<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2971 to 2985.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/university-of-oxford-october-25-2013-free-speech-and-media-in-south-asia"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/saket-modi-calls-for-stronger-cyber-security-discussions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-november-12-2016-delink-icann-from-us-jurisdiction"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/attempts-to-censor-the-web-ill-advised"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/anonymous-hackers-to-protest-indian-internet-laws"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ndtv-may-3-2017-aadhaar-of-your-existence-or-card-of-controversy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/netneutrality-data-protection-laws-among-topics-at-itechlaw-conference"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-economics-and-business-models-of-iot"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-data-standards-for-iot"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/medianama-rana-september-9-2018-namaprivacy-data-protection-authoritys-regulatory-and-enforcement-challenges"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/namapolicy-on-online-content-regulation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/whatever-happened-to-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/privacy-conferencefeb5"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/decoding-the-digital-winter-school-at-iiit-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/c95ca8ccdca8ca1-caeca4ccdca4cc1-ca4c82ca4ccdcb0c9cccdc9ecbeca8ca6-c9cca4cc6-c9cca4cc6c97cc6..."/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/university-of-oxford-october-25-2013-free-speech-and-media-in-south-asia">
    <title>'Free Speech and Media in South Asia: Human Rights Concerns in a Globalizing World'</title>
    <link>https://cis-india.org/news/university-of-oxford-october-25-2013-free-speech-and-media-in-south-asia</link>
    <description>
        &lt;b&gt;A seminar organized by the Programme in Comparative Media Law and Policy, Centre for Socio-Legal Studies, University of Oxford, in collaboration with the Centre for Media and Governance, National Law University, Delhi. Chinmayi Arun is one of the speakers.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="bodya" style="text-align: justify; "&gt;Click to read the original &lt;a class="external-link" href="http://www.politics.ox.ac.uk/index.php/details/3543-free-speech-and-media-in-south-asia-human-rights-concerns-in-a-globalizing-world.html"&gt;published by Oxford University Press here&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="bodya" style="text-align: justify; "&gt;&lt;b&gt;Speakers:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Salil Tripathi, English PEN&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Defending Freedom of Expression in India&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Emrys Shoemaker, London School of Economics&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mobile Communication and Internet Regulation in Pakistan: Mapping Social Implications&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chinmayi Arun, National Law University, Delhi&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Privacy and Surveillance&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kumaravadivel Guruparan, University College London&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Digital Media as Part of the Sri Lankan State's 'Counter-insurgency' Programme&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chair: Nicole Stremlau, PCMLP&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This panel discussion will explore contemporary issues that envelop  both the digital and the traditional media in South Asia. It will look  at the effects of surveillance, prior restraints on speech,  intermediaries and other key factors on the public sphere. It will also  consider, in this context, the relationship of the traditional media  with the Internet. This discussion will take place in the backdrop of  evolving democratic engagement in India, and the constitutional  jurisprudence that attempts to keep pace with it and with developments  in communication technology. It will offer comparative perspectives from  other countries grappling with similar concerns.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/university-of-oxford-october-25-2013-free-speech-and-media-in-south-asia'&gt;https://cis-india.org/news/university-of-oxford-october-25-2013-free-speech-and-media-in-south-asia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-11-08T05:33:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/saket-modi-calls-for-stronger-cyber-security-discussions">
    <title>'Ethical Hacker' Saket Modi Calls for Stronger Cyber Security Discussions</title>
    <link>https://cis-india.org/internet-governance/blog/saket-modi-calls-for-stronger-cyber-security-discussions</link>
    <description>
        &lt;b&gt;Twenty-two year old Saket Modi is the CEO and co-founder of Lucideus, a leading cyber security company in India which claims to have worked with 4 out of 5 top global e-commerce companies, 4 out of 10 top IT companies in the world, and 3 out of 5 top banks of the Asia Pacific. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;At the Confederation of Indian Industry (CII) conference on July 13, titled “&lt;a href="https://cis-india.org/internet-governance/blog/cii-conference-on-act" class="external-link"&gt;ACT – Achieving Cyber-Security Together&lt;/a&gt;,” Modi as the youngest speaker on the agenda delivered an impromptu talk which lambasted the weaknesses of modern cyber security discussions, enlightened the audience on modern capabilities and challenges of leading cyber security groups, and ultimately received a standing ovation from the crowd. As a later speaker commented, Modi’s controversial opinions and practitioner insight had "set the auditorium ablaze for the remainder of the evening". Since then the Centre for Internet and Society (CIS) has had the pleasure of interviewing Saket Modi over Skype.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is quite easy to find accounts of Saket Modi's introduction into hacking just by typing his name in the search engine. Faced with the pressure of failing, a teenage Saket discovered how to hack into his high school Chemistry teacher’s test and answer database. After successfully obtaining the answers, and revealing his wrong doings to his teacher, the young man grew intrigued by the possibilities of hacking. "I thought, if I could do this in a couple hours, four hours, then what might I be able to do in four days, four weeks, four months?"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nowadays, Modi describes himself and his Lucideus team as "ethical hackers", a term recently espoused by hacker groups in the public eye. As opposed to "hacktivists", who utilize hacking methods (including attacks) to achieve or bring awareness to political issues, ethical hackers claim to exclusively use their computer skills to support defenses. At first, incorporation of &lt;i&gt;ethics&lt;/i&gt; into a for-profit organization’s game plan may seem confusing, as it leaves room for key questions, like how does one determine which clients constitute ethical business? When asked, however, Modi clarifies by explaining how the ethics are not manifest in the entities Lucideus supports, but instead inherent in the choice of building defensive networks as opposed to using their skills for attack or debilitation. Nevertheless, considerations remain as to whether supporting the cyber security of some entities can lead to the insecurity of others, for example, strengthening the agencies which work in covert cyber espionage. On this point, Modi seems more ambivalent, saying "it depends on a case by case basis". But he still believes cyber security is a right that should be enjoyed by all, "entitled to [you] the moment you set foot on the internet".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As an experienced professional in the field who often gives input on major cyber policy decisions, Modi emphasizes the necessity of youth engagement in cyber security practice and policy. He calls his age bracket the “web generation,” those who have “grown with technology.” According to Modi, no one over 50 or 60 years of age can properly meet the current challenges of the cyber security realm. It is "a sad thing" that those older leaders carry the most power in policy making, and that they often have problems with both understanding and acceptability of modern technological capabilities. For the public, businesses, and also government, there are misconceptions about the importance of cyber security and the extent of modern cyber threats, threats which Modi and his company claim to combat regularly. "About 90 per cent of the crimes that take place in cyber space are because of lack of knowledge, rather than the expertise of the hacker,” he explains. Modi mentions a few basic misconceptions, as simple as, "if I have an anti-virus, my system is secured" or "if you have HTTPS certificate and SSL connection, your system is secured". “These are like wearing an elbow guard while playing cricket,” Modi tells. “If the ball comes at the elbow then you are protected, but what about the rest of the body?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This highlights another problem evident in India’s current cyber security scene, the problem of lacking “quality institutes to produce good cyber security experts.” For example, Modi takes offence at there not being “a single institute which is providing cyber security at the undergraduate level [in India].” He alludes to the recently unveiled National Cyber Security Policy, specifically the call for five lakh cyber security experts in upcoming years. He calls this “a big figure,” but agrees that there needs to be a lot more awareness throughout the nation. “You really have to change a lot of things,” he says, “in order to get the right things in the right place here in India.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When considering citizen privacy in relation to cyber security, and the relationship between the two (be it direct or inverse), Saket Modi says the important factor is the governing body, because the issue ultimately resolves to trust. Citizens must trust the “right people with the right qualifications” to store and protect their sensitive data, and to respect privacy. Modi is no novice to the importance of personal data protection, and his company works with a plethora of extremely sensitive information relating to both their clients and their clients’ clients data, so it operates with due care lest it create a “wikileaks part two.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On internationalization and cyber security, he views the connection between the two as natural, intrinsic. “Cyberspace has added a new dimension to humanity,” says Modi, and tells how former constructs of physical constraints and linear bounds no longer apply. International cooperation is especially pertinent, according to Modi, because the greatest challenge for catching today’s criminal hackers is their international anonymity, “the ability to jump from one country to the other in a matter of milliseconds.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the extent of the challenges facing cyber defense specialists, and with the somewhat disorderly current state of Indian cyber security, it is curious to see that Saket Modi has devoted himself to the "ethical" side of hacking. Why hasn’t he or the rest of the Lucideus team resorted to offensive hacking, since Modi claims the majority of cyber attacks of the world who are committed by people also fall between the ages of 15 and 24? Apparently, the answer is simple. “We believe in the need for ethical hacking,” he defends. “We believe in the purpose of making the internet safer.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/saket-modi-calls-for-stronger-cyber-security-discussions'&gt;https://cis-india.org/internet-governance/blog/saket-modi-calls-for-stronger-cyber-security-discussions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>kovey</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-05T13:11:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-november-12-2016-delink-icann-from-us-jurisdiction">
    <title>'Delink ICANN from US jurisdiction'</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-november-12-2016-delink-icann-from-us-jurisdiction</link>
    <description>
        &lt;b&gt;Eight Indian civil society organisations involved with internet governance have called for complete delinking of ICANN from US jurisdiction, saying an important global public infrastructure being subject to a single country’s control is unacceptable.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.deccanherald.com/content/580590/delink-icann-us-jurisdiction.html"&gt;published by Deccan Herald&lt;/a&gt; on November 12.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Internet Corporation for Assigned Names and Numbers (ICANN) is a  not-for-profit public-benefit corporation with participants from all  over the world dedicated to keeping the Internet secure, stable and  interoperable.&lt;br /&gt;&lt;br /&gt;The demand from Bengaluru-based Centre for  Internet and Society and IT for Change as well as Delhi-based Software  Freedom Law Centre among others came against the backdrop of ICANN’s  meeting in Hyderabad that ended on  Wednesday. &lt;br /&gt;&lt;br /&gt;The other  organisations involved in the campaign are Free Software Movement of  India (Hyderabad), Society for Knowledge Commons, Digital Empowerment  Foundation, Delhi Science Forum and Third World Network (all in New  Delhi).&lt;br /&gt;&lt;br /&gt;“Urgent steps (should) be taken to transit ICANN from its  current US jurisdiction. Only then can ICANN become a truly global  organisation . We would like to make it clear that our objection is not  directed particularly against the US, we are simply against an important  global public infrastructure being subject to a single country’s  jurisdiction,” a joint statement said.&lt;br /&gt;&lt;br /&gt;Though the US has given up  its role of signing entries to the Internet’s root zone file, which  represents the addressing system for the global Internet, the groups  said, the organisation that manages ICANN continues to be under US  jurisdiction and hence subject to its courts, legislature and executive  agencies.&lt;br /&gt;&lt;br /&gt;“Keeping such an important global public infrastructure  under US jurisdiction is expected to become a very problematic means of  extending US laws and policies across the world,” the statement said.&lt;br /&gt;&lt;br /&gt;Explaining the issue, it said country domain names like .br and .ph remain subject to US jurisdiction.&lt;br /&gt;&lt;br /&gt;“Iran’s  .ir was recently sought to be seized by some US private parties because  of alleged Iranian support to terrorism. Although the plea was turned  down, another court in another case may decide otherwise. Other  countries cannot feel comfortable to have at the core of the Internet’s  addressing system an organisation that can be dictated by one  government,” the statement said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-november-12-2016-delink-icann-from-us-jurisdiction'&gt;https://cis-india.org/internet-governance/news/deccan-herald-november-12-2016-delink-icann-from-us-jurisdiction&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-11-15T14:16:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/attempts-to-censor-the-web-ill-advised">
    <title>'Attempts to censor the web ill-advised'</title>
    <link>https://cis-india.org/news/attempts-to-censor-the-web-ill-advised</link>
    <description>
        &lt;b&gt;Amid concerted government attempts to censor the internet and the recent blocking of file-sharing websites due to a court order based on a petition by producers of a Tamil film, speakers at a discussion on Saturday felt that there was a fear of freedom of expression among those affected by it, primarily the powerful.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2012-06-03/goa/32005718_1_internet-access-censorship-free-speech"&gt;Article by Krish Fernandes published in the Times of India on June 3, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;At the discussion on 'freedom of expression and privacy: Proposition' held at Goa University, senior journalist Paranjoy Guha Thakurta felt the increasing attempts at online censorship were a consequence of the government being unable to formulate coherent responses to the widening of the limits to freedom of expression on the internet.&lt;/p&gt;
&lt;p&gt;He was of the view that all stakeholders should be consulted before any legislation in this regard.&lt;/p&gt;
&lt;p&gt;Vickram Crishna of Privacy International spoke about "the fear of freedom of expression". While stating that the internet access had jumped due to the increased usage of smartphones, he observed that "there were concerted moves to make these things (censorship) happen in India".&lt;/p&gt;
&lt;p&gt;"What use is access, if we don't have freedom of expression?" Crishna questioned.&lt;/p&gt;
&lt;p&gt;Geeta Seshu of The Hoot was of the opinion that the world was also seeing the rise of powerful web players such as search engines and social networks with no obligations to permit free speech.&lt;/p&gt;
&lt;p&gt;Chinmayi Arun of the National University of Juridical Sciences echoed this view. She felt freedom of speech and expression were vulnerable because they receive very little protection from non-state factors. She felt surveillance may soon become as serious a threat to free speech as censorship.&lt;/p&gt;
&lt;p&gt;Advocate Apar Gupta felt there are better safeguards against banning books, while web content bans see almost no safeguards.&lt;/p&gt;
&lt;p&gt;Touching on the ban on file-sharing sites, Lawrence Liang of Alternative Law Forum felt private bodies such as ISPs were being given powers of the state.&lt;/p&gt;
&lt;p&gt;Anja Kovacs of Internet Democracy Project was critical of the government instructing internet service providing companies to setup servers in the country. The internet as we know it will stop to exist if we have server requirements in all countries, she said.&lt;/p&gt;
&lt;p&gt;Frederick Norohna of publishing house Goa 1556, Siddhart Narrain and Danish Sheikh of the Alternative Law Forum, Paromita Vohra of Devi Pictures and Werner Souza also spoke on the occasion.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/attempts-to-censor-the-web-ill-advised'&gt;https://cis-india.org/news/attempts-to-censor-the-web-ill-advised&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-06-17T07:11:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/anonymous-hackers-to-protest-indian-internet-laws">
    <title>'Anonymous' hackers to protest Indian Internet laws</title>
    <link>https://cis-india.org/news/anonymous-hackers-to-protest-indian-internet-laws</link>
    <description>
        &lt;b&gt;Global hacking movement Anonymous has called for protesters to take to the streets in 16 cities around India on Saturday over what it considers growing government censorship of the Internet, writes Pratap Chakravarty. &lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.google.com/hostednews/afp/article/ALeqM5gsnDdnLf9f_PmycvKCR-5aHsJiNw?docId=CNG.56f38ef15f6205d33c4a9b392db46ad0.551"&gt;This was published in AFP on June 8, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The call for demonstrations by the Indian arm of the group follows a 
March 29 court order issued in the southern city of Chennai demanding 15
 Indian Internet providers block access to file-sharing websites such as
 Pirate Bay.&lt;/p&gt;
&lt;p&gt;The order has resulted in access being denied to a host of websites 
that carry pirated films and music among other legal content, including &lt;a class="external-link" href="http://www.isohunt.com/"&gt;www.isohunt.com&lt;/a&gt; and &lt;a class="external-link" href="http://www.pastebin.com/"&gt;www.pastebin.com&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;On Wednesday, the Anonymous forum fired an opening shot by attacking 
the website of state-run telecom provider MTNL, pasting the logo of the 
group -- the mask of 17th century revolutionary Guy Fawkes -- on &lt;a class="external-link" href="http://www.mtnl.net.in"&gt;www.mtnl.net.in&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;In an open letter the same day, the group accused the government of 
trying to create a "Great Indian Firewall" to establish control on the 
web and issuing a "declaration of war from yourself... to us."&lt;/p&gt;
&lt;p&gt;Internet users and supporters have been asked to join peaceful 
rallies in cities including the capital New Delhi and the tech hub of 
Bangalore, with detailed instructions issued online to participants.&lt;/p&gt;
&lt;p&gt;Tech website &lt;a class="external-link" href="http://www.pluggd.in/"&gt;www.pluggd.in&lt;/a&gt;
 reported the demonstrators have been asked to wear Guy Fawkes' masks, 
download a recorded message to play to police, and are to chant "United 
as one! Divided as zero! We are Anonymous! We are legion!"&lt;/p&gt;
&lt;p&gt;Concerns about Internet freedom in India go beyond the court order in
 Chennai, however, and stem from an update to India's Information 
Technology Act that was given by the IT and communications ministry in 
April last year.&lt;/p&gt;
&lt;p&gt;The new rules regulating Internet companies -- providers, websites 
and search engines -- instruct them that they must remove "disparaging" 
or "blasphemous" content within 36 hours if they receive a complaint by 
an "affected person".&lt;/p&gt;
&lt;p&gt;Groups such as the Center for Internet and Society, a Bangalore-based
 research and advocacy group, have waged a year-long campaign for 
amendments to the rules, which were quietly released in April.&lt;/p&gt;
&lt;p&gt;Industry groups have also objected, saying they are unclear on the 
changes which are in any case impossible to implement when it comes to 
acting on individual complaints about specific content.&lt;/p&gt;
&lt;p&gt;"A lot of education is required in this field," secretary of the 
Internet Service Providers Association of India S.P. Jairath told AFP.&lt;/p&gt;
&lt;p&gt;The government has also become embroiled in a row with social 
networks after Telecoms Minister Kapil Sibal held a series of meetings 
with IT giants Google, Yahoo! and Facebook last year to discuss the 
pre-screening of content.&lt;/p&gt;
&lt;p&gt;The minister was said to have shown Internet executives examples of 
obscene images found online that risked offending Muslims or defamed 
politicians, including his boss, the head of the ruling Congress party, 
Sonia Gandhi.&lt;/p&gt;
&lt;p&gt;Since these meetings, 19 Internet firms including Google, Yahoo! and 
Facebook have been targeted in criminal and civil cases lodged in lower 
courts, holding them responsible for content posted by users of their 
platforms.&lt;/p&gt;
&lt;p&gt;Anonymous is a secretive "hacker-activist" network and is thought to 
be a loosely knit collective with no clearly defined leadership 
structure.&lt;/p&gt;
&lt;p&gt;It has claimed dozens of online attacks on sites ranging from the 
Vatican to Los Angeles Police Canine Association, but is increasingly 
the target of law enforcement agencies who have arrested dozens of 
members.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The above was published in the following places as well:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.ndtv.com/article/india/anonymous-hackers-call-for-protests-across-india-today-against-internet-censorship-229238"&gt;NDTV&lt;/a&gt;, June 9, 2012&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://post.jagran.com/anonymous-to-protest-internet-policing-1339243820"&gt;Jagran Post&lt;/a&gt;, June 9, 2012&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2012-06-09/internet/32140515_1_internet-firms-websites-internet-companies"&gt;The Times of India&lt;/a&gt;, June 9, 2012&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.livemint.com/2012/06/09185541/8216Anonymous8217-activi.html"&gt;LiveMint&lt;/a&gt;, June 9, 2012&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2012-06-09/news/32140719_1_government-websites-anonymous-facebook-page"&gt;Economic Times&lt;/a&gt;, June 9, 2012&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/anonymous-hackers-to-protest-indian-internet-laws'&gt;https://cis-india.org/news/anonymous-hackers-to-protest-indian-internet-laws&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-06-18T04:55:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ndtv-may-3-2017-aadhaar-of-your-existence-or-card-of-controversy">
    <title>'Aadhaar' Of Your Existence Or Card Of Controversy? </title>
    <link>https://cis-india.org/internet-governance/news/ndtv-may-3-2017-aadhaar-of-your-existence-or-card-of-controversy</link>
    <description>
        &lt;b&gt; recent report estimates that details of 13 crore Aadhaar card holders have been leaked from four government websites. These include bank account details, income levels, addresses, even caste and religion details.&lt;/b&gt;
        &lt;p&gt;This was &lt;a class="external-link" href="https://www.youtube.com/watch?v=xaY4WHrs-OQ"&gt;telecasted by NDTV&lt;/a&gt; on May 3, 2017. Amber Sinha was a panelist.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;As the Supreme Court questioned the government about this, the centre  admitted for the first time that the leaks had taken place but passed  the onus on to state governments. It also argued that no technology was a  100 per cent foolproof but that couldn't be the basis for a  constitutional challenge. Those who have petitioned against making  Aadhar mandatory for filing income tax say no other democratic country  has such a requirement and allege that it shows the sinisterness of the  government.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/xaY4WHrs-OQ" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ndtv-may-3-2017-aadhaar-of-your-existence-or-card-of-controversy'&gt;https://cis-india.org/internet-governance/news/ndtv-may-3-2017-aadhaar-of-your-existence-or-card-of-controversy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T12:24:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/netneutrality-data-protection-laws-among-topics-at-itechlaw-conference">
    <title>#NetNeutrality, Data Protection Laws among topics at ITechLaw Conference </title>
    <link>https://cis-india.org/internet-governance/news/netneutrality-data-protection-laws-among-topics-at-itechlaw-conference</link>
    <description>
        &lt;b&gt;The who’s-who of the technology law sector convened at the ITechLaw India International Conference held from January 27-29 in Bangalore.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The last three days saw panel  discussions being held on a varied set of topics related to technology  law. The debates were led by a number of Indian and international legal  professionals from law firms, companies and policy houses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Day 2, some of the panel discussions  included Commercialization of Data, Aggregator Model – Licensing and  Regulatory Issues Faced by Shared Economy Models, Digital Underworld,  and Legal Challenges faced in New Media and Entertainment, among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The speakers present at these sessions included lawyers like &lt;span&gt;&lt;a href="http://barandbench.com/former-mmb-legal-partner-talha-salaria-sets-own-firm-lawyers-work-says-time-right/"&gt;Talha Salaria&lt;/a&gt;&lt;/span&gt;, Founder of Lawyers at Work; JSA Partner Sajai Singh; Trilegal Partner &lt;span&gt;&lt;a href="http://barandbench.com/lawyers-tend-to-be-the-last-to-adapt-to-technological-changes-trilegals-rahul-matthan/"&gt;Rahul Matthan&lt;/a&gt;&lt;/span&gt;; MCM Law Partner Samuel Mani, apart from a host of In-House counsel from Intel, Amazon, IBM, Cognizant et al.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The highlight of Day 3 was a debate on  Net Neutrality; Deepali Liberhan from Facebook, Pranesh Prakash from  Centre for Internet and Society and &lt;span&gt;&lt;a href="http://wp.me/p6ZY6N-1so" target="_blank"&gt;Rohan George from Samvad Partners&lt;/a&gt;&lt;/span&gt; were among the panelists.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;For more info, &lt;a class="external-link" href="http://barandbench.com/itechlaw-net-neutrality/"&gt;click here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/netneutrality-data-protection-laws-among-topics-at-itechlaw-conference'&gt;https://cis-india.org/internet-governance/news/netneutrality-data-protection-laws-among-topics-at-itechlaw-conference&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-30T09:21:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-economics-and-business-models-of-iot">
    <title>#NAMAprivacy: The economics and business models of IoT and other issues</title>
    <link>https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-economics-and-business-models-of-iot</link>
    <description>
        &lt;b&gt;On 5th October, MediaNama held a #NAMAprivacy conference in Bangalore focused on Privacy in the context of Artificial Intelligence, Internet of Things (IoT) and the issue of consent, supported by Google, Amazon, Mozilla, ISOC, E2E Networks and Info Edge, with community partners HasGeek and Takshashila Institution.&lt;/b&gt;
        &lt;p&gt;Link to the original published by Medianama on October 18, 2017 &lt;a class="external-link" href="https://www.medianama.com/2017/10/223-namaprivacy-economics-and-business-models-of-iot/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Part 1 of the notes from the discussion on IoT are &lt;a href="https://www.medianama.com/2017/10/223-namaprivacy-data-standards-for-iot/"&gt;here&lt;/a&gt;. Part 2:&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The session on IoT shifted gears and the participants spoke more  about the economics and business IoT. Participants expressed concern  that data could be linked to very private aspects of their lives and  build business models around them. For example, data from fitness  trackers can be linked to a user’s insurance premiums. Or sensors on a  car that monitors a user’s driving behavior and link motor insurance.&lt;/p&gt;
&lt;div class="b8eaROKM" style="text-align: justify; "&gt;
&lt;div align="center"&gt;
&lt;div id="div-gpt-ad-1506358046991-0"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;“I work for Zoomcar, and these are devices which our lives depend and  are collecting and reporting data. And that data can be used against  you. So it is very hard to know what is fair and what is unfair. Someone  mentioned insurance, I feel it is useful to collect a lot of data and  decide on insurance based on your driving behaviour and we have had  markers for that. But is it fair to the user? The same kind of questions  crops up elsewhere like in the US when it comes to healthcare,” Vinayak  Hegde said.&lt;/p&gt;
&lt;div class="vicuqiWy" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-176814 aligncenter" height="499" src="https://i1.wp.com/www.medianama.com/wp-content/uploads/vinayak-hegde-namaprivacy-e1508340779342.jpg?resize=750%2C499&amp;amp;ssl=1" width="750" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An audience member pointed out to that in such a scenario, privacy  can help businesses rather than inhibit them and cited a research study  in UC Berkely.  “If I use a health tracking device, some of those  devices can be valuable for health insurance companies and using that  data, they might increase the premiums. But I don’t know actually who  might sell my data to someone,” he explained.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;“&lt;b&gt;Because I don’t know which tracking devices sell  my data, I would like not to own the devices itself. So that itself  harms the entire health tracker industry itself.&lt;/b&gt; He (the  researcher) defines privacy as contextual integrity. So a health  tracking device is supposed to help me track my health and not supposed  to be used by insurance people to determine my premium. If the  regulation mandates the contextual integrity of that, it helps that  particular industry to avoid those feedback loops,” he explained.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 style="text-align: justify; "&gt;Are fitness trackers in the hardware or services business?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Kiran Jonnalagadda of HasGeek&lt;/b&gt; added to the point on  fitness trackers. He said that all of IoT is not in the business of  hardware and that they are in the services business.  “I had an unusual  experience for the past one week, I was out in an area with no Internet  connection. But I have two fitness trackers. I bought them mostly  because I’m curious about how these companies operate and what they’re  doing. And the differences between them are the way they think about  things. &lt;b&gt;Now both of these are capable of counting steps without  an Internet connection…. But they cannot do anything to show the step  count on my phone which it connects to until the data is sent to the  Internet and brought back.&lt;/b&gt; So my phone would keep telling me  that I am not moving and tell me the move but the watch is saying that I  am doing 20,000 steps a day and that I am trekking a lot,” he  explained.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;“For whatever reason, these companies have decided to operate in this manner &lt;b&gt;where  validation of data happens on the cloud and not on the device. You only  get the most rudimentary data from your device and your phone is just a  conduit and not a processing centre at all,” Jonnalagadda said. &lt;/b&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-176815 aligncenter" height="501" src="https://i0.wp.com/www.medianama.com/wp-content/uploads/kiran-namaprivacy-2-e1508340895481.jpg?resize=750%2C501&amp;amp;ssl=1" width="750" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He explained both the devices were in the device sales business and  has not asked money from them for enabling this sort of Internet-based  processing of data. “It calls into question, what is the model here. One  could bring the conspiracy theory that they’re selling my data and  therefore they don’t worry about collecting data from me. &lt;b&gt;The  second is to say: be a little bit more charitable and they recognize  that if they piss me off, I won’t buy their device again. And then just  assume that a device has a lifetime of just 2-3 years and if you keep a  person happy for 2-3 years, they will buy the device from you again.&lt;/b&gt; What’s interesting is ultimately not about devices and that it is about  services. And this is what I want to say about IoT that it is not about  hardware at all it is entirely about services. &lt;b&gt;Without  services, the entire business model of IoT breaks down. You do not get  software updates, you get vulnerabilities, you get &lt;/b&gt;broken&lt;b&gt; design, things have stopped working and no one supports you.” &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;The economics of processing data locally on a device&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Thejesh GN, co-founder of DataMeet, questioned the need for data to  be processed on the Internet and asked whether the data will be better  protected and have better privacy if it were processed locally.  “Considering the fact that we have such powerful phones which are  affordable, and can do a lot of things without the Internet. I mean the  biggest concept we had in IoT was that we didn’t have CPU or memory and  processing power. Given that and the availability of EDGE devices, how  long will we have economic cases where privacy can be sold as part of  IoT. The processing happens 99% of the times locally without Internet  and requires the Internet only when there is messaging. This could be  true for your fitness trackers that can be connected to your phone. Your  phone has all the capabilities to do all the analysis and doesn’t need  to go to the server,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-176816 aligncenter" height="333" src="https://i1.wp.com/www.medianama.com/wp-content/uploads/thejesh-namaprivacy-e1508340996548.jpg?resize=500%2C333&amp;amp;ssl=1" width="500" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash of the CIS countered him and said that the economics for processing data works out cheaper for the companies.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;“One on local processing, this I think is a perennial problem and it really is a question of economics versus principles. &lt;b&gt;Free  software is losing out the battle against using other people’s  computers for computing—cloud computing—because of economics. So, you no  longer own the software that you purchase and even the hardware, very  often, with IOT might not actually be yours. It might come with a  license, it might come with data that is tied to the company that is  actually providing you the device.&lt;/b&gt; So the economics of this are  for me clear: it’s much cheaper to do it on other computers than to do  it locally,” Prakash explained.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;He made a case for asserting for individual user’s rights to privacy  in this kind of scenario. “It is a question of principles. Should we  allow for that or should we assert for consumer protection laws and  assert other manners of laws to say that ‘no, people who are purchasing  devices’ ought to have greater control of the devices and the data that  they produce,”  he added.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Group privacy&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The audience also suggested that privacy laws should not just look at  protecting the rights of individuals but should look at protecting the  rights of groups as well. They raised concerns that even in a group and  if the data has been anonymized, it still can be weaponized and cause  harms.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;“For example, if there are 10-15 of us in this room and  given our detailed medical histories, I can find a correlation between  some of that. And then I can use that data in some other form when I run  a test to see if I am vulnerable to something or use it as a way to  discriminate further down the line. As a group, privacy matters a lot  because when we talk about devices, we are talking about individuals. &lt;b&gt;Maybe you can target via ethnicity or by age or by class and that can also be weaponized,&lt;/b&gt;” an audience member suggested.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Vinayak Hegde gave an example of how weather data captured by IoT can  cause harms to a society at large. “If I’m using the weather sensor  data and because of global warming, some places like Florida and south  of India are going to be extremely hot, I can use surge pricing for a  person’s electricity. &lt;b&gt;Again I am not getting targeted as an  individual, but as a group, I am being targeted. And sensors are closing  that loop really fast.” &lt;/b&gt;he explained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Srinivas P&lt;/b&gt;, &lt;b&gt;head of security at Infosys, &lt;/b&gt;gave  another example where gyroscopes in a phone could target a family.  “Some companies in the US use gyroscope in a phone to surreptitiously  monitor TV viewing habits. The mobile phone gets activated and over a  period of time, they can tweak the advertisements. It is an interesting  example, because in TV, when you watch at home, you cannot pinpoint TV a  user, because it is shared by a family. &lt;b&gt;This is because the guy  who is watching the maximum amount of TV, their data gets circulated  and the ads will be tailored to them. The person who does not watch that  much amount of TV gets baffled to see advertisements that are not  relevant to them.&lt;/b&gt; So when you want to process data, you want to  assume that, this TV belongs to a user. The TV belongs to a group. And  what if the viewing habits are so different, that once your privacy is  violated, you don’t want your other family member to know what you are  watching,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-large wp-image-176767 aligncenter" height="366" src="https://i2.wp.com/www.medianama.com/wp-content/uploads/NAMA-Data-Protection-Bangalore-58.jpg?resize=550%2C366&amp;amp;ssl=1" width="550" /&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Perception of permissions for sensors&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Rohini Lakshane of CIS raised an important point during the  discussion. The users have different perceptions about the sensors that  are embedded in smartphones. She pointed out that users are generally  unaware that accelerometers are sensors and capture data and most apps  do not ask permissions for the same. An accelerometer is a device used  to measure acceleration forces. It is usually used in devices to measure  movement and vibrations in devices such as fitness trackers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-176817 aligncenter" height="501" src="https://i2.wp.com/www.medianama.com/wp-content/uploads/Rohini-namaprivacy-e1508341268504.jpg?resize=750%2C501&amp;amp;ssl=1" width="750" /&gt;&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;“A researcher surveyed a control group and asked them if  their GPS data was taken and their camera was made accessible, whether  they would be comfortable with it? They were hugely uncomfortable.&lt;b&gt; The question came to the accelerometer on the phone and the respondents  said that ‘we are not all that afraid’. The accelerometer only counts  the acceleration. So in that app which counts how many steps we have  taken in a day, it uses the accelerometer and there is no permission  required for it.&lt;/b&gt; The accelerometer is still on the phone and is  still generating the data and you don’t see it because you don’t have  an interface directly with it,” she commented.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;*&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;#NAMAprivacy Bangalore:&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Will artificial Intelligence and Machine Learning kill privacy? [&lt;a href="https://www.medianama.com/2017/10/223-namaprivacy-artificial-intelligence-privacy/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Regulating Artificial Intelligence algorithms [&lt;a href="https://www.medianama.com/2017/10/223-namaprivacy-regulating-artificial-intelligence-algorithms/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Data standards for IoT and home automation systems [&lt;a href="https://www.medianama.com/2017/10/223-namaprivacy-data-standards-for-iot/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;The economics and business models of IoT and other issues [&lt;a href="https://www.medianama.com/2017/10/223-namaprivacy-economics-and-business-models-of-iot/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;#NAMAprivacy Delhi:&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Blockchains and the role of differential privacy [&lt;a href="https://www.medianama.com/2017/09/223-namaprivacy-blockchains-role-differential-privacy/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Setting up purpose limitation for data collected by companies [&lt;a href="https://www.medianama.com/2017/09/223-namaprivacy-setting-purpose-limitation-data-collected-companies/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;The role of app ecosystems and nature of permissions in data collection [&lt;a href="https://www.medianama.com/2017/09/223-namaprivacy-role-app-ecosystems-nature-permissions-data-collection/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Rights-based approach vs rules-based approach to data collection [&lt;a href="https://www.medianama.com/2017/09/223-namaprivacy-rights-based-approach-vs-rules-based-approach-data-collection/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Data colonisation and regulating cross border data flows [&lt;a href="https://www.medianama.com/2017/09/223-namaprivacy-data-colonisation-and-regulating-cross-border-data-flows/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Challenges with consent; the Right to Privacy judgment [&lt;a href="https://www.medianama.com/2017/09/223-consent-challenges-privacy-india-namaprivacy/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Consent and the need for a data protection regulator [&lt;a href="https://www.medianama.com/2017/09/223-privacy-india-consent-data-protection-regulator-namaprivacy/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Making consent work in India [&lt;a href="https://www.medianama.com/2017/09/223-privacy-india-consent-namaprivacy/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-economics-and-business-models-of-iot'&gt;https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-economics-and-business-models-of-iot&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IoT</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-08T02:09:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-data-standards-for-iot">
    <title>#NAMAprivacy: Data standards for IoT and home automation systems</title>
    <link>https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-data-standards-for-iot</link>
    <description>
        &lt;b&gt;On 5th October, MediaNama held a #NAMAprivacy conference in Bangalore focused on Privacy in the context of Artificial Intelligence, Internet of Things (IoT) and the issue of consent, supported by Google, Amazon, Mozilla, ISOC, E2E Networks and Info Edge, with community partners HasGeek and Takshashila Institution. Part 1 of the notes from the discussion on IoT:&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Link to the original published by Medianama on October 18 &lt;a class="external-link" href="https://www.medianama.com/2017/10/223-namaprivacy-data-standards-for-iot/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The second session of the #NAMAprivacy in Bangalore dealt with the  data privacy in the Internet of Things (IoT) framework. All three  panelists for the session – &lt;b&gt;Kiran Jonnalagadda from HasGeek,  Vinayak Hegde, a big data consultant working with ZoomCar and Rohini  Lakshane a policy researcher from CIS&lt;/b&gt; – said that they were  scared about the spread of IoT at the moment. This led to a discussion  on the standards which will apply to IoT, still nascent at this stage,  and how it could include privacy as well.&lt;/p&gt;
&lt;div class="pBFsgLLI" style="text-align: justify; "&gt;
&lt;div align="center"&gt;
&lt;div id="div-gpt-ad-1506358046991-0"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-176794 aligncenter" height="501" src="https://i2.wp.com/www.medianama.com/wp-content/uploads/IOT-panel-Namaprivacy-e1508321963437.jpg?resize=750%2C501&amp;amp;ssl=1" width="750" /&gt;&lt;/p&gt;
&lt;div class="gCmHYOrN" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Hedge, a volunteer with the Internet Engineering Task Force (IETF)  which was instrumental in developing internet protocols and standards  such as DNS, TCP/IP and HTTP, said that IETF took a political stand  recently when it came to privacy. “One of the discussions in the IETF  was whether security is really important? For a long time, the pendulum  swung the other way and said that it’s important and that it’s not big  enough a trade-off until the bomb dropped with the Snowden revelations. &lt;b&gt;The  IETF has always avoided taking any political stance. But for the first  time, they did take a political position and they published a request  for comments which said: “Pervasive monitoring is an attack on the  Internet” and that has become a guiding standard for developing the  standards,&lt;/b&gt;” he explained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He added that this led the development of new standards which took privacy into consideration by default.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;“The repercussions has been pervasive across all the  layers of the stack whether it is DNS and the development of DNS Sec.  The next version of HTTP, does not actually mandate encryption but if  you look at all the implementation on the browser side, all of them  without exception have incorporated encryption,” he added.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-176747 aligncenter" height="500" src="https://i2.wp.com/www.medianama.com/wp-content/uploads/NAMA-Data-Protection-Bangalore-93-e1508322824147.jpg?resize=750%2C500&amp;amp;ssl=1" width="750" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rohini added that discussion around the upcoming 5G standard, where  large-scale IoT will be deployed, also included increased emphasis on  privacy. “It is essentially a lot of devices connected to the Internet  and talking to each other and the user. The standards for security and  privacy for 5G are being built and some of them are in the process of  discussion. Different standard-setting bodies have been working on them  and there is a race of sorts for setting them up by stakeholders,  technology companies, etc to get their tech into the standard,” she  said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;b&gt;The good thing about those is that they will have time to get security and privacy. Here, I would like to mention &lt;a href="https://ict-rerum.eu/"&gt;RERUM&lt;/a&gt; which is formed from a mix of letters which stands for Reliable,  Resilient, and Secure IoT for smart cities being piloted in the EU. &lt;/b&gt;It  essentially believes that security should include reliability and  privacy by design. This pilot project was thought to allow IoT  applications to consider security and privacy mechanisms early in the  design, so that they could balance reliability. Because once a standard  is out or a mechanism is out, and you implement something as large as a  smart city, it is very difficult to retrofit these considerations,” she  explained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-176796 aligncenter" height="499" src="https://i2.wp.com/www.medianama.com/wp-content/uploads/Rohini-Lakshane-CIS-Namaprivacy-e1508322694320.jpg?resize=750%2C499&amp;amp;ssl=1" width="750" /&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Privacy issues in home automation and IoT&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Rohini pointed out a report which illustrates the staggering amount  of data collection which will be generated by home automation. “I was  looking for figures, and I found an FTC report published in 2015 where  one IoT company revealed in a workshop that it &lt;b&gt;provides home  automation to less than 10,000 households but all of them put together  account for 150 million data points per day.&lt;/b&gt; So that’s one data  point for every six seconds per household. So this is IoT for home  automation and there is IoT for health and fitness, medical devices, IoT  for personal safety, public transport, environment, connected cars,  etc.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this sort of situation, the data collected could be used for harms that users did not account for.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;“I received some data a couple of years back and the data  was from a water flowmeter. It was fitted to a villa in Hoskote and the  idea was simple where you could measure the water consumption in the  villa and track the consumption. So when I received the data, I figured  out by just looking at the water consumption, you can see how many  people are in the house, when they get up at night, when they go out,  when they are out of station. All of this data can be misused. Data is  collected specifically for water consumption and find if there are any  leakages in the house. But it could be used for other purposes,” &lt;b&gt;Arvind P from Devopedia&lt;/b&gt; said.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-176800 aligncenter" height="499" src="https://i1.wp.com/www.medianama.com/wp-content/uploads/Arvind-Devopedia-Namaprivcay-e1508323377344.jpg?resize=750%2C499&amp;amp;ssl=1" width="750" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash, policy director at Centre for Internet and Society (CIS)&lt;/b&gt;,  also provided an example of a Twitter handle called “should I be robbed  now” where it correlates a user’s vacation pictures says that they  could be robbed. “What we need to remember is that a lot of correlation  analysis is not just about the analysis but it is also about the use and  misuse of it. A lot of that use and misuse is non-transparent. Not a  single company tells you how they use your data, but do take rights on  taking your data,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-176801 aligncenter" height="501" src="https://i1.wp.com/www.medianama.com/wp-content/uploads/Pranesh-Prakash-Namaprivacy-e1508324108535.jpg?resize=750%2C501&amp;amp;ssl=1" width="750" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vinayak Hedge also added that the governments are using similar  methods of data tracking to catch bitcoin miners in China and Venezuela  from smart meters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In China, there are all these bitcoin miners. I was reading this story in Venezuela, where bitcoin mining is outlawed. &lt;b&gt;The  way they’re catching these bitcoin miners is by looking at their  electricity consumption. Bitcoin mining uses a huge amount of power and  computing capacity.&lt;/b&gt; And people have come out with ingenious  ways of getting around it. They will draw power from their neighbours or  maybe from an industrial setting. This could be a good example for a  privacy-infringing activity.”&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Pseudonymization&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Srinivas P, head of security at Infosys&lt;/b&gt;, pointed out that a possible solution to provide privacy in home automation systems could be the concept of pseudonymity. &lt;b&gt;Pseudonymization&lt;/b&gt; is  a procedure by which the most identifying fields within a data record  are replaced by one or more artificial identifiers or pseudonyms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There are a number of home automation systems which are similar to  NEST, which is extensively used in Silicon Valley homes, that connect to  various systems. For example, when you are approaching home, it will  know when to switch on your heating system or AC based on the weather.  And it also has information on who stays in the house and what room and  what time they sleep. And in a the car, it gives a full real-time  profile about the situation at home. It can be a threat if it is hacked.  This is a very common threat that is being talked about and how to  introduce pseudo-anonymity. When we use these identifiers, and when the  connectivity happens, how do we do so that the name and user are not  there? Pseudonymity can be introduced so that it becomes difficult for  the hacker to decipher who this guy is,” Srinivas added.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Ambient data collection&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;With IoT, it has never been able to capture ambient data. &lt;b&gt;Ambient data&lt;/b&gt; &lt;b&gt;is information that lies in areas not generally accessible to the user.&lt;/b&gt; An example for this is how users get traffic data from Internet companies. Kiran Jonnalagadda explained how this works:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;“When you look at traffic data on a street map, where is that data coming from? &lt;b&gt;It’s  not coming from the fact that there is an app on the phone constantly  transmitting data from the phone. It’s coming from the fact that cell  phone towers record who is coming to them and you know if the cell phone  tower is facing the road, and it has so many connections on it, you  know that traffic is at a certain level in that area&lt;/b&gt;. Now as a  user of the map, you are talking to a company which produces this map  and it is not a telecom company. Someone who is using a phone is only  dealing with a telecom company and how does this data transfer happen  and how much user data is being passed on to the last mile user who is  actually holding the phone.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-176802 aligncenter" height="501" src="https://i0.wp.com/www.medianama.com/wp-content/uploads/Kiran-Namaprivacy-e1508324684657.jpg?resize=750%2C501&amp;amp;ssl=1" width="750" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jonnalagadda stressed on the need for people to ask who is aggregating this ambient data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Now obviously, when you look at the map, you don’t get to see, who  is around you. And that would be a clear privacy violation and you only  get to see the fact that traffic is at a certain level of density around  the street around you. But at what point is the aggregation of data  happening from an individually identifiable phone to just a red line or a  green line indicating the traffic in an area. We also need to ask who  is doing this aggregation. Is it happening on the telecom level? Is it  happening on the map person level and what kind of algorithms are  required that a particular phone on a cell phone network represents a  moving vehicle or a pedestrian? Can a cell phone company do that or does  a map company do that? If you start digging and see at what point is  your data being anonymized and who is responsible for anonmyzing it and  you think that this is the entity that is supposed to be doing it, we  start realizing that it is a lot more complicated and a lot more  pervasive than we thought it would be,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;#NAMAprivacy Bangalore:&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Will artificial Intelligence and Machine Learning kill privacy? [&lt;a href="https://www.medianama.com/2017/10/223-namaprivacy-artificial-intelligence-privacy/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Regulating Artificial Intelligence algorithms [&lt;a href="https://www.medianama.com/2017/10/223-namaprivacy-regulating-artificial-intelligence-algorithms/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Data standards for IoT and home automation systems [&lt;a href="https://www.medianama.com/2017/10/223-namaprivacy-data-standards-for-iot/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;The economics and business models of IoT and other issues [&lt;a href="https://www.medianama.com/2017/10/223-namaprivacy-economics-and-business-models-of-iot/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;#NAMAprivacy Delhi:&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Blockchains and the role of differential privacy [&lt;a href="https://www.medianama.com/2017/09/223-namaprivacy-blockchains-role-differential-privacy/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Setting up purpose limitation for data collected by companies [&lt;a href="https://www.medianama.com/2017/09/223-namaprivacy-setting-purpose-limitation-data-collected-companies/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;The role of app ecosystems and nature of permissions in data collection [&lt;a href="https://www.medianama.com/2017/09/223-namaprivacy-role-app-ecosystems-nature-permissions-data-collection/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Rights-based approach vs rules-based approach to data collection [&lt;a href="https://www.medianama.com/2017/09/223-namaprivacy-rights-based-approach-vs-rules-based-approach-data-collection/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Data colonisation and regulating cross border data flows [&lt;a href="https://www.medianama.com/2017/09/223-namaprivacy-data-colonisation-and-regulating-cross-border-data-flows/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Challenges with consent; the Right to Privacy judgment [&lt;a href="https://www.medianama.com/2017/09/223-consent-challenges-privacy-india-namaprivacy/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Consent and the need for a data protection regulator [&lt;a href="https://www.medianama.com/2017/09/223-privacy-india-consent-data-protection-regulator-namaprivacy/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Making consent work in India [&lt;a href="https://www.medianama.com/2017/09/223-privacy-india-consent-namaprivacy/"&gt;read&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-data-standards-for-iot'&gt;https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-data-standards-for-iot&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2017-11-08T02:15:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/medianama-rana-september-9-2018-namaprivacy-data-protection-authoritys-regulatory-and-enforcement-challenges">
    <title>#NAMAprivacy: Data Protection Authority's regulatory and enforcement challenges</title>
    <link>https://cis-india.org/internet-governance/news/medianama-rana-september-9-2018-namaprivacy-data-protection-authoritys-regulatory-and-enforcement-challenges</link>
    <description>
        &lt;b&gt;This is the second post in our series covering our events in Delhi and Bangalore on India’s Data Protection Law.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Rana was published in &lt;a class="external-link" href="https://www.medianama.com/2018/09/223-namaprivacy-data-protection-authoritys-regulatory-and-enforcement-challenges/"&gt;Medianama&lt;/a&gt; on September 9, 2018. Amber Sinha was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“The Data Protection Authority of India, as it stands, performs legislative, executive and judicial functions. It’s not a bad thing,” said Alok Prasanna Kumar, Senior Resident Fellow at the Vidhi Centre for Legal Policy at the #NAMAprivacy discussion on the data protection bill in Bangalore last week. “But unlike other regulators, the DPA’s ambit is vast. It could potentially deal with every kind of company. So, there’s no way one entity could do this in regards to efficacy and no single entity should do it either.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That was one of the many challenges that our panelists have suggested  that the regulator may face when it is established. Panelists, however,  were largely unsure on how the proposed regulator will impact consumers  or businesses, given that the most regulations are yet to be defined in  the Personal Data Protection Bill, 2018. To this extent, Renuka Sane,  Associate Professor at the National Institute of Public Finance and  Policy (NIPFP) said, “On most questions about this law, I would have one  answer, that it is too early to say anything. We will have to wait and  see how it will evolve.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To reiterate, the draft bill, 2018 proposed establishing a regulatory  body that will implement and oversee the data protection law in the  country; the Data Protection Authority of India (DPA). The regulatory  body will be empowered to impose penalties on data fiduciaries, accept  complaints from data principals, prevent misuse of personal data,  determine if the data protection law has been violated, and promote  awareness of data protection. The authority will consist of six  whole-time members and a chairperson, to be appointed by the central  government, based on the recommendations of a selection committee that  includes the Chief Justice of India (CJI), the Cabinet secretary and one  CJI nominated expert.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following are some of the key points made in both, Delhi and  Bengaluru. Please note that these points are not necessarily listed in  the order they were made and are not verbatim excerpts of the speakers’  remarks. We’ve edited them for brevity.&lt;/p&gt;
&lt;h3&gt;Regulatory and Enforcement by the DPA&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Tasks to be undertaken&lt;/b&gt;: There are four main functions that the DPA has to undertake at some point of time – &lt;ol&gt;
&lt;li&gt;The DPA will have to issues licenses to some players&lt;/li&gt;
&lt;li&gt;It will have to come up with regulations as there are several places in the Act (Bill) that will be determined by regulations,&lt;/li&gt;
&lt;li&gt;It will have come up with some sort of monitoring mechanism to gauge  if you are abiding by the regulations are not and iv. It will have to  determine violations and undertake enforcement actions&lt;b&gt;. &lt;/b&gt;(Renuka Sane)&lt;/li&gt;
&lt;/ol&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;To increase transparency and credibility&lt;/b&gt;:  Regulators have to demonstrate what is the problem that they are trying  to solve before passing a regulation. Is the solution they are opting  for, the most appropriate way of solving the problem? Have they  considered all the available alternative solutions? They need to hold  public consultations on all these issues in a transparent manner. Unless  all these things are embedded in the law, we are not going to make much  progress on the DPA. (Renuka Sane)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Regulatory balance&lt;/b&gt;: The regulators in India need to  merge the two sides of responsive theory – compliance theory, where we  put a lot of faith in businesses to self-regulate and comply with  processes, with dissonance theory, where we have punishments, fines and  criminal enforcement for noncompliance. (Amber Sinha, Senior Programme  Manager at Centre for Internet and Society (CIS))If a DPA were to come  in today and regulate everybody who is dealing with personal data at a  significant level, there are more than 600 million entities that they  have to regulate. (Beni Chugh, Dvara)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Accountability:&lt;/b&gt; When you create an extremely  powerful agency like the DPA, you will have to put in place a system of  regulatory governance, where the DPA is held accountable for its actions  or else you will exhaustipate the asymmetry of power between the  regulator and the regulated. (Renuka Sane)&lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;br /&gt; One big feature, which has become a standard practice across regulators,  that is missing in the DRA is a reporting board structure, where you  are internally accountable to the management board and externally, you  are accountable through self-reporting mechanisms. The functioning of  the Chairperson is not defined well enough for us to see if there is  enough internal accountability at the organisation. The internal  governance of the regulatory body is what can improve the outcomes of  the regulations. (Beni Chugh).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Penalties for violation of privacy laws&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Criminal penalties: &lt;/b&gt;According to me, the threshold  for a criminal offence is low in this bill. If the law were to be  implemented today, a vast majority of the businesses would be criminally  charged. There are three provision in the bill that deal with criminal  penalties, they essentially deal with data processors breaching  individual rights in a reckless or in a grossly negligent fashion. There  are legal standards on how to construed ‘reckless’ behavior,  particularly from the domain of tort law. However, what will trigger an  enforcement action is still kind of open to speculation because the  language of the bill open to interpretation.  (Amber Sinha, CIS)&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;b&gt;The bill enables the Data Protection Authorities  to impose penalties of up to Rs 15 crores or 4% of the annual global  turnover, whichever is higher, for violating privacy laws.&lt;/b&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Penalties for govt authorities: &lt;/b&gt;Even if you levy a  heavy fine on a government authority for breaching any laws, it’s you  and I who will be paying for their fault, because its ultimately going  from the Budget. I think that’s where the criminal offense part of it  becomes important. You can hold people personally liable. (Beni Chugh)An  individual liability on a government official or secretary may be the  way to go and I find that the bill has that provision In (Bill) 96 (3).  (a member of the audience)I think that there are several exceptions  given to the state and perhaps that will make it more difficult to  define whether there has been a violation by the state. (Renuka Sane)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Impact on consumers and businesses&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Onerous task for consumers&lt;/b&gt;: The problem with the  bill is that it assumes a lot of active understanding of the law. For a  consumer to file a grievance, she has to say that there was a violation  and it is likely to (or) has caused her harm. But, since harm is not  well defined, how are you going to file a grievance? (Beni Chugh)&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Uncertainty over regulations&lt;/b&gt;: I’m uncertain about  the impact the bill would have on businesses because many of the  obligations that one needs to abide by, are not well defined. (Beni  Chugh)&lt;/li&gt;
&lt;li&gt;Bill will become less ambiguous once the DRA creates regulations. (Renuka Sane)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Other notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;One thing that the bill does fairly well is defining the obligations of a data processor. (Amber Sinha)&lt;/li&gt;
&lt;li&gt;There are certain discrepancies which exist between the approach  that the report seems to espouse and what is actually reflected in the  Bill. (Amber Sinha)&lt;/li&gt;
&lt;li&gt;On most questions about this law, I would have one answer that it is  too early to say and we will see how it will evolve. (Renuka Sane)&lt;/li&gt;
&lt;li&gt;There are various metrics based on which you can define if the DRA  is an independent organisation. Based on few of them, it could be  independent, but based on others, it could not be. (Renuka Sane)&lt;/li&gt;
&lt;li&gt;I think that there are several exceptions given to the state and  perhaps that will make it more difficult to define whether there has  been a violation by the state. (Renuka Sane)&lt;/li&gt;
&lt;li&gt;I predict that the DPA will treat NPCI as any other fiduciary, even  if the data it processes will be marked as critical. (Manasa  Venkataraman, Associate Fellow, The Takshashila Institution)&lt;/li&gt;
&lt;li&gt;In the EU, they have had the luxury of spending 10 years (on GDPR)  because they already had a data protection law. But for us, we never had  one, this is the first one. So, in that sense, it is definitely much  more urgent for us. We have to get it right, we can’t rush it but there  is much greater urgency in our jurisdiction. (Amber Sinha)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/medianama-rana-september-9-2018-namaprivacy-data-protection-authoritys-regulatory-and-enforcement-challenges'&gt;https://cis-india.org/internet-governance/news/medianama-rana-september-9-2018-namaprivacy-data-protection-authoritys-regulatory-and-enforcement-challenges&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-09-14T12:26:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/namapolicy-on-online-content-regulation">
    <title>#NAMApolicy on Online Content Regulation</title>
    <link>https://cis-india.org/internet-governance/news/namapolicy-on-online-content-regulation</link>
    <description>
        &lt;b&gt;Swaraj Barooah attended the #NAMApolicy on Online Content Regulation organized by Media Nama at India Habitat Centre in New Delhi on May 3, 2018.&lt;/b&gt;
        &lt;h2&gt;Agenda&lt;/h2&gt;
&lt;div id="_mcePaste"&gt;01:30 p.m. - 03:00 p.m.: Panel #1 &amp;amp; Open House - News&lt;/div&gt;
&lt;div id="_mcePaste"&gt;03:00 p.m. - 03:15 p.m.: Tea break&lt;/div&gt;
&lt;div id="_mcePaste"&gt;03:15 p.m. - 04:45 p.m.: Panel #2 &amp;amp; Open House - Entertainment&lt;/div&gt;
&lt;div id="_mcePaste"&gt;04:45 p.m. - 05:15 p.m.: Remaining issues&lt;/div&gt;
&lt;div id="_mcePaste"&gt;05:15 p.m. - 06:00 p.m.: High-tea&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p&gt;01:30 p.m. - 03:00 p.m.: Panel #1 &amp;amp; Open House - News03:00 p.m. - 03:15 p.m.: Tea break03:15 p.m. - 04:45 p.m.: Panel #2 &amp;amp; Open House - Entertainment&lt;br /&gt;&lt;span&gt;04:45 p.m. - 05:15 p.m.: Remaining issues&lt;br /&gt;05:15 p.m. - 06:00 p.m.: High-tea&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/namapolicy-on-online-content-regulation'&gt;https://cis-india.org/internet-governance/news/namapolicy-on-online-content-regulation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-05-05T01:52:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/whatever-happened-to-privacy">
    <title>"Whatever happened to Privacy?" - International Activism Conference</title>
    <link>https://cis-india.org/news/whatever-happened-to-privacy</link>
    <description>
        &lt;b&gt;Maria Xynou gave a keynote speech and participated as a panelist on the "Suspect Societies" panel. The event was organized by Heinrich Boell Foundation in Berlin on December 5 and 6, 2013.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;"Whatever happened to privacy" brought together international activists on focal topics and combined bar camp style work sessions and political round tables with a classic public event, It focussed on an issue which has far reaching consequences for politically active people across the world - the issue of privacy and surveillance. The revelations around the NSA and GCHQ as well as other countries secret service digital surveillance activities have spurred political debate. This debate was intensified at "Whatever happened to Privacy?" formulating political demands, developing action strategies and debating questions such as:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;What cultural and political value does privacy have today?&lt;/li&gt;
&lt;li&gt;What are the societal implications of the wide spread "I have nothing to hide" attitude?&lt;/li&gt;
&lt;li&gt;What political actions are necessary to protect citizens from mass surveillance and what tools exist for people to secure their communications, movements and lives?&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;For video and more info, &lt;a class="external-link" href="http://www.boell.de/en/whatever-happened-privacy"&gt;click here&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/whatever-happened-to-privacy'&gt;https://cis-india.org/news/whatever-happened-to-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-03T05:56:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/privacy-conferencefeb5">
    <title>"Privacy matters"</title>
    <link>https://cis-india.org/events/privacy-conferencefeb5</link>
    <description>
        &lt;b&gt;Privacy India invites individuals to attend the second "Privacy matters" conference, a one-day event on the 5th February 2011 at the TERI Southern Regional Centre, Bangalore. Privacy India, Society in Action Group, and the Centre for Internet &amp; Society have joined hands to organize the event. &lt;/b&gt;
        
&lt;p&gt;The “Privacy matters” conference will focus on discussing the challenges to privacy that India is currently facing. The right to privacy in India has been a neglected area of study and engagement. Although sectoral legislation deals with privacy issues, e.g., the TRAI Act for telephony or RBI guidelines for banking, India does not as yet have a horizontal legislation that deals comprehensively with privacy across all contexts. This lack of uniformity has led to ironically imbalanced results. In India today one has a stronger right to privacy over telephone records than over one’s own medical records.&amp;nbsp; The absence of a minimum guarantee of privacy is felt most heavily by marginalized communities, including HIV patients, children, women, sexuality minorities, prisoners, etc. – people who most need to know that sensitive information is protected.&lt;/p&gt;
&lt;p&gt;The emergence of information and communications technologies over the past two decades has radically transformed the speed and costs of access to information. However, this enhanced climate of access to information has been a mixed blessing. Whilst augmenting our access to knowledge, this new networked information economy has also now made it much easier, quicker, and cheaper to gain access to intimate personal information about individuals than ever before. As people expose more and more of their lives to others through the use of social networks, reliance on mobile phones, global trade, etc., there has emerged a heightened risk of privacy violations in India.&amp;nbsp; As privacy continues to be a growing concern for individuals, nations, and the international community, it is critical that India understands and addresses the questions, challenges, implications and dilemmas that violations of privacy pose.&lt;/p&gt;
&lt;h3&gt;Who We Are&lt;/h3&gt;
&lt;p&gt;Privacy India was set up in collaboration with The Centre for Internet and Society (CIS), Bangalore and Society in Action Group (SAG), under the auspices of the international organization ‘Privacy International.’&amp;nbsp; Privacy International is a non-profit group that provides assistance to civil society groups, governments, international and regional bodies, the media and the public in a number of countries (see www.privacyinternational.org).&amp;nbsp; Its Advisory Board is made up of distinguished intellectuals, academicians, thinkers and activists such as Noam Chomsky, the late Harold Pinter, and others, and it has collaborated with organizations such as the American Civil Liberties Union (ACLU).&lt;/p&gt;
&lt;h3&gt;'Privacy Matters' conference agenda&lt;/h3&gt;
&lt;p&gt;February 5th, 2011&amp;nbsp; ---&amp;nbsp; 10:30 am - 4:30pm&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;TERI Southern Regional Centre&amp;nbsp;&lt;/p&gt;
&lt;p&gt;4th Main, Domlur II Stage &lt;br /&gt;&amp;nbsp;Bangalore - 560 071&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;
&lt;th&gt;Item &lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;10:30 -10:45&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Welcome Address&lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Who is PI and what are our objectives &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Why is privacy important in India &lt;/li&gt;&lt;/ul&gt;
&lt;em&gt;Prashant Iyengar (Lead Researcher at Privacy India)&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;10:45-11:15&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Keynote&lt;/strong&gt;: Ashish Rajadhyaksha &lt;br /&gt;&lt;em&gt;(Senior Fellow, Centre for the Study of Culture &amp;amp; Society)&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:15-11:30 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Tea Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30 –12:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Session I: Privacy and Open Government Data&lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Property Rights, Privacy, and Open Government Data:&lt;/li&gt;&lt;/ul&gt;
&amp;nbsp;&lt;em&gt;Zainab Bawa (CIS-RAW Fellow) &lt;/em&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:30 – 1:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Session II: Privacy Rights and Minorities &amp;nbsp;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Privacy Rights of Sexualality Minorities:&lt;/li&gt;&lt;/ul&gt;
&amp;nbsp;&lt;em&gt;Arvind Narrain&lt;/em&gt; &lt;em&gt;(Alternative Law Forum)&lt;/em&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp; Now you see her, now you don’t - Issues of sex workers and questions around privacy:&lt;/li&gt;&lt;/ul&gt;
&lt;em&gt;&amp;nbsp;Shubha Chacko (Sangama)&lt;/em&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;The UID and Refugees: &lt;/li&gt;&lt;/ul&gt;
&lt;em&gt;Sahana Basavapatna&lt;/em&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1:30 – 2:30 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Lunch &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2:30 – 3:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Session III: Identity and Privacy &lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;em&gt;&amp;nbsp; Malavika Jarayam (Jayaram &amp;amp; Jayaram) &amp;nbsp;&lt;/em&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&lt;em&gt;&amp;nbsp;Hamish Fraser (Partner at Truman Hoyle, Sydney Australia)&lt;/em&gt;&lt;em&gt;&lt;/em&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&lt;em&gt;&amp;nbsp; Michael Whitener (Principal and co-founder of VistaLaw International LLC)&lt;br /&gt;&lt;/em&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:00-3:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Session IV:&amp;nbsp;&lt;/strong&gt; &lt;strong&gt;Privacy and the Media/Social Networking&lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp; Privacy and Social Networking:&lt;/li&gt;&lt;/ul&gt;
&amp;nbsp;&lt;em&gt;Ujjvala Ballal (Inclusive Planet)&lt;/em&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Privacy Issues in Social Networking Websites:&lt;/li&gt;&lt;/ul&gt;
&amp;nbsp;&lt;em&gt;Gagan K. (NLSIU law student)&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:30 – 3:45&lt;/td&gt;
&lt;td&gt;Tea break &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:45 – 4:30 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Session V: Open discussion and opinion sharing&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;RSVP:&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;prashant@privacyindia.org&lt;/li&gt;&lt;li&gt;elonnai@privacyindia.org&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;Download the poster &lt;a href="https://cis-india.org/advocacy/igov/privacy-bangalore-conference" class="internal-link" title="Privacy in Bangalore"&gt;here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;VIDEOS&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKn3xgA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKn4lUA"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/privacy-conferencefeb5'&gt;https://cis-india.org/events/privacy-conferencefeb5&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T07:20:22Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/decoding-the-digital-winter-school-at-iiit-bangalore">
    <title>"Decoding the Digital"- Winter School at IIIT Bangalore</title>
    <link>https://cis-india.org/internet-governance/news/decoding-the-digital-winter-school-at-iiit-bangalore</link>
    <description>
        &lt;b&gt;The Centre for IT and Public Policy at IIIT Bangalore organized a winter school from December 12 to 14, 2016 at the IIIT campus on Decoding the Digital, where the theme for the same was Smart Cities and Social Media. Vanya Rakesh participated in it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The event &lt;span&gt;&lt;span&gt;involved &lt;span&gt;lectures,  interactive discussions, film screenings and group activities on topics  ranging from smart communities, smart phones, intelligent  transportation, big data, privacy, surveillance, etc. For more inflo, &lt;a class="external-link" href="http://citapp.iiitb.ac.in/news-and-events/conferences-workshops/the-winter-school-decoding-the-digital/"&gt;click here&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/decoding-the-digital-winter-school-at-iiit-bangalore'&gt;https://cis-india.org/internet-governance/news/decoding-the-digital-winter-school-at-iiit-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Smart Cities</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-12-17T01:39:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/c95ca8ccdca8ca1-caeca4ccdca4cc1-ca4c82ca4ccdcb0c9cccdc9ecbeca8ca6-c9cca4cc6-c9cca4cc6c97cc6...">
    <title>"ಕನ್ನಡ ಮತ್ತು ತಂತ್ರಜ್ಞಾನದ ಜೊತೆ ಜೊತೆಗೆ..."</title>
    <link>https://cis-india.org/internet-governance/c95ca8ccdca8ca1-caeca4ccdca4cc1-ca4c82ca4ccdcb0c9cccdc9ecbeca8ca6-c9cca4cc6-c9cca4cc6c97cc6...</link>
    <description>
        &lt;b&gt;ನಾನು ಏನಾದರು ಮಾಡಬೇಕು ಎಂದುಕೊಂಡರೆ ಸಾಲದು, ಬನ್ನಿ, ಕಾರ್ಯೋನ್ಮುಖರಾಗಿ...&lt;/b&gt;
        
&lt;h2&gt;ಮೊದಲ ಹೆಜ್ಜೆ&lt;/h2&gt;
&lt;h3&gt;ಕನ್ನಡ ಮತ್ತು ತಂತ್ರಜ್ಞಾನದ ಬೆಳವಣಿಗೆಯಲ್ಲಿ ಪಾಲ್ಗೊಳ್ಳುವ ಆಸೆಯೇ?&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;ಪ್ರತಿಯೊಬ್ಬ ಕನ್ನಡಿಗನಲ್ಲೂ ಕನ್ನಡಕ್ಕೆ ದುಡಿಯುವ ಬಲವಾದ ಆಸೆಯಿರುತ್ತದೆ. ಅಕ್ಷರ ಕಲಿಯುವ ದೆಸೆಯಿಂದ ಹಿಡಿದು, ದುಡಿದು ದೊಡ್ಡವನಾಗುವವರೆಗೂ ಹೇಗೆ ತನ್ನ ಆಸೆಯನ್ನು ಈಡೇರಿಸಿಕೊಳ್ಳುವುದೆಂಬ ಪ್ರಶ್ನೆ ಮನಸ್ಸಿನಲ್ಲಿ ಸುಳಿಯುತ್ತಲೇ ಇರುತ್ತದೆ. ಮಾಹಿತಿ ತಂತ್ರಜ್ಞಾನದ ಕ್ಷೇತ್ರದಲ್ಲಂತೂ, ಅದನ್ನು ಬಳಸುವ ಸಾಮಾನ್ಯನಿಂದ ಹಿಡಿದು, ತಂತ್ರಜ್ಞಾನದ ಜೊತೆಗೇ ದಿನದೂಡುವ ತಂತ್ರಜ್ಞನವರೆಗೂ ಎಲ್ಲರಿಗೂ ಕನ್ನಡ ಬಳಸುವ ಮತ್ತು ಬೆಳೆಸುವ ಆಸೆ ಖಂಡಿತ ಇರುತ್ತದೆ. ಅಂತಹ ಆಸೆಗಳನ್ನು ಮತ್ತೆ ಚಿಗುರಿಸಿ, ಮಾಹಿತಿ ತಂತ್ರಜ್ಞಾನದ ಬಳಕೆದಾರನ ದಿನನಿತ್ಯದ ಪ್ರಶ್ನೆಗಳನ್ನು ಉತ್ತರಿಸುತ್ತಾ, ಕನ್ನಡದ ತಾಂತ್ರಿಕ ಬೆಳವಣಿಗೆಗೆ ನಾಂದಿಯಾಗಲು ನಾವು ಇಡಬೇಕಾದ ‘ಹೆಜ್ಜೆಗಳು” ಅನೇಕ.&lt;/p&gt;
&lt;p&gt;ದೈನಂದಿನ ಬದುಕಿನಲ್ಲಿ ತಂತ್ರಜ್ಞಾನದ ಮುಖೇನ ಕನ್ನಡದಲ್ಲೇ ವ್ಯವಹರಿಸಬಹುದೇ? ಕನ್ನಡದ ತಾಂತ್ರಿಕ ಬೆಳವಣಿಗೆ ಹೇಗೆ ಸಾಧ್ಯ? ಅದರಲ್ಲಿ ತಮ್ಮನ್ನು ತಾವು ತೊಡಗಿಸಿಕೊಳ್ಳುವ ಬಗೆ ಹೇಗೆ? ಕನ್ನಡ ಭಾಷಾ ತಂತ್ರಜ್ಞಾನ ಬೆಳವಣಿಗೆಯ ತೊಡಕುಗಳ ನಿವಾರಣೆ ಸಾಧ್ಯವೇ? ತಂತ್ರಾಂಶಗಳು ನಡೆಯಬೇಕಿರುವ ಹಾದಿಯ ಕಿರು ಪರಿಚಯ ಎಲ್ಲಿ ಸಿಗಬಹುದು? ಇದಕ್ಕೊಂದು ಸಮುದಾಯವಿದೆಯೇ? ಈ ಸಮುದಾಯ ಅಭಿವೃದ್ದಿಯ ಪರಿಕಲ್ಪನೆ ಏನು? ಇತ್ಯಾದಿ ಪ್ರಶ್ನೆಗಳಿಗೆ ಉತ್ತರ ಕಂಡುಕೊಳ್ಳುವ ಸಲುವಾಗಿ ‘ಹೆಜ್ಜೆ’ ರೂಪಿತಗೊಂಡಿದೆ.&lt;/p&gt;
&lt;p&gt;ಮಾಹಿತಿ ತಂತ್ರಜ್ಞಾನದ ವಿವಿಧ ಸ್ತರಗಳಲ್ಲಿ ಕನ್ನಡದ ಬೆಳವಣಿಗೆಗೆ ಬೇಕಾದ ವಿಷಯಗಳ ಬಗ್ಗೆ ಅನುಭವಿ ತಜ್ಞರು, ತಂತ್ರಜ್ಞರು ತಮ್ಮ ಅನುಭವವನ್ನು ಹಂಚಿಕೊಳ್ಳುವುದರ ಮೂಲಕ ಪ್ರಾರಂಭವಾಗುವ ಈ ಕಾರ್ಯಕ್ರಮ, ಮೇಲೆ ಹೇಳಿದ ಅನೇಕ ಪ್ರಶ್ನೆಗಳಿಗೆ ಉತ್ತರವನ್ನು ಪಡೆದುಕೊಳ್ಳುವ ‘ಹೆಜ್ಜೆ’ಗಳ ಹಾದಿಯನ್ನು ನಿಮ್ಮ ಮುಂದೆ ತೆರೆಯಲಿದೆ.&lt;/p&gt;
&lt;p&gt;ಬನ್ನಿ ನಮ್ಮೊಡನೆ ಜೊತೆಜೊತೆಯಾಗಿ ಹೆಜ್ಜೆ ಹಾಕಿ, ನಿಮ್ಮ ಬರುವಿಕೆಯನ್ನು ಇಂದೇ &lt;a class="external-link" href="http://hejje.sanchaya.net/register/"&gt;ಕಾಯ್ದಿರಿಸಿ&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://hejje.sanchaya.net/2012/01/first-step/"&gt;Read More&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/c95ca8ccdca8ca1-caeca4ccdca4cc1-ca4c82ca4ccdcb0c9cccdc9ecbeca8ca6-c9cca4cc6-c9cca4cc6c97cc6...'&gt;https://cis-india.org/internet-governance/c95ca8ccdca8ca1-caeca4ccdca4cc1-ca4c82ca4ccdcb0c9cccdc9ecbeca8ca6-c9cca4cc6-c9cca4cc6c97cc6...&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-01-16T03:59:59Z</dc:date>
   <dc:type>Event</dc:type>
   </item>




</rdf:RDF>
