<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2566 to 2580.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/caught-in-web"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-november-22-2016-chetana-divya-vasudev-caught-in-a-filter-bubble"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/catch-all"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cases-on-the-right-to-be-forgotten-what-have-we-learned"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cartonama"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cartonama-conference"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-december-5-2013-kirthi-v-rao-moulishree-srivastava-card-transactions-with-aadhar-validation-need-more-time"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/development-informatics-paper-number-81-aayush-rathi-and-ambika-tandon-capturing-gender-and-class-inequities"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-siladitya-ray-june-4-can-uber-ola-apps-be-blocked"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-september-5-2018-surupasree-sarmmah-can-this-curb-your-addiction"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/mouse-a-tool-of-revolution"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/can-matters-dealt-with-in-aadhaar-act-be-objects-of-money-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-february-21-2017-can-the-judiciary-upturn-the-lok-sabha-speakers-decision-on-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/can-the-aadhaar-act-2016-be-classified-as-a-money-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/new-york-times-july-11-2013-can-india-trust-its-government-on-piracy"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/caught-in-web">
    <title>Caught in the Web</title>
    <link>https://cis-india.org/caught-in-web</link>
    <description>
        &lt;b&gt;Do we need a cyber Big Brother watching us? A look at both sides of the coin.&lt;/b&gt;
        
&lt;p&gt;In the summer of 2009, a hue and cry was raised by netizens when the Government blocked a hugely popular adult-oriented cartoon site called Savitabhabhi.com. The site was blocked after complaints that Savita Bhabhi's lurid tales were highly offending to the sensibilities of those grounded in Indian traditions. Those who opposed the move said that this was done without granting the creators an opportunity to defend their right to freedom of expression.&lt;br /&gt;Recent ruffles&lt;br /&gt;&lt;br /&gt;A similar brouhaha erupted recently when Communication and IT Minister Kapil Sibal, in a hurriedly called press conference, announced that the Government will bring in a law to pre-filter content posted on social networking Web sites. The trigger for this was certain pictures, with religious connotations, uploaded on various social networking sites including Facebook and Google Plus. Sibal claims that despite Government appeals the Web site refused to remove the content.&amp;nbsp; If the new law is implemented, your status updates or videos will be screened by the internet company for objectionable content before it is published.&lt;br /&gt;&lt;br /&gt;The move has angered Internet users, promoters of free speech and social networking companies. “As it is the status of freedom of speech in India is in a bad shape. Sibal's new rules will only make it worse,” says Sunil Abraham, Executive Director, Centre for Internet and Society.&lt;br /&gt;&lt;br /&gt;Abraham's point is buttressed by a report from the United Nations Democracy Fund called ‘Freedom on the Net 2011' which gives Indian Internet usage a “partly free” status clubbed along with the likes of Egypt, Jordan, Rwanda and Venezuela.&lt;br /&gt;&lt;br /&gt;“Pressure on private intermediaries to remove certain information in compliance with administrative censorship orders has increased since late 2009, with the implementation of the amended IT Act.&amp;nbsp; While some observers acknowledge that incendiary online content could pose a real risk of violence, particularly given India's history of periodic communal strife, press freedom and civil liberties advocates have raised concerns over the far-reaching scope of the IT Act, its potential chilling effect, and the possibility that the authorities could abuse it to suppress political speech,” the report says.&lt;br /&gt;User content removal&lt;br /&gt;&lt;br /&gt;When Google began reporting government requests for data and content removal in early 2010, India ranked third in the world for removal requests and fourth for data requests. Between July 1, 2009, and December 31, 2009, India had submitted 142 removal requests.&amp;nbsp;&amp;nbsp; By June 2011, the Internet search giant received requests from the Indian government to remove 358 items. In a breakdown of reasons for such requests, 255 items were classified under the “government criticism” category. In May 2008, two men were arrested and charged for posting derogatory comments about Congress party chief Sonia Gandhi on Orkut. There are many other instances of Government intervention over the past 3 years.&lt;br /&gt;&lt;br /&gt;Those who support monitoring argue that content on social media network should be scanned because the users are not responsible enough. California-based media commentator Andrew Keen blames the Internet users in a book called The Cult of the Amateur where he writes that technology has fostered a “dictatorship of idiots”. “.....the masses are liable to be further vulgarised by the overwhelming surfeit of their own voluntary contributions, which are inherently without value (otherwise they wouldn't have been offered freely). Without cultural elites empowered to control public discourse and deify their chosen superstars, the monkeys are running the show,” Keen declares.&lt;br /&gt;&lt;br /&gt;Abraham says this argument is flawed because there is no empirical evidence to determine that people use the Internet for a single purpose. “There is no cause and effect here. People may use the Internet for anything ranging from pornography to science. One cannot generalise user behaviour. If Internet was a tool for the Egypt uprising, the same may not work in some other country,” says Abraham.&lt;br /&gt;Monitoring issues&lt;br /&gt;&lt;br /&gt;Then there are others who want the social network Web sites to take some responsibility. Rajesh Chharia, President of the Internet Service Providers Association thinks that multi-national Internet firms cannot get away by saying that they conform to standards of their country alone.&lt;br /&gt;&lt;br /&gt;But experts feel that it is practically impossible for any social networking Web site to monitor everything that's posted on their site due to sheer volume. For instance, YouTube has 48 hours of videos uploaded every minute and Facebook has 38 million users in India posting thousands of pictures and messages every day. “The Internet is like a sea, you just cannot control everything that's thrown into it unless you man the entire coastline. Even if you block someone from posting content on one site, they will find another way to get in,” said one of major Internet firms.&lt;br /&gt;&lt;br /&gt;Meanwhile the Savita Bhabhi site is back with all new content at a new address. So much for the Government's desire to monitor the Internet.&lt;/p&gt;
&lt;p&gt;This article by Thomas K Thomas was published in the Hindu Business Line. Sunil Abraham was quoted in this article. Read the original &lt;a class="external-link" href="http://www.thehindubusinessline.com/features/eworld/article2704496.ece?ref=wl_features"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/caught-in-web'&gt;https://cis-india.org/caught-in-web&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-12-12T15:32:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-november-22-2016-chetana-divya-vasudev-caught-in-a-filter-bubble">
    <title>Caught in a filter bubble</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-november-22-2016-chetana-divya-vasudev-caught-in-a-filter-bubble</link>
    <description>
        &lt;b&gt;The country seems to be polarised over demonetisation and its after-effects. And more likely than not, you’ve had plenty of news stories to read that corroborate what you believe, regardless of whether you think the scrapping of the Rs 500 and Rs 1,000 notes was an ingenious plan or not, especially if you get most of your news on social media.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Chetana Divya Vasudev was &lt;a class="external-link" href="http://www.deccanherald.com/content/582345/caught-filter-bubble.html"&gt;published by Deccan Herald&lt;/a&gt; on November 22, 2016. Rohini &lt;span class="st"&gt;Lakshané&lt;i&gt; &lt;/i&gt;&lt;/span&gt;was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;However, does the news you’re consuming give you a clear picture of everything going on around you or is it merely helping you live in your own bubble? This has become a hot topic of discussions post the US Presidential elections, with Facebook also coming under fire for it.&lt;br /&gt;&lt;br /&gt;Social media sites in particular and the internet in general have been serving people stories that put forth points of view they largely agree with. “This is a phenomenon called the social media filter bubble,” says Rohini Lakshane, programme officer, Centre for Internet and Society. This means that because most people in your network think like you, what you read mostly concurs with your opinions, reinforces your bias, reducing your chances of coming across opposing viewpoints, she explains. “It’s all-pervasive, Twitter also tailors your feeds and the ‘while you were away’ section, unless you uncheck it in your settings,” she says. Using incognito mode for Google searches and clearing cookies are a couple of other steps you could take to check this filter bubble, she adds.&lt;br /&gt;&lt;br /&gt;“As someone into policy research, I can’t let my personal prejudices affect what I read or understand,” she offers. “So I also ensure I constantly interact with people from different walks of life.” Keeping an open mind to multiple perspectives could help people remain more informed, she suggests.&lt;br /&gt;&lt;br /&gt;Entrepreneur Devashish Mamgain says he makes a conscious effort to search for stories he knows he wouldn’t agree with. “I do this because I’m already up to date with what I like or support, and I think it’s important to know the other side as well,” he says. He doesn’t rely on social media for his news but knows many who do and thinks it limits their knowledge.&lt;br /&gt;&lt;br /&gt;Savitha A Isaac, a content writer, says she unsubscribes to newsfeeds on Facebook she doesn’t want to read. “I get annoyed when it shows up what’s trending — videos and memes that are going viral. I feel most of this is US-centric; almost like it’s telling us we have to care about what’s happening there. My husband and I have noticed that Google keeps tabs on what you’re searching for and comes up with suggestions,” she says. This is also true of Facebook.&lt;br /&gt;&lt;br /&gt;“I usually read a lot of investigative and feminist stories from certain sites. And when such links pop up as suggestions on your wall — or is reflected in the adds you see — it feels really nice. But it also feels wrong,” she says. “It’s creepy, almost as if someone’s stalking you.”&lt;br /&gt;&lt;br /&gt;Uroosa Ayman Fathima, her colleague, believes most content on social media is not accurate. “I only click on a link if it’s that of a news website I trust to be at least 80 per cent accurate,” she says. And she verifies what catches her interest with news in the print media, a more credible source, she believes.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-november-22-2016-chetana-divya-vasudev-caught-in-a-filter-bubble'&gt;https://cis-india.org/internet-governance/news/deccan-herald-november-22-2016-chetana-divya-vasudev-caught-in-a-filter-bubble&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-11-24T01:45:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/catch-all">
    <title>Catch-all approach to Net freedom draws activist ire</title>
    <link>https://cis-india.org/news/catch-all</link>
    <description>
        &lt;b&gt;The Internet has revolutionized the way we socialise, date and even protest. Online activism is a faster, more effective way to get more people to react to a cause. But at the same time it is this speed that makes Internet-generated protests a far graver danger than offline protests. Egypt faced an Internet shutdown when the protest started gaining steam and China has been throttled with heavy cyber censorship for years. Unfortunately, silencing the voices of dissent online is as easy as raising them. This article by Annie Johnny appeared in the Sunday Guardian, New Delhi on 13 March 2011. &lt;/b&gt;
        
&lt;p&gt;A workshop recently conducted at the Constitution Club in New Delhi brought together human rights activists, bloggers and techies and explored the challenges faced by online activists.&lt;/p&gt;
&lt;blockquote&gt;“When the Internet was in its nascent stage, there was the Utopian belief that the government would not have the same role to play as it does offline. However, the Internet is being increasingly regulated by the government,” says Dr. Anja Kovacs, fellow, Centre for Internet and Society, Bangalore.&lt;/blockquote&gt;
&lt;p&gt;The Binayak Sen and Pink Chaddi campaigns provide a picture of how fast and efficient online activism is. “Initially, the campaign was restricted to a centralised network of people and was a way for me and my friends to vent out our thoughts. But it grew beyond our expectations. Between March 2008 and May 2009, we had about 1.5 million visitors. Our experience with the Internet as an effective tool in mobilising people has been very positive,” says Satya Sivaraman, one of the initiators of the Free Binayak Sen Campaign website.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Blocking websites that promote child pornography and hate speech is acceptable. Activists, however, are concerned about the mysterious disappearances of blogs and the vague explanations given to justify them.&lt;/p&gt;
&lt;blockquote&gt;“There is a provision for spam in the IT Act. While the rule is meant for only for spam, it is extended over a much wider area. According to it, anything that is deemed objectionable can be blocked. Instead of targeting offensive material, the act should target harmful content. Child pornography and hate speeches cause harm, whereas what is ‘offensive’ is subjective,” says Pranesh Prakash, programme manager, Centre for Internet and Society.&amp;nbsp;&lt;/blockquote&gt;
&lt;p&gt;Bloggers in countries like Thailand and Singapore face serious consequences for posting anti-state views online. However, very few people all over the world are standing up against the curtailing of the right to freedom of expression online.&lt;/p&gt;
&lt;blockquote&gt;“There are ways to access blocked sites but most people do not bother to do that. If a site is blocked, they will simply accept it. The government in India is becoming increasingly restrictive. While their reason for concern is valid as the restrictions are in place to protect national security, the way they are dealing with this is inappropriate. Drafting vague rules related to objectionable content’ without specifying whom the content is objectionable to, is not going to help. There needs to be clearly defined categories for banning sites,” says Kovacs.&lt;/blockquote&gt;
&lt;p&gt;Rising against the growing restrictions and the wide gaps in Internet accessibility, The Internet Rights and Principles coalition, which works on Internet rights, is coming up with a Charter for Human Rights and Principles for the Internet.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The charter, which is still being drafted and has been put online for suggestions, emphasises that human rights apply the same way online as they do offline, and lays down rules and Internet policies necessary to protect human rights.&lt;/p&gt;
&lt;p&gt;Another interesting observation is that most online protests don’t always spark parallel offline protests. The Meter Jam protest against the high auto fares in Mumbai is one such example.&lt;/p&gt;
&lt;blockquote&gt;“While it helped the middle class vent their frustration, on the day of the actual offline protest, hardly anyone boycotted autos. Business went on as usual,” says Kovacs.&lt;/blockquote&gt;
&lt;ul&gt;&lt;li&gt;See the article on the Sunday Guardian &lt;a class="external-link" href="http://www.sunday-guardian.com/technologic/catch-all-approach-to-net-freedom-draws-activist-ire"&gt;website&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Download the original pdf &lt;a href="https://cis-india.org/advocacy/catch-net-freedom" class="internal-link" title="Catch file"&gt;here&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/catch-all'&gt;https://cis-india.org/news/catch-all&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T15:43:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cases-on-the-right-to-be-forgotten-what-have-we-learned">
    <title>Cases on the right to be forgotten, what have we learned?</title>
    <link>https://cis-india.org/internet-governance/news/cases-on-the-right-to-be-forgotten-what-have-we-learned</link>
    <description>
        &lt;b&gt;Internet Governance Forum (IGF) 2015 will be held at Jao Pessoa in Brazil from November 10 to 13, 2015. The theme of IGF 2015 is Evolution of Internet Governance: Empowering Sustainable Development. Jyoti Panday is attending the workshop on "Cases on the right to be forgotten, what have we learned?" to be held on November 11, 2015 at IGF 2015.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Click to read the &lt;a class="external-link" href="http://igf2015.sched.org/event/49c272c76c66a8f85ca407f2dcb80263?iframe=no&amp;amp;w=i:100;&amp;amp;sidebar=yes&amp;amp;bg=no#.Vj6xF158hQq"&gt;full details on the IGF website&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Since the EU Court of Justice ruled to uphold and  codify the Right to Be Forgotten, Free expression activists fear that  the decision will open the door to corporate and government censorship.  However and apart from the European case, how much do we know from the  rest of the world? It is part of a cross-workshop collaboration with  Workshop 31 that look at the procedural and legal implications of such  rulings. &lt;br /&gt;&lt;br /&gt;In a conversational format, the roundtable seek to  understand arguments, scope, discussions and current situation of the  Right to be Forgotten outside the EU and around the world in rulings and  legislations (enacted and proposed).&lt;br /&gt;&lt;br /&gt;The round table will start with kick off presentations (3 minutes) of cases by local activists, such as&lt;br /&gt;&lt;br /&gt;Mexican data authority IFAI fine to Google &lt;br /&gt;Colombian Court case against El Tiempo and ultimately Google&lt;br /&gt;Chilean bill intended to modify the Data Protection Act&lt;br /&gt;Legislation in Nicaragua codifying the ‘right to be forgotten’&lt;br /&gt;Japan's court case against Google&lt;br /&gt;South Korean analysis process to adopt the ‘right to be forgotten’&lt;br /&gt;&lt;br /&gt;After  those presentations, participants will be divided into groups to be  facilitated by the speakers. These groups will discuss and note  problems, challenges and enabling environments on the cases in order to  draw some “lessons learned”. The full group will reconvene on the  roundtable format to detect particularities of the debate beyond EU and  will present, discuss and define 10 lessons that can be drawn from these  experiences to protect freedom of expression in these debates.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cases-on-the-right-to-be-forgotten-what-have-we-learned'&gt;https://cis-india.org/internet-governance/news/cases-on-the-right-to-be-forgotten-what-have-we-learned&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-11-08T02:24:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cartonama">
    <title>Cartonama Workshop</title>
    <link>https://cis-india.org/internet-governance/cartonama</link>
    <description>
        &lt;b&gt;HasGeek presents an intensive, hands-on training for managing and building location based services at the Centre for Internet &amp; Society (CIS), Bangalore on 2nd and 3rd March, 2012. CIS is a partner for this event.&lt;/b&gt;
        
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;About the Workshop&lt;/h2&gt;
&lt;p&gt;Around 95% smartphone users around the world - which translates to about &lt;a class="external-link" href="http://blur-marketing.com/blog/trends-and-statistics-in-location-based-services/"&gt;468 million people - are using Location Based Services&lt;/a&gt; to look for points of interests, ATMs, restaurants, hotels and many other services. They are checking traffic status, and sharing locations and check-ins with friends on various social networks. In the last four years, this industry has grown six times, to a whooping $6 billion.&lt;/p&gt;
&lt;p&gt;Cartonama Workshop will provide developers, neo-geographers and entrepreneurs working on location based services with hands-on training on advanced tools to manage and represent their geographic data.&lt;/p&gt;
&lt;p&gt;The trainers will help participants to learn use of tools such as databases, tile servers, tile studios, Geocoding APIs, search APIs and JavaScript libraries through an application building exercise. The learning process is interspersed with lectures and discussion sessions on issues such as quality of geographic data, commercialization, licensing and privacy. For more details about the workshop sessions, &lt;a class="external-link" href="http://funnel.hasgeek.com/cartonama-workshop/"&gt;visit the HasGeek funnel&lt;/a&gt;.&lt;/p&gt;
&lt;div align="center"&gt;&lt;iframe src="http://www.youtube.com/embed/5kwIYzW8hoc" frameborder="0" height="315" width="315"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Speakers&lt;/h2&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/schuyler_erle.jpg/image_preview" title="Schuyler" height="101" width="101" alt="Schuyler" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Schuyler Erle&lt;/strong&gt;&lt;br /&gt;Free Software developer and evangelist for over fifteen years. He was a co-author of 'Mapping Hacks' and 'Google Maps Hacks'. He was also a co-founder of the OpenLayers and TileCache projects, and is a charter member of the OSGeo Foundation. He also works in the fields of wireless networking, intelligent search engines and the Semantic Web and was the lead developer of NoCatAuth which is an open source wireless captive portal. He built geocoder.us, which is an open source United States. address geocoder. More recently, Schuyler helped found the Humanitarian OpenStreetMap Team and serves on its Board of Directors. He currently resides in San Francisco.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/mikel_maron.jpg/image_preview" title="Mikel Maron" height="100" width="100" alt="Mikel Maron" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Mikel Maron&lt;/strong&gt;&lt;br /&gt;Programmer and geographer working for impactful community and humanitarian uses of open source and open data. He is co-founder of Ground Truth Initiative, and of the Map Kibera project. He’s on the Board of the OpenStreetMap Foundation, and President of the Humanitarian OpenStreetMap Team, having helped to facilitate the OSM response to the Haiti earthquake. He’s travelled widely, organizing projects in India, Palestine, Egypt, Swaziland, and elsewhere. Previously, he co-founded Mapufacture and worked on collaborative platforms, and geoweb standards, with a wide spectrum of organizations from UN and government agencies to anarchist hacker collectives.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
In 2008, Mikel Maron and Schuyler Erle conducted &lt;a href="https://cis-india.org/internet-governance/wiki.openstreetmap.org/wiki/India/Events/Free_Map_India_2008" class="external-link"&gt;a series of workshops in India&lt;/a&gt;. From Delhi to Ludhiana, Pune, Mumbai, Kerala and Bangalore. The workshop series poked people like &lt;a class="external-link" href="http://twitter.com/planemad"&gt;Arun Ganesh&lt;/a&gt;
 and inspired them to map and build applications. Arun and his friends 
mapped Chennai extensively and created beautiful maps. They also put the
 data together into &lt;a href="https://cis-india.org/internet-governance/busroutes.in" class="external-link"&gt;busroutes.in&lt;/a&gt;
&lt;p&gt;.
 BusRoutes.in remains as one of the best examples of using crowdsourced 
geographic information to create applications that are useful.&lt;/p&gt;
&lt;h2&gt;Sessions&lt;/h2&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;a class="external-link" href="http://funnel.hasgeek.com/cartonama-workshop/194-introduction-to-openstreetmap"&gt;&lt;img src="https://cis-india.org/home-images/osm.jpg/image_preview" alt="OpenStreetMap" class="image-inline image-inline" title="OpenStreetMap" /&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;a class="external-link" href="http://funnel.hasgeek.com/cartonama-workshop/195-gps-surveying-for-osm"&gt;&lt;img src="https://cis-india.org/home-images/GPS.jpg/image_preview" alt="GPS Surveying" class="image-inline image-inline" title="GPS Surveying" /&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;a class="external-link" href="http://funnel.hasgeek.com/cartonama-workshop/196-downloading-from-gps"&gt;&lt;img src="https://cis-india.org/home-images/Down.jpg/image_preview" alt="Downloading from GPS" class="image-inline image-inline" title="Downloading from GPS" /&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;a class="external-link" href="http://funnel.hasgeek.com/cartonama-workshop/197-editing-data-in-osm"&gt;&lt;img src="https://cis-india.org/home-images/Edit.jpg/image_preview" alt="Editing Data" class="image-inline image-inline" title="Editing Data" /&gt;&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;strong&gt;Introduction to OpenStreetMap&lt;/strong&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;strong&gt;GPS Surveying for OpenStreetMap&lt;/strong&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;strong&gt;Downloading from GPS&lt;/strong&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;strong&gt;Editing Data for OpenStreetMap&lt;/strong&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;a class="external-link" href="http://funnel.hasgeek.com/cartonama-workshop/198-tagging-and-map-features"&gt;&lt;img src="https://cis-india.org/home-images/tag.jpg/image_preview" alt="Tagging" class="image-inline image-inline" title="Tagging" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;a class="external-link" href="http://funnel.hasgeek.com/cartonama-workshop/199-geo-file-formats"&gt;&lt;img src="https://cis-india.org/home-images/Geographic.jpg/image_preview" alt="Geographic file formats" class="image-inline image-inline" title="Geographic file formats" /&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;a class="external-link" href="http://funnel.hasgeek.com/cartonama-workshop/200-geo-enabled-databases"&gt;&lt;img src="https://cis-india.org/home-images/Geoenabled.jpg/image_preview" alt="Geo-enabled Databases" class="image-inline image-inline" title="Geo-enabled Databases" /&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;a class="external-link" href="http://funnel.hasgeek.com/cartonama-workshop/201-processing-osm-data"&gt;&lt;img src="https://cis-india.org/home-images/process.jpg/image_preview" alt="Processing" class="image-inline image-inline" title="Processing" /&gt;&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;strong&gt;Tagging and Map Features&lt;/strong&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;strong&gt;Geographic File Formats&lt;/strong&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;strong&gt;Geo-enabled Databases&lt;/strong&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;strong&gt;Processing OpenStreetMap Data&lt;/strong&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/swiss.jpg/image_preview" alt="Data Swiss Army Knives" class="image-inline image-inline" title="Data Swiss Army Knives" /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;a class="external-link" href="http://funnel.hasgeek.com/cartonama-workshop/203-create-shapefiles-from-collected-data"&gt;&lt;img src="https://cis-india.org/home-images/shape.jpg/image_preview" alt="Creating Shapefiles" class="image-inline image-inline" title="Creating Shapefiles" /&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;a class="external-link" href="http://funnel.hasgeek.com/cartonama-workshop/204-tiles"&gt;&lt;img src="https://cis-india.org/home-images/tiles.jpg/image_preview" alt="Tiles" class="image-inline image-inline" title="Tiles" /&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;a class="external-link" href="http://funnel.hasgeek.com/cartonama-workshop/205-tilemill"&gt;&lt;img src="https://cis-india.org/home-images/tilemill.jpg/image_preview" alt="Tilemill" class="image-inline image-inline" title="Tilemill" /&gt;&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;strong&gt;Data Swiss Army Knives&lt;/strong&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;strong&gt;Creating Shapefiles&lt;/strong&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;strong&gt;Tiles&lt;/strong&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;strong&gt;Tilemill&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;a class="external-link" href="http://funnel.hasgeek.com/cartonama-workshop/206-javascript-mapping-apis"&gt;&lt;img src="https://cis-india.org/home-images/java.jpg/image_preview" alt="Javascript Mapping APIs" class="image-inline image-inline" title="Javascript Mapping APIs" /&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;a class="external-link" href="http://funnel.hasgeek.com/cartonama-workshop/207-serving-tiles"&gt;&lt;img src="https://cis-india.org/home-images/serve.jpg/image_preview" alt="Serving Tiles" class="image-inline image-inline" title="Serving Tiles" /&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;a class="external-link" href="http://funnel.hasgeek.com/cartonama-workshop/208-geocoding-and-location-queries"&gt;&lt;img src="https://cis-india.org/home-images/Geocoding.jpg/image_preview" alt="Geocoding" class="image-inline image-inline" title="Geocoding" /&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;a class="external-link" href="http://funnel.hasgeek.com/cartonama-workshop/209-putting-it-all-together"&gt;&lt;img src="https://cis-india.org/home-images/putting.jpg/image_preview" alt="Putting" class="image-inline image-inline" title="Putting" /&gt;&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Java Script Mapping APIs&lt;br /&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;strong&gt;Serving Tiles&lt;br /&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Geocoding and Location queries&lt;br /&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;td align="center"&gt;&lt;strong&gt;Putting it all together&lt;br /&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Why You Should Attend the Workshop?&lt;/h2&gt;
&lt;p&gt;The workshop is only open to 30 participants. This is to ensure that the trainers can pay individual attention to each participant.&lt;/p&gt;
&lt;p&gt;The workshop will train you with both back-end as well as front-end tools necessary for developing functional location based services and will enable you to build maps which can be used on devices ranging from phones to tablets to computers. It is aimed at teaching you the entire technology stack, right from managing the data to deploying the data on the server, and finally presenting it to your end user. During the hands-on sessions, you will develop web-based location services and learn how to manage your geographic data by creating interactive maps.&lt;/p&gt;
&lt;p&gt;Mikel and Schuyler have extensive experience working with interactive maps, open data, Open Street Maps (OSM) and diverse communities on the ground. Participants will benefit immensely from the knowledge, experience and expertise of the trainers.&lt;/p&gt;
&lt;h2&gt;&lt;a class="external-link" href="http://cartonama.doattend.com/"&gt;Registration&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Tickets are priced at Rs. 10,000. Participants can register through the DoAttend portal. Or, you can pay offline through cheques and DD. Your ticket price covers workshop facilities and the facilitators' travel to India. The Centre for Internet and Society (CIS) has sponsored part of the workshop expenses.&lt;/p&gt;
&lt;p&gt;Participants are expected to bring their own GPS devices / mobile phones and computers for the application building exercises.&lt;/p&gt;
&lt;p&gt;
If you have any queries, write to &lt;a class="external-link" href="mailto:sajjad@hasgeek.in"&gt;Sajjad Anwar&lt;/a&gt;.&lt;/p&gt;
&lt;p align="center"&gt;&lt;a class="external-link" href="http://cartonama.doattend.com/"&gt;&lt;strong&gt;Buy Tickets Now&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Venue&lt;/h2&gt;
&lt;p&gt;The workshop will be held at the Centre for Internet and Society 
(CIS), Bangalore. The congenial atmosphere at CIS facilitates both 
formal and informal interactions, and peer-to-peer learning.&lt;br /&gt;
  &lt;img src="https://cis-india.org/home-images/copy_of_logo.png/image_preview" title="CIS" height="72" width="164" alt="CIS" class="image-inline image-inline" /&gt;&lt;/p&gt;
&lt;p&gt;No. 194, 2nd C Cross, 4th Main&lt;br /&gt;
Opposite Domlur Club&lt;br /&gt;
Domlur 2nd Stage, Bangalore - 560 071&lt;/p&gt;
&lt;h2&gt;The Centre for Internet &amp;amp; Society&lt;/h2&gt;
&lt;p&gt;The Centre for Internet and Society (CIS) is a Bangalore-based independent, non-profit research organisation. CIS is primarily involved in research on the Internet and its relationship to society. Through its academic and research programmes, campaigns, and advocacy, CIS brings together scholars, academics, students, programmers and scientists to engage in a large variety of issues concerning the Internet: from histories of the Internet to enhancing accessibility for persons with disabilities, openness, telecom and Internet governance, among others.&lt;/p&gt;
&lt;p&gt;CIS is supporting the Cartonama Workshop by providing the venue and hosting the workshop facilitators in Bangalore.&lt;/p&gt;
&lt;h2&gt;HasGeek&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/www.hasgeek.com" class="external-link"&gt;HasGeek &lt;/a&gt;was initiated in September 2010 to create discussion spaces for developers around emerging technologies. Our events are developer-focused. We began by organizing five editions of the DocType HTML5 conference in Bangalore, Chennai, Pune, Hyderabad and Ahmedabad.&lt;/p&gt;
&lt;p&gt;
In 2011, we organized a series of events in Bangalore starting with the Android Camp in April, PHP and Cloud Computing in June, JSFoo in October, and Droidcon India in November. Each of these events had an open talks submission and voting system, which made every event more participant-focused. &lt;br /&gt;
  &lt;br /&gt;
In 2012, we are attempting to reach out to a wider audience of developers, entrepreneurs and students, across large and small Indian cities, by addressing interesting technology problems such as UI Engineering, Data Science, SMS and email notifications, among others.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cartonama'&gt;https://cis-india.org/internet-governance/cartonama&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-02-14T10:21:16Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cartonama-conference">
    <title>Cartonama Conference</title>
    <link>https://cis-india.org/internet-governance/cartonama-conference</link>
    <description>
        &lt;b&gt;HasGeek is organising a Cartonama Conference on September 22, 2012 at the TERI Complex in  Bangalore, from 9.30 a.m. to 6.00 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Cartonama conference is centered around geospatial data, mapping and location based services. It deals with two primary themes: infrastructure for managing geospatial data including mapping software, cartographic techniques and tools; and application of geospatial data, primarily location-based services. Cartonama is open to entrepreneurs, developers, individuals and institutions working with GIS and cartographic techniques, advocacy groups, among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We will also host four workshops which will provide hands-on training about tools for managing geospatial data and how to build location-based services. Workshops will be held between September 23 to 25, 2012. Tickets for the Cartonama conference can be bought at &lt;a class="external-link" href="http://cartonama.doattend.com"&gt;http://cartonama.doattend.com&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;About HasGeek&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;HasGeek is a Bangalore-based organisation. We put together events for developers with the intention of creating discussion spaces about technologies that are new today, and could become mainstream tomorrow. HasGeek is supported by CIS.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cartonama-conference'&gt;https://cis-india.org/internet-governance/cartonama-conference&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-09-17T13:59:05Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-december-5-2013-kirthi-v-rao-moulishree-srivastava-card-transactions-with-aadhar-validation-need-more-time">
    <title>Card transactions with Aadhaar validation need more time: experts</title>
    <link>https://cis-india.org/news/livemint-december-5-2013-kirthi-v-rao-moulishree-srivastava-card-transactions-with-aadhar-validation-need-more-time</link>
    <description>
        &lt;b&gt;Cost and supply implications are seen by experts as the main hurdles in implementing the RBI directive. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Kirti V. Rao and Moulishree Srivastava was &lt;a class="external-link" href="http://www.livemint.com/Politics/f0P6jklKaCVt5rP6RKBHbJ/Card-transactions-with-Aadhaar-validation-need-more-time-ex.html"&gt;published in Livemint&lt;/a&gt; on December 5, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Reserve Bank of India’s (RBI’s) move to introduce a new card payment infrastructure able to authenticate transactions using Aadhaar unique identity number-linked biometrics may take some time to implement as it has cost and supply implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“All new card present infrastructure has to be enabled for both EMV chip and PIN and Aadhaar (biometric validation) acceptance,” RBI said in a notification on 26 November.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Europay MasterCard Visa, or EMV, chip and PIN authentication involves card information stored in a chip that is accessible through a PIN or personal identification number, which replaces a cardholder’s signature.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, all card infrastructure in India such as automated teller machines (ATMs) and point-of-sales (PoS) machines are moving towards full compliance with the global EMV standard that requires reading integrated circuit cards to authenticate credit and debit card transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although all transactions through debit cards are now required to be authenticated by PIN, validating financial transactions by using the biometric Aadhaar identity number database is yet to gain traction. Such a service is expected to begin in May.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Not all experts are in favour of the central bank’s move to use biometrics data to authenticate transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is a terrible idea. Biometrics should never be used as authentication factor since it cannot be revoked when it is compromised,” said Sunil Abraham, executive director of Bangalore-based think-tank Centre for Internet and Society. “Digital signatures and its variations like the EMV chip are the right way to proceed.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A banker did not fully agree with Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pulak Sinha, general manager (payment solutions) at State Bank of India, said: “In our experience, there is a need for biometric authentication in certain geographical segments in the country. Our bank has used biometric authentication for financial inclusion initiatives and has found it very useful. Having said that, each bank is the best judge as to which technology is more relevant for their customers.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sinha added, “Also changing new infrastructure to accept all types of technologies has its own challenges as well as financial implications. Again, business cases need to be built and when people get additional services they may have to pay.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are cost implications if the RBI directive is to be implemented, according to Rajiv Kaul, chief executive of CMS Info Systems Pvt. Ltd, which runs two cash management companies and has recently received an order from SBI to deploy 8,000 cash machines across the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Some of the ATM infrastructure currently installed have some of the capabilities for EMV chip cards, but even as they are hardware-equipped, software will need to be upgraded,” Kaul said. “For biometric compliance, both hardware and software will need to be installed, which will result in extra cost. So, for the short term, from the biometric perspective, the cost will go up.”&lt;br /&gt;Some experts hold that the notification provides a chance to assess the as-yet-untested Aadhaar-linked biometrics model where the EMV model may be hard to implement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“RBI has been pragmatic in mandating it incrementally as it is giving Aadhaar a runway to evolve in terms of operations, use cases, risk, technology standards, dispute resolution and get these things in order,” Uttam Nayak, group country manager, India and South Asia at Visa Consolidated Support Services (India) Pvt. Ltd, told Mint on 26 November. “Because Aadhaar is tokenless and doesn’t need a card, it has great potential for inclusion.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Biometrics-enabled cash and PoS machines will require additional expenditure as they need high-speed Internet connectivity to transmit biometrics data, Rajeev Chandrasekhar, member of the upper house of Parliament, said in a letter to RBI governor Raghuram Rajan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The hardware and software cost of upgrading a single unit with biometrics hardware is not very much but changing the entire ecosystem would have costs,” acknowledged SBI’s Sinha. “When people get additional services they will have to pay.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“A high percentage of the population is still unbanked. The opportunity (to reach people through biometric validation and Aadhaar) is too tempting for the acquirers (banks and others using PoS devices) to not take this up,” said Robin Roy, associate director of financial services at consultancy firm PricewaterhouseCoopers Pvt. Ltd.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whether there would be enough suppliers of machines to implement the directive is also a concern, some experts said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-december-5-2013-kirthi-v-rao-moulishree-srivastava-card-transactions-with-aadhar-validation-need-more-time'&gt;https://cis-india.org/news/livemint-december-5-2013-kirthi-v-rao-moulishree-srivastava-card-transactions-with-aadhar-validation-need-more-time&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-12-26T06:25:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/development-informatics-paper-number-81-aayush-rathi-and-ambika-tandon-capturing-gender-and-class-inequities">
    <title>Capturing Gender and Class Inequities: The CCTVisation of Delhi</title>
    <link>https://cis-india.org/internet-governance/blog/development-informatics-paper-number-81-aayush-rathi-and-ambika-tandon-capturing-gender-and-class-inequities</link>
    <description>
        &lt;b&gt;Ambika Tandon and Aayush Rathi generated empirical evidence about the CCTV programme well underway in Delhi. The case study was published by Centre for Development Informatics, Global Development Institute, SEED, in the Development Informatics working paper series housed at the University of Manchester. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Abstract&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Cityscapes across the global South, following historical trends in the North, are increasingly being littered by closed-circuit television (CCTV) cameras. In this paper, we study the wholesale implementation of CCTV in New Delhi, a city notorious for incredibly high rates of crime against women. The push for CCTV, then, became one of many approaches explored by the state in making the city safer for women.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this paper, we deconstruct this narrative of greater surveillance equating to greater safety by using empirical evidence to understand the subjective experience of surveilling and being surveilled. By focussing on gender and utilising work from feminist thought, we find that the experience of surveillance is intersectionally mediated along the axes of class and gender.The gaze of CCTV is cast upon those already marginalised to arrive at normative encumbrances placed by private, neoliberal interests on the urban public space. The politicisation of CCTV has happened in this context, and continues unabated in the absence of any concerted policy apparatus regulating it. We frame our findings utilising an analytical data justice framework put forth by Heeks and Shekhar (2019). This comprehensively sets out a social justice agenda that situates CCTV within the socio-political contexts that are intertwined in the development and implementation of the technology itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Click to download the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/development-informatics"&gt;full research paper&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/development-informatics-paper-number-81-aayush-rathi-and-ambika-tandon-capturing-gender-and-class-inequities'&gt;https://cis-india.org/internet-governance/blog/development-informatics-paper-number-81-aayush-rathi-and-ambika-tandon-capturing-gender-and-class-inequities&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi and Ambika Tandon</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-09-27T15:24:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-siladitya-ray-june-4-can-uber-ola-apps-be-blocked">
    <title>Can Uber, Ola apps be blocked? Govt fighting cyber odds</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-siladitya-ray-june-4-can-uber-ola-apps-be-blocked</link>
    <description>
        &lt;b&gt;The Delhi government is trying to block taxi hailing apps like Uber and Ola Cabs, but is it really possible?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Siladitya Ray published in the &lt;a class="external-link" href="http://www.hindustantimes.com/technology-topstories/can-the-uber-ola-apps-be-blocked/article1-1354921.aspx"&gt;Hindustan Times&lt;/a&gt; on June 4, 2015 quotes Sunil Abraham.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Taxi aggregators are in the firing line over passenger safety again  after a 21-year-old Delhi woman alleged she was molested by a driver in  an Uber cab near Gurgaon on Saturday morning.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The allegation came just six months after a 25-year-old financial  analyst was allegedly raped in an Uber cab in Delhi, over which the  victim took the cab aggregator's parent company to court in the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following an order from the Delhi government, the Department of  Telecommunication had issued an order to Internet Service Providers to  block the websites and apps of taxi hailing aggregators like Uber,  TaxiForSure and Ola Cabs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Internet Service Providers (ISP) have apparently expressed  inability to block Uber, Ola as the web services feature strong  end-to-end encryption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How ISPs block sites&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Often when an ISP blocks a website it severs your connection with the  domain name.  For example if ISPs want to block Google they simply  block your access to &lt;a href="http://www.google.com"&gt;www.google.com&lt;/a&gt; (i.e. Google's domain name), pretty simple. But if you are using an app  like Google Now there is no domain name involved here the app talks  directly to the server through using some form of encryption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If we were to use an analogy, think of the ISP as a bridge that  connects you to the web. The sites can be thought of as cars and their  domain names as license plates.  If the ISP wants to block a car with a  certain license plate from going through it can do so with ease. But if a  car's number plates are obscured (encryption) then ISP cannot block the  car from passing through.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Uber and Ola&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most users book cabs from Ola or Uber using the company's apps, which  use strong encryption effectively making their data virtually  undetectable to ISPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It's possible to block apps but it's much more difficult than  before. Earlier you had to deal with a finite set of IP addresses but  now these services are hosted on multiple cloud servers," said Sunil  Abraham, the executive director of Bangalore based research  organisation, the Centre for Internet and Society. "The ISPs themselves  don't want to go through the pain of blocking these apps so they are  asking the government to give them a solution," he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government and the Department of Telecommunication are fighting  near improbable odds in their endeavor to block these services on the  web.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-siladitya-ray-june-4-can-uber-ola-apps-be-blocked'&gt;https://cis-india.org/internet-governance/news/hindustan-times-siladitya-ray-june-4-can-uber-ola-apps-be-blocked&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Blocking</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-06-14T09:52:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-september-5-2018-surupasree-sarmmah-can-this-curb-your-addiction">
    <title>Can this curb your addiction?</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-september-5-2018-surupasree-sarmmah-can-this-curb-your-addiction</link>
    <description>
        &lt;b&gt;Facebook and Instagram also set to roll out tools to tell you how hooked you are to social media browsing.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surupasree Sarmmah was published in &lt;a class="external-link" href="https://www.deccanherald.com/metrolife/can-curb-your-addiction-691237.html"&gt;Deccan Herald&lt;/a&gt; on September 5, 2018. Swaraj Paul Barooah was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;YouTube has rolled out a new feature that helps you manage the time  you spend on it. The feature, it says, is an attempt to allow users to  take charge of their digital life.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;You can now go to your YouTube  profile and get details of time spent on the app today, yesterday and  the past week. You also get a daily average under the tab ‘Time  Watched’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;YouTube now offers tools that remind you to ‘take a break’ from notifications. You can also disable sound for a specific period.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kala  Balasubramanian, counselling psychologist and psychotherapist at Inner  Dawn Counselling and Training services LLP, categorises social media  users into three types: people who use it extensively with awareness,  people who use it extensively without awareness, and people addicted to  it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If you fall into the second category, this feature will make  no or very less impact on your social media usage. However, if you know  you are spending too much time and want to get out of it, keeping a tab  on the usage can be beneficial,” says Kala.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The addicts need help,  she advises. Such well-being tools being introduced by social media  giants like Google can be seen as a recognition of the extent of damage  excessive social media usage can cause, she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media  should not be used to the point of damage to ourselves and our  relationships, but users must be ready to help themselves, she urges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This  message necessarily needs to be learned at a social level in our  families, schools and colleges and workplaces too. The tool can only  attempt to help us, we need to help ourselves,” she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Not just  YouTube, but Facebook and Instagram have also announced they would soon  add controls to help people measure how much time they are spending on  these sites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Swaraj Barooah, policy director, Centre for Internet and Society, Bengaluru, says the feature is a “weak step.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I  have tried out the feature and it is more like the snooze button of an  alarm: one can dismiss it immediately or change the settings. Even to  get to the settings takes an active effort. People by default will go  with default settings,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He sees the feature as an  ‘eyewash’: social media giants can now claim they have done something to  curb addiction without actually doing anything effective.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The algorithm feeds on people’s vulnerability. It would be better to see these platforms offering more transparency in how  algorithms are viewing people so that people can choose what they want  to see and not what the algorithms are determining for them,” he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-september-5-2018-surupasree-sarmmah-can-this-curb-your-addiction'&gt;https://cis-india.org/internet-governance/news/deccan-herald-september-5-2018-surupasree-sarmmah-can-this-curb-your-addiction&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-10-03T14:15:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/mouse-a-tool-of-revolution">
    <title>Can the mouse be a tool of revolution in India?</title>
    <link>https://cis-india.org/news/mouse-a-tool-of-revolution</link>
    <description>
        &lt;b&gt;Do you consider yourself a ‘slacktivist’?” Vikram Sengupta considers the question for a couple of seconds, and then excuses himself. “I’ll call you back. I’m in the middle of something right now,” he says, and hangs up. Being called a ‘slacktivist’ is probably not very flattering, first thing in the morning or at any other time of the day. But this writer has been at the receiving end of endless mails from him, mails which sought to impose a burning moral imperative to sign up instantly and save the grand Canadian Musk Ox or the Mexican Dumpy Frog. The question, therefore, is not unjustified. &lt;/b&gt;
        
&lt;h3&gt;Activists vs slacktivists&lt;/h3&gt;
&lt;p&gt;The slick application of the word ‘slacktivist’ is the work of eminent scholar and author of The Net Delusion, Evgeny Morozov. Rather stinging in its import, it refers to people who, while campaigning for social causes, limit their action to the click of a mouse. In an earlier interview with DNA Sunday, Morozov was quick to clarify that he had nothing against online activism (activism through social-networking sites, websites, blogs and online petitions), “but I’d rather see the people signing (petitions) also join some offline political movements and campaign for change in the real world as much as they do in the virtual world,” he had said.&lt;/p&gt;
&lt;p&gt;Sengupta does call back. And when the question is put to him again, he says, “People can call me a ‘slacktivist’ if they want. Look, I don’t have a lot of time to devote to activism and I don’t even know if signing petitions actually works. But when I see that a simple click of mine might possibly help save a rainforest or rid the world of its nuclear arsenal, I can’t just cynically turn away. I don’t know… I feel uncomfortable doing it.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The phenomenon of ‘slacktivism’ elicits quite strong responses from the Indian activist community. People who grapple with the hard-knock realities of activism are not amused by the casual, momentary concern of the ‘slacktivist’.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Ashley Tellis is a freelance journalist, academic and gay rights activist. “The central limitation here is that one-click activism [slacktivism] becomes a substitute for sustained campaigns and engagement with persistent inequalities. The Indian middle-class, notorious for its apolitical and consumerist selfishness, can now feel smug and assuage its rotten conscience by thinking it has taken action on the net,” says Tellis, with some emotion.&lt;/p&gt;
&lt;p&gt;While Tellis castigates, in no uncertain terms, the seeming apathy of the middle-class, he also acknowledges its prodigious influence on the Indian socio-political mind space. “The middle-class is an important segment. It has power, it has English, and it has the ability to be heard,” he admits.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Middle class audience&lt;/h3&gt;
&lt;p&gt;While this helps when it is mobilised for a good cause, many find it problematic that so much influence is concentrated in the hands of a single segment of society. In fact, if you take online activism, the number of people who can be reached through the internet is staggeringly low.&lt;/p&gt;
&lt;p&gt;In a country of approximately 120 crore people, only about 5 crore [as per Indiastats.com] have access to the internet. Compare this to Tunisia, where the figure is an impressive 27%, or Egypt, where internet penetration is 16% [World Bank figures]. Given this lack of net access, more than 95% of Indians are taken out of consideration, in one fell swoop, when it comes to internet-specific activism strategies.&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Anja Kovacs, a fellow at the Centre for Internet and Society says, “Most of these online campaigns are aligned to the profile of its audience.” She argues, in her essay ‘Inquilab 2.0?’ that if the audience is mostly urban and middle-class, it stands to reason that a majority of online campaigns would deal with issues that are relevant to this particular segment.&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Kamayani Bali Mahabal, a lawyer and human rights activist, disagrees with this assessment. “Okay, the audience may be middle class, but the issues aren’t all middle class at all,” she counters indignantly. “Look at the ‘Say No to UID’ campaign — there is no debate or dialogue that has been initiated by Nandan Nilekani, the chairperson of UIDAI [Unique ID Authority of India], and this online campaign has created a platform where people’s issues and concerns can be clarified. Many believe that the UID will have a negative impact on the poor and the migrants; this campaign has gotten people to come together to discuss, debate and strategise as well,” she says.&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;But Kovacs insists, “The fact remains that it is people from the middle-class who represent the voices of a largely silent majority. I find this model of activism questionable.” The accuracy of how the voiceless are being represented is a cause of concern for her, as is the very idea of a platform that denies a large section of a vibrant social democracy the chance to express themselves directly.&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;The whole situation, Kovacs seems to indicate, is like Chinese whispers, where information might get altered in the retelling. “There are some innovative enterprises like CGNet Swara that tackle this problem. It’s a citizen journalism service, where ordinary citizens can both call in to record news as well as listen to the recorded messages. And they do put some selected messages online, but such enterprises are few and far between.” she says ruefully.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;An aid to offline activism&lt;/h3&gt;
&lt;p&gt;So as things stand, the internet is an indispensable tool to reach out to the influential Indian middle-class. Yet, given India’s socio-economic reality, it’s also a problematic and, in some cases, ineffective medium. Bali Mahabal, when asked how she reconciles these contradictions, says, “I am an offline as well as an online activist. These are not mutually exclusive roles. I straddle both worlds and I can multi-task!”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In fact, this is a strategy that a lot of offline activists are warming up to now. In 2010, Himanshu Kumar put up a video in which he said,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;“To the people in the cities, I want to say that… you write something on the internet, it doesn’t make any difference to the government. Neither do people read the internet, nor does the government.” Coming from one of the leading advocates of tribal rights in the Chhattisgarh area, this video was a scathing indictment of online activists.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Kumar, however, seems to have softened his stance on the issue since then. He still maintains that online activism by itself is not sufficient to bring about substantial change, but he speaks of how the internet helped him in his campaign in Dantewada.&lt;/p&gt;
&lt;p&gt;“When we were in Dantewada, it was almost like a different planet. We had no connection to the outside world except through the internet. It annoyed the police quite a bit because they knew that if they tried anything untoward, we could get the word out. So the internet is definitely a value addition to on-the-ground activism, but by itself, it has its limitations.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It is clear that the internet as a platform for social activism is here to stay. As access to the net increases among Indians, so will its effectiveness. Kovacs, in her essay writes of a person who says, rather movingly, “I believe that… ordinary people can use this medium [internet] to actually make a difference, you know…to change the world.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;But if activists want to live up to this unnamed person’s lofty expectations, they also need to be fully conscious of the limitations of the internet as a medium for social change.&lt;/p&gt;
&lt;p&gt;Read the original in DNA &lt;a class="external-link" href="http://www.dnaindia.com/india/report_can-the-mouse-be-a-tool-of-revolution-in-india_1507015"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/mouse-a-tool-of-revolution'&gt;https://cis-india.org/news/mouse-a-tool-of-revolution&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T16:26:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/can-matters-dealt-with-in-aadhaar-act-be-objects-of-money-bill">
    <title>Can the Matters Dealt with in the Aadhaar Act be the Objects of a Money Bill?</title>
    <link>https://cis-india.org/internet-governance/blog/can-matters-dealt-with-in-aadhaar-act-be-objects-of-money-bill</link>
    <description>
        &lt;b&gt;In this infographic, we highlight the matters dealt with in the Aadhaar Act 2016, recently tabled in and passed by the Lok Sabha as a money bill, and consider if these can be objects of a money bill. The infographic is designed by Pooja Saxena, based on information compiled by Sumandro Chattapadhyay and Amber Sinha. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the infographic: &lt;a href="https://github.com/cis-india/website/raw/master/infographics/CIS_NotAMoneyBill_ObjectsOfMoneyBill.pdf"&gt;PDF&lt;/a&gt; and &lt;a href="https://github.com/cis-india/website/raw/master/infographics/CIS_NotAMoneyBill_ObjectsOfMoneyBill.jpg"&gt;JPG&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;License:&lt;/strong&gt; It is shared under Creative Commons &lt;a href="https://creativecommons.org/licenses/by/4.0/"&gt;Attribution 4.0 International&lt;/a&gt; License.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="https://github.com/cis-india/website/raw/master/infographics/CIS_NotAMoneyBill_ObjectsOfMoneyBill.jpg" alt="Can the matters dealt with in the Aadhaar Act be the objects of a money bill?" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/can-matters-dealt-with-in-aadhaar-act-be-objects-of-money-bill'&gt;https://cis-india.org/internet-governance/blog/can-matters-dealt-with-in-aadhaar-act-be-objects-of-money-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pooja Saxena</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2016-04-24T14:15:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-february-21-2017-can-the-judiciary-upturn-the-lok-sabha-speakers-decision-on-aadhaar">
    <title>Can the Judiciary Upturn the Lok Sabha Speaker’s Decision on Aadhaar?</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-february-21-2017-can-the-judiciary-upturn-the-lok-sabha-speakers-decision-on-aadhaar</link>
    <description>
        &lt;b&gt;When ruling on the petition filed by Jairam Ramesh challenging passing the Aadhaar Act as a money Bill, the court has differing precedents to look at.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="https://thewire.in/110795/aadhaar-money-bill-judiciary/"&gt;published in the Wire&lt;/a&gt; on February 21, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In &lt;a href="http://thewire.in/2016/04/24/the-aadhaar-act-is-not-a-money-bill-31297/" target="_blank" title="an earlier article"&gt;an earlier article&lt;/a&gt;, I had argued that the characterisation of the &lt;a href="https://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=5&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0ahUKEwj0xo6U_KDSAhVHLo8KHcygCVEQFggvMAQ&amp;amp;url=https%3A%2F%2Fuidai.gov.in%2Fimages%2Fthe_aadhaar_act_2016.pdf&amp;amp;usg=AFQjCNHDmJKdO8jdfGZJKLKRJQpHdf1Frw&amp;amp;sig2=B_YbWncu6eyZHJ1MFTD0NA" rel="external nofollow" target="_blank" title="Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act"&gt;Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act&lt;/a&gt;,  as a money Bill by Sumitra Mahajan, speaker of the Lok Sabha, was  erroneous. Specifically, I had argued that upon perusal of Article 110  (1) of the constitution, the Aadhaar Act does not satisfy the conditions  required of a money Bill. For a legislation to be classified as a money  Bill, it must comprise of ‘only’ provisions dealing with the following  matters: (a) imposition, regulation and abolition of any tax, (b)  borrowing or other financial obligations of the government of India, (c)  custody, withdrawal from or payment into the Consolidated Fund of India  (CFI) or Contingent Fund of India, (d) appropriation of money out of  CFI, (e) expenditure charged on the CFI or (f) receipt or custody or  audit of money into CFI or public account of India; or (g) any matter  incidental to any of the matters specified in sub-clauses (a) to (f).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 110 is modelled on Section 1(2) of the UK’s Parliament Act, 1911, which also defines money Bills as those only dealing with certain enumerated matters. The use of the word ‘only’ was brought up by Ghanshyam Singh Gupta during the constituent assembly debates. He pointed out that the use of the word ‘only’ limits the scope money Bills to only those legislations which did not deal with other matters. His amendment to delete the word ‘only’ was rejected, clearly establishing the intent of the framers of the constitution to keep the ambit of money Bills extremely narrow. G.V. Mavalankar, the first speaker of Lok Sabha, had stated that the word ‘only’ must not be construed so as to give an overly restrictive meaning. For instance, a Bill which deals with taxation could have provisions which deal with the administration of the tax. The finance minister, Arun Jaitley, referred to these words by Mavalankar, justifying the classification of the Aadhaar Act as a money Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the Aadhaar Bill does makes references to benefits, subsidies and services funded by the CFI, even a cursory reading of the Bill reveals its main objectives as creating a right to obtain a unique identification number and providing for a statutory apparatus to regulate the entire process. Any reasonable reading of the legislation would be hard pressed to view all provisions in the Aadhaar Act, aside from the one creating a charge on the CFI, as merely administrative provisions incidental to the creation such charge. The mere fact of establishing the Aadhaar number as the identification mechanism for benefits and subsidies funded by the CFI does not give it the character of a money Bill. The Bill merely speaks of facilitating access to unspecified subsidies and benefits rather than their creation and provision being the primary object of the legislation. Erskine May’s seminal textbook, Parliamentary Practice, is instructive in this respect and makes it clear that a legislation which simply makes a charge on the consolidated fund does not becomes a money Bill if otherwise its character is not that of one. Further, the subordinate regulations notified under the Aadhaar Act deal almost entirely with matters to do with enrolment, updation, authentication of the Aadhaar number and related matters such as data security regulations and sharing of information collected, rather than the provision of benefits or subsidies or disbursal of funds otherwise from the CFI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in the context of the petition filed by former Union minister Jairam Ramesh challenging the passage of the law on Aadhaar as a money Bill, the more important question is whether the judiciary has a right to question the speaker’s decision in such a matter. If not, any other questions about whether the legislation is a money Bill will remain merely academic in nature.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Irregularity vs illegality&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Article 110 (3) clearly states that with regard to the question whether a legislation is a money Bill or not, the decision of the speaker is final and binding. The question is whether such a clause completely excludes any judicial review. Further, Article 122 prohibits the courts from questioning the validity of any proceedings in parliament on the ground of any alleged irregularity of procedure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the arguments in the court, the attorney general questioned the locus standi of Ramesh. The petition has been made under Article 32 of the constitution and the government argued that no fundamental rights of Ramesh were violated. However, the court has asked Ramesh to make his submission and adjourned the hearing to July. The petition by Ramesh would hinge largely on the powers of the judiciary to question the decision of the speaker of the Lok Sabha.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The powers of privilege that parliamentarians enjoy are integral to the principle of separation of powers. The rationale behind parliamentary privilege is to prevent interference in the lawmakers’ powers to perform essential functions. The ability to speak and vote inside the legislature without the fear of punishment is certainly essential to the role of a lawmaker. However, the extent of this protection lies at the centre of this discussion. During the constituent assembly debates, H.V. Kamath and others had argued for a schedule to exhaustively codify the existing privileges. However, B.R. Ambedkar pointed to the difficulty of doing so and parliamentary privilege on the lines of the British parliamentary practice was retained in the constitution. In the last few decades, a judicial position has emerged that courts could exercise a limited degree of scrutiny over privileges, as they are primarily responsible for interpreting the constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the matter of &lt;a href="https://indiankanoon.org/doc/1757390/" rel="external nofollow" target="_blank" title="Raja Ram Pal vs The Hon’ble Speaker, Lok Sabha"&gt;&lt;i&gt;Raja Ram Pal vs The Hon’ble Speaker, Lok Sabh&lt;/i&gt;a&lt;/a&gt;,  it had been clarified that proceedings of the legislature were immune  from questioning by courts in the case of procedural irregularity but  not in the case of illegality. In this case, the Supreme Court while  dealing with Article 122 stated that it does not oust review by the  judiciary in cases of “gross illegality, irrationality, violation of  constitutional mandate, mala fides, non-compliance with rules of natural  justice and perversity.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 1968, the speaker of the Punjab legislative assembly adjourned the  proceedings for a period of two months following rowdy behaviour.  Subsequently, an ordinance preventing such a suspension was promulgated  and the legislature was summoned by the governor to consider some  expedient financial matters. The speaker disagreed with the decision and  after some confusion, the deputy speaker passed a few Bills as money  Bills. While looking into the question of what was protected from  judicial review, the &lt;a href="https://indiankanoon.org/doc/36589/" rel="external nofollow" target="_blank" title="court stated"&gt;court stated&lt;/a&gt; that the protection did not extend to breaches of mandatory provisions  of the constitution, only to directory provisions. By that logic, if  Article 110 (1) is seen as a mandatory provision, a breach of its  provisions could lead to an interpretation that the Supreme Court may  well question an erroneous decision by the speaker of the Lok Sabha to  certify a legislation as a money Bill. The use of the word “shall” in  Article 110 (1), the nature and design of the provision, its overriding  impact on the other constitutional provisions granting the Rajya Sabha  powers are ample evidence of its mandatory nature. Based on the above,  Anup Surendranath has &lt;a href="http://ccgdelhi.org/doc/%28CCG-NLU%29%20Aadhaar%20Money%20Bill.pdf" rel="external nofollow" target="_blank" title="argued"&gt;argued&lt;/a&gt; that  the passage of the Aadhaar Act as a money Bill when it does not satisfy  the constitutional conditions for it does amount to a gross illegality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The judicial precedent in &lt;i&gt;&lt;a href="https://indiankanoon.org/doc/60568976/" rel="external nofollow" target="_blank" title="Mohd. Saeed Siddiqui vs State of Uttar Pradesh"&gt;Mohd. Saeed Siddiqui vs State of Uttar Pradesh&lt;/a&gt;&lt;/i&gt; where the matter of the court’s power to question the decision of a  speaker was considered, though, leans in the other direction. In 2012,  the &lt;a href="https://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=1&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0ahUKEwiRtov_iKHSAhVLuo8KHYhsClcQFggbMAA&amp;amp;url=http%3A%2F%2Fwww.lawsofindia.org%2Fdownloadfile.php%3Flawid%3D7834%26file%3Duttar_pradesh%2F1981%2F1981UP7.pdf%26pageurl%3D%252Fsingle%252Falpha%252F7.html&amp;amp;usg=AFQjCNGRW8-NChXALunaUbjZRrlM4IvCkA&amp;amp;sig2=rg6YCMf7qRqNw08NnctuhQ" rel="external nofollow" target="_blank" title="Uttar Pradesh Lokayukta and Up-Lokayuktas (Amendment) Act"&gt;Uttar Pradesh Lokayukta and Up-Lokayuktas (Amendment) Act&lt;/a&gt;,  2012 was passed as money Bill by the Uttar Pradesh state legislature.  Subsequently, a writ petition was filed challenging its constitutional  validity. A three-judge bench of the Supreme Court looked into the  application of Article 212. It is the provision corresponding to Article  122, dealing with the power of the courts to inquire into the  proceedings of the state legislature. The court held that Article 212  makes “it clear that the finality of the decision of the Speaker and the  proceedings of the State Legislature being important privilege of the  State Legislature, viz., freedom of speech, debate and proceedings are  not to be inquired by the Courts.” Importantly, ‘proceedings of the  legislature’ were deemed to include within its scope everything done in  transacting parliamentary business, including the passage of the Bill.  While the court did acknowledge the limitations of parliamentary  privilege as established in the &lt;i&gt;Raja Ram Pal&lt;/i&gt; case, it did not adequately take into account the reasoning in it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar Act is a legislation which makes it mandatory of all  residents to enrol for a biometric identification system in order to  avail certain subsidies, benefits and services. It has huge potential  risks for individual privacy and national security and has been the  subject of an extremely high profile Public Interest Litigation. Its  passage as a money Bill, without any oversight from the Rajya Sabha and  an opportunity for substantial debate and discussion, is a fraud on the  Constitution. Whether or not the court chooses to see it that way  remains to be seen.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-february-21-2017-can-the-judiciary-upturn-the-lok-sabha-speakers-decision-on-aadhaar'&gt;https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-february-21-2017-can-the-judiciary-upturn-the-lok-sabha-speakers-decision-on-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-27T15:44:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/can-the-aadhaar-act-2016-be-classified-as-a-money-bill">
    <title>Can the Aadhaar Act 2016 be Classified as a Money Bill?</title>
    <link>https://cis-india.org/internet-governance/blog/can-the-aadhaar-act-2016-be-classified-as-a-money-bill</link>
    <description>
        &lt;b&gt;In this infographic, we show if the Aadhaar Act 2016, recently tabled in and passed by the Lok Sabha as a money bill, can be classified as a money bill. The infographic is designed by Pooja Saxena, based on information compiled by Amber Sinha and Sumandro Chattapadhyay. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the infographic: &lt;a href="https://github.com/cis-india/website/raw/master/infographics/CIS_NotAMoneyBill_DoesAadharSatisfy.pdf"&gt;PDF&lt;/a&gt; and &lt;a href="https://github.com/cis-india/website/raw/master/infographics/CIS_NotAMoneyBill_DoesAadharSatisfy.jpg"&gt;JPG&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;License:&lt;/strong&gt; It is shared under Creative Commons &lt;a href="https://creativecommons.org/licenses/by/4.0/"&gt;Attribution 4.0 International&lt;/a&gt; License.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="https://github.com/cis-india/website/raw/master/infographics/CIS_NotAMoneyBill_DoesAadharSatisfy.jpg" alt="Does Aadhaar Act satisfy the conditions for a money bill?" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/can-the-aadhaar-act-2016-be-classified-as-a-money-bill'&gt;https://cis-india.org/internet-governance/blog/can-the-aadhaar-act-2016-be-classified-as-a-money-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pooja Saxena</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2016-04-25T13:48:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/new-york-times-july-11-2013-can-india-trust-its-government-on-piracy">
    <title>Can India Trust Its Government on Privacy?</title>
    <link>https://cis-india.org/internet-governance/blog/new-york-times-july-11-2013-can-india-trust-its-government-on-piracy</link>
    <description>
        &lt;b&gt;In response to criticisms of the Centralized Monitoring System, India’s new surveillance program, the government could contend that merely having the capability to engage in mass surveillance won’t mean that it will. Officials will argue that they will still abide by the law and will ensure that each instance of interception will be authorized.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash's article was &lt;a class="external-link" href="http://india.blogs.nytimes.com/2013/07/11/can-india-trust-its-government-on-privacy/"&gt;published in the New York Times&lt;/a&gt; on July 11, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In fact, they will argue that the program, known as C.M.S., will  better safeguard citizens’ privacy: it will cut out the  telecommunications companies, which can be sources of privacy leaks; it  will ensure that each interception request is tracked and the recorded  content duly destroyed within six months as is required under the law;  and it will enable quicker interception, which will save more lives. But  there are a host of reasons why the citizens of India should be  skeptical of those official claims.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cutting out telecoms will not help protect citizens from electronic  snooping since these companies still have the requisite infrastructure  to conduct surveillance. As long as the infrastructure exists, telecom  employees will misuse it. In a 2010 report, the journalist M.A. Arun &lt;a href="http://www.deccanherald.com/content/94085/big-brother-smaller-siblings-watching.html"&gt;noted&lt;/a&gt; that “alarmingly, this correspondent also came across several instances  of service providers’ employees accessing personal communication of  subscribers without authorization.” Some years back, K.K. Paul, a top  Delhi Police officer and now the Governor of Meghalaya, drafted a memo  in which he noted mobile operators’ complaints that private individuals  were misusing police contacts to tap phone calls of “opponents in trade  or estranged spouses.” &lt;span id="more-66976"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India does not need to have centralized interception facilities to  have centralized tracking of interception requests. To prevent  unauthorized access to communications content that has been intercepted,  at all points of time, the files should be encrypted using public key  infrastructure. Mechanisms also exist to securely allow a chain of  custody to be tracked, and to ensure the timely destruction of  intercepted material after six months, as required by the law. Such  technological means need to be made mandatory to prevent unauthorized  access, rather than centralizing all interception capabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the moment, interception orders are given by the federal Home  Secretary of India and by state home secretaries without adequate  consideration. Every month at the federal level 7,000 to 9,000 phone  taps are authorized or re-authorized. Even if it took just three minutes  to evaluate each case, it would take 15 hours each day (without any  weekends or holidays) to go through 9,000 requests. The numbers in  Indian states could be worse, but one can’t be certain as statistics on  surveillance across India are not available. It indicates bureaucratic  callousness and indifference toward following the procedure laid down in  the Telegraph Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a 1975 case, the Supreme Court held that an “economic emergency”  may not amount to a “public emergency.” Yet we find that of the nine  central government agencies empowered to conduct interception in India,  according to press reports — Central Board of Direct Taxes, Intelligence  Bureau, Central Bureau of Investigation, Narcotics Control Bureau,  Directorate of Revenue Intelligence, Enforcement Directorate, Research  &amp;amp; Analysis Wing, National Investigation Agency and the Defense  Intelligence Agency — three are exclusively dedicated to economic  offenses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suspicion of tax evasion cannot legally justify a wiretap, which is  why the government said it had believed that Nira Radia, a corporate  lobbyist, was a &lt;a href="http://www.hindustantimes.com/India-news/NewDelhi/2G-scam-Spy-link-sparked-Niira-Radia-phone-tap/Article1-636886.aspx"&gt;spy&lt;/a&gt; when it defended putting a wiretap on her phone in 2008 and 2009. A  2011 report by the cabinet secretary pointed out that economic offenses  might not be counted as “public emergencies,” and that the Central Board  of Direct Taxes should not be empowered to intercept communications.  Yet the tax department continues to be on the list of agencies empowered  to conduct interceptions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has arrived at a scary juncture, where the multiple departments  of the Indian government don’t even trust each other. India’s  Department of Information Technology recently &lt;a href="http://www.indianexpress.com/news/ntro-hacking-email-ids-of-officials-says-govts-it-dept/1105875/"&gt;complained&lt;/a&gt; to the National Security Advisor that the National Technical Research  Organization had hacked into National Informatics Center infrastructure  and extracted sensitive data connected to various ministries. The  National Technical Research Organization denied it had hacked into the  servers but said hundreds of e-mail accounts of top government officials  were compromised in 2012, including those of “the home secretary, the  naval attaché to Tehran, several Indian missions abroad, top  investigators of the Central Bureau of Investigation and the armed  forces,” The Mint newspaper reported. Such incidents aggravate the fear  that the Indian government might not be willing and able to protect the  enormous amounts of information it is about to collect through the  C.M.S.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Simply put, government entities have engaged in unofficial and  illegal surveillance, and the C.M.S. is not likely to change this. In a  2010 &lt;a href="http://www.outlookindia.com/article.aspx?265192"&gt;article&lt;/a&gt; in Outlook, the journalist Saikat Datta described how various central  and state intelligence organizations across India are illegally using  off-the-air interception devices. “These systems are frequently deployed  in Muslim-dominated areas of cities like Delhi, Lucknow and Hyderabad,”  Mr. Datta wrote. “The systems, mounted inside cars, are sent on  ‘fishing expeditions,’ randomly tuning into conversations of citizens in  a bid to track down terrorists.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The National Technical Research Organization, which is not even on  the list of entities authorized to conduct interception, is one of the  largest surveillance organizations in India. The Mint &lt;a href="http://www.livemint.com/Politics/xxpcezb6Yhsr69qZ5AklgM/Intelligence-committee-to-meet-on-govt-email-hacking.html"&gt;reported&lt;/a&gt; last year that the organization’s surveillance devices, “contrary to  norms, were deployed more often in the national capital than in border  areas” and that under new standard operating procedures issued in early  2012, the organization can only intercept signals at the international  borders. The organization runs multiple facilities in Mumbai, Bangalore,  Delhi, Hyderabad, Lucknow and Kolkata, in which monumental amounts of  Internet traffic are captured. In Mumbai, all the traffic passing  through the undersea cables there is captured, Mr. Datta found.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the western state of Gujarat, a recent investigation by Amitabh  Pathak, the director general of police, revealed that in a period of  less than six months, more than 90,000 requests were made for call  detail records, including for the phones of senior police and civil  service officers. This high a number could not possibly have been  generated from criminal investigations alone. Again, these do not seem  to have led to any criminal charges against any of the people whose  records were obtained. The information seems to have been collected for  purposes other than national security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is struggling to keep track of the location of its  proliferating interception devices. More than 73,000 devices to  intercept mobile phone calls have been imported into India since 2005.  In 2011, the federal government &lt;a href="http://www.indianexpress.com/news/ib-to-crack-down-on-illegal-use-of-offair-interception-equipment/800672/"&gt;asked&lt;/a&gt; various state governments, private corporations, the army and  intelligence agencies to surrender these to the government, noting that  usage of any such equipment for surveillance was illegal. We don’t know  how many devices were actually &lt;a href="http://articles.timesofindia.indiatimes.com/2012-10-11/india/34386576_1_security-agencies-privacy-concerns-surrender"&gt;turned in&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These kinds of violations of privacy can have very dangerous  consequences. According to the former Intelligence Bureau head in the  western state of Gujarat, R.B. Sreekumar, the call records of a mobile  number used by Haren Pandya, the former Gujarat home minister, were used  to confirm that it was he who had provided secret testimony to the  Citizens’ Tribunal, which was conducting an independent investigation of  the 2002 sectarian riots in the state. Mr. Pandya was murdered in 2003.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The limited efforts to make India’s intelligence agencies more  accountable have gone nowhere. In 2012, the Planning Commission of India  formed a group of experts under Justice A.P. Shah, a retired Chief  Justice of the Delhi High Court, to look into existing projects of the  government and to suggest principles to guide a privacy law in light of  international experience. (Centre for Internet and Society, where I work  was part of the group). However, the government has yet to introduce a  bill to protect citizens’ privacy, even though the governmental and  private sector violations of Indian citizens’ privacy is growing at an  alarming rate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In February, after frequent calls by privacy activists and lawyers  for greater accountability and parliamentary oversight of intelligence  agencies, the Centre for Public Interest Litigation filed a case in the  Supreme Court. This would, one hopes, lead to reform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Citizens must also demand that a strong Privacy Act be enacted. In  1991, the leak of a Central Bureau of Investigation report titled  “Tapping of Politicians’ Phones” prompted the rights groups, People’s  Union of Civil Liberties to file a writ petition, which eventually led  to a Supreme Court of India ruling that recognized the right to privacy  of communications for all citizens as part of the fundamental rights of  freedom of speech and of life and personal liberty. However, through the  2008 amendments to the Information Technology Act, the IT Rules framed  in 2011 and the telecom licenses, the government has greatly weakened  the right to privacy as recognized by the Supreme Court. The damage must  be undone through a strong privacy law that safeguards the privacy of  Indian citizens against both the state and corporations. The law should  not only provide legal procedures, but also ensure that the government  should not employ technologies that erode legal procedures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A strong privacy law should provide strong grounds on which to hold  the National Security Advisor’s mass surveillance of Indians (over 12.1  billion pieces of intelligence in one month) as unlawful. The law should  ensure that Parliament, and Indian citizens, are regularly provided  information on the scale of surveillance across India, and the  convictions resulting from that surveillance. Individuals whose  communications metadata or content is monitored or intercepted should be  told about it after the passage of a reasonable amount of time. After  all, the data should only be gathered if it is to charge a person of  committing a crime. If such charges are not being brought, the person  should be told of the incursion into his or her privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The privacy law should ensure that all surveillance follows the  following principles: legitimacy (is the surveillance for a legitimate,  democratic purpose?), necessity (is this necessary to further that  purpose? does a less invasive means exist?), proportionality and harm  minimization (is this the minimum level of intrusion into privacy?),  specificity (is this surveillance order limited to a specific case?)  transparency (is this intrusion into privacy recorded and also  eventually revealed to the data subject?), purpose limitation (is the  data collected only used for the stated purpose?), and independent  oversight (is the surveillance reported to a legislative committee or a  privacy commissioner, and are statistics kept on surveillance conducted  and criminal prosecution filings?). Constitutional courts such as the  Supreme Court of India or the High Courts in the Indian states should  make such determinations. Citizens should have a right to civil and  criminal remedies for violations of surveillance laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian citizens should also take greater care of their own privacy  and safeguard the security of their communications. The solution is to  minimize usage of mobile phones and to use anonymizing technologies and  end-to-end encryption while communicating on the Internet. Free and  open-source software like OpenPGP can make e-mails secure. Technologies  like off-the-record messaging used in apps like ChatSecure and Pidgin  chat conversations, TextSecure for text messages, HTTPS Everywhere and  Virtual Private Networks can prevent Internet service providers from  being able to snoop, and make Internet communications anonymous.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian government, and especially our intelligence agencies, violate  Indian citizens’ privacy without legal authority on a routine basis. It  is time India stops itself from sleepwalking into a surveillance state.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/new-york-times-july-11-2013-can-india-trust-its-government-on-piracy'&gt;https://cis-india.org/internet-governance/blog/new-york-times-july-11-2013-can-india-trust-its-government-on-piracy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T10:35:33Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
