<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 271 to 285.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/consilience-2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/abli-privacy-workshop"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/newsclick-martin-moore-may-20-2019-aadhaar-reduced-agency-in-citizens-and-empowered-those-in-positions-of-authority"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-vidhi-choudhary-may-3-2019-bjp-outspends-congress-others-in-social-media-advertising"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/artificial-intelligence-and-data-initiative"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/biometric-update-may-8-2019-three-emerging-market-think-tanks-to-collaborate-on-good-id-recommendations-with-omidyar-backing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/society-5-0-and-artificial-intelligence-with-a-human-face"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/curating-genderlog-indias-twitter-handle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/appropriate-use-of-digital-identity-alliance-announcement"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/ambika-tandon-may-9-2019-workshop-on-feminist-information-infrastructure"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-arindrajit-basu-may-8-2019-will-the-wto-finally-tackle-the-trump-card-of-national-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/vipul-kharbanda-may-8-2019-an-analysis-of-rbi-draft-framework-on-regulatory-sandbox-for-fintech"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindustan-times-may-2-2019-gurshabad-grover-why-the-tik-tok-ban-is-worrying"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-may-2-2019-tushar-kaushik-cyber-criminals-hide-in-the-dark-web-to-remain-anonymous"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindustan-times-may-1-2019-aayush-rathi-and-ambika-tandon-how-privacy-fares-in-the-2019-election-manifestos"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/consilience-2019">
    <title>Consilience 2019</title>
    <link>https://cis-india.org/internet-governance/news/consilience-2019</link>
    <description>
        &lt;b&gt;The Law and Technology Society at the National Law School of India University, Bangalore organised Consilience on May 25, 2019.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Gurshabad Grover was a panelist on the discussion on 'Online Content Regulation: Global Perspectives and Solutions'. The other panelists were Jyoti Panday (Telecom Centre of Excellence) and Alok Prasanna Kumar (Vidhi Centre for Legal Policy). The session was moderated by Divij Joshi. Gurshabad's contributions centered around the interplay of content moderation, regulation and competition issues. He also discussed the disharmony between the recommendations of the UN Special Rapporteur on FoE and developing legal norms of regulation. Akriti Bopanna gave her inputs to Gurshabad Grover.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/consilience-2019'&gt;https://cis-india.org/internet-governance/news/consilience-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-06-05T07:25:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/abli-privacy-workshop">
    <title>ABLI Privacy Workshop</title>
    <link>https://cis-india.org/internet-governance/news/abli-privacy-workshop</link>
    <description>
        &lt;b&gt;On May 21 and 22, 2019, Elonnai Hickok, participated in the ABLI privacy workshop along with side events in Singapore.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/abli2019s-data-privacy-workshop"&gt;Click to view the agenda&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/abli-privacy-workshop'&gt;https://cis-india.org/internet-governance/news/abli-privacy-workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-06-05T07:29:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/newsclick-martin-moore-may-20-2019-aadhaar-reduced-agency-in-citizens-and-empowered-those-in-positions-of-authority">
    <title>"Aadhaar Reduced Agency in Citizens and Empowered Those in Positions of Authority"</title>
    <link>https://cis-india.org/internet-governance/news/newsclick-martin-moore-may-20-2019-aadhaar-reduced-agency-in-citizens-and-empowered-those-in-positions-of-authority</link>
    <description>
        &lt;b&gt;In the space of one election cycle, authoritarian governments, moneyed elites and fringe hackers figured out how to game elections, bypass democratic processes, and turn social networks into battlefields. Facebook, Google and Twitter – where our politics now takes place – have lost control and are struggling to claw it back. As our lives migrate online, we are gradually moving into a world of datafied citizens and real-time surveillance. The entire political landscape has changed, with profound consequences for democracy. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Martin Moore was &lt;a class="external-link" href="https://www.newsclick.in/aadhar-reduced-agency-citizens-and-empowered-those-positions-authority"&gt;published by NewsClick&lt;/a&gt; on May 20, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;Written by Martin Moore,&lt;/em&gt; Democracy Hacked: Political Turmoil and Information Warfare in the Digital Age,&lt;em&gt; is a compelling account of how democracy is being disrupted by the tech revolution, and what can be done to get us back on track. The following are excerpts from the chapter &lt;/em&gt;"Survellaince Democracy" &lt;em&gt;of the book.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tembhli, a remote rural village in northern Maharashtra, about 250 miles north of Mumbai, is rarely visited by high-powered politicians or prominent dignitaries. But on Wednesday, 29 September 2010, it found itself hosting not just the Indian prime minister, Manmohan Singh, but the president of Congress, Sonia Gandhi; the chief and deputy chief ministers and the governor of Maharashtra; and the head of the recently established Unique Identification Authority of India, Nandan Nilekani. It was this last figure, the least well known of the distinguished group, who was the reason behind the visit, and who would subsequently play the most important role in its aftermath. Nilekani and the politicians were there to give out the first ten ‘unique identifiers’ to residents of Tembhli. These ten people received their own twelve-digit number, a number that would, from that day forward, distinguish each of them from every other Indian citizen, and indeed – combined with their biometric data – from every other citizen in the world. “With this,” Sonia Gandhi said, “Tembhli has got a special importance in the map of India. People of Tembhli will lead the rest of the country. It is a historic step towards strengthening the people of our nation.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Governments of all stripes are prone to exaggerated rhetoric, but in this instance, Gandhi was proved right when she proclaimed that “starting from this tiny hamlet, the scheme will reach more than a billion people of this country.” Despite the change of government in 2014, by April 2016 a billion Indians had been allocated their unique identifier. By 2018 the number had exceeded 1.1 billion, out of a total population of just over 1.3 billion. It was, in the words of a Harvard Business School report, a “hugely ambitious project”, “the largest-scale project of its kind in the world”. Aadhaar, as the project was called, was “unique in its scale and ambition”.3 Each Aadhaar identifier included not just a twelve-digit number, but all ten fingerprints, iris scans from both eyes, and a photograph of each person’s face (with the potential for facial recognition later). By combining the number with one element of biometric data, the government believed, it could ensure that every Indian citizen had a single, verifiable, machine-readable identity. With this verifiable identity a citizen could open a bank account, receive welfare or pension payments, pay tax, apply for a driving license, or receive healthcare, regardless of literacy. In a country known for its administrative torpor and tortuous bureaucracy, where – in 2013 – only forty per cent of children’s births were even registered, such a scheme had the potential to let India leapfrog other democratic countries into the digital era, and make government not just digitally enabled but digitally empowered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yet this, for critics of the scheme, was one of its many flaws. “Aadhaar marks a fundamental shift in citizen–state relations,” Pranesh Prakash from India’s Centre for the Internet and Society wrote in the &lt;em&gt;Hindustan Times&lt;/em&gt;, “from ‘We the People’ to ‘We the Government’.” Civil society activists objected to the government’s enhanced power, and the relative unaccountability of the body running Aadhaar, headed by Nandan Nilekani until 2014. “In effect,” tech developer and activist Kiran Jonnalagadda wrote, “they are beyond the rule of law.” Others had practical objections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Biometric identification often did not work. A database of this size and importance was bound to attract hackers. Leaks were inevitable. Indeed, the &lt;em&gt;Tribune&lt;/em&gt; newspaper in January 2018 revealed that it had been able to buy a service, for 500 rupees (less than $10), that gave it access to any of up to one billion Aadhaar details. Yet such objections were written off as ‘scaremongering’ and Aadhaar critics as “activists of the upper crust, upper class, wine ’n cheese, Netflix-watching social media elite”. On top of which, despite an Indian Supreme Court judgment in August 2017 that affirmed the fundamental right of Indians to privacy, by early 2018 Aadhaar had achieved such momentum as to appear unstoppable. If the government was able to navigate the various legislative challenges to the scheme, then there was also a queue of other nations keen to adopt something similar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[…]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the government pushed Aadhaar towards every interaction the state had with the citizen, evidence mounted of failures in the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the north-eastern state of Jharkhand, an eleven-year-old girl died of starvation after her family stopped receiving their government food ration. Their ration card, the Hindu Centre for Politics and Public Policy reported, “was not linked to Aadhaar”. The centre also reported on data, taken from the government’s websites, showing that in Rajasthan, where receiving rations was dependent on Aadhaar authentication, between a quarter and a third of people with ration cards did not receive rations between September 2016 and July 2017. In some ration shops, after having spent hours trying and failing to get their fingerprints read by the biometric machines, people lost their temper and smashed the machines on the ground.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Across India there were reports of machines not recognizing fingerprints, or only recognizing them after multiple attempts. Old people’s prints turned out to be more difficult to read, as were those of manual workers and fishermen. Since the system presumes guilt rather than innocence, the burden of proof lies with the citizen, not with the state. To claim a ration, apply for a scholarship or buy a train ticket, you have to prove who you are before receiving it. The obligation lies with the citizen to prove she is not a fraud. Even if she is not, and the failure is not with her but with the system, she pays for the system’s failure, not the government. To dispute a decision made by the machine means going to the nearest large town – often many miles away – and convincing an official that the problem is with the machine or the digital record, not with you. It is not surprising that some people wrecked Aadhaar machines in their rage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the system was found to reduce agency in citizens, it empowered those in positions of authority. Central government was able to make public services conditional on authentication by Aadhaar (despite repeated court rulings that Aadhaar be voluntary, not mandatory). This conditionality could then be extended to the level and type of public services available to individuals. In fact, it had to be for many services – distinguishing pensioners from non-pensioners, for example. Yet in this conditionality, there is plenty of scope for harm and abuse. In 2017 the independent media site &lt;em&gt;Scroll.in&lt;/em&gt; reported a rising number of HIV-positive patients who were dropping out of treatment programmes because they were required to use their Aadhaar numbers and were fearful of their condition becoming public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Equally, while Aadhaar itself did not provide any information about caste, ethnicity, religion or language, once it was linked to other databases, most notably the National Population Register, then it became possible to identify people by group. Formal group identification by the state has an ignominious history. During the apartheid era in South Africa, the penultimate number on the South African identity card indicated race. In the Rwandan genocide in 1994, anyone who had ‘Tutsi’ on their identification was liable to be killed. In Nazi Germany in 1938, every Jewish citizen had ‘J’ stamped on their ID cards and passports. In India, where political and religious divisions are closely intertwined, there is good reason to be anxious about new opportunities for group identification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thanks to Aadhaar, companies started to build services using unique identification. A series of ‘trust platforms’ emerged, built on top of Aadhaar, where employers – and others – could access and authenticate people’s identity. A company called TrustID advertised itself as “India’s first, unique and comprehensive online verification platform”. Through TrustID an employer could check whether a potential employee had any criminal or civil convictions, or whether that person had a good or bad reputation (based on a news search and social media profiling). The company even encouraged women to check up on potential husbands they had found via marriage websites. Other international companies integrated Aadhaar into existing services. This is similar to the way in which companies work with platforms like Facebook to profile, and target, individuals based on their personal information – except in this instance doing it via the government. All the same questions about trust, privacy, freedom and power arise, with even greater political potency. The state and private companies are in partnership to track citizens constantly and to gather as much data as they can on them – data that they can then use for commercial or political purposes. This opaque, asymmetrical knowledge of the citizen seems like the reverse of what was intended by democratic transparency, especially in the absence of strong privacy and data protection. “Totalitarian states often do this against the wishes of their citizens,” Pratap Bhanu Mehta, the president of the Centre for Policy Research, writes, yet “in our democracy, our consent is being mobilized to put an imprimatur over more control and arbitrariness.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In August 2017, the Supreme Court of India came to a unanimous 9–0 decision that Article 21 of the Indian Constitution did guarantee a fundamental right to privacy. As such, it was not lawful for the government to make it mandatory for people to identify themselves using a unique identifier like Aadhaar, except in specific circumstances. To some this looked like a huge blow to the grand project. The Supreme Court decision “raises serious questions about Aadhaar”, lawyer Adarsh Ramanujan argued in India’s &lt;em&gt;Financial Express&lt;/em&gt;, and appeared to send “a direction to the central government to create a regime to ensure that privacy rights are not trammelled by other private parties”. The judgment was about privacy broadly, and did not refer to specific cases like Aadhaar, but was seen as the basis from which future challenges to the scheme could be launched. The Modi government, however, appeared to carry on regardless. In October it linked Aadhaar to driving licence applications. By mid-December, the government had made Aadhaar mandatory if citizens wanted to access any of 140 government services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nandan Nilekani, who had stepped down as chair of Aadhaar in 2014 in order to become a candidate for the Congress party, railed against those who criticized the scheme. There was, he claimed, an “orchestrated campaign” to malign the system. “I think this so-called anti-Aadhaar lobby is really just a small bunch of liberal elites who are in some echo chamber,” he told an Indian business news channel. Anyway, Nilekani argued, it was too late for the naysayers to stop it. Too many people were now enrolled. It was too integral to the provision of services. Others saw attacks on Aadhaar as political, arguing that Congress was using it for political gain prior to the 2019 election, and that this would backfire. “Aadhaar today is not just a number,” the editor of India’s &lt;em&gt;Economic Times&lt;/em&gt;wrote. “The Congress envisaged it as a means of identity but the Modi government has taken it to a different level. It has become a weapon in the hands of the poor and a powerful tool to fight entrenched black money interests. It is now a symbol of anti-corruption, anti-black money drives, a symbol of efficient allocation of welfare benefits.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/newsclick-martin-moore-may-20-2019-aadhaar-reduced-agency-in-citizens-and-empowered-those-in-positions-of-authority'&gt;https://cis-india.org/internet-governance/news/newsclick-martin-moore-may-20-2019-aadhaar-reduced-agency-in-citizens-and-empowered-those-in-positions-of-authority&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Martin Moore</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-05-21T15:33:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-vidhi-choudhary-may-3-2019-bjp-outspends-congress-others-in-social-media-advertising">
    <title>BJP outspends Congress, others in social media advertising</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-vidhi-choudhary-may-3-2019-bjp-outspends-congress-others-in-social-media-advertising</link>
    <description>
        &lt;b&gt;The data shows that so far the BJP has spent Rs 25 crore in advertisements across Facebook, Instagram, Google and YouTube.&lt;/b&gt;
        &lt;p&gt;&lt;span style="text-align: justify; "&gt;The article by Vidhi Choudhary was &lt;/span&gt;&lt;a class="external-link" href="https://www.hindustantimes.com/lok-sabha-elections/bjp-outspends-congress-others-in-social-media-advertising/story-FHByCC5vUfs7xCvD9kDY5L.html" style="text-align: justify; "&gt;published in Hindustan Times&lt;/a&gt;&lt;span style="text-align: justify; "&gt; on May 3, 2019. Sunil Abraham was quoted.&lt;/span&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The ruling Bharatiya Janata Party (BJP) is way ahead of the Congress in advertising expenditure on social media at the end of the fourth phase of the ongoing Lok Sabha elections, according to data from advertising transparency reports by Google and Facebook - but the spending across parties is being described as much lower than expected by media experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The data shows that so far the BJP has spent ₹25 crore in advertisements across Facebook, Instagram, Google and YouTube.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has spent ₹11.6 crore andRs 13.43 crore on Google and Facebook respectively. The Congress, the main opposition party has spent a total of ₹1.42 crore for ads on Facebook (Rs 74 lakh) and Google (₹62 lakh).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The total spend on political ads across Facebook, Google and their affiliates stood atRs 42.3 crore between February 2019 to the end of April 2019 across 108,968 ads.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The balance political ad spend ofRs 15.9 crore have been incurred by regional parties such as the Telugu Desam Party (TDP) and individual leaders such as Odisha chief minister Naveen Patnaik of the Biju Janata Dal (BJD).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These spends are part of the Facebook and Google political ad transparency reports - a measure most social media companies took as part of a voluntary code of ethics developed to ensure free, fair and ethical usage of social media platforms to maintain the integrity of the electoral process for the general elections 2019.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Sunil Abraham, founder and executive director for think tank, Centre for Internet and Society, the poll expenditure on social media appears to be abysmally low.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Over all these number look low to me. It is possible that political parties are using astroturfing strategies to avoid public scrutiny through the transparency reports published by Facebook and Google. For those unfamiliar with the term, astroturfing is the creation of fake grassroots support - named after the fake grass that is used in sports fields,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But other experts suggested these figures don’t reflect the full picture.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“These are only the media spends by major political parties. Media spends don’t reflect the total spend on social media because a lot of money is spent on both content creation and manpower to oversee online campaigns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Major parties collectively are likely to spend a total ofRs 350- 400 crore on social media this time, especially to tap into the first time voter who are regular users of Internet in the country,” said Ashish Bhasin, chairman and chief executive (CEO) at Dentsu Aegis Network - India and Greater South, a media buying agency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2014, political parties would have spent overRs 175 crore on social media, Bhasin added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 2019 Lok Sabha elections have being widely touted as India’s first social media election with close to 600 million Internet users in the country, more than double of 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some other digital media experts contended that the social media spends by the BJP are more conservative compared to the 2014 general elections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The focus is back to booth level marketing as opposed to online spends perhaps because the Election Commission has put stringent audit checks and are closely monitoring all the invoices and ads put up on social media,” said Jyothirmayee JT, founder and chief executive of HiveMinds, a Bangalore based digital marketing agency.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-vidhi-choudhary-may-3-2019-bjp-outspends-congress-others-in-social-media-advertising'&gt;https://cis-india.org/internet-governance/news/hindustan-times-vidhi-choudhary-may-3-2019-bjp-outspends-congress-others-in-social-media-advertising&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vidhi Choudhary</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-05-14T15:21:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/artificial-intelligence-and-data-initiative">
    <title>Artificial Intelligence and Data Initiative</title>
    <link>https://cis-india.org/internet-governance/news/artificial-intelligence-and-data-initiative</link>
    <description>
        &lt;b&gt;On 3 May 2019 Arindrajit Basu attended a meeting of the Artificial Intelligence and Data Initiative held at IIC in Delhi. I am a member of the Working Group and co-authoring a report with Anindya Chaudhuri of Global Development Network on the prospect of collaborations in Public uses of AI.&lt;/b&gt;
        &lt;p&gt;The agenda can be &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/artificial-intelligence-and-data-initiative"&gt;viewed here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/artificial-intelligence-and-data-initiative'&gt;https://cis-india.org/internet-governance/news/artificial-intelligence-and-data-initiative&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2019-05-14T15:06:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/biometric-update-may-8-2019-three-emerging-market-think-tanks-to-collaborate-on-good-id-recommendations-with-omidyar-backing">
    <title>Three emerging market think tanks to collaborate on Good ID recommendations with Omidyar backing</title>
    <link>https://cis-india.org/internet-governance/news/biometric-update-may-8-2019-three-emerging-market-think-tanks-to-collaborate-on-good-id-recommendations-with-omidyar-backing</link>
    <description>
        &lt;b&gt;Omidyar Network has invested in a trio of organizations from different regions to support enhanced understanding of the appropriate use and limits of digital identity.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Chris Burt was &lt;a class="external-link" href="https://www.biometricupdate.com/201905/three-emerging-market-think-tanks-to-collaborate-on-good-id-recommendations-with-omidyar-backing"&gt;published in Biometri Update&lt;/a&gt; on May 8, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Organizations from Brazil, Kenya, and India will take on a collaborative and iterative research process to help develop Omidyar’s concept of Good ID, according to a &lt;a href="https://www.omidyar.com/blog/appropriate-use-digital-identity-why-we-invested-three-region-research%C2%A0alliance" rel="noopener noreferrer" target="_blank"&gt;blog post&lt;/a&gt; by Omidyar Networks Investment Principal Subhashish Bhadra.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The three organizations are the Institute for Technology &amp;amp; Society (ITS), the Centre for Intellectual Property and Information Technology Law (CIPIT), and the Centre for Internet and Society (CIS). The ITS is a non-profit organization based in Brazil, with a mission of ensuring that emerging markets can respond appropriately to digital technologies, and that their benefits are broadly shared. CIPIT is an academic think tank, operating from the Strathmore Law School in Nairobi, Kenya, addressing emerging issues of continent-wide impact and providing an African voice for research networks. CIS is an India-based non-profit, which conducts interdisciplinary academic research to understand how the internet and digital technologies reconfigure social processes and structures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhadra notes that 110 countries have begun identification schemes in the past decade. These programs are often implemented to serve an initial use case, and their application expanded over time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In the absence of adequate legislative or judicial oversight, mission creep can create risks for those very individuals that an identity is supposed to empower,” Bhadra writes. “By their very nature, digital identity systems collect some data about individuals in order to provide access to certain services. This immediately raises two interrelated questions. First, how much data should the system collect? Second, what services should it be tied to?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Determining the appropriate scope of digital identity is inherently complex, and the potential for mission creep and requirement for a growing list of services risks exclusion, privacy violations, and a power imbalance between institutions and individuals, Bhadra argues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The three groups will conduct independent research over the next six months, and create a set of recommendations and tools for stakeholders to use when engaging with digital identity systems.&lt;br /&gt;Omidyar is a supporter of the &lt;a href="https://www.biometricupdate.com/201901/mission-billion-challenge-offers-100k-in-prizes-for-identity-data-privacy-innovation"&gt;Mission Billion Challenge&lt;/a&gt;, among several initiatives related to UN SDG 16.9.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/biometric-update-may-8-2019-three-emerging-market-think-tanks-to-collaborate-on-good-id-recommendations-with-omidyar-backing'&gt;https://cis-india.org/internet-governance/news/biometric-update-may-8-2019-three-emerging-market-think-tanks-to-collaborate-on-good-id-recommendations-with-omidyar-backing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-05-14T15:01:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/society-5-0-and-artificial-intelligence-with-a-human-face">
    <title>Society 5.0 and Artificial Intelligence with a Human Face</title>
    <link>https://cis-india.org/internet-governance/news/society-5-0-and-artificial-intelligence-with-a-human-face</link>
    <description>
        &lt;b&gt;On 10 May 2019 Radhika Radhakrishnan attended a stakeholder's roundtable consultation on "Society 5.0 and Artificial Intelligence with a Human Face", organized by the Indian Council for Research on International Economic Relations (ICRIER) at India Habitat Centre, New Delhi. The event aimed to chart a roadmap for India’s participation at the G20, under the Japanese Presidency.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The agenda can be &lt;a class="external-link" href="http://icrier.org/newsevents/seminar-details/?sid=460"&gt;found here&lt;/a&gt;. Radhika's inputs were primarily focused on the feminist and gender implications of publicly deployed AI models, challenges and opportunities for academic AI-focused research in the Global South, recommendations for AI capacity building and skilling in the Global South, and regulation of black-box AI.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/society-5-0-and-artificial-intelligence-with-a-human-face'&gt;https://cis-india.org/internet-governance/news/society-5-0-and-artificial-intelligence-with-a-human-face&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2019-05-14T14:51:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/curating-genderlog-indias-twitter-handle">
    <title>Curating Genderlog India's Twitter handle</title>
    <link>https://cis-india.org/internet-governance/news/curating-genderlog-indias-twitter-handle</link>
    <description>
        &lt;b&gt;Shweta Mohandas has been nominated to curate Genderlog's Twitter handle (@genderlogindia).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Shweta Mohandas &lt;span&gt;will be tweeting about topics related to gender and data, more specifically around AI, big data, privacy and surveillance. To view the tweets, &lt;a class="external-link" href="https://twitter.com/genderlogindia/status/1127892055231873024"&gt;click here&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/curating-genderlog-indias-twitter-handle'&gt;https://cis-india.org/internet-governance/news/curating-genderlog-indias-twitter-handle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-05-14T14:40:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/appropriate-use-of-digital-identity-alliance-announcement">
    <title>Announcement of a Three-Region Research Alliance on the Appropriate Use of Digital Identity</title>
    <link>https://cis-india.org/internet-governance/blog/appropriate-use-of-digital-identity-alliance-announcement</link>
    <description>
        &lt;b&gt;Omidyar Network has recently announced its decision to invest in establishment of a three-region research alliance — to be co-led by the Institute for Technology &amp; Society (ITS), Brazil, the Centre for Intellectual Property and Information Technology Law (CIPIT) , Kenya, and the CIS, India — on the Appropriate Use of Digital Identity. As part of this Alliance, we at the CIS will look at the policy objectives of digital identity projects, how technological policy choices can be thought through to meet the objectives, and how legitimate uses of a digital identity framework may be evaluated.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As governments across the globe are implementing new, digital foundational identification systems or modernizing existing ID programs, there is a dire need for greater research and discussion about appropriate design choices for a digital identity framework. There is significant momentum on digital ID, especially after the adoption of UN Sustainable Development Goal 16.9, which calls for legal identity for all by 2030. Given the importance of this subject, its implications for both the development agenda as well its impact on civil, social and economic rights, there is a need for more focused research that can enable policymakers to take better decisions, guide civil society in different jurisdictions to comment on and raise questions about digital identity schemes, and provide actionable material to the industry to create identity solutions that are privacy enhancing and inclusive.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Excerpt from the &lt;a href="https://www.omidyar.com/blog/appropriate-use-digital-identity-why-we-invested-three-region-research%C2%A0alliance" target="_blank"&gt;blog post by Subhashish Bhadra&lt;/a&gt; announcing this new research alliance&lt;/h4&gt;
&lt;p&gt;...In the absence of any widely-accepted thinking on this issue, we run the risk of digital identity systems suffering from mission creep, that is being made mandatory or being used for an ever-expanding set of services. We believe this creates several risks. First, people may be excluded from services if they do not have a digital identity or because it malfunctions. Second, this approach creates a wider digital footprint that can be used to create a profile of an individual, sometimes without consent. This can increase privacy risk. Third, this approach increases the power of institutions versus individuals and can be used as rationale to intentionally deny services, especially to vulnerable or persecuted groups.&lt;/p&gt;
&lt;p&gt;Three exceptional research groups have undertaken the effort of answering this complex and important question. Over the next six months, these think tanks will conduct independent research, as well as involve experts from across the globe. Based in South America, Africa, and Asia, these institutions represent the collective wisdom and experiences of three very distinct geographies in emerging markets. While drawing on their local context, this research effort is globally oriented. The think tanks will create a set of recommendations and tools that can be used by stakeholders to engage with digital identity systems in any part of the world...&lt;/p&gt;
&lt;p&gt;This research will use a collaborative and iterative process. The researchers will put out some ideas every few weeks, with the objective of seeking thoughts, questions, and feedback from various stakeholders. They will participate in several digital rights and identity events across the globe over the next several months. They will also organize webinars to seek input from and present their interim findings to interested communities from across the globe. Each of these provide an opportunity for you to provide your thoughts and help this research program provide an independent, rigorous, transparent, and holistic answer to the question of when it’s appropriate for digital identity to be used. We need a diversity of viewpoints and collaborative dissent to help solve the most pressing issues of our times.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/appropriate-use-of-digital-identity-alliance-announcement'&gt;https://cis-india.org/internet-governance/blog/appropriate-use-of-digital-identity-alliance-announcement&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Appropriate Use of Digital ID</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2019-05-13T09:06:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/ambika-tandon-may-9-2019-workshop-on-feminist-information-infrastructure">
    <title>Workshop on Feminist Information Infrastructure</title>
    <link>https://cis-india.org/internet-governance/blog/ambika-tandon-may-9-2019-workshop-on-feminist-information-infrastructure</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) organised a workshop on feminist infrastructure in collaboration with Blank Noise and Sangama, on 29th October, 2018. The purpose of the workshop was to disseminate the findings from a two-month long project being undertaken by researchers at Blank Noise and Sangama, with research support and training from CIS. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;A group of five researchers, one from Blank Noise and four from Sangama, presented their research on different aspects of feminist infrastructure. The workshop was attended by a diverse group of participants, including activists, academics, and representatives from civil society organisations and trade unions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Feminist infrastructure is a broadly conceptualised term referring to infrastructure that is designed by, and keeping in mind the needs of, diverse social groups with different kinds of marginality. In the field of technology, efforts to conceptualise feminist infrastructure have ranged from rethinking basic technological infrastructure, such as feminist spectrum , to community networks and tools for mobilisation . This project aimed to explore the imagination of feminist infrastructure in the context of different marginalities and lived experiences. Rather than limiting intersectionality to the subject of the research, as with most other feminist projects, this project aimed to produce knowledge from the ‘standpoint’  of those with the lived experience of marginalisation.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;This report by Ambika Tandon was edited by Gurshabad Grover and designed by Saumyaa Naidu. The full report can be &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/feminist-information-infrastructure"&gt;downloaded here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/ambika-tandon-may-9-2019-workshop-on-feminist-information-infrastructure'&gt;https://cis-india.org/internet-governance/blog/ambika-tandon-may-9-2019-workshop-on-feminist-information-infrastructure&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ambika</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-07-09T15:35:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-arindrajit-basu-may-8-2019-will-the-wto-finally-tackle-the-trump-card-of-national-security">
    <title>Will the WTO Finally Tackle the ‘Trump’ Card of National Security?</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-arindrajit-basu-may-8-2019-will-the-wto-finally-tackle-the-trump-card-of-national-security</link>
    <description>
        &lt;b&gt;The election of Donald Trump has marked a foundational challenge to the rules-based international order based on “free and fair trade”.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Arindrajit Basu was &lt;a class="external-link" href="https://thewire.in/trade/will-the-wto-finally-tackle-the-trump-card-of-national-security"&gt;published in the Wire&lt;/a&gt; on May 8, 2019.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;From &lt;a href="https://www.reuters.com/article/us-usa-trade-wto/u-s-blocks-wto-judge-reappointment-as-dispute-settlement-crisis-looms-idUSKCN1LC19O"&gt;stonewalling appointments &lt;/a&gt;at the appellate body of the WTO’s dispute settlement body (DSB) to &lt;a href="https://www.bloombergquint.com/china/trump-is-said-to-delay-decision-on-steel-and-aluminum-tariffs"&gt;slapping exorbitant steel and aluminium tariffs on a variety of countries, Trump has attempted to desecrate an institution that he views as being historically unfair to America’s national interests.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given this potentially cataclysmic state of affairs, &lt;a href="https://www.wto.org/english/tratop_e/dispu_e/512r_e.pdf"&gt;a WTO panel report adopted&lt;/a&gt; last month regarding a transport restriction dispute between the Russia and Ukraine would ordinarily have attracted limited attention. In reality, this widely celebrated ruling was the first instance of the WTO mechanism mounting a substantive legal resistance to Trump’s blitzkrieg.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The opportunity arose from the Russian Federation’s invocation of the ‘national security exception’ carved into the Article XXI of the General Agreement on Tariffs and Trade (GATT-the primary WTO covered agreement dealing with trade in goods.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This clause has rarely been invoked by a litigating party at the DSB and never been interpreted by the panel or appellate body due to the belief among WTO member states that the exception is &lt;a href="https://scholarship.law.nd.edu/law_faculty_scholarship/330/"&gt;‘self-judging’&lt;/a&gt; i.e. beyond the purview of WTO jurisdiction sovereign prerogative to use as they see fit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the past couple of years, the provision has taken on a new avatar with trade restrictions being increasingly used as a strategic tool to accomplish national security objectives. In addition to the Russian Federation, in this case, it was used by the &lt;a href="https://www.cambridge.org/core/journals/american-journal-of-international-law/article/security-exception-in-wto-law-entering-a-new-era/CF8C3DCDF2CD924CAEEDD147840668F9"&gt;UAE to justify sanctions against Qatar in 2017&lt;/a&gt;and notably by the &lt;a href="https://www.washingtonpost.com/news/monkey-cage/wp/2019/01/11/trump-claims-that-a-national-security-exception-allows-him-to-block-imports-is-he-right/?utm_term=.5c178ecfcd7d"&gt;US administration in response to the commencement of WTO proceedings &lt;/a&gt;by nine countries (including India) against its steel and aluminum tariffs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India itself has also cited the clause in its diplomatic statements when justifying revocation of the Most Favoured Nation Status to Pakistan, although this has not yet resulted in proceedings at the WTO.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even though the panel held in favour of Russia, this report lays down the edifice for dismantling the Trump Administration’s present strategy. By explicitly stating that Article XXI is not entirely beyond review of the WTO, the panel report gives a &lt;em&gt;cause de celebre&lt;/em&gt; for all countries attempting to legally battle Trump’s arbitrary protectionist cause disguised as genuine national security concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, it might act as a source of comfort for Huawei and China as it allows them to challenge the legality of banning Huawei (as some countries have chosen to do) at the WTO.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;History of Article XXI&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article XXI had &lt;a href="https://www.wto.org/english/res_e/booksp_e/gatt_ai_e/art21_e.pdf"&gt;an uncertain presence&lt;/a&gt; in the legal architecture of the WTO from its very inception. It had its origins in the US proposal to establish the International Trade Organisation. The members of the delegation themselves were divided between those who wanted to preserve the sovereign right of the United States to interpret the extent of the exception as it saw fit and others who felt that this provision would be abused to further arbitrary protectionism. The delegate of Australia was also skeptical about the possible exclusion of dispute resolution through a mere invocation of the security exception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given this divergence, the drafters of the provision  thus sought to create a specific set of exceptions in order to&lt;a href="http://sul-derivatives.stanford.edu/derivative?CSNID=90240173&amp;amp;mediaType=application/pdf"&gt; arrive at a compromise&lt;/a&gt; that “would take care of real security interests” while limiting “the exception so as to prevent the adoption of protection for maintaining industries under every conceivable circumstances”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To attain that objective, the provision in the ITO Charter, which was reflected in Article XXI of GATT 1947 was worded thus:&lt;/p&gt;
&lt;blockquote class="blurb" style="text-align: justify; "&gt;
&lt;p&gt;Nothing in this Agreement shall be construed&lt;/p&gt;
&lt;p&gt;to require any contracting party to furnish any information the disclosure of which it considers contrary to its essential security interests;&lt;/p&gt;
&lt;p&gt;or to prevent any contracting party from taking any action which it considers necessary for the protection of its essential security interests (i) relating to fissionable materials or the materials from which they are derived; (ii) relating to the traffic in arms, ammunition and implements of war and to such traffic in other goods and materials as is carried on directly or indirectly for the purpose of supplying a military establishment; (iii) taken in time of war or other emergency in international relations; or&lt;/p&gt;
&lt;p&gt;to prevent any contracting party from taking any action in pursuance of its obligations under the United Nations Charter for the maintenance of international peace and security&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Article XXI has been &lt;a href="http://www.wl-tradelaw.com/gatt-article-xxis-national-security-exception-the-ultimate-trade-policy-conundrum/"&gt;historically invoked &lt;/a&gt;in cases where national security is devised as a smokescreen for protectionism. For example, in 1975, Sweden cited Article XXI to justify global import restrictions it had had slapped on certain types of footwear. It argued that a decrease in domestic production of said kinds of footwear represented ” a critical threat to the emergency planning of its economic defense.” There was sustained criticism from some states, who questioned Sweden’s juxtaposition of a national security threat with economic strife, claiming that they too were suffering from severe unemployment at the time and the Swedish restrictions would be devastating for their economic position.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Swedish problem dissipated when Sweden withdrew the restrictions but the uncertain peril of Article XXI remained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;a href="http://nujslawreview.org/wp-content/uploads/2017/01/2016-9-3-4-Sandeep-Ravikumar-The-GATT-Security-Exception_-Systemic-Safeguards-Against-Its-Misuse.pdf"&gt;another instance&lt;/a&gt;, the US themselves had previously relied on the security exception to justify measures prohibiting all imports of goods and services of Nicaraguan origin to the US in addition to all U.S. exports to Nicaragua.It argued that Article XXI was self-judging and each party could enact  measures it considered necessary for the protection of its essential security interests. In fact, it was successful in keeping its Article XXI invocation outside the terms of reference (which establishes the scope of the Panel’s report), which precluded the Panel from asserting its jurisdiction and examining the provision. It is worth noting, though, that  the Panel was critical of the US for utilising the provision in this case and emphasised the need for balancing this exception against the need to preserve the stability of global trade.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The recent spate of national security driven justifications to subvert the adjudicatory powers of the WTO provided a necessary opportunity for the panel to clarify its stance on this issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The findings of the panel&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The findings of the panel can be divided into &lt;a href="https://www.ejiltalk.org/the-wto-panel-ruling-on-the-national-security-exception-has-the-panel-cut-the-baby-in-half/"&gt;three &lt;/a&gt;broad clusters:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1) The WTO tribunals’ jurisdiction over the security exception: Right from the outset, the panel clearly stated that it had jurisdiction to adjudicate the matter at hand. It rebutted Russia’s claim that any country invoking the exception had unfettered discretion in the matter&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2) The ambit of the self-judging nature of the security clause: Both the Russian Federation and the United States, which had filed a third party submission, re-emphasised the supposed self-judging nature of the security clause due to the incorporation of the words “ which it[the WTO member] considers necessary for the protection of its essential security interests” in clause (2) of the provision.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the panel argued that the sub-paragraphs (i)-(iii) require an objective review by the Panel to determine whether the state of affairs indicated in the sub-paragraphs do, in fact, exist. In this way, the Panel added,the three sub-clauses act as “limiting qualifying clauses.” The determination of the measures that may be  ‘necessary’ for protecting their ‘essential security interests’ are then left to each WTO member. By interpreting the clause in this manner,the Panel deftly preserved the sovereign autonomy of member states while preventing the bestowing of carte blanche’ ability to take shelter behind the provision.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3) Determination of emergency in international relations: The use of the term “other emergency in international relations” as used in the provision is an amorphous one because the term ‘emergency’ is not clearly defined in international law. Therefore, the Panel relied on UN General Assembly Resolutions and the fact that multiple states had imposed sanctions on Russia to conclude that there was, in fact, an ‘emergency’ in international relations in this case. In doing so, the Panel upheld the transport restrictions imposed by Russia. However, the implications extend far beyond the immediate impact on the two parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Implications of the ruling&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before considering the implications of this report, we must consider that, like in other avenues of international law, the municipal legal principle of &lt;em&gt;stare decisis &lt;/em&gt;&lt;a href="https://www.wto.org/english/tratop_e/dispu_e/disp_settlement_cbt_e/c7s1p1_e.htm"&gt;does not apply to Panel or Appellate Body decisions.&lt;/a&gt; This means that future panels are not bound by law to follow the finding in this report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, WTO tribunals have often used the reasoning put forward in previous panel or Appellate Body reports to support their findings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Steel and aluminium tariffs&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The US, whose third party submission failed to sway the panel has recognised the potential implications of the report and disparaged it as being &lt;a href="https://news.bloomberglaw.com/international-trade/u-s-calls-wto-national-security-ruling-seriously-flawed"&gt;“seriously flawed”.&lt;/a&gt; They have also discouraged the WTO tribunals deciding the steel and aluminium tariff disputes from using it as precedent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Australia, Brazil, Canada, China, European Union, Japan, Moldova, Singapore and Turkey had all filed third party submissions which encouraged the panel to assert its jurisdiction in the matter and &lt;a href="https://www.reuters.com/article/us-usa-trade-wto-idUSKCN1S21V9"&gt;have openly supported&lt;/a&gt; the panel’s approach – which would be a boost for the panels set up to adjudicate the Trump sanctions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the groundwork laid out by the panel in this dispute, &lt;a href="https://www.csis.org/analysis/wtos-first-ruling-national-security-what-does-it-mean-united-states"&gt;it would be difficult&lt;/a&gt; for the US to satisfy the panel’s understanding of ‘emergency in international relations’ as the Panel clearly stated that “political or economic differences between Members are not sufficient, of themselves, to constitute an emergency in international relations for purposes of subparagraph (iii)”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Huawei and cybersecurity&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to steel and aluminium tariffs, the panel’s decision also has an impact on the rapidly &lt;a href="https://www.aljazeera.com/news/2018/12/countries-banning-huawei-181206130850129.html"&gt;unfolding Huawei saga&lt;/a&gt;. Huawei, which is the world’s largest telecom equipment company and is now &lt;a href="https://foreignpolicy.com/2019/04/03/the-improbable-rise-of-huawei-5g-global-network-china/"&gt;taken the lead in the race to develop &lt;/a&gt;one of the world’s most critical emerging technologies: fifth generation mobile telephony.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Huawei has recently fallen out of favour with the US and &lt;a href="https://www.bbc.com/news/av/technology-47489411/government-s-worries-over-backdoors-in-huawei-s-5g-tech-castle"&gt;other western countries amidst suspicions of them &lt;/a&gt;enabling the Chinese government to spy on other countries by incorporating backdoors into their infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Various countries, including Australia, Japan, New Zealand have effectively &lt;a href="https://www.aljazeera.com/news/2018/12/countries-banning-huawei-181206130850129.html"&gt;banned Huawei from public participation&lt;/a&gt; while the US has prevented government agencies from buying Huawei infrastructure-&lt;a href="https://www.cnbc.com/2019/03/08/china-supports-huawei-lawsuit-against-us.html"&gt;triggering litigation by Huawei&lt;/a&gt; seeking to prevent the move.India has &lt;a href="https://www.orfonline.org/expert-speak/the-huawei-issue-and-dilemma-before-countries-like-india-47442/"&gt;adopted an independent approach &lt;/a&gt;by allowing Huawei to participate in field trials of 5G equipment despite Indian agencies flagging concerns over the use of Chinese made telecom equipment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On April 11, &lt;a href="https://www.businessinsurance.com/article/00010101/STORY/912327909/Australia-defends-Huawei-ban,-China-complains-to-WTO"&gt;China complained about&lt;/a&gt; the Australian decision at the formal meeting of the WTO’s Council for Trade in Goods by highlighting its discriminatory impact on China. To defend itself, Australia may need to invoke Article XXI and argue that the ban fits in under one of the sub-paragraphs (i)-(iii) of clause (2) The report by this panel, may, therefore propel the WTO’s first big foray into cybersecurity and enable it to act as a multi-lateral adjudicator of the critical geo-political issues discussed in this piece.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The history of international law has been a history of powerful nations manipulating its tenets for strategic gain. At the same time, it has been a history of institutional resilience, evolution and change. The World Trade Organisation is no exception. Despite several aspects of the WTO ecosystem being severely flawed with a disparate impact on vulnerable groups in weaker nations, it has been the bulwark of the modern geo-economic order.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By taking the ‘national security’ exception head on, the panel has undertaken a brave act of self-preservation and foiled the utilisation of a dangerous trump card.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-arindrajit-basu-may-8-2019-will-the-wto-finally-tackle-the-trump-card-of-national-security'&gt;https://cis-india.org/internet-governance/blog/the-wire-arindrajit-basu-may-8-2019-will-the-wto-finally-tackle-the-trump-card-of-national-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>basu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>WTO</dc:subject>
    

   <dc:date>2019-05-08T14:22:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/vipul-kharbanda-may-8-2019-an-analysis-of-rbi-draft-framework-on-regulatory-sandbox-for-fintech">
    <title>An Analysis of the RBI’s Draft Framework on Regulatory Sandbox for Fintech</title>
    <link>https://cis-india.org/internet-governance/blog/vipul-kharbanda-may-8-2019-an-analysis-of-rbi-draft-framework-on-regulatory-sandbox-for-fintech</link>
    <description>
        &lt;b&gt;The term Fintech is generally used to describe innovative technology and technological processes being used in the financial services sector.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/analysis-of-the-rbi2019s-draft-framework-on-regulatory-sandbox-for-fintech"&gt;&lt;b&gt;Click here&lt;/b&gt;&lt;/a&gt; to download the file.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;It originated as a term referring to the back-end technology used by large financial institutions, but has expanded to include technological innovation in the financial sector, including innovations in financial literacy and education, retail banking, investments, etc.&lt;/span&gt;&lt;a name="_ftnref1"&gt;&lt;/a&gt;&lt;span&gt; Entities engaged in FinTech offer an array of services ranging from peer-to-peer lending platforms and mobile payment solutions to online portfolio management tools and international money transfers.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regulation and supervision of the Fintech industry raises some unique challenges for regulatory authorities as they have to strike a balance between financial inclusion, stability, integrity, consumer protection, and competition.&lt;a name="_ftnref2"&gt;&lt;/a&gt; One of the methods that have been adopted by regulators in certain jurisdictions to tackle the complexities of this sector is to establish a “regulatory sandbox” which could nurture innovative fintech enterprises while at the same time ensuring that the risk associated with any regulatory relaxations is contained within specified boundaries. It was precisely for this reason that establishment of a regulatory sandbox was one of the options put forward by the Working Group on Fintech and Digital Banking established by the Reserve Bank of India in its report of November, 2017 which was released for public comments on February 8, 2018. Acting on this recommendation the Reserve Bank has proposed a Draft Enabling Framework for Regulatory Sandbox, dated April 18, 2019, (“&lt;strong&gt;RBI Framework&lt;/strong&gt;”) which is analysed and discussed below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Regulatory Sandbox and its benefits&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the basic concept of a regulatory sandbox is to ensure that there is regulatory encouragement and incentive for fledgling Fintech enterprises in a contained environment to mitigate risks, different regulatory authorities have adopted varied methods of achieving this objective. While the Australian Securities and Exchange Commission (ASIC) uses a method where the eligible enterprises notify the ASIC and commence testing without an individual application process, the Financial Conduct Authority, UK (FCA) uses a cohort approach wherein eligible enterprises have to apply to the FCA which then selects the best options based on criteria laid down in the policy.&lt;a name="_ftnref3"&gt;&lt;/a&gt; The RBI has, not surprisingly, adopted an approach similar to the FCA wherein applicants will be selected by the RBI based on pre-defined eligibility criterion and start the regulatory sandbox in cohorts containing a few entities at a time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A regulatory sandbox offers the users the opportunity to test the product’s viability without a larger and more expensive roll out involving heavy investment and regulatory authorizations. If the product appears to have the potential to be successful, it might then be authorized and brought to the broader market more quickly.&lt;a name="_ftnref4"&gt;&lt;/a&gt; If there are any problems with the product the limited nature of the sandbox ensures that the consequences of the problems are contained and do not affect the broader market. It also allows regulators to obtain first-hand empirical evidence on the benefits and risks of emerging technologies and business models, and their implications, which allows them to take a considered (and perhaps more nuanced) view on the regulatory requirements that may be needed to support useful innovation, while mitigating the attendant risks. A regulatory sandbox initiative also sends a clear signal to the market that innovation is on the agenda of the regulator.&lt;a name="_ftnref5"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;RBI Draft Framework&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the RBI has adopted a cohort approach for its regulatory sandbox process (“&lt;strong&gt;RS&lt;/strong&gt;”), it implies that fintech entities will have to apply to the RBI to be selected in the RS. The eligibility criterion provides that the applicants will have to meet the eligibility conditions prescribed by the government for start-ups as per the Government of India, Department of Industrial Policy and Promotion, Notification GSR 364(E) April 11, 2018.&lt;a name="_ftnref6"&gt;&lt;/a&gt; The RS will focus on areas where (i) there is an absence of regulations, (ii) regulations need to be eased to encourage innovation, and (iii) the innovation/product shows promise of easing/effecting delivery of financial services in a significant way.&lt;a name="_ftnref7"&gt;&lt;/a&gt; The Framework also provides an indicative list of innovative products and technologies which could be considered for RS testing,&lt;a name="_ftnref8"&gt;&lt;/a&gt; and at the same time prohibits certain products and technologies from being considered for this programme such as credit registry, crypto currencies, ICOs, etc.&lt;a name="_ftnref9"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The RBI Framework also lays down specific conditions that the entity has to satisfy in order to be considered for the RS such as satisfaction of the conditions to be considered a start-up, minimum net worth requirements, fit and proper criteria for Directors and Promoters, satisfactory conduct of bank accounts of promoters/directors, satisfactory credit score, technological readiness of the product for deployment in the broader market, ensuring compliance with existing laws and regulations on consumer data and privacy, adequate safeguards in its IT systems for protection against unauthorised access etc. and a robust IT infrastructure and managerial resources. The fit and proper criteria for Directors and Promoters which requires elements of credit history along with the minimum net worth requirements in the RBI Framework are conditions which may be too difficult for some of the smaller and newer start-ups to satisfy even though the technology and products they offer might be sound. The applicants are also required to: (i) highlight an existing gap in the financial ecosystem and how they intend to address that, (ii) show a regulatory barrier or gap that prevents the implementation of the solution on a large scale, (iii) clearly define the test scenarios, expected outcomes, boundary conditions, exit or transition strategy, assessment and mitigation of risks, etc.&lt;a name="_ftnref10"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The RBI Framework specifies that the focus of the RS should be narrow in terms of areas of innovation and limited in terms of intake.&lt;a name="_ftnref11"&gt;&lt;/a&gt; While limits on the number of entities per cohort may be justified based on paucity of resources, limiting the focus of the RS by narrow areas of innovation is a lost opportunity in terms of sharing of ideas and learning from the mistakes of their colleagues who may be employing technologies and principles which could be useful in fields other than those where they are currently being applied.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The RBI Framework specifies that the boundaries of the RS have to be well defined so that any consequences of failure can be contained. These boundary conditions include a specific start and end date, target customer type and limits on number of customers, cash holdings, transaction amounts and customer losses.&lt;a name="_ftnref12"&gt;&lt;/a&gt; The Framework does not put in place any hard numbers on the boundary conditions which ensures that the RS process can be customised to the needs of specific entities since the sample sizes and data needed to determine the viability of fintech entities and products may vary from product to product. However a major dampener is the hard limit of 12 weeks imposed on the testing phase of the RS, which is the most important phase since all the data from the operations is generated during this phase and 12 weeks may not be enough time to generate enough reliable data so as to reach a determination of the viability of the product.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the RBI has shown a willingness to relax regulatory requirements for RS participants on a case to case basis, it has specified that there shall be no relaxation on issues of customer privacy and data protection, security of payment data, transaction security, KYC requirements and statutory restrictions.&lt;a name="_ftnref13"&gt;&lt;/a&gt; Since this is only an initiative by the RBI the RS participants dealing with the insurance or securities sector would not be entitled to any relaxations from the IRDA or the SEBI even if they are found eligible for relaxations from RBI regulations. This would severely limit the efficacy of the RS process and is an issue that could have been addressed if all three regulators had collaborated thereby encouraging innovative start-ups offering a broader spectrum of services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once the RS is finished, the regulatory relaxations provided by the RBI will expire and the fintech entity will have to either stop operations or comply with the relevant regulations. In case the entity requires an extension of the RS period, it would apply to the RBI atleast one month prior to the expiry of the RS period with reasons for the extension. The RBI also has the option of prematurely terminating the sandbox process in case the entity does not achieve its intended purpose or if it cannot comply with the regulatory requirements and other conditions specified at the relevant stage of the sandbox process. The fintech entity is also entitled to quit the RS process prematurely by giving one week’s notice to the RBI, provided it ensures that all its existing obligations to its customers are fully addressed before such discontinuance.&lt;a name="_ftnref14"&gt;&lt;/a&gt; Infact customer obligations have to be met by the fintech entities irrespective of whether the operations are prematurely ended by the entity or it continues through the entire RS process; no waiver of the legal liability towards consumers is provided by the RS process. In addition, customers are required to be notified upfront about the potential risks and their explicit consent is to be taken in this regard.&lt;a name="_ftnref15"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The RBI Framework itself lists out some of the risks associated with the regulatory sandbox model such as (i) loss of flexibility in going through the RS process, (ii) case by case determinations involve time and discretional judgements, (iii) no legal waivers, (iv) requirement of regulatory approvals after the RS process is over, (iv) legal issues such as consumer complaints, challenges from rejected candidates, etc. While acknowledging the above risks the Framework also mentions that atleast some of them may be mitigated by following a time bound and transparent process thus reducing risks of arbitrary discretion and loss of flexibility.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Conclusions&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While there are some who are sceptical of the entire concept of a regulatory sandbox for the reason that it loosens regulation too much while at the same time putting customers at risk,&lt;a name="_ftnref16"&gt;&lt;/a&gt; the cohort model adopted by the RBI would reduce that risk to an extent since it ensures comprehensive screening and supervision by the RBI with clear exit strategies and an emphasis on consumer interests. On the other hand the eligibility criterion for applicants prescribes minimum net worth requirements as well as credit history, etc. which may impose conditions too onerous for some start ups which may be their infancy. Further the clear emphasis on protection of customer privacy and consumer interests also ensures that the RBI will not put the interests of ordinary citizens at risk in order to promote new and untested technologies. That said, the regulatory sandbox process is a welcome initiative by the RBI which may send a signal to the financial community that it is aware of the potential advantages as well as risks of Fintech and is willing to play a proactive role in encouraging new technologies to improve the financial sector in India.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn1"&gt;&lt;/a&gt; Report of Working Group on Fintech and Digital Banking, Reserve Bank of India, November, 2017, available at &lt;a href="https://www.rbi.org.in/Scripts/PublicationReportDetails.aspx?UrlPage=&amp;amp;ID=892"&gt;https://www.rbi.org.in/Scripts/PublicationReportDetails.aspx?UrlPage=&amp;amp;ID=892&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn2"&gt;&lt;/a&gt; Jenik, Ivo, and Kate Lauer. 2017. “Regulatory Sandboxes and Financial Inclusion.” Working Paper. Washington, D.C.: CGAP, available at &lt;a href="https://www.cgap.org/sites/default/files/Working-Paper-Regulatory-Sandboxes-Oct-2017.pdf"&gt;https://www.cgap.org/sites/default/files/Working-Paper-Regulatory-Sandboxes-Oct-2017.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn3"&gt;&lt;/a&gt; Other countries which have regulatory sandboxes are Netherlands, Bahrain, Abu Dhabi, Saudi Arabia, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn4"&gt;&lt;/a&gt; Report of Working Group on Fintech and Digital Banking, Reserve Bank of India, November, 2017, available at &lt;a href="https://www.rbi.org.in/Scripts/PublicationReportDetails.aspx?UrlPage=&amp;amp;ID=892"&gt;https://www.rbi.org.in/Scripts/PublicationReportDetails.aspx?UrlPage=&amp;amp;ID=892&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn5"&gt;&lt;/a&gt; Jenik, Ivo, and Kate Lauer. 2017. “Regulatory Sandboxes and Financial Inclusion.” Working Paper. Washington, D.C.: CGAP, available at &lt;a href="https://www.cgap.org/sites/default/files/Working-Paper-Regulatory-Sandboxes-Oct-2017.pdf"&gt;https://www.cgap.org/sites/default/files/Working-Paper-Regulatory-Sandboxes-Oct-2017.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn6"&gt;&lt;/a&gt; These conditions are fairly liberal in that they require that the entity should be less than 7 years old; should not have a turnover of more than 25 crores, and should be working for innovation, development or improvement of products or processes or services, or if it is a scalable business model with a high potential of employment generation or wealth creation&lt;em&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn7"&gt;&lt;/a&gt; Clause 5 of the RBI Framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn8"&gt;&lt;/a&gt; Clause 6.1 of the RBI Framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn9"&gt;&lt;/a&gt; Clause 6.3 of the RBI Framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn10"&gt;&lt;/a&gt; Clause 6.5 of the RBI Framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn11"&gt;&lt;/a&gt; Clause 6.4 of the RBI Framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn12"&gt;&lt;/a&gt; Clause 6.7 of the RBI Framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn13"&gt;&lt;/a&gt; Clauses 6.2 and 8 of the RBI Framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn14"&gt;&lt;/a&gt; Clause 6.6 of the RBI Framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn15"&gt;&lt;/a&gt; Clause 6.9 of the RBI Framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn16"&gt;&lt;/a&gt; Jemima Kelly, A “fintech sandbox” might sound like a harmless idea. It's not, Financial Times, Aplphaville, &lt;a href="https://ftalphaville.ft.com/2018/12/05/1543986004000/A--fintech-sandbox--might-sound-like-a-harmless-idea--It-s-not/"&gt;https://ftalphaville.ft.com/2018/12/05/1543986004000/A--fintech-sandbox--might-sound-like-a-harmless-idea--It-s-not/&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/vipul-kharbanda-may-8-2019-an-analysis-of-rbi-draft-framework-on-regulatory-sandbox-for-fintech'&gt;https://cis-india.org/internet-governance/blog/vipul-kharbanda-may-8-2019-an-analysis-of-rbi-draft-framework-on-regulatory-sandbox-for-fintech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-05-08T13:57:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindustan-times-may-2-2019-gurshabad-grover-why-the-tik-tok-ban-is-worrying">
    <title>Why the TikTok ban is worrying</title>
    <link>https://cis-india.org/internet-governance/blog/hindustan-times-may-2-2019-gurshabad-grover-why-the-tik-tok-ban-is-worrying</link>
    <description>
        &lt;b&gt;Rather than critically examining the infringement of liberties by the political executive, the Indian courts are becoming an additional threat to the right to freedom of expression, which we must be increasingly wary of.&lt;/b&gt;
        &lt;p&gt;The article by Gurshabad Grover was &lt;a class="external-link" href="https://www.hindustantimes.com/analysis/why-the-tiktok-ban-is-worrying/story-9Q7Gpv9t1Uxavd8hYJnjDO.html"&gt;published in Hindustan Times &lt;/a&gt;on May 2, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In a span of less than two weeks, the Madras High Court has imposed and lifted a ban on the TikTok mobile application, an increasingly popular video and social platform. While rescinding the ban is welcome, the events tell a worrying tale of how the courts can arbitrarily censor online expression with little accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On April 3, the Madras High Court heard a public interest litigation petitioning for the TikTok mobile app to be banned in India because it was “encouraging pornography”, “degrading culture”, “causing paedophiles”, spreading “explicit disturbing content” and causing health problems for teenagers. It is difficult to establish the truth of these extreme claims about content on the platform that has user generated content, but the court was confident enough to pass wide ranging interim orders on the same day without hearing ByteDance, the company that operates the Tik Tok app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The interim order had three directives. First, the Madras High Court ordered the government to prohibit the downloading of the app. Second, it restricted the media from broadcasting videos made using the app. Third, it asked the government to respond about whether it plans to enact legislation that would protect children’s online privacy. While the third directive poses an important question to the government that merits a larger discussion, the first two completely lacked a legal rationale. The court order also implied that the availability of pornography on the platform was problematic, even though it is not illegal to access pornography in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Appallingly, the order makes no mention at all of the most pertinent legal provision: Section 79 of the Information Technology (IT) Act and the rules issued under it, which form the liability regime applicable to intermediaries (online services). The intermediary liability rules in India generally shield online platforms from liability for the content uploaded to their platform as long as the company operating is primarily involved in transmitting the content, complies with government and court orders, and is not abetting illegal activity. It is this regime that has ensured that online platforms are not hyperactively censoring expression to avoid liability, and has directly supported the proliferation of speech online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The courts do have some powers of online censorship under the provision, which they have used many times in the past. They have the authority to decide on questions of whether certain content violates law and then direct intermediaries to disable access to that specific content. Such a legal scenario was certainly not the case before the Madras High Court. We can also be sure that the app stores run by Apple and Google, on which TikTok is available, were not the intermediaries under consideration here (which would also be problematic in its own ways) since the interim order makes no mention of them. So, despite the fact that the court’s order had no clear jurisdiction and legal basis, Apple and Google were ordered by the government to remove TikTok from their respective mobile app stores for India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ByteDance Technology appealed to the Supreme Court of India to rescind the ban, arguing that they qualify as intermediaries under the IT Act and should not face a blanket ban as a repercussion of allegedly problematic content on their platform. The Supreme Court refrained from staying the problematic Madras High Court interim order, but decided that the ban on the app will be lifted by April 24 if the case wasn’t decided by then. On April 24, sense finally prevailed when the High Court decided to take the interim directive back.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Admittedly, popular online platforms can create certain social problems. TikTok has faced bans elsewhere and was fined by the Federal Trade Commission in the United Sates for collecting information on its users who were below the age of 13. There is no debate that the company is legally bound to follow the rules issued under the IT Act, be responsive to legally valid government and court orders, and should strictly enforce their community guidelines that aim to create a safe environment for the young demographic that forms a part of its user base. However, a ban is a disproportionate move that sends signals of regulatory uncertainty, especially for technology companies trying to break into an increasingly consolidated market. The failure of the government to enact a law that protects children’s privacy also cannot be considered a legitimate ground for a ban on a mobile app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Perhaps most importantly, the interim court order adds yet another example to the increasing number of times the judiciary has responded to petitions by passing censorship orders that have no basis in law. As constitutional scholar Gautam Bhatia has pointed out, we are faced with the trend of “judicial censorship” wherein the judiciary is exercising power without accountability in ways not envisioned by the Constitution. Rather than critically examining the infringement of liberties by the political executive, the Indian courts are becoming an additional threat to the right to freedom of expression, which we must be increasingly wary of.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindustan-times-may-2-2019-gurshabad-grover-why-the-tik-tok-ban-is-worrying'&gt;https://cis-india.org/internet-governance/blog/hindustan-times-may-2-2019-gurshabad-grover-why-the-tik-tok-ban-is-worrying&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>gurshabad</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-05-05T10:11:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-may-2-2019-tushar-kaushik-cyber-criminals-hide-in-the-dark-web-to-remain-anonymous">
    <title>Cyber criminals hide in the ‘dark web’ to remain anonymous </title>
    <link>https://cis-india.org/internet-governance/news/economic-times-may-2-2019-tushar-kaushik-cyber-criminals-hide-in-the-dark-web-to-remain-anonymous</link>
    <description>
        &lt;b&gt;An increasing number of cyber criminals are using the dark web — the encrypted part of the internet that cannot be tracked — to shop for software that helps them remain anonymous while carrying out their crimes.&lt;/b&gt;
        &lt;p&gt;The article by Tushar Kaushik was published in &lt;a class="external-link" href="https://economictimes.indiatimes.com/tech/internet/cyber-criminals-hide-in-the-dark-web-to-remain-anonymous/articleshow/69139795.cms"&gt;Economic Times&lt;/a&gt; on May 2, 2019. Karan Saini was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The dark web is a part of the deep web, the non-indexed part of the world wide web that cannot be accessed by standard search engines such as Google and requires encrypted networks such as Tor browser.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most significant feature of this world is that the identity of its users is hidden and cannot be tracked, which is why several illicit products such as weapons and drugs are available here. Cyber criminals, too, appear to be shopping here.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to app developer and cofounder of TBG Labs Harsha Halvi, the deep web makes up as much as about 65- 75% of the world wide web. “Many tools that can be used to commit cyber frauds are available on the dark web,” said cyber crime police station inspector M Chandrappa. Deputy superintendent at the cyber crime police station of CID MD Sharath said it was difficult to ascertain the frequency of usage of such applications by criminals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Those fighting cyber crime in Bengaluru say that as most cases are not detected, chances are that more and more criminals are using the dark web. While investigating a case recently, a suspect admitted to having downloaded a software from the dark web that enabled him to disguise his number and also prevent it from being traced, the police said. “If a person has used tools from the dark web to hide his number, the investigation ends right there, as we do not have the necessary tools and software to trace the person,” a senior police officer said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts say that while there are ways to trace activity on the dark web, police officials would require special training and specific information about the activity. Security researcher and policy officer at the Centre for Internet and Society Karan Saini said, “Attempting to track unconventional online behaviour would call for development of new methods, along with formal training for those involved, especially if malicious actors are using the Tor network to carry out illicit activities instead of the clear web.&lt;span&gt;”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Halvi said some agencies like the FBI deploy ethical hackers to track specific websites on the dark web. “But they, too, have to rely on getting specific information from people to investigate the dark web. It is a time-consuming process.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Bitcoin transactions are the preferred mode of payment for purchases on the dark web as they cannot be traced. However, Saini said some US-based researchers have written academic papers on how bitcoin exchanges can be tracked.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-may-2-2019-tushar-kaushik-cyber-criminals-hide-in-the-dark-web-to-remain-anonymous'&gt;https://cis-india.org/internet-governance/news/economic-times-may-2-2019-tushar-kaushik-cyber-criminals-hide-in-the-dark-web-to-remain-anonymous&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Tushar Kaushik</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-05-02T13:55:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindustan-times-may-1-2019-aayush-rathi-and-ambika-tandon-how-privacy-fares-in-the-2019-election-manifestos">
    <title>How privacy fares in the 2019 election manifestos | Opinion</title>
    <link>https://cis-india.org/internet-governance/blog/hindustan-times-may-1-2019-aayush-rathi-and-ambika-tandon-how-privacy-fares-in-the-2019-election-manifestos</link>
    <description>
        &lt;b&gt;We now have a rights-based language around privacy in the mainstream political discourse but that’s where it ends.&lt;/b&gt;
        &lt;p&gt;The article by Aayush Rathi and Ambika Tandon was &lt;a class="external-link" href="https://www.hindustantimes.com/analysis/how-privacy-fares-in-the-2019-election-manifestos/story-C7rPD7mG8wMr3D4tZcQ4pK.html"&gt;published in the Hindustan Times&lt;/a&gt; on May 1, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In August 2017, the Supreme Court, in Puttaswamy vs Union of India, unanimously recognised privacy as a fundamental right guaranteed by the Constitution. Before the historic judgment, the right to privacy had remained contested and was determined on a case-by-case basis. By understanding privacy as the preservation of individual dignity and autonomy, the judgment laid the groundwork to accommodate subsequent landmark legislative moves — varying from decriminalising homosexuality to limiting the use of the Aadhaar by private actors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reflecting the importance gained by privacy within public imagination, the 2019 elections are the first time it finds mention across major party manifestos. In 2014, the Communist Party of India (Marxist) was the only political party to have made commitments to safeguarding privacy, albeit in a limited fashion. For the 2019 election, both the Congress and the CPI(M) promise to protect the right to privacy if elected to power. The Congress promises to “pass a law to protect the personal data of all persons and uphold the right to privacy”. However, it primarily focuses on informational privacy and its application to data protection, limited to the right of citizens to control access and use of information about themselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CPI(M) focuses on privacy more broadly while promising to protect against “intrusion into the fundamental right to privacy of every Indian”. In a similar vein, both the Congress and the CPI(M) also commit to bringing about surveillance reform by incorporating layers of oversight. The CPI(M) manifesto further promises to support the curtailment of mass surveillance globally. It promises to enact a data privacy law to protect against “appropriation/misuse of private data for commercial use”, albeit without any reference to misuse by government agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, the Samajwadi Party manifesto proposes the reintroduction of the controversial NATGRID, an overarching surveillance tool proposed by the Congress in the aftermath of the 26/11 Mumbai attacks. In this backdrop, digital rights for individuals are conspicuous by their absence from the Bharatiya Janata Party’s manifesto. Data protection is only seen in a limited sense as being required in conjunction with increasing digital financialisation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The favourable articulation of privacy in some of the manifestos should be read along with other commitments across parties around achieving development goals through the digital economy. Central to the operation of this is aggregating citizen data. Utilising this aggregated data for predictive abilities is key to initiatives being proposed in the manifestos —digitising health records, a focus on sunrise technologies, such as machine learning and big data, and readiness for “Industry 5.0” are some examples.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The right is then operationalised in a manner that leads data subjects to pick between their privacy and accessing services being provided by the data collector. Relinquishing privacy becomes the only option especially when access to welfare services is at stake.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discourse around privacy in India has historically been used to restrict individual freedoms. In the Puttaswamy case, Justice DY Chandrachud, in his plurality opinion, acknowledges feminist scholarship to broaden the understanding of the right to privacy to one that protects bodily integrity and decisional privacy for marginalised communities. This implies protection against any manner of State interference with decisions regarding the self, and, more broadly, the right to create a private space to allow the personality to develop without interference. This includes protection from undue violations of bodily integrity such as protecting the freedom to use public spaces without fear of harassment, and criminalising marital rape.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the articulation of privacy in the manifestos is a good start, it should be much more. Governance must implement the right to look beyond the individualised conception of privacy so as to allow it to support a whole range of freedoms, rather than limiting it to data protection. This could take the shape of modifying traditional legal codes. Family law, for instance, could be reshaped to allow for greater exercise of agency by women in marriage, guardianship, succession etc. Criminal law, too, could render inadmissible evidence obtained through unjustified privacy violations. The manifestos do mark the entry of a rights-based language around privacy and bodily integrity into mainstream political discourse. However, there appears to be a lack of imagination of the extent to which these protections can be used to further individual liberty collectively.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindustan-times-may-1-2019-aayush-rathi-and-ambika-tandon-how-privacy-fares-in-the-2019-election-manifestos'&gt;https://cis-india.org/internet-governance/blog/hindustan-times-may-1-2019-aayush-rathi-and-ambika-tandon-how-privacy-fares-in-the-2019-election-manifestos&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi and Ambika Tandon</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-05-02T01:49:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
