<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2536 to 2550.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-july-9-2018-69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/wsj-march-4-2013-dhanya-ann-thoppil-chidambaram-to-talk-budget-on-google-hangout"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cryptoparty-chennai"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/vivek-narayanan-and-r-sivaraman-the-hindu-september-18-2019-chennai-residents-rue-fuzzy-cctv-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/indian-express-june-23-2019-chasing-fame-and-fun-15-seconds-at-a-time"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/igf-2013-workshop-99-charting-the-charter-internet-rights-and-principles-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/alexander-von-humbodt-institute-for-internet-november-22-chances-and-risks-of-social-participation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cert-ins-proactive-mandate-a-report-on-indian-computer-emergency-response-teams-proactive-mandate-in-indian-cyber-security-ecosystem"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/scroll-nehaa-chaudhari-and-tuhina-joshi-december-23-2018-centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-sanjeeb-mukherjee-july-14-2017-centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-joins-dynamic-coalition-for-platform-responsibility"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-august-21-2018-centre-draws-red-lines-for-whatsapp-over-fake-news-says-must-comply-with-indian-laws"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-june-2-2017-nidhi-sharma-centre-brings-in-new-safeguards-following-cases-of-aadhaar-data-leaks-on-government-websites"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-july-9-2018-69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that">
    <title>Child-lifting rumours caused 69 mob attacks, 33 deaths in last 18 months</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-july-9-2018-69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that</link>
    <description>
        &lt;b&gt;45 persons were killed in 40 cases of mob lynching across nine states between 2014 and 3 March 2018 according to data.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="https://www.business-standard.com/article/current-affairs/69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that-118070900081_1.html"&gt;Business Standard&lt;/a&gt; on July 9, 2018. Swaraj Paul Barooah was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Two incidents of mob violence reported from Dima Hasao in Assam and  Mangaluru in Karnataka on July 6, 2018, take to 61 the number of &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=mob+attacks" target="_blank"&gt;mob attacks &lt;/a&gt;sparked by rumours of child-lifting circulated on social media since beginning of the year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So far this year, 24 persons have been killed in such mob attacks, an &lt;b&gt;IndiaSpend&lt;/b&gt; &lt;a href="http://bit.ly/attacks-childlifting"&gt;analysis&lt;/a&gt; of news reports from across India shows. This is more than 4.5 times  rise in attacks and two-fold rise in deaths of this kind over 2017, when  11 persons were killed in eight separate attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Between January 1, 2017, and July 5, 2018, 33 persons have been killed  and at least 99 injured in 69 reported cases. In the first six days of  July alone, there have been nine cases of mob violence over &lt;a class="storyTags" href="https://www.business-standard.com/topic/child-lifting" target="_blank"&gt;child lifting &lt;/a&gt;rumours and five deaths, which amounts to more than one attack recorded every day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In all cases, the victims were assaulted on mere suspicion and no evidence of &lt;a class="storyTags" href="https://www.business-standard.com/topic/child-lifting" target="_blank"&gt;child lifting &lt;/a&gt;was  found later. So far, police across states have arrested at least 181  persons in connection with 21 cases, according to information from the  news reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On July 5, 2018, the central home ministry had &lt;a href="https://www.firstpost.com/india/mha-asks-states-uts-to-check-mob-lynching-incidents-tells-them-to-detect-child-lifting-rumours-early-4672261.html/amp?__twitter_impression=true"&gt;directed&lt;/a&gt; all states and union territories to contain mob-lynchings fuelled by  rumours of child-lifting on social media. Nevertheless, two attacks were  reported on July 6, 2018–a father travelling with his own son in  Karnataka, and three &lt;i&gt;sadhus&lt;/i&gt; or ‘holy men’ travelling in Assam.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prior to 2017, one mob &lt;a class="storyTags" href="https://www.business-standard.com/topic/lynching" target="_blank"&gt;lynching &lt;/a&gt;was  recorded in August 2012, in which a driver was killed in Patna, Bihar,  on suspicion of kidnapping a minor, according to our database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The spike in these lynchings over the past year follows a rise in bovine-related hate violence, as recorded in &lt;b&gt;IndiaSpend&lt;/b&gt;’s &lt;a href="http://data.indiaspend.com/"&gt;database&lt;/a&gt; on cow-related hate crime. Incidents of &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=mob+attacks" target="_blank"&gt;mob attacks &lt;/a&gt;on persons suspected of killing cows have become deadlier during this period, with more deaths reported in attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social and political commentators have blamed this violence on a rise  in socio-political and religious cleavages, a rise of vigilantism and an  apparent atmosphere of impunity for attackers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The violence started with cow-related vigilantism but it is now  building up more violent behaviour–from small to big reasons anything  could be the trigger,” psychologist Upneet Lalli, deputy director of the  Institute of Correctional Administration in Chandigarh, told &lt;b&gt;IndiaSpend&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Videos of people tied and beaten, begging mobs to spare their lives,  have been circulating on WhatsApp groups and other social media,  affecting people everywhere, she said, adding, “Once set off for any  reason, mob hysteria is extremely difficult to control.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media is aiding and abetting the process, criminologist Vijay  Raghavan, dean of the social protection office at the Tata Institute of  Social Sciences, told &lt;b&gt;IndiaSpend&lt;/b&gt;, adding that the growing violence is “clearly being orchestrated by vested interests”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“A rumour starts in one part of the country and travels to other parts  like wildfire–first it was beef, now it is child lifting,” he said. In  most cases, the victims and the attackers belong to communities  historically pitted against each other, he said, “This changing  narrative has a clear pattern of violence that is basically preying on  traditional insider-outsider perceptions.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Our analysis&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To analyse instances of mob violence related to child-lifting rumours,  our team collected, studied and cross-verified print and online news  reports in the English media, which tend to have the widest nationwide  coverage, since 2010. All reported incidents were cross-referenced to  eliminate discrepancies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="http://bit.ly/attacks-childlifting"&gt;dataset&lt;/a&gt; thus  created includes the number of mob attacks, the severity of each attack  and details of the victims. Most entries include the names of districts,  towns and villages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since each observation is based on a newspaper report of the crime,  availability of details such as the severity of crime, the number of  victims and their identities and ethnicities varies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before 2017, only one incident was reported in 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jharkhand, Maharashtra deadliest&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among all states and union territories, Jharkhand and Maharashtra, with  seven and five deaths, respectively, reported the highest death toll.  The chances of death in such attacks in these states stood at 350% and  167%, respectively, meaning every reported incident led to more than one  death.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Odisha, under the Biju Janata Dal government, reported the most number  of attacks, 15, which resulted in one death. Tamil Nadu, run by the All  India Anna Dravida Munnetra Kazhagam (AIADMK), followed with nine cases  and four deaths.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One-third or 30% of attacks were reported from states ruled by the  Bharatiya Janata Party, which also runs the central government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the 19 months since January 2017, 10 districts across 16 states have  reported more than one case of mob violence. Jeypore, Mayurbhanjh and  Rayagada in Odisha and Visakhapatnam in Andhra Pradesh have reported  three separate incidents each.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More than half or 56% of the attacked victims were men, 22% women, 3%  transgender, and for the remaining 18%, the gender was not mentioned in  the news reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among those killed, 14 were Hindus, 3 Muslims, and in 16 cases the religious/ethnic identity was not reported.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;No correlation between rise in reported child kidnappings and spread of mob violence&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Except in Maharashtra, these incidents of violence do not reflect an increase in child kidnapping cases recorded in &lt;a class="storyTags" href="https://www.business-standard.com/category/current-affairs-news-national-1150106.htm" target="_blank"&gt;National &lt;/a&gt;Crime Records Bureau (NCRB) &lt;a href="http://ncrb.gov.in/StatPublications/CII/CII2016/pdfs/Table%202C.2.pdf"&gt;data&lt;/a&gt; from 2014 to 2016.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the two years from 2014, India recorded a 41% rise in kidnapping and  abduction of children–from 38,555 in 2014 to 54,328 in 2016–primarily  in Uttar Pradesh (9,678), Maharashtra (8,260) and Delhi (6,254), NCRB  data show.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As of 2016, Maharashtra, the second-most populous state in India,  reported the second-highest number of child abductions. It has also  reported the second-highest toll from mob lynchings over child-lifting  rumours.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there was no such correlation in Uttar Pradesh and Delhi,  which the NCRB ranked first and third for the number of reported child  abductions and kidnappings (which are defined differently in law but  basically involve seizing by force and against the victim’s will).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jharkhand, which reported the highest death toll from mob lynchings,  ranked 19 across India for reported child abductions in 2016, as per  NCRB data. Tripura, where five people were killed, ranked 24.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This may suggest that fears of &lt;a class="storyTags" href="https://www.business-standard.com/topic/child-lifting" target="_blank"&gt;child lifting &lt;/a&gt;are  unfounded and exaggerated. “There is no correlation because the  instigators of this violence are not prompted by a genuine fear of  kidnapping,” Raghavan said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the data do not account for cases that go unreported–families  are hesitant to approach the police, who are seen to be unsympathetic  and intimidating–or cases lost in communication between states and NCRB.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The violence is also indicative of how people have lost faith in law  enforcement and criminal justice systems to act decisively against child  lifting, Lalli said, adding, “Losing faith in the law of the land is a  serious threat to society.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mob psyche is different from individual psyche, she said, “When an  individual acts, there is a sense of responsibility, but in a mob, there  is a dispersion of responsibility and guilt.” The mob justifies its act  as heroism to save the community, their identity, their children,  themselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of the children kidnapped or abducted in 2016, 73% were female and 27%  male, NCRB data show. Of the total child victims, 31% (16,938) were  kidnapped or abducted for the purpose of marriage, of which only one  victim was male; 3% (1,562 female and 26 male) for illicit intercourse;  and 1% each for other unlawful activity and adoption. No purpose was  mentioned in fully 62% of cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;77% attacks attributed to fake news&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of the 69 mob violence cases related to rumours of child lifting that  have been reported, 77% were eventually attributed to fake news spread  through social media. Mobile messenger application Whatsapp, in  particular, featured as the rumour source in 28% or 19 of the cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ministry of electronics and information technology on July 2, 2018,  issued a warning to Whatsapp, observing that “instances of &lt;a class="storyTags" href="https://www.business-standard.com/topic/lynching" target="_blank"&gt;lynching &lt;/a&gt;of  innocent people because of large number of irresponsible and explosive  messages filled with rumours and provocation are being circulated on  WhatsApp”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Such a platform cannot evade accountability and responsibility  especially when good technological inventions are abused by some  miscreants who resort to provocative messages which lead to spread of  violence,” the ministry said subsequently in a &lt;a href="http://www.pib.nic.in/PressReleseDetail.aspx?PRID=1537502"&gt;press release&lt;/a&gt; on July 3, 2018, stating clearly that “WhatsApp must take immediate  action to end this menace and ensure that their platform is not used for  such malafide activities”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;About 13% or 200 million of WhatsApp’s 1.5 billion users are Indian, &lt;i&gt;The Financial Express &lt;/i&gt;&lt;a href="https://www.financialexpress.com/industry/technology/whatsapp-now-has-1-5-billion-monthly-active-users-200-million-users-in-india/1044468/"&gt;reported&lt;/a&gt; on February 1, 2018. This is 42% of India’s 481 million internet users &lt;a href="https://timesofindia.indiatimes.com/business/india-business/number-indian-internet-users-will-reach-500-million-by-june-2018-iamai-says/articleshow/62998642.cms"&gt;recorded&lt;/a&gt; as of December 2017.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a letter to the ministry shared with &lt;b&gt;IndiaSpend&lt;/b&gt;,  the WhatsApp management said it was “horrified by these terrible acts of  violence” and listed out the steps it has taken to curb the spread of  fake news but emphasised that the challenge “requires government, civil  society and technology companies to work together”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It maintained, however, that messages would continue to have end-to-end  encryption to protect users’ privacy and security, encryption being key  to WhatsApp’s messaging service. It added that no more than a quarter  of WhatsApp users are part of groups; that the majority of groups are  small (with fewer than 10 members); and nine in 10 messages are sent  from just one person to another.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber privacy experts caution against overreacting against WhatsApp and  other social media platforms, arguing in favour of free speech and  privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In June, after two cases of mob lynching in Tripura, the government  tried to control the situation by shutting down the internet in the  area, reports included in our database said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is “a slippery slope to quell dissent”, Swaraj Barooah, director  at the Centre for Internet and Society, a Bengaluru-based  not-for-profit, said, adding, “There are indications that marginalised  groups tend to be affected more strongly than others when there are  internet shutdowns.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lynchings point to a much larger issue than the ubiquitous presence of  social media, experts said. “Everyone is focusing on these being  rumours–and of course the platform’s ability to exponentially magnify  the speed and reach of a message being sent is very relevant–but when  and why did we normalise vigilante justice in the first place?” said  Barooah. “For instance, would this type of action be okay if these were  not rumours, but had actually been true?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The root problem is those exploiting historical animosities between  communities. We need to properly investigate on a national-level who are  the instigators and what are they after–merely arresting people after  an incident is not enough,” professor Raghavan said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Barooah also warned against attempts to force WhatsApp to provide security agencies with decrypted data, as the government had &lt;a href="https://economictimes.indiatimes.com/industry/telecom/government-blackberry-end-dispute-over-interception-of-bb-devices/articleshow/20995830.cms"&gt;forced&lt;/a&gt; the Canadian smartphone maker Blackberry to do in 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Given that it is already unsure of the extent to which WhatsApp shares  metadata with governments, it is important to ensure that its  end-to-end encryption facility is not weakened,” Barooah said. “There  are certain delicate trade-offs that can be made, but if they are, they  should not be made as a knee-jerk reaction to ongoing events but after  careful consideration of all the pitfalls. This is especially important  in India, given the lack of a privacy law as well as concerns of  chilling effects on free speech that are present.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some solutions he suggested include making it mandatory that WhatsApp  forwards and memes contain originator details, and that a “fact check  this” option be inserted at the user end to allow a message to be  decrypted. He also suggested that a database of ‘reported hashes’ be  created, which all users could download, and which would automatically  rate messages on ‘trust’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is also important to help people identify fake news and question the  information they receive, experts say, pointing out that while India  has low literacy and education levels, even highly literate people are  not free from confirmation bias.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We really need to educate people–people naively believe everything  they read as true. We’re not doing anything about critical thinking and  critical inquiry–we’ve stopped being questioning and that’s a very  important part of countering fake news,” Lalli said, adding, “We don’t  even respond to information, we’re only reacting.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How recent attacks tie in with bovine-related vigilantism and violence&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IndiaSpend &lt;/b&gt;has been maintaining a &lt;a href="http://data.indiaspend.com/"&gt;database&lt;/a&gt; of bovine-related violence since 2010, which shows a spurt in violence  since the BJP and Prime Minister Narendra Modi assumed power in May  2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A preponderant majority of bovine-related hate crimes–98% of the 85  incidents–have occurred since May 2014, our database shows. Only one  incident each was reported in 2012 and 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Around 56% of the persons attacked by these groups were Muslim, who  accounted for 88% of those killed in this violence. In 2018, 100% of  victims attacked in these hate crimes were Muslim.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There is a clear increase in aggression by one group against the other  and a growing inability to empathise and understand those different  from ourselves,” Lalli said, “This has essentially made us revert to  behaving like tribalistic societies with animalistic instincts–where,  when for survival, when you perceive an animal to be a threat, you  attack it to kill it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In more than a third–28 of 85 incidents–mobs or groups of people were  spurred into violence on the mere suspicion of cow slaughter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our database also shows that the attacks have become deadlier–the  percentage chance of such mob-violence resulting in death has more than  doubled from 30% in 2017–regarded as the deadliest year since 2010 (11  deaths in 37 cases)–to 66% in 2018 (four deaths in six cases).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Society has an innate capacity for violence and it’s very easy to  encourage this. Right from Twitter trolling–which is basically extreme  verbal aggression–we are unleashing and encouraging violence in  different ways and contexts,” Lalli said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What the government says&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many commentators have remarked that the absence of a strict and prompt  response from the government has encouraged such violence. “What action  is taken when such cases occur has an important bearing on the  continuation of such violence,” Raghavan said, “By not taking strong  action, the state is complicit in its orchestration.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While we hear about more incidents of violence, we are yet to hear  full recognition or condemnation of these acts from the important  leaders–in a way it sends out a message that does not discourage the  mob,” Lalli agreed, “When you don’t speak out about it and come down on  it strongly, it sends out a signal to society that it’s alright to  resort to violence for these reasons since nobody gets punished.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NCRB “does not maintain specific data with respect to mob lynching  incidents (involving minorities) in the country”, the home ministry &lt;a href="http://164.100.47.190/loksabhaquestions/annex/14/AS242.pdf"&gt;told&lt;/a&gt; Parliament on March 13, 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ministry did furnish some data on mob lynchings recorded by states  from 2014 to 2017, but did not provide information on the motive–whether  cow vigilantism, communal or caste hatred, or rumours of child-lifting,  etc. The data also did not disclose the identity of the victims.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These data said 45 persons were killed in 40 cases of mob lynching  across nine states between 2014 and March 3, 2018. At least 217 persons  have been arrested.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In contrast, &lt;b&gt;IndiaSpend&lt;/b&gt;’s two databases on mob  violence–due to child-lifting rumours and bovine-related hate  violence–record 80 cases and 41 deaths during the same period. This is  without counting other instances of mob violence related to caste, moral  policing and so on.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-july-9-2018-69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that'&gt;https://cis-india.org/internet-governance/news/business-standard-july-9-2018-69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-07-13T14:53:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/wsj-march-4-2013-dhanya-ann-thoppil-chidambaram-to-talk-budget-on-google-hangout">
    <title>Chidambaram to Talk Budget on Google+ Hangout</title>
    <link>https://cis-india.org/news/wsj-march-4-2013-dhanya-ann-thoppil-chidambaram-to-talk-budget-on-google-hangout</link>
    <description>
        &lt;b&gt;Indian politicians are slowly warming up to social media.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Dhanya Ann Thoppil was &lt;a class="external-link" href="http://blogs.wsj.com/indiarealtime/2013/03/04/chidambaram-to-talk-budget-on-google-hangout/"&gt;published in the Wall Street Journal&lt;/a&gt; on March 4, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In a first for a cabinet minister, Indian Finance Minister P.  Chidambaram tonight is hosting a Google+ Hangout, a Web video chat, to  answer citizens’ questions on the &lt;a href="http://online.wsj.com/article/SB10001424127887324662404578331410524170472.html?mod=WSJINDIA_hpp_MIDDLESecondNews"&gt;budget&lt;/a&gt; he presented last week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At 8 p.m. on Monday India time, Mr. Chidambaram will be joined by a  group of experts to discuss the state of India’s economy, which looks  set to grow at its weakest pace in a decade this financial year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the panel are also Amit Singhal, senior vice president at Google  Inc., Anand Mahindra, chairman and managing director of Mahindra &amp;amp;  Mahindra Ltd., Jahangir Aziz, chief economist for India at J.P. Morgan  and Manish Chokhani, chief executive officer at Axis capital.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The online chat, which the Ministry of Finance in a statement  described as “a powerful communication platform,” is an attempt to  engage India’s tech-savvy, middle-class youth in the political process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is an attempt by the government to reach out to gen-next,” ahead  of the general elections scheduled in 2014, said S. Chandrasekharan, the  director of South Asia Analysis Group, a Delhi-based think tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://blogs.wsj.com/indiarealtime/2013/02/28/india-budget-a-boost-for-health-and-education/"&gt;Improving opportunities for the country’s younger generations&lt;/a&gt; was a major focus of Mr. Chidambaram’s budget speech to lawmakers  Thursday. “My budget has before it one overarching goal: to create  opportunities for our youth to acquire education and skills that will  get them decent jobs or self-employment,” he said, adding, “Their  concern are my concerns, too.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Mr. Chidambaram won’t be interacting with citizens directly. He  will answer questions submitted by citizens in advance through video  uploads on this &lt;a href="http://www.youtube.com/inconversation"&gt;YouTube channel&lt;/a&gt; or on this &lt;a href="https://plus.google.com/+GoogleIndia#+GoogleIndia/posts"&gt;Google + page&lt;/a&gt;. The session will be streamed live on both websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media is only beginning to emerge as a tool Indian politicians use to reach out to the country’s citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prime Minister &lt;a href="http://topics.wsj.com/person/S/manmohan,-singh/6373"&gt;Manmohan Singh&lt;/a&gt;,  often criticized for not being accessible to the media, set up a  Twitter profile about a year ago. But the account is managed by his  office staff, not by Mr. Singh himself, and it’s mostly used to share  links to pictures or speeches of the Prime Minister.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Narendra Modi, chief minister of the state of Gujarat and possible  prime ministerial candidate for the opposition Bhartiya Janata Party,  has embraced digital media more than other politicians. In August he &lt;a href="http://www.youtube.com/watch?v=OzUTCXKnmZg?"&gt;hosted a Google + Hangout session&lt;/a&gt; to answer questions from citizens and in December had a holographic  image of himself projected live at rallies in four different locations  to communicate with his supporters during his &lt;a href="http://online.wsj.com/article/SB10001424127887324461604578190553318699648.html"&gt;election campaign&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government last year also came up with a series of guidelines for  its various arms on the effective use of social media to reach out to  people and to ensure public participation in policy framing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Still, the government often views social media with suspicion, and has taken steps to &lt;a href="http://blogs.wsj.com/indiarealtime/tag/it-act/"&gt;regulate user-generated content&lt;/a&gt; on websites more tightly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are 14 million broadband connections in India, meaning that  only a small portion of the country’s 1.2 billion population has  reliable Internet access, says Sunil Abraham, executive director at the  Bangalore-based Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“So, unlike in the U.S., where you can fault the government for not  being online, in India you can’t really fault the government,” says Mr.  Abraham.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/wsj-march-4-2013-dhanya-ann-thoppil-chidambaram-to-talk-budget-on-google-hangout'&gt;https://cis-india.org/news/wsj-march-4-2013-dhanya-ann-thoppil-chidambaram-to-talk-budget-on-google-hangout&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-03-11T04:14:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cryptoparty-chennai">
    <title>Chennai: Learn to Protect your Online Activities!</title>
    <link>https://cis-india.org/internet-governance/cryptoparty-chennai</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society cordially invites you to a Crypto Party at Asian College of Journalism Second main Road (Behind M.S. Swaminathan Research Foundation) Taramani in Chennai on August 7, 2013, 4.30 p.m. to 6.30 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;"Governments around the world, are greatly increasing their surveillance of the Internet. Alongside a loss of the private sphere, this also represents a clear danger to basic civil liberties. The good news is that we already have the solution: encrypting communications makes it very hard, if not entirely impossible, for others to eavesdrop on our conversations. The bad news is that crypto is largely ignored by the general public, partly because they don't know about it, and partly because even if they do, it seems too much trouble to implement." (&lt;a href="https://www.techdirt.com/articles/20121009/06132920660/cryptoparty-like-its-1993.shtml"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;p&gt;&lt;img alt="yes we scan and obama with headphones" height="167" src="https://netzpolitik.org/wp-upload/1012366_534624166585046_1146520866_n.png" width="450" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;So lets go and have a party, and teach each other how to crypto!&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Everyone is invited! Especially do not hesitate to join if you are not using any crypto at all (yet!)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/cryptoparty-chennai-1/at_download/file"&gt;Here is a Flyer / Printout for you&lt;/a&gt; to spread the message!&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cryptoparty-chennai'&gt;https://cis-india.org/internet-governance/cryptoparty-chennai&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bernadette</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Crypto Party</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-08-01T12:16:52Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/vivek-narayanan-and-r-sivaraman-the-hindu-september-18-2019-chennai-residents-rue-fuzzy-cctv-surveillance">
    <title>Chennai residents rue fuzzy CCTV surveillance</title>
    <link>https://cis-india.org/internet-governance/news/vivek-narayanan-and-r-sivaraman-the-hindu-september-18-2019-chennai-residents-rue-fuzzy-cctv-surveillance</link>
    <description>
        &lt;b&gt;Poor quality of footage, lack of maintenance and inadequate back-up reduce the gadgets’ deterrent value.&lt;/b&gt;
        &lt;p&gt;The article by Vivek Narayanan and R. Srinivasan was &lt;a class="external-link" href="https://www.thehindu.com/news/cities/chennai/you-are-under-fuzzy-cctv-surveillance/article29443198.ece"&gt;published in the Hindu&lt;/a&gt; on September 18, 2019. Pranav M.B. was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last month, Sandeep (name changed), a cyclist, was hit by an ambulance on GST Road near the Madras Export Processing Zone (MEPZ) signal. He was rushed to hospital in the same ambulance. His hopes of finding out who hit him, via CCTV cameras, came crashing after he saw the poor quality of footage that was obtained to identify the vehicle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The police officers in Tambaram themselves told me that the quality of the CCTV cameras was poor and they were unable to trace the number,” said Mr. Sandeep.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the police have been claiming a reduction in crime rates due to CCTV cameras in the city, residents and experts doubt if the equipment is indeed a deterrent, and want the police to install better quality cameras with the capacity to retain footage for a longer period, and to maintain the devices, too.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Extensive Coverage&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Several high profile cases such as the 2016 Swathi murder case drove law enforcers to increase CCTV coverage of the city. Now, there are over 2 lakh cameras covering all of Chennai, its alleys and its fringes.&lt;/p&gt;
&lt;p&gt;Cameras have also been installed at every major junction and at street corners. In many cases, they are linked to the control room of the nearest police station.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the police, there is one CCTV camera for every 50 m. They are meant to help the police crack cases and nab the accused. “Some DVRs (digital video recorders) are also in the house or premises of the sponsors. This is for safety purposes,” said a police officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The unique nature of the Traffic Police’s ‘third eye campaign’ is the involvement of the public, too. Apart from the police, MPs and MLAs, many resident welfare associations have also donated resources for the installation of CCTV cameras.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Residents, however, expressed concern. S. Kumara Raja, vice president, Annai Indira Nagar Residents Welfare Association said: “Though many CCTVs cameras are found on the street, it isn’t clear if they are working or not. We also don’t know if anyone is maintaining the cameras.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;P. Saravanakumar, founder of the South Madipakkam Residents’ Welfare Association, said that the equipment is not connected with the police control room and the data remains with those who have installed the CCTV system.&lt;/p&gt;
&lt;p&gt;V. N. Subramaniyan, president, Mylapore Residents Welfare Association, felt that cameras installed on private properties were working properly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Cameras are obtained from private persons as a charitable activity, so the quality can be challenged. The police should give the maintenance of CCTV cameras to private companies. There should be proper back-up and monitoring,” he pointed out.&lt;/p&gt;
&lt;p&gt;While the equipment is considered important for gathering evidence, policemen themselves complain that the quality of the footage from many cameras is poor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We cannot zoom into the footage obtained from every camera involved. Most of them are 1 or 2 megapixel cameras and the image is often blurred. Only in a few places do we find powerful cameras,” said a policeman.&lt;/p&gt;
&lt;h3&gt;'Not a deterrent'&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Pranav M. B., researcher, Centre for Internet and Society, said that as according to global studies, CCTV cameras are not useful as deterrents. “But they come in handy for providing evidence after a crime,” said Mr. Pranav.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though advanced cameras can provide footage with more clarity, it’s cost intensive to maintain them. “For deterrence, one need not invest in high-end cameras — quality street lights are sufficient. We cannot expect the perpetrator of a crime to make a decision over whether to commit a crime or not after looking at the camera,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there is a 30% higher chance of identifying an accused when a camera is deployed, than without. “Nevertheless, like any other technology or method, it is not entirely foolproof,” Mr. Pranav said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Police officers disagree on the subject of CCTV systems not serving as deterrents. “From January to June 2018, a total of 258 chain snatching incidents were reported, but during the same period this year, the number plummeted to 137 — a fall of nearly 50%,” said a senior police officer.&lt;/p&gt;
&lt;h3&gt;'Needs improvement'&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the police claim that, this year, public nuisance cases have gone down by 41%, and burglary cases by 17%, compared with last year. Police officers agreed that the quality of some cameras needs to be improved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Initially, we did not know the type of quality [of cameras] needed. So, we fixed 1 and 2 megapixel cameras. Now, we are installing 4 megapixel cameras and have better clarity. Besides, we are now categorising the number and type of cameras available in different parts of the city, and will change the older ones,” said a senior police officer.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/vivek-narayanan-and-r-sivaraman-the-hindu-september-18-2019-chennai-residents-rue-fuzzy-cctv-surveillance'&gt;https://cis-india.org/internet-governance/news/vivek-narayanan-and-r-sivaraman-the-hindu-september-18-2019-chennai-residents-rue-fuzzy-cctv-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vivek Narayanan and R. Srinivasan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-09-19T14:35:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts">
    <title>Checks and balances needed for mass surveillance of citizens, say experts</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts</link>
    <description>
        &lt;b&gt;A number of measures are required to protect law-abiding citizens from mass surveillance and misuse of their personal data, according to top technology and legal experts. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Peerzada Abrar was &lt;a class="external-link" href="http://www.thehindu.com/business/Industry/checks-and-balances-needed-for-mass-surveillance-of-citizens-say-experts/article21381478.ece"&gt;published in the Hindu&lt;/a&gt; on December 9, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The measures include issuing of tokens by the Unique Identification  Authority of India (UIDAI) instead of Aadhaar numbers and having an  official in the judiciary give permission to vigilance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  experts were participating in a panel discussion on ‘Navigating Big Data  Challenges’ at Carnegie India’s Global Technology Summit here. They  also said there was a need to implement ‘de-identification of data’ or  preventing a person’s identity from being connected with information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  moderator of the discussion was Justice B.N. Srikrishna, a former  Supreme Court judge, who was also heading a government-appointed  committee of experts to identify “key &lt;a href="http://www.thehindu.com/tag/1401-1400-1349/data-protection/?utm=bodytag"&gt;&lt;b&gt;data protection &lt;/b&gt;&lt;/a&gt;issues”  and recommend methods to address them. Justice Srikrishna told the  panellists that Aadhaar or the unique identification number had  empowered the people. But in situations where the State wants all the  information about citizens from different service providers because of  its suspicions related to terrorism or criminal activity, he asked, what  is the method to create a balance?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Surveillance is like salt in  cooking which is essential in tiny quantities, but counterproductive  even if slightly in excess,” responded Sunil Abraham, executive director  of Bengaluru-based think tank, Centre for Internet and Society. He said  there was a need to make a surveillance system which had privacy by  design built into it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Abraham said that his organisation had  proposed to the UIDAI that it used ‘tokenisation,’ which meant that  whenever there was a ‘know your customer’ requirement, the Aadhaar  number was not accessed by organisations like telecom firms or the  banks. Instead, when the citizens used various services via smart cards  or pins, a token got generated, which was controlled by the UIDAI.  Organisations like banks and telecom firms can store those token numbers  in their database. He said this would make it harder for unauthorised  parties to combine databases. But at the same time would enable law  enforcement agencies to combine database using the appropriate  authorizations and infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“UIDAI is considering this,  they call it the dummy Aadhaar numbers. We need technical as well as  institutional checks and balances,” said Mr. Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Countries  like the U.S also have processes like Foreign Intelligence Surveillance  Court (FISA court) which entertains applications made by the U.S  Government for approval of electronic surveillance, physical search, and  certain other forms of investigative actions for foreign intelligence  purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“My concern is that in the current system, surveillance  can be done by the State machinery. I don’t necessarily suggest FISA  court.... but some kind of mechanism where (one can’t) be held at the  mercy of incestuous State machinery,” said Rahul Matthan, a partner at  law firm Trilegal. “But have some second person who is outside the  influence of this system (and) who actually says ‘yes this is a  terrorist which requires us to do mass surveillance,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Artificial Intelligence&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A  large amount of information or Big data ranging from financial, health  to political insights of people is being collected by different  organisations and service providers which is sitting in different silos.  All of this is likely going to be linked through Aadhaar. Mr.  Srikrishna asked what if a situation arises where all of this data is  aggregated and using artificial intelligence and machine learning, one  is able to analyse it and profile individuals. He said “would that be  not a terrifying scenario” where the State can act super-monitor for  citizens. He asked how can citizens be guarded against it?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr.Srikrishna  was referring to the ‘Social Credit System’ proposed by the Chinese  government for creating a national reputation system to rate the  trustworthiness of its citizens including their economic and social  status. It works as a mass surveillance tool and uses big data analysis  technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is a possibility. What stands in the way of it  becoming a reality (in India) is a robust law,” said Mr.Matthan.  “Technology is so powerful that it could equally be used for good as  well as bad.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts'&gt;https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-12-16T14:32:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/indian-express-june-23-2019-chasing-fame-and-fun-15-seconds-at-a-time">
    <title>Chasing fame and fun 15 seconds at a time: Why TikTok has India hooked</title>
    <link>https://cis-india.org/internet-governance/news/indian-express-june-23-2019-chasing-fame-and-fun-15-seconds-at-a-time</link>
    <description>
        &lt;b&gt;How TikTok, an app owned by a Chinese firm, has become a playground for India’s young.&lt;/b&gt;
        &lt;p&gt;The article by Tora Agarwala, Surbhi Gupta, and Karishma Mehrotra appeared in &lt;a class="external-link" href="https://indianexpress.com/article/express-sunday-eye/all-it-takes-is-15-seconds-tiktok-controversy-tiktok-supreme-court-judgment-5790980/"&gt;Indian Express&lt;/a&gt; on June 23, 2019. Nishant Shah was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“Kaam nai niki? Do you have no other work?” At a banner printing shop in Nagaon, a town in Assam, the middle-aged shopkeeper was bemused. It was the strangest order he had received in a while.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For one, the banner was for a “TikTok” meetup. He had not the slightest inkling of what that was. Second, the two boys who had introduced themselves as hailing from Jamuguri and Raha, smaller towns in the state, insisted that the text incorporate a spelling mistake. “Instead of M-E-E-T up, please write M-E-A-T up,” he was told. The shopkeeper grudgingly obliged and the boys rode off on their bikes. It would be ready the next day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is going to go viral,” Dhurbajit Medhi said triumphantly to his friend PK Nath. They had only known each other for a month, having “met” on TikTok. In April, they sat face-to-face for the first time at a small restaurant in Raha, in Nagaon district, where Medhi lived. Nath had travelled 110 km to meet him.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Medhi was 23, a singer who had dropped out of college because of a death in the family. Nath, about 30, was known in his neighbourhood in Jamuguri for two things: his gela maal dukaan (grocery store) and his penchant to make people laugh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On TikTok, both have followers in thousands. Over a few months, they would chat often, appreciating each other’s videos. “On a sad day, I would scroll through Nath da’s feed and it would make me laugh without fail,” says Medhi, who joined TikTok about a year ago. Many comments on his videos are from girls. “Some say ‘cute’ and some say bhaal laagise (You’re looking good),” says Medhi, who is reasonably tall and sports a goatee on his boyish face.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the year, Medhi has learnt the tricks of the TikTok trade. “There are two kinds of videos which get attention here in Assam: either you do sad, romantic songs. Or you do &lt;em&gt;fotuami&lt;/em&gt; — slapstick humour,” says Medhi, who has made a niche for himself in the former category. He owns an Mi phone, worth Rs 11,000, which he bought a year ago by saving money through his work at his father’s tea shop. “My mother is okay with me making these videos. But she says, ‘Do all this, but think about your life also.’ I get her point but maybe I can make a career out of this,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After all, TikTok is not as easy as &lt;a href="https://indianexpress.com/about/facebook/"&gt;Facebook&lt;/a&gt;. It involves an element of skill. “Do you know how difficult it is to get one TikTok like? On Facebook, you just put a photo and the likes pour in. Here, we have to work hard.” Medhi admits he was naïve initially. “I would make photo-collages from my trips to Kaziranga and add some background music.” But that would not have worked. “The viewer takes into account everything: is our lip-sync matching? Are our clothes suited to the mood of the music? Are our expressions accurate?”&lt;/p&gt;
&lt;p&gt;Today, Medhi has over 400 videos, many of which feature him mouthing lyrics to the songs sung by Assamese musician Zubeen Garg. Sometimes, he sings in his own voice too — a secret talent he has nurtured but not had the opportunity to explore. “In Upper Assam, there is an appreciation for the arts and music. But here in middle Assam, it is different. People would mock, ‘&lt;em&gt;Eeeh gayok hobo ahise&lt;/em&gt;. Look at him trying to be a singer,’” says Medhi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is these aspirations, which often get mowed down by the traditionalism that comes with living in small towns and villages that TikTok is giving oxygen to. The short-form video app has seen a phenomenal growth since its rebranding from Musical.ly in 2018, garnering 200 million users in India alone. Its hallmark is simple: it woos your attention with 15-second videos (they make go up to 60 seconds too) of lip-syncing teenage girls, dancing boys, family pranks and other such stylised moments. The mobile app’s owner, a Chinese internet company called ByteDance, was reportedly awarded a round of major investment from Japanese SoftBank last year, making it the world’s most valuable startup.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TikTok’s rapid capture of India — it skyrocketed past traditional social media mammoths, like Facebook, on global download charts in 2018 — is a testament to how quickly Chinese apps have begun to give American tech companies a run for their money in one of the world’s most important markets. TikTok has given a megaphone to rural Indian life in a way that no other app has been able to; American apps such as Facebook have been restricted to a primarily upper-class user base.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We believe that TikTok filled the gap by bringing people from across the deepest pockets of India online and giving them a platform to express themselves,” said ByteDance’s global public policy director Helena Lersch. Since the company introduced in-feed advertisements and branded editing tools last year, it’s attracted the likes of Pepsi, Myntra, and Dunzo.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If more proof were needed that TikTok has planted itself into the circuitry of desire and aspiration, it came by way of a news report last fortnight. A young man in Delhi, who worked at a restaurant, was arrested for &lt;a class="external-link" href="https://indianexpress.com/article/delhi/man-steals-phone-to-make-tiktok-videos-arrested-5783586/"&gt;snatching an iPhone&lt;/a&gt; XS Max — he wanted to shoot good-quality TikTok videos. Another 19-year-old from Delhi, Salman Zakir, &lt;a class="external-link" href="https://indianexpress.com/article/cities/delhi/delhi-teen-shot-dead-by-friend-while-making-tiktok-video-5675566/"&gt;was shot by his neighbou&lt;/a&gt;r allegedly in the course of making a TikTok video.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But what is the big deal about TikTok? How have 15-second fragments of people being people colonised the attention of so many? Scrolling through the app for the first time, one is struck by how random it is, and how the attention economy has shrunk your mindspan to a quarter of a minute. You could easily tire of teens dancing, making faces and lip-synching in super-tiny skits and video memes. Or, you could watch an entire generation occupy this playground with their energy and creativity, using 15 seconds to mix, mash and play versions of themselves. Preparing a face to meet other excited, silly faces has never been so addictive.&lt;/p&gt;
&lt;p&gt;Social media has put the self at the centre, making opinions out of rants, photographers of anyone with a phone camera, and journalists of citizens. TikTok takes the humdrum, turns it into a form of talent and injects into it the velocity of the fast-travelling video.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, more importantly perhaps, it taps into a confidence in the young — about their lives, abilities and even their humble backgrounds — that was unthinkable a generation ago.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For sure, TikTok could not have spread this way five years ago either. Eighteen-year-old Devanshu Mahajan, an undergraduate student of commerce at Delhi University’s School of Open Learning, agrees. He found himself exploring the internet only after the entry of Reliance Jio in the telecom market. “Before that we used to have 1 GB data for a month. Suddenly, we had 1 GB to spend in a day,” says the Delhi resident. Last year, he started posting videos on TikTok, most of which seemed to disappear into nowhere. “I got so angry that I uploaded a rant about the lack of response, and suddenly it got viral. Then, I started giving my own twist to trending sounds/beats and songs, and these videos started becoming popular,” says Mahajan, who has over eight lakh followers now.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most of his popular posts are about Indian families (“Indian parents wish for boys only to send them to the market to buy milk and vegetables endless times”), school life and being single. They are not particularly witty, but belong to the tradition of native humour that once would make judges mysteriously ROFL on shows like The Great Indian Laughter Challenge. “I make my videos at home, I have no tripod or light, there is one window where I put my phone and act,” says Mahajan, who uses an Mi Y3 phone. With a spiky haircut and a lean frame, he is the picture of ordinariness. “People either say I’m too thin, or comment about my nose or looks. But I make a story out of those comments too. If I can make fun of myself, nothing can affect me,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It may not be like YouTube where one can earn money, but because of this app, I feel like a star now,” says Musaib Bashir Bhat, 27. He joined TikTok seven months ago and his 300 videos in Kashmiri have earned him 73,000 followers already. He is also recognised on the streets of Srinagar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fame is the drug that drives TikTok users, but, for now, at least, this is a following rooted in the local. The app is a Babel of many tongues, and each region has its distinct self-expression — in its aesthetic, looks or music. It hasn’t been monopolised by Hindi film music or Punjabi pop.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ranjan Barman, an 18-year-old living in a small village in Lakhimpur, Assam, loves acting. “I know I can’t be an actor in real life— but at least on TikTok I can,” says the college-goer who joined the app four months ago. He is now nearing his one millionth heart — a commendable feat for someone who is new to the TikTok universe. His popularity, he suspects, could have something to do with the props he uses in his videos. Barman owns 22 gamusa shirts, or shirts fashioned out of the traditional Assamese cloth, and says that whenever he wears them, his videos get more play. “In Assam, people respect the gamusa. It touches sentiments,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But how substantial is this fame? What kind of recognition do TikTokers seek? Last month, Mahajan called for a meet-and-greet with his “fans” at a west Delhi mall. Thirty people showed up. “I hadn’t expected anyone to turn up. People clicked photos and videos, but I didn’t feel like a celebrity,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While TikTok fame comes from the number of followers one has, an important barometer is also the number of hearts you receive. For example, Medhi has only 4,000 followers, but his videos have received 74,500 hearts. The heart tally is an aggregate of the number of likes the creator has garnered across every video he has uploaded. “It is just one viral video you need — and then you are set,” says Medhi, who hasn’t hit the jackpot yet, but is optimistic. “Like all things in life, this, too, takes time,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TikTok has given Aizawl’s Adeline Pach much more than the 5,12,000 followers one sees on her profile. A cancer-survivor, Pach started using it in 2015, when it went by the name Musical.ly, while recovering from her illness. “It was silly, goofy stuff — but it helped take my mind off things,” she says. Even today, she suffers from a number of health issues. But TikTok “distracts her”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pach’s skilful “transition” videos (where one frame would blend to another seamlessly), started getting featured on the app’s homepage. “People liked the way I edited my videos. For example, if I was saying and wearing something in one frame, the next would be in another location, with me doing something else in another outfit,” says Pach, adding that earlier TikTok was more about skill, and now people “blindly heart goofy content.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As Pach, now in her late twenties, kept getting featured, her followers shot up — and for first time in her life, the introvert found herself interacting with people — “and enjoying it. It gave me the confidence I never had.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2017, Pach attended her first TikTok meetup in Mumbai. “That had about 70 people but the next one which took place in Bengaluru had 600,” she says. She performed a rap song by Nicki Minaj in front of a packed auditorium. “Suddenly I was fearless.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For many, TikTok holds out the hope of bigger things to come — a career in music and acting. When he was a teen, Ambish KB’s acting talents — he mimicked his teachers’ mannerisms and got them to laugh — made him almost famous in school. In college, his obsession with films would make him watch first-day, first-show releases of leading Malayalam superstars like Mammootty and Mohanlal. He also held positions in the Ernakulam district unit of the all-Kerala Mammootty fans association. “It’s safe to assume that I spent more time in theatres than in college,” says Ambish, 27, an accountant with a fashion design firm in Kochi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He still has not given up on his acting dreams. For three years now, he has been scouring for small roles, approaching directors, producers and scriptwriters, even as he maintains a job on the side. Not surprisingly, he has taken to TikTok like a duck to water. His account doesn’t boast an envious number of followers (572 at last count) but his videos, most of which are comedy re-enactments of popular scenes from Malayalam cinema, have collected thousands of views and a flood of reactions. He says his videos are all home-produced and mostly filmed in the dead of night once his parents are fast asleep. Many of them are also collaborations with his wife; she’s not mad about cinema like he is, but she likes the fun interface of TikTok. To the point that, at weddings, their relatives call them, “Oh look, here come the TikTok people!”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But more than anything, Ambish believes TikTok could hold his ticket to the film industry. “It’s a medium for people like us to display our talent. Who knows, if my video goes viral and if a casting director happens to notice, I might click,” says Ambish, who spends at least eight hours a day on TikTok. His inspiration is a fellow TikTok user, Fukru, who supposedly landed a role in a film after his dance videos went viral. “He would post videos every day, just random ones of him dancing. Now he’s got a role in the next film by director Omar Lulu. You never know,” Ambish says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ambish is not prepared to leave his job yet, as he understands the film industry is unpredictable. He doesn’t have the means to travel for auditions to faraway towns. But he knows he has a powerful device at his disposal that could get him there: his Huawei P20 Lite smartphone and the TikTok app on it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While future sociologists might mine TikTok to understand the changing mores of a new generation, fears of data mining and privacy intrusions of the app have often been voiced. This year, the US Federal Trade Commission fined the company $5.7 million for illegally collecting the personal data of children. In 2018, Indonesia’s government temporarily banned the platform for “negative”, mostly pornographic and blasphemous, content. The government lifted the ban after the company complied with local laws and stepped up local content moderation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In April, the Madras High Court made a similar interim takedown order, asking Google and Apple to remove TikTok from their app stores, citing pornographic and child exploitation content. Three weeks later, the court lifted the ban after the Supreme Court asked it to address the company’s plea against the takedown, and the app fell from most downloaded to fourth most in India. The company has admittedly decided to “show less skin” here than its other markets. “It’s a bit of a case-to-case basis. There is no clear line I can share with you now. If there is a sexually-explicit video, we take it down. And we are doing this a bit quicker in India,” said Lersch.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Writing in these pages, our columnist Nishant Shah warned about TikTok’s “embrace of artificial intelligence and big data analytics.” “From the minute you sign up for it, giving up your personal information and data to extreme mining which bears the same pitfalls of privacy and surveillance that all other big data apps do, TikTok starts presenting content to you. This is not content created by friends, or colleagues… Instead, this is content created by people you don’t know at all, and brought to you by algorithms that know, even without you telling them what you might like.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The more time you spend … going through complex tutorials to make your own 15-second fun video, the more the machine learning algorithms learn you,” wrote the co-founder of the Centre for Internet and Society. While critics point out that the infantilised world that the app peddles is dangerous to the very personal liberty that it seems to showcase, it’s not an argument that is winning.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But wait, what happened to the “meatup” banner? When Medhi and Nath had met, they rued the little regard their family and friends had for their pursuit. “My friends think I am wasting time,” says Medhi, the only TikToker in Raha. Both knew they had to do something.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They went ahead and organised the first state-wide TikTok meetup in Assam, slated for this Sunday. While there have been meetups before, this is the first time TikTokers from every corner of the state will be in attendance. They expect about 500. How did they manage to do it? “Only negative things go viral on the internet,” says Medhi, “That is why we decided to spell ‘meetup’ as ‘meatup’.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The day the banner was ready and picked up from Nagaon, both Medhi and Nath took a picture of it and put it on the app. As expected, there was an uproar. “Everyone started sharing it. My phone number was on the banner and I would get 10 calls a day. “They would say: Don’t you know how to spell ‘meetup’? Most made fun of me but I didn’t care. Our job was done. The word had spread.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/indian-express-june-23-2019-chasing-fame-and-fun-15-seconds-at-a-time'&gt;https://cis-india.org/internet-governance/news/indian-express-june-23-2019-chasing-fame-and-fun-15-seconds-at-a-time&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Tora Agarwala, Surbhi Gupta, and Karishma Mehrotra</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-07-05T02:13:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/igf-2013-workshop-99-charting-the-charter-internet-rights-and-principles-online">
    <title>Charting the Charter: Internet Rights and Principles Online</title>
    <link>https://cis-india.org/news/igf-2013-workshop-99-charting-the-charter-internet-rights-and-principles-online</link>
    <description>
        &lt;b&gt;This workshop is being organised by IRP Coalition on October 22 in Bali Nusa Dua Convention Centre. Pranesh Prakash is participating as a panelist.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;i&gt;The Internet Governance Forum 2013 is being held at Bali from October  22 to 25. The overarching theme for the 2013 IGF meeting is: "Building  Bridges"- Enhancing Multistakeholder Cooperation for Growth and  Sustainable Development"&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.intgovforum.org/cms/wks2013/workshop_2013_status_list_view.php?xpsltipq_je=99"&gt;Read the original published on the IGF website&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Theme: Human Rights / Freedom of Expression on the Internet&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Since the Charter of Internet Rights and Principles was developed dialogue about diverse internet related human rights issues have emerged in various UN human rights mechanisms e.g. racism/racial discrimination, human rights defenders, women's human rights, freedom of association, business and human rights, protection of cultural heritage.  The workshop will map the issues under discussion in the UNHRC against those in the Charter of Human Rights and Principles for the Internet (‘IRP Charter’) and explore multistakeholder perspectives and best practice examples of adherence to the Charter and human rights standards from diverse regions.  &lt;br /&gt;&lt;br /&gt;The focus is on progress, opportunities and challenges to monitor and advocate for the IRP Charter provisions particularly for marginalised groups e.g. rural and indigenous peoples, disabled people, urban poor as the second part of the two workshops put forward by the IRP Coalition and partners. Wider questions that the workshop looks to cover include: How are understandings about the interrelationship of internet governance and human rights standards developing at the Human Rights Council?  Aside from freedom of expression and the right to Privacy, what other human rights are important in relation to the internet? How can the Charter be used to broaden the engagement of the Human Rights Council in internet governance issues? How does the work of the HRC inform the Charter, and other internet policy documents and mechanisms? &lt;br /&gt;&lt;br /&gt;Since the 2009 IGF, the Internet Rights and Principles Coalition has organised a range of workshops and Coalition meetings looking at the application of human rights standards (primarily those espoused in the Universal Declaration of Human Rights, the International Covenant on Civil and Political Rights and the International Covenant on Economic, Social and Cultural Rights) to the Internet. In 2010 the previous draft of the IRP Charter (http://internetrightsandprinciples.org/site/charter/) was launched with a rigorous discussion about what correct interpretation of existing standards is and the role of different stakeholders in relation to these.&lt;br /&gt;&lt;br /&gt;In 2011 the IRP Charter was distilled down to 10 key advocacy points, the Ten Internet Rights and Principles (http://internetrightsandprinciples.org/site/campaign/). These were debated as the Coalition undertook a closer analysis of the issue of copyright protection and how it interrelated with human rights on the internet. In 2012 the Coalition looked at how the Charter was feeding in to a derivative initiative at the Council of Europe to create a user-friendly Compendium of rights of internet users. The Coalition made a close analysis of the issue of anonymity online. This year we want to focus on human rights which, while contained in the Charter, have not received high levels of attention. We also want to loop in the work of Coalition members working on human rights, women’s rights, social, cultural and economic rights as well as the recent work of the Human Rights Council (which is the most authoritative global body applying human rights to the Internet) to incorporating human rights as an integral part of the internet governance field.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Has the proponent organised a workshop with a similar subject during past IGF meetings?&lt;br /&gt;&lt;/b&gt;Yes&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indication of how the workshop will build on but go beyond the outcomes previously reached &lt;/b&gt;&lt;br /&gt;The IRP Coalition launched the IRP Charter and Ten Principles in  2010/2011 (www.internetrightsandprinciples.org). These launches started a  vigorous and productive chain of discussions and outreach initiatives  in and around IGF Meetings. These were followed up in 2011 and 2012 with  IGF workshops that focused in specific issues such as copyright, access  as a right, and existing rights of internet users.   This year we focus on human rights which, while contained in the  Charter, have not received high levels of attention. We also want to  loop in the work of Coalition members working on human rights, women’s  rights, social, cultural and economic rights as well as the recent work  of the Human Rights Council (which is the most authoritative global body  applying human rights to the Internet) to incorporating human rights as  an integral part of the internet governance field. Recent events  underscore that the moment has come to ground human rights principles in  internet governance practice as this affects everyday life, work, and  government.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Background Paper&lt;/h3&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.intgovforum.org/cms/wks2013/workshop_background_paper/65_1373459172.pdf"&gt;Download Background Paper&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Session Type: Roundtable&lt;/p&gt;
&lt;h3&gt;Co-organisers&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Ms. Dixie Hawtin, Global Partners and Associates, Private Sector, Western Europe and Others Group - WEOG&lt;/li&gt;
&lt;li&gt;Ms. Joy Liddicoat, Association for Progressive Communications, Civil Society, New Zealand, Asia-Pacific Group&lt;/li&gt;
&lt;li&gt;Ms. Marianne Franklin, Goldsmiths (University of London, UK)/ IRP Coalition), Civil Society, United Kingdom, Western Europe and Others Group - WEOG&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Have the Proponent or any of the co-organisers organised an IGF workshop before? &lt;/b&gt;&lt;br /&gt;Yes&lt;/p&gt;
&lt;p&gt;The link(s) to the workshop report(s)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://wsms1.intgovforum.org/content/no145-threats-multi-stakeholder-internet-governance-–-it-worth-protecting#report"&gt;http://wsms1.intgovforum.org/content/no145-threats-multi-stakeholder-internet-governance-%E2%80%93-it-worth-protecting#report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://wsms1.intgovforum.org/content/no157-access-internet-human-right"&gt;http://wsms1.intgovforum.org/content/no157-access-internet-human-right&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://wsms1.intgovforum.org/content/no128-empowering-internet-users-–-which-tools#report"&gt;http://wsms1.intgovforum.org/content/no128-empowering-internet-users-%E2%80%93-which-tools#report&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Panelists&lt;/h3&gt;
&lt;p&gt;Please click on the biography to view the profile of the panelists:&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; &lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Joy Liddicoat, Association for Progressive Communications, Female, Civil Society, New Zealand, Western Europe and Others Group – WEOG&lt;a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=111" target="_blank"&gt;&lt;br /&gt;Biography&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Frank La Rue, United Nations, Male, Civil Society, Guatemala, Latin American and Caribbean Group - Grulac&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Asif Kabani, Ministry of Finance, Male, Government, Pakistan, Asia-Pacific Group&lt;a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=156" target="_blank"&gt;&lt;br /&gt;Biography&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Carl Fredrik Wettermark, Ministry of Foreign Affairs, Male, Government, Sweden, Western Europe and Others Group – WEOG&lt;a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=158" target="_blank"&gt;&lt;br /&gt;Biography&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Marianne Franklin, (IRP Coalition/Goldsmiths (University of London, UK), Female, Civil Society, New Zealand, Asia-Pacific Group&lt;a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=153" target="_blank"&gt;&lt;br /&gt;Biography&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Pranesh Prakash, Centre for Internet and Society, Male, Civil Society, India, Asia-Pacific Group&lt;a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=154" target="_blank"&gt;&lt;br /&gt;Biography&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Cornelia Kutterer, Microsoft, Female, Private Sector, BELGIUM, Western Europe and Others Group – WEOG&lt;a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=155" target="_blank"&gt;&lt;br /&gt;Biography&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Michael Rotert, eco-German Internet Industry, Male, Technical Community, Germany, Western Europe and Others Group – WEOG&lt;a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=157" target="_blank"&gt;&lt;br /&gt;Biography&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Moderator&lt;/h3&gt;
&lt;p&gt;Dixie Hawtin, Global Partners and Associates&lt;/p&gt;
&lt;h3&gt;Remote Moderator&lt;/h3&gt;
&lt;p&gt;Rebecca Zausmer, Global Partners and Associates&lt;/p&gt;
&lt;h3&gt;Agenda&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This round table session explores the opportunities and challenges for upholding human rights standards on the internet using the IRP Charter of Human Rights and Principles for the Internet (http://internetrightsandprinciples.org/site/charter/). In tandem with the session on Disabilities and Indigenous rights this session aims to:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Address a number of human rights – moving beyond freedom of expression and privacy - to consider the IRP Charter provisions for socio-economic rights, education, women’s rights and rights of the visually impaired in the online environment.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Provide an assessment of the implementation of human rights standards on the internet o date.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Feed recommendations in to the IRP Coalition initiative to create a final version of the IRP Charter (in terms of substance, process, and uses of the document in practice)&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The session will start by focusing on a selection of concrete examples (such as, the PRISM revelations, the Marrakesh Treaty on exceptions and limitations to copyright for the blind, racial discrimination, education rights online) before opening to a wider discussion. It brings together diverse perspectives on the relationship between human rights and internet policy, where the human rights movement needs to engage more or more effectively, and how the IRP Charter should be developed to assist this process. The outcomes of the workshop will feed into the IRP Coalition Meeting, ‘Towards the IRP Charter 2.0’.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Inclusiveness of the Session&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Panellists will make short initial statements of up to 3 minutes, each will be tasked with a particular perspective to bring and enable several rounds of the table. It will also allow ample time for audience questions and comments. The audience will be invited to ask questions, and to answer questions which the moderators will pose to the floor.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Suitability for Remote Participation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Both the IRP and the APC have a good track record of marketing their workshops across a range of email lists, websites and social media to ensure that potential remote participants know about the workshop and can participate. Remote participants will be engaged by the remote moderator who will pose questions to them and facilitate an active remote conversation alongside the conversation in situ– making links between the two wherever possible.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Questions or Comments&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Please note that Mr Frank La Rue has been invited. As his office needs some time to respond we have included his name as an unconfirmed participant for the time being. &lt;br /&gt;&lt;br /&gt;Also a note on the number of participants:&lt;br /&gt;As this is a roundtable, open discussion format there are more than five speakers in order to generate the range and depth needed for this sort of interactive and dynamic discussion. The IRP Coalition has taken the lead in instigating these sorts of discussion formats in multistakeholder meetings such as the UNESCO WSIS+10 event and the Lisbon EuroDIG. The session moderator is experienced for this format and the participants aware that long speeches are not required.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/igf-2013-workshop-99-charting-the-charter-internet-rights-and-principles-online'&gt;https://cis-india.org/news/igf-2013-workshop-99-charting-the-charter-internet-rights-and-principles-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-10-21T07:03:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/alexander-von-humbodt-institute-for-internet-november-22-chances-and-risks-of-social-participation">
    <title>Chances and Risks of Social Participation</title>
    <link>https://cis-india.org/news/alexander-von-humbodt-institute-for-internet-november-22-chances-and-risks-of-social-participation</link>
    <description>
        &lt;b&gt;Participation is a key issue within Internet research and hence also for the Alexander von Humboldt Institute for Internet and Society. For this reason the institute is going to host a thematically focused meeting on Chances and Risks of Social Participation in Berlin on 22 November 2013 in co-operation with the Friedrich Ebert Foundation.&lt;/b&gt;
        &lt;p&gt;Nishant Shah gave the keynote for this event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Morning Session&lt;/b&gt;&lt;br /&gt;&lt;i&gt;by invitation only&lt;/i&gt;&lt;br /&gt;International senior researchers from a broad field of disciplines are invited to join the discussion and contribute with their expertise to various sessions as well as a public panel discussion. Thereby, the institute aims to push ahead research and exchange of ideas around the field of participation ranging from encouragement in context of democracy to the impact on innovation management.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Public Afternoon: Online into Politics?&lt;/b&gt;&lt;br /&gt;&lt;i&gt;open to the public, &lt;a href="http://www.hiig.de/en/events/internet-and-partizipation/#Anmeldung"&gt;registration &lt;/a&gt;required&lt;/i&gt;&lt;br /&gt;In the afternoon, the meeting will be opened to the public. We are pleased to announce that Helen Margetts, director of the Oxford Internet Institute (OII) has agreed to hold a keynote. We are also excited to be able to share first findings from a study on the e-petition platform of the German parliament, the Bundestag, with the attendants. Representatives of politics and society will reveal national perspectives on political participation within the concluding panel discussion.&lt;/p&gt;
&lt;h3 class="western"&gt;Side Events&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This meeting adds to the activities of the newly founded Network of Internet &amp;amp; Society Research Centers (NoC). Alongside the meeting on participation the annual &lt;a href="http://www.hiig.de/events/12286/"&gt;Early Stage Researchers Colloquium&lt;/a&gt; and a meeting of participants of the Network of Centers will take place – guaranteeing fruitful and inspiring discourses across disciplines and research institutions.&lt;/p&gt;
&lt;h3 class="western"&gt;Hosts and Co-Hosts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The event is hosted in co-operation with the Friedrich Ebert Foundation and serves as a Network of Centers (NoC) regional event. The event is furthermore supported by the British Embassy Berlin.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/chances-risks-social-participation.pdf" class="internal-link"&gt;Click to download the brochure of the event&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/alexander-von-humbodt-institute-for-internet-november-22-chances-and-risks-of-social-participation'&gt;https://cis-india.org/news/alexander-von-humbodt-institute-for-internet-november-22-chances-and-risks-of-social-participation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-11-30T09:19:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cert-ins-proactive-mandate-a-report-on-indian-computer-emergency-response-teams-proactive-mandate-in-indian-cyber-security-ecosystem">
    <title>CERT-In's Proactive Mandate - A Report on the Indian Computer Emergency Response Team’s Proactive Mandate in the Indian Cyber Security Ecosystem</title>
    <link>https://cis-india.org/internet-governance/blog/cert-ins-proactive-mandate-a-report-on-indian-computer-emergency-response-teams-proactive-mandate-in-indian-cyber-security-ecosystem</link>
    <description>
        &lt;b&gt;CERT-IN’s proactive mandate is defined in the IT Act, 2000 as well as in the Information Technology (The Indian Computer Emergency Response Team and Manner of Performing Function and Duties ) Rules, 2013 (CERT-In Rules, 2013) both of which postdate the existence of the organisation itself, which has been operational since 2004. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Regarding the proactive mandate, the IT Act and CERT-In Rules include the following areas where CERT-In is required to carry out proactive measures in the interests of cyber security:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Forecast and alert cyber security incidents (IT Act, 2000) &amp;amp; Predict and prevent cyber security incidents (CERT-In Rules, 2013)&lt;/li&gt;
&lt;li&gt;Issue guidelines, advisories and vulnerability notes etc. relating to information security practices, procedures, prevention, response and reporting (IT Act, 2000)&lt;/li&gt;
&lt;li&gt;Information Security Assurance (CERT-In Rules, 2013)&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This article will track and analyse the CERT-In’s operations in each of these areas over the past twelve years, by analysing the information available on CERT-In’s website as well as other media in the public domain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The analysis will be carried out using a mixed methodology. The basic quantitative analysis of the information available on the CERT-In’ website will be carried out in the form of simple comparatives of updates, bulletins and other forms of publicly available interaction and critical information dispersal on CERT-In’s website. The qualitative sections, on the other hand, will contain a comparative analysis of the content present in the technical documents of the CERT-In with the equivalent documentation (where present) of similar bodies in the USA and EU. Each section will then illustrate normative suggestions as to how CERT-In’s performance of that respective obligation can be improved to better serve its cyber security mandate.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cert-ins-proactive-mandate.pdf"&gt;Read the full article&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The image is published under Creative Commons License CC BY-SA. Anyone  can distribute, remix, tweak, and build upon this document, even for  commercial purposes, as long as they credit the creator of this document  and license their new creations under the terms identical to the  license governing this document&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cert-ins-proactive-mandate-a-report-on-indian-computer-emergency-response-teams-proactive-mandate-in-indian-cyber-security-ecosystem'&gt;https://cis-india.org/internet-governance/blog/cert-ins-proactive-mandate-a-report-on-indian-computer-emergency-response-teams-proactive-mandate-in-indian-cyber-security-ecosystem&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tiwari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-11-19T04:14:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy">
    <title>Centre’s order on computer surveillance threatens right to privacy, experts say</title>
    <link>https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy</link>
    <description>
        &lt;b&gt;The Constitutional validity of the notification allowing ten agencies to intercept information is uncertain.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Abhishek Dey was &lt;a class="external-link" href="https://scroll.in/article/906623/centres-order-on-computer-surveillance-threatens-right-to-privacy-experts-say"&gt;published in Scroll.in&lt;/a&gt; on December 22, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A notification issued by the Union Ministry of Home Affairs on  Thursday allowing ten agencies to intercept, monitor and decrypt any  information generated from any computer poses a grave threat to the &lt;a href="https://scroll.in/article/848321/supreme-courts-decision-that-privacy-is-a-fundamental-right-is-not-just-about-aadhaar"&gt;fundamental right&lt;/a&gt; to privacy, said lawyers and cyber security experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  notification led to a political storm on Friday and criticism from the  Opposition forced Parliament to be adjourned. However, Union Finance  Minister Arun Jaitley &lt;a class="link-external" href="https://indianexpress.com/article/india/oppn-making-a-mountain-where-molehill-does-not-exist-jaitley-on-mhas-surveillance-order-5504009/" rel="nofollow" target="_blank"&gt;accused&lt;/a&gt; the Opposition of “making a mountain where a molehill does not exist”.  The government on Friday issued a clarification stating that the  directive does not confer any new powers on it and has the legal backing  of the Information Technology Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts agreed that Thursday’s notification lists powers &lt;a href="https://scroll.in/article/906579/home-ministry-order-on-computer-surveillance-is-not-new-upa-introduced-provisions-in-2008"&gt;already available&lt;/a&gt; to the authorities in the Information Technology Act 2000. The legal  provisions to allow interception were introduced in 2008 by the  Congress-led United Progressive Alliance government. However, with the  fresh directive, experts said that the Bharatiya Janata Party-led  government seems to be trying to formalise surveillance through the  interception of computer information, they said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is true that  such [interception] powers already existed,” said Pavan Duggal, a  lawyer with expertise in cyber security. “But neither any such formal  directives were issued which I know of, nor any agency were specifically  notified to have those powers.”&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block" style="text-align: justify; "&gt;&lt;b&gt;Privacy test&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  Information Technology Act 2000 was amended in 2008 to allow to the  monitoring and interception of computer information, while the rules  under which this would operate were &lt;a class="link-external" href="http://meity.gov.in/writereaddata/files/Information%20Technology%20%28Procedure%20and%20Safeguards%20for%20Interception%2C%20Monitoring%20and%20Decryption%20of%20Information%29%20Rules%2C%202009.pdf" rel="nofollow" target="_blank"&gt;promulgated&lt;/a&gt; in 2009. In 2017, the Supreme Court delivered a judgment establishing  privacy as a fundamental right. The legal foundation of the computer  interception directive could be still be challenged in court because it  has not yet been considered in light of the privacy judgment, said  Duggal. “It is now a matter of Constitutional validity,” he said&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thursday’s  notification lists the agencies authorised to intercept, monitor and  decrypt computer data: the Intelligence Bureau, Narcotics Control  Bureau, Enforcement Directorate, Central Board of Direct Taxes,  Directorate of Revenue Intelligence, Central Bureau of Investigation,  National Investigation Agency, Cabinet Secretariat (RAW), Directorate of  Signal Intelligence (for service areas of Jammu and Kashmir, North East  and Assam) and the Commissioner of Police, Delhi. The Act provides a  jail term of seven years for anyone who refuses to cooperate with these  agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Friday, experts questioned whether a notification listing the 10  agencies had actually been issued earlier, as the Centre claimed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It  is a fresh notification,” said Apar Gupta, a lawyer who specialises in  technology and media issues. “With this, interception of computers has  received formal acceptance in the public domain and it can have serious  implications on privacy.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Senior officials of the Delhi Police  also said this appeared to be a fresh order. Asked if this meant that  the agencies would not need to ask for authorisation in every case since  a blanket order has been issued, the officials said that this still  needs to be clarified.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block" style="text-align: justify; "&gt;&lt;b&gt;Lacking proportionality&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  order has raised questions about the validity of the cases of  interception of computer information conducted by the state police and  other security agencies between 2009 (the year the interception rules  were promulgated) and 2018 (the year the notification has been issued),  Pranesh Prakash, co-founder of the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One possibility, he said, may be that they were all unlawful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But  if they were indeed conducted with legal backing, Prakash said, then  permission for this would  been sanctioned in the form of an order by a  competent authority. This is what Rule 3 of the &lt;a class="link-external" href="http://meity.gov.in/writereaddata/files/Information%20Technology%20%28Procedure%20and%20Safeguards%20for%20Interception%2C%20Monitoring%20and%20Decryption%20of%20Information%29%20Rules%2C%202009.pdf" rel="nofollow" target="_blank"&gt;interception rules&lt;/a&gt; mandate. But if so, Rule 4, which deals with the government authorising  agencies to conduct such interceptions, is redundant. “How can it not  be when any state police or other agency is capable of acquiring an  order for interception under Rule 3?” he said&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides, Prakash said, the new directive does not pass the test of proportionality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  2007, the Central government introduced rules to amend the Indian  Telegraph Act 1951 to allow for information to be intercepted, Prakash  said. However, the rules say that the competent authority should resort  to interception only after considering all alternative means to acquire  information. Thursday’s directive, though, is silent about the  circumstances in which interception will be permitted, he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy'&gt;https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-25T00:50:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/scroll-nehaa-chaudhari-and-tuhina-joshi-december-23-2018-centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards">
    <title>Centre’s order on computer surveillance is backed by law – but the law lacks adequate safeguards</title>
    <link>https://cis-india.org/internet-governance/news/scroll-nehaa-chaudhari-and-tuhina-joshi-december-23-2018-centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards</link>
    <description>
        &lt;b&gt;The Information Technology Act’s surveillance scheme furthers a colonial hangover.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Nehaa Chaudhari and Tuhina Joshi was published by &lt;a class="external-link" href="https://scroll.in/article/906764/centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards"&gt;Scroll.in&lt;/a&gt; on December 23, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;On Thursday, the Ministry of Home Affairs &lt;a class="link-external" href="http://egazette.nic.in/WriteReadData/2018/194066.pdf" rel="nofollow" target="_blank"&gt;issued&lt;/a&gt; a statutory order authorising 10 “security and intelligence agencies”  to intercept, monitor and decrypt electronic information and  communication. A media frenzy soon ensued, with Opposition political  parties seizing the notification as evidence that the government was  running a &lt;a class="link-external" href="https://indianexpress.com/article/india/centre-order-central-agencies-access-to-computers-opposition-reaction-5503615/" rel="nofollow" target="_blank"&gt;surveillance state&lt;/a&gt;. The ministry responded with a &lt;a class="link-external" href="http://pib.nic.in/PressReleseDetail.aspx?PRID=1556945" rel="nofollow" target="_blank"&gt;press release&lt;/a&gt;,  clarifying that the order was in keeping with Section 69(1) of the  Information Technology Act, 2000, and the Information Technology  (Procedure and Safeguards for Interception, Monitoring and Decryption of  Information) Rules, 2009, proving that the order was sound in law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several  government officials and Bharatiya Janata Party representatives have  since defended this order as being in India’s sovereign and national  security interest. They say it will bring transparency and  accountability into surveillance, and that is is only an extension of  the previous Congress-led government’s policy from 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No doubt, Central and state governments have had the power to  intercept, monitor and decrypt any information in any computer resource  since 2008, when Section 69 of the Information Technology Act was  amended to expand the government’s powers of interception. This  amendment was &lt;a class="link-external" href="https://privacyinternational.org/state-privacy/1002/state-privacy-india#commssurveillance" rel="nofollow" target="_blank"&gt;one of many changes&lt;/a&gt; introduced to India’s surveillance framework to tackle crime and terrorism &lt;a class="link-external" href="https://www.livemint.com/Industry/UTc7pjvKRUB9HCWBCoUo0K/Tweaking-the-law-to-deal-with-cyber-terrorism.html" rel="nofollow" target="_blank"&gt;in the wake of the 2008 terrorist attacks&lt;/a&gt; in Mumbai.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However,  the ministry’s December 20 directive is the first time such an order  has been introduced under this section; and in this difference between a  legislation being on the statute books versus it being implemented lies  the reason for collective public outrage. That said, research by &lt;a class="link-external" href="https://cis-india.org/@@search?SearchableText=surveillance" rel="nofollow" target="_blank"&gt;the Centre for Internet and Society&lt;/a&gt; and &lt;a class="link-external" href="https://sflc.in/surveillance-there-need-judicial-oversight" rel="nofollow" target="_blank"&gt;SFLC.in&lt;/a&gt; shows that the Indian state has long engaged in surveilling electronic  communications, and other kinds of interception and monitoring.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While railing against the ministry’s order is very welcome, it is futile  if it does not lead to a conversation around the root of the problem –  Section 69(1) of the Information Technology Act and the accompanying  Information Technology Rules. This section empowers the Central and  state governments to authorise government agencies to intercept, monitor  or decrypt “any information generated, transmitted, received or stored  in any computer resource”. It lays down six grounds on the basis of  which such authorisation may be granted. These are:&lt;/p&gt;
&lt;ol class="cms-block-ol cms-block" style="text-align: justify; "&gt;
&lt;li&gt;The preservation of India’s sovereignty or integrity.&lt;/li&gt;
&lt;li&gt;The security of the state.&lt;/li&gt;
&lt;li&gt;Public order.&lt;/li&gt;
&lt;li&gt;Maintaining friendly relations with other countries.&lt;/li&gt;
&lt;li&gt;Preventing offences relating to 1. to 4. from being incited or committed.&lt;/li&gt;
&lt;li&gt;Criminal investigations.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;All authorisation orders issued by the government under Section 69(1)  must be reasoned and written, and must be subject to the procedure laid  down in the Information Technology Rules. As per these rules, all such  orders must be scrutinised by a review committee of the Centre, or the  state in question, set up under &lt;a class="link-external" href="http://www.dot.gov.in/sites/default/files/358%2520GI-2014%2520dated%25208.2.2014_6.pdf?download=1" rel="nofollow" target="_blank"&gt;Rule 419A&lt;/a&gt; of the Indian Telegraph Rules, 1951. All review committees set up under  Rule 419A comprise only of government secretaries. This means that the  executive sits in judgment over its own decisions. This goes against one  of the most basic principles of justice and fairness – that no person  shall be a judge in their own case.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block" style="text-align: justify; "&gt;Threat to privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;State  surveillance threatens individual privacy and must be subject to  adequate safeguards. Privacy is a fundamental right guaranteed by the  Constitution of India, as &lt;a href="https://scroll.in/latest/848304/supreme-court-upholds-right-to-privacy-as-a-fundamental-right"&gt;recognised&lt;/a&gt; by nine judges of the Supreme Court in August 2017. Like all other  fundamental rights, the right to privacy is not absolute, and can be  restricted. According to the Supreme Court, these restrictions must be:  (1) backed by law, (2) for a legitimate state aim, and (3)  proportionate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consequently, any government order under Section  69(1) of the Information Technology Act must fulfil this three-part test  to be constitutional. The absence of judicial or legislative oversight  over the executive’s decision-making under Section 69(1) is likely to  make it a disproportionate restriction on an individual’s fundamental  right to privacy and, therefore, unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even the  government-appointed Justice Srikrishna Committee of Experts, which has  been given the task of framing India’s data protection law, was &lt;a class="link-external" href="http://meity.gov.in/content/data-protection-committee-report" rel="nofollow" target="_blank"&gt;concerned&lt;/a&gt; about this lack of legislative or judicial review. This committee has  cited Germany, the United Kingdom, South Africa and the United States as  countries with adequate procedural safeguards over government  surveillance actions. On page 125 of its final report, it has noted,  “Executive review alone is not in tandem with comparative models in  democratic nations which either provide for legislative oversight,  judicial approval or both.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology Act and the  Information Technology Rules are but one of many means of government  surveillance in India. Similar provisions exist in the Indian Telegraph  Act, 1885, the Telegraph Rules, 1951, and the Indian Post Office Act,  1898. These laws are the extension of a colonial legacy, used by a  foreign power to keep tabs on an alien population. Disappointingly, the  Information Technology Act’s surveillance scheme only furthers this  colonial hangover. Indian privacy thought, especially in the past few  years, has reflected the idea that we must evolve an Indian privacy  framework, grounded in our constitutional values, and tailored to the  Indian context. It is about time that our surveillance laws begin to  reflect our constitutional values as well.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;ol class="cms-block-ol cms-block" style="text-align: justify; "&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/scroll-nehaa-chaudhari-and-tuhina-joshi-december-23-2018-centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards'&gt;https://cis-india.org/internet-governance/news/scroll-nehaa-chaudhari-and-tuhina-joshi-december-23-2018-centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-24T17:04:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-sanjeeb-mukherjee-july-14-2017-centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks">
    <title>Centre to form panel to 'encrypt' MGNREGA-DBT database and prevent leaks </title>
    <link>https://cis-india.org/internet-governance/news/business-standard-sanjeeb-mukherjee-july-14-2017-centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks</link>
    <description>
        &lt;b&gt;Around 5 crore bank accounts of active MGNREGA workers yet to be seeded with Aadhaar.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;div&gt;The article by Sanjeeb Mukherjee was &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks-117071400329_1.html"&gt;published in the Business Standard&lt;/a&gt; on July 14, 2017.&lt;/div&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Alarmed over reports of ‘public disclosure’ of sensitive Aadhaar data  through various portals and payment gateways, the Centre is in the  process of appointing a high-powered panel of almost 20 experts to  suggest ways and means through which data, particularly one which can be  accessed through the MGNREGA-DBT platform can be encrypted.&lt;/p&gt;
&lt;p&gt;Encryption, officials believe, would prevent the Aadhaar data and other related information from falling into wrong hands.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The need for proper encryption of Aadhaar data rose after the  government made it mandatory for availing almost all benefits - be it  school scholarships, payments of &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA &lt;/a&gt;wages, identification of beneficiaries under mid-day meal scheme and even public distribution system along with others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ensuring cyber security has become all the more necessary as the  Central government, in a notification issued last month, has made it  mandatory for all bank accounts to be seeded with Aadhaar numbers by  December 31, 2017, or else they would cease to be operational until the  time the account holder furnishes his &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar+Number" target="_blank"&gt;Aadhaar number.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This could seriously hamper payment of wages to &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA &lt;/a&gt;workers because as per available information almost 5 crore active workers don’t have their bank accounts seeded with Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To complete the process before December 2017, the ministry of rural  development has planned special Aadhaar camps to be held in villages  from July 20 to September 2017.&lt;/p&gt;
&lt;p&gt;Recently, a website published all confidential details of customers of a  private telecom company including Aadhaar numbers and other  information.&lt;/p&gt;
&lt;p&gt;The breach was another instance of secure confidential information falling into public domain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Officials of the panel, which would be headed by former NASSCOM head  Kiran Karnik are expected to submit their report on the same within the  next few months.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other members of the panel include Director General of National  Institute of Smart Governance (NISG), officials from Indian Computer  Emergency Response Team (ICERT) and others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, cyber security experts believe that encrypting Aadhaar-DBT  details mainly for those schemes and programmes which have a direct  linkage with the public at this later stage has its own challenges as  the entire ecosystem around Aadhaar has grown manifold ever since it was  made mandatory for a variety of programmes.&lt;/p&gt;
&lt;p&gt;Also, in the absence of a national encryption policy, such a move will have its own legal and regulatory challenges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Ever since the government made Aadhaar mandatory for many things, the  entire ecosystem around it including the Central Identities Data  Repository (the agency which stores Aadhaar data is exposed to leaks,”  noted cyber law expert Pawan Duggal told &lt;i&gt;Business Standard.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He said that without a proper national encryption law, it would be  extremely challenging to provide legal and regulatory backing to encrypt  all Aadhaar- DBT data details for &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA.&lt;/a&gt; “Also now that the ‘cat is out of the bag,’ encryption of Aadhaar details will be hugely challenging,” Duggal said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Already, civil society activists said that after some concern, the  central government has removed all Aadhaar numbers and bank details from  &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA &lt;/a&gt;website, which has made tracking payments difficult.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A recent study by Amber Sinha and Srinivas Kodali from the Centre for  Internet and Society (CIS) found that granular details about individuals  including sensitive personally identifiable information such as Aadhaar  number, caste, religion, address, photographs and financial information  are only a few clicks away through government schemes dashboard and  portals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While initiatives such as the government open data portals may be  laudable for providing easy access to government data condensed for easy  digestion, however in the absence of proper controls exercised by the  government departments the results can be disastrous by divulging  sensitive and adversely actionable information about the individuals who  are responding units of such databases,” the report said.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;It specifically studied two major schemes of the ministry of rural  development; the National National Social Assistance Programme and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA &lt;/a&gt;along with some state schemes.&lt;br /&gt;
&lt;blockquote class="styleQ1 blockquoteBG"&gt;
&lt;div&gt;&lt;span&gt;&lt;b&gt;Pointers&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;a)  Centre to form a panel to encrypt all MGNREGA-DBT database to prevent leaks.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;b) The panel might also suggest ways and means in which such ‘encryption’ could be applied in other platforms.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;c)  The panel is expected to be headed by former NASSCOM head Kiran Karnik.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;d) The encryption is essential as from January 2018 all non-Aadhaar  seeded bank accounts will cease to be operational unless the holders  seed them.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;e)  A recent study found that vivid details about individuals can be easily accessed from government platforms and databases.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;f)   The &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA &lt;/a&gt;database was one such publicly available platform which formed part of the study.&lt;/div&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-sanjeeb-mukherjee-july-14-2017-centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks'&gt;https://cis-india.org/internet-governance/news/business-standard-sanjeeb-mukherjee-july-14-2017-centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-14T10:46:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-joins-dynamic-coalition-for-platform-responsibility">
    <title>Centre for Internet and Society joins the Dynamic Coalition for Platform Responsibility</title>
    <link>https://cis-india.org/internet-governance/blog/cis-joins-dynamic-coalition-for-platform-responsibility</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) has joined the multistakeholder cooperative engagement amidst stakeholders towards creating Due Diligence Recommendations for online platforms and Model Contractual Provisions to be enshrined in ToS. This blog provides a brief background of the role of dynamic coalitions within the IGF structure, establishes the need for the coalition and provides an update on the action plan and next steps for interested stakeholders.&lt;/b&gt;
        &lt;p class="callout" style="text-align: justify; "&gt;"Identify emerging issues, bring them to the attention of the relevant bodies and the general public, and, where appropriate, make recommendations."&lt;br /&gt;Tunis Agenda (Para 72.g)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first United Nations Internet Governance Forum (IGF), in 2006 saw the emergence of the concept of Dynamic Coalition and a number of coalitions have been established over the years. The IGF is structured to bring together multistakeholder groups to,&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"Discuss public policy issues related to key elements of Internet governance in order to foster the sustainability, robustness, security, stability and development of the Internet."&lt;br /&gt;Tunis Agenda (Para 72.a)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While IGF workshops allow various stakeholders to jointly analyse "hot topics" or to examine progress that such issues have undertaken since the previous IGF, dynamic coalitions are informal, issue-specific groups comprising members of various stakeholder groups. With no strictures upon the objects, structure or processes of dynamic coalitions claiming association with the IGF, and no formal institutional affiliation, nor any access to the resources of the IGF Secretariat, IGF Dynamic Coalitions allow collaboration of anyone interested in contributing to their discussions. Currently, there are eleven active dynamic coalitions at the IGF and can be divided into three distinct types—networks, working groups and Birds of Feather (BOFs).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Workshops at the IGF are content specific events that, though valuable in informing participants, are limited in their impact by being confined to the launch of a report or by the issues raised within the conference room. The coalitions on the other hand are expected to have a broader function, acting as a coalescing point for interested stakeholders to gather and analyse progress around identified issues and plan next steps. The coalitions can also make recommendations around issues, however, no mechanism has been developed so far, by which the recommendations can be considered by the plenary body. The long-term nature of coalition is perhaps, most suited to engage stakeholders in heterogeneous groups, towards understanding and cooperating around emerging issues and to make recommendations to inform policy making.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Platform Responsibility&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Social networks and other interactive online services, give rise to 'cyber-spaces' where individuals gather, express their personalities and exchange information and ideas. The transnational and private nature of such platforms means that they are regulated through contractual provisions enshrined in the platforms' Terms of Service (ToS). The provisions delineated in the ToS not only extend to users in spite of their geographical location, the private decisions undertaken by platform providers in implementing the ToS are not subject to constitutional guarantees framed under national jurisdictions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While ToS serve as binding agreement online, an absence of binding international rules in this area despite the universal nature of human rights represented is a real challenge, and makes it necessary to engage in a multistakeholder effort to produce model contractual provisions that can be incorporated in ToS. The concept of 'platform responsibility' aims to stimulate behaviour in platform providers to provide intelligible and solid mechanisms, in line with the principles laid out by the UN Guiding Principles on Business and Human Rights and equip platform users with common and easy-to-grasp tools to guarantee the full enjoyment of their human rights online. The utilisation of model contractual provisions in ToS may prove instrumental in fostering trust in online services for content production, use and dissemination, increasing demand of services and ultimately consumer demand may drive the market towards human rights compliant solutions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Dynamic Coalition on Platform Responsibility&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To nurture a multi-stakeholder endeavour aimed at the elaboration of model contractual-provisions, Mr. Luca Belli, Council of Europe / Université Paris II, Ms Primavera De Filippi, CNRS / Berkman Center for Internet and Society and Mr Nicolo Zingales, Tilburg University / Center for Technology and Society Rio, initiated and facilitated the creation of the Dynamic Coalition on Platform Responsibility (DCPR). DCPR has over fifty individual and organisational members from civil society organisations, academia, private sector organisations and intergovernmental organisations and held its first meeting at the IGF in Istanbul. The meeting began with an overview of the concept of platform responsibility, highlighting relevant initiatives from Council of Europe, Global Network Initiative, Ranking Digital Rights and the Center for Democracy and Technology have undertaken in this regard. Existing issues such as difficulty in comprehension and lack of standardization of redress across rights were raised along with the fundamental lack of due process in terms of transparency across existing mechanisms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Online platforms compliance to human rights is often framed around the duty of States to protect human rights and often, Internet companies do not sufficient consideration of the effects of their  business practices on users fundamental rights undermining trust.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting focused it efforts with a call to identify issues of process and substance and specific rights and challenges to be addressed by the DCPR. The procedural issues raised concerned  'responsibility' in decision-making e.g., giving users the right to be heard and an effective remedy before an impartial decision-making body, and obtaining their consent for changes in the contractual terms.  The concerns raised around substantive rights such as privacy and freedom of expression eg., disclosure of personal information and content removal and need to promote 'responsibility' through establishing concrete mechanisms to deal with such issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was suggested that concept of responsibility including in case of conflict between different rights could be grounded in Human Rights case law eg., from European Court of Human Rights jurisprudence. It was also established that any framework that would evolve from this coalition would consider the distinction between users (eg., adults, children, and people with or without continuous access to the Internet) and platforms (eg., in terms of size and functionality).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Action Plan&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The participants at the DCPR meeting agreed to establish a multistakeholder cooperative engagement amidst stakeholders that will go beyond dialogue and produce concrete proposals. Particularly, participants suggested developing:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Due Diligence Recommendations: Recommendations to online platforms with regard to processes of compliance with internationally agreed human rights standards.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Model Contractual Provisions: Elaboration of a set of principles and provisions protecting platform users’ rights and guaranteeing transparent mechanisms to seek redress in case of violations.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;DCPR will ground the development of these frameworks in the preliminary step of compilation of existing projects and initiatives dealing with the analysis of ToS compatibility with human rights  standards. Members, participants and interested stakeholders are invited to highlight and share relevant initiatives by 10th October regarding:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Processes of due diligence for human rights compliance;&lt;/li&gt;
&lt;li&gt;The evaluation of ToS cocompliance with human rights standards;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Further to this compilation, a first recommendation draft regarding online platforms' due diligence will be circulated on the mailing list by 30th October 2014. CIS will be contributing to the drafting which will be led and elaborated by the DCPR coordinators. This draft will be open for comments via the DCPR mailing list until 30th November 2014 and we encourage you to sign up to the mailing list (&lt;a class="external-link" href="http://lists.platformresponsibility.info/listinfo/dcpr"&gt;http://lists.platformresponsibility.info/listinfo/dcpr&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;A second draft will be developed compiling the comments expressed via the mailing-list and shared for comments by 10 December 2014. The final version of the recommendation will be drafted by 30 December. Subsequently, the first set of model contractual provisions will be elaborated  building upon such recommendation. A call for inputs will be issued in order to gather suggestions on the content of these provisions.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-joins-dynamic-coalition-for-platform-responsibility'&gt;https://cis-india.org/internet-governance/blog/cis-joins-dynamic-coalition-for-platform-responsibility&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Human Rights</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Terms of Service</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Platform Responsibility</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2014-10-07T10:54:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-august-21-2018-centre-draws-red-lines-for-whatsapp-over-fake-news-says-must-comply-with-indian-laws">
    <title>Centre draws red lines for Whatsapp over fake news, says must comply with Indian laws</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-august-21-2018-centre-draws-red-lines-for-whatsapp-over-fake-news-says-must-comply-with-indian-laws</link>
    <description>
        &lt;b&gt;In a meeting with WhatsApp’s CEO Chris Daniels, Union minister Ravi Shankar Prasad said India put forward several demands, including that the company must have a grievance officer in India and have proper compliance of Indian laws.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nakul Sridhar was published in the &lt;a class="external-link" href="https://www.hindustantimes.com/india-news/centre-draws-red-lines-for-whatsapp-over-fake-news-says-must-comply-with-indian-laws/story-Lcxosvi1gl11MZv3tVNQ2J.html"&gt;Hindustan Times&lt;/a&gt; on August 21, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Union government on Tuesday told the Facebook-owned WhatsApp to  comply with Indian law, set up an  Indian entity, and appoint a  grievance officer in India to who people can reach immediately.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  directive comes at a when the government has pulled up the company for  fake news spread on the social media platform serving as a contributory  factor in several incidents of mob lynching across the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ravi  Shankar Prasad, Minister for Electronics and Information Technology,  conveyed this to the global head of WhatsApp, Chris Daniels, who is in  India this week. This is the first time that the government has spelt  out its key expectations from the platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I told him there  have been sinister developments like fake news and revenge porn, which  are criminal and against Indian laws. I suggested three points: they  must have a grievance officer in India; they must comply with Indian  laws; and they must have a local, corporate entity in India,” Prasad  said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Daniels,  he added, had agreed to the three conditions. WhatsApp did not offer an  independent confirmation or respond to questions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prasad said he  also told Daniels that WhatsApp would have to comply with Reserve Bank  of India (RBI) guidelines to start its payments services in India,  saying that the firm would have to store the financial data it collects  from India within the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After at least 30 lynchings in the  past one year were linked to rumours and fake news spread through the  WhatsApp platform, the IT ministry sent two notices to the company last  month, asking it to curb the spread of such messages. WhatsApp’s chief  operating officer, Matthew Idema, had met the IT ministry secretary Ajay  Sawhneytowards the end of July to discuss the issue of fake news  with the ministry and explain the steps it was taking in curbing its  spread.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The application made it more difficult to forward media by  removing shortcuts, limited the number of people a forwarded message  can be sent to at a time to five, and introduced a ‘forwarded’ label for  such messages after the push from the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Explaining its  broad approach, a top government functionary, who asked not to be named,  said, “We cannot accept digital imperialism. India is an open society.  We have embraced technology and innovation. But no one should think they  can come and do as they like. Firms like WhatsApp must conform to our  rules, laws, and address problems.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reiterating his demand that  WhatApp must find “a technological solution” to trace the origin of  rumour-mongering messages, Prasad said, “It does not need rocket science  to locate a message being circulated thousands and lakhs of times on  the same day, on the same issue, in the same district and same state.”  He said Daniels agreed to comply.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But experts believe that  delivering on these demands will be challenging. “WhatsApp, according to  my understanding, does not store metadata (such as phone number sent  from) for text messages that are transmitted using their application or  via the web client. Unfortunately, WhatsApp does not make this explicit  in their public documentation,” said Sunil Abraham, founder of the think  tank, Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Therefore, many  governments erroneously believe that sources of specific messages can be  determined by big data analysis similar to the analysis of SMS metadata  from telecom operators,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Metadata includes information  such as the sender and recipient, date and time. “Now it would also  include whether the message is forwarded,” said Abraham.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-august-21-2018-centre-draws-red-lines-for-whatsapp-over-fake-news-says-must-comply-with-indian-laws'&gt;https://cis-india.org/internet-governance/news/hindustan-times-august-21-2018-centre-draws-red-lines-for-whatsapp-over-fake-news-says-must-comply-with-indian-laws&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-08-27T14:24:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-june-2-2017-nidhi-sharma-centre-brings-in-new-safeguards-following-cases-of-aadhaar-data-leaks-on-government-websites">
    <title>Centre brings in new safeguards following cases of Aadhaar data leaks on government websites</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-june-2-2017-nidhi-sharma-centre-brings-in-new-safeguards-following-cases-of-aadhaar-data-leaks-on-government-websites</link>
    <description>
        &lt;b&gt;The Centre has put in new safeguards following a number of cases of Aadhaar data leaks on government websites. All ministries are being asked to encrypt all Aadhaar data and personal financial details. Also, officials are being "sensitised" about legal consequences of data breach. And every government department is to now have one official responsible for Aadhaar data protection.
&lt;/b&gt;
        &lt;p&gt;The article by Nidhi Sharma was published in the &lt;a class="external-link" href="http://economictimes.indiatimes.com/news/economy/policy/centre-brings-in-new-safeguards-following-cases-of-aadhaar-data-leaks-on-government-websites/articleshow/58952785.cms"&gt;Economic Times&lt;/a&gt; on June 2, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The ministry of electronics and information technology has written to all departments on better data security. ET has reviewed the new guidelines. Aadhaar, a 12-digit unique identity number issued on the basis of biometric data, is linked to a person's bank account and used by government agencies to directly transfer benefits of several social welfare schemes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Senior officials, who spoke off record, told ET all departments have been asked to immediately review their website content to check if personal data is on display.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="Untitled-4" src="http://economictimes.indiatimes.com/img/58952889/Master.jpg" title="Untitled-4" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A set of 27 dos and 9 don'ts has been circulated on data handling. This includes instructions on masking Aadhaar data and bank details as well as encrypting data. The government has mandated regular audits to check safety of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ministry letter says, "It has come to notice there have been instances wherein personal identity or information of residents, along with Aadhaar numbers and demographic information, and other sensitive personal data ... have been published online."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The letter also spells out legal consequences of such data breach and warns the government departments to check future leaks. "Publishing identity information, i.e. Aadhaar number along with demographic information is in clear contravention of the provisions of the Aadhaar Act 2016 and constitutes an offence punishable with imprisonment up to 3 years. Further, publishing of financial information including bank details, being sensitive personal data, is also in contravention of provision under IT Act 2000 with violations liable to pay damages by way of compensation to persons affected."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move to protect personal data comes after reports that data of 130 million Aadhaar cardholders has been leaked from four government websites. Reports, based on a study conducted by the Centre for Internet and Society (CIS) said Aadhaar numbers and details have been leaked.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-june-2-2017-nidhi-sharma-centre-brings-in-new-safeguards-following-cases-of-aadhaar-data-leaks-on-government-websites'&gt;https://cis-india.org/internet-governance/news/economic-times-june-2-2017-nidhi-sharma-centre-brings-in-new-safeguards-following-cases-of-aadhaar-data-leaks-on-government-websites&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-06T15:41:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
