<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2801 to 2815.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-july-16-2018-after-securing-net-neutrality-in-india-trai-goes-to-bat-for-data-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-romita-majumdar-and-kiran-rathee-after-data-leak-row-facebook-imposes-restrictions-on-user-data-access"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/advancing-cyberstability-final-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/biometric-update-june-26-2021-chris-burt-advanced-biometric-technologies-and-new-market-entries-tackle-fraud-chase-digital-id-billions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/adoption-of-standards-in-smart-cities-way-forward-for-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/privacy-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindu-businessline-november-1-2019-kv-kurmanath-activists-demand-judicial-probe-into-whatsapp-snooping"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/activists-cry-foul-against-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/accountability-of-icann"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-august-22-2016-accessing-pirated-content-might-lead-to-prison-term-and-rs-3-lakh-fine"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-october-8-2015-suhrith-parthasarathy-access-at-the-cost-of-net-neutrality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-nina-c-george-august-13-2019-abuse-linked-to-net-fixation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/abli-privacy-workshop"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/economic-times-july-23-2017-amber-sinha-aadhar-privacy-is-not-a-unidimensional-concept"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-july-16-2018-after-securing-net-neutrality-in-india-trai-goes-to-bat-for-data-privacy">
    <title>After Securing Net Neutrality In India, TRAI Goes To Bat For Data Privacy</title>
    <link>https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-july-16-2018-after-securing-net-neutrality-in-india-trai-goes-to-bat-for-data-privacy</link>
    <description>
        &lt;b&gt;This will be a stop-gap measure before the creation of a privacy bill.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Gopal Sathe was published in &lt;a class="external-link" href="https://www.huffingtonpost.in/2018/07/16/after-securing-net-neutrality-in-india-trai-goes-to-bat-for-data-privacy_a_23483166/"&gt;Huffington Post&lt;/a&gt; on July 16, 2018. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last week, the Department of Telecom gave  the nod to net neutrality regulations, ensuring that there would be no  discrimination of data at a time when the US is moving in the &lt;a href="https://www.theverge.com/2018/6/11/17439456/net-neutrality-dead-ajit-pai-fcc-internet" target="_blank"&gt;opposite direction&lt;/a&gt;.  The net neutrality norms were based on the recommendations from the  Telecom Regulatory Authority of India (TRAI) - which the BBC in November  described as &lt;a href="https://www.bbc.com/news/world-asia-india-42162979" target="_blank"&gt;the world's strongest&lt;/a&gt; - but the regulator isn't celebrating right now - it's moved on to  another equally important topic - privacy and data protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Monday, TRAI announced its &lt;a href="https://trai.gov.in/sites/default/files/RecommendationDataPrivacy16072018_0.pdf" target="_blank"&gt;recommendations&lt;/a&gt; on privacy, security, and ownership of data in the telecom sector, and  the 77 page document serves as the first major public guidelines on  privacy and data protection in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TRAI has outlined a consent based framework, where users have to  clearly choose what data is being used, which bears some similarities to  Europes GDPR. TRAI noted that while the right to privacy should not be  treated solely as a property right, it must be noted that the  controllers of personal data are mere custodians without any primary  right over the same. In other words, your data should belong to you, and  not to Google, or Facebook, or any other company which holds your data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The Right to Choice, Notice, Consent, Data Portability, and Right to  be Forgotten should be conferred upon the telecommunication consumers,"  TRAI recommended&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In section 2.3, it also notes that meta-data is personal information  and as such should be given the same protections. This is an important  point given that even metadata can be used to track and identify people  accurately. It also noted that there needs to be a right to be  forgotten, and once you stop using a service it should not store your  data beyond what's mandated by the law, according to section 2.46.  Section 2.49 also allows users the right to withdraw consent, which  means that even if people have given consent to gathering your data,  users will be able to stop tracking on demand.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, TRAI also noted the stop-gap nature of its  recommendations, and said, "till such time a general data protection law  is notified by the government, the existing Rules/ License conditions  applicable to the Telecom Service Providers for protection of users  should be made applicable to all the entities in the digital  eco-system."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Good, with some caveats&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Early reactions to the recommendations are largely positive. On  Twitter, lawyer Apar Gupta, who is one of the founding members of the  Internet Freedom Foundation shared some &lt;a href="https://twitter.com/apargupta84/status/1018856500775841793" target="_blank"&gt;quick thoughts&lt;/a&gt; about the recommendations. Describing this as a substantive document he  called it "partly positive since it calls for interim safeguards", but  added that the "form of some seems problematic."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the plus side, he noted that many of the protections in the  recommendations "focus on a user rights model, which includes notice,  choice, consent, portability, deletion and erasure." He also praised the  recommendations for not taking a view on data localisation, and that  the protections need to apply to private as well as state entities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, he criticized the fact that TRAI is planning to impose  license conditions on all OTT providers - that is to say, all third  party services. He also noted that the recommendations did not directly  address state surveillance. He also pointed out that an Electronic  Consent Framework as described in the recommendations may "centralise  consent requests thereby may end up generating more personal data and  unifying them into a single portal managed by the govt/regulators."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We are happy with the TRAI's recommendations on Privacy, Security  and Ownership of Data as the regulator is calling for all digital  entities to be brought under data protection framework. This would  include all devices, operating systems, browsers, and applications and  would be welcome stop-gap measure till rules and regulations of the  telecom services providers are applicable to them," said Rajan Matthews,  DG Cellular Operators Association of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"This will ensure, in prevailing circumstances, that the privacy of  users is protected and maintained. National security and privacy issues  are of paramount importance. Accordingly, the regulator by making this  recommendation, is ensuring that no exception is made for any service  provider, while subjecting them to the rules to meet the national  security and privacy norms. However, this is our preliminary view and we  will need to review the other recommendations to determine their  implications."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speaking in a &lt;a href="https://twitter.com/ETNOWlive/status/1018849319300972544" target="_blank"&gt;television interview&lt;/a&gt;,  Pranesh Prakash, Policy Director at the Centre for Internet and  Society, said he's still processing the document, but "on the face of it  it seems good."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There are still certain concerns I have which haven't been  addressed. The telecom licenses themselves, which are issued by the  Government of India, require a whole lot of data to be collected,  metadata to be collected, by telecom companies. So I'm not sure how that  requirement by the Government of India squares off with what is now  being recommended by TRAI."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Let me also point out that one of the things that TRAI says, and it  might be exceeding its brief a little bit, is that it says this should  not only cover telecom operators, but also device manufacturers,  operating systems, application creators, and other kinds of software.  What TRAI seems to want to do is actually quite a bit more than what I  think the DoT has, or really ought to be doing. I really don't  understand whether this will find any favour in the interim before the  government decides to take up the Justice Srikrishna Committee report."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Justice Srikrishna committee report still due&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Although TRAI's recommendations are an important document, and will  serve as stopgap privacy rules, India is also on the verge of a data  protection and privacy bill, which will be based on the recommendations  of the Justice BN Srikrishna committee on the subject. The committee was  formed in August and was expected to deliver its report in June, but  sources say that disagreements over the Aadhaar have caused some delays.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The committee is expected to send its recommendations to the  government soon, at which point things could change, but for now, TRAI's  recommendations are an important development as India moves to secure  the privacy of its people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ahead of that though, you can read the full TRAI recommendations &lt;a href="https://trai.gov.in/sites/default/files/RecommendationDataPrivacy16072018_0.pdf" target="_blank"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-july-16-2018-after-securing-net-neutrality-in-india-trai-goes-to-bat-for-data-privacy'&gt;https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-july-16-2018-after-securing-net-neutrality-in-india-trai-goes-to-bat-for-data-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-07-29T05:28:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-romita-majumdar-and-kiran-rathee-after-data-leak-row-facebook-imposes-restrictions-on-user-data-access">
    <title>After data leak row, Facebook imposes restrictions on user data access</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-romita-majumdar-and-kiran-rathee-after-data-leak-row-facebook-imposes-restrictions-on-user-data-access</link>
    <description>
        &lt;b&gt;MEIT issues notice to Facebook even as experts debate absolute impact on the second largest developer community.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Romita Majumdar and Kiran Rathee was published in &lt;a class="external-link" href="http://www.business-standard.com/article/current-affairs/after-data-leak-row-facebook-imposes-restrictions-on-user-data-access-118040500950_1.html"&gt;Business Standard&lt;/a&gt; on April 6, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Social media giant &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=facebook" target="_blank"&gt;Facebook &lt;/a&gt;has finally reacted to the global storm around its data privacy policies by bringing in a new set of restrictions on developers and data aggregators using the platform for data harvesting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Two weeks ago we promised to take a hard look at the information apps can use when you connect them to &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=facebook" target="_blank"&gt;Facebook &lt;/a&gt;as well as other data practices. We will remove a developer’s ability to request data people shared with them if it appears they have not used the app in the last 3 months,” said &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=facebook" target="_blank"&gt;Facebook &lt;/a&gt;Chief Technology Officer &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=mark+schroepfer" target="_blank"&gt;Mark Schroepfer &lt;/a&gt;in a blog.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;iframe frameborder="0" height="1" marginheight="0" marginwidth="0" scrolling="no" title="3rd party ad content" width="1"&gt;&lt;/iframe&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=facebook" target="_blank"&gt;Facebook &lt;/a&gt;&lt;span&gt;has also disabled the feature to search a user by their email address or phone number which has been abused by malicious actors and reduced the overall control that the app will have on user data.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=facebook" target="_blank"&gt;Facebook &lt;/a&gt;has also submitted its response to the Indian government saying over 500,000 people in India have been potentially affected by the data breach involving &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=cambridge+analytica" target="_blank"&gt;Cambridge Analytica.&lt;/a&gt; The government sources said as the social networking firm has now accepted that Indians’ data was compromised; it makes the issue much more important and serious. “We will wait for Cambridge Analytica’s reply and then, we will take our stand,” sources in &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=electronics" target="_blank"&gt;Electronics &lt;/a&gt;and IT Ministry said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Ministry had issued notices to both &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=facebook" target="_blank"&gt;Facebook &lt;/a&gt;and Cambridge Analytica, seeking their responses regarding the data breach of Indians and if it was used to influence elections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The new set of restrictions clamp down on how much data app developers access on the platform and also prevent third part data providers from offering targeted marketing services on &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=facebook" target="_blank"&gt;Facebook.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"India is the second largest &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=facebook" target="_blank"&gt;Facebook &lt;/a&gt;developer base and the restriction on users' data access is going to impact all of them. There will be more scrutiny in &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=facebook" target="_blank"&gt;Facebook &lt;/a&gt;apps, leading to slower approvals. Virality will reduce as explicit consent will be required for accessing friends' data and contacts list, “ said Vivek Prakash, CTO and Co-Founder, HackerEarth.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He added that there could be tighter terms of service making developers also liable for unauthorized processing of data that they collect from the apps.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Executive Director of Center for Internet and Society Sunil Abraham says that while &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=facebook" target="_blank"&gt;Facebook &lt;/a&gt;says “apps need to agree to strict requirements” and “tightening our review process” it is still not clear what these requirements are. “Instead of the promised link to whether user data was accessed by Cambridge Analytica, it would make sense for them to say &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=facebook" target="_blank"&gt;Facebook &lt;/a&gt;holds W number of records across X databases over the time period Y, which totals Z Gb while explaining what these variables stand for,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consumer data marketing company Hansa Cequity believes that digital marketing arms of most companies will finally have to consider building their own user database given the strict clampdown on third party data.“Businesses can no more use data from third party aggregators for targeted advertising. Consumer goods and entertainment related brands are likely to face some impact because they depend on access to such data,” said S Swaminathan, Co-Founder and CEO, Hansa Cequity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some experts also believe that this move might force platforms like Twitter, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=google" target="_blank"&gt;Google &lt;/a&gt;and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=youtube" target="_blank"&gt;YouTube &lt;/a&gt;to rethink their policies on how much access they give advertisers and data aggregators to user data. Abraham also added that app developers and their investors have to evaluate business models that depend more on value to user rather than the amount of personal data harvested. The data that has already been harvested by the likes of &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=cambridge+analytica" target="_blank"&gt;Cambridge Analytica &lt;/a&gt;and other unknown parties, however, is beyond user control forever.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-romita-majumdar-and-kiran-rathee-after-data-leak-row-facebook-imposes-restrictions-on-user-data-access'&gt;https://cis-india.org/internet-governance/news/business-standard-romita-majumdar-and-kiran-rathee-after-data-leak-row-facebook-imposes-restrictions-on-user-data-access&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-04-07T15:30:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/advancing-cyberstability-final-report">
    <title>Advancing Cyberstability Final Report</title>
    <link>https://cis-india.org/internet-governance/news/advancing-cyberstability-final-report</link>
    <description>
        &lt;b&gt;Centre for Internet &amp; Society (CIS) was acknowledged in the final report of the Global Commission on Stability of Cyberspace&lt;/b&gt;
        &lt;p&gt;CIS had engaged with the Commission throughout the process. An issue brief authored by Elonnai Hickok and Arindrajit Basu was published by them last year. A submission made by Gurshabad Grover, Elonnai Hickok, Karan Saini and Arindrajit Basu was also acknowledged. See the &lt;a class="external-link" href="https://cyberstability.org/report/#acknowledgements"&gt;list of acknowledgements here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/advancing-cyberstability-final-report'&gt;https://cis-india.org/internet-governance/news/advancing-cyberstability-final-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-11-13T14:25:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/biometric-update-june-26-2021-chris-burt-advanced-biometric-technologies-and-new-market-entries-tackle-fraud-chase-digital-id-billions">
    <title>Advanced biometric technologies and new market entries tackle fraud, chase digital ID billions</title>
    <link>https://cis-india.org/internet-governance/news/biometric-update-june-26-2021-chris-burt-advanced-biometric-technologies-and-new-market-entries-tackle-fraud-chase-digital-id-billions</link>
    <description>
        &lt;b&gt;Amid forecasts of rapid growth and huge market potential, digital ID platforms launches by Techsign and Ping Identity, new services, features and even an investment fund have been launched.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Chris Burt was &lt;a class="external-link" href="https://www.biometricupdate.com/202106/advanced-biometric-technologies-and-new-market-entries-tackle-fraud-chase-digital-id-billions"&gt;published by Biometric Update&lt;/a&gt; on June 26, 2021.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A new camera solution for under-display 3D face biometrics from Infineon and partners, and IPO filings by Clear and SenseTime show parallel investment activity in biometrics, meanwhile, and experts from Veridium and Intellicheck provide insight into the shifting technology and fraud landscapes, among the most widely-read stories this week on Biometric Update.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Top biometrics news of the week&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Several areas of the digital identity market continued to be very active, with a new investment fund launched to support startups in digital commerce and payments, Yoti joining a regulatory sandbox, Techsign launching a digital ID platform, and Mastercard and b.well reporting positive results from a recent pilot for their biometric healthcare platform. All this activity contributes to explaining Juniper Research’s &lt;a href="https://www.biometricupdate.com/202106/digital-identity-verification-market-forecast-to-reach-16-7b-by-2026"&gt;forecast of rapid growth&lt;/a&gt; in the sector to $16.7 billion in 2026, driven largely by spending on remote onboarding.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Okta CEO Todd McKinnon, meanwhile, told Barron’s that the total addressable market for identity and access management providers like Okta is something like &lt;a href="https://www.biometricupdate.com/202106/okta-ceo-says-total-addressable-identity-and-access-management-market-near-80b"&gt;$80 billion&lt;/a&gt;, as well as that effective integration is the key to solving biometrics challenges in the space. Entrust and Yubico formed an integration partnership, LoginRadius launched a new feature, Jamf launched a biometric tool for enterprises, and a certification program for IAM professionals was launched.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A list of goods for sale on the dark web includes a listing for &lt;a href="https://www.biometricupdate.com/202106/biometric-selfies-and-forged-passports-identities-for-sale-on-the-dark-web"&gt;selfies holding an American ID credential&lt;/a&gt;, which in theory could be used in a biometric spoofing attack. Cybersecurity researcher Luana Pascu helps guide readers through the report, and shares insights such as on the status of faked vaccination certificates on dark web marketplaces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ensuring the validity of the ID document a biometric identity verification process is based on, without adding too much friction, often means adopting &lt;a href="https://www.biometricupdate.com/202106/intellicheck-ceo-on-building-the-foundations-for-biometric-verification-and-fraud-protection"&gt;layered risk profiling&lt;/a&gt;, Intellicheck CEO Bryan Lewis tells &lt;em&gt;Biometric Update&lt;/em&gt; in a sponsored post. The company has deep roots in detecting fraudulent documents and has found that even scanning the barcode on an identity document will not necessarily catch a fake if the unique security elements are not validated as part of the scan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fourthline Anti-Financial Crime Head Ro Paddock writes in a Biometric Update guest post about the ever-increasing sophistication of fraud attacks, which reached the level of computer-generated &lt;a href="https://www.biometricupdate.com/202106/the-fraudsters-new-game-face"&gt;3D masks and deepfakes&lt;/a&gt; during the pandemic,. In response, information-sharing between organizations will be necessary to understand the scope of these new threats, and how to defend against them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Philippines’ election commission has launched an app to allow people to preregister for the &lt;a href="https://www.biometricupdate.com/202106/philippines-launches-app-to-fast-track-biometric-voter-registration"&gt;voter roll online&lt;/a&gt; before enrolling their biometrics in person, as the country continues digitizing its public services. Governments in Pakistan, Haiti and Nigeria are also making moves to improve the accessibility and trustworthiness of their electoral processes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A partnership between Research ICT Africa and the Centre for Internet and Society, supported by the Omidyar Network, to explore the development of digital ID systems for the African context is explained in a &lt;a href="https://researchictafrica.net/2021/06/21/why-digital-id-matters/" target="_blank"&gt;blog post&lt;/a&gt;. The project will be based on an adaptation of the Evaluation Framework for Digital Identities which the CIS used to assess India’s Aadhaar system, with rule of law, rights and risk-based tests, and presented in a series of posts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Details of Clear’s IPO plans emerged, including its intention to raise up to &lt;a href="https://www.biometricupdate.com/202106/clear-ipo-could-raise-up-to-396m-in-hot-biometrics-investment-market"&gt;$396 million&lt;/a&gt; on the NYSE. The $2.2 billion valuation aligns with some comparable companies, by revenue multiple, but the lower voting power of the shares on offer could be a restraining factor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An even bigger IPO could be held by SenseTime later this year, with the Chinese AI firm looking to raise up to $2 billion &lt;a href="https://www.biometricupdate.com/202106/not-smarting-from-us-sanctions-sensetime-says-its-ipo-is-on-again"&gt;on the Hong Kong exchange&lt;/a&gt;. The company has been talking about a public stock launch since before the company was hit with restrictions to U.S. trade, which it indicates have had little impact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The latest major funding round in digital identity is the largest yet, with &lt;a href="https://www.biometricupdate.com/202106/transmit-security-raises-543m-to-grow-biometric-passwordless-authentication"&gt;Transmit Security raising $543 million&lt;/a&gt; at a $2.2 billion valuation to expand the market reach of its passwordless biometric authentication technology. The company claims it is the highest ever Series A funding round in cybersecurity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bob Eckel, Aware CEO and International Biometrics + Identity Association (IBIA) Director and Board Member, discusses why people should own their own identity, identifying things and protecting supply chains, and his background in setting up air traffic control systems used all over the world with the Requis &lt;a href="https://requis.com/podcasts/podcast-bob-eckel-biometrics-future-secured-identities/" target="_blank"&gt;Supply Chain Next podcast&lt;/a&gt;. In the longer term Eckel sees biometric replacing passwords, and in the shorter term being used to make processes touchless.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Veridium CTO John Callahan guides Biometric Update through recent NIST guidance on the &lt;a href="https://www.biometricupdate.com/202106/nist-touchless-fingerprint-biometrics-guidance-confirms-interoperability"&gt;interoperable use of contactless fingerprints&lt;/a&gt; with contact-based back-end AFIS systems. The guidance, which changes definitions within the NIST ITL biometric container standard, but advises that the associated image quality metric does not apply to contactless prints, could spark further investment in the modality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A new time-of-flight 3D imaging solution that could be used to implement facial authentication from &lt;a href="https://www.biometricupdate.com/202106/under-display-camera-for-3d-face-biometrics-developed-by-infineon-pmd-arcsoft"&gt;under the display of mobile devices&lt;/a&gt; without notches or bezels has been developed by partners Infineon, pmdtechnologies and ArcSoft. Based on the REAL3 sensor and ArcSoft’s computer vision algorithms, the solution is expected to reach availability in Q3 2021.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://www.biometricupdate.com/202106/ping-identity-adds-behavioral-biometrics-and-bot-detection-with-securedtouch-acquisition"&gt;Ping Identity has acquired SecuredTouch&lt;/a&gt; in a deal with undisclosed financial details to integrate its behavioral biometrics-based continuous user authentication with the PingOne enterprise cloud platform. Ping also launched a consumer application for reusable credentials and added unified management features to its cloud platform at its Identiverse 2021 event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notre Dame-IBM Technology Ethics Lab Founding Director Elizabeth Renieris joins the MIT Sloan Management Review’s &lt;a href="https://sloanreview.mit.edu/audio/starting-now-on-technology-ethics-elizabeth-renieris/" target="_blank"&gt;Me, Myself and AI podcast&lt;/a&gt; to discuss the role of the lab, her path past and through some of the digital identity space’s key ethical developments, and the need to take the long view on technology to understand its ethical implications. Renieris makes a pitch for process-oriented regulations, based on the best understanding we have at the time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ProctorU’s announcement that it will no longer sell fully-automated remote proctoring services is seen as a win in the battle against “the AI shell game” by the &lt;a href="https://www.eff.org/deeplinks/2021/06/long-overdue-reckoning-online-proctoring-companies-may-finally-be-here" target="_blank"&gt;Electronic Frontier Foundation&lt;/a&gt;. The descriptions of the balance between the automated and human decision-making by AI proctoring providers amount to doublespeak, the EFF says, before panning their human review processes, accuracy rates, and use of facial recognition.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/biometric-update-june-26-2021-chris-burt-advanced-biometric-technologies-and-new-market-entries-tackle-fraud-chase-digital-id-billions'&gt;https://cis-india.org/internet-governance/news/biometric-update-june-26-2021-chris-burt-advanced-biometric-technologies-and-new-market-entries-tackle-fraud-chase-digital-id-billions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Chris Burt</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>UIDAI</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2021-06-28T01:13:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/adoption-of-standards-in-smart-cities-way-forward-for-india">
    <title>Adoption of Standards in Smart Cities - Way Forward for India</title>
    <link>https://cis-india.org/internet-governance/blog/adoption-of-standards-in-smart-cities-way-forward-for-india</link>
    <description>
        &lt;b&gt;With a paradigm shift towards the concept of “Smart Cities’ globally, as well as India, such cities have been defined by several international standardization bodies and countries, however, there is no uniform definition adopted globally. The glue that allows infrastructures to link and operate efficiently is standards as they make technologies interoperable and efficient.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/adoption-of-standards-in-smart-cities.pdf" class="internal-link"&gt;Click here to download the full file&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Globally, the pace of urbanization is increasing exponentially. The world’s urban population is projected to rise from 3.6 billion to 6.3 billion between 2011 and 2050. A solution for the same has been development of sustainable cities by improving efficiency and integrating infrastructure and services &lt;strong&gt;[1]&lt;/strong&gt;. It has been estimated that during the next 20 years, 30 Indians will leave rural India for urban areas every minute, necessitating smart and sustainable cities to accommodate them &lt;strong&gt;[2]&lt;/strong&gt;. The Smart Cities Mission of the Ministry of Urban Development was announced in the year 2014, followed by selection of 100 cities in the year 2015 and 20 of them being selected for the first Phase of the project in the year 2016. The Mission &lt;strong&gt;[3]&lt;/strong&gt; lists the “core infrastructural elements” that a smart city would incorporate like adequate water supply, assured electricity, sanitation, efficient public transport, affordable housing (especially for the poor), robust IT connectivity and digitisation, e-governance and citizen participation, sustainable environment, safety and security for citizens, health and education.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With a paradigm shift towards the concept of “Smart Cities’ globally, as well as India, such cities have been defined by several international standardization bodies and countries, however, there is no uniform definition adopted globally. The envisioned modern and smart city promises delivery of high quality services to the citizens and will harness data capture and communication management technologies. The performance of such cities would be monitored on the basis of physical as well as the social structure comprising of smart approaches and solution to utilities and transport.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The glue that allows infrastructures to link and operate efficiently is standards as they make technologies interoperable and efficient. Interoperability is essential and to ensure smart integration of various systems in a smart city, internationally agreed standards that include technical specifications and classifications must be adhered to. Development of international standards ensure seamless interaction between components from different suppliers and technologies &lt;strong&gt;[4]&lt;/strong&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Standardized indicators within standards benefit smart cities in the following ways:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Effective governance and efficient delivery of services.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;International and Local targets, benchmarking and planning.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Informed decision making and policy formulation.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Leverage for funding and recognition in international entities.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Transparency and open data for investment attractiveness.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;A reliable foundation for use of big data and the information explosion to assist cities in building core knowledge for city decision-making, and enable comparative insight.&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The adoption of standards for smart cities has been advocated across the world as they are perceived to be an effective tool to foster development of the cities. The Director of the ITU Telecommunication Standardization Bureau Chaesub Lee is of the view that “Smart cities will employ an abundance of technologies in the family of the Internet of Things (IoT) and standards will assist the harmonized implementation of IoT data and applications , contributing to effective horizontal integration of a city’s subsystems” &lt;strong&gt;[5]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Smart Cities standards in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;National Association of Software and Services Companies (NASSCOM) partnered with Accenture &lt;strong&gt;[6]&lt;/strong&gt; to prepare a report called ‘Integrated ICT and Geospatial Technologies Framework for 100 Smart Cities Mission’ &lt;strong&gt;[7]&lt;/strong&gt; to explore the role of ICT in developing smart cities &lt;strong&gt;[8]&lt;/strong&gt;, after the announcement of the Mission by Indian Government. The report, released in May 2015, lists down 55 global standards, keeping in view several city sub-systems like urban planning, transport, governance, energy, climate and pollution management, etc which could be applicable to the smart cities in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though NASSCOM is working closely with the Ministry of Urban Development to create a sustainable model for smart cities &lt;strong&gt;[9]&lt;/strong&gt;, due to lack of regulatory standards for smart cities, the Bureau of Indian Standards (BIS) in India has undertaken the task to formulate standardised guidelines for central and state authorities in planning, design and construction of smart cities by setting up a technical committee under the Civil engineering department of the Bureau. However, adoption of the standards by implementing agencies would be voluntary and intends to complement internationally available documents in this area &lt;strong&gt;[10]&lt;/strong&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Developing national standards in line with these international standards would enable interoperability (i.e. devices and systems working together) and provide a roadmap to address key issues like data protection, privacy and other inherent risks in the digital delivery and use of public services in the envisioned smart cities, which call for comprehensive data management standards in India to instill public confidence and trust &lt;strong&gt;[11]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Key International Smart Cities Standards&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Following are the key internationally accepted and recognized Smart Cities standards developed by leading organisations and the national standardization bodies of several countries that India could adopt or develop national standards in line with these.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;The International Organization for Standardization (ISO) - Smart Cities Standards&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;ISO is an instrumental body advocating and developing for smart cities to safeguard rights of the people against a liveable and sustainable environment. The ISO Smart Cities Strategic Advisory Group uses the following working definition: A ‘Smart City’ is one that dramatically increases the pace at which it improves its social, economic and environmental (sustainability) outcomes, responding to challenges such as climate change, rapid population growth, and political and economic instability by fundamentally improving how it engages society, how it applies collaborative leadership methods, how it works across disciplines and city systems, and how it uses data information and modern technologies in order to transform services and quality of life for those in and involved with the city (residents, businesses, visitors), now and for the foreseeable future, without unfair disadvantage of others or degradation of the natural environment. [For details see ISO/TMB Smart Cities Strategic Advisory Group Final Report, September 2015 ( ISO Definition, June 2015)].&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ISO Technical Committee 268 works on standardization in the field of Sustainable Development in Communities &lt;strong&gt;[12]&lt;/strong&gt; to encourage the development and implementation of holistic, cross-sector and area-based approaches to sustainable development in communities. The Committee comprises of 3 Working Groups &lt;strong&gt;[13]&lt;/strong&gt;:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Working Group 1: System Management ISO 37101- This standard sets requirements, guidance and supporting techniques for sustainable development in communities. It is designed to help all kinds of communities manage their sustainability, smartness and resilience to improve the contribution of communities to sustainable development and assess their performance in this area &lt;strong&gt;[14]&lt;/strong&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Working Group  2 : City Indicators- The key Smart Cities Standards developed by ISO TC 268 WG 2 (City Indicators) are:&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style="text-align: justify; "&gt;ISO 37120 Sustainable Development of Communities — Indicators for City Services and Quality of Life&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;One of the key standards and an important step in this regard was ISO 37120:2014 under the ISO’s Technical Committee 268 (See Working on Standardization in the field of Sustainable Development in Communities) providing clearly defined city performance indicators (divided into core and supporting indicators) as a benchmark for city services and quality of life, along with a standard approach for measuring each for city leaders and citizens &lt;strong&gt;[15]&lt;/strong&gt;. The standard is global in scope and can help cities prioritize city budgets, improve operational transparency, support open data and applications &lt;strong&gt;[16]&lt;/strong&gt;. It follows the principles &lt;strong&gt;[17]&lt;/strong&gt; set out and can be used in conjunction with ISO 37101.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ISO 37120 was the first ISO Standard on Global City Indicators published in the year 2014, developed on the basis of a set of indicators developed and extensively tested by the Global City Indicators Facility (a project by University of Toronto) and its 250+ member cities globally. GCIF is committed to build standardized city indicators for performance management including a database of comparable statistics that allow cities to track their effectiveness on everything from planning and economic growth to transportation, safety and education &lt;strong&gt;[18]&lt;/strong&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The World Council on City Data (WCCD) &lt;strong&gt;[19]&lt;/strong&gt; - a sister organization of the GCI/GCIF - was established in the year 2014 to operationalize ISO 37120 across cities globally. The standards encompasses 100 indicators developed around 17 themes to support city services and quality of life, and is accessible through the WCCD Open City Data Portal which allows for cutting-edge visualizations and comparisons. Indian cities are not yet listed with WCCD &lt;strong&gt;[20]&lt;/strong&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The indicators are listed under the following heads &lt;strong&gt;[21]&lt;/strong&gt;:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Economy&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Education&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Environment&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Energy&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Finance&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Fire and Emergency Responses&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Governance&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Health&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Safety&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Shelter&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Recreation&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Solid Waste&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Telecommunication and innovation&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Transportation&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Urban Planning&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Waste water&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Water and Sanitation&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This International Standard is applicable to any city, municipality or local government that undertakes to measure its performance in a comparable and verifiable manner, irrespective of size and location or level of development. City indicators have the potential to be used as critical tools for city managers, politicians, researchers, business leaders, planners, designers and other professionals &lt;strong&gt;[22]&lt;/strong&gt;. The WCCD forum highlights need for cities to have a set of globally standardized indicators to &lt;strong&gt;[23]&lt;/strong&gt;:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Manage and make informed decisions through data analysis&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Benchmark and target&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Leverage Funding with senior levels of government&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Plan and establish new frameworks for sustainable urban development&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;Evaluate the impact of infrastructure projects on the overall performance of a city.&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h4 style="text-align: justify; "&gt;ISO/DTR 37121- Inventory and Review of Existing Indicators on Sustainable Development and Resilience in Cities&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The second standard under ISO TC 268 WG 2 is ISO 37121, which defines additional indicators related to sustainable development and resilience in cities. Some of the indicators include: Smart Cities, Smart Grid, Economic Resilience, Green Buildings, Political Resilience, Protection of biodiversity, etc. The complete list can be viewed on the Resilient Cities website &lt;strong&gt;[24]&lt;/strong&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Working Group 3:&lt;/strong&gt; Terminology - There are no publicly available documents so far, giving details about the status of the activities of this group. The ISO Technical Committee 268 also includes Sub Committee 1 (Smart Community Infrastructure) &lt;strong&gt;[25]&lt;/strong&gt;, comprising of the following Working Groups: 1) WG 1 Infrastructure metrics, and 2) WG 2 Smart Community Infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The key Smart Cities Standards developed by ISO under this are:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;ISO 37151:2015 Smart community infrastructures — Principles and Requirements for Performance Metrics&lt;/strong&gt;&lt;br /&gt;In the year 2015, a new ISO technical specification for smart cities- 37151:2015 for Principles and requirements for performance metrics was released.  The purpose of standardization in the field of smart community infrastructures such as energy, water, transportation, waste, information and communications technology (ICT), etc. is to promote the international trade of community infrastructure products and services and improve sustainability in communities by establishing harmonized product standards &lt;strong&gt;[26]&lt;/strong&gt;. The metrics in this standard will support city and community managers in planning and measuring performance, and also compare and select procurement proposals for products and services geared at improving community infrastructures &lt;strong&gt;[27]&lt;/strong&gt;. &lt;br /&gt;This Technical Specification gives principles and specifies requirements for the definition,identification, optimization, and harmonization of community infrastructure performance metrics, and gives recommendations for analysis, regarding interoperability, safety, security of community infrastructures &lt;strong&gt;[28]&lt;/strong&gt;. This new Technical Specification supports the use of the ISO 37120 &lt;strong&gt;[29]&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;ISO/TR 37150:2014 Smart Community Infrastructures - Review of Existing Activities Relevant to Metrics&lt;br /&gt;&lt;/strong&gt;This standard addresses community infrastructures such as energy, water, transportation, waste and information and communications technology (ICT). Smart community infrastructures take into consideration environmental impact, economic efficiency and quality of life by using information and communications technology (ICT) and renewable energies to achieve integrated management and optimized control of infrastructures. Integrating smart community infrastructures for a community helps improve the lifestyles of its citizens by, for example: reducing costs, increasing mobility and accessibility, and reducing environmental pollutants.&lt;br /&gt;ISO/TR 37150 reviews relevant metrics for smart community infrastructures and provides stakeholders with a better understanding of the smart community infrastructures available around the world to help promote international trade of community infrastructure products and give information about leading-edge technologies to improve sustainability in communities &lt;strong&gt;[30]&lt;/strong&gt;. This standard, along with the above mentioned standards &lt;strong&gt;[31]&lt;/strong&gt; supports the multi-billion dollar smart cities technology industry.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Several other ISO Working Groups developing standards applicable to smart and sustainable cities have been listed in our website &lt;strong&gt;[32]&lt;/strong&gt;.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;The International Telecommunications Union (ITU)&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The ITU is another global body working on development of standards regarding smart cities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A study group was formed in the year 2015 to tackle standardization requirements for the Internet of Things, with an initial focus on IoT applications in smart cities to address urban development challenges &lt;strong&gt;[33]&lt;/strong&gt;, to enable the coordinated development of IoT technologies, including machine-to-machine communications and ubiquitous sensor networks. The group is titled “ITU-T Study Group 20: IoT and its applications, including smart cities and communities”, established to develop standards that leverage IoT technologies to address urban-development challenges and the mechanisms for the interoperability of IoT applications and datasets employed by various vertically oriented industry sectors &lt;strong&gt;[34]&lt;/strong&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ITU-T also concluded a focused study group looking at smart sustainable cities in May 2015, acting as an open platform for smart city stakeholders to exchange knowledge in the interests of identifying the standardized frameworks needed to support the integration of ICT services in smart cities. Its parent group is ITU-T Study Group 5, which has  agreed on the following definition of a Smart Sustainable City:&lt;br /&gt;"A smart sustainable city is an innovative city that uses information and communication technologies (ICTs) and other means to improve quality of life, efficiency of urban operation and services, and competitiveness, while ensuring that it meets the needs of present and future generations with respect to economic, social, environmental as well as cultural aspects".&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;UK - British Standards Institution&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Apart from the global standards setting organisations, many countries have been looking at developing standards to address the growth of smart cities across the globe. In the UK, the British Standards Institution (BSI) has been commissioned by the UK Department of Business, Innovation and Skills (BIS) to conceive a Smart Cities Standards Strategy to identify vectors of smart city development where standards are needed. The standards would be developed through a consensus-driven process under the BSI to ensure good practise is shared between all the actors. The BIS launched the City's Standards Institute to bring together cities and key industry leaders and innovators to work together in identifying the challenges facing cities, providing solutions to common problems and defining the future of smart city standards &lt;strong&gt;[35]&lt;/strong&gt;.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;PAS 181&lt;/strong&gt; &lt;em&gt;&lt;strong&gt;Smart city framework- Guide to establishing strategies for smart cities and communities&lt;/strong&gt;&lt;/em&gt; establishes a good practice framework for city leaders to develop, agree and deliver smart city strategies that can help transform their city’s ability to meet challenges faced in the future and meet the goals. The smart city framework (SCF) does not intend to describe a one-size-fits-all model for the future of UK cities but focuses on the enabling processes by which the innovative use of technology and data, together with organizational change, can help deliver the diverse visions for future UK cities in more efficient, effective and sustainable ways &lt;strong&gt;[36]&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;PD 8101&lt;/strong&gt; &lt;em&gt;&lt;strong&gt;Smart cities- Guide to the role of the planning and development process&lt;/strong&gt;&lt;/em&gt;&lt;em&gt; &lt;/em&gt;gives guidance regarding planning for new development for smart city plans and&lt;em&gt; &lt;/em&gt;provides an overview of the key issues to be considered and prioritized. The document is for use by local authority planning and regeneration officers to identify good practice in a UK context, and what tools they could use to implement this good practice. This aims to enable new developments to be built in a way that will support smart city aspirations at minimal cost &lt;strong&gt;[37]&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;PAS 182&lt;em&gt; Smart city concept model. Guide to establishing a model for data&lt;/em&gt;&lt;/strong&gt;&lt;em&gt; &lt;/em&gt;establishes an interoperability framework and data-sharing between agencies for smart cities for the following purposes:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;To have a city where information can be shared and understood between organizations and people at each level&lt;/li&gt;
&lt;li&gt;The derivation of data in each layer can be linked back to data in the previous layer &lt;/li&gt;
&lt;li&gt;The impact of a decision can be observed back in operational data. The smart city concept model (SCCM) provides a framework that can normalize and classify information from many sources so that data sets can be discovered and combined to gain a better picture of the needs and behaviours of a city’s citizens (residents and businesses) to help identify issues and devise solutions. PAS 182 is aimed at organizations that provide services to communities in cities, and manage the resulting data, as well as decision-makers and policy developers in cities &lt;strong&gt;[38]&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt; &lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;PAS 180 Smart cities &lt;em&gt;Vocabulary&lt;/em&gt;&lt;/strong&gt; helps build a strong foundation for future standardization and good practices by providing an industry-agreed understanding of smart city terms and definitions to be used in the UK. It provides a working definition of a Smart City- “Smart Cities” is a term denoting the effective integration of physical, digital and human systems in the built environment to deliver a sustainable, prosperous and inclusive future for its citizens &lt;strong&gt;[39]&lt;/strong&gt;. This aims to help improve communication and understanding of smart cities by providing a common language for developers, designers, manufacturers and clients. The standard also defines smart city concepts across different infrastructure and systems’ elements used across all service delivery channels and is intended for city authorities and planners, buyers of smart city services and solutions &lt;strong&gt;[40]&lt;/strong&gt;, as well as product and service providers.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Endnotes&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iec.ch/whitepaper/pdf/iecWP-smartcities-LR-en.pdf"&gt;http://www.iec.ch/whitepaper/pdf/iecWP-smartcities-LR-en.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.ibm.com/smarterplanet/in/en/sustainable_cities/ideas/"&gt;http://www.ibm.com/smarterplanet/in/en/sustainable_cities/ideas/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.thehindubusinessline.com/economy/smart-cities-mission-welcome-to-tomorrows-world/article8163690.ece"&gt;http://www.thehindubusinessline.com/economy/smart-cities-mission-welcome-to-tomorrows-world/article8163690.ece&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iec.ch/whitepaper/pdf/iecWP-smartcities-LR-en.pdf"&gt;http://www.iec.ch/whitepaper/pdf/iecWP-smartcities-LR-en.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[5]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iso.org/iso/news.htm?refid=Ref2042"&gt;http://www.iso.org/iso/news.htm?refid=Ref2042&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[6]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.livemint.com/Companies/5Twmf8dUutLsJceegZ7I9K/Nasscom-partners-Accenture-to-form-ICT-framework-for-smart-c.html"&gt;http://www.livemint.com/Companies/5Twmf8dUutLsJceegZ7I9K/Nasscom-partners-Accenture-to-form-ICT-framework-for-smart-c.html&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.nasscom.in/integrated-ict-and-geospatial-technologies-framework-100-smart-cities-mission"&gt;http://www.nasscom.in/integrated-ict-and-geospatial-technologies-framework-100-smart-cities-mission&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.cxotoday.com/story/nasscom-creates-framework-for-smart-cities-project/"&gt;http://www.cxotoday.com/story/nasscom-creates-framework-for-smart-cities-project/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[9]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.livemint.com/Companies/5Twmf8dUutLsJceegZ7I9K/Nasscom-partners-Accenture-to-form-ICT-framework-for-smart-c.html"&gt;http://www.livemint.com/Companies/5Twmf8dUutLsJceegZ7I9K/Nasscom-partners-Accenture-to-form-ICT-framework-for-smart-c.html&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[10]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/in-a-first-bis-to-come-up-with-standards-for-smart-cities-115060400931_1.html"&gt;http://www.business-standard.com/article/economy-policy/in-a-first-bis-to-come-up-with-standards-for-smart-cities-115060400931_1.html&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[11]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.longfinance.net/groups7/viewdiscussion/72-financing-financing-tomorrow-s-cities-how-standards-can-support-the-development-of-smart-cities.html?groupid=3"&gt;http://www.longfinance.net/groups7/viewdiscussion/72-financing-financing-tomorrow-s-cities-how-standards-can-support-the-development-of-smart-cities.html?groupid=3&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[12]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iso.org/iso/iso_technical_committee?commid=656906"&gt;http://www.iso.org/iso/iso_technical_committee?commid=656906&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[13]&lt;/strong&gt; See: &lt;a class="external-link" href="http://cityminded.org/wp-content/uploads/2014/11/Patricia_McCarney_PDF.pdf"&gt;http://cityminded.org/wp-content/uploads/2014/11/Patricia_McCarney_PDF.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[14]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iso.org/iso/news.htm?refid=Ref1877"&gt;http://www.iso.org/iso/news.htm?refid=Ref1877&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[15]&lt;/strong&gt; See: &lt;a class="external-link" href="http://smartcitiescouncil.com/article/new-iso-standard-gives-cities-common-performance-yardstick"&gt;http://smartcitiescouncil.com/article/new-iso-standard-gives-cities-common-performance-yardstick&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[16]&lt;/strong&gt; See: &lt;a class="external-link" href="http://smartcitiescouncil.com/article/dissecting-iso-37120-why-new-smart-city-standard-good-news-cities"&gt;http://smartcitiescouncil.com/article/dissecting-iso-37120-why-new-smart-city-standard-good-news-cities&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[17]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iso.org/iso/catalogue_detail?csnumber=62436"&gt;http://www.iso.org/iso/catalogue_detail?csnumber=62436&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[18]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.cityindicators.org/"&gt;http://www.cityindicators.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[19]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.dataforcities.org/"&gt;http://www.dataforcities.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[20]&lt;/strong&gt; See: &lt;a class="external-link" href="http://news.dataforcities.org/2015/12/world-council-on-city-data-and-hatch.html"&gt;http://news.dataforcities.org/2015/12/world-council-on-city-data-and-hatch.html&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[21]&lt;/strong&gt; See: &lt;a class="external-link" href="http://news.dataforcities.org/2015/12/world-council-on-city-data-and-hatch.html"&gt;http://news.dataforcities.org/2015/12/world-council-on-city-data-and-hatch.html&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[22]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iso.org/iso/37120_briefing_note.pdf"&gt;http://www.iso.org/iso/37120_briefing_note.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[23]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.dataforcities.org/wccd/"&gt;http://www.dataforcities.org/wccd/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[24]&lt;/strong&gt; See: &lt;a class="external-link" href="http://resilient-cities.iclei.org/fileadmin/sites/resilient-cities/files/Webinar_Series/HERNANDEZ_-_ICLEI_Resilient_Cities_Webinar__FINAL_.pdf"&gt;http://resilient-cities.iclei.org/fileadmin/sites/resilient-cities/files/Webinar_Series/HERNANDEZ_-_ICLEI_Resilient_Cities_Webinar__FINAL_.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[25]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iso.org/iso/iso_technical_committee?commid=656967"&gt;http://www.iso.org/iso/iso_technical_committee?commid=656967&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[26]&lt;/strong&gt; See: &lt;a class="external-link" href="https://www.iso.org/obp/ui/#iso:std:iso:ts:37151:ed-1:v1:en"&gt;https://www.iso.org/obp/ui/#iso:std:iso:ts:37151:ed-1:v1:en&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[27]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iso.org/iso/home/news_index/news_archive/news.htm?refid=Ref2001&amp;amp;utm_medium=email&amp;amp;utm_campaign=ISO+Newsletter+November&amp;amp;utm_content=ISO+Newsletter+November+CID_4182720c31ca2e71fa93d7c1f1e66e2f&amp;amp;utm_source=Email%20marketing%20software&amp;amp;utm_term=Read%20more"&gt;http://www.iso.org/iso/home/news_index/news_archive/news.htm?refid=Ref2001&amp;amp;utm_medium=email&amp;amp;utm_campaign=ISO+Newsletter+November&amp;amp;utm_content=ISO+Newsletter+November+CID_4182720c31ca2e71fa93d7c1f1e66e2f&amp;amp;utm_source=Email%20marketing%20software&amp;amp;utm_term=Read%20more&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[28]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iso.org/iso/37120_briefing_note.pdf"&gt;http://www.iso.org/iso/37120_briefing_note.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[29]&lt;/strong&gt; See: &lt;a class="external-link" href="http://standardsforum.com/isots-37151-smart-cities-metrics/"&gt;http://standardsforum.com/isots-37151-smart-cities-metrics/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[30]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iso.org/iso/executive_summary_iso_37150.pdf"&gt;http://www.iso.org/iso/executive_summary_iso_37150.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[31]&lt;/strong&gt; See: &lt;a class="external-link" href="http://standardsforum.com/isots-37151-smart-cities-metrics/"&gt;http://standardsforum.com/isots-37151-smart-cities-metrics/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[32]&lt;/strong&gt; See: &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/database-on-big-data-and-smart-cities-international-standards"&gt;http://cis-india.org/internet-governance/blog/database-on-big-data-and-smart-cities-international-standards&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[33]&lt;/strong&gt; See: &lt;a class="external-link" href="http://smartcitiescouncil.com/article/itu-takes-internet-things-standards-smart-cities"&gt;http://smartcitiescouncil.com/article/itu-takes-internet-things-standards-smart-cities&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[34]&lt;/strong&gt; See: &lt;a class="external-link" href="https://www.itu.int/net/pressoffice/press_releases/2015/22.aspx"&gt;https://www.itu.int/net/pressoffice/press_releases/2015/22.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[35]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.bsigroup.com/en-GB/smart-cities/"&gt;http://www.bsigroup.com/en-GB/smart-cities/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[36]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-181-smart-cities-framework/"&gt;http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-181-smart-cities-framework/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[37]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PD-8101-smart-cities-planning-guidelines/"&gt;http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PD-8101-smart-cities-planning-guidelines/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[38]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-182-smart-cities-data-concept-model/"&gt;http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-182-smart-cities-data-concept-model/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[39]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.iso.org/iso/smart_cities_report-jtc1.pdf"&gt;http://www.iso.org/iso/smart_cities_report-jtc1.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;[40]&lt;/strong&gt; See: &lt;a class="external-link" href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-180-smart-cities-terminology/"&gt;http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-180-smart-cities-terminology/&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/adoption-of-standards-in-smart-cities-way-forward-for-india'&gt;https://cis-india.org/internet-governance/blog/adoption-of-standards-in-smart-cities-way-forward-for-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Smart Cities</dc:subject>
    

   <dc:date>2016-04-11T03:04:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/privacy-bill">
    <title>Activists welcome privacy Bill, but point out concerns</title>
    <link>https://cis-india.org/news/privacy-bill</link>
    <description>
        &lt;b&gt;Experts have welcomed the government's move to bring in a law for protecting individual privacy, amid concerns about the potential misuse of personal data it is collecting to execute social welfare and security schemes.&lt;/b&gt;
        
&lt;p&gt;But they warn that overlaps with existing laws, a limited consultation process and failure to keep up with technological advances could undercut the utility of the planned legislation.&lt;/p&gt;
&lt;p&gt;The Union government has set up a panel of secretary-level officials to prepare a blueprint for a law to protect individual privacy and personal data from misuse, even by the government, Mint reported on Monday.&lt;/p&gt;
&lt;p&gt;The government is collecting personal data to operate schemes such as Aadhaar--a project to provide numeric identity cards to all residents, and the National Intelligence Grid (Natgrid), which will track information obtained by 11 law enforcement and intelligence agencies.&lt;/p&gt;
&lt;p&gt;These agencies can access details of phone calls, credit card transactions, visa, immigration and property records, and driving licences of all citizens, as well as their iris and thumb-prints.&lt;/p&gt;
&lt;p&gt;Lawrence Liang, a lawyer who works with Bangalore-based Alternative Law Forum, said the planned law will check the manner in which private companies use the personal data of citizens.&lt;/p&gt;
&lt;p&gt;"Currently, there are only private contracts between individuals and companies on how personal data is used. With this legislation, the individual is more empowered. The state can back him better in case of a dispute," he said.&lt;/p&gt;
&lt;p&gt;Sunil Abraham, executive director of the Bangalore-based Centre for Internet and Society, which has protested Aadhaar's project structure, also welcomed the move.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;"The privacy Bill guidelines are fairly broad. It is early days yet. 
Their will be a large overlap between the privacy and Aadhaar Bills," he
 said.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Faking biometric data, for instance, isn't a violation of privacy in the proposed law but could be criminally cognizable under the Aadhaar Bill, Abraham said. "It will be interesting to see how these issues are tackled as there are several nuances and grey areas."&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;A scientist at the Institute for Genomics and Integrative Biology in New Delhi said new kinds of privacy issues will emerge because of the imminent rise of bioinformatics applications.&lt;/p&gt;
&lt;p&gt;There are no products or applications today that rely solely on biometric information to breach individual privacy, he said, requesting anonymity.&lt;/p&gt;
&lt;p&gt;"But within five years, it will be easier to collect biometric information and link it to other details such as credit card information and driving licence numbers on a large scale. There could then be issues of privacy that will emerge," he added.&lt;/p&gt;
&lt;p&gt;Leo Saldanah, coordinator at the Bangalore-based Environment Support Group and another critic of Aadhaar, said the planned privacy Bill is a sham.&lt;/p&gt;
&lt;p&gt;"Privacy is anyway enumerated in our constitutional rights under Article 21. But governments have anyway accessed information via phone taps unencumbered," he said. "I don't think the existence of legislation per se will change matters on the ground."&lt;/p&gt;
&lt;p&gt;Link to the article on &lt;a class="external-link" href="http://dailyme.com/story/2010062300000561/activists-privacy-bill-point-concerns.html"&gt;DailyMe&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For the article in &lt;a class="external-link" href="http://epaper.livemint.com/Default.aspx?Id=38552F6A3347414A695675474755514C62327137543967684A734776784A4349514145755869394D7665673D"&gt;Livemint&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/privacy-bill'&gt;https://cis-india.org/news/privacy-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T11:42:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindu-businessline-november-1-2019-kv-kurmanath-activists-demand-judicial-probe-into-whatsapp-snooping">
    <title>Activists demand judicial probe into WhatsApp snooping</title>
    <link>https://cis-india.org/internet-governance/news/hindu-businessline-november-1-2019-kv-kurmanath-activists-demand-judicial-probe-into-whatsapp-snooping</link>
    <description>
        &lt;b&gt;Calls for Parliamentary supervision over Government interception, legal hacking.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by K.V. Kurmanath was &lt;a class="external-link" href="https://www.thehindubusinessline.com/info-tech/social-media/activists-demand-judicial-probe-into-whatsapp-snooping/article29851296.ece"&gt;published in the Hindu Businessline&lt;/a&gt; on November 1, 2019. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;With reports of Israeli spyware being used to snoop on scores of WhatsApp subscribers, cyber security activists have appealed to the Supreme Court to take up the issue suo moto and order an inquiry. Kiran Chandra, a leader of the Free Software Movement of India, has said that the Government should rein in WhatsApp and mandate it to submit the source code, stating that the privacy of individuals is at stake.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though reports of a breach of the WhatsApp network hit the headlines in the US six months ago, it is only in the last few days that the impact in India has become a burning issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We, for long, have been arguing that the privacy of individuals on the Internet is at risk. The Government should have enough safeguards to ensure their safety,” said Chandra.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, Executive Director of the Centre for Internet and Society, has called for a dedicated law to ensure Parliamentary supervision for all Government interception and legal hacking programmes.  "The data protection law which is being contemplated by the current administration will not address the surveillance policy question in totality," he pointed out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It is a truly worrying development that members of civil society are being targeted using sophisticated surveillance technologies without proper legal basis and without any oversight," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber security and privacy experts took to social media to express concern about the vulnerabilities that expose people to potential risks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Srinivas Kodali, a privacy activist, said the use of Israeli firm NSO Group’s Pegasus spyware to monitor human rights defenders and academics is a clear violation of their fundamental rights. “The Supreme Court judgement on right to privacy has been very loud and clear that Indians’ fundamental rights can’t be exempted under national security without defining it,” he said, responding to a query on the breach of WhatsApp subscribers’ privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The operations of national security agencies are completely hidden and are not subjected to any legislative or judicial oversight. This cannot continue as they misuse the powers bestowed on themselves without any law on surveillance from Parliament,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Internet Freedom Foundation has expressed concerns about the breaches. It wanted the Government to explain on how this spyware was used in India to hack citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The Government must issue an official public statement providing complete information. It must also clarify which law empowers it to install such spyware,” it said in a statement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The US-based social media platform has started sending messages to subscribers whose accounts may have been compromised. It contains information about the breach and a link with a to-do list to stay safe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The victims of the attack, which purportedly took place in April-May 2019, included human rights activists, journalists and Dalit activists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At least two victims of the spyware attack confirmed receipt of alert messages from WhatsApp. “I received a call (from abroad) in the first week of October. But I ignored it as it was from an unknown number. I received a message from WhatsApp, alerting me about a probable intrusion,” a civil rights lawyer said.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;strong&gt;How it happened&lt;/strong&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;“In May, we stopped an attack where an advanced cyber actor exploited our video calling to install malware on user devices. There’s a possibility this phone number was impacted, and we want to make sure you know how to keep your mobile phone secure,” the message received by the victim said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;WhatsApp, a Facebook arm, sent these special messages to about 1,400 users who may have been impacted by the spyware attack. It is working with The Citizen Lab, a research group with the University of Toronto’s Munk School, to assess the impact of the attack on civil society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a statement, WhatsApp said: “We provide end-to-end encryption for all messages and calls by default. (But) This attack was developed to access messages after they were decrypted on an infected device, abusing in-app vulnerabilities and the operating systems that power our mobile phones.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;WhatsApp moved a US court against the Israeli company NSO Group, and its parent company Q Cyber Technologies, alleging that they violated both US and California laws and WhatsApp’s Terms of Service, which prohibited such intrusions.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindu-businessline-november-1-2019-kv-kurmanath-activists-demand-judicial-probe-into-whatsapp-snooping'&gt;https://cis-india.org/internet-governance/news/hindu-businessline-november-1-2019-kv-kurmanath-activists-demand-judicial-probe-into-whatsapp-snooping&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>KV Kurmanath</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-11-15T00:53:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/activists-cry-foul-against-aadhaar">
    <title>Activists cry foul against Aadhaar</title>
    <link>https://cis-india.org/news/activists-cry-foul-against-aadhaar</link>
    <description>
        &lt;b&gt;Biometric experts, jurists and social activists today urged the state government to immediately snap ties with the Unique Identification Authority of India (UIDAI) and stop offering Aadhaar numbers to residents. &lt;/b&gt;
        
&lt;p&gt;Arguing that the creation of Aadhaar numbers had no legislative base as the National Identification Authority of India Bill, 2010, was pending with Parliament, civil society members said UIDAI’s project was unconstitutional.&lt;br /&gt;&lt;br /&gt;They pointed out that the parliamentary standing committee had termed the biometric project “directionless”.&lt;br /&gt;&lt;br /&gt;“The biometric database of citizens, management of which will remain in the hands of some private companies, severely infringes on the right of citizens to privacy. A rule relating to security of biometric data is yet to come up, but UIDAI is going on generating them,” said Usha Ramanathan, a jurist from Delhi at a meeting on the UID project here.&lt;br /&gt;&lt;br /&gt;The meet on Aadhaar was convened in the state capital by the Indian Social Action Forum. The participants included social activist Dayamani Barla, director of Bangalore-based Centre for Internet and Society Sunil Abraham, biometric expert from Mumbai J.T. D’ Souza and member of Citizens’ Forum for Civil Liberties Gopal Krishna, among others.&lt;br /&gt;&lt;br /&gt;The unique numbers are expected to be utilised extensively, from opening bank accounts to applying for LPG connections. UIDAI has already generated roughly 10 crore unique numbers.&lt;br /&gt;&lt;br /&gt;Neither the Citizenship Act, 1955, nor Citizenship Rules of 2003 permit collection of biometrics, the experts added. “Both the UID and National Population Registrar projects adopt technology that risks national and individual security,” observed D’ Souza.&lt;/p&gt;
&lt;p&gt;The news was published in the Telegraph on Thursday, 12 January 2012. Read the original story &lt;a class="external-link" href="http://www.telegraphindia.com/1120112/jsp/jharkhand/story_14994745.jsp"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/activists-cry-foul-against-aadhaar'&gt;https://cis-india.org/news/activists-cry-foul-against-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-01-31T04:24:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks">
    <title>Act now to protect yourself against future ransomware attacks</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks</link>
    <description>
        &lt;b&gt;There was Wannacry, then Petya, and several other lesser-known ones: With ransomware attacks coming thick and fast, get proactive about protecting yourself.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sanjay Kumar Singh was published by &lt;a class="external-link" href="http://www.business-standard.com/article/markets/act-now-to-protect-yourself-against-future-attacks-117070400742_1.html"&gt;Business Standard&lt;/a&gt; on July 5, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Wannacry ransomware attack in May was followed by the Petya attack last week. This attack affected the Ukrainian government and large corporates like Maersk and Merck. In India it affected the operations of terminals at Jawaharlal Nehru Port Trust (JNPT), operated by Maersk. According to Kaspersky Lab, the rate of ransomware attacks on businesses grew from one every 120 seconds in January 2016 to one every 40 seconds by October that year. The rate of attack on individuals' computers rose from one every 20 seconds to one every 10 seconds over this period. Today, it has become imperative for everyone, including entrepreneurs and small business owners, to learn how to defend themselves against such attacks.          &lt;br /&gt;&lt;br /&gt;A trend witnessed in 2016 was the growth of ransomware-as-a-service business model. "Code creators offer their malicious product on demand, selling uniquely modified versions to criminals who then distribute it through spam and websites, paying a commission to the creator," says Altaf Halde, managing director, Kaspersky Lab (South Asia). He adds that the growth of cashless payments in India will undoubtedly attract the attention of cyber criminals and lead to more attacks in future.   &lt;br /&gt;&lt;br /&gt;Next, let us turn to how ransomware works. An operating system (OS) is a large and complicated piece of software with millions of lines of software code. A malware exploits vulnerabilities within the OS to infiltrate it. An infiltration can happen in multiple ways: if you download a malicious email attachment, visit a code-carrying web site, via an infected pen drive, and so on.&lt;br /&gt;&lt;br /&gt;Ransomware is a form of malware that encrypts the files in a critical part of the computer, such as My Documents or Desktop, where people usually store their files. It could also encrypt specific file types, say, such .doc files. The user is then informed that his files have been encrypted along with the warning that unless he pays up within the next few hours his files will be deleted. Says Udbhav Tiwari, policy officer at the Centre for Internet and Society, Bengaluru: "You first have to first pay the attackers using anonymous money like bitcoins and then they give you the key for decrypting your files."&lt;br /&gt;&lt;br /&gt;A ransomware attack can be dealt with in two ways: either pay the money and get the files unlocked, or find a way to circumvent the encryption. The latter option can, however, take a fair bit of time.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;Safeguard measure you should adopt&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Back up important files regularly. Check periodically that these files have not  got damaged&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Enable ‘Show file extensions’ option in Windows settings. Stay away from extensions like “exe”, “vbs” and “scr”. Many &lt;a href="http://www.howtogeek.com/137270/50-file-extensions-that-are-potentially-dangerous-on-windows/" target="_blank"&gt;familiar file types can be dangerous&lt;/a&gt; as scammers use multiple extensions (like hot-chics.avi.exe or doc.scr)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If you discover an unknown process on your machine, cut off the Internet connection immediately&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If you have been infected, find the name of the ransomware. If it's an older version, your files can be restored. For restoration tools visit &lt;a href="https://www.nomoreransom.org/" target="_blank"&gt;https://www.nomoreransom.org/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Among the safeguard measures you should adopt, first and foremost, never open a suspicious file. By being vigilant you can avoid a lot of ransomware attacks.&lt;br /&gt;&lt;br /&gt;Most malware exploit vulnerabilities within the OS. "These vulnerabilities are frequently patched by the creators of the OS. But if people use pirated OS, or don't upgrade it regularly, they could land in trouble," says Tiwari. Soon after the Wannacry attack, Microsoft had issued a patch. People who updated their computers immediately didn't get affected by it. Also, use the latest version of an OS.&lt;br /&gt;&lt;br /&gt; Use a quality antivirus (AV) solution, which is usually one you have to pay for. A high-quality AV can even protect you against vulnerabilities not patched by the OS manufacturer. AVs scan files. If they detect patterns indicating the presence of malware, they lock them apart from the rest of the computer, thereby preventing them from spreading.&lt;br /&gt;&lt;br /&gt; One option is to use an OS that is less vulnerable, like Mac and Linux. Fewer malware are designed for these OS as fewer people use them.&lt;br /&gt;&lt;br /&gt;Finally, if your files do get encrypted, don’t pay the ransom, unless instant access to those files is critical. "Each payment only fuels this unlawful business," says Halde.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks'&gt;https://cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-07-10T14:46:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/accountability-of-icann">
    <title>Accountability of ICANN</title>
    <link>https://cis-india.org/internet-governance/blog/accountability-of-icann</link>
    <description>
        &lt;b&gt;The issue of how to ensure the legitimacy and accountability of ICANN is a concern which finds voice in many of the proposals. Four broad stands can be gleaned from the submissions to NETmundial '14 on this issue. &lt;/b&gt;
        &lt;p&gt;&lt;span&gt;The issue of how to ensure the legitimacy and accountability of ICANN is a concern which finds voice in many of the proposals. Generally speaking, the issue of representation, and legitimacy of ICANN members is a point which all proposals regarding ICANN accountability consider. The issue of funding also came up in several of the submissions. The Brazilian Internet Steering Committee, Joint Contribution of Civil Society from Latin America, submissions from University of Gezira in Sudan and NIC Mexico, called for increased funding for participation of stakeholders from developing countries in ICANN and other multistakeholder meetings. The Government of Austria expressed concern over dwindling funding of IGF and called for improvement of the same. In this scenario of crunched funds, submissions by Article 19 and BestBits as well as Net Coalition proposed the use of a percentage of ICANN’s gTLD revenues to fund inclusive participation in the multistakeholder process.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Apart from these concerns, submissions to NetMundial '14 also raised a myriad of different issues around the functioning of ICANN. Nevertheless, four broad stands can be gleaned from the issue of accountability of ICANN. These are as follows:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;I. &lt;/strong&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;Submissions which suggest that oversight over ICANN should end, and ICANN accountability should be internalised.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;8 submissions to the NetMundial 2014 were of the opinion that ICANN should become an independent body with no oversight exercised by any other body on it. In other words, these proposals opposed the replacement of current US government oversight on ICANN, by oversight through any other body. In such a case, accountability of ICANN was sought to be ensured through strengthening multistakeholderism and reform &lt;i&gt;within&lt;/i&gt; the ICANN structure.&lt;/p&gt;
&lt;p&gt;Most of these submissions came from the civil society (4) or the technical community (2); 1 from Panel on Global Internet Cooperation and Governance Mechanisms, which identifies as “other”, and 1 from the Government of France. 3 of these proposals represent a global community, 2 come from North America or USA, 1 from France, 1 from New Zealand and 1 from the Democratic Republic of Congo.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The ICANN model proposed in the &lt;/span&gt;&lt;a href="http://content.netmundial.br/contribution/roadmap-for-globalizing-iana-four-principles-and-a-proposal-for-reform-a-submission-to-the-global-multistakeholder-meeting-on-the-future-of-internet-governance/96"&gt;submission from Internet Governance Project&lt;/a&gt;&lt;span&gt; (IGP), from the North American civil society, found support among other contributors in this category. The proposal was based on the principle that oversight of ICANN must not be internationalised but ended. The rationale behind such proposal was that giving additional stakeholders besides the NTIA a say in IANA function and ICANN oversight will only politicise ICANN and make it a subject of possible geopolitical power struggles by governments, ultimately ignoring the interests of internet users all over the world. While calling for an end to ICANN oversight through any or all government agencies, the proposal also called for the strengthening of multistakeholderism within ICANN. This proposal was explicitly supported by &lt;/span&gt;&lt;a href="http://content.netmundial.br/contribution/content-contribution-to-netmundial-on-the-roadmap-for-the-futher-evolution-of-the-ig-ecosystem-regarding-the-internationalisation-of-the-iana-function/130"&gt;InternetNZ, from the New Zealand technical community, in its proposal&lt;/a&gt;&lt;span&gt;, as well as to quite an extent by &lt;/span&gt;&lt;a href="http://content.netmundial.br/contribution/roadmap-for-the-further-evolution-of-the-internet-governance-ecosystem-icann/109"&gt;Article 19 and BestBits, from the global civil society, in their proposal&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;IGP’s submission also suggested whittling down of ICANN’s powers in order to separate management of IANA functions from ICANN’s present mandate. This is a point where the submissions in this category diverge. Submissions from IGP with Article 19 and BestBits, Association for Progressive Communications (APC) from the civil society and InternetNZ and Avri Doria, from the technical community, recommended the separation of IANA functions from the ICANN. &lt;a href="http://content.netmundial.br/contribution/french-government-submission-to-netmundial/154"&gt;The French Government submission&lt;/a&gt;, on the other hand, did not envisage separation of management IANA function from ICANN, but rather the internalisation of the former within the latter, even as proposing an independent and multistakeholder structure for ICANN with suitable accountability mechanisms for all stakeholders.&lt;/p&gt;
&lt;p&gt;The submission from Article 19 and BestBits, in fact, suggested further narrowing of ICANN’s mandate by explicitly including a clause in its bylaws to prevent it from engaging in content regulation or conduct that could violate freedom of expression or privacy on the internet, including technical policy making involving trademarks and intellectual property. Such suggestions were made based on the fear that, if unregulated, ICANN might increasingly make its foray into public policy issues like content regulation, as happened in the .xxx controversy. Consequently, the submission from Article 19 and BestBits also suggested that ICANN’s bylaws include a provision whereby private parties can legally challenge ICANN’s actions on grounds of human rights violations before local courts or arbitration tribunals.&lt;/p&gt;
&lt;p&gt;This approval for local dispute resolution when the submission agrees with the suitability of Californian law for ICANN incorporation is, however, likely to cause consternation amongst non-American stakeholders. While the submission is not averse to the idea of ICANN expanding its reach globally through creation of subsidiaries (preferably in western Europe), it also takes a firm stand on ICANN not moving its headquarters out of the US. The advantages of such status quo are seen in stability of current agreements with registrars etc., but the idea of ICANN being ultimately subject to Californian law and its courts is unlikely to go down well with other global stakeholders.&lt;/p&gt;
&lt;p&gt;One concern found across board, but more explicitly in submissions of Article 19 and BestBits and Avri Doria was the strengthening of ICANN board by making it more representative and accountable through mechanisms of internal accountability like the ATRT2 Transparency and Accountability Review process. &lt;a href="http://content.netmundial.br/contribution/bottom-up-oversight-in-multistakeholder-organizations/237"&gt;Avri Doria of USA, in her submission&lt;/a&gt; suggested, the improvement of accountability mechanisms in ICANN by supplementing the ATRT process with a strong appeals mechanism, as found in IETF, for accountability process and results with powers to remove officers from their roles if they do not fulfil their responsibilities. Strengthening of GAC within ICANN by making it more participatory and representative is another concern which is highlighted.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;II. &lt;/strong&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;Submissions which suggest that oversight of ICANN should be transferred to a multilateral or intergovernmental body&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A second, small category of 4 submissions argued that the oversight function of the ICANN should be transferred from the present unilateral U.S. government (NTIA) oversight, to oversight by all countries. This was suggested to counter the power imbalance exercised by one country over critical internet infrastructure, over others, by sharing oversight of ICANN with all others.&lt;/p&gt;
&lt;p&gt;In their details, submissions in this category can be vague. While some of them envisioned transfer of ICANN control by the US Government to an intergovernmental body like the ITU, others do not specify the details of the transfer, but merely mention that ICANN oversight should be multilateral in nature. &lt;a href="http://content.netmundial.br/contribution/internet-governance-principles-securing-the-future-of-the-internet/233"&gt;Submissions from CIPIT&lt;/a&gt;, part of the Kenyan academia and &lt;a href="http://content.netmundial.br/contribution/towards-reform-of-global-internet-governance/240"&gt;The Society for Knowledge Commons&lt;/a&gt;, civil society stakeholder covering India and Brazil, mentioned that the oversight of technical policy functions should be “multilateral” in nature, while the &lt;a href="http://content.netmundial.br/contribution/contribution-from-the-islamic-republic-of-iran-to-the-global-multiskaeholder-meeting-for-the-future-of-the-internet-23-24-april-2014-sao-paolo-brazil/236"&gt;submission by the Government of Iran&lt;/a&gt; called for restructuring ICANN as an “international” organisation.&lt;/p&gt;
&lt;p&gt;The &lt;a href="http://content.netmundial.br/contribution/roadmaps-for-further-evolution-of-internet-governance/65"&gt;submission by Swiss civil society organisation, Association for Proper Internet Governance&lt;/a&gt;, referred &lt;a href="http://www.ntia.doc.gov/legacy/ntiahome/domainname/dnstransition/comments/dnstrans_comment0081.htm"&gt;to the response by the Syrian representative in ITU to RFC&lt;/a&gt; sought by the US Department of Commerce, to bring ICANN in the aegis of ITU by signing of a MoU between the two entities, as far as technical policy decisions (eg. development of policies relating to operation of root servers and those relating to operation and administration of gTLDs and ccTLDs) are concerned. Such a proposal was found necessary in light of the non-binding advisory nature of GAC in ICANN, especially when technical policy decisions by ICANN have public policy implications. In such a scenario, the submission dubs it “strange” to relegate government to a subsidiary role within ICANN and “unusual (to say the least)” for governments to constitute a sub-committee of the board of a private company like ICANN. Consequently, the MoU between ITU and ICANN is sought to make GAC a group within ITU so as to strengthen its legitimacy and accountability.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;III. &lt;/strong&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;Submissions which suggest that oversight of ICANN should be transferred to another body not intergovernmental in nature.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;10 submissions suggested the transfer of ICANN oversight to a non-intergovernmental or multilateral body. 2 of these proposals came from governments and 1 from the Brazilian Internet Steering Committee, which identifies as “other”, 3 from the private sector, 2 from civil society and 1 from technical community and academia each. Most of these proposals come from European stakeholders (5), 1 each from Brazil and Argentina, 1 from India, 1 from Nigeria, and 1 from the global civil society group, Just Net Coalition.&lt;/p&gt;
&lt;p&gt;Like the last category, these submissions also expressed their dissatisfaction with the unilateral US Government oversight of ICANN, but suggested replacing it with a non-multilateral body. Details of the composition of such bodies vary. Some called for replacement by a technical body, other envision a wholly newly created multistakeholder body, yet others called for signing of the present ICANN AoC with US Government, by a number of stakeholders, which would not include just governments.&lt;/p&gt;
&lt;p&gt;One such &lt;a href="http://content.netmundial.br/contribution/addressing-"&gt;submission came from Portuguese academic, Luis Magalhaes,&lt;/a&gt; which called for the signature of ICANN AoCs with all the stakeholders in internet governance, thus effectively replacing oversight by NTIA to oversight by all stakeholders. This submission also expressed concern over the incorporation of ICANN under Californian law, and suggests that ICANN should be regulated in an international law framework, though without relinquishing its control to merely governments. &lt;a href="http://content.netmundial.br/contribution/orange/199"&gt;Submission by the private sector stakeholder Orange Group&lt;/a&gt; also looked to expand the AoC of ICANN to include within it, the “ICANN community and stakeholders including Governments represented through the GAC.”&lt;/p&gt;
&lt;p&gt;&lt;a href="http://content.netmundial.br/contribution/nominet-submission-on-internet-governance-principles-and-the-roadmap/156"&gt;Private sector stakeholder from the UK, Nominet, similarly, called&lt;/a&gt; for wider engagement in the ICANN AoC and ensuring wider engagement for transparency and accountability in the AoC process. It also called to end ambiguity about the legal jurisdiction for ICANN, while including and strengthening ITU and IGF in the internet governance ecosystem. &lt;a href="http://content.netmundial.br/contribution/dsci-submission-on-roadmap-for-the-further-evolution-of-internet-governance-ecosystem/256"&gt;Submission by private player, Data Security Council of India&lt;/a&gt;, while endorsing “a multistakeholder model with defined roles of relevant stakeholders” was vaguer about the model it sought for ICANN. But it called for nomination of stakeholders by Governments rather than ICANN selecting them without transparency.&lt;/p&gt;
&lt;p&gt;The &lt;a href="http://content.netmundial.br/contribution/europe-austria-fed-ministry-for-transport-innovation-and-technology/144"&gt;Austrian Government submission&lt;/a&gt;, on the other hand, was more ambiguous. It envisaged the extension of AoCs regarding ICANN and IANA while ensuring “the full participation of all stakeholders, from both developed and developing countries, within their respective roles and responsibilities.” &lt;a href="http://content.netmundial.br/contribution/roadmap-for-the-future-development-of-the-internet-governance-ecosystem/196"&gt;In its submission, the Government of Argentina&lt;/a&gt; sought to “promote the internationalisation of ICANN through a deep revision of the current structure,” and ensure “active representation from all regions and all actors in the ICANN structure, including representatives of governments on an equal footing,” especially in the structures of ICANN Board, SSAC and GNSO.&lt;/p&gt;
&lt;p&gt;The &lt;a href="http://content.netmundial.br/contribution/evolution-and-internationalization-of-icann/263"&gt;submission by Brazilian Internet Steering Committee&lt;/a&gt; similarly, looked to export oversight to entities outside of ICANN in its submission, as long as such entities are recognised as representative of the international public interest. This was suggested with the rationale to avoid a situation where the same organisation is responsible is responsible for policy making as well as its implementation. The Committee also suggested strengthening of ATRT2 process, as well as reform of GNSO and of ALAC so that the latter can have transparent processes for nomination of members, as well as participate in policy development processes in GNSO, along with increased government participation in GNSO. It was also suggested that the number of ICANN Board seats allocated by NomCom should be reduced in order to increase slots for Board members directly elected by the SOs.&lt;/p&gt;
&lt;p&gt;Other submissions offered a more detailed view into the composition of the oversight entity recommended to replace NTIA. &lt;a href="http://content.netmundial.br/contribution/democratising-global-governance-of-the-internet/164"&gt;The submission by global civil society organisation, Just Net Coalition&lt;/a&gt;, for example, proposed the formation of a “Internet Technical and Advisory Board” to discharge ICANN oversight function by replacing the present NTIA oversight role. In addition, this board was recommended to advice on public policy perspectives to various technical standards bodies, and thus act as the link between public policy bodies and these standards bodies. The composition of such a board was recommended to consist of people with specialised technical expertise but also with appropriate political legitimacy, ensured via a democratic process. 10-15 members were envisaged in such a board which could include 1 member from each of the Regional Internet Registries (RIRs). 2-3 members from each of the 5 geographic regions as understood in the UN system to be selected through an appropriate process by the relevant technical standards bodies and/or country domain name bodies of all the countries of the respective region were suggested to be part of the board. It was preferred that these members would come from the top recognised technical academic bodies of each country/region, but the entire constitution of the board was left open to other suggestions in Just Net Coalition’s submission.&lt;/p&gt;
&lt;p&gt;The technical community stakeholder, &lt;a href="http://content.netmundial.br/contribution/from-forum-to-net-nations/292"&gt;Nigeria Internet Registration Association, on the other hand, offered&lt;/a&gt; a rather confused proposal for the formation of a “World Internet Governance Organisation (WIGO),”envisaged as “a global organisation with equal participation of the Government, Private sector, Civil Society, Technical Community in a multi-stakeholder consensus building NET-NATIONS.” But while in the beginning the submission suggests a multistakeholder composition of WIGO, seemingly for oversight of ICANN, later the submission sparks the idea that ICANN itself should be changed to WIGO.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://content.netmundial.br/contribution/the-next-best-stage-for-the-future-of-internet-governance-is-democracy/305"&gt;Global Geneva’s submission&lt;/a&gt; proposed to transfer ICANN oversight to a body called World Internet Forum, which, while part of the UN system, is envisioned as a multistakeholder venue for citizens globally, where constituencies are not governments. ICANN is allowed to pursue technical policy functions like gTLD management under the supervision of WIF, while not encroaching on public policy matters. IANA function is envisaged to be managed separately from the ICANN.&lt;/p&gt;
&lt;p&gt;In many of these submissions, like those of Argentinian Government and Brazilian Internet Steering Committee emphasis was also paid on the strengthening of GAC, while taking into consideration stakeholders other than governments.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;IV. &lt;/strong&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;Submissions which endorse globalisation and multistakeholder governance of ICANN but are vague about the specifics of such governance model&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Lastly, there are submissions which call for the globalisation of ICANN and express their dissatisfaction with the U.S. Government oversight of it, while endorsing multistakeholder governance. However, these submissions are also vague about the details of such ICANN globalisation, and the structures in which it will be held accountable.  4 such submissions emerge from governments (Spain, Norway, Mexico and the European Commission), 6 from the private sector, 2 from the technical community, and 2 from the civil society. Europe leads in this category of proposals with 6 of these proposals emerging from there, 2 from Latin America and Mexico each (4 altogether), 1 from Kuwait, 1 from Japan, 1 from the NRO (identifying itself from Mauritius) and 1 from the global GSM Association of mobile operators.&lt;/p&gt;
&lt;p&gt;A list of these submissions is provided below.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Sl.No.&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Proposal   No. &lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Name   of Proposal&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Organisation&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Sector&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Region&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Link&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;ol&gt;
&lt;li&gt; &lt;/li&gt;
&lt;/ol&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;46&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Norwegian Contribution to the   Sao Paulo Meeting&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Norwegian   government&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Government&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Norway, Europe&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;http://content.netmundial.br/contribution/norwegian-government/137&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;ol&gt;
&lt;li&gt; &lt;/li&gt;
&lt;/ol&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;50&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Contribution from the GSM   Association to the Global Multistakeholder Meeting on the Future of Internet   Governance&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;GSMA&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Private Sector&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Global&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;http://content.netmundial.br/contribution/contribution-from-the-gsm-association-to-the-global-multistakeholder-meeting-on-the-future-of-internet-governance/141&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;ol&gt;
&lt;li&gt; &lt;/li&gt;
&lt;/ol&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;51&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Contribution of Telefonica to   NETmundial&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Telefonica, S.A.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Private Sector&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Spain&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;http://content.netmundial.br/contribution/contribution-of-telefonica-to-netmundial/143&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;ol&gt;
&lt;li&gt; &lt;/li&gt;
&lt;/ol&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;56&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;ETNO Contribution to   NETmundial&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;ETNO   [European Telecommunications Network Operators' Association]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Private Sector&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Belgium&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;http://content.netmundial.br/contribution/etno-contribution-to-netmundial/148&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;ol&gt;
&lt;li&gt; &lt;/li&gt;
&lt;/ol&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;64&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Submission by AHCIET to the   Global Multistakeholder Meeting on the Future of Internet Governance.   NETmundial&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;AHCIET&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Private Sector&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Latin America&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;http://content.netmundial.br/contribution/submission-by-ahciet-to-the-global-multistakeholder-meeting-on-the-future-of-internet-governance-netmundial/157&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;ol&gt;
&lt;li&gt; &lt;/li&gt;
&lt;/ol&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;70&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Spanish Government   Contribution to the Global Multi-stakeholder Meeting on the Future of   Internet Governance&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Ministry of Industry, Energy   and Tourism, Spain&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Government&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Spain&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;http://content.netmundial.br/contribution/multistakeholder-human-rights-stability-gac/165&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;ol&gt;
&lt;li&gt; &lt;/li&gt;
&lt;/ol&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;80&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Roadmap for the Further   Evolution of the Internet Governance Ecosystem&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;European Commission&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Government&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Europe&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;http://content.netmundial.br/contribution/roadmap-for-the-further-evolution-of-the-internet-governance-ecosystem/177&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;ol&gt;
&lt;li&gt;10. &lt;/li&gt;
&lt;/ol&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;106&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Submission on Internet   Governance Principles and Roadmap for the Further Evolution of the Internet Governance   Ecosystem&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Kuwait Information Technology   Society&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Civil Society&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Kuwait&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;http://content.netmundial.br/contribution/kuwait-information-technology-society-kits-submission-on-internet-governance-principles-and-roadmap-for-the-further-evolution-of-the-internet-governance-ecosystem/214&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;ol&gt;
&lt;li&gt; &lt;/li&gt;
&lt;/ol&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;111&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Content Submission by the   Federal Government of Mexico&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Secretara de Comunicaciones y   Transportes, Mexico&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Government&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Mexico&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;http://content.netmundial.br/contribution/content-submission-by-the-federal-government-of-mexico/219&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;114&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Better Understanding and   Co-operation for Internet Governance Principles and Its Roadmap&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Japan Internet Service   Providers Association&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Private Sector&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Japan&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;http://content.netmundial.br/contribution/better-understanding-cooperation-for-internet-governance-principles-its-roadmap/222&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;116&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Deutsche Telekom’s   Contribution for to the Global Multistakeholder Meeting on the Future of   Internet Governance&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Deutsche Telekom AG&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Private Sector&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Germany/Europe&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;http://content.netmundial.br/contribution/deutsche-telekom-s-contribution-for-to-the-global-multistakeholder-meeting-on-the-future-of-internet-governance/225&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;12.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;135&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Joint Contributions of Civil   Society Organisations from Latin America to NetMundial&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Group of individuals and   Civil Society Organizations from Latin America&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Civil Society&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Latin America&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;http://content.netmundial.br/contribution/joint-contributions-of-civil-society-organizations-from-latin-america-to-netmundial/251&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;143&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NRO Contribution to   NETmundial&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NRO (for AFRINIC, APNIC,   ARIN, LACNIC, RIPE-NCC)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Technical Community&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Mauritius&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;http://content.netmundial.br/contribution/nro-contribution-to-netmundial/259&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;14.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;183&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NETmundial Content   Submission- endorsed by NIC Mexico&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NIC Mexico&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Technical Community&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Mexico&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;http://content.netmundial.br/contribution/netmundial-content-submission-endorsed-by-nic-mexico/302&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;***&lt;/p&gt;
&lt;p&gt;A previous version of this post performed preliminary analysis of the NETmundial submissions. It may be found &lt;a href="https://cis-india.org/internet-governance/blog/accountability-of-icann-1" class="internal-link"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/accountability-of-icann'&gt;https://cis-india.org/internet-governance/blog/accountability-of-icann&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>smarika</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>NETmundial</dc:subject>
    

   <dc:date>2014-05-28T10:50:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-august-22-2016-accessing-pirated-content-might-lead-to-prison-term-and-rs-3-lakh-fine">
    <title>Accessing pirated content might lead to prison term &amp; Rs 3-lakh fine</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-august-22-2016-accessing-pirated-content-might-lead-to-prison-term-and-rs-3-lakh-fine</link>
    <description>
        &lt;b&gt;India puts onus of downloading and viewing pirated content on individuals.

&lt;/b&gt;
        &lt;p align="justify"&gt;The article by Alnoor Peermohammed was published in the &lt;a href="http://www.business-standard.com/article/technology/accessing-pirated-content-might-lead-to-prison-term-rs-3-lakh-fine-116082201042_1.html"&gt;Business Standard&lt;/a&gt; on August 22, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr align="justify" size="2" width="100%" /&gt;
&lt;div align="justify"&gt;The central government is putting the onus of downloading and viewing  of copyrighted content from sites it has blocked (with the help of  internet service providers) on users.&lt;/div&gt;
&lt;div align="justify"&gt;&lt;/div&gt;
&lt;div align="justify"&gt;Visiting torrent (a particular type of files) websites while on Tata  Communications’ network recently had users being shown a message that  viewing or downloading content on those sites could land them in prison  for up to three years and a fine of up to Rs 3 lakh.&lt;/div&gt;
&lt;div align="justify"&gt;&lt;/div&gt;
&lt;div align="justify"&gt;“There is not enough room in our prisons to keep these infringers and  enough time in our courts to try them. It might sound very exciting as a  message to put out but, essentially, they’re trying to scare people  into good behaviour,” said Sunil Abraham, executive director at research  firm Centre for Internet and Society.
&lt;div id="div-gpt-ad-1466593210966-0"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div align="justify"&gt;&lt;/div&gt;
&lt;div align="justify"&gt;There has been no change to the Copyright Act of 1957 or the  Information Technology Act of 2000 for the updated notice being shown to  users upon visiting blocked sites. Under these provisions, visiting a  site, which is blocked is not illegal, unless it is child pornography.&lt;br /&gt; &lt;br /&gt;
&lt;div&gt;“Copyright infringement happens all the time and even in developed  countries, the rates are very high. Crackdowns on individuals and  consumers are never going to solve the problem,” added Abraham.&lt;/div&gt;
&lt;div&gt;Experts say the most the government could do is prosecute a couple of  people and make examples of them, to dissuade others. This practice is  followed globally. There are no examples, though, in India of  prosecution for copyright infringement of online content.&lt;br /&gt; &lt;br /&gt;
&lt;div&gt;The recent alteration of the statement seen by users on Tata networks  was done on the directives of the Bombay High Court, after the company  appealed that showing individual messages for why each website was  blocked was not feasible. The resulting message sparked media frenzy  that visitors of blocked websites could now be imprisoned.&lt;/div&gt;
&lt;div&gt;Other media reports revealed that the recent blocking of websites by  internet service providers was prompted by court orders to prevent  piracy of &lt;i&gt;Dishoom&lt;/i&gt;, the Bollywood movie. &lt;br /&gt; &lt;br /&gt; &lt;span class="p-content"&gt;Globally, there’s been a move to clamp on  torrent websites which host pirated content, aided by large information  technology entities such as Apple or Facebook. Last month, the US  authorities arrested Kickass Torrents’ founder, Arten Vaulin, and  blocked all the domains of the website, only to have it resurface a day  later.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-august-22-2016-accessing-pirated-content-might-lead-to-prison-term-and-rs-3-lakh-fine'&gt;https://cis-india.org/internet-governance/news/business-standard-august-22-2016-accessing-pirated-content-might-lead-to-prison-term-and-rs-3-lakh-fine&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    

   <dc:date>2016-08-23T02:47:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-october-8-2015-suhrith-parthasarathy-access-at-the-cost-of-net-neutrality">
    <title>Access at the cost of Net neutrality?</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-october-8-2015-suhrith-parthasarathy-access-at-the-cost-of-net-neutrality</link>
    <description>
        &lt;b&gt;In the Net neutrality debate, there is a conflict between two core values: ease of access and neutrality. The ease of access promised by applications like Free Basics compromises neutrality and may later morph into a method of predatory pricingIf programs that bring access to a part of the Internet in the immediate future were to entrench themselves, it could eventually lead to telecom companies abusing their dominant positionsIn the absence of a specific law mandating a neutral Internet, telecom companies enjoy a virtual carte blanche to discriminate between different applications. Though they have not yet exploited this autonomy fully, they are certainly moving towards that.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Suhrith Parthasarathy was &lt;a class="external-link" href="http://www.thehindu.com/opinion/lead/access-at-the-cost-of-net-neutrality/article7735242.ece"&gt;published in the Hindu&lt;/a&gt; on October 8, 2015. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, the social media giant, Facebook, &lt;a href="http://www.thehindu.com/business/Industry/facebook-rings-reliance-communications-for-free-data-access/article6878396.ece"&gt;formalised a partnership&lt;/a&gt; with Reliance Communications that enabled the Indian company to provide  access to over 30 different websites, without any charge on mobile data  accruing to the ultimate user. The platform, originally known as  “Internet.org,” has now been &lt;a href="http://www.thehindu.com/sci-tech/technology/internet/facebook-rebrands-internetorg-platform-as-free-basics-by-facebook/article7686680.ece"&gt;rebranded&lt;/a&gt; as “Free Basics,” Facebook announced last month. Its fundamental ethos,  though, remains unchanged. It allows Reliance’s subscribers to surf  completely free of cost a bouquet of websites covered within the scheme,  which includes, quite naturally, &lt;a href="http://facebook.com" target="_blank"&gt;facebook.com&lt;/a&gt;.  Mark Zuckerberg, Facebook’s founder, views this supposed initiative as a  philanthropic gesture, as part of a purported, larger aim to bring  access to the Internet to those people who find the costs of using  generally available mobile data prohibitive.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Neutrality, an interpretive concept&lt;/b&gt;&lt;br /&gt; On the face of it, this supposed act of altruism appears to be  commendable. But, there are many critics — some of whom have come  together to launch a website “&lt;a href="http://savetheinternet.in" target="_blank"&gt;savetheinternet.in&lt;/a&gt;”  with a view to defending Internet freedom — who argue that Free Basics  violates what has come to be known as the principle of network (or Net)  neutrality.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;While it is clear to all of us that a notion of Net neutrality involves  some regulation of the Internet, it is less clear what the term actually  means. Like any phrase that involves either a moral or a legal  obligation, Net neutrality is also an interpretive concept. People who  employ the term to denote some sort of binding commitment, or at the  least an aspirational norm, often tend to disagree over precisely how  the idea ought to be accomplished. Tim Wu — an American lawyer and  presently a professor at the Columbia University — who coined the term,  views the notion of Net neutrality as signifying an Internet that does  not favour any one application over another. In other words, the idea is  to ensure that Internet service providers do not discriminate content  by either charging a fee for acting as its carrier or by incorporating  any technical qualifications.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In India, there is no law that expressly mandates the maintenance of a  neutral Internet. This March, the Telecom Regulatory Authority of India  (TRAI) &lt;a href="http://www.thehindu.com/business/Industry/trai-seeks-views-to-regulate-netbased-calling-messaging-apps/article7039815.ece"&gt;released a draft consultation paper &lt;/a&gt;seeking the public’s views on whether the Internet needed regulation. Unfortunately, much of its attention was focussed on the &lt;a href="http://www.thehindu.com/sci-tech/technology/internet/policy-proposes-storage-of-all-messages-mandatory-for-90-days/article7674762.ece"&gt;supposedly pernicious impact &lt;/a&gt;of  applications such as WhatsApp and Viber. “In a multi-ethnic society  there is a vital need,” wrote TRAI, “to ensure that the social  equilibrium is not impacted adversely by communications that inflame  passions, disturb law and order and lead to sectarian disputes.” The  questions, therefore, in its view were these: should at least some  Internet applications be amenable to a greater regulation, and should  they compensate the telecom service providers in addition to the data  charges that the consumers pay directly for the use of mobile Internet?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;If the government eventually answers these questions in the affirmative,  the consequences could be drastic. It could lead to a classification of  Internet applications based on arbitrary grounds, by bringing some of  them, whom the government views as harmful to society in some manner or  another, within its regulatory net. Through such a move, the state,  contrary to helping establish principles of Net neutrality as a rule of  law, would be actively promoting an unequal Internet.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In any event, as things stand, in the absence of a specific law mandating a neutral Internet, telecom companies enjoy a virtual &lt;i&gt;carte blanche&lt;/i&gt; to discriminate between different applications. Though these companies  have not yet completely exploited this autonomy, they are certainly  proceeding towards such an exercise. In April this year, &lt;a href="http://www.thehindu.com/business/airtel-launches-platform-offering-free-access-to-certain-apps/article7077204.ece"&gt;Airtel announced Airtel Zero&lt;/a&gt;,  an initiative that would allow applications to purchase data from  Airtel in exchange for the telecom company offering them to consumers  free of cost.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;On the face of it, this programme appears opposed to Net neutrality. But  what is even more alarming is that mobile Internet service providers  could, in the future, plausibly also control the speeds at which  different applications are delivered to consumers. For example, if  WhatsApp were to subscribe to Airtel Zero by paying the fee demanded by  the company, Airtel might accede to offering WhatsApp to consumers at a  pace superior to that at which other applications are run. This kind of  discrimination, as Nikhil Pahwa, one of the pioneers of the Save The  Internet campaign, has argued, is prototypically opposed to Net  neutrality. It tends to breed an unequal playing field, and, if allowed  to subsist, it could create a deep division in the online world.  Ultimately, we must view Net neutrality as a concept that stands for the  values that we want to build as a society; it pertains to concerns  about ensuring freedom of expression and about creating an open space  for ideas where democracy can thrive. There is a tendency, though, to  view those who support Net neutrality as representing a supercilious  position. Such criticism is unquestionably blinkered, but it also  highlights certain telling concerns.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Telecom companies that wish to discriminate between applications argue  that in the absence of an Internet that has completely permeated all  strata of society, an obligation to maintain neutrality is not only  unreasonable on the companies, but also unfair on the consumer. After  all, if nothing else, Airtel Zero and Free Basics bring, at the least,  some portions of the Internet to people who otherwise have no means to  access the web. What we have, therefore, at some level, is a clash of  values: between access to the Internet (in a limited form) and the  maintenance of neutrality in an atmosphere that is inherently unequal.  This makes tailoring a solution to the problem a particularly arduous  process.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Internet, in its purest form, is a veritable fountain of  information. At its core lies a commitment to both openness and a level  playing field, where an ability to innovate is perennially maintained.  It is difficult to argue against Facebook when it says that some access  is better than no access at all. But one of the problems with Free  Basics, and indeed with Airtel Zero too, is that the consumer has no  choice in which websites he or she might want to access free of cost. If  this decision is made only by Facebook, which might argue that it gives  every developer an equal chance to be a part of its project as long as  it meets a certain criteria, what we have is almost a paternalistic web.  In such a situation, information, far from being free, is shackled by  constraints imposed by the service provider.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Laudable end, unethical means&lt;/b&gt;&lt;br /&gt; This is precisely one of the concerns raised by those arguing in favour  of Net neutrality, who, it is worth bearing in mind, aren’t resistant to  the idea of a greater penetration of the Internet. Their apprehensions  lie in companies resorting to what they believe is an unethical means to  achieving, at least in theory, a laudable end. According to them,  negating Net neutrality, in a bid to purportedly achieve greater access  to the Internet in the immediate future, could prove profoundly  injurious in the long run. Yes, Airtel Zero and Free Basics would bring  to the less-privileged amongst us some access to the Internet, but the  question is this: at what cost?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The worry is that if the programs that bring access to a part of the  Internet in the immediate future were to entrench themselves, it could  eventually lead to these telecom companies abusing their dominant  positions. No doubt, as Pranesh Prakash, policy director at the Centre  for Internet and Society, has argued, it might require a deeper analysis  to argue convincingly that packages such as Free Basics and Airtel Zero  require immediate invalidation in their present forms; significantly,  the former does not demand payments from the applications while the  latter is premised on such consideration. But, viewed holistically, the  companies’ actions could potentially be characterised as a form of  predatory pricing, where consumers might benefit in the short run, only  for serious damage to ensue to competition in the long run.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It is, therefore, necessary that any debate on the issue must address  the tension between the two apparently conflicting goals — the  importance of maintaining a neutral Internet and the need to ensure a  greater access to the web across the country. Mr. Zuckerberg argues that  these two values are not fundamentally opposed to each other, but can —  and must — coexist. He is possibly correct at a theoretical level.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;But the history of markets tells us that we have to be very careful in  allowing predatory practices, devised to achieve short-term goals, to go  unbridled. As citizens, each of us has a fundamental right to freedom  of speech and expression. If we were to get the balance between these  two values wrong, if we were to allow the domination, by a few parties,  of appliances that facilitate a free exchange of ideas, in a manner that  impinges on the Internet’s neutrality, our most cherished civil  liberties could well be put to grave danger.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;(&lt;i&gt;Suhrith Parthasarathy is an advocate in the Madras High Court.&lt;/i&gt;)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-october-8-2015-suhrith-parthasarathy-access-at-the-cost-of-net-neutrality'&gt;https://cis-india.org/internet-governance/news/the-hindu-october-8-2015-suhrith-parthasarathy-access-at-the-cost-of-net-neutrality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-09T01:18:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-nina-c-george-august-13-2019-abuse-linked-to-net-fixation">
    <title>Abuse linked to Net fixation</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-nina-c-george-august-13-2019-abuse-linked-to-net-fixation</link>
    <description>
        &lt;b&gt;Addiction to surfing for explicit content and loss of privacy are big concerns when it comes to children, say counsellors.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nina C. George was published by &lt;a class="external-link" href="https://www.deccanherald.com/metrolife/metrolife-on-the-move/abuse-linked-to-net-fixation-754110.html"&gt;Deccan Herald&lt;/a&gt; on August 13, 2019. Aayush Rathi was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;About 15 children are rescued every day in Bengaluru by an organisation working in tandem with the police. Some children in distress are rescued after they call Makkala Sahayavani, a child helpline attached to the police commissioner’s office. Counsellors attribute the high numbers to many causes. Addiction to the Internet may be adding to the problem, they say.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fr Mathew Thomas, executive director of BOSCO, categorises distress calls received at the helpline under three heads: child marriage, sexual and physical abuse, and child labour.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“When we deal with cases of child abuse, we need to be extremely sensitive and not blamethem,” he says.Rescued children show physical injuries, low self-esteem, and suffer from learning disorders.“In a day, we rescue at least 15 children who are victims of various abuses,” he says. Thomas isassociated with the helpline in a supervisory capacity.Studies show how social media and the Internet can alter the behaviour of children and makethem vulnerable to all kinds of abuse.Dr Manoj Kumar Sharma, professor of clinical psychology at Service for Healthy Use ofTechnology (SHUT Clinic) at Nimhans, says the loss of privacy is one of the biggest concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“On the Internet, users can easily make contact with unsuspecting children through anonymous and unprotected social media pro􀁺les. Game forums can put children at risk for bullying or abuse,” he says. &lt;span&gt;Dr Sharma calls for more measures to protect children,  “Disadvantaged children may not understand online risks, including those of loss of privacy,” he says. It is common for children to seek the opinion of their peer group when they experience risks and harm online.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;“This makes it difficult for parents to intervene. There is a need to enhance communication between the child and parent so they can identify signs of distress among the children andhelp them,” advises Sharma.Easy access to sexually explicit videos may be one of the reasons for increased sexual abuse of children, say counsellors at Makkala Sahayavani, the child helpline attached to the police commissioner’s office. Preethi Baliga, a senior counsellor, says early exposure to the Internet is leading to addiction, and physical, emotional, and sexual abuse of children. “How do we saveour children from this?” she wonders.The helpline receives 15 calls a day, five of them calling for immediate intervention.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Recent cases at helpline&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;A 16-year-old girl was sexually abused by her father for years. Her mother was aware but did nothing. Finally, unable to bear the torture, the girl gathered courage to report it to the police.An FIR was filed and the father was arrested. She was sent to a shelter for rescued children.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;A 15-year-old girl was orphaned after her parents went their individual ways. Neither parent wanted to take her in. She was sent to a hostel where she became a victim of drug abuse and multiple sexual encounters. She slipped into depression. She received treatment after her case came to the notice of the child helpline. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;A 16-year-old girl befriends a boy of the same age on social media and they begin chatting.They get close and soon chatting makes way for exchange of intimate pictures and physical intimacy. After a while, the boy begins to avoid the girl. Repeated attempts to contact him goes in vain. The girl realises that she has been sexually abused and exploited.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Counsellor's Concerns&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Things that ought to be educative are glamorised, according to a counsellor. “Even a condom ad is glamorous. The message that it must be used against contracting sexually transmitteddiseases and preventing pregnancy is not highlighted,” says Preethi Baliga, who works at Makkala Sahayavani. She adds, “Teenagers gain access to pubs by showing fake identity cards. “Children with such tendencies have zero emotions and don’t come around to counselling.”&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;The Internet can be seen as an abettor&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Aayush Rathi, Policy Officer with the Center for Internet and Society in Bengaluru, warns thatone should be wary of claims that the Internet causes child maltreatment such as emotional and sexual abuse. “Rather, the Internet can be seen as an abettor - a new medium through which child maltreatment may be pursued. An increase in the number of cases of such maltreatment needn’t necessarily only be because of wider Internet usage, but may also be because awareness initiatives may be working,” he tells Metrolife.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;How to help abused children?&lt;/span&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Communicate in a non-judgemental way.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Engage in of􀁻ine activities with them.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Recognise, appreciate positive behaviour.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Become a role model: don’t overuse tech.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-nina-c-george-august-13-2019-abuse-linked-to-net-fixation'&gt;https://cis-india.org/internet-governance/news/deccan-herald-nina-c-george-august-13-2019-abuse-linked-to-net-fixation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Nina C. George</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-08-15T16:26:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/abli-privacy-workshop">
    <title>ABLI Privacy Workshop</title>
    <link>https://cis-india.org/internet-governance/news/abli-privacy-workshop</link>
    <description>
        &lt;b&gt;On May 21 and 22, 2019, Elonnai Hickok, participated in the ABLI privacy workshop along with side events in Singapore.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/abli2019s-data-privacy-workshop"&gt;Click to view the agenda&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/abli-privacy-workshop'&gt;https://cis-india.org/internet-governance/news/abli-privacy-workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-06-05T07:29:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/economic-times-july-23-2017-amber-sinha-aadhar-privacy-is-not-a-unidimensional-concept">
    <title>Aadhar: Privacy is not a unidimensional concept</title>
    <link>https://cis-india.org/internet-governance/blog/economic-times-july-23-2017-amber-sinha-aadhar-privacy-is-not-a-unidimensional-concept</link>
    <description>
        &lt;b&gt;Right to privacy is important not only for our negotiations with the information age but also to counter the transgressions of a welfare state. A robust right to privacy is essential for all Indian citizens to defend their individual autonomy in the face of invasive state actions purportedly for the public good.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://economictimes.indiatimes.com/news/politics-and-nation/aadhar-privacy-is-not-a-unidimensional-concept/printarticle/59716562.cms"&gt;Economic Times&lt;/a&gt; on July 23, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The ruling of this nine-judge bench will have far-reaching impact on the extent and scope of rights available to us all. In a disappointing case of judicial evasion by the apex court, it has taken over 600 days since a reference order was passed in August 11, 2015, for this bench to be constituted. Over two days of arguments, the counsels for the petitioners have presented before the court why the right to privacy, despite not finding a mention in the Constitution of India, is a fundamental right essential to a person’s dignity and liberty, and must be read into not one but multiple articles of the Constitution. The government will make its arguments in the coming week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One must wonder why we are debating the contours of the right to privacy, which 40 years of jurisprudence had lulled us into believing we already had. The answer to that can be found in a series of hearings in the Aadhaar case that began in 2012. Justice KS Puttaswamy, a former Karnataka High Court judge, filed a petition before the Supreme Court, questioning the validity of the Aadhaar project due its lack of legislative basis (since then the Aadhaar Act was passed in 2016) and its transgressions on our fundamental rights. Over time, a number of other petitions also made their way to the apex court, challenging different aspects of the Aadhaar project. Since then, five different interim orders by the Supreme Court have stated that no person should suffer because they do not have an Aadhaar number. Aadhaar, according to the court, could not be made mandatory to avail benefits and services from government schemes. Further, the court has limited the use of Aadhaar to specific schemes: LPG, PDS, MGNREGA, National Social Assistance Programme, the Pradhan Mantri Jan Dhan Yojna and EPFO.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The real spanner in the works in the progress of this case was the stand taken by Mukul Rohatgi, then attorney general of India who, in a hearing before the court in July 2015, stated that there is no constitutionally guaranteed right to privacy. His reliance was on two Supreme Court judgments in MP Sharma v Satish Chandra (1954) and Kharak Singh v State of Uttar Pradesh (1962): both cases, decided by eight- and six-judge benches respectively, denied the existence of a constitutional right to privacy. As the subsequent judgments which upheld the right to privacy were by smaller benches, Rohatgi claimed that MP Sharma and Kharak Singh still prevailed over them, until they were overruled by a larger bench.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The reference to a larger bench has since delayed the entire matter, even as a number of government schemes have made Aadhaar mandatory. This reading of privacy as a unidimensional concept by the courts is, with due respect, erroneous. Privacy, as a concept, includes within its scope, spatial, familial, informational and decisional aspects. We all have a legitimate expectation of privacy in our private spaces, such as our homes, and in our personal relationships. Similarly, we must be able to exercise some control over how personal data, like our financial information, are disseminated. Most importantly, privacy gives us the space to make autonomous choices and decisions without external interference. All these dimensions of privacy must stand as distinct rights. In MP Sharma, the court rejected a certain aspect of the right of privacy by refusing to acknowledge a right against search and seizure. This, in no way prevented the court, even in the form of a smaller bench, from ruling on any other aspects of privacy, including those that are relevant to the Aadhaar case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The limited referral to this bench means that the court will have to rule on the status of privacy and its possible limitations in isolation, without even going into the details of the Aadhaar case (based on the nature of protection that this bench accords to privacy, the petitioners and defendants in the Aadhaar case will have to argue afresh on whether the project does impede on this most fundamental right). There are no facts of the case to ground the legal principles in, and defining the contours of a right can be a difficult exercise. The court must be wary of how any limits they put on the right may be used in future. Equally, it is important to articulate that any limitations on the right to privacy due to competing interests such as national security and public interest must be imposed only when necessary and always be proportionate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It will not be enough for the court to merely state that we have a constitutional right to privacy. They would be well advised to cut through the muddle of existing privacy jurisprudence, and unequivocally establish the various facets of the right. Without that, we may not be able to withstand the modern dangers of surveillance, denial of bodily integrity and self-determination through forcible collection of information. The nine judges, in their collective wisdom, must not only ensure that we have a right to privacy, but also clearly articulate a robust reading of this right capable of withstanding the growing interferences with our autonomy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/economic-times-july-23-2017-amber-sinha-aadhar-privacy-is-not-a-unidimensional-concept'&gt;https://cis-india.org/internet-governance/blog/economic-times-july-23-2017-amber-sinha-aadhar-privacy-is-not-a-unidimensional-concept&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-08-23T01:50:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
