<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2531 to 2545.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cii-conference-on-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-august-9-2013-moulishree-srivastava-anirban-sen-chinese-hackers-baiting-indian-govt-corporate-employees"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/www-firstpost-com-sep-6-2012-china-outranks-india-in-worlds-first-ever-web-index"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/chilling-effects-frozen-words"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-july-9-2018-69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/wsj-march-4-2013-dhanya-ann-thoppil-chidambaram-to-talk-budget-on-google-hangout"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cryptoparty-chennai"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/vivek-narayanan-and-r-sivaraman-the-hindu-september-18-2019-chennai-residents-rue-fuzzy-cctv-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/indian-express-june-23-2019-chasing-fame-and-fun-15-seconds-at-a-time"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/igf-2013-workshop-99-charting-the-charter-internet-rights-and-principles-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/alexander-von-humbodt-institute-for-internet-november-22-chances-and-risks-of-social-participation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cert-ins-proactive-mandate-a-report-on-indian-computer-emergency-response-teams-proactive-mandate-in-indian-cyber-security-ecosystem"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cii-conference-on-act">
    <title>CII Conference on "ACT": Achieve Cyber Security Together"</title>
    <link>https://cis-india.org/internet-governance/blog/cii-conference-on-act</link>
    <description>
        &lt;b&gt;The Confederation of Indian Industries (CII) organized a conference on facing cyber threats and challenges at Hotel Hilton in Chennai on July 13, 2013. Kovey Coles attended this conference and shares a summary of the event in this blog post.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The conference hosted by CII in the Hotel Hilton, was well attended, and featured a range of industry experts, researches and developers, and members of the Indian armed forces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participants focused on the importance of Indian entities reaching new, adequate levels of cyber security. It was stated early in the event that India is one of the world's most targeted areas for cyber-attacks, and its number of domestic internet users is known to be rapidly increasing in an age which many view as a new era of international information warfare. Despite this, the speakers considered India to be too far behind other countries in its understanding of cyber security. In the opening remarks, CII Chairman Santhanam implored "We need hard core techies in this field… we are not producing them." Another speaker, Savitha Kesav Jagadeesan, a practicing lawyer in Chennai, asked if India would wait until the "9/11 of cyberspace" occurrence before we establish the same level of precautionary measures online as it exists now in transportation security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the presence of both the government’s executive forces and the private industries, the aura circulating the conference room was that of a collective Indian defense, a secure nation only achieved through both secure governmental and industrial aspects. Similar to the previous day’s DSCI cyber security conference, many speakers discussed security issues pertinent to the financial and banking industries, and other cyber crimes which had pecuniary goals. For people seeking to avoid the array of scams and frauds online, some talks shared some of the most basic advice, like safe password practices. "Passwords are like toothbrushes," said A.S. Murthy of the CDAC, "use them often, never share them with anyone, change them often." Other talks went into the intricacies of various hacking schemes, including tab-nabbing and Designated Denial of Service (DDoS) attacks, describing their tactics and how to moderate them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the end, the conference had certainly informed the attendees of the goals, and the challenges, that India will face in the coming months and years. The speakers (all of them) showed how the world of cyber security was quickly evolving, and demonstrated the imperative in government and industry entities evolving their own practices and defenses in stride. The ambitions of several presentations matched the well-publicized "5 lakh cyber professionals in 5 years" plan, placing a strong emphasis in the current and future training of young students in cyber security. Ultimately, I think, the conference helped convince that cyber security is neither a futile, nor completely infallible concept. As CISCO Vice President Col. K.P.M. Das said towards the end of the evening, the most ideal form of cyber security is truly "all about trust, the ability to recover, and transparency/visibility."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cii-conference-on-act'&gt;https://cis-india.org/internet-governance/blog/cii-conference-on-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>kovey</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-26T08:17:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack">
    <title>Chinese state media says U.S. should take some blame for cyber attack</title>
    <link>https://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack</link>
    <description>
        &lt;b&gt;"WannaCry is far and away the most severe malware attack so far in 2017, and the spread of this troubling ransomware is far from over". Since the global attack was launched on Friday, several thousand more computers were discovered to be infected, particularly in Asia as the work day began on Monday. "We've seen that the slowdown of the infection rate over Friday night, after a temporary fix around it, has now been overcome by a second variation the criminals have released".&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Ellis Neal was published in the &lt;a class="external-link" href="http://thevillagessuntimes.com/2017/05/21/chinese-state-media-says-u-s-should-take-some-blame-for/"&gt;Villages Suntimes&lt;/a&gt; on May 21, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Microsoft called the incident a "wake-up" call for governments and customers to take security seriously, but in a letter to the Times Sir David Omand, GCHQ director from 1996 to 1997, pins the blame squarely on the technology firm for failing to maintain support for its ageing Windows XP platform. If they wanted their files decrypted, the program said all they had to do was pay $300 worth of Bitcoin to the specified address.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, a cyber security expert working with the Centre for Internet  and Society, Udbhav Tiwari working on vulnerabilities such as these,  said as most ATMs in the country especially of the public-sector banks  run on outdated operating systems, or are not updated regularly, they  can be easily compromised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When Microsoft sells its operating  system software it does so through a licence agreement that states the  company is not liable for any security breaches, thus shielding it from  any legal complaints, &lt;a href="https://securelist.com/blog/incidents/78351/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/" target="_blank"&gt;points out&lt;/a&gt; Michael Scott, a professor at Southwestern Law School.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Microsoft  has blamed the U.S. government for creating the software code that was  used by hackers to launch the cyber-attacks. USA and European officials  did not rule out North Korea as a possible suspect in the cyberattack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://blogs.microsoft.com/on-the-issues/2017/05/14/need-urgent-collective-action-keep-people-safe-online-lessons-last-weeks-cyberattack/"&gt;In a blog post&lt;/a&gt;,  Microsoft admonished governments around the world for keeping software  vulnerabilities to themselves, instead of reporting them to the  developers. EternalBlue and DoublePulsar, two tools the NSA used to  infiltrate computer networks, were stolen from the agency and &lt;a href="https://techcrunch.com/2017/04/14/the-shadow-brokers-april-exploits-swift-windows/"&gt;leaked online in April as part of a massive data dump by the Shadow Brokers hacker group&lt;/a&gt;. An investigation is on-going regarding how the codes got out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  cyber experts have warned of a huge risk in near future as most  institutions and individuals in Bangladesh use pirated software. We can  not expect criminal hackers to be held accountable for their actions,  but we should hold our government agencies accountable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since  China and Russian Federation are two of the countries where a major  share of computers are running pirated Windows, these are also the  countries with the biggest rate of &lt;b&gt;WannaCry&lt;/b&gt; infections, as stated by F-Secure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Malware  cases have been spreading in recent years as the malicious software  trend has been gaining ground, with new forms of ransomware hitting the  scene.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack'&gt;https://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T01:12:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-august-9-2013-moulishree-srivastava-anirban-sen-chinese-hackers-baiting-indian-govt-corporate-employees">
    <title>Chinese hackers baiting Indian govt, corporate employees: report</title>
    <link>https://cis-india.org/news/livemint-august-9-2013-moulishree-srivastava-anirban-sen-chinese-hackers-baiting-indian-govt-corporate-employees</link>
    <description>
        &lt;b&gt;Hackers using fake subject headings to get users to open virus-laden email attachments.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Moulishree Srivastava and Anirban Sen was &lt;a class="external-link" href="http://www.livemint.com/Politics/NILcUWKLyogvHPit5kIrgP/Chinese-hackers-baiting-Indian-govt-corporate-employees-re.html"&gt;published in Livemint on August 9, 2013&lt;/a&gt;. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Using faked subject headings as diverse as Gujarat chief minister &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Narendra%20Modi"&gt;Narendra Modi&lt;/a&gt;&lt;/span&gt; and the Jallianwala Bagh Massacre, Chinese hackers have been baiting  Indian government officials and corporate employees to open virus-laden  emailed attachments and expose themselves to the risk of cyber attacks, a  new report says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report on “advanced persistent cyber attacks” is based on an investigation conducted by security research firm &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Research%20Bundle"&gt;Research Bundle&lt;/a&gt;&lt;/span&gt; in collaboration with CERT-ISAC. ISAC is a certification body for  information technology (IT) security professionals that handles India’s  National Security Database (NSD). CERT (Computer Emergency Response  Team)-ISAC deals with mobile and electronic security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Some time back, there were a couple of high-profile  cyber attacks that came to our notice when we were approached by  corporates as well as government entities to look into them,” said  Rajshekhar Murthy, director at CERT-ISAC, NSD, at the report’s release  on Friday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“First we thought it might be just these few incidents,  but as we went deeper into it, it came to light that these threats were  far more (widely) spread than we had initially perceived. During the  course of our research, we got proof that the threats originated from  China,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;NSD, managed by ISAC and the government, is a programme  that provides certification to IT professionals who have capability to  protect critical infrastructure and the economy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Chinese hackers have been persistent in their attacks.  According to our analysis, they have also made a separate wing for these  operations,” Murthy said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report says, “It’s also a known fact the Indian  government and other important sectors from India were heavily targeted  during this campaign...focused on stealing confidential documents and  sensitive information.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The threat came in the form of emails with attached  documents targeting government and corporate entities. “These documents  exploited previously known vulnerabilities to drop ‘Travnet’ malware on  to the systems,” said the report, prepared by 20 Internet security  professionals over a period of six months.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“These emails showed that China has been gathering  information about India and keeping up with current issues, and using  those to entice people to open the attachments,” Murthy said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the attachments had names such as Army Cyber  Security Policy 2013.doc, Jallianwala bagh massacre - a deeply shameful  act.doc, Report - Asia Defense Spending Boom.doc, His Holiness the Dalai  Lama’s visit to Switzerland day 3.doc, and BJP won’t dump Modi for  Nitish NDA headed for split.doc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The malware Travnet was specifically designed to search  for “doc, docx, xls, xlsx, txt, rtf and pdf” files on the hacked  computer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This provides enough hints that this malware was  designed to steal confidential information, unlike the usual botnet  variants that focus primarily on providing remote access to the system,”  the report said. “The malware initially collects system information, a  list of files on the victim machine among others, then sends this data  to the remote Command &amp;amp; Control server...”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to industry estimates, losses due to cyber theft from reported attacks alone amount to $8-10 billion (&lt;span&gt;&lt;span class="WebRupee"&gt;Rs.&lt;/span&gt;&lt;/span&gt;48,800-61,000 crore). But experts say the figure could be much higher as many threats go unreported.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Worryingly, the security infrastructure of Indian  government websites has reportedly failed to keep pace with cyber  attackers, who are becoming more focused on stealing information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Many of the servers that host ‘gov.in’ sites are running  outdated software versions, with poorly managed Web servers that do not  follow even the most basic Web application security guidelines,” said  the report. “Even important government sites, access to which can lead  to much deeper intrusion, seem to be managed with little care. While  defacements are usually carried out by hackers just for fun or fame,  serious hackers can cause much more damage and remain unnoticed for a  very long time...”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Slowly but steadily, serious APT (advanced, persistent  attacks) campaigns are on the rise,” the report added. “It’s very  important for the nation to start upgrading its IT infrastructure to  keep up with the latest security guidelines and practices.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Cyber security has become one of the crucial areas for  us and we are focusing on putting capacity and capability in place to  strengthen the cyber security infrastructure,” said Alok Vijayant,  director of the National Technical Research Organisation. “We want to  bring IT security professionals under one entity to enhance our existing  capability instead of just focusing on putting in additional security  infrastructure.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“India has one of the largest talent pools of IT  professionals, but our biggest concern remains the young talent in IT,  as most professionals prefer to go abroad to work,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the use of proprietary rather than  open-source software increases the vulnerability of Indian entities,  according to &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;&lt;/span&gt;, executive director of Bangalore-based research organization Centre for Internet and Society. “There’s a lack of use of &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Linux"&gt;Linux&lt;/a&gt;&lt;/span&gt; and other kinds of free software at both the desktop level and also the front end... They’re using &lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Microsoft"&gt;Microsoft&lt;/a&gt;&lt;/span&gt; both at the server end and on the client end. Most of these attacks  take advantage of that operating system dependency. If one were to look  at it at a macro level, we’re vulnerable across the board—vulnerable to  the US, we’re vulnerable to attackers from Europe, Pakistan, etc.,”  Abraham said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-august-9-2013-moulishree-srivastava-anirban-sen-chinese-hackers-baiting-indian-govt-corporate-employees'&gt;https://cis-india.org/news/livemint-august-9-2013-moulishree-srivastava-anirban-sen-chinese-hackers-baiting-indian-govt-corporate-employees&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-05T10:31:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/www-firstpost-com-sep-6-2012-china-outranks-india-in-worlds-first-ever-web-index">
    <title>China outranks India in world’s first ever web index</title>
    <link>https://cis-india.org/news/www-firstpost-com-sep-6-2012-china-outranks-india-in-worlds-first-ever-web-index</link>
    <description>
        &lt;b&gt;India has been ranked 33rd on a list of 61 countries in a brand new web index that seeks to measure how effectively countries are using the Internet to improve people’s lives. And Indian Internet activists say that given the increasing level of control the government seeks to exercise over the net, that is no great surprise.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.firstpost.com/tech/china-outranks-india-in-worlds-first-ever-web-index-446123.html"&gt;published&lt;/a&gt; in FirstPost on September 6, 2012. Nishant Shah is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The index, which has been compiled by Tim Berners-Lee, the inventor of the World wide web, measures the economic, social and political impact of the internet, on criteria ranging from the proportion of people online to the amount of useful content available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sweden has topped the list ahead of the US and UK, while amongst Asian countries, the Republic of Korea came in at 13th. Interestingly, China ranked 20, 13 places ahead of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speaking to Firstpost about the index and India’s ranking, Nishant Shah of the Centre for Internet and Society said that given the increasingly disturbing nature of the government’s response to the Internet in India, it was no surprise that the country had not fared well on the index.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The Internet today doesn’t work according to the idealistic principles of openness, and democracy of information that Berners-Lee envisioned for it, and in India in particular, although the Internet has helped us rethink what the government can do, the attitude is that that Internet can only be used in ways that the government sees fit”, said Shah&lt;br /&gt;&lt;br /&gt;The methodology of the ranking has rated countries on the basis of three parameters:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Web Readiness&lt;/b&gt;: The quality and extent of Communications Infrastructure (facilitating connectivity to the Web) and Institutional Infrastructure (policies regulating Web access and skill and educational levels enabling the full benefit of the Web).&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Web Use&lt;/b&gt;: The Index looks both at Web usage within countries (such as the percentage of individuals who use the Internet) and the content available to these Web users.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;The Impact of the Web&lt;/b&gt;: The Index uses social, economic and political indicators to evaluate the impact of the Web on these dimensions. This includes measures of social networks, business internet use and e-participation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/www-firstpost-com-sep-6-2012-china-outranks-india-in-worlds-first-ever-web-index'&gt;https://cis-india.org/news/www-firstpost-com-sep-6-2012-china-outranks-india-in-worlds-first-ever-web-index&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-09-07T09:08:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/chilling-effects-frozen-words">
    <title>Chilling Effects and Frozen Words</title>
    <link>https://cis-india.org/internet-governance/chilling-effects-frozen-words</link>
    <description>
        &lt;b&gt;What if the real danger is not that we lose our freedom of speech and expression but our sense of humour as a nation? Lawrence Liang's op-ed was published in the Hindu on April 30, 2012. &lt;/b&gt;
        
&lt;p&gt;While freedom of speech and expression is an individual right, its actualisation often relies on a vast infrastructure of intermediaries.&lt;/p&gt;
&lt;p&gt;In the offline world, this includes newspapers, television channels, public auditoriums, etc. It is often assumed that the internet has created a more robust public sphere of speech by doing away with many structural barriers to free speech. But the fact of the matter is that even if the internet enables a shift from a ‘few to many' to a ‘many to many' model of communication, intermediaries continue to remain important players in facilitating free speech. Can one imagine free speech on the internet being the same without Twitter, social networks or Youtube?&lt;/p&gt;
&lt;p&gt;One way of thinking of the infrastructure of communication is in terms of ecology, and in the ecology of speech — as in the environment — an adverse impact on any component threatens the well-being of all. The idea of cyberspace as a commons is a much cherished myth and in the early days of the internet we were perhaps given a glimpse into its utopian possibility. But we would be deluding ourselves if we believed that the problems that plague free speech in the offline world (including ownership of the avenues of speech) are absent in cyberspace. Recall in recent times that one of the most effective ways in which various governments retaliated to the leaking of official secrets on WikiLeaks was by freezing Julian Assange's PayPal account.&lt;/p&gt;
&lt;h3&gt;Direct &amp;amp; Indirect Controls&lt;/h3&gt;
&lt;p&gt;It may be useful to distinguish between direct controls on free speech and indirect or structural controls on free speech. India has had a long history of battling direct and indirect controls on free speech and with a few exceptions the interests of the press have often coincided with the interests of a robust public sphere of debate and criticism.&lt;/p&gt;
&lt;p&gt;In the late 1950s and early 1960s, a number of large media houses battled restrictions imposed on the press by way of control of the number of pages of a newspaper, regulation of the size of advertisements and the price of imported newsprint. On the face of it, some of these restrictions may have seemed like commercial disputes but the Supreme Court rightly recognised that indirect controls could adversely impact the individual's right to express himself or herself as well as to receive information freely.&lt;/p&gt;
&lt;p&gt;In the online context, there has also been a similar recognition of the role of intermediaries in providing platforms of speech and it is with this view in mind that a number of countries have incorporated safe harbour provisions in their information technology laws.&lt;/p&gt;
&lt;p&gt;Section 79 of the Information Technology Act is one such safe harbour provision in India which provides that intermediaries shall not be liable for any third party action if they are able to prove that the offence or contravention was committed without their knowledge or that they had exercised due diligence to prevent the commission of such offence or contravention. But this safe harbour has effectively been undone with the passing of the Information Technology (Intermediaries guidelines) Rules, 2011.&lt;/p&gt;
&lt;p&gt;The rules clarify what standard of due diligence has to be met by intermediaries and Sec. 3(2) of the rules obliges intermediaries to have rules and conditions of usage which ensure that users do not host, display, upload, modify, publish, transmit, update or share any information that is in contravention of the Section. This includes the all too familiar ones (defamatory, obscene, pornographic content) but also a whole host of new categories which could be invoked to restrict speech (“grossly harmful,” “blasphemous,” “harassing,” “hateful”).&lt;/p&gt;
&lt;p&gt;As is well known, any restriction on speech in India has to comply with both the test of reasonableness under Article 19(2) of the Constitution, as well as ensuring that the grounds of censorship are located within 19(2). Even though there are laws regulating hate speech in India, blasphemy is not a category under Art. 19(2) and has hitherto not been a part of Indian law. Some of the other categories such as “grossly harmful” suggest the people who drafted the rules seem to have taken a constitutional nap at the drafting board.&lt;/p&gt;
&lt;p&gt;Sec. 3(4) of the rules provides that any intermediary who receives a notice by an aggrieved person about any violation of sub rule (2) will have to act within 36 hours and where applicable will ensure that the information is disabled. In the event that it fails to act or to respond, the intermediary cannot claim exemption for liability under Sec. 70 of the IT Act. It is worth noting that most intermediaries receive from hundreds to thousands of requests from individuals on a daily basis asking for the removal of objectionable material. The Centre for Internet and Society conducted a “sting operation” to determine whether the criteria, procedure and safeguards for administration of the takedowns as prescribed by the Rules lead to a chilling effect on free expression.&lt;/p&gt;
&lt;p&gt;In the course of the study, frivolous takedown notices were sent to seven intermediaries and their response to the notices was documented. Different policy factors were permuted in the takedown notices in order to understand at what points in the process of takedown, free expression is being chilled. The takedown notices which were sent by the researcher were intentionally defective as they did not establish how they were interested parties, did not specifically identify and discuss any individual URL on the websites, or present any cause of action, or suggest any legal injury. Of the seven intermediaries to which takedown notices were sent, six over-complied with the notices, despite the apparent flaws in them.&lt;/p&gt;
&lt;h3&gt;Caution&lt;/h3&gt;
&lt;p&gt;Even in cases where the intermediaries challenged the validity of the takedowns, they erred on the side of caution and took down the material. While a number of intermediaries would see themselves as allies in the fight against censorship, more often than not intermediaries are also large commercial organisations whose primary concern is the protection of their business interests. In the face of any potential legal threat, especially from the government, they prefer to err on the side of caution. The people whose content was removed were not told, nor was the general public informed that the content was removed.&lt;/p&gt;
&lt;p&gt;The procedural flaws (subjective determination, absence of the right to be heard, the short response time) coupled with the vague grounds on which such takedowns can be claimed, clearly point to a highly flawed situation in which we will see many more trigger happy demands for offending materials to be taken down.&lt;/p&gt;
&lt;p&gt;We have already slipped into a state of being a republic of over sensitivity where any politician, religious group or individual can claim their sentiments have been hurt or they have been portrayed disparagingly, as evidenced by the recent attack and subsequent arrest of Professor Ambikesh Mahapatra of Jadavpur University for posting cartoons lampooning Mamata Banerjee.&lt;/p&gt;
&lt;h3&gt;Nervous State&lt;/h3&gt;
&lt;p&gt;In the era of global outsourcing it was inevitable that the state censorship machinery would also learn a lesson or two from the global trends and what better way of ensuring censorship than outsourcing it to individuals and to corporations. The renowned anthropologist, Michael Taussig, once compared the state to a nervous system and it seems that the Intermediary rules live up to the expectations of a nervous state ever ready to respond to criticism and disparaging cartoons.&lt;/p&gt;
&lt;p&gt;What if the real danger is not even that we lose our freedom of speech and expression but we lose our sense of humour as a nation?&lt;/p&gt;
&lt;p&gt;The evident flaws of the rules have been acknowledged even by lawmakers, with P. Rajeeve, the CPI(M) M.P., introducing a motion for the annulment of the rules. The annulment motion is going to be debated in the coming weeks and one hopes that the parliamentarians will seriously reconsider the rules in their current form.&lt;/p&gt;
&lt;p&gt;When faced with conundrums of the present it is always useful to turn to history and there is reason to believe that while censorship has a very respectable genealogy in Indian thought, it has also been accompanied in equal measure by a tradition of the right to offend.&lt;/p&gt;
&lt;p&gt;In his delightful reading of the &lt;em&gt;Arthashastra&lt;/em&gt;, Sibaji Bandyopadhay alerts us to the myriad restrictions that existed to control Kusilavas (the term for entertainers which included actors, dancers, singers, storytellers, minstrels and clowns). These regulations ranged from the regulation of their movement during monsoon to prohibitions placed on them, ensuring that they shall not “praise anyone excessively nor receive excessive presents”. While some of the regulations appear harsh and unwarranted, Bandyopadhay says that in contrast to Plato's &lt;em&gt;Republic&lt;/em&gt;, which banished poets altogether from the ideal republic, the &lt;em&gt;Arthashastra&lt;/em&gt; goes so far as to grant to Kusilavas what we could now call the right to offend. Verse 4.1.61 of the &lt;em&gt;Arthashastra&lt;/em&gt; says, “In their performances, [the entertainers] may, if they so wish, make fun of the customs of regions, castes or families and the practices or love affairs (of individuals)”. One hopes that our lawmakers, even if they are averse to reading the Indian Constitution, will be slightly more open to the poetic licence granted by Kautilya.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.thehindu.com/opinion/lead/article3367917.ece?homepage=true"&gt;Click&lt;/a&gt; for the original published in the Hindu on April 30, 2012. Lawrence Liang is a lawyer and researcher based at Alternative Law Forum, Bangalore. He can be contacted at &lt;a class="external-link" href="mailto:lawrence@altlawforum.org"&gt;lawrence@altlawforum.org&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/chilling-effects-frozen-words'&gt;https://cis-india.org/internet-governance/chilling-effects-frozen-words&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Lawrence Liang</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-04-30T07:32:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-july-9-2018-69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that">
    <title>Child-lifting rumours caused 69 mob attacks, 33 deaths in last 18 months</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-july-9-2018-69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that</link>
    <description>
        &lt;b&gt;45 persons were killed in 40 cases of mob lynching across nine states between 2014 and 3 March 2018 according to data.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="https://www.business-standard.com/article/current-affairs/69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that-118070900081_1.html"&gt;Business Standard&lt;/a&gt; on July 9, 2018. Swaraj Paul Barooah was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Two incidents of mob violence reported from Dima Hasao in Assam and  Mangaluru in Karnataka on July 6, 2018, take to 61 the number of &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=mob+attacks" target="_blank"&gt;mob attacks &lt;/a&gt;sparked by rumours of child-lifting circulated on social media since beginning of the year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So far this year, 24 persons have been killed in such mob attacks, an &lt;b&gt;IndiaSpend&lt;/b&gt; &lt;a href="http://bit.ly/attacks-childlifting"&gt;analysis&lt;/a&gt; of news reports from across India shows. This is more than 4.5 times  rise in attacks and two-fold rise in deaths of this kind over 2017, when  11 persons were killed in eight separate attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Between January 1, 2017, and July 5, 2018, 33 persons have been killed  and at least 99 injured in 69 reported cases. In the first six days of  July alone, there have been nine cases of mob violence over &lt;a class="storyTags" href="https://www.business-standard.com/topic/child-lifting" target="_blank"&gt;child lifting &lt;/a&gt;rumours and five deaths, which amounts to more than one attack recorded every day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In all cases, the victims were assaulted on mere suspicion and no evidence of &lt;a class="storyTags" href="https://www.business-standard.com/topic/child-lifting" target="_blank"&gt;child lifting &lt;/a&gt;was  found later. So far, police across states have arrested at least 181  persons in connection with 21 cases, according to information from the  news reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On July 5, 2018, the central home ministry had &lt;a href="https://www.firstpost.com/india/mha-asks-states-uts-to-check-mob-lynching-incidents-tells-them-to-detect-child-lifting-rumours-early-4672261.html/amp?__twitter_impression=true"&gt;directed&lt;/a&gt; all states and union territories to contain mob-lynchings fuelled by  rumours of child-lifting on social media. Nevertheless, two attacks were  reported on July 6, 2018–a father travelling with his own son in  Karnataka, and three &lt;i&gt;sadhus&lt;/i&gt; or ‘holy men’ travelling in Assam.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prior to 2017, one mob &lt;a class="storyTags" href="https://www.business-standard.com/topic/lynching" target="_blank"&gt;lynching &lt;/a&gt;was  recorded in August 2012, in which a driver was killed in Patna, Bihar,  on suspicion of kidnapping a minor, according to our database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The spike in these lynchings over the past year follows a rise in bovine-related hate violence, as recorded in &lt;b&gt;IndiaSpend&lt;/b&gt;’s &lt;a href="http://data.indiaspend.com/"&gt;database&lt;/a&gt; on cow-related hate crime. Incidents of &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=mob+attacks" target="_blank"&gt;mob attacks &lt;/a&gt;on persons suspected of killing cows have become deadlier during this period, with more deaths reported in attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social and political commentators have blamed this violence on a rise  in socio-political and religious cleavages, a rise of vigilantism and an  apparent atmosphere of impunity for attackers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The violence started with cow-related vigilantism but it is now  building up more violent behaviour–from small to big reasons anything  could be the trigger,” psychologist Upneet Lalli, deputy director of the  Institute of Correctional Administration in Chandigarh, told &lt;b&gt;IndiaSpend&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Videos of people tied and beaten, begging mobs to spare their lives,  have been circulating on WhatsApp groups and other social media,  affecting people everywhere, she said, adding, “Once set off for any  reason, mob hysteria is extremely difficult to control.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media is aiding and abetting the process, criminologist Vijay  Raghavan, dean of the social protection office at the Tata Institute of  Social Sciences, told &lt;b&gt;IndiaSpend&lt;/b&gt;, adding that the growing violence is “clearly being orchestrated by vested interests”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“A rumour starts in one part of the country and travels to other parts  like wildfire–first it was beef, now it is child lifting,” he said. In  most cases, the victims and the attackers belong to communities  historically pitted against each other, he said, “This changing  narrative has a clear pattern of violence that is basically preying on  traditional insider-outsider perceptions.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Our analysis&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To analyse instances of mob violence related to child-lifting rumours,  our team collected, studied and cross-verified print and online news  reports in the English media, which tend to have the widest nationwide  coverage, since 2010. All reported incidents were cross-referenced to  eliminate discrepancies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="http://bit.ly/attacks-childlifting"&gt;dataset&lt;/a&gt; thus  created includes the number of mob attacks, the severity of each attack  and details of the victims. Most entries include the names of districts,  towns and villages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since each observation is based on a newspaper report of the crime,  availability of details such as the severity of crime, the number of  victims and their identities and ethnicities varies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before 2017, only one incident was reported in 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jharkhand, Maharashtra deadliest&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among all states and union territories, Jharkhand and Maharashtra, with  seven and five deaths, respectively, reported the highest death toll.  The chances of death in such attacks in these states stood at 350% and  167%, respectively, meaning every reported incident led to more than one  death.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Odisha, under the Biju Janata Dal government, reported the most number  of attacks, 15, which resulted in one death. Tamil Nadu, run by the All  India Anna Dravida Munnetra Kazhagam (AIADMK), followed with nine cases  and four deaths.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One-third or 30% of attacks were reported from states ruled by the  Bharatiya Janata Party, which also runs the central government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the 19 months since January 2017, 10 districts across 16 states have  reported more than one case of mob violence. Jeypore, Mayurbhanjh and  Rayagada in Odisha and Visakhapatnam in Andhra Pradesh have reported  three separate incidents each.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More than half or 56% of the attacked victims were men, 22% women, 3%  transgender, and for the remaining 18%, the gender was not mentioned in  the news reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among those killed, 14 were Hindus, 3 Muslims, and in 16 cases the religious/ethnic identity was not reported.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;No correlation between rise in reported child kidnappings and spread of mob violence&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Except in Maharashtra, these incidents of violence do not reflect an increase in child kidnapping cases recorded in &lt;a class="storyTags" href="https://www.business-standard.com/category/current-affairs-news-national-1150106.htm" target="_blank"&gt;National &lt;/a&gt;Crime Records Bureau (NCRB) &lt;a href="http://ncrb.gov.in/StatPublications/CII/CII2016/pdfs/Table%202C.2.pdf"&gt;data&lt;/a&gt; from 2014 to 2016.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the two years from 2014, India recorded a 41% rise in kidnapping and  abduction of children–from 38,555 in 2014 to 54,328 in 2016–primarily  in Uttar Pradesh (9,678), Maharashtra (8,260) and Delhi (6,254), NCRB  data show.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As of 2016, Maharashtra, the second-most populous state in India,  reported the second-highest number of child abductions. It has also  reported the second-highest toll from mob lynchings over child-lifting  rumours.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there was no such correlation in Uttar Pradesh and Delhi,  which the NCRB ranked first and third for the number of reported child  abductions and kidnappings (which are defined differently in law but  basically involve seizing by force and against the victim’s will).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jharkhand, which reported the highest death toll from mob lynchings,  ranked 19 across India for reported child abductions in 2016, as per  NCRB data. Tripura, where five people were killed, ranked 24.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This may suggest that fears of &lt;a class="storyTags" href="https://www.business-standard.com/topic/child-lifting" target="_blank"&gt;child lifting &lt;/a&gt;are  unfounded and exaggerated. “There is no correlation because the  instigators of this violence are not prompted by a genuine fear of  kidnapping,” Raghavan said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the data do not account for cases that go unreported–families  are hesitant to approach the police, who are seen to be unsympathetic  and intimidating–or cases lost in communication between states and NCRB.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The violence is also indicative of how people have lost faith in law  enforcement and criminal justice systems to act decisively against child  lifting, Lalli said, adding, “Losing faith in the law of the land is a  serious threat to society.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mob psyche is different from individual psyche, she said, “When an  individual acts, there is a sense of responsibility, but in a mob, there  is a dispersion of responsibility and guilt.” The mob justifies its act  as heroism to save the community, their identity, their children,  themselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of the children kidnapped or abducted in 2016, 73% were female and 27%  male, NCRB data show. Of the total child victims, 31% (16,938) were  kidnapped or abducted for the purpose of marriage, of which only one  victim was male; 3% (1,562 female and 26 male) for illicit intercourse;  and 1% each for other unlawful activity and adoption. No purpose was  mentioned in fully 62% of cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;77% attacks attributed to fake news&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of the 69 mob violence cases related to rumours of child lifting that  have been reported, 77% were eventually attributed to fake news spread  through social media. Mobile messenger application Whatsapp, in  particular, featured as the rumour source in 28% or 19 of the cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ministry of electronics and information technology on July 2, 2018,  issued a warning to Whatsapp, observing that “instances of &lt;a class="storyTags" href="https://www.business-standard.com/topic/lynching" target="_blank"&gt;lynching &lt;/a&gt;of  innocent people because of large number of irresponsible and explosive  messages filled with rumours and provocation are being circulated on  WhatsApp”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Such a platform cannot evade accountability and responsibility  especially when good technological inventions are abused by some  miscreants who resort to provocative messages which lead to spread of  violence,” the ministry said subsequently in a &lt;a href="http://www.pib.nic.in/PressReleseDetail.aspx?PRID=1537502"&gt;press release&lt;/a&gt; on July 3, 2018, stating clearly that “WhatsApp must take immediate  action to end this menace and ensure that their platform is not used for  such malafide activities”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;About 13% or 200 million of WhatsApp’s 1.5 billion users are Indian, &lt;i&gt;The Financial Express &lt;/i&gt;&lt;a href="https://www.financialexpress.com/industry/technology/whatsapp-now-has-1-5-billion-monthly-active-users-200-million-users-in-india/1044468/"&gt;reported&lt;/a&gt; on February 1, 2018. This is 42% of India’s 481 million internet users &lt;a href="https://timesofindia.indiatimes.com/business/india-business/number-indian-internet-users-will-reach-500-million-by-june-2018-iamai-says/articleshow/62998642.cms"&gt;recorded&lt;/a&gt; as of December 2017.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a letter to the ministry shared with &lt;b&gt;IndiaSpend&lt;/b&gt;,  the WhatsApp management said it was “horrified by these terrible acts of  violence” and listed out the steps it has taken to curb the spread of  fake news but emphasised that the challenge “requires government, civil  society and technology companies to work together”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It maintained, however, that messages would continue to have end-to-end  encryption to protect users’ privacy and security, encryption being key  to WhatsApp’s messaging service. It added that no more than a quarter  of WhatsApp users are part of groups; that the majority of groups are  small (with fewer than 10 members); and nine in 10 messages are sent  from just one person to another.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber privacy experts caution against overreacting against WhatsApp and  other social media platforms, arguing in favour of free speech and  privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In June, after two cases of mob lynching in Tripura, the government  tried to control the situation by shutting down the internet in the  area, reports included in our database said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is “a slippery slope to quell dissent”, Swaraj Barooah, director  at the Centre for Internet and Society, a Bengaluru-based  not-for-profit, said, adding, “There are indications that marginalised  groups tend to be affected more strongly than others when there are  internet shutdowns.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lynchings point to a much larger issue than the ubiquitous presence of  social media, experts said. “Everyone is focusing on these being  rumours–and of course the platform’s ability to exponentially magnify  the speed and reach of a message being sent is very relevant–but when  and why did we normalise vigilante justice in the first place?” said  Barooah. “For instance, would this type of action be okay if these were  not rumours, but had actually been true?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The root problem is those exploiting historical animosities between  communities. We need to properly investigate on a national-level who are  the instigators and what are they after–merely arresting people after  an incident is not enough,” professor Raghavan said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Barooah also warned against attempts to force WhatsApp to provide security agencies with decrypted data, as the government had &lt;a href="https://economictimes.indiatimes.com/industry/telecom/government-blackberry-end-dispute-over-interception-of-bb-devices/articleshow/20995830.cms"&gt;forced&lt;/a&gt; the Canadian smartphone maker Blackberry to do in 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Given that it is already unsure of the extent to which WhatsApp shares  metadata with governments, it is important to ensure that its  end-to-end encryption facility is not weakened,” Barooah said. “There  are certain delicate trade-offs that can be made, but if they are, they  should not be made as a knee-jerk reaction to ongoing events but after  careful consideration of all the pitfalls. This is especially important  in India, given the lack of a privacy law as well as concerns of  chilling effects on free speech that are present.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some solutions he suggested include making it mandatory that WhatsApp  forwards and memes contain originator details, and that a “fact check  this” option be inserted at the user end to allow a message to be  decrypted. He also suggested that a database of ‘reported hashes’ be  created, which all users could download, and which would automatically  rate messages on ‘trust’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is also important to help people identify fake news and question the  information they receive, experts say, pointing out that while India  has low literacy and education levels, even highly literate people are  not free from confirmation bias.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We really need to educate people–people naively believe everything  they read as true. We’re not doing anything about critical thinking and  critical inquiry–we’ve stopped being questioning and that’s a very  important part of countering fake news,” Lalli said, adding, “We don’t  even respond to information, we’re only reacting.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How recent attacks tie in with bovine-related vigilantism and violence&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IndiaSpend &lt;/b&gt;has been maintaining a &lt;a href="http://data.indiaspend.com/"&gt;database&lt;/a&gt; of bovine-related violence since 2010, which shows a spurt in violence  since the BJP and Prime Minister Narendra Modi assumed power in May  2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A preponderant majority of bovine-related hate crimes–98% of the 85  incidents–have occurred since May 2014, our database shows. Only one  incident each was reported in 2012 and 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Around 56% of the persons attacked by these groups were Muslim, who  accounted for 88% of those killed in this violence. In 2018, 100% of  victims attacked in these hate crimes were Muslim.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There is a clear increase in aggression by one group against the other  and a growing inability to empathise and understand those different  from ourselves,” Lalli said, “This has essentially made us revert to  behaving like tribalistic societies with animalistic instincts–where,  when for survival, when you perceive an animal to be a threat, you  attack it to kill it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In more than a third–28 of 85 incidents–mobs or groups of people were  spurred into violence on the mere suspicion of cow slaughter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our database also shows that the attacks have become deadlier–the  percentage chance of such mob-violence resulting in death has more than  doubled from 30% in 2017–regarded as the deadliest year since 2010 (11  deaths in 37 cases)–to 66% in 2018 (four deaths in six cases).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Society has an innate capacity for violence and it’s very easy to  encourage this. Right from Twitter trolling–which is basically extreme  verbal aggression–we are unleashing and encouraging violence in  different ways and contexts,” Lalli said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What the government says&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many commentators have remarked that the absence of a strict and prompt  response from the government has encouraged such violence. “What action  is taken when such cases occur has an important bearing on the  continuation of such violence,” Raghavan said, “By not taking strong  action, the state is complicit in its orchestration.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While we hear about more incidents of violence, we are yet to hear  full recognition or condemnation of these acts from the important  leaders–in a way it sends out a message that does not discourage the  mob,” Lalli agreed, “When you don’t speak out about it and come down on  it strongly, it sends out a signal to society that it’s alright to  resort to violence for these reasons since nobody gets punished.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NCRB “does not maintain specific data with respect to mob lynching  incidents (involving minorities) in the country”, the home ministry &lt;a href="http://164.100.47.190/loksabhaquestions/annex/14/AS242.pdf"&gt;told&lt;/a&gt; Parliament on March 13, 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ministry did furnish some data on mob lynchings recorded by states  from 2014 to 2017, but did not provide information on the motive–whether  cow vigilantism, communal or caste hatred, or rumours of child-lifting,  etc. The data also did not disclose the identity of the victims.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These data said 45 persons were killed in 40 cases of mob lynching  across nine states between 2014 and March 3, 2018. At least 217 persons  have been arrested.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In contrast, &lt;b&gt;IndiaSpend&lt;/b&gt;’s two databases on mob  violence–due to child-lifting rumours and bovine-related hate  violence–record 80 cases and 41 deaths during the same period. This is  without counting other instances of mob violence related to caste, moral  policing and so on.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-july-9-2018-69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that'&gt;https://cis-india.org/internet-governance/news/business-standard-july-9-2018-69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-07-13T14:53:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/wsj-march-4-2013-dhanya-ann-thoppil-chidambaram-to-talk-budget-on-google-hangout">
    <title>Chidambaram to Talk Budget on Google+ Hangout</title>
    <link>https://cis-india.org/news/wsj-march-4-2013-dhanya-ann-thoppil-chidambaram-to-talk-budget-on-google-hangout</link>
    <description>
        &lt;b&gt;Indian politicians are slowly warming up to social media.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Dhanya Ann Thoppil was &lt;a class="external-link" href="http://blogs.wsj.com/indiarealtime/2013/03/04/chidambaram-to-talk-budget-on-google-hangout/"&gt;published in the Wall Street Journal&lt;/a&gt; on March 4, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In a first for a cabinet minister, Indian Finance Minister P.  Chidambaram tonight is hosting a Google+ Hangout, a Web video chat, to  answer citizens’ questions on the &lt;a href="http://online.wsj.com/article/SB10001424127887324662404578331410524170472.html?mod=WSJINDIA_hpp_MIDDLESecondNews"&gt;budget&lt;/a&gt; he presented last week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At 8 p.m. on Monday India time, Mr. Chidambaram will be joined by a  group of experts to discuss the state of India’s economy, which looks  set to grow at its weakest pace in a decade this financial year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the panel are also Amit Singhal, senior vice president at Google  Inc., Anand Mahindra, chairman and managing director of Mahindra &amp;amp;  Mahindra Ltd., Jahangir Aziz, chief economist for India at J.P. Morgan  and Manish Chokhani, chief executive officer at Axis capital.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The online chat, which the Ministry of Finance in a statement  described as “a powerful communication platform,” is an attempt to  engage India’s tech-savvy, middle-class youth in the political process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is an attempt by the government to reach out to gen-next,” ahead  of the general elections scheduled in 2014, said S. Chandrasekharan, the  director of South Asia Analysis Group, a Delhi-based think tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://blogs.wsj.com/indiarealtime/2013/02/28/india-budget-a-boost-for-health-and-education/"&gt;Improving opportunities for the country’s younger generations&lt;/a&gt; was a major focus of Mr. Chidambaram’s budget speech to lawmakers  Thursday. “My budget has before it one overarching goal: to create  opportunities for our youth to acquire education and skills that will  get them decent jobs or self-employment,” he said, adding, “Their  concern are my concerns, too.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Mr. Chidambaram won’t be interacting with citizens directly. He  will answer questions submitted by citizens in advance through video  uploads on this &lt;a href="http://www.youtube.com/inconversation"&gt;YouTube channel&lt;/a&gt; or on this &lt;a href="https://plus.google.com/+GoogleIndia#+GoogleIndia/posts"&gt;Google + page&lt;/a&gt;. The session will be streamed live on both websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media is only beginning to emerge as a tool Indian politicians use to reach out to the country’s citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prime Minister &lt;a href="http://topics.wsj.com/person/S/manmohan,-singh/6373"&gt;Manmohan Singh&lt;/a&gt;,  often criticized for not being accessible to the media, set up a  Twitter profile about a year ago. But the account is managed by his  office staff, not by Mr. Singh himself, and it’s mostly used to share  links to pictures or speeches of the Prime Minister.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Narendra Modi, chief minister of the state of Gujarat and possible  prime ministerial candidate for the opposition Bhartiya Janata Party,  has embraced digital media more than other politicians. In August he &lt;a href="http://www.youtube.com/watch?v=OzUTCXKnmZg?"&gt;hosted a Google + Hangout session&lt;/a&gt; to answer questions from citizens and in December had a holographic  image of himself projected live at rallies in four different locations  to communicate with his supporters during his &lt;a href="http://online.wsj.com/article/SB10001424127887324461604578190553318699648.html"&gt;election campaign&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government last year also came up with a series of guidelines for  its various arms on the effective use of social media to reach out to  people and to ensure public participation in policy framing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Still, the government often views social media with suspicion, and has taken steps to &lt;a href="http://blogs.wsj.com/indiarealtime/tag/it-act/"&gt;regulate user-generated content&lt;/a&gt; on websites more tightly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are 14 million broadband connections in India, meaning that  only a small portion of the country’s 1.2 billion population has  reliable Internet access, says Sunil Abraham, executive director at the  Bangalore-based Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“So, unlike in the U.S., where you can fault the government for not  being online, in India you can’t really fault the government,” says Mr.  Abraham.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/wsj-march-4-2013-dhanya-ann-thoppil-chidambaram-to-talk-budget-on-google-hangout'&gt;https://cis-india.org/news/wsj-march-4-2013-dhanya-ann-thoppil-chidambaram-to-talk-budget-on-google-hangout&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-03-11T04:14:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cryptoparty-chennai">
    <title>Chennai: Learn to Protect your Online Activities!</title>
    <link>https://cis-india.org/internet-governance/cryptoparty-chennai</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society cordially invites you to a Crypto Party at Asian College of Journalism Second main Road (Behind M.S. Swaminathan Research Foundation) Taramani in Chennai on August 7, 2013, 4.30 p.m. to 6.30 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;"Governments around the world, are greatly increasing their surveillance of the Internet. Alongside a loss of the private sphere, this also represents a clear danger to basic civil liberties. The good news is that we already have the solution: encrypting communications makes it very hard, if not entirely impossible, for others to eavesdrop on our conversations. The bad news is that crypto is largely ignored by the general public, partly because they don't know about it, and partly because even if they do, it seems too much trouble to implement." (&lt;a href="https://www.techdirt.com/articles/20121009/06132920660/cryptoparty-like-its-1993.shtml"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;p&gt;&lt;img alt="yes we scan and obama with headphones" height="167" src="https://netzpolitik.org/wp-upload/1012366_534624166585046_1146520866_n.png" width="450" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;So lets go and have a party, and teach each other how to crypto!&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Everyone is invited! Especially do not hesitate to join if you are not using any crypto at all (yet!)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/cryptoparty-chennai-1/at_download/file"&gt;Here is a Flyer / Printout for you&lt;/a&gt; to spread the message!&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cryptoparty-chennai'&gt;https://cis-india.org/internet-governance/cryptoparty-chennai&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bernadette</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Crypto Party</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-08-01T12:16:52Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/vivek-narayanan-and-r-sivaraman-the-hindu-september-18-2019-chennai-residents-rue-fuzzy-cctv-surveillance">
    <title>Chennai residents rue fuzzy CCTV surveillance</title>
    <link>https://cis-india.org/internet-governance/news/vivek-narayanan-and-r-sivaraman-the-hindu-september-18-2019-chennai-residents-rue-fuzzy-cctv-surveillance</link>
    <description>
        &lt;b&gt;Poor quality of footage, lack of maintenance and inadequate back-up reduce the gadgets’ deterrent value.&lt;/b&gt;
        &lt;p&gt;The article by Vivek Narayanan and R. Srinivasan was &lt;a class="external-link" href="https://www.thehindu.com/news/cities/chennai/you-are-under-fuzzy-cctv-surveillance/article29443198.ece"&gt;published in the Hindu&lt;/a&gt; on September 18, 2019. Pranav M.B. was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last month, Sandeep (name changed), a cyclist, was hit by an ambulance on GST Road near the Madras Export Processing Zone (MEPZ) signal. He was rushed to hospital in the same ambulance. His hopes of finding out who hit him, via CCTV cameras, came crashing after he saw the poor quality of footage that was obtained to identify the vehicle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The police officers in Tambaram themselves told me that the quality of the CCTV cameras was poor and they were unable to trace the number,” said Mr. Sandeep.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the police have been claiming a reduction in crime rates due to CCTV cameras in the city, residents and experts doubt if the equipment is indeed a deterrent, and want the police to install better quality cameras with the capacity to retain footage for a longer period, and to maintain the devices, too.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Extensive Coverage&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Several high profile cases such as the 2016 Swathi murder case drove law enforcers to increase CCTV coverage of the city. Now, there are over 2 lakh cameras covering all of Chennai, its alleys and its fringes.&lt;/p&gt;
&lt;p&gt;Cameras have also been installed at every major junction and at street corners. In many cases, they are linked to the control room of the nearest police station.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the police, there is one CCTV camera for every 50 m. They are meant to help the police crack cases and nab the accused. “Some DVRs (digital video recorders) are also in the house or premises of the sponsors. This is for safety purposes,” said a police officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The unique nature of the Traffic Police’s ‘third eye campaign’ is the involvement of the public, too. Apart from the police, MPs and MLAs, many resident welfare associations have also donated resources for the installation of CCTV cameras.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Residents, however, expressed concern. S. Kumara Raja, vice president, Annai Indira Nagar Residents Welfare Association said: “Though many CCTVs cameras are found on the street, it isn’t clear if they are working or not. We also don’t know if anyone is maintaining the cameras.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;P. Saravanakumar, founder of the South Madipakkam Residents’ Welfare Association, said that the equipment is not connected with the police control room and the data remains with those who have installed the CCTV system.&lt;/p&gt;
&lt;p&gt;V. N. Subramaniyan, president, Mylapore Residents Welfare Association, felt that cameras installed on private properties were working properly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Cameras are obtained from private persons as a charitable activity, so the quality can be challenged. The police should give the maintenance of CCTV cameras to private companies. There should be proper back-up and monitoring,” he pointed out.&lt;/p&gt;
&lt;p&gt;While the equipment is considered important for gathering evidence, policemen themselves complain that the quality of the footage from many cameras is poor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We cannot zoom into the footage obtained from every camera involved. Most of them are 1 or 2 megapixel cameras and the image is often blurred. Only in a few places do we find powerful cameras,” said a policeman.&lt;/p&gt;
&lt;h3&gt;'Not a deterrent'&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Pranav M. B., researcher, Centre for Internet and Society, said that as according to global studies, CCTV cameras are not useful as deterrents. “But they come in handy for providing evidence after a crime,” said Mr. Pranav.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though advanced cameras can provide footage with more clarity, it’s cost intensive to maintain them. “For deterrence, one need not invest in high-end cameras — quality street lights are sufficient. We cannot expect the perpetrator of a crime to make a decision over whether to commit a crime or not after looking at the camera,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there is a 30% higher chance of identifying an accused when a camera is deployed, than without. “Nevertheless, like any other technology or method, it is not entirely foolproof,” Mr. Pranav said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Police officers disagree on the subject of CCTV systems not serving as deterrents. “From January to June 2018, a total of 258 chain snatching incidents were reported, but during the same period this year, the number plummeted to 137 — a fall of nearly 50%,” said a senior police officer.&lt;/p&gt;
&lt;h3&gt;'Needs improvement'&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the police claim that, this year, public nuisance cases have gone down by 41%, and burglary cases by 17%, compared with last year. Police officers agreed that the quality of some cameras needs to be improved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Initially, we did not know the type of quality [of cameras] needed. So, we fixed 1 and 2 megapixel cameras. Now, we are installing 4 megapixel cameras and have better clarity. Besides, we are now categorising the number and type of cameras available in different parts of the city, and will change the older ones,” said a senior police officer.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/vivek-narayanan-and-r-sivaraman-the-hindu-september-18-2019-chennai-residents-rue-fuzzy-cctv-surveillance'&gt;https://cis-india.org/internet-governance/news/vivek-narayanan-and-r-sivaraman-the-hindu-september-18-2019-chennai-residents-rue-fuzzy-cctv-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vivek Narayanan and R. Srinivasan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-09-19T14:35:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts">
    <title>Checks and balances needed for mass surveillance of citizens, say experts</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts</link>
    <description>
        &lt;b&gt;A number of measures are required to protect law-abiding citizens from mass surveillance and misuse of their personal data, according to top technology and legal experts. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Peerzada Abrar was &lt;a class="external-link" href="http://www.thehindu.com/business/Industry/checks-and-balances-needed-for-mass-surveillance-of-citizens-say-experts/article21381478.ece"&gt;published in the Hindu&lt;/a&gt; on December 9, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The measures include issuing of tokens by the Unique Identification  Authority of India (UIDAI) instead of Aadhaar numbers and having an  official in the judiciary give permission to vigilance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  experts were participating in a panel discussion on ‘Navigating Big Data  Challenges’ at Carnegie India’s Global Technology Summit here. They  also said there was a need to implement ‘de-identification of data’ or  preventing a person’s identity from being connected with information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  moderator of the discussion was Justice B.N. Srikrishna, a former  Supreme Court judge, who was also heading a government-appointed  committee of experts to identify “key &lt;a href="http://www.thehindu.com/tag/1401-1400-1349/data-protection/?utm=bodytag"&gt;&lt;b&gt;data protection &lt;/b&gt;&lt;/a&gt;issues”  and recommend methods to address them. Justice Srikrishna told the  panellists that Aadhaar or the unique identification number had  empowered the people. But in situations where the State wants all the  information about citizens from different service providers because of  its suspicions related to terrorism or criminal activity, he asked, what  is the method to create a balance?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Surveillance is like salt in  cooking which is essential in tiny quantities, but counterproductive  even if slightly in excess,” responded Sunil Abraham, executive director  of Bengaluru-based think tank, Centre for Internet and Society. He said  there was a need to make a surveillance system which had privacy by  design built into it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Abraham said that his organisation had  proposed to the UIDAI that it used ‘tokenisation,’ which meant that  whenever there was a ‘know your customer’ requirement, the Aadhaar  number was not accessed by organisations like telecom firms or the  banks. Instead, when the citizens used various services via smart cards  or pins, a token got generated, which was controlled by the UIDAI.  Organisations like banks and telecom firms can store those token numbers  in their database. He said this would make it harder for unauthorised  parties to combine databases. But at the same time would enable law  enforcement agencies to combine database using the appropriate  authorizations and infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“UIDAI is considering this,  they call it the dummy Aadhaar numbers. We need technical as well as  institutional checks and balances,” said Mr. Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Countries  like the U.S also have processes like Foreign Intelligence Surveillance  Court (FISA court) which entertains applications made by the U.S  Government for approval of electronic surveillance, physical search, and  certain other forms of investigative actions for foreign intelligence  purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“My concern is that in the current system, surveillance  can be done by the State machinery. I don’t necessarily suggest FISA  court.... but some kind of mechanism where (one can’t) be held at the  mercy of incestuous State machinery,” said Rahul Matthan, a partner at  law firm Trilegal. “But have some second person who is outside the  influence of this system (and) who actually says ‘yes this is a  terrorist which requires us to do mass surveillance,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Artificial Intelligence&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A  large amount of information or Big data ranging from financial, health  to political insights of people is being collected by different  organisations and service providers which is sitting in different silos.  All of this is likely going to be linked through Aadhaar. Mr.  Srikrishna asked what if a situation arises where all of this data is  aggregated and using artificial intelligence and machine learning, one  is able to analyse it and profile individuals. He said “would that be  not a terrifying scenario” where the State can act super-monitor for  citizens. He asked how can citizens be guarded against it?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr.Srikrishna  was referring to the ‘Social Credit System’ proposed by the Chinese  government for creating a national reputation system to rate the  trustworthiness of its citizens including their economic and social  status. It works as a mass surveillance tool and uses big data analysis  technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is a possibility. What stands in the way of it  becoming a reality (in India) is a robust law,” said Mr.Matthan.  “Technology is so powerful that it could equally be used for good as  well as bad.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts'&gt;https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-12-16T14:32:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/indian-express-june-23-2019-chasing-fame-and-fun-15-seconds-at-a-time">
    <title>Chasing fame and fun 15 seconds at a time: Why TikTok has India hooked</title>
    <link>https://cis-india.org/internet-governance/news/indian-express-june-23-2019-chasing-fame-and-fun-15-seconds-at-a-time</link>
    <description>
        &lt;b&gt;How TikTok, an app owned by a Chinese firm, has become a playground for India’s young.&lt;/b&gt;
        &lt;p&gt;The article by Tora Agarwala, Surbhi Gupta, and Karishma Mehrotra appeared in &lt;a class="external-link" href="https://indianexpress.com/article/express-sunday-eye/all-it-takes-is-15-seconds-tiktok-controversy-tiktok-supreme-court-judgment-5790980/"&gt;Indian Express&lt;/a&gt; on June 23, 2019. Nishant Shah was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“Kaam nai niki? Do you have no other work?” At a banner printing shop in Nagaon, a town in Assam, the middle-aged shopkeeper was bemused. It was the strangest order he had received in a while.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For one, the banner was for a “TikTok” meetup. He had not the slightest inkling of what that was. Second, the two boys who had introduced themselves as hailing from Jamuguri and Raha, smaller towns in the state, insisted that the text incorporate a spelling mistake. “Instead of M-E-E-T up, please write M-E-A-T up,” he was told. The shopkeeper grudgingly obliged and the boys rode off on their bikes. It would be ready the next day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is going to go viral,” Dhurbajit Medhi said triumphantly to his friend PK Nath. They had only known each other for a month, having “met” on TikTok. In April, they sat face-to-face for the first time at a small restaurant in Raha, in Nagaon district, where Medhi lived. Nath had travelled 110 km to meet him.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Medhi was 23, a singer who had dropped out of college because of a death in the family. Nath, about 30, was known in his neighbourhood in Jamuguri for two things: his gela maal dukaan (grocery store) and his penchant to make people laugh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On TikTok, both have followers in thousands. Over a few months, they would chat often, appreciating each other’s videos. “On a sad day, I would scroll through Nath da’s feed and it would make me laugh without fail,” says Medhi, who joined TikTok about a year ago. Many comments on his videos are from girls. “Some say ‘cute’ and some say bhaal laagise (You’re looking good),” says Medhi, who is reasonably tall and sports a goatee on his boyish face.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the year, Medhi has learnt the tricks of the TikTok trade. “There are two kinds of videos which get attention here in Assam: either you do sad, romantic songs. Or you do &lt;em&gt;fotuami&lt;/em&gt; — slapstick humour,” says Medhi, who has made a niche for himself in the former category. He owns an Mi phone, worth Rs 11,000, which he bought a year ago by saving money through his work at his father’s tea shop. “My mother is okay with me making these videos. But she says, ‘Do all this, but think about your life also.’ I get her point but maybe I can make a career out of this,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After all, TikTok is not as easy as &lt;a href="https://indianexpress.com/about/facebook/"&gt;Facebook&lt;/a&gt;. It involves an element of skill. “Do you know how difficult it is to get one TikTok like? On Facebook, you just put a photo and the likes pour in. Here, we have to work hard.” Medhi admits he was naïve initially. “I would make photo-collages from my trips to Kaziranga and add some background music.” But that would not have worked. “The viewer takes into account everything: is our lip-sync matching? Are our clothes suited to the mood of the music? Are our expressions accurate?”&lt;/p&gt;
&lt;p&gt;Today, Medhi has over 400 videos, many of which feature him mouthing lyrics to the songs sung by Assamese musician Zubeen Garg. Sometimes, he sings in his own voice too — a secret talent he has nurtured but not had the opportunity to explore. “In Upper Assam, there is an appreciation for the arts and music. But here in middle Assam, it is different. People would mock, ‘&lt;em&gt;Eeeh gayok hobo ahise&lt;/em&gt;. Look at him trying to be a singer,’” says Medhi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is these aspirations, which often get mowed down by the traditionalism that comes with living in small towns and villages that TikTok is giving oxygen to. The short-form video app has seen a phenomenal growth since its rebranding from Musical.ly in 2018, garnering 200 million users in India alone. Its hallmark is simple: it woos your attention with 15-second videos (they make go up to 60 seconds too) of lip-syncing teenage girls, dancing boys, family pranks and other such stylised moments. The mobile app’s owner, a Chinese internet company called ByteDance, was reportedly awarded a round of major investment from Japanese SoftBank last year, making it the world’s most valuable startup.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TikTok’s rapid capture of India — it skyrocketed past traditional social media mammoths, like Facebook, on global download charts in 2018 — is a testament to how quickly Chinese apps have begun to give American tech companies a run for their money in one of the world’s most important markets. TikTok has given a megaphone to rural Indian life in a way that no other app has been able to; American apps such as Facebook have been restricted to a primarily upper-class user base.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We believe that TikTok filled the gap by bringing people from across the deepest pockets of India online and giving them a platform to express themselves,” said ByteDance’s global public policy director Helena Lersch. Since the company introduced in-feed advertisements and branded editing tools last year, it’s attracted the likes of Pepsi, Myntra, and Dunzo.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If more proof were needed that TikTok has planted itself into the circuitry of desire and aspiration, it came by way of a news report last fortnight. A young man in Delhi, who worked at a restaurant, was arrested for &lt;a class="external-link" href="https://indianexpress.com/article/delhi/man-steals-phone-to-make-tiktok-videos-arrested-5783586/"&gt;snatching an iPhone&lt;/a&gt; XS Max — he wanted to shoot good-quality TikTok videos. Another 19-year-old from Delhi, Salman Zakir, &lt;a class="external-link" href="https://indianexpress.com/article/cities/delhi/delhi-teen-shot-dead-by-friend-while-making-tiktok-video-5675566/"&gt;was shot by his neighbou&lt;/a&gt;r allegedly in the course of making a TikTok video.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But what is the big deal about TikTok? How have 15-second fragments of people being people colonised the attention of so many? Scrolling through the app for the first time, one is struck by how random it is, and how the attention economy has shrunk your mindspan to a quarter of a minute. You could easily tire of teens dancing, making faces and lip-synching in super-tiny skits and video memes. Or, you could watch an entire generation occupy this playground with their energy and creativity, using 15 seconds to mix, mash and play versions of themselves. Preparing a face to meet other excited, silly faces has never been so addictive.&lt;/p&gt;
&lt;p&gt;Social media has put the self at the centre, making opinions out of rants, photographers of anyone with a phone camera, and journalists of citizens. TikTok takes the humdrum, turns it into a form of talent and injects into it the velocity of the fast-travelling video.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, more importantly perhaps, it taps into a confidence in the young — about their lives, abilities and even their humble backgrounds — that was unthinkable a generation ago.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For sure, TikTok could not have spread this way five years ago either. Eighteen-year-old Devanshu Mahajan, an undergraduate student of commerce at Delhi University’s School of Open Learning, agrees. He found himself exploring the internet only after the entry of Reliance Jio in the telecom market. “Before that we used to have 1 GB data for a month. Suddenly, we had 1 GB to spend in a day,” says the Delhi resident. Last year, he started posting videos on TikTok, most of which seemed to disappear into nowhere. “I got so angry that I uploaded a rant about the lack of response, and suddenly it got viral. Then, I started giving my own twist to trending sounds/beats and songs, and these videos started becoming popular,” says Mahajan, who has over eight lakh followers now.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most of his popular posts are about Indian families (“Indian parents wish for boys only to send them to the market to buy milk and vegetables endless times”), school life and being single. They are not particularly witty, but belong to the tradition of native humour that once would make judges mysteriously ROFL on shows like The Great Indian Laughter Challenge. “I make my videos at home, I have no tripod or light, there is one window where I put my phone and act,” says Mahajan, who uses an Mi Y3 phone. With a spiky haircut and a lean frame, he is the picture of ordinariness. “People either say I’m too thin, or comment about my nose or looks. But I make a story out of those comments too. If I can make fun of myself, nothing can affect me,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It may not be like YouTube where one can earn money, but because of this app, I feel like a star now,” says Musaib Bashir Bhat, 27. He joined TikTok seven months ago and his 300 videos in Kashmiri have earned him 73,000 followers already. He is also recognised on the streets of Srinagar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fame is the drug that drives TikTok users, but, for now, at least, this is a following rooted in the local. The app is a Babel of many tongues, and each region has its distinct self-expression — in its aesthetic, looks or music. It hasn’t been monopolised by Hindi film music or Punjabi pop.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ranjan Barman, an 18-year-old living in a small village in Lakhimpur, Assam, loves acting. “I know I can’t be an actor in real life— but at least on TikTok I can,” says the college-goer who joined the app four months ago. He is now nearing his one millionth heart — a commendable feat for someone who is new to the TikTok universe. His popularity, he suspects, could have something to do with the props he uses in his videos. Barman owns 22 gamusa shirts, or shirts fashioned out of the traditional Assamese cloth, and says that whenever he wears them, his videos get more play. “In Assam, people respect the gamusa. It touches sentiments,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But how substantial is this fame? What kind of recognition do TikTokers seek? Last month, Mahajan called for a meet-and-greet with his “fans” at a west Delhi mall. Thirty people showed up. “I hadn’t expected anyone to turn up. People clicked photos and videos, but I didn’t feel like a celebrity,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While TikTok fame comes from the number of followers one has, an important barometer is also the number of hearts you receive. For example, Medhi has only 4,000 followers, but his videos have received 74,500 hearts. The heart tally is an aggregate of the number of likes the creator has garnered across every video he has uploaded. “It is just one viral video you need — and then you are set,” says Medhi, who hasn’t hit the jackpot yet, but is optimistic. “Like all things in life, this, too, takes time,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TikTok has given Aizawl’s Adeline Pach much more than the 5,12,000 followers one sees on her profile. A cancer-survivor, Pach started using it in 2015, when it went by the name Musical.ly, while recovering from her illness. “It was silly, goofy stuff — but it helped take my mind off things,” she says. Even today, she suffers from a number of health issues. But TikTok “distracts her”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pach’s skilful “transition” videos (where one frame would blend to another seamlessly), started getting featured on the app’s homepage. “People liked the way I edited my videos. For example, if I was saying and wearing something in one frame, the next would be in another location, with me doing something else in another outfit,” says Pach, adding that earlier TikTok was more about skill, and now people “blindly heart goofy content.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As Pach, now in her late twenties, kept getting featured, her followers shot up — and for first time in her life, the introvert found herself interacting with people — “and enjoying it. It gave me the confidence I never had.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2017, Pach attended her first TikTok meetup in Mumbai. “That had about 70 people but the next one which took place in Bengaluru had 600,” she says. She performed a rap song by Nicki Minaj in front of a packed auditorium. “Suddenly I was fearless.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For many, TikTok holds out the hope of bigger things to come — a career in music and acting. When he was a teen, Ambish KB’s acting talents — he mimicked his teachers’ mannerisms and got them to laugh — made him almost famous in school. In college, his obsession with films would make him watch first-day, first-show releases of leading Malayalam superstars like Mammootty and Mohanlal. He also held positions in the Ernakulam district unit of the all-Kerala Mammootty fans association. “It’s safe to assume that I spent more time in theatres than in college,” says Ambish, 27, an accountant with a fashion design firm in Kochi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He still has not given up on his acting dreams. For three years now, he has been scouring for small roles, approaching directors, producers and scriptwriters, even as he maintains a job on the side. Not surprisingly, he has taken to TikTok like a duck to water. His account doesn’t boast an envious number of followers (572 at last count) but his videos, most of which are comedy re-enactments of popular scenes from Malayalam cinema, have collected thousands of views and a flood of reactions. He says his videos are all home-produced and mostly filmed in the dead of night once his parents are fast asleep. Many of them are also collaborations with his wife; she’s not mad about cinema like he is, but she likes the fun interface of TikTok. To the point that, at weddings, their relatives call them, “Oh look, here come the TikTok people!”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But more than anything, Ambish believes TikTok could hold his ticket to the film industry. “It’s a medium for people like us to display our talent. Who knows, if my video goes viral and if a casting director happens to notice, I might click,” says Ambish, who spends at least eight hours a day on TikTok. His inspiration is a fellow TikTok user, Fukru, who supposedly landed a role in a film after his dance videos went viral. “He would post videos every day, just random ones of him dancing. Now he’s got a role in the next film by director Omar Lulu. You never know,” Ambish says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ambish is not prepared to leave his job yet, as he understands the film industry is unpredictable. He doesn’t have the means to travel for auditions to faraway towns. But he knows he has a powerful device at his disposal that could get him there: his Huawei P20 Lite smartphone and the TikTok app on it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While future sociologists might mine TikTok to understand the changing mores of a new generation, fears of data mining and privacy intrusions of the app have often been voiced. This year, the US Federal Trade Commission fined the company $5.7 million for illegally collecting the personal data of children. In 2018, Indonesia’s government temporarily banned the platform for “negative”, mostly pornographic and blasphemous, content. The government lifted the ban after the company complied with local laws and stepped up local content moderation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In April, the Madras High Court made a similar interim takedown order, asking Google and Apple to remove TikTok from their app stores, citing pornographic and child exploitation content. Three weeks later, the court lifted the ban after the Supreme Court asked it to address the company’s plea against the takedown, and the app fell from most downloaded to fourth most in India. The company has admittedly decided to “show less skin” here than its other markets. “It’s a bit of a case-to-case basis. There is no clear line I can share with you now. If there is a sexually-explicit video, we take it down. And we are doing this a bit quicker in India,” said Lersch.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Writing in these pages, our columnist Nishant Shah warned about TikTok’s “embrace of artificial intelligence and big data analytics.” “From the minute you sign up for it, giving up your personal information and data to extreme mining which bears the same pitfalls of privacy and surveillance that all other big data apps do, TikTok starts presenting content to you. This is not content created by friends, or colleagues… Instead, this is content created by people you don’t know at all, and brought to you by algorithms that know, even without you telling them what you might like.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The more time you spend … going through complex tutorials to make your own 15-second fun video, the more the machine learning algorithms learn you,” wrote the co-founder of the Centre for Internet and Society. While critics point out that the infantilised world that the app peddles is dangerous to the very personal liberty that it seems to showcase, it’s not an argument that is winning.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But wait, what happened to the “meatup” banner? When Medhi and Nath had met, they rued the little regard their family and friends had for their pursuit. “My friends think I am wasting time,” says Medhi, the only TikToker in Raha. Both knew they had to do something.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They went ahead and organised the first state-wide TikTok meetup in Assam, slated for this Sunday. While there have been meetups before, this is the first time TikTokers from every corner of the state will be in attendance. They expect about 500. How did they manage to do it? “Only negative things go viral on the internet,” says Medhi, “That is why we decided to spell ‘meetup’ as ‘meatup’.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The day the banner was ready and picked up from Nagaon, both Medhi and Nath took a picture of it and put it on the app. As expected, there was an uproar. “Everyone started sharing it. My phone number was on the banner and I would get 10 calls a day. “They would say: Don’t you know how to spell ‘meetup’? Most made fun of me but I didn’t care. Our job was done. The word had spread.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/indian-express-june-23-2019-chasing-fame-and-fun-15-seconds-at-a-time'&gt;https://cis-india.org/internet-governance/news/indian-express-june-23-2019-chasing-fame-and-fun-15-seconds-at-a-time&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Tora Agarwala, Surbhi Gupta, and Karishma Mehrotra</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-07-05T02:13:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/igf-2013-workshop-99-charting-the-charter-internet-rights-and-principles-online">
    <title>Charting the Charter: Internet Rights and Principles Online</title>
    <link>https://cis-india.org/news/igf-2013-workshop-99-charting-the-charter-internet-rights-and-principles-online</link>
    <description>
        &lt;b&gt;This workshop is being organised by IRP Coalition on October 22 in Bali Nusa Dua Convention Centre. Pranesh Prakash is participating as a panelist.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;i&gt;The Internet Governance Forum 2013 is being held at Bali from October  22 to 25. The overarching theme for the 2013 IGF meeting is: "Building  Bridges"- Enhancing Multistakeholder Cooperation for Growth and  Sustainable Development"&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.intgovforum.org/cms/wks2013/workshop_2013_status_list_view.php?xpsltipq_je=99"&gt;Read the original published on the IGF website&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Theme: Human Rights / Freedom of Expression on the Internet&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Since the Charter of Internet Rights and Principles was developed dialogue about diverse internet related human rights issues have emerged in various UN human rights mechanisms e.g. racism/racial discrimination, human rights defenders, women's human rights, freedom of association, business and human rights, protection of cultural heritage.  The workshop will map the issues under discussion in the UNHRC against those in the Charter of Human Rights and Principles for the Internet (‘IRP Charter’) and explore multistakeholder perspectives and best practice examples of adherence to the Charter and human rights standards from diverse regions.  &lt;br /&gt;&lt;br /&gt;The focus is on progress, opportunities and challenges to monitor and advocate for the IRP Charter provisions particularly for marginalised groups e.g. rural and indigenous peoples, disabled people, urban poor as the second part of the two workshops put forward by the IRP Coalition and partners. Wider questions that the workshop looks to cover include: How are understandings about the interrelationship of internet governance and human rights standards developing at the Human Rights Council?  Aside from freedom of expression and the right to Privacy, what other human rights are important in relation to the internet? How can the Charter be used to broaden the engagement of the Human Rights Council in internet governance issues? How does the work of the HRC inform the Charter, and other internet policy documents and mechanisms? &lt;br /&gt;&lt;br /&gt;Since the 2009 IGF, the Internet Rights and Principles Coalition has organised a range of workshops and Coalition meetings looking at the application of human rights standards (primarily those espoused in the Universal Declaration of Human Rights, the International Covenant on Civil and Political Rights and the International Covenant on Economic, Social and Cultural Rights) to the Internet. In 2010 the previous draft of the IRP Charter (http://internetrightsandprinciples.org/site/charter/) was launched with a rigorous discussion about what correct interpretation of existing standards is and the role of different stakeholders in relation to these.&lt;br /&gt;&lt;br /&gt;In 2011 the IRP Charter was distilled down to 10 key advocacy points, the Ten Internet Rights and Principles (http://internetrightsandprinciples.org/site/campaign/). These were debated as the Coalition undertook a closer analysis of the issue of copyright protection and how it interrelated with human rights on the internet. In 2012 the Coalition looked at how the Charter was feeding in to a derivative initiative at the Council of Europe to create a user-friendly Compendium of rights of internet users. The Coalition made a close analysis of the issue of anonymity online. This year we want to focus on human rights which, while contained in the Charter, have not received high levels of attention. We also want to loop in the work of Coalition members working on human rights, women’s rights, social, cultural and economic rights as well as the recent work of the Human Rights Council (which is the most authoritative global body applying human rights to the Internet) to incorporating human rights as an integral part of the internet governance field.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Has the proponent organised a workshop with a similar subject during past IGF meetings?&lt;br /&gt;&lt;/b&gt;Yes&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indication of how the workshop will build on but go beyond the outcomes previously reached &lt;/b&gt;&lt;br /&gt;The IRP Coalition launched the IRP Charter and Ten Principles in  2010/2011 (www.internetrightsandprinciples.org). These launches started a  vigorous and productive chain of discussions and outreach initiatives  in and around IGF Meetings. These were followed up in 2011 and 2012 with  IGF workshops that focused in specific issues such as copyright, access  as a right, and existing rights of internet users.   This year we focus on human rights which, while contained in the  Charter, have not received high levels of attention. We also want to  loop in the work of Coalition members working on human rights, women’s  rights, social, cultural and economic rights as well as the recent work  of the Human Rights Council (which is the most authoritative global body  applying human rights to the Internet) to incorporating human rights as  an integral part of the internet governance field. Recent events  underscore that the moment has come to ground human rights principles in  internet governance practice as this affects everyday life, work, and  government.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Background Paper&lt;/h3&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.intgovforum.org/cms/wks2013/workshop_background_paper/65_1373459172.pdf"&gt;Download Background Paper&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Session Type: Roundtable&lt;/p&gt;
&lt;h3&gt;Co-organisers&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Ms. Dixie Hawtin, Global Partners and Associates, Private Sector, Western Europe and Others Group - WEOG&lt;/li&gt;
&lt;li&gt;Ms. Joy Liddicoat, Association for Progressive Communications, Civil Society, New Zealand, Asia-Pacific Group&lt;/li&gt;
&lt;li&gt;Ms. Marianne Franklin, Goldsmiths (University of London, UK)/ IRP Coalition), Civil Society, United Kingdom, Western Europe and Others Group - WEOG&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Have the Proponent or any of the co-organisers organised an IGF workshop before? &lt;/b&gt;&lt;br /&gt;Yes&lt;/p&gt;
&lt;p&gt;The link(s) to the workshop report(s)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://wsms1.intgovforum.org/content/no145-threats-multi-stakeholder-internet-governance-–-it-worth-protecting#report"&gt;http://wsms1.intgovforum.org/content/no145-threats-multi-stakeholder-internet-governance-%E2%80%93-it-worth-protecting#report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://wsms1.intgovforum.org/content/no157-access-internet-human-right"&gt;http://wsms1.intgovforum.org/content/no157-access-internet-human-right&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://wsms1.intgovforum.org/content/no128-empowering-internet-users-–-which-tools#report"&gt;http://wsms1.intgovforum.org/content/no128-empowering-internet-users-%E2%80%93-which-tools#report&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Panelists&lt;/h3&gt;
&lt;p&gt;Please click on the biography to view the profile of the panelists:&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; &lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Joy Liddicoat, Association for Progressive Communications, Female, Civil Society, New Zealand, Western Europe and Others Group – WEOG&lt;a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=111" target="_blank"&gt;&lt;br /&gt;Biography&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Frank La Rue, United Nations, Male, Civil Society, Guatemala, Latin American and Caribbean Group - Grulac&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Asif Kabani, Ministry of Finance, Male, Government, Pakistan, Asia-Pacific Group&lt;a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=156" target="_blank"&gt;&lt;br /&gt;Biography&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Carl Fredrik Wettermark, Ministry of Foreign Affairs, Male, Government, Sweden, Western Europe and Others Group – WEOG&lt;a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=158" target="_blank"&gt;&lt;br /&gt;Biography&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Marianne Franklin, (IRP Coalition/Goldsmiths (University of London, UK), Female, Civil Society, New Zealand, Asia-Pacific Group&lt;a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=153" target="_blank"&gt;&lt;br /&gt;Biography&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Pranesh Prakash, Centre for Internet and Society, Male, Civil Society, India, Asia-Pacific Group&lt;a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=154" target="_blank"&gt;&lt;br /&gt;Biography&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Cornelia Kutterer, Microsoft, Female, Private Sector, BELGIUM, Western Europe and Others Group – WEOG&lt;a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=155" target="_blank"&gt;&lt;br /&gt;Biography&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Michael Rotert, eco-German Internet Industry, Male, Technical Community, Germany, Western Europe and Others Group – WEOG&lt;a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=157" target="_blank"&gt;&lt;br /&gt;Biography&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Moderator&lt;/h3&gt;
&lt;p&gt;Dixie Hawtin, Global Partners and Associates&lt;/p&gt;
&lt;h3&gt;Remote Moderator&lt;/h3&gt;
&lt;p&gt;Rebecca Zausmer, Global Partners and Associates&lt;/p&gt;
&lt;h3&gt;Agenda&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This round table session explores the opportunities and challenges for upholding human rights standards on the internet using the IRP Charter of Human Rights and Principles for the Internet (http://internetrightsandprinciples.org/site/charter/). In tandem with the session on Disabilities and Indigenous rights this session aims to:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Address a number of human rights – moving beyond freedom of expression and privacy - to consider the IRP Charter provisions for socio-economic rights, education, women’s rights and rights of the visually impaired in the online environment.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Provide an assessment of the implementation of human rights standards on the internet o date.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Feed recommendations in to the IRP Coalition initiative to create a final version of the IRP Charter (in terms of substance, process, and uses of the document in practice)&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The session will start by focusing on a selection of concrete examples (such as, the PRISM revelations, the Marrakesh Treaty on exceptions and limitations to copyright for the blind, racial discrimination, education rights online) before opening to a wider discussion. It brings together diverse perspectives on the relationship between human rights and internet policy, where the human rights movement needs to engage more or more effectively, and how the IRP Charter should be developed to assist this process. The outcomes of the workshop will feed into the IRP Coalition Meeting, ‘Towards the IRP Charter 2.0’.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Inclusiveness of the Session&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Panellists will make short initial statements of up to 3 minutes, each will be tasked with a particular perspective to bring and enable several rounds of the table. It will also allow ample time for audience questions and comments. The audience will be invited to ask questions, and to answer questions which the moderators will pose to the floor.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Suitability for Remote Participation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Both the IRP and the APC have a good track record of marketing their workshops across a range of email lists, websites and social media to ensure that potential remote participants know about the workshop and can participate. Remote participants will be engaged by the remote moderator who will pose questions to them and facilitate an active remote conversation alongside the conversation in situ– making links between the two wherever possible.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Questions or Comments&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Please note that Mr Frank La Rue has been invited. As his office needs some time to respond we have included his name as an unconfirmed participant for the time being. &lt;br /&gt;&lt;br /&gt;Also a note on the number of participants:&lt;br /&gt;As this is a roundtable, open discussion format there are more than five speakers in order to generate the range and depth needed for this sort of interactive and dynamic discussion. The IRP Coalition has taken the lead in instigating these sorts of discussion formats in multistakeholder meetings such as the UNESCO WSIS+10 event and the Lisbon EuroDIG. The session moderator is experienced for this format and the participants aware that long speeches are not required.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/igf-2013-workshop-99-charting-the-charter-internet-rights-and-principles-online'&gt;https://cis-india.org/news/igf-2013-workshop-99-charting-the-charter-internet-rights-and-principles-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-10-21T07:03:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/alexander-von-humbodt-institute-for-internet-november-22-chances-and-risks-of-social-participation">
    <title>Chances and Risks of Social Participation</title>
    <link>https://cis-india.org/news/alexander-von-humbodt-institute-for-internet-november-22-chances-and-risks-of-social-participation</link>
    <description>
        &lt;b&gt;Participation is a key issue within Internet research and hence also for the Alexander von Humboldt Institute for Internet and Society. For this reason the institute is going to host a thematically focused meeting on Chances and Risks of Social Participation in Berlin on 22 November 2013 in co-operation with the Friedrich Ebert Foundation.&lt;/b&gt;
        &lt;p&gt;Nishant Shah gave the keynote for this event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Morning Session&lt;/b&gt;&lt;br /&gt;&lt;i&gt;by invitation only&lt;/i&gt;&lt;br /&gt;International senior researchers from a broad field of disciplines are invited to join the discussion and contribute with their expertise to various sessions as well as a public panel discussion. Thereby, the institute aims to push ahead research and exchange of ideas around the field of participation ranging from encouragement in context of democracy to the impact on innovation management.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Public Afternoon: Online into Politics?&lt;/b&gt;&lt;br /&gt;&lt;i&gt;open to the public, &lt;a href="http://www.hiig.de/en/events/internet-and-partizipation/#Anmeldung"&gt;registration &lt;/a&gt;required&lt;/i&gt;&lt;br /&gt;In the afternoon, the meeting will be opened to the public. We are pleased to announce that Helen Margetts, director of the Oxford Internet Institute (OII) has agreed to hold a keynote. We are also excited to be able to share first findings from a study on the e-petition platform of the German parliament, the Bundestag, with the attendants. Representatives of politics and society will reveal national perspectives on political participation within the concluding panel discussion.&lt;/p&gt;
&lt;h3 class="western"&gt;Side Events&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This meeting adds to the activities of the newly founded Network of Internet &amp;amp; Society Research Centers (NoC). Alongside the meeting on participation the annual &lt;a href="http://www.hiig.de/events/12286/"&gt;Early Stage Researchers Colloquium&lt;/a&gt; and a meeting of participants of the Network of Centers will take place – guaranteeing fruitful and inspiring discourses across disciplines and research institutions.&lt;/p&gt;
&lt;h3 class="western"&gt;Hosts and Co-Hosts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The event is hosted in co-operation with the Friedrich Ebert Foundation and serves as a Network of Centers (NoC) regional event. The event is furthermore supported by the British Embassy Berlin.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/chances-risks-social-participation.pdf" class="internal-link"&gt;Click to download the brochure of the event&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/alexander-von-humbodt-institute-for-internet-november-22-chances-and-risks-of-social-participation'&gt;https://cis-india.org/news/alexander-von-humbodt-institute-for-internet-november-22-chances-and-risks-of-social-participation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-11-30T09:19:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cert-ins-proactive-mandate-a-report-on-indian-computer-emergency-response-teams-proactive-mandate-in-indian-cyber-security-ecosystem">
    <title>CERT-In's Proactive Mandate - A Report on the Indian Computer Emergency Response Team’s Proactive Mandate in the Indian Cyber Security Ecosystem</title>
    <link>https://cis-india.org/internet-governance/blog/cert-ins-proactive-mandate-a-report-on-indian-computer-emergency-response-teams-proactive-mandate-in-indian-cyber-security-ecosystem</link>
    <description>
        &lt;b&gt;CERT-IN’s proactive mandate is defined in the IT Act, 2000 as well as in the Information Technology (The Indian Computer Emergency Response Team and Manner of Performing Function and Duties ) Rules, 2013 (CERT-In Rules, 2013) both of which postdate the existence of the organisation itself, which has been operational since 2004. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Regarding the proactive mandate, the IT Act and CERT-In Rules include the following areas where CERT-In is required to carry out proactive measures in the interests of cyber security:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Forecast and alert cyber security incidents (IT Act, 2000) &amp;amp; Predict and prevent cyber security incidents (CERT-In Rules, 2013)&lt;/li&gt;
&lt;li&gt;Issue guidelines, advisories and vulnerability notes etc. relating to information security practices, procedures, prevention, response and reporting (IT Act, 2000)&lt;/li&gt;
&lt;li&gt;Information Security Assurance (CERT-In Rules, 2013)&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This article will track and analyse the CERT-In’s operations in each of these areas over the past twelve years, by analysing the information available on CERT-In’s website as well as other media in the public domain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The analysis will be carried out using a mixed methodology. The basic quantitative analysis of the information available on the CERT-In’ website will be carried out in the form of simple comparatives of updates, bulletins and other forms of publicly available interaction and critical information dispersal on CERT-In’s website. The qualitative sections, on the other hand, will contain a comparative analysis of the content present in the technical documents of the CERT-In with the equivalent documentation (where present) of similar bodies in the USA and EU. Each section will then illustrate normative suggestions as to how CERT-In’s performance of that respective obligation can be improved to better serve its cyber security mandate.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cert-ins-proactive-mandate.pdf"&gt;Read the full article&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The image is published under Creative Commons License CC BY-SA. Anyone  can distribute, remix, tweak, and build upon this document, even for  commercial purposes, as long as they credit the creator of this document  and license their new creations under the terms identical to the  license governing this document&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cert-ins-proactive-mandate-a-report-on-indian-computer-emergency-response-teams-proactive-mandate-in-indian-cyber-security-ecosystem'&gt;https://cis-india.org/internet-governance/blog/cert-ins-proactive-mandate-a-report-on-indian-computer-emergency-response-teams-proactive-mandate-in-indian-cyber-security-ecosystem&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tiwari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-11-19T04:14:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy">
    <title>Centre’s order on computer surveillance threatens right to privacy, experts say</title>
    <link>https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy</link>
    <description>
        &lt;b&gt;The Constitutional validity of the notification allowing ten agencies to intercept information is uncertain.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Abhishek Dey was &lt;a class="external-link" href="https://scroll.in/article/906623/centres-order-on-computer-surveillance-threatens-right-to-privacy-experts-say"&gt;published in Scroll.in&lt;/a&gt; on December 22, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A notification issued by the Union Ministry of Home Affairs on  Thursday allowing ten agencies to intercept, monitor and decrypt any  information generated from any computer poses a grave threat to the &lt;a href="https://scroll.in/article/848321/supreme-courts-decision-that-privacy-is-a-fundamental-right-is-not-just-about-aadhaar"&gt;fundamental right&lt;/a&gt; to privacy, said lawyers and cyber security experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  notification led to a political storm on Friday and criticism from the  Opposition forced Parliament to be adjourned. However, Union Finance  Minister Arun Jaitley &lt;a class="link-external" href="https://indianexpress.com/article/india/oppn-making-a-mountain-where-molehill-does-not-exist-jaitley-on-mhas-surveillance-order-5504009/" rel="nofollow" target="_blank"&gt;accused&lt;/a&gt; the Opposition of “making a mountain where a molehill does not exist”.  The government on Friday issued a clarification stating that the  directive does not confer any new powers on it and has the legal backing  of the Information Technology Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts agreed that Thursday’s notification lists powers &lt;a href="https://scroll.in/article/906579/home-ministry-order-on-computer-surveillance-is-not-new-upa-introduced-provisions-in-2008"&gt;already available&lt;/a&gt; to the authorities in the Information Technology Act 2000. The legal  provisions to allow interception were introduced in 2008 by the  Congress-led United Progressive Alliance government. However, with the  fresh directive, experts said that the Bharatiya Janata Party-led  government seems to be trying to formalise surveillance through the  interception of computer information, they said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is true that  such [interception] powers already existed,” said Pavan Duggal, a  lawyer with expertise in cyber security. “But neither any such formal  directives were issued which I know of, nor any agency were specifically  notified to have those powers.”&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block" style="text-align: justify; "&gt;&lt;b&gt;Privacy test&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  Information Technology Act 2000 was amended in 2008 to allow to the  monitoring and interception of computer information, while the rules  under which this would operate were &lt;a class="link-external" href="http://meity.gov.in/writereaddata/files/Information%20Technology%20%28Procedure%20and%20Safeguards%20for%20Interception%2C%20Monitoring%20and%20Decryption%20of%20Information%29%20Rules%2C%202009.pdf" rel="nofollow" target="_blank"&gt;promulgated&lt;/a&gt; in 2009. In 2017, the Supreme Court delivered a judgment establishing  privacy as a fundamental right. The legal foundation of the computer  interception directive could be still be challenged in court because it  has not yet been considered in light of the privacy judgment, said  Duggal. “It is now a matter of Constitutional validity,” he said&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thursday’s  notification lists the agencies authorised to intercept, monitor and  decrypt computer data: the Intelligence Bureau, Narcotics Control  Bureau, Enforcement Directorate, Central Board of Direct Taxes,  Directorate of Revenue Intelligence, Central Bureau of Investigation,  National Investigation Agency, Cabinet Secretariat (RAW), Directorate of  Signal Intelligence (for service areas of Jammu and Kashmir, North East  and Assam) and the Commissioner of Police, Delhi. The Act provides a  jail term of seven years for anyone who refuses to cooperate with these  agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Friday, experts questioned whether a notification listing the 10  agencies had actually been issued earlier, as the Centre claimed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It  is a fresh notification,” said Apar Gupta, a lawyer who specialises in  technology and media issues. “With this, interception of computers has  received formal acceptance in the public domain and it can have serious  implications on privacy.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Senior officials of the Delhi Police  also said this appeared to be a fresh order. Asked if this meant that  the agencies would not need to ask for authorisation in every case since  a blanket order has been issued, the officials said that this still  needs to be clarified.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block" style="text-align: justify; "&gt;&lt;b&gt;Lacking proportionality&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  order has raised questions about the validity of the cases of  interception of computer information conducted by the state police and  other security agencies between 2009 (the year the interception rules  were promulgated) and 2018 (the year the notification has been issued),  Pranesh Prakash, co-founder of the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One possibility, he said, may be that they were all unlawful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But  if they were indeed conducted with legal backing, Prakash said, then  permission for this would  been sanctioned in the form of an order by a  competent authority. This is what Rule 3 of the &lt;a class="link-external" href="http://meity.gov.in/writereaddata/files/Information%20Technology%20%28Procedure%20and%20Safeguards%20for%20Interception%2C%20Monitoring%20and%20Decryption%20of%20Information%29%20Rules%2C%202009.pdf" rel="nofollow" target="_blank"&gt;interception rules&lt;/a&gt; mandate. But if so, Rule 4, which deals with the government authorising  agencies to conduct such interceptions, is redundant. “How can it not  be when any state police or other agency is capable of acquiring an  order for interception under Rule 3?” he said&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides, Prakash said, the new directive does not pass the test of proportionality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  2007, the Central government introduced rules to amend the Indian  Telegraph Act 1951 to allow for information to be intercepted, Prakash  said. However, the rules say that the competent authority should resort  to interception only after considering all alternative means to acquire  information. Thursday’s directive, though, is silent about the  circumstances in which interception will be permitted, he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy'&gt;https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-25T00:50:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
