our database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The spike in these lynchings over the past year follows a rise in bovine-related hate violence, as recorded in &lt;b&gt;IndiaSpend&lt;/b&gt;’s &lt;a href="http://data.indiaspend.com/"&gt;database&lt;/a&gt; on cow-related hate crime. Incidents of &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=mob+attacks" target="_blank"&gt;mob attacks &lt;/a&gt;on persons suspected of killing cows have become deadlier during this period, with more deaths reported in attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social and political commentators have blamed this violence on a rise  in socio-political and religious cleavages, a rise of vigilantism and an  apparent atmosphere of impunity for attackers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The violence started with cow-related vigilantism but it is now  building up more violent behaviour–from small to big reasons anything  could be the trigger,” psychologist Upneet Lalli, deputy director of the  Institute of Correctional Administration in Chandigarh, told &lt;b&gt;IndiaSpend&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Videos of people tied and beaten, begging mobs to spare their lives,  have been circulating on WhatsApp groups and other social media,  affecting people everywhere, she said, adding, “Once set off for any  reason, mob hysteria is extremely difficult to control.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media is aiding and abetting the process, criminologist Vijay  Raghavan, dean of the social protection office at the Tata Institute of  Social Sciences, told &lt;b&gt;IndiaSpend&lt;/b&gt;, adding that the growing violence is “clearly being orchestrated by vested interests”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“A rumour starts in one part of the country and travels to other parts  like wildfire–first it was beef, now it is child lifting,” he said. In  most cases, the victims and the attackers belong to communities  historically pitted against each other, he said, “This changing  narrative has a clear pattern of violence that is basically preying on  traditional insider-outsider perceptions.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Our analysis&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To analyse instances of mob violence related to child-lifting rumours,  our team collected, studied and cross-verified print and online news  reports in the English media, which tend to have the widest nationwide  coverage, since 2010. All reported incidents were cross-referenced to  eliminate discrepancies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="http://bit.ly/attacks-childlifting"&gt;dataset&lt;/a&gt; thus  created includes the number of mob attacks, the severity of each attack  and details of the victims. Most entries include the names of districts,  towns and villages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since each observation is based on a newspaper report of the crime,  availability of details such as the severity of crime, the number of  victims and their identities and ethnicities varies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before 2017, only one incident was reported in 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jharkhand, Maharashtra deadliest&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among all states and union territories, Jharkhand and Maharashtra, with  seven and five deaths, respectively, reported the highest death toll.  The chances of death in such attacks in these states stood at 350% and  167%, respectively, meaning every reported incident led to more than one  death.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Odisha, under the Biju Janata Dal government, reported the most number  of attacks, 15, which resulted in one death. Tamil Nadu, run by the All  India Anna Dravida Munnetra Kazhagam (AIADMK), followed with nine cases  and four deaths.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One-third or 30% of attacks were reported from states ruled by the  Bharatiya Janata Party, which also runs the central government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the 19 months since January 2017, 10 districts across 16 states have  reported more than one case of mob violence. Jeypore, Mayurbhanjh and  Rayagada in Odisha and Visakhapatnam in Andhra Pradesh have reported  three separate incidents each.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More than half or 56% of the attacked victims were men, 22% women, 3%  transgender, and for the remaining 18%, the gender was not mentioned in  the news reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among those killed, 14 were Hindus, 3 Muslims, and in 16 cases the religious/ethnic identity was not reported.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;No correlation between rise in reported child kidnappings and spread of mob violence&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Except in Maharashtra, these incidents of violence do not reflect an increase in child kidnapping cases recorded in &lt;a class="storyTags" href="https://www.business-standard.com/category/current-affairs-news-national-1150106.htm" target="_blank"&gt;National &lt;/a&gt;Crime Records Bureau (NCRB) &lt;a href="http://ncrb.gov.in/StatPublications/CII/CII2016/pdfs/Table%202C.2.pdf"&gt;data&lt;/a&gt; from 2014 to 2016.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the two years from 2014, India recorded a 41% rise in kidnapping and  abduction of children–from 38,555 in 2014 to 54,328 in 2016–primarily  in Uttar Pradesh (9,678), Maharashtra (8,260) and Delhi (6,254), NCRB  data show.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As of 2016, Maharashtra, the second-most populous state in India,  reported the second-highest number of child abductions. It has also  reported the second-highest toll from mob lynchings over child-lifting  rumours.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there was no such correlation in Uttar Pradesh and Delhi,  which the NCRB ranked first and third for the number of reported child  abductions and kidnappings (which are defined differently in law but  basically involve seizing by force and against the victim’s will).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jharkhand, which reported the highest death toll from mob lynchings,  ranked 19 across India for reported child abductions in 2016, as per  NCRB data. Tripura, where five people were killed, ranked 24.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This may suggest that fears of &lt;a class="storyTags" href="https://www.business-standard.com/topic/child-lifting" target="_blank"&gt;child lifting &lt;/a&gt;are  unfounded and exaggerated. “There is no correlation because the  instigators of this violence are not prompted by a genuine fear of  kidnapping,” Raghavan said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the data do not account for cases that go unreported–families  are hesitant to approach the police, who are seen to be unsympathetic  and intimidating–or cases lost in communication between states and NCRB.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The violence is also indicative of how people have lost faith in law  enforcement and criminal justice systems to act decisively against child  lifting, Lalli said, adding, “Losing faith in the law of the land is a  serious threat to society.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mob psyche is different from individual psyche, she said, “When an  individual acts, there is a sense of responsibility, but in a mob, there  is a dispersion of responsibility and guilt.” The mob justifies its act  as heroism to save the community, their identity, their children,  themselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of the children kidnapped or abducted in 2016, 73% were female and 27%  male, NCRB data show. Of the total child victims, 31% (16,938) were  kidnapped or abducted for the purpose of marriage, of which only one  victim was male; 3% (1,562 female and 26 male) for illicit intercourse;  and 1% each for other unlawful activity and adoption. No purpose was  mentioned in fully 62% of cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;77% attacks attributed to fake news&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of the 69 mob violence cases related to rumours of child lifting that  have been reported, 77% were eventually attributed to fake news spread  through social media. Mobile messenger application Whatsapp, in  particular, featured as the rumour source in 28% or 19 of the cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ministry of electronics and information technology on July 2, 2018,  issued a warning to Whatsapp, observing that “instances of &lt;a class="storyTags" href="https://www.business-standard.com/topic/lynching" target="_blank"&gt;lynching &lt;/a&gt;of  innocent people because of large number of irresponsible and explosive  messages filled with rumours and provocation are being circulated on  WhatsApp”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Such a platform cannot evade accountability and responsibility  especially when good technological inventions are abused by some  miscreants who resort to provocative messages which lead to spread of  violence,” the ministry said subsequently in a &lt;a href="http://www.pib.nic.in/PressReleseDetail.aspx?PRID=1537502"&gt;press release&lt;/a&gt; on July 3, 2018, stating clearly that “WhatsApp must take immediate  action to end this menace and ensure that their platform is not used for  such malafide activities”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;About 13% or 200 million of WhatsApp’s 1.5 billion users are Indian, &lt;i&gt;The Financial Express &lt;/i&gt;&lt;a href="https://www.financialexpress.com/industry/technology/whatsapp-now-has-1-5-billion-monthly-active-users-200-million-users-in-india/1044468/"&gt;reported&lt;/a&gt; on February 1, 2018. This is 42% of India’s 481 million internet users &lt;a href="https://timesofindia.indiatimes.com/business/india-business/number-indian-internet-users-will-reach-500-million-by-june-2018-iamai-says/articleshow/62998642.cms"&gt;recorded&lt;/a&gt; as of December 2017.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a letter to the ministry shared with &lt;b&gt;IndiaSpend&lt;/b&gt;,  the WhatsApp management said it was “horrified by these terrible acts of  violence” and listed out the steps it has taken to curb the spread of  fake news but emphasised that the challenge “requires government, civil  society and technology companies to work together”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It maintained, however, that messages would continue to have end-to-end  encryption to protect users’ privacy and security, encryption being key  to WhatsApp’s messaging service. It added that no more than a quarter  of WhatsApp users are part of groups; that the majority of groups are  small (with fewer than 10 members); and nine in 10 messages are sent  from just one person to another.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber privacy experts caution against overreacting against WhatsApp and  other social media platforms, arguing in favour of free speech and  privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In June, after two cases of mob lynching in Tripura, the government  tried to control the situation by shutting down the internet in the  area, reports included in our database said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is “a slippery slope to quell dissent”, Swaraj Barooah, director  at the Centre for Internet and Society, a Bengaluru-based  not-for-profit, said, adding, “There are indications that marginalised  groups tend to be affected more strongly than others when there are  internet shutdowns.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lynchings point to a much larger issue than the ubiquitous presence of  social media, experts said. “Everyone is focusing on these being  rumours–and of course the platform’s ability to exponentially magnify  the speed and reach of a message being sent is very relevant–but when  and why did we normalise vigilante justice in the first place?” said  Barooah. “For instance, would this type of action be okay if these were  not rumours, but had actually been true?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The root problem is those exploiting historical animosities between  communities. We need to properly investigate on a national-level who are  the instigators and what are they after–merely arresting people after  an incident is not enough,” professor Raghavan said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Barooah also warned against attempts to force WhatsApp to provide security agencies with decrypted data, as the government had &lt;a href="https://economictimes.indiatimes.com/industry/telecom/government-blackberry-end-dispute-over-interception-of-bb-devices/articleshow/20995830.cms"&gt;forced&lt;/a&gt; the Canadian smartphone maker Blackberry to do in 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Given that it is already unsure of the extent to which WhatsApp shares  metadata with governments, it is important to ensure that its  end-to-end encryption facility is not weakened,” Barooah said. “There  are certain delicate trade-offs that can be made, but if they are, they  should not be made as a knee-jerk reaction to ongoing events but after  careful consideration of all the pitfalls. This is especially important  in India, given the lack of a privacy law as well as concerns of  chilling effects on free speech that are present.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some solutions he suggested include making it mandatory that WhatsApp  forwards and memes contain originator details, and that a “fact check  this” option be inserted at the user end to allow a message to be  decrypted. He also suggested that a database of ‘reported hashes’ be  created, which all users could download, and which would automatically  rate messages on ‘trust’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is also important to help people identify fake news and question the  information they receive, experts say, pointing out that while India  has low literacy and education levels, even highly literate people are  not free from confirmation bias.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We really need to educate people–people naively believe everything  they read as true. We’re not doing anything about critical thinking and  critical inquiry–we’ve stopped being questioning and that’s a very  important part of countering fake news,” Lalli said, adding, “We don’t  even respond to information, we’re only reacting.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How recent attacks tie in with bovine-related vigilantism and violence&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IndiaSpend &lt;/b&gt;has been maintaining a &lt;a href="http://data.indiaspend.com/"&gt;database&lt;/a&gt; of bovine-related violence since 2010, which shows a spurt in violence  since the BJP and Prime Minister Narendra Modi assumed power in May  2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A preponderant majority of bovine-related hate crimes–98% of the 85  incidents–have occurred since May 2014, our database shows. Only one  incident each was reported in 2012 and 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Around 56% of the persons attacked by these groups were Muslim, who  accounted for 88% of those killed in this violence. In 2018, 100% of  victims attacked in these hate crimes were Muslim.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There is a clear increase in aggression by one group against the other  and a growing inability to empathise and understand those different  from ourselves,” Lalli said, “This has essentially made us revert to  behaving like tribalistic societies with animalistic instincts–where,  when for survival, when you perceive an animal to be a threat, you  attack it to kill it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In more than a third–28 of 85 incidents–mobs or groups of people were  spurred into violence on the mere suspicion of cow slaughter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our database also shows that the attacks have become deadlier–the  percentage chance of such mob-violence resulting in death has more than  doubled from 30% in 2017–regarded as the deadliest year since 2010 (11  deaths in 37 cases)–to 66% in 2018 (four deaths in six cases).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Society has an innate capacity for violence and it’s very easy to  encourage this. Right from Twitter trolling–which is basically extreme  verbal aggression–we are unleashing and encouraging violence in  different ways and contexts,” Lalli said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What the government says&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many commentators have remarked that the absence of a strict and prompt  response from the government has encouraged such violence. “What action  is taken when such cases occur has an important bearing on the  continuation of such violence,” Raghavan said, “By not taking strong  action, the state is complicit in its orchestration.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While we hear about more incidents of violence, we are yet to hear  full recognition or condemnation of these acts from the important  leaders–in a way it sends out a message that does not discourage the  mob,” Lalli agreed, “When you don’t speak out about it and come down on  it strongly, it sends out a signal to society that it’s alright to  resort to violence for these reasons since nobody gets punished.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NCRB “does not maintain specific data with respect to mob lynching  incidents (involving minorities) in the country”, the home ministry &lt;a href="http://164.100.47.190/loksabhaquestions/annex/14/AS242.pdf"&gt;told&lt;/a&gt; Parliament on March 13, 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ministry did furnish some data on mob lynchings recorded by states  from 2014 to 2017, but did not provide information on the motive–whether  cow vigilantism, communal or caste hatred, or rumours of child-lifting,  etc. The data also did not disclose the identity of the victims.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These data said 45 persons were killed in 40 cases of mob lynching  across nine states between 2014 and March 3, 2018. At least 217 persons  have been arrested.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In contrast, &lt;b&gt;IndiaSpend&lt;/b&gt;’s two databases on mob  violence–due to child-lifting rumours and bovine-related hate  violence–record 80 cases and 41 deaths during the same period. This is  without counting other instances of mob violence related to caste, moral  policing and so on.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-july-9-2018-69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that'&gt;https://cis-india.org/internet-governance/news/business-standard-july-9-2018-69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-07-13T14:53:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/wsj-march-4-2013-dhanya-ann-thoppil-chidambaram-to-talk-budget-on-google-hangout">
    <title>Chidambaram to Talk Budget on Google+ Hangout</title>
    <link>https://cis-india.org/news/wsj-march-4-2013-dhanya-ann-thoppil-chidambaram-to-talk-budget-on-google-hangout</link>
    <description>
        &lt;b&gt;Indian politicians are slowly warming up to social media.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Dhanya Ann Thoppil was &lt;a class="external-link" href="http://blogs.wsj.com/indiarealtime/2013/03/04/chidambaram-to-talk-budget-on-google-hangout/"&gt;published in the Wall Street Journal&lt;/a&gt; on March 4, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In a first for a cabinet minister, Indian Finance Minister P.  Chidambaram tonight is hosting a Google+ Hangout, a Web video chat, to  answer citizens’ questions on the &lt;a href="http://online.wsj.com/article/SB10001424127887324662404578331410524170472.html?mod=WSJINDIA_hpp_MIDDLESecondNews"&gt;budget&lt;/a&gt; he presented last week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At 8 p.m. on Monday India time, Mr. Chidambaram will be joined by a  group of experts to discuss the state of India’s economy, which looks  set to grow at its weakest pace in a decade this financial year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the panel are also Amit Singhal, senior vice president at Google  Inc., Anand Mahindra, chairman and managing director of Mahindra &amp;amp;  Mahindra Ltd., Jahangir Aziz, chief economist for India at J.P. Morgan  and Manish Chokhani, chief executive officer at Axis capital.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The online chat, which the Ministry of Finance in a statement  described as “a powerful communication platform,” is an attempt to  engage India’s tech-savvy, middle-class youth in the political process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is an attempt by the government to reach out to gen-next,” ahead  of the general elections scheduled in 2014, said S. Chandrasekharan, the  director of South Asia Analysis Group, a Delhi-based think tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://blogs.wsj.com/indiarealtime/2013/02/28/india-budget-a-boost-for-health-and-education/"&gt;Improving opportunities for the country’s younger generations&lt;/a&gt; was a major focus of Mr. Chidambaram’s budget speech to lawmakers  Thursday. “My budget has before it one overarching goal: to create  opportunities for our youth to acquire education and skills that will  get them decent jobs or self-employment,” he said, adding, “Their  concern are my concerns, too.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Mr. Chidambaram won’t be interacting with citizens directly. He  will answer questions submitted by citizens in advance through video  uploads on this &lt;a href="http://www.youtube.com/inconversation"&gt;YouTube channel&lt;/a&gt; or on this &lt;a href="https://plus.google.com/+GoogleIndia#+GoogleIndia/posts"&gt;Google + page&lt;/a&gt;. The session will be streamed live on both websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media is only beginning to emerge as a tool Indian politicians use to reach out to the country’s citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prime Minister &lt;a href="http://topics.wsj.com/person/S/manmohan,-singh/6373"&gt;Manmohan Singh&lt;/a&gt;,  often criticized for not being accessible to the media, set up a  Twitter profile about a year ago. But the account is managed by his  office staff, not by Mr. Singh himself, and it’s mostly used to share  links to pictures or speeches of the Prime Minister.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Narendra Modi, chief minister of the state of Gujarat and possible  prime ministerial candidate for the opposition Bhartiya Janata Party,  has embraced digital media more than other politicians. In August he &lt;a href="http://www.youtube.com/watch?v=OzUTCXKnmZg?"&gt;hosted a Google + Hangout session&lt;/a&gt; to answer questions from citizens and in December had a holographic  image of himself projected live at rallies in four different locations  to communicate with his supporters during his &lt;a href="http://online.wsj.com/article/SB10001424127887324461604578190553318699648.html"&gt;election campaign&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government last year also came up with a series of guidelines for  its various arms on the effective use of social media to reach out to  people and to ensure public participation in policy framing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Still, the government often views social media with suspicion, and has taken steps to &lt;a href="http://blogs.wsj.com/indiarealtime/tag/it-act/"&gt;regulate user-generated content&lt;/a&gt; on websites more tightly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are 14 million broadband connections in India, meaning that  only a small portion of the country’s 1.2 billion population has  reliable Internet access, says Sunil Abraham, executive director at the  Bangalore-based Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“So, unlike in the U.S., where you can fault the government for not  being online, in India you can’t really fault the government,” says Mr.  Abraham.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/wsj-march-4-2013-dhanya-ann-thoppil-chidambaram-to-talk-budget-on-google-hangout'&gt;https://cis-india.org/news/wsj-march-4-2013-dhanya-ann-thoppil-chidambaram-to-talk-budget-on-google-hangout&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-03-11T04:14:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cryptoparty-chennai">
    <title>Chennai: Learn to Protect your Online Activities!</title>
    <link>https://cis-india.org/internet-governance/cryptoparty-chennai</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society cordially invites you to a Crypto Party at Asian College of Journalism Second main Road (Behind M.S. Swaminathan Research Foundation) Taramani in Chennai on August 7, 2013, 4.30 p.m. to 6.30 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;"Governments around the world, are greatly increasing their surveillance of the Internet. Alongside a loss of the private sphere, this also represents a clear danger to basic civil liberties. The good news is that we already have the solution: encrypting communications makes it very hard, if not entirely impossible, for others to eavesdrop on our conversations. The bad news is that crypto is largely ignored by the general public, partly because they don't know about it, and partly because even if they do, it seems too much trouble to implement." (&lt;a href="https://www.techdirt.com/articles/20121009/06132920660/cryptoparty-like-its-1993.shtml"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;p&gt;&lt;img alt="yes we scan and obama with headphones" height="167" src="https://netzpolitik.org/wp-upload/1012366_534624166585046_1146520866_n.png" width="450" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;So lets go and have a party, and teach each other how to crypto!&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Everyone is invited! Especially do not hesitate to join if you are not using any crypto at all (yet!)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/cryptoparty-chennai-1/at_download/file"&gt;Here is a Flyer / Printout for you&lt;/a&gt; to spread the message!&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cryptoparty-chennai'&gt;https://cis-india.org/internet-governance/cryptoparty-chennai&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bernadette</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Crypto Party</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-08-01T12:16:52Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/vivek-narayanan-and-r-sivaraman-the-hindu-september-18-2019-chennai-residents-rue-fuzzy-cctv-surveillance">
    <title>Chennai residents rue fuzzy CCTV surveillance</title>
    <link>https://cis-india.org/internet-governance/news/vivek-narayanan-and-r-sivaraman-the-hindu-september-18-2019-chennai-residents-rue-fuzzy-cctv-surveillance</link>
    <description>
        &lt;b&gt;Poor quality of footage, lack of maintenance and inadequate back-up reduce the gadgets’ deterrent value.&lt;/b&gt;
        &lt;p&gt;The article by Vivek Narayanan and R. Srinivasan was &lt;a class="external-link" href="https://www.thehindu.com/news/cities/chennai/you-are-under-fuzzy-cctv-surveillance/article29443198.ece"&gt;published in the Hindu&lt;/a&gt; on September 18, 2019. Pranav M.B. was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last month, Sandeep (name changed), a cyclist, was hit by an ambulance on GST Road near the Madras Export Processing Zone (MEPZ) signal. He was rushed to hospital in the same ambulance. His hopes of finding out who hit him, via CCTV cameras, came crashing after he saw the poor quality of footage that was obtained to identify the vehicle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The police officers in Tambaram themselves told me that the quality of the CCTV cameras was poor and they were unable to trace the number,” said Mr. Sandeep.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the police have been claiming a reduction in crime rates due to CCTV cameras in the city, residents and experts doubt if the equipment is indeed a deterrent, and want the police to install better quality cameras with the capacity to retain footage for a longer period, and to maintain the devices, too.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Extensive Coverage&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Several high profile cases such as the 2016 Swathi murder case drove law enforcers to increase CCTV coverage of the city. Now, there are over 2 lakh cameras covering all of Chennai, its alleys and its fringes.&lt;/p&gt;
&lt;p&gt;Cameras have also been installed at every major junction and at street corners. In many cases, they are linked to the control room of the nearest police station.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the police, there is one CCTV camera for every 50 m. They are meant to help the police crack cases and nab the accused. “Some DVRs (digital video recorders) are also in the house or premises of the sponsors. This is for safety purposes,” said a police officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The unique nature of the Traffic Police’s ‘third eye campaign’ is the involvement of the public, too. Apart from the police, MPs and MLAs, many resident welfare associations have also donated resources for the installation of CCTV cameras.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Residents, however, expressed concern. S. Kumara Raja, vice president, Annai Indira Nagar Residents Welfare Association said: “Though many CCTVs cameras are found on the street, it isn’t clear if they are working or not. We also don’t know if anyone is maintaining the cameras.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;P. Saravanakumar, founder of the South Madipakkam Residents’ Welfare Association, said that the equipment is not connected with the police control room and the data remains with those who have installed the CCTV system.&lt;/p&gt;
&lt;p&gt;V. N. Subramaniyan, president, Mylapore Residents Welfare Association, felt that cameras installed on private properties were working properly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Cameras are obtained from private persons as a charitable activity, so the quality can be challenged. The police should give the maintenance of CCTV cameras to private companies. There should be proper back-up and monitoring,” he pointed out.&lt;/p&gt;
&lt;p&gt;While the equipment is considered important for gathering evidence, policemen themselves complain that the quality of the footage from many cameras is poor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We cannot zoom into the footage obtained from every camera involved. Most of them are 1 or 2 megapixel cameras and the image is often blurred. Only in a few places do we find powerful cameras,” said a policeman.&lt;/p&gt;
&lt;h3&gt;'Not a deterrent'&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Pranav M. B., researcher, Centre for Internet and Society, said that as according to global studies, CCTV cameras are not useful as deterrents. “But they come in handy for providing evidence after a crime,” said Mr. Pranav.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though advanced cameras can provide footage with more clarity, it’s cost intensive to maintain them. “For deterrence, one need not invest in high-end cameras — quality street lights are sufficient. We cannot expect the perpetrator of a crime to make a decision over whether to commit a crime or not after looking at the camera,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there is a 30% higher chance of identifying an accused when a camera is deployed, than without. “Nevertheless, like any other technology or method, it is not entirely foolproof,” Mr. Pranav said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Police officers disagree on the subject of CCTV systems not serving as deterrents. “From January to June 2018, a total of 258 chain snatching incidents were reported, but during the same period this year, the number plummeted to 137 — a fall of nearly 50%,” said a senior police officer.&lt;/p&gt;
&lt;h3&gt;'Needs improvement'&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the police claim that, this year, public nuisance cases have gone down by 41%, and burglary cases by 17%, compared with last year. Police officers agreed that the quality of some cameras needs to be improved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Initially, we did not know the type of quality [of cameras] needed. So, we fixed 1 and 2 megapixel cameras. Now, we are installing 4 megapixel cameras and have better clarity. Besides, we are now categorising the number and type of cameras available in different parts of the city, and will change the older ones,” said a senior police officer.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/vivek-narayanan-and-r-sivaraman-the-hindu-september-18-2019-chennai-residents-rue-fuzzy-cctv-surveillance'&gt;https://cis-india.org/internet-governance/news/vivek-narayanan-and-r-sivaraman-the-hindu-september-18-2019-chennai-residents-rue-fuzzy-cctv-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vivek Narayanan and R. Srinivasan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-09-19T14:35:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts">
    <title>Checks and balances needed for mass surveillance of citizens, say experts</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts</link>
    <description>
        &lt;b&gt;A number of measures are required to protect law-abiding citizens from mass surveillance and misuse of their personal data, according to top technology and legal experts. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Peerzada Abrar was &lt;a class="external-link" href="http://www.thehindu.com/business/Industry/checks-and-balances-needed-for-mass-surveillance-of-citizens-say-experts/article21381478.ece"&gt;published in the Hindu&lt;/a&gt; on December 9, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The measures include issuing of tokens by the Unique Identification  Authority of India (UIDAI) instead of Aadhaar numbers and having an  official in the judiciary give permission to vigilance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  experts were participating in a panel discussion on ‘Navigating Big Data  Challenges’ at Carnegie India’s Global Technology Summit here. They  also said there was a need to implement ‘de-identification of data’ or  preventing a person’s identity from being connected with information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  moderator of the discussion was Justice B.N. Srikrishna, a former  Supreme Court judge, who was also heading a government-appointed  committee of experts to identify “key &lt;a href="http://www.thehindu.com/tag/1401-1400-1349/data-protection/?utm=bodytag"&gt;&lt;b&gt;data protection &lt;/b&gt;&lt;/a&gt;issues”  and recommend methods to address them. Justice Srikrishna told the  panellists that Aadhaar or the unique identification number had  empowered the people. But in situations where the State wants all the  information about citizens from different service providers because of  its suspicions related to terrorism or criminal activity, he asked, what  is the method to create a balance?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Surveillance is like salt in  cooking which is essential in tiny quantities, but counterproductive  even if slightly in excess,” responded Sunil Abraham, executive director  of Bengaluru-based think tank, Centre for Internet and Society. He said  there was a need to make a surveillance system which had privacy by  design built into it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Abraham said that his organisation had  proposed to the UIDAI that it used ‘tokenisation,’ which meant that  whenever there was a ‘know your customer’ requirement, the Aadhaar  number was not accessed by organisations like telecom firms or the  banks. Instead, when the citizens used various services via smart cards  or pins, a token got generated, which was controlled by the UIDAI.  Organisations like banks and telecom firms can store those token numbers  in their database. He said this would make it harder for unauthorised  parties to combine databases. But at the same time would enable law  enforcement agencies to combine database using the appropriate  authorizations and infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“UIDAI is considering this,  they call it the dummy Aadhaar numbers. We need technical as well as  institutional checks and balances,” said Mr. Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Countries  like the U.S also have processes like Foreign Intelligence Surveillance  Court (FISA court) which entertains applications made by the U.S  Government for approval of electronic surveillance, physical search, and  certain other forms of investigative actions for foreign intelligence  purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“My concern is that in the current system, surveillance  can be done by the State machinery. I don’t necessarily suggest FISA  court.... but some kind of mechanism where (one can’t) be held at the  mercy of incestuous State machinery,” said Rahul Matthan, a partner at  law firm Trilegal. “But have some second person who is outside the  influence of this system (and) who actually says ‘yes this is a  terrorist which requires us to do mass surveillance,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Artificial Intelligence&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A  large amount of information or Big data ranging from financial, health  to political insights of people is being collected by different  organisations and service providers which is sitting in different silos.  All of this is likely going to be linked through Aadhaar. Mr.  Srikrishna asked what if a situation arises where all of this data is  aggregated and using artificial intelligence and machine learning, one  is able to analyse it and profile individuals. He said “would that be  not a terrifying scenario” where the State can act super-monitor for  citizens. He asked how can citizens be guarded against it?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr.Srikrishna  was referring to the ‘Social Credit System’ proposed by the Chinese  government for creating a national reputation system to rate the  trustworthiness of its citizens including their economic and social  status. It works as a mass surveillance tool and uses big data analysis  technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is a possibility. What stands in the way of it  becoming a reality (in India) is a robust law,” said Mr.Matthan.  “Technology is so powerful that it could equally be used for good as  well as bad.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts'&gt;https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-12-16T14:32:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
