<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2766 to 2780.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy_privacyandsexworkers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/deccan-herald-january-29-2013-an-innovative-concept-comes-to-the-fore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/vipul-kharbanda-may-8-2019-an-analysis-of-rbi-draft-framework-on-regulatory-sandbox-for-fintech"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/an-analysis-of-the-cloud-act-and-implications-for-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/all-night-for-hackers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-chetana-divya-vasudev-october-4-2016-an-appening-world"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/firstfridayatcis-amutha-arunachalam-stand-shielded-of-digital-rights-may-05"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/business-standard-november-28-2012-nirmalya-behera-amnesty-international-calls-for-review-of-66a-of-it-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/amid-unrest-in-the-valley-students-see-a-dark-wall"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-november-28-2018-kul-bhushan-amazon-launches-machine-learning-based-platform-for-healthcare-space"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ananya-bhattacharya-quartz-india-april-19-2019-india-bans-tiktok-over-porn-but-not-facebook-twitter-instagram"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/times-of-india-june-1-2018-allow-admins-to-add-users-to-online-group-chats-only-after-permission-sflc-in"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/all-india-privacy-symposium"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy_privacyandsexworkers">
    <title> An Interview with Activist Shubha Chacko: Privacy and Sex Workers</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy_privacyandsexworkers</link>
    <description>
        &lt;b&gt;On February 20th I had the opportunity to speak with Shubha Chacko on privacy and sex workers. Ms. Chacko is an activist who  works for Aneka, an NGO based in Bangalore, which fights for the human rights of sexual minorities. In my interview with Ms. Chacko I tried to understand how privacy impacts the lives of sex workers in India. The below is an account of our conversation. &lt;/b&gt;
        
&lt;h3&gt;Introduction&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;In our research we have been exploring where and how privacy is found in different areas of Indian society, law, and culture. As part of our research we have been holding public conferences across the country to raise awareness and gather opinions around privacy. One area that was discussed in the public conference in Bangalore was the privacy of sex workers. Shubha Chacko, who is from&amp;nbsp; Aneka - an NGO located in Bangalore which fights for the human rights of sexual minorities, made a presentation that focused on the privacy challenges that sex workers in India face. In our interview Ms. Chacko pointed out many misconceptions that society holds about sex workers’ lives. She also detailed the challenges of stigma and discrimination that sex workers face, and described the precarious position that sex workers find themselves in as their work is constantly being pushed out of the public sphere by the law and society. I later interviewed Ms. Chacko to follow up on her presentation on privacy and sex workers. During the interview I had the opportunity to speak with both Ms. Chacko and a board member from the Karnataka Sex Workers Union. The following is meant to provide a perspective on how and in what ways society, law, media and tradition invades the privacy of sex workers. Though the piece is focused on the lives of sex workers, many of the issues raised are not limited to only sex workers, but characterize other marginalized communities as well.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;When I began the interview with Ms. Chacko I was hoping to do a piece that looked at the different elements of a sex worker’s life, and identified the points at which their privacy was invaded – such as in contacting a client, going to the doctors, etc. After I began my interview only, I realized how privacy impacts sex workers is much more complicated than a life cycle analysis. Among other things, privacy issues for sex workers prompt questions challenging social definitions of public and private, having the right to an identity and a recognized profession, and having the autonomy to control decisions about oneself.&lt;/p&gt;
&lt;h3&gt;Basic Facts and Background Information:&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;Karnataka has been found to have 85,000 sex workers, and India has an estimated 2 million female sex workers [1] &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Sex work is not against the law in India, but any commercialized aspect of the trade is prohibited – including running a brothel or soliciting a client. &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Sex work is a multi-faceted profession with many positive and negative complexities that are rarely known to the public.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Understanding the Challenge of the Public and the Private&lt;/h3&gt;
&lt;p&gt;My interview with Ms. Chacko began with my seeking an understanding of the challenges that traditional notions of the public sphere and the private sphere pose for sex workers. Ms. Chacko explained that to understand how privacy impacts the life of a sex worker, it is important to first understand that sex workers by profession confront and question traditional conceptions of the public and the private. Sex and everything associated with it is seen as something that is to be kept only in the private sphere. The work of sex workers brings sex into the public sphere, and thus the workers are seen as being public women not entitled to privacy, because they stand on street corners and conduct their work in the public. This notion that sex workers are public women without a right to privacy shows through in the way they are treated by the media, the police, NGOs,&amp;nbsp; and researchers. An example of this tension and society’s response can be seen in the recent elections. On April 6th, a Times of India news article reported that the election commission will be setting up “special booths” for sex workers to vote in because “while the sex workers had been waiting in queues to cast their votes, common people were not comfortable with that”[2]&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;What is the Challenge of the Public and the Private? &lt;/strong&gt;&lt;br /&gt;
&lt;p&gt;“It starts with a conception of issues around privacy vis-à-vis sex workers. The general perception is that sex workers are considered “public women”, because they are considered available to the public and because they sell sexual services on the streets (and are seen in contrast to the “good” woman who is confined to the private world of the home This then leads people to assume that then sex workers have are not entitled to privacy. Also sex workers are forced to reckon with issues of sex and sexuality, and if you talk about issues of sexuality - issues that are considered private are forced into the public domain, so sex workers by their presence force these issues into the public domain. So notions of privacy become complicated by this challenge of what is public and private, because the sex workers’ presence brings into the public domain what is private.”&lt;/p&gt;
&lt;br /&gt;&lt;strong&gt;How does this tension of the public and the private translate into privacy violations? &lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;
&lt;p&gt;"Due to the stigma around sex work all rights of sex workers are seriously compromised; with impunity. Thus, privacy is a threshold issue.&lt;/p&gt;
&lt;p&gt;The violation of privacy happens at various points, for example the way the media deals with them – publishing their photographs, outing them without their consent, talking about them without their consent. There are the police who are often engaged in so called “rescue and rehabilitation” work, but in the process of rescuing the sex workers, disregard the harmful impacts that compromising their right to privacy will do to them. The HIV prevention intervention programs that are in place now that target sex workers (along with other ‘high risk groups”) also erode their right to confidentiality. Besides intimate details of their lives being recorded, their address and other coordinates are noted.&amp;nbsp; This information along with other sensitive information including&amp;nbsp; their HIV status, is often accessible to a host of people and is a potential threat to their privacy and anonymity. Researchers and NGOs too often quiz sex workers about a range of intimate details about their lives with little sensitivity and expect them to be totally candid.&amp;nbsp; These interviews also raise questions that relate to privacy."&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Stigma, Discrimination, and Identity&lt;/h3&gt;
&lt;p&gt;Ms. Chacko also spoke about how the stigma and discrimination that sex workers face invades their privacy. Society views sex workers in one light – as immoral women. This stigma is attached to them permanently and is a source of violence and discrimination in the home, from the state, and from society. The sex workers’ right to anonymity and identity is also restricted because of the stigma attached to their work. Sex workers do not have the ability to control information about themselves, and they face challenges in obtaining official documents like a PAN card or a passport. This stigma and its consequences impedes sex workers from functioning comfortably in society and creates a difficult tension for sex workers to live with. Society denies the presence of sex workers, and police patrol parks and other public areas chasing away individuals whom they believe to be sex workers.&amp;nbsp; The increased passivisation of public spaces – parks, (for example) and the over gentrification of the neighborhoods squeeze them out&lt;/p&gt;
&lt;p&gt;In New York, one way that sex workers have overcome this constant and sometimes violent confrontation with society is through the use of mobile phones. Sex workers will contact clients only through mobile phones. This allows them to find their clients in private and anonymous ways, and it eliminates the need of a pimp or other type of ring leader. When I asked Ms. Chacko if sex workers are using this same technique in India, she recognized that they are, but said that it is not a yet widely practiced - especially among women in rural areas.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;How Restricting is the Stigma? &lt;/strong&gt;&lt;br /&gt;
&lt;p&gt;“Huge - hardly ever does a person’s entire identity get conflated with her with occupation or livelihood option; the way it does with sex workers. … I mean, for example, if you go to a movie - people would not say; oh, look, there is a researcher come to see a movie - people would call you by name, but if a sex worker goes to a movie they always say: oh, look, there is a sex worker. There is only one side to her identity according to society. And everyone wants to know the same thing - How did they get into sex work. There is an excessive interest in this aspect alone (and generally they are seeking simple answers)&amp;nbsp; - they never ask other questions about them as a person, only about them as a sex worker. Thus, real issues of violence and exploitation are never dealt with”.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;HIV Initiatives, Medical Counseling , and Privacy&lt;/h3&gt;
&lt;p&gt; Medical consultations, especially those related to HIV/AIDS, in many ways violate the privacy of sex workers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;HIV Initiatives&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;HIV initiatives run by the Government are often invasive and function off of privacy-violating techniques. The government runs many HIV initiatives where sex workers are employed to be “peer educators.” A peer educator’s job is to spread awareness about HIV, distribute condoms, and bring sex workers for HIV testing. The privacy and anonymity of peer educators is compromised in the job title itself. Everyone in the community knows that to be a peer educator, one must also be a sex worker. Thus, if a person is a peer educator or with a peer educator, she is immediately outed and identified as a sex worker. Furthermore, HIV testing is compulsory for sex workers, though on paper it looks as though it is a choice. Because there are quotas that must be filled, sex workers often go through HIV testing without full consent.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;How do Government HIV Initiatives Violate Privacy?&lt;/strong&gt; &lt;br /&gt;
&lt;p&gt;“The whole HIV intervention itself violates sex workers’ privacy. Both in the sense that people get jobs as peer educators and they have to carry condoms around and talk to other sex workers, and everyone thinks that if you are a peer educator then you are a sex worker, and there is no protection for these people even though it is sponsored by the state government.”&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;Line Listing &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The HIV programs and testing centers also violate the privacy of sex workers. The clinics have a system known as line listing, which is meant to ensure that there are no duplications in data. In order to ensure this they collect identifying information from sex workers including address and phone number. The information is not protected and is easily accessible to whoever wishes to see it.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Line Listing and Privacy &lt;/strong&gt;&lt;br /&gt;
&lt;p&gt;“HIV programs have a process called line listing, which is to ensure that there is no duplication. So they take all your facts from you, and from that a sex workers address and such go out, and it’s put out with no safeguards.”&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;HIV Counselors and Doctors&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;HIV counselors also violate the privacy of sex workers. Though a patient’s HIV status is only supposed to be known to the counselor at the testing clinic and the lab technician, it often becomes the case that HIV results are widely shared. As per protocol, doctors and counselors must follow up with sex workers every three months if a sex worker is HIV negative. This is to ensure that they are still HIV negative, and to provide them treatment at the soonest if they do contract the disease. To carry out this follow-up work, counselors keep a list of patients whom they have seen. This list is supposed to be confidential, but other personnel in the hospital are assigned to do the follow-up phone calls, and thus the list is in fact easily accessible. If a person’s name disappears from the list, it is obvious that the person is now HIV positive, and that person’s privacy is violated and her status known.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;How does HIV Counseling compromise Privacy? &lt;/strong&gt;&lt;br /&gt;
&lt;p&gt;“…only the counselor and the lab technician is supposed to know about it, but it turns out a whole number of people know about it, because of follow up. The counselor is supposed to follow up on the list with people every three months for further testing, but if you are positive then you do not need to follow up. Plus, these results are shared with everyone. Because of the stigma attached to HIV there is a need for privacy to be protected, so confidentiality is routinely violated.”&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Media and Research&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Media &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Media was another area of contention that Ms.Chacko pointed out. Though the media plays an important role as being a channel for the voice of sex workers, it can also be intrusive on the sex worker by publishing stories without their consent, or reporting in ways that can be misconstrued. Through their coverage, the media can also deepen the stigma against sex workers and place them under an unwanted social spotlight. For example, a news article in The Hindu spoke about the World Cup bringing an “off day” for sex workers.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;“With hoards of supporters glued to their television screens for the World Cup cricket final between India and Sri Lanka on Saturday, sex workers are anticipating a slow day, but they are not disappointed. It is a rare weekend for them with their children. The prospects of fewer clients coming in only buoyed the enthusiasm of the women in Sonagachi, the largest red-light area in the city…”[3]&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;The media is also often a part of raids by cover stories of brothels being uncovered, and in doing so expose the lives of sex workers, often printing sensitive information, including addresses, while portraying the sex workers as victims. The media, along with NGOs and the police will conduct raids that severely violate the privacy of sex workers. For example, in an Express India article a raid was described that took place in Pune with NGOs and the police in which sex workers were dragged out, beaten, and molested by the police against their will [4].&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;How does the media violate the privacy of sex workers? &lt;/strong&gt;&lt;br /&gt;
&lt;p&gt;“The media conducts raids, and so do NGOs in an attempt to rescue them. Once they are rescued and taken back with police escorts to their village, the whole village knows that she was in sex work, and then her privacy is violated because she was publicly returned. My problem is not about them being rescued, but they need to have consent from the person. If a person wants to do sex work – this decision needs to be respected. The media is difficult because you don’t want to ask for a ban, so we don’t ask for banning, but we do put pressure on the media to be more responsible in their reporting.”&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;Research/Films &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ms. Chacko also spoke about how research often violates the privacy of sex workers, in ways that range from the words that are used to describe sex workers to the one-sided victim story that is too often used to describe the lives of sex workers, to the methods researchers use to find their facts. Thus, perhaps without meaning to, research can de-legitimatize the work that sex workers do, and can work to increase the amount of violence or abuse that they are exposed to.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Research and Privacy &lt;/strong&gt;&lt;br /&gt;
&lt;p&gt;“Researchers who are writing a report on sex workers - land up in some village and end up violating their privacy as everyone in the village wants to know why the researchers came. The researchers also ask invasive questions. They want to know details about the sex workers’ lives: what kind of sex they have and with whom? What do they experience with their clients? What is their relationship with their partners? What is the status of their relationship.? They do not have a sense of whether the workers will want to talk about their lives or not…Some people make films and some make them in extremely exploitative ways. Films are also often incorrect and invasive of privacy in that way as well.”&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;The Role of a Privacy Legislation&lt;/h3&gt;
&lt;p&gt;In our research, we are looking at how a privacy legislation could help remedy the challenges to privacy that different people face in society; or ,if a privacy legislation cannot offer a solution, if there are other ways in which a legislation or society can offer solutions. When I asked Ms. Chacko if a privacy legislation or the right to privacy could improve the lives of sex workers, she was not certain if a privacy legislation would make a difference directly, and thought it might in fact overlook sex workers because currently they are seen in society as immoral women that are not to be afforded the right to privacy. In fact, it is the law and enforcers of the law itself that is invading their privacy. For example, in a study done by the World Health Organization it was found that in India 70 per cent of sex workers in a survey reported being beaten by the police, and more than 80 per cent had been arrested without evidence [5]. Thus, before a right to privacy can apply to sex workers, sex work itself must be decriminalized and recognized as a legitimate profession worthy of labor rights and other rights. Furthermore the debate around sex work needs to move away from the traditional dialogue of who is having sex and who is not to one that looks at what rights should be protected for every person. At that point perhaps a law which protects dignity and regulates the use of information could be useful. On another note, the UID (the Unique Identification Project) could be a potential benefit for sex workers as it would serve as identity that would give only a yes or no response at the time of a transaction.&amp;nbsp;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Could a Privacy Legislation help? &lt;/strong&gt;&lt;br /&gt;
&lt;p&gt;“Some of the privacy is violated by the raids that happen by the police. So those raids are problematic. What kind of laws would help? One would be to decriminalize sex work itself and also work with society to gain understanding and perspective. Because now people think: they are immoral women ,so what privacy do they deserve? The sexual debate should not be about who is having sex and who is not, but about who has the power…”&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;The Current Law&lt;/h3&gt;
&lt;p&gt;In India, the Immoral Trafficking prevention Act ( ITPA) is the law that governs sex work. The ITPA does not make prostitution illegal, but instead tries to target the commercialized aspects of the trade such as brothel keeping, pimping, and soliciting. Though the law does not attack the sex workers as individuals, and its stated purpose is to prevent the trafficking of sex workers, the law has become a tool of harassment and abuse by law enforcement agencies. Sections 5A, 5B, 5C, which pertain to trafficking are the most troublesome, because the clauses do not distinguish between trafficking and sex work, but instead defines them as the same[6]. Thus, the new definitions of prostitution and trafficking leave room for reading all sex work as within the meaning of trafficking, and thus criminalizing sex work by defacto.[7] In addition, under the new Section 5C, clients visiting or found in a brothel will face imprisonment and/or fines [8]. Penalization of clients is a significant modification to the the ITPA, which formally targeted 'third parties' profiting from prostitution and not sex workers or clients themselves [9]. Sex workers have fought for a long time to overturn the ITPA. In June 2008, sex workers went on a hunger strike in the hopes of forcing the bill to be discarded [10]. In 2010 sex workers demonstrated against the amendment of the ITPA that would hold the clients of sex workers liable. Despite their protests and demands for their occupation to be treated equally, the Indian courts are slow to move forward and recognize sex work as a dignified profession. “A woman is compelled to indulge in prostitution not for pleasure but because of abject poverty,” the court said last month. “If such woman is granted opportunity to avail some technical or vocational training, she would be able to earn her livelihood by such vocational training and skill instead of selling her body.” The court has also promised to initiate a program in May for vocational training of sex workers [11]. Unfortunately, vocational training fails to address the actual issues and violations that sex workers face – a fact that was demonstrated by one sex worker’s saying: “If we can’t solicit clients without getting arrested, we will naturally rely on pimps to carry on our trade…What we need are practical measures that free us from exploitation created by the law itself.”&lt;/p&gt;
&lt;h3&gt;Solutions&lt;/h3&gt;
&lt;p&gt;One of the most impactful source of aid for sex workers currently is the sex workers union. I had the opportunity to speak with a member from the board of the Karnataka Sex Workers &lt;br /&gt;union. She spoke about the challenges that sex workers face and how the Union provides assistance to the sex workers. The union helps them obtain benefits, helps with enrolling their children in schools, and answers questions that they would not be able to seek legal or other assistance on. The union is a confidential and safe space for sex workers to function in society. The person interviewed feels as though the information about herself that should be kept confidential is: her medical information, her clients, where she meets her clients, and information about her family. Ms. Chacko also spoke about the positives that an identity scheme like the UID could have on sex workers, because the transactions would be done through a yes/ no response, and no one will be denied a UID number. Most importantly, Ms. Chacko stressed that it is important to recognize sex work as a legitimate profession,and focus on the actual problems, rather than limiting the debate to stigmas around sex. The interview with Ms. Chacko demonstrated that protection of sex workers’ and sexual minorities’ privacy cannot be addressed simply by a law, but must be embodied by an ethos and a culture before that law is meaningful.&lt;/p&gt;
&lt;h3&gt;Bibliography&amp;nbsp;&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.dnaindia.com/bangalore/report_karnataka-sex-workers-want-right-to-work_1517602"&gt;http://www.dnaindia.com/bangalore/report_karnataka-sex-workers-want-right-to-work_1517602&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://timesofindia.indiatimes.com/home/specials/assembly-elections-2011/west-bengal/Special-booth-for-sex-workers/articleshow/7880039.cms"&gt;http://timesofindia.indiatimes.com/home/specials/assembly-elections-2011/west-bengal/Special-booth-for-sex-workers/articleshow/7880039.cms&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.thehindu.com/news/article1594609.ece"&gt;http://www.thehindu.com/news/article1594609.ece&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.expressindia.com/latest-news/sex-workers-allege-excesses-in-police-raid-to-submit-evidence-to-commissioner/739326/"&gt;http://www.expressindia.com/latest-news/sex-workers-allege-excesses-in-police-raid-to-submit-evidence-to-commissioner/739326/&amp;nbsp;&amp;nbsp;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.who.int/gender/documents/sexworkers.pdfhttp://ncpcr.gov.in/Acts/Immoral_Traffic_Prevention_Act_%28ITPA%29_1956.pdf"&gt;http://www.who.int/gender/documents/sexworkers.pdfhttp://ncpcr.gov.in/Acts/Immoral_Traffic_Prevention_Act_%28ITPA%29_1956.pdf&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.who.int/gender/documents/sexworkers.pdfhttp://ncpcr.gov.in/Acts/Immoral_Traffic_Prevention_Act_%28ITPA%29_1956.pdf"&gt;http://ncpcr.gov.i /Acts/Immoral_Traffic_Prevention_Act_%28ITPA%29_1956.pdf&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cflr.org/ITPA%20Amendment%20bill.htm"&gt;http://cflr.org/ITPA%20Amendment%20bill.htm&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.prsindia.org/uploads/media/1167469313/1167469313_immoral_traffic_prevention_amendment_bill2006.pdf"&gt;http://www.prsindia.org/uploads/media/1167469313/1167469313_immoral_traffic_prevention_amendment_bill2006.pdf&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://theindiapost.com/2008/07/21/itpa-amendment-has-a-provision-of-jail-term-and-penalties-for-the-clients-of-prostitutes-who-were-so-far-kept-out-of-the-ambit-of-prosecution/"&gt;http://theindiapost.com/2008/07/21/itpa-amendment-has-a-provision-of-jail-term-and-penalties-for-the-clients-of-prostitutes-who-were-so-far-kept-out-of-the-ambit-of-prosecution/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.expressindia.com/latest-news/Sex-workers-to-go-on-hungerstrike-over-ITPA/330250/"&gt;http://www.expressindia.com/latest-news/Sex-workers-to-go-on-hungerstrike-over-ITPA/330250/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.trust.org/trustlaw/blogs/the-word-on-women/rehabilitation-cuts-no-ice-with-indias-sex-workers"&gt;http://www.trust.org/trustlaw/blogs/the-word-on-women/rehabilitation-cuts-no-ice-with-indias-sex-workers&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy_privacyandsexworkers'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy_privacyandsexworkers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-28T06:26:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/deccan-herald-january-29-2013-an-innovative-concept-comes-to-the-fore">
    <title>An innovative concept comes to the fore</title>
    <link>https://cis-india.org/news/deccan-herald-january-29-2013-an-innovative-concept-comes-to-the-fore</link>
    <description>
        &lt;b&gt;There’s very little awareness about Bitcoin — a new digital currency and payment system, designed for the voting process of ‘Bitfilm 13’  — in the City. Aaron Koenig, the managing director at Bitfilm Networks Hamburg, addressed this issue recently, during a talk held at The Centre for Internet and Society. The talk was based on the creation of Bitcoin and its various uses.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.deccanherald.com/content/308243/an-innovative-concept-comes-fore.html"&gt;published in the Deccan Herald&lt;/a&gt; on January 29, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"The potential of Bitcoin is huge. It’s easy to use and currently, there are about 21 million (units of) Bitcoin in the world and everyone accepts it. It works differently, but it is the same as gold and has an intrinsic value," explains Aaron.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aaron also showed cryptographic diagrams of how a Bitcoin transaction works. "It is a clever way of encryption and it is easy to open an account. You just need to download some software and then, you get a virtual wallet and a user ID and password. The identity of the person is kept anonymous and hence, there have been instances of people misusing Bitcoin," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An animated short film about Bitcoin, which Aaron produced along with an animation team based in Bangalore, was also screened during the talk. "I have paid all the animators in Bitcoin. Initially, they were hesitant and did not want to accept it. But when they got to know about how its value almost doubles itself in the span of a year, they readily accepted it," he explains.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There is a German restaurant where Bitcoin is accepted. Slowly, more such places are coming up, as people are realising its worth. It is easy to transfer," he adds. There was an interactive session with the audience after the talk, which was equally interesting. Many wanted to know if Bitcoin can be liquidated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I am very curious to know if Bitcoin can be liquidated. Also, what is the exact process that one should follow when they want to liquidate Bitcoin?" questions Geane, who was attending the session. These queries, as well as many others, were addressed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vinod, who also attended the session, says that it was a new concept and interesting for those who wanted to know more. "The concept of a new form of money sounds great and Aaron really helped us get to know more about it. For people like us, who had no clue about Bitcoin, it was an enlightening session," he informs.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/deccan-herald-january-29-2013-an-innovative-concept-comes-to-the-fore'&gt;https://cis-india.org/news/deccan-herald-january-29-2013-an-innovative-concept-comes-to-the-fore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-30T06:04:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/vipul-kharbanda-may-8-2019-an-analysis-of-rbi-draft-framework-on-regulatory-sandbox-for-fintech">
    <title>An Analysis of the RBI’s Draft Framework on Regulatory Sandbox for Fintech</title>
    <link>https://cis-india.org/internet-governance/blog/vipul-kharbanda-may-8-2019-an-analysis-of-rbi-draft-framework-on-regulatory-sandbox-for-fintech</link>
    <description>
        &lt;b&gt;The term Fintech is generally used to describe innovative technology and technological processes being used in the financial services sector.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/analysis-of-the-rbi2019s-draft-framework-on-regulatory-sandbox-for-fintech"&gt;&lt;b&gt;Click here&lt;/b&gt;&lt;/a&gt; to download the file.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;It originated as a term referring to the back-end technology used by large financial institutions, but has expanded to include technological innovation in the financial sector, including innovations in financial literacy and education, retail banking, investments, etc.&lt;/span&gt;&lt;a name="_ftnref1"&gt;&lt;/a&gt;&lt;span&gt; Entities engaged in FinTech offer an array of services ranging from peer-to-peer lending platforms and mobile payment solutions to online portfolio management tools and international money transfers.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regulation and supervision of the Fintech industry raises some unique challenges for regulatory authorities as they have to strike a balance between financial inclusion, stability, integrity, consumer protection, and competition.&lt;a name="_ftnref2"&gt;&lt;/a&gt; One of the methods that have been adopted by regulators in certain jurisdictions to tackle the complexities of this sector is to establish a “regulatory sandbox” which could nurture innovative fintech enterprises while at the same time ensuring that the risk associated with any regulatory relaxations is contained within specified boundaries. It was precisely for this reason that establishment of a regulatory sandbox was one of the options put forward by the Working Group on Fintech and Digital Banking established by the Reserve Bank of India in its report of November, 2017 which was released for public comments on February 8, 2018. Acting on this recommendation the Reserve Bank has proposed a Draft Enabling Framework for Regulatory Sandbox, dated April 18, 2019, (“&lt;strong&gt;RBI Framework&lt;/strong&gt;”) which is analysed and discussed below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Regulatory Sandbox and its benefits&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the basic concept of a regulatory sandbox is to ensure that there is regulatory encouragement and incentive for fledgling Fintech enterprises in a contained environment to mitigate risks, different regulatory authorities have adopted varied methods of achieving this objective. While the Australian Securities and Exchange Commission (ASIC) uses a method where the eligible enterprises notify the ASIC and commence testing without an individual application process, the Financial Conduct Authority, UK (FCA) uses a cohort approach wherein eligible enterprises have to apply to the FCA which then selects the best options based on criteria laid down in the policy.&lt;a name="_ftnref3"&gt;&lt;/a&gt; The RBI has, not surprisingly, adopted an approach similar to the FCA wherein applicants will be selected by the RBI based on pre-defined eligibility criterion and start the regulatory sandbox in cohorts containing a few entities at a time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A regulatory sandbox offers the users the opportunity to test the product’s viability without a larger and more expensive roll out involving heavy investment and regulatory authorizations. If the product appears to have the potential to be successful, it might then be authorized and brought to the broader market more quickly.&lt;a name="_ftnref4"&gt;&lt;/a&gt; If there are any problems with the product the limited nature of the sandbox ensures that the consequences of the problems are contained and do not affect the broader market. It also allows regulators to obtain first-hand empirical evidence on the benefits and risks of emerging technologies and business models, and their implications, which allows them to take a considered (and perhaps more nuanced) view on the regulatory requirements that may be needed to support useful innovation, while mitigating the attendant risks. A regulatory sandbox initiative also sends a clear signal to the market that innovation is on the agenda of the regulator.&lt;a name="_ftnref5"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;RBI Draft Framework&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the RBI has adopted a cohort approach for its regulatory sandbox process (“&lt;strong&gt;RS&lt;/strong&gt;”), it implies that fintech entities will have to apply to the RBI to be selected in the RS. The eligibility criterion provides that the applicants will have to meet the eligibility conditions prescribed by the government for start-ups as per the Government of India, Department of Industrial Policy and Promotion, Notification GSR 364(E) April 11, 2018.&lt;a name="_ftnref6"&gt;&lt;/a&gt; The RS will focus on areas where (i) there is an absence of regulations, (ii) regulations need to be eased to encourage innovation, and (iii) the innovation/product shows promise of easing/effecting delivery of financial services in a significant way.&lt;a name="_ftnref7"&gt;&lt;/a&gt; The Framework also provides an indicative list of innovative products and technologies which could be considered for RS testing,&lt;a name="_ftnref8"&gt;&lt;/a&gt; and at the same time prohibits certain products and technologies from being considered for this programme such as credit registry, crypto currencies, ICOs, etc.&lt;a name="_ftnref9"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The RBI Framework also lays down specific conditions that the entity has to satisfy in order to be considered for the RS such as satisfaction of the conditions to be considered a start-up, minimum net worth requirements, fit and proper criteria for Directors and Promoters, satisfactory conduct of bank accounts of promoters/directors, satisfactory credit score, technological readiness of the product for deployment in the broader market, ensuring compliance with existing laws and regulations on consumer data and privacy, adequate safeguards in its IT systems for protection against unauthorised access etc. and a robust IT infrastructure and managerial resources. The fit and proper criteria for Directors and Promoters which requires elements of credit history along with the minimum net worth requirements in the RBI Framework are conditions which may be too difficult for some of the smaller and newer start-ups to satisfy even though the technology and products they offer might be sound. The applicants are also required to: (i) highlight an existing gap in the financial ecosystem and how they intend to address that, (ii) show a regulatory barrier or gap that prevents the implementation of the solution on a large scale, (iii) clearly define the test scenarios, expected outcomes, boundary conditions, exit or transition strategy, assessment and mitigation of risks, etc.&lt;a name="_ftnref10"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The RBI Framework specifies that the focus of the RS should be narrow in terms of areas of innovation and limited in terms of intake.&lt;a name="_ftnref11"&gt;&lt;/a&gt; While limits on the number of entities per cohort may be justified based on paucity of resources, limiting the focus of the RS by narrow areas of innovation is a lost opportunity in terms of sharing of ideas and learning from the mistakes of their colleagues who may be employing technologies and principles which could be useful in fields other than those where they are currently being applied.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The RBI Framework specifies that the boundaries of the RS have to be well defined so that any consequences of failure can be contained. These boundary conditions include a specific start and end date, target customer type and limits on number of customers, cash holdings, transaction amounts and customer losses.&lt;a name="_ftnref12"&gt;&lt;/a&gt; The Framework does not put in place any hard numbers on the boundary conditions which ensures that the RS process can be customised to the needs of specific entities since the sample sizes and data needed to determine the viability of fintech entities and products may vary from product to product. However a major dampener is the hard limit of 12 weeks imposed on the testing phase of the RS, which is the most important phase since all the data from the operations is generated during this phase and 12 weeks may not be enough time to generate enough reliable data so as to reach a determination of the viability of the product.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the RBI has shown a willingness to relax regulatory requirements for RS participants on a case to case basis, it has specified that there shall be no relaxation on issues of customer privacy and data protection, security of payment data, transaction security, KYC requirements and statutory restrictions.&lt;a name="_ftnref13"&gt;&lt;/a&gt; Since this is only an initiative by the RBI the RS participants dealing with the insurance or securities sector would not be entitled to any relaxations from the IRDA or the SEBI even if they are found eligible for relaxations from RBI regulations. This would severely limit the efficacy of the RS process and is an issue that could have been addressed if all three regulators had collaborated thereby encouraging innovative start-ups offering a broader spectrum of services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once the RS is finished, the regulatory relaxations provided by the RBI will expire and the fintech entity will have to either stop operations or comply with the relevant regulations. In case the entity requires an extension of the RS period, it would apply to the RBI atleast one month prior to the expiry of the RS period with reasons for the extension. The RBI also has the option of prematurely terminating the sandbox process in case the entity does not achieve its intended purpose or if it cannot comply with the regulatory requirements and other conditions specified at the relevant stage of the sandbox process. The fintech entity is also entitled to quit the RS process prematurely by giving one week’s notice to the RBI, provided it ensures that all its existing obligations to its customers are fully addressed before such discontinuance.&lt;a name="_ftnref14"&gt;&lt;/a&gt; Infact customer obligations have to be met by the fintech entities irrespective of whether the operations are prematurely ended by the entity or it continues through the entire RS process; no waiver of the legal liability towards consumers is provided by the RS process. In addition, customers are required to be notified upfront about the potential risks and their explicit consent is to be taken in this regard.&lt;a name="_ftnref15"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The RBI Framework itself lists out some of the risks associated with the regulatory sandbox model such as (i) loss of flexibility in going through the RS process, (ii) case by case determinations involve time and discretional judgements, (iii) no legal waivers, (iv) requirement of regulatory approvals after the RS process is over, (iv) legal issues such as consumer complaints, challenges from rejected candidates, etc. While acknowledging the above risks the Framework also mentions that atleast some of them may be mitigated by following a time bound and transparent process thus reducing risks of arbitrary discretion and loss of flexibility.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Conclusions&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While there are some who are sceptical of the entire concept of a regulatory sandbox for the reason that it loosens regulation too much while at the same time putting customers at risk,&lt;a name="_ftnref16"&gt;&lt;/a&gt; the cohort model adopted by the RBI would reduce that risk to an extent since it ensures comprehensive screening and supervision by the RBI with clear exit strategies and an emphasis on consumer interests. On the other hand the eligibility criterion for applicants prescribes minimum net worth requirements as well as credit history, etc. which may impose conditions too onerous for some start ups which may be their infancy. Further the clear emphasis on protection of customer privacy and consumer interests also ensures that the RBI will not put the interests of ordinary citizens at risk in order to promote new and untested technologies. That said, the regulatory sandbox process is a welcome initiative by the RBI which may send a signal to the financial community that it is aware of the potential advantages as well as risks of Fintech and is willing to play a proactive role in encouraging new technologies to improve the financial sector in India.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn1"&gt;&lt;/a&gt; Report of Working Group on Fintech and Digital Banking, Reserve Bank of India, November, 2017, available at &lt;a href="https://www.rbi.org.in/Scripts/PublicationReportDetails.aspx?UrlPage=&amp;amp;ID=892"&gt;https://www.rbi.org.in/Scripts/PublicationReportDetails.aspx?UrlPage=&amp;amp;ID=892&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn2"&gt;&lt;/a&gt; Jenik, Ivo, and Kate Lauer. 2017. “Regulatory Sandboxes and Financial Inclusion.” Working Paper. Washington, D.C.: CGAP, available at &lt;a href="https://www.cgap.org/sites/default/files/Working-Paper-Regulatory-Sandboxes-Oct-2017.pdf"&gt;https://www.cgap.org/sites/default/files/Working-Paper-Regulatory-Sandboxes-Oct-2017.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn3"&gt;&lt;/a&gt; Other countries which have regulatory sandboxes are Netherlands, Bahrain, Abu Dhabi, Saudi Arabia, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn4"&gt;&lt;/a&gt; Report of Working Group on Fintech and Digital Banking, Reserve Bank of India, November, 2017, available at &lt;a href="https://www.rbi.org.in/Scripts/PublicationReportDetails.aspx?UrlPage=&amp;amp;ID=892"&gt;https://www.rbi.org.in/Scripts/PublicationReportDetails.aspx?UrlPage=&amp;amp;ID=892&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn5"&gt;&lt;/a&gt; Jenik, Ivo, and Kate Lauer. 2017. “Regulatory Sandboxes and Financial Inclusion.” Working Paper. Washington, D.C.: CGAP, available at &lt;a href="https://www.cgap.org/sites/default/files/Working-Paper-Regulatory-Sandboxes-Oct-2017.pdf"&gt;https://www.cgap.org/sites/default/files/Working-Paper-Regulatory-Sandboxes-Oct-2017.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn6"&gt;&lt;/a&gt; These conditions are fairly liberal in that they require that the entity should be less than 7 years old; should not have a turnover of more than 25 crores, and should be working for innovation, development or improvement of products or processes or services, or if it is a scalable business model with a high potential of employment generation or wealth creation&lt;em&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn7"&gt;&lt;/a&gt; Clause 5 of the RBI Framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn8"&gt;&lt;/a&gt; Clause 6.1 of the RBI Framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn9"&gt;&lt;/a&gt; Clause 6.3 of the RBI Framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn10"&gt;&lt;/a&gt; Clause 6.5 of the RBI Framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn11"&gt;&lt;/a&gt; Clause 6.4 of the RBI Framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn12"&gt;&lt;/a&gt; Clause 6.7 of the RBI Framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn13"&gt;&lt;/a&gt; Clauses 6.2 and 8 of the RBI Framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn14"&gt;&lt;/a&gt; Clause 6.6 of the RBI Framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn15"&gt;&lt;/a&gt; Clause 6.9 of the RBI Framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn16"&gt;&lt;/a&gt; Jemima Kelly, A “fintech sandbox” might sound like a harmless idea. It's not, Financial Times, Aplphaville, &lt;a href="https://ftalphaville.ft.com/2018/12/05/1543986004000/A--fintech-sandbox--might-sound-like-a-harmless-idea--It-s-not/"&gt;https://ftalphaville.ft.com/2018/12/05/1543986004000/A--fintech-sandbox--might-sound-like-a-harmless-idea--It-s-not/&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/vipul-kharbanda-may-8-2019-an-analysis-of-rbi-draft-framework-on-regulatory-sandbox-for-fintech'&gt;https://cis-india.org/internet-governance/blog/vipul-kharbanda-may-8-2019-an-analysis-of-rbi-draft-framework-on-regulatory-sandbox-for-fintech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-05-08T13:57:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/an-analysis-of-the-cloud-act-and-implications-for-india">
    <title>An Analysis of the CLOUD Act and Implications for India </title>
    <link>https://cis-india.org/internet-governance/blog/an-analysis-of-the-cloud-act-and-implications-for-india</link>
    <description>
        &lt;b&gt;India houses the second largest population in the world at approximately 1.35 billion individuals. In such a diverse and dense context, law enforcement could be a challenging job.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Networked technologies have changed the nature of crime and will continue to do so.&lt;/span&gt;&lt;span&gt; Access to data generated by digital technologies and on digital platforms is important in solving online and offline crimes. Yet, a significant amount of such data is stored predominantly under the control of companies in the United States. Thus, for Indian law enforcement to access metadata (location data or subscriber information), they can send a request directly to the company. However for access to content data, law enforcement must follow the MLAT process as a result of requirements under the Electronic Communications Privacy Act (ECPA).  ECPA allows service providers to share metadata on request of foreign governments, but requires a judicially issued warrant based on a finding of ‘probable cause’ for a service provider to share content data.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The challenges associated with accessing data across borders has been an area of concern for India for many years. From data localization requirements&lt;/span&gt;&lt;span&gt;, legal decryption mandates&lt;/span&gt;&lt;span&gt;, proposed back doors&lt;/span&gt;&lt;span&gt;- law enforcement and the government have consistently been trying to find efficient ways to access data across borders.  &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Towards finding solutions to the challenges in the MLAT process, Peter Swire and Deven Desai in the article “A Qualified SPOC Approach for India and Mutual Legal Assistance” have noted the importance of finding a solution to the hurdles in the India - US MLAT and have suggested that reforms for the MLAT process in India should not start with law enforcement, and have instead proposed the establishment of a Single Point of Contact designated to handle and process government to government requests with requests emerging from that office receiving special legal treatment.&lt;/span&gt;&lt;span&gt; &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Frustrations with cross border sharing of data are not unique to India and the framework has been recognized by many stakeholders for being outdated, slow, and inefficient - giving rise to calls from governments, law enforcement, and companies for solutions.&lt;/span&gt;&lt;span&gt; As a note, some research has also highlighted that the identified issues with the MLAT system are broad and more evidence is needed to support each concern and inform policy response.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Towards this, the US and EU have undertaken clear policy steps to address the tensions in the MLAT system by enabling direct access by governments to content data. On April 17 2018, the European Union published the E-Evidence Directive and a Regulation that allows for a law enforcement agency to obtain electronic evidence from service providers within 10 days of receiving a request or 6 hours for emergency requests and request the preservation or production of data. Production orders for content and transactional records can be issued only for certain serious crimes and must be issued by a judge.  No judicial authorisation is required for production orders for subscriber information and access data, and it can be sought to investigate any criminal offense, not just serious offenses. Preservation orders can be issued without judicial authorisation for all four types of data and for the investigation of any crime.&lt;/span&gt;&lt;span&gt; Further, requests originating from the European Union must be handled by a designated legal representative.&lt;/span&gt;&lt;span&gt; Preservation orders can be issued for all four types of data.&lt;/span&gt;&lt;span&gt; Further, requests originating from the European Union must be handled by a designated legal representative.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;On the US side, in 2016, the Department of Justice (DoJ) put out draft legislation that would create a framework allowing the US to enter into executive agreements with countries that have been evaluated as meeting criteria defined in the law.&lt;/span&gt;&lt;span&gt; Our response to the DoJ draft Bill can be found here.&lt;/span&gt;&lt;span&gt; In February 2018, the Microsoft Ireland Case was presented before the U.S Supreme Court. The question central to the case was whether or not a US warrant issued against a company incorporated in the US was valid if the data was stored in servers outside of the US. On March 23, 2018, the United States government enacted the “Clarifying Lawful Overseas Use of Data Act” also known as the CLOUD Act. The passing of the Act solves the dilemma found in the Microsoft Ireland case.&lt;/span&gt;&lt;span&gt; The CLOUD Act amends Title 18 of the United States Code and allows U.S. law enforcement agencies to access data stored abroad by increasing the reach of the U.S. Stored Communication Act&lt;/span&gt;&lt;span&gt;, enabling access without requiring the specific cooperation of foreign governments. Under this law, U.S. law enforcement agencies can seek or issue orders that compel companies to provide data regardless of where the data is located as long as the data is under their “possession, custody or control”. It further allows US communication service providers to intercept or provide the content of communications in response to orders from foreign governments if the foreign government has entered into an executive agreement with the US upon approval by the Attorney General and concurrence with the Secretary of State. The Act also absolves companies from criminal and civil liability when disclosing information in good faith pursuant to an executive agreement between the US and a foreign country. Such access would be reciprocal, with the US government having similar access rights to data stored in the foreign country.   &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Though the E-Evidence Directive is a significant development, in this article - we focus on the CLOUD Act and its implications for cross border sharing of data between India and the US. &lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;To read more &lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/analysis-of-cloud-act-and-implications-for-india"&gt;download the PDF&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/an-analysis-of-the-cloud-act-and-implications-for-india'&gt;https://cis-india.org/internet-governance/blog/an-analysis-of-the-cloud-act-and-implications-for-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok and Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cloud Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-08-22T14:55:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra">
    <title>An Analysis of the Cases Filed under Section 46 of the Information Technology Act, 2000  for Adjudication in the State of Maharashtra</title>
    <link>https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra</link>
    <description>
        &lt;b&gt;This is a brief review of some of the cases related to privacy filed under section 46 of the Information Technology Act, 2000 ("the Act") seeking adjudication for alleged contraventions of the Act in the State of Maharashtra. &lt;/b&gt;
        &lt;h3&gt;Background&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 46 of the Act grants the Central Government the power to appoint an adjudicating officer to hold an enquiry to adjudge, upon complaints being filed before that adjudicating officer, contraventions of the Act. The adjudicating officer may be of the Central Government or of the State Government [see section 46(1) of the Act], must have field experience with information technology and law [see section 46(3) of the Act] and exercises jurisdiction over claims for damages up to `5,00,00,000 [see section 46(1A) of the Act]. For the purpose of adjudication, the officer is vested with certain powers of a civil court [see section 46(5) of the Act] and must follow basic principles of natural justice while conducting adjudications [see section 46(2) of the Act]. Hence, the adjudicating officer appointed under section 46 is a quasi-judicial authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, the quasi-judicial adjudicating officer may impose penalties, thereby vesting him with some of the powers of a criminal court [see section 46(2) of the Act], and award compensation, the quantum of which is to be determined after taking into account factors including unfair advantage, loss and repeat offences [see section 47 of the Act]. The adjudicating officer may impose penalties for any of the offences described in section 43, section 44 and section 45 of the Act; and, further, may award compensation for losses suffered as a result of contraventions of section 43 and section 43A. The text of these sections is reproduced in the Schedule below. Further law as to the appointment of the adjudicating officer and the procedure attendant on all adjudications was made by Information Technology (Qualification and Experience of Adjudicating Officers and the Manner of Holding Enquiry) Rules, 2003.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear that the adjudicating officer is vested with significant judicial powers, including the power to enforce certain criminal penalties, and is an important quasi-judicial authority.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Excursus&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;At the outset, it is important to understand the distinction between compensation and damages. Compensation is a sum of money awarded by a civil court, before or along with the primary decree, to indemnify a person for injury or loss. It is usually awarded to a person who has a suffered a monetary loss as a result of the acts or omissions of another party. Its quantification is usually guided by principles of equity. [See &lt;i&gt;Shantilal Mangaldas&lt;/i&gt; AIR 1969 SC 634 and &lt;i&gt;Ranbir Kumar Arora&lt;/i&gt; AIR 1983 P&amp;amp;H 431]. On the hand, damages are punitive and, in addition to restoring an indemnitee to wholeness, may be imposed to deter an offender, punish exemplary offences, and recover consequential losses, amongst other objectives. Damages that are punitive, while not judicially popular in India, are usually imposed by a criminal court in common law jurisdictions. They are distinct from civil and equitable actions. [See the seminal case of &lt;i&gt;The Owners of the Steamship Mediana&lt;/i&gt; [1900] AC 113 (HL)].&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, section 46 of the Act uses the terms “damage”, “injury” and “compensation” interchangeably without regard for the long and rich jurisprudence that finds them to be different concepts.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Cases related to Privacy&lt;/h3&gt;
&lt;p&gt;In the State of Maharashtra, there have been a total of 47 cases filed under section 46 of the Act. Of these, 33 cases have been disposed of by the Adjudicating Officer and 14 are currently pending disposal. &lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; At least three of these cases before the Adjudicating Officer deal with issues related to privacy of communications and personal data. They are:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Case Title&lt;/th&gt;&lt;th&gt;Forum&lt;/th&gt;&lt;th&gt;Date&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Vinod Kaushik&lt;/i&gt; v. &lt;i&gt;Madhvika Joshi&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Shri Rajesh Aggarwal&lt;br /&gt;Adjudicating Officer, &lt;i&gt;ex-officio Secretary&lt;/i&gt;, IT&lt;br /&gt;Government of Maharashtra&lt;/td&gt;
&lt;td&gt;10.10.2011&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;Amit D. Patwardhan&lt;/i&gt; v. &lt;i&gt;Rud India Chains&lt;/i&gt;&lt;/td&gt;
&lt;td&gt;Shri Rajesh Aggarwal&lt;br /&gt;Adjudicating Officer, &lt;i&gt;ex-officio&lt;/i&gt;&lt;br /&gt;Secretary, IT&lt;br /&gt;Government of Maharashtra&lt;/td&gt;
&lt;td&gt;15.04.2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; v. &lt;i&gt;Minal Bagherwal&lt;/i&gt;&lt;/td&gt;
&lt;td&gt;Shri Rajesh Aggarwal&lt;br /&gt;Adjudicating Officer, &lt;i&gt;ex-officio Secretary&lt;/i&gt;, IT&lt;br /&gt;Government of Maharashtra&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;26.08.2013&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;In all three cases the Adjudicating Officer was called upon to determine and penalise unauthorised access to personal data of the complainants. In the &lt;i&gt;Vinod Kaushik&lt;/i&gt; case, the complainants’ emails and chat sessions were accessed, copied and made available to the police for legal proceedings without the permission of the complainants. In the &lt;i&gt;Amit Patwardhan&lt;/i&gt; and &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; cases, the complainants’ financial information in the form of bank account statements were obtained from their respective banks without their consent and used against them in legal proceedings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Vinod Kaushik&lt;/i&gt; complaint was filed in 2010 for privacy violations committed between 2008 and 2009. The complaint was made against the complainant’s daughter-in-law – the respondent, who was estranged from her husband, the complainant’s son. The respondent had, independent of the proceedings before the Adjudicating Officer, instituted criminal proceedings alleging cruelty and dowry-related harassment against her estranged husband and the complainant. To support some of the claims made in the criminal proceedings, the respondent accessed the email accounts of her estranged husband and the complainant and printed copies of certain communications, both emails and chat transcripts. The complaint to the Adjudicating Officer was made in relation to these emails and chat transcripts that were obtained without the consent and knowledge of the complainant and his son. On 09.08.2010, the then Adjudicating Officer dismissed the complaint after finding that, owing to the marriage between the respondent and the complainant’s son, there was a relation of mutual trust between them that resulted in the complainant and his son consensually sharing their email account passwords with the respondent. This ruling was appealed to the Cyber Appellate Tribunal (&lt;b&gt;"CyAT"&lt;/b&gt;) which, in a decision of 29.06.2011, found irregularities in the complainant’s son’s privity to the proceedings and remanded the complaint to the Adjudicating Officer for re-adjudication. The re-adjudication, which was conducted by Shri Rajesh Aggarwal as Adjudicating Officer, resulted in a final order of 10.10.2011 (&lt;b&gt;"the final order"&lt;/b&gt;) that is the subject of this analysis. The final order found that the respondent had violated the privacy of the complainant and his son by her unauthorised access of their email accounts and sharing of their private communications. However, the Adjudicating Officer found that the intent of the unauthorised access – to obtain evidence to support a criminal proceeding – was mitigatory and hence ordered the respondent to pay only a small token amount in compensation, not to the complainants but instead to the State Treasury. The Delhi High Court, which was moved in appeal because the CyAT was non-functional, upheld the final order in its decision of 27.01.2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Amit Patwardhan&lt;/i&gt; complaint was filed against the complainant’s ex-employer – the respondent, for illegally obtaining copies of the complainant’s bank account statement. The complainant had left the employ of the respondent to work with a competing business company but not before colluding with the competing business company and diverting the respondent’s customers to them. For redress, the respondent filed suit for a decree of compensation and lead the complainant’s bank statements in evidence to prove unlawful gratification. Since the bank statements were obtained electronically by the respondent without the complainant’s consent, the jurisdiction of the Adjudicating Officer was invoked. In his order of 15.04.2013, Shri Rajesh Aggarwal, the Adjudicating Officer, found that the respondent had, by unlawfully obtaining the complainant’s bank account statements which constitute sensitive personal data, violated the complainant’s privacy. The Adjudicating Officer astutely applied the equitable doctrine of clean hands to deny compensation to the complainant; however, because the complainant’s bank was not a party to the complaint, the Adjudicating Officer was unable to make a ruling on the lack of action by the bank to protect the sensitive personal data of its depositors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; complaint bears a few similarities to the preceding two cases. Like the &lt;i&gt;Vinod Kaushik&lt;/i&gt; matter, the issue concerned the manner in which a wife, estranged but still legally married, accessed electronic records of personal data of the complainants; and, like the &lt;i&gt;Amit Patwardhan&lt;/i&gt; matter, the object of the privacy violation was the bank account statements of the complainants that constitute sensitive personal data. The respondent was the estranged wife of one of the complainants who, along with his complainant father, managed the third complainant company. To support her claim for maintenance from the complainant and his family in an independent legal proceeding, the respondent obtained certain bank account statements of the complainants without their consent and, possibly, with the collusion of the respondent bank. After reviewing relevant law from the European Union and the United States, and observant of relevant sectoral regulations applicable in India including the relevant Master Circular of the Reserve Bank of India, and further noting preceding consumer case law on the subject, the Adjudicating Officer issued an order on 26.08.2013. The order found that the complainant’s right to privacy was violated by both the respondents but, while determining the quantum of compensation, distinguished between the respondents in respect of the degree of liability; the respondent wife was ordered to pay a token compensation amount while the respondent bank was ordered to pay higher compensation to each of the three complainants individually.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The high quality of each of the three orders bears specific mention. Despite the superb quality of the judgments of the Indian higher judiciary in the decades after independence, the overall quality of judgment-writing appears to have declined. &lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; In the last decade, several Indian judges have called for higher standards of judgment writing from their fellow judges. &lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; In this background, it is notable that Shri Rajesh Aggarwal, despite not being a member of the judiciary, has delivered well-reasoned, articulate and clear orders that are cognisant of legal issues and also easily understandable to a non-legal reader.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In each of these cases, the Adjudicating Officer has successfully navigated around the fact that none of the primary parties were interacting and transacting at arm’s length. In the &lt;i&gt;Vinod Kaushik&lt;/i&gt; and &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; matters, the primary parties were estranged but still legally married partners and in the &lt;i&gt;Amit Patwardhan&lt;/i&gt; matter the parties were in an employer-employee relationship. The first Adjudicating Officer in the &lt;i&gt;Vinod Kaushik&lt;/i&gt; matter failed, in his order of 09.08.2010, to appreciate that the individual communications of individual persons were privileged by an expectation of privacy, regardless of their relationship. Hence, despite acknowledging that the marital partners in that matter were in conflict with each other, and despite being told by one party that the other party’s access to those private communications was made without consent, the Adjudicating Officer allowed his non-judicial opinion of marriage to influence his order. This mistake was corrected when the matter was remanded for re-adjudication. In the re-adjudication, the new Adjudicating Officer correctly noted that the respondent wife could have chosen to approach the police or a court to follow the proper investigative procedure for accessing emails and other private communications of another person and that her unauthorised use of the complainant’s passwords amounted to a violation of their privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Popular conceptions of different types of relationships may affect the (quasi) judicial imagination of privacy. In comparison to the &lt;i&gt;Vinod Kaushik&lt;/i&gt; matter, the &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; and &lt;i&gt;Amit Patwardhan&lt;/i&gt; matters both dealt with unauthorised access to bank account statements, by a wife and by an ex-employer respectively. In any event, the same Adjudicating Officer presided over all three matters and correctly found that the facts in all three matters admitted to contraventions of the privacy of the complainants. The conjecture as to whether the first Adjudicating Officer in the &lt;i&gt;Vinod Kaushik&lt;/i&gt; matter would have applied the same standard of family unity to unauthorised access of bank account statements by an estranged wife who was seeking maintenance remains untested. However, the reliance placed on the decision of the Delhi State Consumer Protection Commission in the matter of &lt;i&gt;Rupa Mahajan Pahwa,&lt;/i&gt; &lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; where the Commission found that unauthorised access to a bank pass book by an estranged husband violated the privacy of the wife, would suggest that judges clothe financial information with a standard of privacy higher than that given to emails.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Emails are a form of electronic communication. The &lt;i&gt;PUCL&lt;/i&gt; case (Supreme Court of India, 1996)&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; while it did not explicitly deal with the standard of protection accorded to emails, held that personal communications were protected by an individual right to privacy that emanated from the protection of personal liberty guaranteed under Article 21 of the Constitution of India. Following the &lt;i&gt;Maneka Gandhi&lt;/i&gt; case (Supreme Court of India, 1978)&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;it is settled that persons may be deprived of their personal liberty only by a just, fair and reasonable procedure established by law. As a result, interceptions of private communications that are protected by Article 21 may only be conducted in pursuance of such a procedure. This procedure exists in the form of the Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 that came into effect on 27 October 2009 (&lt;b&gt;"the Interception Rules"&lt;/b&gt;). The Interception Rules set out a regime for accessing private emails in certain conditions. The powers and procedure of Section 91 of the Code of Criminal Procedure (&lt;b&gt;"CrPC")&lt;/b&gt; may also apply to obtain data at rest, such as emails stored in an inbox or sent-mail folder.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, the orders of the Adjudicating Officer reveal a well-reasoned and progressive understanding of the law and principles relating to the quantification of compensation. By choosing to impose larger amounts of compensation on the bank that violated the privacy of the complainant in the &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; matter, the Adjudicating Officer has indicated that the institutions that hold sensitive personal data, such as financial information, are subject to a higher duty of care in relation of it. But, most importantly, the act of imposing monetary compensation of privacy violations is a step forward because, for the first time in India, it recognises that privacy violations are civil wrongs or injuries that demand compensation.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. These Rules were issued &lt;i&gt;vide&lt;/i&gt; GSR 220(E), dated 17 March 2003 and published in the Gazette of India, Extraordinary, Part II, Section 3(i). These Rules can be accessed here – &lt;a href="http://it.maharashtra.gov.in/PDF/Qual_ExpAdjudicatingOfficer_Manner_of_Holding_Enquiry_Rules.PDF"&gt;http://it.maharashtra.gov.in/PDF/Qual_ExpAdjudicatingOfficer_Manner_of_Holding_Enquiry_Rules.PDF&lt;/a&gt; (visited on 30 September 2013).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. These cases and statistics may be viewed here – &lt;a href="http://it.maharashtra.gov.in/1089/IT-Act-Judgements"&gt;http://it.maharashtra.gov.in/1089/IT-Act-Judgements&lt;/a&gt; (visited on 30 September 2013).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See generally, Upendra Baxi “"The Fair Name of Justice": The Memorable Voyage of Chief Justice Chandrachud” in &lt;i&gt;A Chandrachud Reader&lt;/i&gt; (Justice V. S. Deshpande ed., Delhi: Documentation Centre &lt;i&gt;etc.&lt;/i&gt;, 1985) and, Rajeev Dhavan, "Judging the Judges" in &lt;i&gt;Judges and the Judicial Power: Essays in Honour of Justice V. R. Krishna Iyer&lt;/i&gt; (Rajeev Dhavan and Salman Khurshid eds., London: Sweet &amp;amp; Maxwell, 1985).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. See generally, Justice B.G .Harindranath, &lt;i&gt;Art of Writing Judgments&lt;/i&gt; (Bangalore: Karnataka Judicial Academy, 2004); Justice T .S. Sivagnanam, &lt;i&gt;The Salient Features of the Art of Writing Orders and Judgments&lt;/i&gt; (Chennai: Tamil Nadu State Judicial Academy, 2010); and, Justice Sunil Ambwani, “Writing Judgments: Comparative Models” Presentation at the National Judicial Academy, Bhopal (2006) available here – &lt;a href="http://districtcourtallahabad.up.nic.in/articles/writing%20judgment.pdf"&gt;http://districtcourtallahabad.up.nic.in/articles/writing%20judgment.pdf&lt;/a&gt; (visited on 29 Sep 2013).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Appeal No. FA-2008/659 of the Delhi State Consumer Protection Commission, decided on 16 October 2008.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. (1997) 1 SCC 301.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. (1978) 1 SCC 248.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra'&gt;https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-01T15:29:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/all-night-for-hackers">
    <title>An all-nighter for hackers</title>
    <link>https://cis-india.org/news/all-night-for-hackers</link>
    <description>
        &lt;b&gt;Tech event management firm HasGeek is back with its Hacknight for hackers and developers willing to burn the proverbial midnight oil writing some competitive code.&lt;/b&gt;
        &lt;p class="body"&gt;&lt;b&gt;An all-nighter for hackers&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Tech event management firm HasGeek is back with its Hacknight for hackers and developers willing to burn the proverbial midnight oil writing some competitive code.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hacknight will be held between July 14 and 15, from 2 p.m. to 8 a.m. at the Centre for Internet and Society (CIS), in Bangalore, and simultaneously in Pune, at AmiWorks.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Data Hacknight was open to geeks, enthusiasts, designers, mathematicians and statisticians to work with different datasets on projects ranging from discovering unknown patterns in data to representing data in various visual forms. This event was being held in the run-up to a larger conference on big data, analytics and applications called The Fifth Elephant.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hacknight was also open to individuals who want to work with tools such as R, Pig, Excel or even Hadoop to discover the possibilities and challenges of working with data, a release from HasGeek stated.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;To register for the Hacknight, visit http://beta.hacknight.in/fifthelephant/bangalore2012&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Yahoo sets up Grid Computing Lab&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Yahoo India’s Research and Development wing and the Indian Institute of Technology, Madras announced the launch of a Grid Computing Lab set up by the Internet major on the institute campus.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;This cluster of high-end servers at the lab would allow researchers to access Web-scale data and conduct research on big data and cloud computing systems, a release from Yahoo stated. The lab would focus on this emerging field and encourage more researchers to take up research in the field, as well as process and analyse huge volumes of structured and unstructured data which, to date, has been limited due to significant cost barriers in getting large computing systems operational.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;D. Janakiram, Department of Computer Science, IIT-Madras, said in a release: “This opens up a new arena of exciting opportunities for our students. We are hopeful such partnerships will allow students to conduct truly breakthrough work on cloud computing and data storage systems, ultimately leading to Web innovations coming to the marketplace.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;World Class Award for iGate&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;iGATE, an integrated technology and operations company, announced that it has won the ‘World Class Award’ under the ‘large service organisations’ category at the Global Performance Excellence Awards (GPEA).&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The awards were administered by the Asia Pacific Quality Organisation, a non-profit group, a release from iGate stated. Ravi Mani, senior vice-president, Organisational Excellence Group, iGATE, said the award was a testimony to the persistent effort the teams have put in to achieve the high-quality standards and processes at iGATE.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Cloud and growth: a survey&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Over the last two years, the public cloud market in India has rapidly evolved with focus on software and payments as a service, a survey by Zinnov, a consulting firm, has found.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A study titled ‘Public Cloud Opportunity in India’ found that the overall Indian market for cloud (both public and private) grew steadily in 2011. The Software as a Service (SaaS) market, largely dominated by email, collaboration tools and enterprise resource products grew by 46 per cent, a release on the survey stated.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The public cloud market was expected to grow 55 per cent in the near future and become a default choice for new IT investments, especially in the small and medium businesses segment, the study observed.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/technology/article3613800.ece"&gt;published&lt;/a&gt; in the Hindu on July 11, 2012&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/all-night-for-hackers'&gt;https://cis-india.org/news/all-night-for-hackers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-08-06T10:59:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-chetana-divya-vasudev-october-4-2016-an-appening-world">
    <title>An 'app'ening world</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-chetana-divya-vasudev-october-4-2016-an-appening-world</link>
    <description>
        &lt;b&gt;A ‘forward’ has been doing the rounds on WhatsApp about the privacy concerns relating to that instant messaging app; it’s asking for permission to share user data with Facebook.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Chetana Divya Vasudev was published in &lt;a class="external-link" href="http://www.deccanherald.com/content/573852/an-appening-world.html"&gt;Deccan Herald&lt;/a&gt; on October 4, 2016. Rohini was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the WhatsApp notification, asking users to agree to the terms and  conditions again, the option to share these user details to help improve  ads on Facebook is already selected. Those who are uncomfortable  parting with this information have to uncheck it before clicking on the  ‘I agree’ button.&lt;br /&gt;&lt;br /&gt;“Agreeing to this would mean Facebook can see  who you’re chatting with and what you’re talking about,” says tech  expert Chinmayi S K. “So if you’re talking about cat adoption, the ads  displayed on the side could be relevant to that.”&lt;br /&gt;&lt;br /&gt;When it comes  to other smartphone apps, she cites Zomato as an example. “It has been  asking for user history — previous orders and other such details — to  make recommendations,” she says. “This comes with the app update.  Tinder, too, is asking for your location using wifi, which is more  accurate than the GPRS location.”&lt;br /&gt;It’s alright to agree to these  permissions, she says, so long as you’re aware of what you’re signing up  for and how that data is going to be used.&lt;br /&gt;&lt;br /&gt;If you have qualms  about agreeing to this, there are usually alternatives you can find,  adds Rohini Lakshane, program officer, Centre for Internet and Society.  “If not, it’s usually a trade-off: you have to see how much you want the  app,” she points out.&lt;br /&gt;&lt;br /&gt;There are, however, other apps that might be duplicates asking for access to your device or files, cautions Chinmayi. &lt;br /&gt;&lt;br /&gt;“If a cooking app, a simple one that gives you recipes, asks for your call logs or other files, for example,” she says.&lt;br /&gt;&lt;br /&gt;A  discerning user, interjects Rohini, will check for permission to access  files or functions that are not strictly necessary for the features the  app supports. “I don’t want to name anything but some e-commerce and  travel apps ask to access your browsing history and the other apps or  networks you’re connect to. It could be to serve you contextual ads or  content, like Zomato, or to sell it to someone. You never know,” she  says. However, some devices or versions of the Android OS let you  control what permissions you enable, she informs.&lt;br /&gt;&lt;br /&gt;Aeronautical  engineer Pavan Raj P V says he takes care not to compromise on his  safety, whenever possible. “But there are a few apps that I have on my  phone no matter what — Facebook, WhatsApp, LinkedIn, Instagram. Most of  them auto-update and require no extra permissions.”&lt;br /&gt;&lt;br /&gt;However, he  has noticed that LinkedIn asks for access to Gmail contacts that you  could accidentally accept “if you’re logging in mechanically”.&lt;br /&gt;&lt;br /&gt;Varsha  C V, communications specialist at Karnataka State Highways Improvement  Project, says, “Last month, my husband asked me to download a Google app  for free calls that required all sorts of permissions, such as access  to your phone logs. When Skype offers the same features without asking  for all this, why should anyone use this app?”&lt;br /&gt;&lt;br /&gt;She believes  privacy in India is not taken as seriously as it should be. “You should  keep in mind that if you’re giving them access to your contacts, you’re  also compromising on others’ privacy,” she points out.&lt;br /&gt;&lt;br /&gt;Lokanand, a  sound engineer, admits to not paying attention to what he’s giving apps  access to. “I’m no expert but if you ask me, you download apps because  they are useful. So I don’t really bother about what I’m saying yes to.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-chetana-divya-vasudev-october-4-2016-an-appening-world'&gt;https://cis-india.org/internet-governance/news/deccan-herald-chetana-divya-vasudev-october-4-2016-an-appening-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-10-05T00:24:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/firstfridayatcis-amutha-arunachalam-stand-shielded-of-digital-rights-may-05">
    <title>Amutha Arunachalam - Stand Shielded of Digital Rights (Delhi, May 05, 4 pm)</title>
    <link>https://cis-india.org/internet-governance/events/firstfridayatcis-amutha-arunachalam-stand-shielded-of-digital-rights-may-05</link>
    <description>
        &lt;b&gt;We are proud to announce that Amutha Arunachalam will be the speaker at the May #FirstFriday event at the CIS Delhi office. Amutha is Principal Technical Officer in the Council Of Scientific and Industrial Research. The talk will be on digital signatures, traceability of time-stamps, and setting up an Indian Standard (Digital) Time. If you are joining us, please RSVP at the soonest as we have only limited space in our office.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Amutha Arunachalam&lt;/strong&gt;&lt;/h3&gt;
&lt;h4&gt;Principal Technical Officer, Council of Scientific and Industrial Research&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/internet-governance/files/amutha-arunachalam/image" alt="Amutha Arunachalam" class="image-inline" title="Amutha Arunachalam" /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Amutha Arunachalam entered the Indian Government service as an Intelligence Officer in Ministry of Home Affairs in 1988 after working at the Indian Institute of  Technology Madras in Fibre Optic communication Laboratory. She later moved to the Council of Scientific and Industrial Research in the field of Information Technology. She managed the IT infrastructure of the CSIR lab (Central Road Research Institute) till  2006 and moved to CSIR Head Quarters and contributed in the ICT refurbishment drive, mainly in the IT with a major contribution in establishing DATA Centre, implementing network security, linking CSIR HQ to the National Knowledge Network facility extended by National Information Centre(NIC) before joining UIDAI.&lt;/p&gt;
&lt;p&gt;In UIDAI (National Identity Project) she managed the Data Center operations that includes critical CIDR (Central Identification Repository) and was responsible for setting up Infrastructure to roll out Disaster recovery centre, Aadhaar Enrolment Service, Benchmarking  of  UIDAI  Enrolment ,  Authentication Applications and setting up of Backend infrastructure of the Authentication Service for Roll out to citizens. After the five year Deputation at UIDAI (Feb 2016), she is currently posted in the Council of Scientific and Industrial Research working in the Area of Policy in Cyber Security for CSIR, Enhancing Research with collaborative, networking  and Building unified CSIR Ecosystem with Enterprise platform.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;RSVP&lt;/strong&gt;&lt;/h3&gt;
&lt;iframe src="https://docs.google.com/forms/d/e/1FAIpQLSfWGNDezfJOi3UU7GpAWkrKn0uOMlCsV2P_6QEHqPWCb6JSqA/viewform?embedded=true" frameborder="0" marginwidth="0" marginheight="0" height="666" width="600"&gt;Loading...&lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Location&lt;/strong&gt;&lt;/h3&gt;
&lt;iframe src="https://www.google.com/maps/embed?pb=!1m18!1m12!1m3!1d876.157470894426!2d77.20553462919722!3d28.550842498903158!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x0%3A0x834072df81ffcb39!2sCentre+for+Internet+and+Society!5e0!3m2!1sen!2sin!4v1493818109951" frameborder="0" height="450" width="600"&gt;&lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/firstfridayatcis-amutha-arunachalam-stand-shielded-of-digital-rights-may-05'&gt;https://cis-india.org/internet-governance/events/firstfridayatcis-amutha-arunachalam-stand-shielded-of-digital-rights-may-05&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>#FirstFridayAtCIS</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    

   <dc:date>2017-05-03T13:30:32Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/business-standard-november-28-2012-nirmalya-behera-amnesty-international-calls-for-review-of-66a-of-it-act">
    <title>Amnesty International calls for review of 66A of IT act</title>
    <link>https://cis-india.org/news/business-standard-november-28-2012-nirmalya-behera-amnesty-international-calls-for-review-of-66a-of-it-act</link>
    <description>
        &lt;b&gt;The review seeks to bring the Act in line with international human rights law standards on freedom of expression.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This article by Nirmalya Behera was &lt;a class="external-link" href="http://www.business-standard.com/india/news/amnesty-international-calls-for-review66ait-act/197621/on"&gt;published in the Business Standard&lt;/a&gt; on November 28, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Joining in the row over arrest of two girls in Maharastra for &lt;a href="http://www.business-standard.com/india/prof_page.php?search=Facebook&amp;amp;select=1" target="_blank"&gt;Facebook&lt;/a&gt; comments, the human rights group, Amnesty International, has called for review of the Section 66A of the Information Technology Act, 2000. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a letter to Kapil Sibal, Union minister for Communications and  Information Technology, the London based human right watchdog has asked  for reviewing the section and bringing it in line with international  human rights law standards on freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;The human rights group and the Centre for Internet and Society believe that Section 66A, which was amended in 2008, is not in line with the constitution of India and internationally accepted standards on freedom of expression. They termed the section as imprecise and over board.&lt;br /&gt;&lt;br /&gt;Amnesty has also called for laying down clear and comprehensive explanations of the restrictions on free speech either in the IT act or in the rules in order to prevent the abuse of the provision by various state law enforcement officials and frame the explanations after consulting it with the public.&lt;br /&gt;&lt;br /&gt;“The Internet should be a force for political freedom, not repression. People have the right to seek and receive information and to express their peaceful beliefs without fear, or interference. But under Section 66A, even a peaceful posting could lead to a prison sentence of up to three years”, it said in its letter.&lt;br /&gt;&lt;br /&gt;It may be noted that two girls- Shaheen Dhada and her friend Renu Srinivasan were arrested on November 19, after Dhada had lamented in a Facebook post about the shutdown in Mumbai due to Bal Thackeray's funeral and were later released on bail. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/business-standard-november-28-2012-nirmalya-behera-amnesty-international-calls-for-review-of-66a-of-it-act'&gt;https://cis-india.org/news/business-standard-november-28-2012-nirmalya-behera-amnesty-international-calls-for-review-of-66a-of-it-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2012-11-30T06:19:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/amid-unrest-in-the-valley-students-see-a-dark-wall">
    <title>Amid Unrest in the Valley, Students See a Dark Wall</title>
    <link>https://cis-india.org/internet-governance/blog/amid-unrest-in-the-valley-students-see-a-dark-wall</link>
    <description>
        &lt;b&gt;Strap: Frequent, prolonged restrictions on internet have kept many from using the learning resource.&lt;/b&gt;
        &lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Srinagar, J&amp;amp;K: &lt;/b&gt;On November 18, Srinagar lost 3G and 4G connectivity after a militant and a sub-inspector of the Jammu &amp;amp; Kashmir police force were killed, and one militant caught alive in a&lt;a href="http://www.uniindia.com/news/states/si-militant-killed-1-ultra-arrested-alive-in-srinagar/1050461.html"&gt; &lt;/a&gt;&lt;a href="http://www.uniindia.com/news/states/si-militant-killed-1-ultra-arrested-alive-in-srinagar/1050461.html"&gt;brief encounter&lt;/a&gt; on the outskirts of the city, near Zakoora crossing. District authorities said data connectivity was snapped to “maintain law and order”.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/JKEducation1.png/@@images/77d075bb-5b8f-4f93-81ad-1f6e9a56f35c.png" alt="JK Education 1" class="image-inline" title="JK Education 1" /&gt;&lt;/th&gt;&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_JKEducation2.png" alt="JKEducation2" class="image-inline" title="JKEducation2" /&gt;&lt;/th&gt;&lt;th&gt;&lt;img src="https://cis-india.org/home-images/JKEducation3.png" alt="JK Education 3" class="image-inline" title="JK Education 3" /&gt;&lt;/th&gt;&lt;th style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/JKEducation4.png" alt="JK Education 4" class="image-inline" title="JK Education 4" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="normal" style="text-align: center; "&gt;&lt;span class="discreet"&gt;Students in Srinagar’s SPS Library. Picture Courtesy: Aakash Hassan &lt;/span&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;But to Jasif Ayoub, an aspiring chartered accountant, it seemed like an obstruction to his exam preparations. Not being able to access lectures and texts online, Ayoub was perturbed. He had moved from Anantnag in south Kashmir, to Srinagar, only to have an easy access to the vast pool of information on the world wide web. “My hometown witnesses internet shutdowns very frequently. That is why I moved to live with relatives in Srinagar to prepare for my exams. But the internet speed here too is getting worse by the day,” says Ayoub.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;The internet is usually the first administrative casualty when any law &amp;amp; order situation arises in the Kashmir Valley, which has been restive and agitated over the last two decades. Despite the frequency of shutdowns, the state still does not issue a prior warning, or offer emergency connectivity measures. Residents know the pattern now: the mobile internet and SMS are the first to go down, and then broadband and other lease-line service providers follow.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;J&amp;amp;K tops the list of Indian states that have witnessed most number of internet shutdowns, with 27 being the count from 2012 to 2017, according to &lt;a href="https://internetshutdowns.in/"&gt;&lt;i&gt;internetshutdowns.in&lt;/i&gt;&lt;/a&gt;, run by Software Freedom Law Centre&lt;i&gt;. &lt;/i&gt;There has been a sharp rise in the curbs on internet imposed this year, with over 30 shutdowns until November 22. Government authorities who issue and implement these bans say it is the only way to undercut the strength of social media in organising movements and resistance. The prime example is&lt;a href="http://kashmirdispatch.com/2016/07/24/11-burhan-funeral-pictures-which-you-missed-due-to-internet-clampdown/144891/"&gt; &lt;/a&gt;&lt;a href="http://kashmirdispatch.com/2016/07/24/11-burhan-funeral-pictures-which-you-missed-due-to-internet-clampdown/144891/"&gt;Burhan Wani&lt;/a&gt;, the 21-year-old Hizb-ul-Mujahideen commander who had used his Facebook account to&lt;a href="http://www.firstpost.com/india/the-virtual-world-hizb-ul-mujahideens-burhan-wani-innovates-to-influence-youth-in-kashmir-2794392.html"&gt; &lt;/a&gt;&lt;a href="http://www.firstpost.com/india/the-virtual-world-hizb-ul-mujahideens-burhan-wani-innovates-to-influence-youth-in-kashmir-2794392.html"&gt;popularise&lt;/a&gt; and justify militant resistance. Wani’s death saw protests erupting across the Valley, which made the state snap internet services for about&lt;a href="https://scroll.in/latest/827906/prepaid-mobile-internet-services-restored-in-kashmir-after-six-months"&gt; &lt;/a&gt;&lt;a href="https://scroll.in/latest/827906/prepaid-mobile-internet-services-restored-in-kashmir-after-six-months"&gt;six months&lt;/a&gt; on prepaid mobile networks. For four months, there was no internet access on postpaid mobile networks too. These have been the longest intervals of ban. However, day-long, hour-long and even week-long periods of non-connectivity are alarmingly common.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;The incessant disruption of internet services prevents students from accessing online education resources. Class IX student Haiba Jaan in Srinagar depends on lectures from Khan Academy,  an online coaching centre, to clarify a lot of concepts. A resident of Hyderpora in Srinagar, Haiba points to the i-Pad in her hand. “This is the best way of learning," she says. "I was not satisfied with my teachers in school or tuition classes. I found studying on the internet quite useful. But, the problem with that is the regular internet shutdowns." Her parents got a postpaid broadband connection the previous year to help Haiba. "But even that gives up many times during total internet shutdowns," says Haiba.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;In May this year, the government suspended the use of 22 social media and messaging platforms in Kashmir for a month. Skype was one of the messaging services banned. This put Mehraj Din through great trouble. Shortlisted for a summer programme at Istanbul, Turkey, this scholar of Islamic Studies at Kashmir University, had to appear for the final interview via Skype. "The ban could have ended all my chances to get selected had the organisers not agreed to an audio interview considering the ground situation here," says Mehraj, who is currently compiling his dissertation for the university. "I have a deadline to meet, but repeated shutdowns have affected my work," he says. "This a punishment from the State."&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Full libraries, half studies&lt;/b&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;When home and mobile internet connections are snapped, the state government's e-learning initiative in public libraries provides some respite. Mehrosha Rasool wants to secure an MBBS seat through the NEET competitive exam. She visits the SPS library in Srinagar religiously to access the study material that has been downloaded and made available on computers. The 17-year-old resident of Nishat in Srinagar says libraries are useful since one never knows how long the internet services at home will stay stable. Irshad Ahmad, another student utilising the facilities at SPS library, says he moved to Srinagar from Pattan town of north Kashmir because "this facility of accessing education material is not available at the library in my tehsil."&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Most prominent libraries in Srinagar have computers and tablets for students’ access, "But the rooms often become overcrowded as hundreds of students have registered at the libraries for internet facilities," says Mehrosha.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Schools in the Valley, meanwhile, rely on traditional means in the absence of the e-learning systems. Javaid Ahmad Wani, a political science teacher from south Kashmir’s Anantnag, believes that with little time in the year to even complete the basic syllabus thanks to frequent and sudden school closures during periods of unrest, supplementary e-learning is a distant possibility. Even when teachers and students do have access to these resources to stay updated, internet shutdowns make them unreliable. Therefore, teachers and schools stick to conventional means. Javaid admits that he has himself lost opportunities to an internet shutdown. “I could not submit the form for the main exam of the J&amp;amp;K public service last year because there was no Internet,” he says.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Curbs pinch civil service aspirants&lt;/b&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Many among the civil service aspirants are dependent on the internet for preparations. Anees Malik, a resident of Shopian, is preparing for the civil service exams. "I cannot afford coaching, so I rely on the internet," he says, especially for mock exams and previous question papers. "In such a situation, losing connectivity almost every other week is the worst thing to happen.”&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Sakib Wani, a Kupwara resident who is currently studying chemistry in Uttarakhand, notices a marked indifference in Kashmir to using online resources. "Those applying for scholarships and pursuing higher education may be using it but not to the extent that students in other states of India do it,” Sakib says. He believes that the repeated internet ban could be a possible reason for students to not opt for online educational resources. With colleges and schools shut for weeks during conflict periods, the internet could have been a great way to continue education formally and personally, but the repeated shutdowns have closed that door of opportunity too.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Aakash Hassan is a Srinagar​-based freelance writer and a member of &lt;a href="http://www.101reporters.com/"&gt;101Reporters.com&lt;/a&gt;, a pan-India network of grassroots reporters. He has reported on conflict, environment, health and other issues for different publications across India.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Shutdown stories are the output of a collaboration between 101 Reporters and CIS with support from Facebook.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/amid-unrest-in-the-valley-students-see-a-dark-wall'&gt;https://cis-india.org/internet-governance/blog/amid-unrest-in-the-valley-students-see-a-dark-wall&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aakash Hassan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Shutdown</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-12-21T14:07:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-november-28-2018-kul-bhushan-amazon-launches-machine-learning-based-platform-for-healthcare-space">
    <title>Amazon launches Machine Learning-based platform for healthcare space</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-november-28-2018-kul-bhushan-amazon-launches-machine-learning-based-platform-for-healthcare-space</link>
    <description>
        &lt;b&gt;Amazon’s Comprehend Medical platform uses a new HIPAA-eligible machine learning service to process unstructured medical text and information such as dosages, symptoms and signs, and patient diagnosis.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Kul Bhushan was published in the &lt;a class="external-link" href="https://www.hindustantimes.com/tech/nov-28-amazon-launches-machine-learning-driven-platform-for-healthcare-space/story-3EuXjDiVO8NLBxjOMKkopO.html"&gt;Hindustan Times&lt;/a&gt; on November 28, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;With an objective to push deeper into the health space, Amazon has introduced a new &lt;a href="https://www.hindustantimes.com/topic/machine-learning"&gt;Machine Learning&lt;/a&gt; (ML) software to analyse medical records for better treatments of patients and reduce overall expenditure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unveiled  at the company’s re:Invent cloud conference in Las Vegas, Amazon’s  Comprehend Medical platform uses a new “HIPAA-eligible machine learning  service that allows developers to process unstructured medical text and  identify information such as patient diagnosis, treatments, dosages,  symptoms and signs, and more.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Comprehend Medical helps health  care providers, insurers, researchers, and clinical trial investigators  as well as health care IT, biotech, and pharmaceutical companies to  improve clinical decision support, streamline revenue cycle and clinical  trials management, and better address data privacy and protected health  information (PHI) requirements,” explains the company on its &lt;a href="https://aws.amazon.com/blogs/machine-learning/introducing-medical-language-processing-with-amazon-comprehend-medical/" rel="nofollow"&gt;website&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amazon  aims to mitigate the time spent on manually analysing medical data of a  patient. The company hopes the software will ultimately empower users  to make a more informed decision about their health and even things like  scheduling care visits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Unlocking this information from medical language makes a variety of  common medical use cases easier and cost-effective, including: clinical  decision support (e.g., getting a historical snapshot of a patient’s  medical history), revenue cycle management (e.g., simplifying the  time-intensive manual process of data entry), clinical trial management  (e.g., by identifying and recruiting patients with certain attributes  into clinical trials), building population health platforms, and helping  address (PHI) requirements (e.g., for privacy and security  assurance.),” the company added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amazon also pointed out that some  of the medical institutes such as Seattle’s Fred Hutchinson Cancer  Research Center and Roche Diagnostics have already implemented the  software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amazon’s expansion into the healthcare space comes after it acquired  health-focused startup PillPack for $1 billion earlier this year. Apart  from Amazon, other technology companies like Apple and Microsoft are  investing into the healthcare space.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apple is already offering  HealthKit and CareKit platforms to develop apps focused on health. The  company earlier this year launched &lt;a href="https://www.hindustantimes.com/tech/apple-watch-series-4-launched-with-ecg-compatibility-new-design/story-2LqdNq7YjAXGU3HEH5om8N.html"&gt;Apple Watch Series 4 with ECG support&lt;/a&gt;.  Microsoft, however, has deeper footprints in the health segment. The  company is building a bunch of Artificial Intelligence-based tools for  healthcare.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, Microsoft’s Project InnerEye uses machine learning  technology to build tools for automatic, quantitative analysis of  three-dimensional radiological images.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to various  reports, Artificial Intelligence is going to make a big impact in the  healthcare industry. An Accenture report in 2017 &lt;a href="https://www.accenture.com/t20171215T032059Z__w__/us-en/_acnmedia/PDF-49/Accenture-Health-Artificial-Intelligence.pdf" rel="nofollow" target="_blank"&gt;predicted&lt;/a&gt; that the AI apps can create $150 billion in annual savings for the United States alone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Back in India, the adoption of AI in healthcare is growing. According  to a report by the Centre for Internet and Society India, “the use of  AI in healthcare in India is increasing with new startups and large ICT  companies offering AI solutions for healthcare challenges in the  country.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bengalure-based startup mfine has developed an AI-based  healthcare platform which learns medical standards and protocols and  diagnosis and treatment methods to further help the doctors with  necessary data and analysis. The company earlier this year raised $4.2  million in funding.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-november-28-2018-kul-bhushan-amazon-launches-machine-learning-based-platform-for-healthcare-space'&gt;https://cis-india.org/internet-governance/news/hindustan-times-november-28-2018-kul-bhushan-amazon-launches-machine-learning-based-platform-for-healthcare-space&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2018-12-03T00:23:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india">
    <title>Amazon and Walmart are about to take a big hit in India</title>
    <link>https://cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india</link>
    <description>
        &lt;b&gt;India is the world’s biggest emerging digital economy, and Silicon Valley’s top companies have invested huge sums to cash in on it. Now new regulations are threatening their business.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was published in &lt;a class="external-link" href="https://q13fox.com/2019/01/31/amazon-and-walmart-are-about-to-take-a-big-hit-in-india/"&gt;Q13 Fox&lt;/a&gt; on January 31, 2019. Gurshabad Grover was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;E-commerce restrictions due to go into effect Friday will prevent  global retailers such as Amazon and Walmart from using their deep  pockets and massive scale to drive down prices in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And proposed legal changes would require social media companies like  Facebook and Twitter to monitor and take down content at the request of  Indian authorities, which critics say could be misused for censorship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The new rules highlight the risk global tech giants are running in a country they see as &lt;a href="https://www.cnn.com/interactive/2018/11/business/internet-usage-india-future/" rel="noopener" target="_blank"&gt;their next growth frontier&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Amazon and Walmart push back&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="https://www.cnn.com/2018/12/27/business/india-amazon-walmart/" rel="noopener" target="_blank"&gt;new e-commerce rules&lt;/a&gt;,  announced in late December, look to curb practices like steep discounts  that have helped Amazon dominate the US market and already make huge  inroads in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rules state that foreign online retailers can no longer strike  deals with companies to offer products that are not available elsewhere.  They also prevent these platforms from selling products distributed by  companies they have invested in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That would strike at the heart of Amazon’s business in India — the US company has &lt;a href="https://www.cnn.com/2018/09/30/tech/more-supermarket-amazon-india/index.html" rel="noopener" target="_blank"&gt;snapped up stakes&lt;/a&gt; in several local&lt;b&gt; &lt;/b&gt;suppliers&lt;b&gt;.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amazon and India’s biggest online retailer, Walmart-owned Flipkart,  had been pushing India to delay the introduction of the new rules, but  the government said in a statement Thursday that it had decided “after  due consideration” not to do so.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amazon had written to the Indian government asking for a four-month  extension to comply with the new rules, a company spokesperson said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“With over [400,000] sellers and hundreds of thousands of  transactions happening daily on the Amazon India Marketplace we need  adequate time to understand the details of the policy,” the spokesperson  added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Flipkart had asked the government for a six-month extension, a person familiar with the matter told CNN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The company reportedly warned of “significant customer disruption” if  the new policy is implemented this week. Flipkart CEO Kalyan  Krishnamurthy said in a letter to the Indian government that the new  rules could “have undesirable impacts on the continued growth of  e-commerce in India,” &lt;a href="https://www.reuters.com/article/us-india-ecommerce-flipkart-exclusive/exclusive-walmarts-flipkart-warns-of-major-customer-disruption-if-new-india-rules-not-delayed-idUSKCN1PN12E" rel="noopener" target="_blank"&gt;according to Reuters&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rules will affect the Bangalore-based company’s sales of products like &lt;a href="https://edition.cnn.com/2018/10/12/tech/flipkart-amazon-india-smartphone/index.html" rel="noopener" target="_blank"&gt;smartphones&lt;/a&gt;, many of which it &lt;a href="https://www.flipkart.com/oppo-new-launch-2wer3-3wsdf-store?affid=HotDeals20&amp;amp;affExtParam2=redpixel&amp;amp;affExtParam1=4513302" rel="noopener" target="_blank"&gt;offers exclusively&lt;/a&gt; to its customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Flipkart declined to comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The changes follow intensive lobbying by India’s small businesses  against Amazon and Walmart’s outsized influence in the country.  (Together they have more than 70% of the Indian online shopping market.)&lt;b&gt; &lt;/b&gt;The  Confederation of All India Traders, which says it represents more than  70 million local retailers, warned the government against granting an  extension.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If any deferment or extension is given, the small traders both  offline and online will be compelled to resort to a national campaign  against any such move … which may also have political repercussions,”  the group said in a statement earlier this week, a thinly-veiled warning  to the government in an election year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The trade body expressed “deep satisfaction” at the government’s decision not to extend the deadline.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;India’s WhatsApp problem&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India’s effort to further regulate its internet isn’t restricted to retail.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In late December, two days before the e-commerce restrictions were  unveiled, India’s technology ministry published a host of proposed  changes to laws governing online content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The changes state that “intermediaries” including internet providers  and platforms like Facebook and Twitter must remove “unlawful” material  within 24 hours at the request of Indian authorities. That covers  content that goes against India’s sovereignty, national security or  foreign relations as well as “public order, decency or morality,” the  new rules state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts say the broad phrasing leaves the rules open to misuse and  could be used to suppress free speech. It could also lead to self  censorship by tech companies to avoid government scrutiny.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It can lead to en masse takedown of content,” said Gurshabad Grover,  a policy officer at the Bangalore-based Centre for Internet and  Society, a think tank. “Intermediaries are often happy to take down  perfectly legal content just to avoid liability.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twitter said in a statement that it would continue to lobby the Indian government on the proposed&lt;b&gt; &lt;/b&gt;regulations before they are passed into law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Our hope is that after this robust public consultation process any  changes to the [rules] in India strike a careful balance that protects  important values such as freedom of expression,” a Twitter spokesperson  told CNN Business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google and Facebook declined to comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Asia Internet Coalition, an industry group that counts all three  companies as its members, also urged the Indian government to reconsider  the rule changes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In addition to interfering with the fundamental rights of freedom of  speech and expression, and right to privacy as guaranteed under the  constitution, the [proposed regulations] impose burdensome obligations  on the intermediaries,” the group said in a letter to India’s technology  ministry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The regulations appear to be driven by India’s growing battle with  fake news and misinformation, with viral rumors on Facebook’s mobile  messaging service WhatsApp blamed for &lt;a href="https://edition.cnn.com/2018/09/30/tech/facebook-whatsapp-india-misinformation/index.html" rel="noopener" target="_blank"&gt;more than a dozen lynchings&lt;/a&gt; last year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government specifically called out the mob violence in its  statement announcing the regulations, citing the “misuse of social  media by criminals and anti-national elements” as a key factor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rules also state that platforms must enable the tracing of  individual posts and messages at the government’s request, a requirement  that WhatsApp has &lt;a href="https://money.cnn.com/2018/08/24/technology/whatsapp-india-encryption-privacy/index.html" rel="noopener" target="_blank"&gt;previously rejected&lt;/a&gt; as a non-starter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is WhatsApp’s biggest market, with more than 200 million users.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why India matters&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India has opened itself up to foreign investment in recent years,  particularly in its fast-growing tech and retail industries, and  companies from around the world have rushed in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s internet is a particularly tempting prize. About 500 million  people are already online, with nearly 900 million more yet to be  connected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amazon has pledged at least $5 billion dollars to growing its business in the country, while &lt;a href="https://money.cnn.com/2018/05/09/investing/walmart-flipkart-india-softbank/" rel="noopener" target="_blank"&gt;Walmart spent $16 billion&lt;b&gt; &lt;/b&gt;to buy Flipkart&lt;/a&gt; last year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook and Google have also identified India as their next big  market, rolling out several features and services in the country before  taking it to the rest of the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the changing legal environment presents a huge challenge, and Big Tech is battling to keep the promise alive.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“An uncertain, constantly changing regulatory environment is not good  for any business,” Mishi Choudhary, legal director at the New  York-based advocacy group Software Freedom Law Center&lt;b&gt;,&lt;/b&gt; told CNN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“India must decide where it sees itself in the global landscape,”  Choudhary added. “It can either be a democracy that will let the best  company win and provide an open, free and secure internet to its  citizens or turn the way our neighbors across the Himalayas [China]  have. It can’t have it both ways.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india'&gt;https://cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-01T15:03:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ananya-bhattacharya-quartz-india-april-19-2019-india-bans-tiktok-over-porn-but-not-facebook-twitter-instagram">
    <title>Almost every social network has a porn problem—so why is India banning only TikTok?</title>
    <link>https://cis-india.org/internet-governance/news/ananya-bhattacharya-quartz-india-april-19-2019-india-bans-tiktok-over-porn-but-not-facebook-twitter-instagram</link>
    <description>
        &lt;b&gt;TikTok is in some serious trouble in India. Though it isn’t the only one battling a rising tide of porn, violence, and fake news, the country’s courts have singled out the Chinese video-sharing app for a ban.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Ananya Bhattacharya was &lt;a class="external-link" href="https://qz.com/india/1597068/india-bans-tiktok-over-porn-but-not-facebook-twitter-instagram/"&gt;published in Quartz India&lt;/a&gt;. Shweta Mohandas was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Incumbents such as Twitter, WhatsApp, and Facebook have been fighting the same problems &lt;a href="https://qz.com/india/1598153/heres-why-tiktok-is-getting-banned-in-india/" rel="noopener noreferrer"&gt;as TikTok has&lt;/a&gt;, but they haven’t yet faced such extreme measures. Several experts have called the Madras high court ban on the &lt;a href="https://www.dw.com/en/tiktok-worlds-most-successful-video-app-faces-security-concerns/a-48063869" rel="noopener noreferrer"&gt;world’s most popular video app&lt;/a&gt; a “kneejerk reaction” that is “outsized.”&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;“While it is important to place appropriate curbs on porn and trolling, this decision sounds extreme since there are myriad ways to spread the two vices,” Anindya Ghose, the Heinz Riehl professor of business at New York University’s Stern School, told Quartz.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;So why is TikTok bearing the brunt?&lt;/p&gt;
&lt;h2 class="india _7d6a7" style="text-align: justify; "&gt;Singled out?&lt;/h2&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Unlike TikTok, most other social media and video/photo sharing apps are largely private and controlled in nature, which means a post can only be seen by a limited network of a user. “The issue with TikTok is it encourages interactivity over videos,” said Prasanto Roy, a New Delhi-based tech policy consultant. “Facebook and Instagram start out with smaller circles or friends groups, while TikTok can get to a larger audience quickly—including allowing video interaction with strangers.”&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Given that TikTok is much younger to most others in the segment, the app lacks certain safeguards to ensure users’ safety. For instance, there are no checks &amp;amp; balances on the app to moderate user-generated content, experts told Quartz.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;“Other social media (platforms) pro-actively filter out content that violate their community guidelines,” Shweta Mohandas, policy officer at the Centre for Internet and Society of India (CIS), told Quartz. “The fact that TikTok’s community guidelines’ reporting mechanism is based on user reports could be a reason why the porn problem has become more prevalent.”&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Although some cases slip through the gaps, Facebook and Google are proactively &lt;a href="https://economictimes.indiatimes.com/tech/internet/facebook-google-blocking-search-words-linked-to-child-porn/articleshow/67186564.cms?from=mdr" rel="noopener noreferrer"&gt;blocking search terms&lt;/a&gt; related to child porn. Facebook and Instagram are also using sophisticated artificial intelligence (AI) tools to &lt;a href="https://www.digitalinformationworld.com/2019/03/facebook-instagram-ai-revenge-porn.html" rel="noopener noreferrer"&gt;detect revenge porn&lt;/a&gt;. Vernacular-language social network Sharechat also has &lt;a href="https://inc42.com/buzz/sharechat-bans-50k-users-as-part-of-clean-content-drive/" rel="noopener noreferrer"&gt;algorithms that flag illicit content&lt;/a&gt;. “YouTube gives you policies and they remove your video or puts a strike against your account, but there’s no such rule or guideline on TikTok,” Indian YouTuber and TikTok-user Kulbushan Kundalwal &lt;a href="https://www.youtube.com/watch?v=85gtBuOeAwQ" rel="noopener noreferrer"&gt;said in a video&lt;/a&gt;reacting to the ban.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;It has been trying to strengthen its systems lately.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;The app, which lets users create and post 15-second-long videos, &lt;a href="https://economictimes.indiatimes.com/small-biz/startups/newsbuzz/tiktok-makes-move-to-take-bad-content-by-the-horns/articleshow/67895189.cms?from=mdr" rel="noopener noreferrer"&gt;has set up&lt;/a&gt; a team of content moderators who speak a number of regional languages. It has also hosted awareness drives featuring celebrities. However, it relies mostly on user reports.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Clearly, these measures are not enough and millions of its Indian users—&lt;a href="https://www.thequint.com/tech-and-auto/tech-news/tik-tok-user-video-streaming-india-hate-speech-control-needed" rel="noopener noreferrer"&gt;almost 40%&lt;/a&gt; of the app’s 500 million user base—remain exposed to risks.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;In the US, too, TikTok was berated based on similar concerns. It recently settled with the &lt;a href="https://www.ftc.gov/system/files/documents/cases/musical.ly_complaint_ecf_2-27-19.pdf" rel="noopener noreferrer"&gt;Federal Trade Commission&lt;/a&gt;, paying &lt;a href="https://www.wired.com/story/tiktok-ftc-record-fine-childrens-privacy/" rel="noopener noreferrer"&gt;$5.7 million&lt;/a&gt; (Rs40 crore), the &lt;a href="https://www.vox.com/the-goods/2019/2/28/18244996/tiktok-children-privacy-data-ftc-settlement" rel="noopener noreferrer"&gt;largest civil penalty ever&lt;/a&gt; collected in a child privacy violation case in the US.&lt;/p&gt;
&lt;h2 class="india _7d6a7" style="text-align: justify; "&gt;Will this ban help?&lt;/h2&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Taking the app down can slam the brakes on its meteoric rise, but won’t kill it. Banning one app won’t change user behaviour, experts said.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;For starters, users who have it installed can continue using it. And though it’s not directly available for download from the app store, there are ways to get it. In fact, getting on the app is easy: Any existing user can share the app with others through platforms like ShareIt.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TikTok is not a unique proposition.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;There are also several third-party app stores, other than those of Google and Apple—apkpure, androidapkbox, and uptodown, among others—where TikTok is still available.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;In any case, it is not the only source of dangerous content online. “TikTok is not a unique proposition,” Gurugram-based market research firm techARC &lt;a href="https://techarc.net/techinsight-why-tik-tok-ban-wont-suffice/" rel="noopener noreferrer"&gt;said in a note&lt;/a&gt;. The ban has already begun to boost similar apps.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;For instance, since April 16, around the time when news of a likely ban on TikTok in India began floating, video-sharing app Like has been trending as the third most popular in India on analytics site App Annie’s charts, techARC found.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;“There is a need to have a holistic approach to getting rid of such digital menace that cannot be absolved by technology or legal recourse alone,” techARC founder and chief analyst Faisal Kawoosa said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ananya-bhattacharya-quartz-india-april-19-2019-india-bans-tiktok-over-porn-but-not-facebook-twitter-instagram'&gt;https://cis-india.org/internet-governance/news/ananya-bhattacharya-quartz-india-april-19-2019-india-bans-tiktok-over-porn-but-not-facebook-twitter-instagram&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Ananya Bhattacharya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-04-28T04:46:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/times-of-india-june-1-2018-allow-admins-to-add-users-to-online-group-chats-only-after-permission-sflc-in">
    <title>Allow admins to add users to online group chats only after permission: SFLC.in</title>
    <link>https://cis-india.org/internet-governance/news/times-of-india-june-1-2018-allow-admins-to-add-users-to-online-group-chats-only-after-permission-sflc-in</link>
    <description>
        &lt;b&gt;SFLC.in -- a donor supported legal services organisation -- has written an open letter to messaging service providers like WhatsApp, Facebook and others, urging them to modify their platforms to ensure that users are not added to group chats without their permission.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="https://timesofindia.indiatimes.com/business/india-business/allow-admins-to-add-users-to-online-group-chats-only-after-permission-sflc-in/articleshow/64416022.cms"&gt;Times of India&lt;/a&gt; on June 1, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In its letter, Software Freedom Law Centre, India (SFLC.in) said any user with administrator rights can currently add another person to the group without the latter's permission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the absence of a mechanism to prevent themselves from being added to groups that they would not like to participate in, users have no option but to manually exit the groups.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"This is a troubling state of affairs because users may be forcefully exposed to a range of subjectively undesirable content that they would never have signed up for otherwise, which can be particularly damaging, especially in situations where malicious actors attempt to intimidate, disparage, harass or harm individuals in any way," the letter said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The letter has also been co-signed by Digital Empowerment Foundation, Centre for Internet and Society and a few others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Emails sent to Facebook, Tencent and others seeking their comments did not elicit any response.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;SFLC.in argued that the current format is an issue for many, including those belonging to minority and vulnerable groups.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"While blocking malicious actors can usually help mitigate the damage to an extent, on online messaging services like yours, they are able to easily circumvent blocks by creating groups and adding their targets to these groups," it said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The problem is only made worse when personal information like phone numbers, user IDs and photographs are shared with a large number of users, which could open the doors to even greater abuse, it added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;SFLC.in argued that there are no adequate safeguards to prevent infringement of user rights and therefore, these platforms should take immediate steps to address this issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"...implement measures to make it so that being added to group conversations without permission is no longer a possibility. Not only will this greatly help in limiting abusive uses of your services, but it will also make users less wary of using the services, making the Internet a safer space for us all," it added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/times-of-india-june-1-2018-allow-admins-to-add-users-to-online-group-chats-only-after-permission-sflc-in'&gt;https://cis-india.org/internet-governance/news/times-of-india-june-1-2018-allow-admins-to-add-users-to-online-group-chats-only-after-permission-sflc-in&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-06-26T02:03:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/all-india-privacy-symposium">
    <title>All India Privacy Symposium</title>
    <link>https://cis-india.org/internet-governance/all-india-privacy-symposium</link>
    <description>
        &lt;b&gt;Are we citizens or subjects? Experts gather in Delhi for public symposium on privacy, transparency, e-governance and national security in India.

&lt;/b&gt;
        
&lt;p&gt;Following 18 months of research by Privacy India, the Centre for Internet and Society and the Society in Action Group, with support from London-based Privacy International, the groups today held an All India Privacy Symposium at the India International Centre in New Delhi. Speakers included Supreme Court Advocate Menaka Guruswamy, Microsoft Director of Corporate Affairs Deepak Maheshwari, social researcher and activist Usha Ramanathan, journalist Saikat Datta and former Chief of RAW Hormis Thorakan.&lt;/p&gt;
&lt;p&gt;A few themes recurred across all five panels (Privacy and Transparency, Privacy and E-Governance Initiatives, Privacy and National Security, Privacy and Banking, and Privacy and Health). Perhaps the most prominent was the repeated allegation that the Indian government' technological illiteracy is putting its citizens at risk. One panelist described how an RTI request had recently revealed that the government had no idea how many of its own computers had been hacked or how much data had been stolen – even though this information has been in the public domain since the Wikileaks diplomatic cable releases.&lt;/p&gt;
&lt;p&gt;The increased use of public-private partnerships and outsourcing was also a major cause for concern. Public money is being funneled into privately-held commercial enterprises – which, unlike public bodies, are not subject to RTI requests – and spent on e-governance initiatives like UID. Social researcher Anant Maringati spoke of a "hybrid world" in which government projects were fulfilled by completely unaccountable private actors. Advocate Malavika Jayaram remarked that, while private companies tend to have far greater technological expertise than government officials, they are ultimately motivated by profit rather than public benefit; we should therefore ask ourselves whether they can really be trusted with our information.&amp;nbsp;&lt;/p&gt;
&lt;table class="plain" align="center"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/picture3.jpg/image_preview" alt="Privacy Symposium" class="image-inline image-inline" title="Privacy Symposium" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Government surveillance for the purposes of crime prevention also 
came under scrutiny, when Saikat Datta described how he himself had been
 put under illegal surveillance by an unauthorized intelligence agency. 
He warned of the dangers of excessive wiretapping, a practice that 
currently generates such a “mountain” of information that anything with 
real intelligence value tends to be ignored until it is too late, as 
happened with the Mumbai bombings in 2008. It is clear that the Indian 
government’s surveillance and interception programmes far exceed what is
 necessary for legitimate law enforcement.&lt;/p&gt;
&lt;p&gt;
Overall, panelists at the conference painted a vivid picture of India
 as a state that has made a habit of invading the privacy of individuals
 on a massive scale in the name of public benefit and law enforcement. 
Yet there is a clear sense that the benefits to society are not 
outweighing the costs to the individual. As Usha Ramanathan commented: 
“The question is, do we think of ourselves as citizens – or as 
subjects?”&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/all-india-privacy-symposium-webcast" class="external-link"&gt;See the webcast of the event here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/all-india-privacy-symposium'&gt;https://cis-india.org/internet-governance/all-india-privacy-symposium&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Natasha Vaz</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-01T06:16:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
