<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 376 to 390.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-international-ambika-tandon-october-17-2019-mother-and-child-tracking-system-understanding-data-trail-indian-healthcare"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/mirror-in-the-enigma"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-ministry-and-the-trace-subverting-end-to-end-encryption"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/fortune-india-arnika-thakur-may-22-2018-law-tries-to-catch-up-with-tech"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/ibnlive-videos-november-20-2012-the-last-word-is-there-a-need-to-review-information-technology-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/kids-on-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/internet-new-billion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/Internet-Culture-Society"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/cape-and-islands-march-12-2014-the-internet-will-be-everywhere-in-2025-for-better-or-worse"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/biblio-january-february-volume-ix-8-nishant-shah-the-internet-way"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-jyoti-panday-january-29-2016-internet-has-a-new-standard-for-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/the-internet-and-illusions-of-space-and-liberty"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/india-privacy-monitor-map"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/india-conference-cyber-security-and-cyber-governance"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-international-ambika-tandon-october-17-2019-mother-and-child-tracking-system-understanding-data-trail-indian-healthcare">
    <title>The Mother and Child Tracking System - understanding data trail in the Indian healthcare systems</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-international-ambika-tandon-october-17-2019-mother-and-child-tracking-system-understanding-data-trail-indian-healthcare</link>
    <description>
        &lt;b&gt;Reproductive health programmes in India have been digitising extensive data about pregnant women for over a decade, as part of multiple health information systems. These can be seen as precursors to current conceptions of big data systems within health informatics. In this article, published by Privacy International, Ambika Tandon presents some findings from a recently concluded case study of the MCTS as an example of public data-driven initiatives in reproductive health in India. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;This article was first published by &lt;a href="https://privacyinternational.org/news-analysis/3262/mother-and-child-tracking-system-understanding-data-trail-indian-healthcare" target="_blank"&gt;Privacy International&lt;/a&gt;, on October 17, 2019&lt;/h4&gt;
&lt;h4&gt;Case study of MCTS: &lt;a href="https://cis-india.org/raw/big-data-reproductive-health-india-mcts" target="_blank"&gt;Read&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;p&gt;On October 17th 2019, the UN Special Rapporteur (UNSR) on Extreme Poverty and Human Rights, Philip Alston, released his thematic report on digital technology, social protection and human rights. Understanding the impact of technology on the provision of social protection – and, by extent, its impact on people in vulnerable situations – has been part of the work the Centre for Internet and Society (CIS) and Privacy International (PI) have been doing.&lt;/p&gt;
&lt;p&gt;Earlier this year, &lt;a href="https://privacyinternational.org/advocacy/2996/privacy-internationals-submission-digital-technology-social-protection-and-human" target="_blank"&gt;PI responded&lt;/a&gt; to the UNSR's consultation on this topic. We highlighted what we perceived as some of the most pressing issues we had observed around the world when it comes to the use of technology for the delivery of social protection and its impact on the right to privacy and dignity of benefit claimants.&lt;/p&gt;
&lt;p&gt;Among them, automation and the increasing reliance on AI is a topic of particular concern - countries including Australia, India, the UK and the US have already started to adopt these technologies in digital welfare programmes. This adoption raises significant concerns about a quickly approaching future, in which computers decide whether or not we get access to the services that allow us to survive. There's an even more pressing problem. More than a few stories have emerged revealing the extent of the bias in many AI systems, biases that create serious issues for people in vulnerable situations, who are already exposed to discrimination, and made worse by increasing reliance on automation.&lt;/p&gt;
&lt;p&gt;Beyond the issue of AI, we think it is important to look at welfare and automation with a wider lens. In order for an AI to function it needs to be trained on a dataset, so that it can understand what it is looking for. That requires the collection large quantities of data. That data would then be used to train and AI to recognise what fraudulent use of public benefits would look like. That means we need to think about every data point being collected as one that, in the long run, will likely be used for automation purposes.&lt;/p&gt;
&lt;p&gt;These systems incentivise the mass collection of people's data, across a huge range of government services, from welfare to health - where women and gender-diverse people are uniquely impacted. CIS have been looking specifically at reproductive health programmes in India, work which offers a unique insight into the ways in which mass data collection in systems like these can enable abuse.&lt;/p&gt;
&lt;p&gt;Reproductive health programmes in India have been digitising extensive data about pregnant women for over a decade, as part of multiple health information systems. These can be seen as precursors to current conceptions of big data systems within health informatics. India’s health programme instituted such an information system in 2009, the Mother and Child Tracking System (MCTS), which is aimed at collecting data on maternal and child health. The Centre for Internet and Society, India, &lt;a href="https://cis-india.org/raw/big-data-reproductive-health-india-mcts" target="_blank"&gt;undertook a case study of the MCTS&lt;/a&gt; as an example of public data-driven initiatives in reproductive health. The case study was supported by the &lt;a href="http://bd4d.net/" target="_blank"&gt;Big Data for Development network&lt;/a&gt; supported by the International Development Research Centre, Canada. The objective of the case study was to focus on the data flows and architecture of the system, and identify areas of concern as newer systems of health informatics are introduced on top of existing ones. The case study is also relevant from the perspective of Sustainable Development Goals, which aim to rectify the tendency of global development initiatives to ignore national HIS and create purpose-specific monitoring systems.&lt;/p&gt;
&lt;p&gt;After being launched in 2011, 120 million (12 crore) pregnant women and 111 million (11 crore) children have been registered on the MCTS as of 2018. The central database collects data on each visit of the woman from conception to 42 days postpartum, including details of direct benefit transfer of maternity benefit schemes. While data-driven monitoring is a critical exercise to improve health care provision, publicly available documents on the MCTS reflect the complete absence of robust data protection measures. The risk associated with data leaks are amplified due to the stigma associated with abortion, especially for unmarried women or survivors of rape.&lt;/p&gt;
&lt;p&gt;The historical landscape of reproductive healthcare provision and family planning in India has been dominated by a target-based approach. Geared at population control, this approach sought to maximise family planning targets without protecting decisional autonomy and bodily privacy for women. At the policy level, this approach was shifted in favour of a rights-based approach to family planning in 1994. However, targets continue to be set for women’s sterilisation on the ground. Surveillance practices in reproductive healthcare are then used to monitor under-performing regions and meet sterilisation targets for women, this continues to be the primary mode of contraception offered by public family planning initiatives.&lt;/p&gt;
&lt;p&gt;More recently, this database -&amp;nbsp;among others collecting data about reproductive health - is adding biometric information through linkage with the Aadhaar infrastructure. This data adds to the sensitive information being collected and stored without adhering to any publicly available data protection practices. Biometric linkage is aimed to fulfill multiple functions - primarily authentication of welfare beneficiaries of the national maternal benefits scheme. Making Aadhaar details mandatory could directly contribute to the denial of service to legitimate patients and beneficiaries - as has already been seen in some cases.&lt;/p&gt;
&lt;p&gt;The added layer of biometric surveillance also has the potential to enable other forms of abuse of privacy for pregnant women. In 2016, the union minister for Women and Child Development under the previous government suggested the use of strict biometric-based monitoring to discourage gender-biased sex selection. Activists critiqued the policy for its paternalistic approach to reduce the rampant practice of gender-biased sex selection, rather than addressing the root causes of gender inequality in the country.&lt;/p&gt;
&lt;p&gt;There is an urgent need to rethink the objectives and practices of data collection in public reproductive health provision in India. Rather than continued focus on meeting high-level targets, monitoring systems should enable local usage and protect the decisional autonomy of patients. In addition, the data protection legislation in India - expected to be tabled in the next session in parliament - should place free and informed consent, and informational privacy at the centre of data-driven practices in reproductive health provision.&lt;/p&gt;
&lt;p&gt;This is why the systematic mass collection of data in health services is all the more worrying. When the collection of our data becomes a condition for accessing health services, it is not only a threat to our right to health that should not be conditional on data sharing but also it raises questions as to how this data will be used in the age of automation.&lt;/p&gt;
&lt;p&gt;This is why understanding what data is collected and how it is collected in the context of health and social protection programmes is so important.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-international-ambika-tandon-october-17-2019-mother-and-child-tracking-system-understanding-data-trail-indian-healthcare'&gt;https://cis-india.org/internet-governance/blog/privacy-international-ambika-tandon-october-17-2019-mother-and-child-tracking-system-understanding-data-trail-indian-healthcare&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ambika</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>BD4D</dc:subject>
    
    
        <dc:subject>Healthcare</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    

   <dc:date>2019-12-30T17:18:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/mirror-in-the-enigma">
    <title>The Mirror in the Enigma: How Germany lost World War II to a Mathematical Theorem</title>
    <link>https://cis-india.org/internet-governance/events/mirror-in-the-enigma</link>
    <description>
        &lt;b&gt;Today we use encryption in pretty much everything — cellphones, Internet, banking, satellites, and spaceships. How far have we come since the days of the Enigma and how does it affect our daily lives? CIS invites you to attend a short lecture by Rohit Gupta on August 12, 2011. 

&lt;/b&gt;
        
&lt;h3&gt;About the Lecture&amp;nbsp;&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;During World War II, the Germans began communicating their military information using the famous Enigma encryption machine. Subsequently, we see how three Polish mathematicians led&amp;nbsp;by Marian Rejewski broke the code using a fundamental theorem in 'group theory'. It has been suggested by certain generals that this breach directly led to the collapse of the Axis powers.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In his talk Rohit will begin with the simplest ways to secure privacy in communication throughout human history, and build up to the rise of the Enigma.&lt;/p&gt;
&lt;h3&gt;About Rohit&lt;/h3&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Rohit Gupta is a mathematician who thinks the universe is a giant hologram generated by a microscopic black hole which behaves like a rapidly blinking disco ball. He's finding ways to prove this beyond doubt.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYLUl1kA.html" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLUl1kA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/mirror-in-the-enigma'&gt;https://cis-india.org/internet-governance/events/mirror-in-the-enigma&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Lecture</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-09-22T07:53:25Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-ministry-and-the-trace-subverting-end-to-end-encryption">
    <title>The Ministry And The Trace: Subverting End-To-End Encryption</title>
    <link>https://cis-india.org/internet-governance/blog/the-ministry-and-the-trace-subverting-end-to-end-encryption</link>
    <description>
        &lt;b&gt;A legal and technical analysis of the 'traceability' rule and its impact on messaging privacy.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The paper was published in the &lt;a class="external-link" href="http://nujslawreview.org/2021/07/09/the-ministry-and-the-trace-subverting-end-to-end-encryption/"&gt;NUJS Law Review Volume 14 Issue 2 (2021)&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Abstract&lt;/h2&gt;
&lt;div class="justify"&gt;
&lt;div class="pbs-main-wrapper"&gt;
&lt;p&gt;End-to-end
 encrypted messaging allows individuals to hold confidential 
conversations free from the interference of states and private 
corporations. To aid surveillance and prosecution of crimes, the Indian 
Government has mandated online messaging providers to enable 
identification of originators of messages that traverse their platforms.
 This paper establishes how the different ways in which this 
‘traceability’ mandate can be implemented (dropping end-to-end 
encryption, hashing messages, and attaching originator information to 
messages) come with serious costs to usability, security and privacy. 
Through a legal and constitutional analysis, we contend that 
traceability exceeds the scope of delegated legislation under the 
Information Technology Act, and is at odds with the fundamental right to
 privacy.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Click here to read the &lt;a class="external-link" href="http://nujslawreview.org/2021/07/09/the-ministry-and-the-trace-subverting-end-to-end-encryption/"&gt;full paper&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-ministry-and-the-trace-subverting-end-to-end-encryption'&gt;https://cis-india.org/internet-governance/blog/the-ministry-and-the-trace-subverting-end-to-end-encryption&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Gurshabad Grover, Tanaya Rajwade and Divyank Katira</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cryptography</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Constitutional Law</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Messaging</dc:subject>
    
    
        <dc:subject>Encryption Policy</dc:subject>
    

   <dc:date>2021-07-12T08:18:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/fortune-india-arnika-thakur-may-22-2018-law-tries-to-catch-up-with-tech">
    <title>The law tries to catch up with tech</title>
    <link>https://cis-india.org/internet-governance/news/fortune-india-arnika-thakur-may-22-2018-law-tries-to-catch-up-with-tech</link>
    <description>
        &lt;b&gt;At his testimony before the U.S. Congress, Facebook CEO Mark Zuckerberg spoke about the upcoming elections in India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Arnika Thakur was published in &lt;a class="external-link" href="https://www.fortuneindia.com/macro/the-law-tries-to-catch-up-with-tech/101897"&gt;Fortune India&lt;/a&gt; on May 22, 2018&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;“2018 is an incredibly important year for elections not just with the  U.S. midterms, but around the world. There are important elections in  India, in Brazil, in Mexico, in Pakistan, and in Hungary,” he said. “We  want to make sure we do everything we can to protect the integrity of  those elections.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But is Zuckerberg’s assurance enough? Can  Facebook truly ensure that there is no meddling in India’s general  elections; political consulting firm Cambridge Analytica is accused of  harvesting Facebook data of millions of people, and targeting them with  ads designed to influence the Brexit referendum and the U.S.  presidential election?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead, shouldn’t India proactively strengthen its data privacy laws?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s  existing regulation on data protection—the Information Technology (IT)  Act, 2000 in its original form, experts say, did not explicitly protect  data. And even subsequent amendments were “retrofitting of the law”,  says Sunil Abraham, executive director of the Centre for Internet &amp;amp;  Society, a Bengaluru-based research and advocacy firm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One  amendment, Section 43-A, makes a “body corporate” possessing, dealing or  handling any sensitive personal data or information liable to pay  damages if it has been negligent in implementing and maintaining  reasonable security practices, and thereby causing “wrongful loss or  wrongful gain” to any person. The other amendment, Section 72-A,  provides criminal remedy imprisonment of up to three years or a fine of  up to Rs 5 lakh or both for disclosure of personal information in breach  of lawful contract.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Abraham says by specifying sensitive  personal data, the law excludes breach or misuse of data that aren’t  biometrics or the like. “Whenever you produce regulations in this manner  those regulations are rarely comprehensive, and, therefore, we are in  this situation,” he says. In other words, seemingly innocuous  information such as a person’s pop culture interests, political  ideology, literary preference, shopping history is not protected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under  the current law, companies are also not responsible for notifying users  if their data are breached. “The entire framework around notification,  or how does a user know that their data has actually been affected by a  breach; none of these provisions actually exist under Indian law,” says  Amlan Mohanty, senior associate, technology and policy, PLR Chambers, a  law firm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sahir Hidayatullah, CEO of Smokescreen Technologies, a  cybersecurity firm, says since Indians are not culturally attuned to the  idea of privacy, a comprehensive law is important.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India  understands that the existing data protection law is behind the times.  Last year, the government constituted a committee of experts chaired by  former Supreme Court Justice B.N. Srikrishna to study the matter, make  specific suggestions, and suggest a draft Data Protection Bill. In  February, speaking on the sidelines of an international conference,  India’s electronics and information technology minister Ravi Shankar  Prasad said the committee will soon submit its report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  lawmakers can perhaps take a cue from the European Union’s General Data  Protection Regulation (GDPR), which will come into effect this May.  Among other things, GDPR gives individuals greater rights to access data  on them, correct inaccuracies, erase personal data in certain cases,  and to even transfer their data from one firm to another.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;GDPR  also clearly defines consent. “The request for consent shall be  presented in a manner which is clearly distinguishable from the other  matters, in an intelligible and easily accessible form, using clear and  plain language,” it says. The law gives the users the right to withdraw  their consent at any time. Currently, most Internet companies seek  consent to multiple matters at once, usually when a new user registers  for or downloads its service and it is often difficult, if at all, to  review it. GDPR will change that in the EU.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Supratim Chakraborty,  associate partner at law firm Khaitan &amp;amp; Co, says a clear regulation  on consent is requisite in India, where many are first-time Internet  users or do not understand English or are even illiterate. “When you  obtain consent, it has to be understood in a proper manner by the  people, and secondly, the people who are receiving the data are also  obligated to protect it in a particular manner. That is something that  we should gun for in the new law,” says Chakraborty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mohanty of  PLR Chambers says GDPR also spells out the principles of applicability  with clarity by stating the law will be applicable even on a foreign  entity if the breach impacts an EU citizen. “The problem in India is  ensuring that foreign companies operating in India are held  accountable,” he says. “One of the key issues that India has to deal  with is ensuring that the law that India passes is going to be  applicable to entities that function outside India.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sivarama  Krishnan, partner and leader, cybersecurity, at consultancy PwC India,  says India also needs to address the issue of who or which body will  implement the data protection law. “In the Western world, there is  usually a privacy commission or authority, and resources to enforce the  regulation. In India, there is lack of enforcement capability in the  government to implement the existing regulation,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There  is also the matter of the government’s priority. The union government’s  biometric identification programme, Aadhaar, does not have a spotless  record on data protection users’ data have on multiple times been  breached, or even published online, by third party service providers,  hackers, and even by government websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But India has seen  serious consequences of weak data protection: A judge’s report on the  1993 Bombay riots found that voters’ lists and business registers were  used by perpetrators to identify victims and their businesses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today,  there is a lot more data a criminal can get access to, from a  government identification programme to your Facebook profile to your  smartphone’s GPS signal. No data breach is innocuous.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/fortune-india-arnika-thakur-may-22-2018-law-tries-to-catch-up-with-tech'&gt;https://cis-india.org/internet-governance/news/fortune-india-arnika-thakur-may-22-2018-law-tries-to-catch-up-with-tech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-09-06T02:11:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/ibnlive-videos-november-20-2012-the-last-word-is-there-a-need-to-review-information-technology-act">
    <title>The Last Word: Is there a need to review Information Technology Act?</title>
    <link>https://cis-india.org/news/ibnlive-videos-november-20-2012-the-last-word-is-there-a-need-to-review-information-technology-act</link>
    <description>
        &lt;b&gt;Does the high-handed arrest of two young girls mean it's time to review and revise the IT Act?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Aryaman Sundaram, Pavan Duggal, Pranesh Prakash and Ravi Visvesvaraya Prasad took part in a discussion with Karan Thapar on section 66A of the IT Act. This was aired on CNN-IBN on November 20, 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash said that it was just not a history of misuse of section 66A of the IT Act because that presumes that the law is otherwise fine and it has just been applied wrongly. This law is fundamentally flawed. It is unconstitutional. It is like a law in which there is a provision on rape, murder, theft, nuisance, everything put together in a single section with the same punishment being given for all of them. This obviously is not good law making but that is exactly what has been done in this case by taking bits from laws in the UK and from elsewhere and mashing them all up into one omnibust gargantuan monster which is unconstitutional.&lt;br /&gt;&lt;br /&gt;Pranesh Prakash also added that the fact is that if you have bad laws they will be used to harass people. Having good law is one part of that. Apart from that there has been also other laws which have been misapplied in this case. In all these recent cases, section 66A of the IT Act wasn't the only provision used. This particular section has been used in conjunction with some other laws. So section 66A of the IT Act independently is not required. There are other laws in the Indian Penal Code and elsewhere which are usually enough to cover all the things that section 66A of the IT Act is right now covering. It is just an add on provision that really can't justify its existence unless it is really reduced in scope.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://ibnlive.in.com/videos/306519/the-last-word-is-there-a-need-to-review-information-technology-act.html"&gt;Watch the full video that was aired on CNN-IBN&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ibnlive-videos-november-20-2012-the-last-word-is-there-a-need-to-review-information-technology-act'&gt;https://cis-india.org/news/ibnlive-videos-november-20-2012-the-last-word-is-there-a-need-to-review-information-technology-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-11-21T12:10:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system">
    <title>The Last Chance for a Welfare State Doesn’t Rest in the Aadhaar System</title>
    <link>https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system</link>
    <description>
        &lt;b&gt;Boosting welfare is the message, which is how Aadhaar is being presented in India. The Aadhaar system as a medium, however, is one that enables tracking, surveillance, and data monetisation. This piece by Sumandro Chattapadhyay was published in The Wire on April 19, 2016.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Originally published in and cross-posted from &lt;a href="http://thewire.in/2016/04/19/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system-30256/"&gt;The Wire&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Once upon a time, a king desired that his parrot should be taught all the ancient knowledge of the kingdom. The priests started feeding the pages of the great books to the parrot with much enthusiasm. One day, the king asked the priests if the parrot’s education has completed. The priests poked the belly of the parrot but it made no sound. Only the rustle of undigested pages inside the belly could be heard. The priests declared that the parrot is indeed a learned one now.&lt;/p&gt;
&lt;p&gt;The fate of the welfare system in our country is quite similar to this parrot from Tagore’s parable. It has been forcefully fed identification cards and other official documents (often four copies of the same) for years, and always with the same justification of making it more effective and fixing the leaks. These identification regimes are in effect killing off the welfare system. And some may say that that has been the actual plan in any case.&lt;/p&gt;
&lt;p&gt;The Aadhaar number has been recently offered as &lt;a href="http://indianexpress.com/article/opinion/columns/aadhaar-project-uidai-last-chance-for-a-welfare-state/"&gt;the ‘last chance’ for the ailing welfare system&lt;/a&gt; – a last identification regime that it needs to gulp down to survive. This argument wilfully overlooks the acute problems with the Aadhaar project.&lt;/p&gt;
&lt;p&gt;Firstly, the ‘last chance’ for a welfare state in India is not provided by implementing a new and improved identification regime (Aadhaar numbers or otherwise), but by enabling citizens to effectively track, monitor, and ensure delivery of welfare, services, and benefits. This ‘opening up’ of the welfare bureaucracy has been most effectively initiated by the Right to Information Act. Instead of a centralised biometrics-linked identity verification platform, which gives the privilege of tracking and monitoring welfare flows only to a few expert groups, an effective welfare state requires the devolution of such privilege and responsibility.&lt;/p&gt;
&lt;p&gt;We should harness the tracking capabilities of electronic financial systems to disclose how money belonging to the Consolidated Fund of India travel around state agencies and departmental levels. Instead, the Aadhaar system effectively stacks up a range of entry barriers to accessing welfare – from malfunctioning biometric scanners, to connectivity problems, to the burden of keeping one’s fingerprint digitally legible under all labouring and algorithmic circumstances.&lt;/p&gt;
&lt;p&gt;Secondly, authentication of welfare recipients by Aadhaar number neither make the welfare delivery process free of techno-bureaucratic hurdles, nor does it exorcise away corruption. Anumeha Yadav has recently documented the emerging &lt;a href="http://scroll.in/article/805909/in-rajasthan-there-is-unrest-at-the-ration-shop-because-of-error-ridden-aadhaar"&gt;‘unrest at the ration shop’ across Rajasthan&lt;/a&gt;, as authentication processes face technical and connectivity delays, people get ‘locked out’ of public services for not having or having Aadhaar number with incorrect demographic details, and no mechanisms exist to provide rapid and definitive recourse.&lt;/p&gt;
&lt;p&gt;RTI activists at the &lt;a href="http://www.snsindia.org/"&gt;Satark Nagrik Sangathan&lt;/a&gt; have highlighted that the Delhi ration shops, using Aadhaar-based authentication, maintain only two columns of data to describe people who have come to the shop – those who received their ration, and those who did not (without any indication of the reason). This leads to erasure-by-design of evidence of the number of welfare-seekers who are excluded from welfare services when the Aadhaar-based authentication process fails (for valid reasons, or otherwise).&lt;/p&gt;
&lt;p&gt;Reetika Khera has made it very clear that using Aadhaar Payments Bridge to directly transfer cash to a beneficiary’s account, in the best case scenario, &lt;a href="http://www.epw.in/journal/2013/05/commentary/cost-benefit-analysis-uid.html"&gt;may only take care of one form of corruption&lt;/a&gt;: deception (a different person claiming to be the beneficiary). But it does not address the other two common forms of public corruption: collusion (government officials approving undue benefits and creating false beneficiaries) and extortion (forceful rent seeking after the cash has been transferred to the beneficiary’s account). Evidently, going after only deception does not make much sense in an environment where collusion and extortion are commonplace.&lt;/p&gt;
&lt;p&gt;Thirdly, the ‘relevant privacy question’ for Aadhaar is not limited to how UIDAI protects the data collected by it, but expands to usage of Aadhaar numbers across the public and private sectors. The privacy problem created by the Aadhaar numbers does begin but surely not end with internal data management procedures and responsibilities of the UIDAI.&lt;/p&gt;
&lt;p&gt;On one hand, the Aadhaar Bill 2016 has reduced the personal data sharing restrictions of the NIAI Bill 2010, and &lt;a href="http://scroll.in/article/806297/no-longer-a-black-box-why-does-the-revised-aadhar-bill-allow-sharing-of-identity-information"&gt;has allowed for sharing of all data except core biometrics (fingerprints and iris scan)&lt;/a&gt; with all agencies involved in authentication of a person through her/his Aadhaar number. These agencies have been asked to seek consent from the person who is being authenticated, and to inform her/him of the ways in which the provided data (by the person, and by UIDAI) will be used by the agency. In careful wording, the Bill only asks the agencies to inform the person about “alternatives to submission of identity information to the requesting entity” (Section 8.3) but not to provide any such alternatives. This facilitates and legalises a much wider collection of personal demographic data for offering of services by public agencies “or any body corporate or person” (Section 57), which is way beyond the scope of data management practices of UIDAI.&lt;/p&gt;
&lt;p&gt;On the other hand, the Aadhaar number is being seeded to all government databases – from lists of HIV patients, of rural citizens being offered 100 days of work, of students getting scholarships meant for specific social groups, of people with a bank account. Now in some sectors, such as banking, inter-agency sharing of data about clients is strictly regulated. But we increasingly have non-financial agencies playing crucial roles in the financial sector – from mobile wallets to peer-to-peer transaction to innovative credit ratings. Seeding of Aadhaar into all government and private databases would allow for easy and direct joining up of these databases by anyone who has access to them, and not at all by security agencies only.&lt;/p&gt;
&lt;p&gt;When it becomes publicly acceptable that &lt;a href="http://indianexpress.com/article/opinion/columns/aadhaar-project-uidai-last-chance-for-a-welfare-state/"&gt;the &lt;em&gt;money bill route&lt;/em&gt; was a ‘remedial’ instrument to put the Rajya Sabha ‘back on track’&lt;/a&gt;, one cannot not wonder about what was being remedied by avoiding a public debate about the draft bill before it was presented in Lok Sabha. The answer is simple: &lt;em&gt;welfare is the message, surveillance is the medium&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Acceptance and adoption of all medium requires a message, a content. The users are interested in the message. The message, however, is not the business. Think of Free Basics. Facebook wants people with none or limited access to internet to enjoy parts of the internet at zero data cost. Facebook does not provide the content that the users consume on such internet. The content is created by the users themselves, and also provided by other companies. Facebook own and control the medium, and makes money out of all content, including interactions, passing through it.&lt;/p&gt;
&lt;p&gt;The UIDAI has set up a biometric data bank and related infrastructure to offer authentication-as-a-service. As the Bill clarifies, almost all agencies (public or private, national or global) can use this service to verify the identity of Indian residents. Unlike Facebook, the content of these services do not flow through the Aadhaar system. Nonetheless, Aadhaar keeps track of all ‘authentication records’, that is records of whose identity was authenticated by whom, when, and where. This database is gold (data) mine for security agencies in India, and elsewhere. Further, as more agencies use authentication based on Aadhaar numbers, it becomes easier for them to combine and compare databases with other agencies doing the same, by linking each line of transaction across databases using Aadhaar numbers.&lt;/p&gt;
&lt;p&gt;Welfare is the message that the Aadhaar system is riding on. The message is only useful for the medium as far as it ensures that the majority of the user population are subscribing to it. Once the users are enrolled, or on-boarded, the medium enables flow of all kinds of messages, and tracking and monetisation (perhaps not so much in the case of UIDAI) of all those flows. It does not matter if the Aadhaar system is being introduced to remedy the broken parliamentary process, or the broken welfare distribution system. What matters is that the UIDAI is establishing the infrastructure for a universal surveillance system in India, and without a formal acknowledgement and legal framework for the same.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system'&gt;https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-04-19T13:18:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/kids-on-facebook">
    <title>The kids are all on Facebook</title>
    <link>https://cis-india.org/news/kids-on-facebook</link>
    <description>
        &lt;b&gt;In one photo, Prerna stands in front of the mirror, back slightly arched, a fringe covering her left eye, one hand on her hip, pursing her lips. The other hand holds the camera in a steadfast grip. Below this picture are almost a hundred likes and comments. There is nothing unusual as such about this photo on Facebook. Prerna, however, is just 11.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Shikha Kumar was published in &lt;a class="external-link" href="http://www.dnaindia.com/lifestyle/report_the-kids-are-all-on-facebook_1712078"&gt;Daily News &amp;amp; Analysis&lt;/a&gt; on July 8, 2012. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"Stop looking so pretty" and "OMG! You’re so thin" are some of the comments that appear under the picture of this young girl.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In another picture, Diksha’s wavy hair cascades around her face as she fixes the camera with an unwavering stare. The caption reads — "I love my hair. I know I sound like a conceited bitch." Diksha is 12.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Children like Prerna and Diksha, who are under the age of 13, are officially not allowed to open accounts on Facebook. But they are among the 7.5 million under-13 users of the popular social networking website, according to a study released by Consumer Reports last year. The study further revealed that among such users, 5 million were under the age of 10. Closer home, a McAfee-Synovate survey conducted across various cities in India revealed that 64% kids in the age group of 9-12 are members of social networking sites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;You may find the trend daunting since ‘kids’ are supposed to step out and socialise, rather than chat online. However, it’s a reality that we have no choice but to accept as a modern reality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internally, Facebook seems to have accepted the trend. As revealed by a news reports last month, the company is readying a technology that will allow children younger than 13 to open accounts and operate them in a secure manner. Possible approaches include connecting the children’s Facebook accounts with their parents’, and giving parents the control over who befriends their children on the website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The New ways of being in touch with ‘friends’&lt;/b&gt;&lt;br /&gt; The move has once again put the spotlight on the ways in which social networking is changing the way children interact with each other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Namrata Bhoomkar, 13, logs on to the website at least two to three times a day. "I check my news feeds and see what my friends are up to. If you’re not on Facebook, you can’t be updated with what’s happening with everybody," she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from finding out what their friends are up to, kids also spend a lot of time sharing their pictures, and are proficient at photo editing software like Photoshop, Picasa and Photobooth to make their pictures more striking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another way of standing out is to give pictures creative captions. "I google random quotes on love and life and then put those up as captions on the pictures. I get a lot of likes for it, which makes me feel nice," says 13-year old Sakshi Shrivastav.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Having No clue about privacy settings&lt;/b&gt;&lt;br /&gt; However, while the kids use many of Facebook’s features, few are aware of the risks or the privacy settings available on the website that can protect them. In the McAfee-Synovate survey, 32% of the kids were not aware of any online threats, such as cyber hacking, stalking, bullying and identity thefts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a result, lessons are often learnt the hard way. "A 39-year-old man started sending me messages saying that I’m very pretty. My father found out and told me to disable my account. I was very upset since all my friends are on Facebook. So finally, my sister helped me activate my privacy settings," says an underage girl on the condition of anonymity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anandita Mishra, a security expert at McAfee Cybermum India, says that she does not advocate kids’ presence on Facebook. "There are several dangers; there might be paedophiles lurking, strangers pretending to be younger or your child may be a victim of online abusing or bullying," she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the new timeline format, even though one’s account is protected, the cover pictures are always visible to everybody. In such cases, Mishra recommends either keeping no cover photo or keeping pictures of favourite cartoon characters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the face of so many risks, some experts believe that Facebook’s move to officially allow younger kids under some form of parental supervision is a step in the right direction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Children’s interaction online should always be under parental supervision. Censorship and control is not the responsibility of the government, but of parents," points out Sunil Abraham, director, Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham believes that if this technology comes into force, children will consume content more responsibly. This will also give them the chance to go out in the real world and get some real communication experience, the old-fashioned way.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"They will even behave responsibly. If the account is supervised, they are less likely to engage in bullying, abusing, sexting or any other unacceptable forms of social behaviour," he adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While she is not totally in favour of this development, McAfee’s Mishra sees no other way because parents are unable to control their children. "Seven million kids are online with or without parental supervision. You cannot have cyber policing of children. It is important to inculcate the right values about responsible internet usage," she says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/kids-on-facebook'&gt;https://cis-india.org/news/kids-on-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-07-20T06:24:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/internet-new-billion">
    <title>The internet’s new billion</title>
    <link>https://cis-india.org/news/internet-new-billion</link>
    <description>
        &lt;b&gt;New web users — in countries like Brazil and China — are changing the culture of the internet.&lt;/b&gt;
        
&lt;p&gt;The harried mother had little wish to visit an internet cafe with two squirmy boys in tow, but she said there was no choice.&lt;/p&gt;
&lt;p&gt;New to this potholed neighborhood on the city’s northern edge, Fabina da Silva, 31, needed to enroll her sons in school. Registering online was the only way.&lt;/p&gt;
&lt;p&gt;“If it wasn’t a necessity, I wouldn’t be here,” da Silva said on a recent afternoon as her 6-year-old, Lucas, thumped his toy Sponge Bob on the mouse pad beside her. “Nowadays, internet in Brazil is a necessity.”&lt;/p&gt;
&lt;p&gt;Brazil has long been a bellwether nation for emerging-market internet trends and it’s riding a wave that will soon sweep the globe. The newest billion people to venture online are doing so in developing countries rather than North America or Europe.&lt;/p&gt;
&lt;p&gt;And whether those newcomers are getting online for fun or because they must, they’re doing so en masse. For businesses nimble enough to serve markets as diverse as Brazil, Russia, India, China and Indonesia, the shift promises a staggering number of new customers.&lt;/p&gt;
&lt;p&gt;But internet trend-watchers say there’s more at stake than the emergence of a worldwide class of digital consumers. The new users are changing the culture of the internet itself. Researchers say the web as it was originally, if idealistically, conceived — a largely free, monolingual space where a shared digital culture prevailed — may soon be a distant memory. And it’s happening remarkably fast.&lt;/p&gt;
&lt;p&gt;“Potentially explosive” is how Marcos Aguiar describes the growth. He’s a senior partner at the Boston Consulting Group’s Sao Paulo office who co-authored a report released in September called “The Internet’s New Billion.” It concludes the number of web users in developing-world “BRICI” countries — Brazil, Russia, India, China and Indonesia — will jump from 610 million this year to 1.2 billion by 2015.&lt;/p&gt;
&lt;p&gt;When the internet crossed the billion-user threshold just five years ago, the developed world commanded a 60-40 majority online, according to the United Nations’ International Telecommunications Union. Today, that proportion has roughly reversed.&lt;/p&gt;
&lt;p&gt;The new users are younger, poorer and more numerous than ever before, BCG’s analysts said, and increasing numbers will need web access and won't be able to afford broadband in their living room.&lt;/p&gt;
&lt;p&gt;As Fabina da Silva pecked away on a keyboard to register her sons for school, she was in many ways typical of low-income Brazilian users. Those who don’t have web access at home often pay small fees to use ad hoc cybercafes known here as “LAN houses.” Many began as rooms full of connected computers, or local area networks, for multi-player gaming, but their customer base has since broadened.&lt;/p&gt;
&lt;p&gt;In India, those following the trend say a huge portion of the new billion will enter the web via mobile devices.&lt;/p&gt;
&lt;p&gt;“If you look at our broadband figures in India, it’s quite pathetic,” said Sunil Abraham, director of the Centre for Internet and Society, a think tank in Bangalore. “And less than 1 percent of the population has ever accessed the internet.”&lt;/p&gt;
&lt;p&gt;But recently, many Indian telecommunication firms have begun giving out free data plans with their mobile devices — a move Sunil said will instantly send millions of Indians onto the internet. “The moment an end user acquires a smart phone they become a data user because they’re not paying for it,” he said. “But they’re not coming onto the internet like you and I know.”&lt;/p&gt;
&lt;p&gt;Instead, phone companies only provide access to a few sites, such as Wikipedia and Facebook Zero, a stripped-down mobile version of the social networking site that omits photos but allows messaging and status updates. “They’re coming onto a network that, from the beginning, is a complete walled garden,” he said.&lt;/p&gt;
&lt;p&gt;The new walls dividing regions of the internet aren’t likely to stop there. Even as more users join the web worldwide, they are increasingly separated by language. What the nearly 400 million users in China experience as the internet is vastly different than the web surfed by Americans. Much of the software and websites on the Chinese web are produced domestically in the local language. That’s also how it works in Russia and Indonesia.&lt;/p&gt;
&lt;p&gt;Some observers say this difference has political consequences. “Many of the local companies provide far better service than the likes of Google and Facebook in those markets,” said Evgeny Morozov, a digital technology researcher at Stanford University. “But also those local websites are much easier to censor because the corporate entities behind those sites all have some domestic presence.”&lt;/p&gt;
&lt;p&gt;Morozov is author of an up-coming book “The Net Delusion: The Dark Side of Internet Freedom,” and he said there’s a dark side to be found in the internet’s new billion, too. Because poorer users resort to more centralized methods for getting online — cybercafes, cell-phone towers — their activity will be much easier to monitor.&lt;/p&gt;
&lt;p&gt;“The fact that so much of this is happening in cybercafes and mobile devices actually empowers the government because those two things are much easier to control than a desktop computer in your house,” Morozov said.&lt;/p&gt;
&lt;p&gt;Morozov is also skeptical of notions that greater diversity of cultures online will lead to more cultural dialogue. “There is very little interaction between communities and it’s not because the tools are lacking. It’s just that modern-day Indians and modern-day Russians have nothing to talk about most of the time,” he said. “There may simply be no demand for joining that global village.”&lt;/p&gt;
&lt;p&gt;More optimistic web scholars argue there will be cultural conversations, but bridging the gaps between communities will take effort. “The internet has become a bunch of interlinked but linguistically distinct and culturally specific spaces,” said Ethan Zuckerman, a senior researcher at Harvard University’s Berkman Center for Internet and Society. “There’s some interface between them but there’s a lot less than there was years back when we were sort of pretending that this was one great global space.”&lt;/p&gt;
&lt;p&gt;Instead of becoming the world’s biggest tool for cultural exchange, Zuckerman said the web could become its principal medium for mutual misunderstanding. “We’re mostly talking to people like ourselves rather than talking across cultural boundaries,” Zuckerman said. “And when we do cross cultural boundaries, it’s often in a way where we’re overhearing something that really pisses us off.”&lt;/p&gt;
&lt;p&gt;Take for example the 2005 scandal after a Danish newspaper posted cartoons depicting the prophet Mohammed, sparking riots across the Muslim world. Zuckerman said such incidents may become routine. “It’s a problem of unseen audiences,” he said. “We always have to be aware there are other audiences out there listening, and they’re particularly listening for mentions of themselves.”&lt;/p&gt;
&lt;p&gt;For a more amusing and recent online snafu, Zuckerman prefers citing a topic that went viral on the micro-blogging site Twitter this summer. The topic, the Brazilian Portuguese phrase “Cala boca, Galvao,” was mysterious to many English-speaking users. Asked to explain, a few mischievous Brazilians claimed the Galvao was a rare Amazon bird being slaughtered to extinction for its colorful feathers. For everyone who re-tweeted the phrase, so the pranksters claimed, 10 cents would be donated to a global effort to save the bird.&lt;/p&gt;
&lt;p&gt;The encouragement helped catapult the phrase into the ranks of Twitter’s top-trending topics, or most-repeated phrases worldwide last June. But in reality, Galvao was the first name of Galvao Bueno, a Brazilian sports commentator on the Globo network, whose pronouncements during the World Cup had irritated many of his compatriots. In Brazilian Portuguese, “Cala boca” roughly means, “shut up.”&lt;/p&gt;
&lt;p&gt;“There’s an entirely different conversation going on that’s so incomprehensible to Americans that the Brazilians make fun of us when we try to understand,” Zuckerman said. “In many ways that sort of characterizes for me what’s going on with the contemporary ‘net.'”&lt;/p&gt;
&lt;p&gt;But Zuckerman still believes virtual borders can be crossed. In 2005, he co-founded Global Voices, an aggregator and translator of blogs from around the world, in part to help the next billion web users communicate.&lt;/p&gt;
&lt;p&gt;“These billion users are sort of proxy for the global middle class,” he said. “They’re an increasing economic force, an increasing cultural force, and they are the people we need to negotiate with and have a conversation with if we want to address problems like climate change.”&lt;/p&gt;
&lt;p&gt;In the run-down Engenho da Rainha neighborhood in Rio de Janeiro, some of the LAN house customers seemed more interested in using the web to play games than solve the world’s problems.&lt;/p&gt;
&lt;p&gt;One wiry teen in a blue baseball cap barely glanced away from his screen to answer questions. “I’ll spend all day, all night on the internet if I’m allowed,” said Carlos Wallace Cruz, 16. “I’d say I’m 98 percent addicted.”&lt;/p&gt;
&lt;p&gt;Cruz’s drug of choice isn’t likely to ring a bell with Americans his age. It’s a video game available only on Orkut, a Google social networking site, wildly popular in Brazil and India but less so in the United States.&lt;/p&gt;
&lt;p&gt;When a visitor asked if he ever spent time on Orkut’s much more famous rival site, Cruz responded with earnest puzzlement.&lt;/p&gt;
&lt;p&gt;“What’s Facebook?” he asked.&lt;/p&gt;
&lt;p&gt;Read the original in the &lt;a class="external-link" href="http://www.globalpost.com/dispatch/brazil/101112/internet-growth-web-traffic"&gt;Global Post&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/internet-new-billion'&gt;https://cis-india.org/news/internet-new-billion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T07:31:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/Internet-Culture-Society">
    <title>The Internet, Culture, and Society - Looking at Past, Present, and Future Worldwide</title>
    <link>https://cis-india.org/events/Internet-Culture-Society</link>
    <description>
        &lt;b&gt;It is now well known that with 4.5 billion mobile phone owners in the world and increased Internet penetration, global cultures and communities have experienced shifts in their economic, political, and social well-being due to the digital revolution. As a scholar and consultant who works worldwide, Prof Ramesh Srinivasan will illustrate how new media technologies have been used creatively to enable political movements in Kyrgyzstan, literacy and educational reform in India, and economic development across the developing world. In addition to this, he will discuss some of digital culture's biggest challenges, including considering how the Web can start to empower different types of cultural perspectives and knowledges. The talk will be live streamed.&lt;/b&gt;
        
&lt;h3&gt;Prof. Ramesh Srinivasan&lt;/h3&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Ramesh.jpg/image_preview" alt="Ramesh Srinivasan 1" class="image-inline image-inline" title="Ramesh Srinivasan 1" /&gt;&lt;/p&gt;
&lt;p&gt;Ramesh Srinivasan is an Assistant Professor in the Department of Information Studies and Design|Media Arts at the University of California Los Angeles. He is a hybrid of an engineer, designer, social scientist, and ethnographer. His research and consultancy work focuses on the interaction between new media technologies and global cultures and communities. This involves studying the ways in which information technology shapes global education, health, economics, politics, governance, and social movements. He works in such diverse parts of the world as Kyrgyzstan, India, Native America, and more. Ramesh earned a doctorate in design from Harvard University, a Master of Science in Media Arts and Sciences from MIT Media Laboratory and a Bachelor of Science in Industrial Engineering from Stanford University.&lt;/p&gt;
&lt;p&gt;For more information on &lt;a class="external-link" href="http://rameshsrinivasan.org/about/"&gt;Dr. Ramesh Srinivasan&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://rameshsrinivasan.org/about/"&gt;&lt;strong&gt;video&lt;/strong&gt;&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;
&amp;nbsp;
&lt;iframe src="http://blip.tv/play/AYLJtiQA.html" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed type="application/x-shockwave-flash" src="http://a.blip.tv/api.swf#AYLJtiQA" style="display:none"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/Internet-Culture-Society'&gt;https://cis-india.org/events/Internet-Culture-Society&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-21T10:13:23Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/cape-and-islands-march-12-2014-the-internet-will-be-everywhere-in-2025-for-better-or-worse">
    <title>The Internet Will Be Everywhere In 2025, For Better Or Worse</title>
    <link>https://cis-india.org/news/cape-and-islands-march-12-2014-the-internet-will-be-everywhere-in-2025-for-better-or-worse</link>
    <description>
        &lt;b&gt;In 2025, the Internet will enhance our awareness of the world and ourselves while diminishing privacy and allowing abusers to "make life miserable for others," according to a new report by the Pew Research Center and Elon University. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was originally published on the &lt;a class="external-link" href="http://capeandislands.org/post/internet-will-be-everywhere-2025-better-or-worse"&gt;website of WCAI Cape and Islands NPR&lt;/a&gt; on March 12, 2014. Dr. Nishant Shah is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;But more than anything, experts say, it will become ubiquitous and embedded in our lives — the same way electricity is today.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The  Internet will shift from the place we find cat videos to a background  capability that will be a seamless part of how we live our everyday  lives," says Joe Touch, director of the University of Southern  California's Information Sciences Institute. "We won't think about  'going online' or 'looking on the Internet' for something. We'll just be  online, and just look."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report follows a &lt;a href="http://www.pewinternet.org/files/2014/02/PIP_25th-anniversary-of-the-Web_0227141.pdf"&gt;survey last month&lt;/a&gt; on how the Internet has affected our lives in the 25 years since Sir Tim Berners-Lee released &lt;a href="http://www.w3.org/History/1989/proposal.html"&gt;a paper&lt;/a&gt; proposing the World Wide Web. By 1989, the Internet had already been  around for nearly two decades, but it wasn't widely accessible.  Berners-Lee's ideas became the foundation of the way we access the  Internet today.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So the Pew report asked: What do you expect to be  the most significant overall impacts of our uses of the Internet on  humanity between now and 2025? Here are some of the 1,800 respondents'  predictions:&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Survey Highlights&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;The Internet will allow us to  collect information on every aspect of our lives and become more aware  of our behavior — at the peril of privacy.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We'll have a picture of how someone has spent their time, the depth  of their commitment to their hobbies, causes, friends, and family. This  will change how we think about people, how we establish trust, how we  negotiate change, failure, and success," says Judith Donath, a fellow at  Harvard University. Other experts predict that this can also  effectively personalize health care and disease prevention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But  the conveniences come with tradeoffs. Llewellyn Kriel, head of a media  services company in South Africa, has a far less rosy view. "Everything  will be available online with price tags attached. Cyberterrorism will  become commonplace. Privacy and confidentiality of any and all personal  will become a thing of the past," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some predict that privacy in 2025 will be a luxury reserved for the upper class.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Internet's pervasiveness will spread both education and ignorance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;"The smartest person in the world currently could well be stuck  behind a plow in India or China," says Hal Varian, chief economist for  Google. "Enabling that person — and the millions like him or her — will  have a profound impact on the development of the human race."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The downside? Group-think, mob mentality and manipulation.&lt;b&gt; &lt;/b&gt;"The  Internet will be used as the most effective force of mind control the  planet has ever seen, leaving the Madison Avenue revolution as a  piddling, small thing by comparison,"&lt;b&gt; &lt;/b&gt;says Mikey  O'Connor, an elected representative to ICANN's GNSO Council,  representing the ISP and Connectivity Provider Constituency.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;We can't fully understand its effects yet&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;"The greatest impact of the Internet is what we are already witnessing, but it is going to accelerate," says&lt;b&gt; &lt;/b&gt;Nishant Shah, director of research at the Centre for Internet and Society in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It  might not even do as much as we think, as Dell engineer Anoop Ghanwani  predicts: "Regulation will always stand in the way of anything  significant happening."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jeff Jarvis, entrepreneurial journalism  professor at the City University of New York, compares the Internet to  the printing press: Its significance could not have been predicted. "The  impact of the book on society was not fully realized until 100 years  after the invention of the press. ... In the development of the Net and  its impact on society, we are at 1472 in Gutenberg years," Jarvis says.  "Consider the change brought by the Web its first 20 years, and now you  ask us to predict the next dozen? Sorry."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/cape-and-islands-march-12-2014-the-internet-will-be-everywhere-in-2025-for-better-or-worse'&gt;https://cis-india.org/news/cape-and-islands-march-12-2014-the-internet-will-be-everywhere-in-2025-for-better-or-worse&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-04T09:08:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/biblio-january-february-volume-ix-8-nishant-shah-the-internet-way">
    <title>The Internet Way</title>
    <link>https://cis-india.org/internet-governance/blog/biblio-january-february-volume-ix-8-nishant-shah-the-internet-way</link>
    <description>
        &lt;b&gt;Dr. Nishant Shah's review of the book “The Everything Store: Jeff Bezos and the Age of Amazon” by Bantam Press/Random House Group, London was published in Biblio Vol. 19 No.8 (1&amp;2), January – February 2014.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p align="JUSTIFY"&gt;&lt;a href="https://cis-india.org/internet-governance/blog/biblio-january-february-2014.pdf" class="internal-link"&gt;Click to download the file&lt;/a&gt; (PDF, 2436 Kb). Dr. Nishant Shah's review can be found on page 16.&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="JUSTIFY"&gt;The Age of Amazon’ is not just the title of a book, it is a retrospective on the history of e-commerce as well as a prophecy for the shape of things to come. In his meticulously reported book, Brad Stone takes us through the roller coaster ride of the ‘Everything Store’ that Amazon has become, building a gripping tale of an idea that has become synonymous to the world of online shopping in just over two decades.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The book reads well as a biopic on the visionary lunacy of Jeff Bezos, the founder of Amazon, as well as a gripping tale of how ideas grow and develop in the digital information age. Stone is an expert storyteller, not only because of his eye for the whimsical, the curious and the enchantment of the seemingly banal, but also because of his ability to question his own craft.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;At the very outset, Stone warns us that the book has been compiled through workers at employee, but not Bezos himself. This helps Stone separate the maker from the brand — unlike Steve Jobs who became the cult icon for Apple, Bezos himself has never become the poster child of his brand, allowing&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Amazon to become not only an everything store but everybody store. But it means that Stone’s task was to weave together the personal biography of Bezos, his dramatic journey through life with the tumultuous and adventurous inception and growth of Amazon, and his skill lies in the meeting of the twines, which he does with style, ease and charm.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;One of the easiest accusations to throw at a book like this is to state that it reduces the murky, blurred, messy and incoherent set of events into a narrative that establishes causes and attributes design and intention where none existed. However, Stone was confronted with the idea of ‘Narrative Fallacy’ — a concept coined by Nassim Nicholas Taleb in his Black Swan, referring to the tendency of human beings to reduce complex phenomenon to “soothing but oversimplified stories”. In fact, the challenge to not reduce the book to a series of connected anecdotes was posed by Bezos when Stone pitched the book to him. And what has emerged is a book about accidents, serendipity, risk, redundancy, failure charting the ineffable, inscrutable and inexplicable ways in which digital technologies are shaping the worlds we live in.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;With the rigour and journalistic inquiry that Stone has displayed in his regular writings in The Businessweek, The Everything Store has stories which are as memorable as they are unexpected. Stone does a fantastic job of charting Bezos’ life — from tracking down the lost father who had no idea what his son, who he had abandoned at age three, has become, to the chuckleworthy compilation of Bezos’ favourite quotes (Stone calls it his ‘greatest hits’), the book is filled with pointed and poignant observations and stories that give us an idea of the extraordinary life of Jeff Bezos. But unlike the expected character creation of a mad genius, what you get is the image of a man who lived in contradictions: wedded to his internal idea of truth but also ruthless in his business policies which were predatory and competitive to say the least; a businessman who once wrote a memo titled ‘Amazon.love’ about how he wanted a company to be “loved not feared” but also used the metaphor of a “cheetah preying on the gazelles” in its acquisition of smaller businesses; a man who thought of himself as a “missionary rather than a mercenary” and yet built a business empire that embodies some of the most discriminatory, exploitative and stark conditions of adjunct, adhoc, underpaid and contract-based labour of our precariously mobile worlds.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Stone is masterful as he segues from Bezos’ personal life and ambitions into the monomaniacal and turbulent trajectory of Amazon. Amazon is not a simple success story. It tried and failed at many things, but what remains important is how, it failed at the traditional way of doing things and succeeded at the internet way of thinking. So when Amazon failed, it was not a failure to succeed, but a failure that resulted because the infrastructure needed to make it succeed was not yet in place. Stone’s narrative that effortlessly takes us through the economics, trade, policies, regulation, administration and struggles of Amazon, shows how it was a company that had to invent the world it wanted to succeed in, in order to succeed. In many ways, the book becomes not only about Amazon and its ambitions to sell everything from A-Z, but about how it built prototypes for the rest of the world so that it could become relevant and rule.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;But the book is not a Martin-Scorsese-type homage to the scoundrel or the villain. While it is imbued up and spit you out. And if you are good, he will jump on your back and ride you into the ground.” Or as Stone himself suggests, that is the way the company is going to grow “until either Jeff Bezos exits the scene or no one is left to stand in his way”. This policy of taking everything from its employees and channelling it to the relentless growth of the company accounts for not only the high attrition rate of top executives but also the growing controversies about work and labour conditions in Amazon warehouses and on-the-ground delivery services.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Stone’s book does not go into great detail about the new work force that companies like Amazon produce — a work force that is reduced to being a cog in a system, performing mechanical tasks, working at minimal wage, and without the protections that are offered to the white collar high-level technology executives that are the popup children of the digital trade. Stone reminds us that behind the incredible platform that Amazon is, is a massive physical infrastructure which almost reminds us of the early industrial days where the labourer was in a state of exploitation and precariousness. And even as we celebrate the rise of these global behemoths, we might forget that behind the seductive interfaces and big data applications, that under the excitement of drone-based delivery systems and artificial intelligence that will start delivering things even before you place the order, is a system that pushes more and more workers in unprotected and exploitative work conditions.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;All in all, The Everything Store is a little bit like Amazon itself. It is a love story of a man with his ideas, and how the rest of the world has shifted, tectonically, to accommodate these eruptions. In its historical retrospective, it shows us the full scope of the ideas and possibilities that inform Amazon, and thus the future that it is going to build for us. And with masterful craftsmanship, Brad Stone writes that it is as much about the one man and his company, as it is about the physical and affective infrastructure of our rapidly transforming digital worlds.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/biblio-january-february-volume-ix-8-nishant-shah-the-internet-way'&gt;https://cis-india.org/internet-governance/blog/biblio-january-february-volume-ix-8-nishant-shah-the-internet-way&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-02-14T06:59:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-jyoti-panday-january-29-2016-internet-has-a-new-standard-for-censorship">
    <title>The Internet Has a New Standard for Censorship</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-jyoti-panday-january-29-2016-internet-has-a-new-standard-for-censorship</link>
    <description>
        &lt;b&gt;The introduction of the new 451 HTTP Error Status Code for blocked websites is a big step forward in cataloguing online censorship, especially in a country like India where access to information is routinely restricted.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the Wire on January 29, 2016. The original can be &lt;a class="external-link" href="http://thewire.in/2016/01/29/the-internet-has-a-new-standard-for-censorship-20386/"&gt;read here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Ray Bradbury’s dystopian novel Fahrenheit 451 opens with the declaration, “It was a pleasure to burn.” The six unassuming words offer a glimpse into the mindset of the novel’s protagonist, ‘the fireman’ Guy Montag, who burns books. Montag occupies a world of totalitarian state control over the media where learning is suppressed and censorship prevails. The title alludes to the ‘temperature at which book paper catches fire and burns,’ an apt reference to the act of violence committed against citizens through the systematic destruction of literature. It is tempting to think about the novel solely as a story of censorship. It certainly is. But it is also a story about the value of intellectual freedom and the importance of information.&lt;br /&gt;&lt;br /&gt;Published in 1953, Bradbury’s story predates home computers, the Internet, Twitter and Facebook, and yet it anticipates the evolution of these technologies as tools for censorship. When the state seeks to censor speech, they use the most effective and easiest mechanisms available. In Bradbury’s dystopian world, burning books did the trick; in today’s world, governments achieve this by blocking access to information online. The majority of the world’s Internet users encounter censorship even if the contours of control vary depending on the country’s policies and infrastructure.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Online censorship in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In India, information access  blockades have become commonplace and are increasingly enforced across  the country for maintaining political stability, for economic &lt;/span&gt;&lt;a href="http://www.indiantelevision.com/regulators/high-court/delhi-hc-restrains-200-websites-from-illegally-showing-balajis-kyaa-kool-hain-hum-3-160123" target="_blank"&gt;&lt;span&gt;reasons&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, in defence of national security or preserving social values. Last week, the Maharashtra Anti-terror Squad &lt;/span&gt;&lt;a href="http://www.abplive.in/india-news/maharashtra-ats-blocks-94-isis-websites-brainwashing-the-youth-280192"&gt;&lt;span&gt;blocked&lt;/span&gt;&lt;/a&gt;&lt;span&gt; 94 websites that were allegedly radicalising the youth to join the  militant group ISIS. Memorably, in 2015 the NDA government’s ham-fisted &lt;/span&gt;&lt;a href="http://thewire.in/2015/08/03/the-government-does-not-want-you-accessing-porn-on-the-internet-anymore-7782/"&gt;&lt;span&gt;attempts&lt;/span&gt;&lt;/a&gt;&lt;span&gt; at enforcing a ban on online pornography resulted in widespread public  outrage. Instead of revoking the ban, the government issued yet another  vaguely worded and in many senses astonishing order. As reported by &lt;/span&gt;&lt;i&gt;&lt;a href="http://www.medianama.com/2015/08/223-porn-india-ban/"&gt;&lt;span&gt;Medianama&lt;/span&gt;&lt;/a&gt;&lt;/i&gt;&lt;span&gt;,  the revised order delegates the responsibility of determining whether  banned websites should remain unavailable to private intermediaries. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The state’s shifting reasons for  blocking access to information is reflective of its tendentious attitude  towards speech and expression. Free speech in India is messily  contested and normally, the role of the judiciary acts as a check on the  executive’s proclivity for banning. For instance, in 2010 the Supreme  Court &lt;/span&gt;&lt;a href="http://timesofindia.indiatimes.com/india/Supreme-Court-lifts-ban-on-James-Laines-book-on-Shivaji/articleshow/6148410.cms"&gt;&lt;span&gt;upheld&lt;/span&gt;&lt;/a&gt;&lt;span&gt; the Maharashtra High Court’s decision to revoke the ban on the book on  Shivaji by American author James Laine, which, according to the state  government, contained material promoting social enmity. However, in the  context of communications technology the traditional role of courts is  increasingly being passed on to private intermediaries. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The delegation of authority is  evident in the government notifying intermediaries to proactively filter  content for ‘child pornography’ in the revised &lt;/span&gt;&lt;a href="http://cis-india.org/internet-governance/resources/dot-morality-block-order-2015-07-31/view"&gt;&lt;span&gt;order&lt;/span&gt;&lt;/a&gt;&lt;span&gt; issued to deal with websites blocked as result of its crackdown on  pornography. Such screening and filtering requires intermediaries to  make a determination on the legality of content in order to avoid direct  liability. As international best practices such as the &lt;/span&gt;&lt;a href="https://www.manilaprinciples.org/"&gt;&lt;span&gt;Manila Principles on Intermediary Liability&lt;/span&gt;&lt;/a&gt; &lt;span&gt;point  out, such screening is a slow process and costly and  intermediaries  are incentivised to simply limit access to information. &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Blocking procedures and secrecy&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The constitutional validity of Section 69A of the Information Technology Act, 2008 which grants power to the executive to block access to information unchecked, and in secrecy was challenged in Shreya Singhal v. Union of India. Curiously, the Supreme Court upheld S69A reasoning that the provisions were narrowly-drawn with adequate safeguards and noted that any procedural inconsistencies may be challenged through writ petitions under Article 226 of the Constitution. Unfortunately as past instances of blocking under S69A reveal the provisions are littered with procedural deficiencies, amplified manifold by the authorities responsible for interpreting and implementing the orders.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Problematically, an &lt;/span&gt;&lt;a href="http://cis-india.org/internet-governance/blog/is-india2019s-website-blocking-law-constitutional-2013-i-law-procedure"&gt;&lt;span&gt;opaque&lt;/span&gt;&lt;/a&gt;&lt;span&gt; confidentiality criteria built into the blocking rules mandates secrecy  in requests and recommendations for blocking and places written orders  outside the purview of public scrutiny. As there are no comprehensive  list of blocked websites or of the legal orders, the public has to rely  on ISPs leaking orders, or media reports to understand the censorship  regime in India. RTI applications requesting further information on the  implementation of these safeguards have at best provided&lt;/span&gt; &lt;a href="http://cis-india.org/internet-governance/blog/response-deity.clarifying-procedures-for-blocking.pdf"&gt;&lt;span&gt;incomplete&lt;/span&gt;&lt;/a&gt;&lt;span&gt; information. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Historically, the courts in India have &lt;/span&gt;&lt;a href="http://www.livemint.com/Politics/hDIjjunGikWywOgSRiM7NP/SC-has-set-a-high-threshold-for-tolerance-Lawrence-Liang.html"&gt;&lt;span&gt;held&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that Article 19(1)(a) of the Constitution of India is as much about the  right to receive information as it is to disseminate, and when there is  a chilling effect on speech, it also violates the right to receive  information. Therefore, if a website is blocked citizens have a  constitutional right to know the legal grounds on which access is being  restricted. Just like the government announces and clarifies the grounds  when banning a book, users have a right to know the grounds for  restrictions on their speech online. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Unfortunately, under the&lt;/span&gt;&lt;a href="http://cis-india.org/internet-governance/blog/deity-says-143-urls-blocked-in-2015"&gt; &lt;span&gt;present&lt;/span&gt;&lt;/a&gt;&lt;span&gt; blocking regime in India there is no easy way for a service provider to  comply with a blocking order while also notifying users that censorship  has taken place. The ‘&lt;/span&gt;&lt;a href="http://cis-india.org/internet-governance/resources/information-technology-procedure-and-safeguards-for-blocking-for-access-of-information-by-public-rules-2009"&gt;&lt;span&gt;Blocking Rules&lt;/span&gt;&lt;/a&gt;&lt;span&gt;’ require notice “person &lt;/span&gt;&lt;span&gt;or&lt;/span&gt;&lt;span&gt; intermediary” thus implying that notice may be sent to either the  originator or the intermediary. Further, the confidentiality clause &lt;/span&gt;&lt;a href="https://indconlawphil.wordpress.com/2015/03/25/the-supreme-courts-it-act-judgment-and-secret-blocking/"&gt;&lt;span&gt;raises&lt;/span&gt;&lt;/a&gt;&lt;span&gt; the presumption that nobody beyond the intermediaries ought to know about a block. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Naturally, intermediaries interested in self-preservation and avoiding conflict with the government become complicit in maintaining secrecy in blocking orders. As a result, it is often difficult to determine why content is inaccessible and users often mistake censorship for technical problem in accessing content. Consequently, pursuing legal recourse or trying to hold the government accountable for their censorious activity becomes a challenge. In failing to consider the constitutional merits of the confidentiality clause, the Supreme Court has shied away from addressing the over-broad reach of the executive. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Secrecy in removing or blocking access is a global problem that places limits on the transparency expected from ISPs. Across &lt;/span&gt;&lt;a href="https://books.google.co.in/books?id=s1LBBwAAQBAJ&amp;amp;pg=PA88&amp;amp;lpg=PA88&amp;amp;dq=transparency+and+blocking+orders&amp;amp;source=bl&amp;amp;ots=8kJ5LNJU5s&amp;amp;sig=gB9E01_gQ3QsjwFtnpa5KdIL8oA&amp;amp;hl=en&amp;amp;sa=X&amp;amp;ved=0ahUKEwirzr7ZlMzKAhXEt44KHdxkBxQQ6AEIOzAF#v=onepage&amp;amp;q=transparency%20and%20blocking%20orders&amp;amp;f=false"&gt;&lt;span&gt;many&lt;/span&gt;&lt;/a&gt;&lt;span&gt; jurisdictions intermediaries are legally &lt;/span&gt;&lt;a href="https://books.google.co.in/books?id=s1LBBwAAQBAJ&amp;amp;pg=PA88&amp;amp;lpg=PA88&amp;amp;dq=transparency+and+blocking+orders&amp;amp;source=bl&amp;amp;ots=8kJ5LNJU5s&amp;amp;sig=gB9E01_gQ3QsjwFtnpa5KdIL8oA&amp;amp;hl=en&amp;amp;sa=X&amp;amp;ved=0ahUKEwirzr7ZlMzKAhXEt44KHdxkBxQQ6AEIOzAF#v=onepage&amp;amp;q=transparency%20and%20blocking%20orders&amp;amp;f=false"&gt;&lt;span&gt;prohibited&lt;/span&gt;&lt;/a&gt;&lt;span&gt; from publicising filtering orders as well as information relating to  content or service restrictions. For example in United Kingdom, ISPs are  prohibited from revealing blocking orders related to terrorism and  surveillance. In South Korea, the &lt;/span&gt;&lt;a href="http://www.singo.or.kr/eng/01_introduction/introduction.php"&gt;&lt;span&gt;Korean Communications Standards Commission&lt;/span&gt;&lt;/a&gt;&lt;span&gt; holds public meetings that are open to the public. However, the sheer v&lt;/span&gt;&lt;a href="https://www.eff.org/deeplinks/2011/08/south-korea-only-thing-worse-online-censorship"&gt;&lt;span&gt;olume&lt;/span&gt;&lt;/a&gt;&lt;span&gt; of censorship (i.e. close to 10,000 URLs a month) makes it &lt;/span&gt;&lt;a href="https://www.eff.org/deeplinks/2011/08/south-korea-only-thing-worse-online-censorship"&gt;&lt;span&gt;unwieldy&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for public oversight. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;As the Manila Principles &lt;/span&gt;&lt;a href="https://www.eff.org/files/2015/07/08/manila_principles_background_paper.pdf"&gt;&lt;span&gt;note&lt;/span&gt;&lt;/a&gt;&lt;span&gt;,  providing users with an explanation and reasons for placing  restrictions on their speech and expression increases civic engagement.  Transparency standards will empower citizens to demand that companies  and governments they interact with are more accountable when it comes to  content regulation. It is worth noting, for conduits as opposed to  content hosts, it may not always be technically feasible for to provide a  notice when content is unavailable due to filtering. A new standard  helps improve transparency standards for network level intermediaries  and for websites bound by confidentiality requirements. The recently  introduced HTTP code for errors is a critical step forward in  cataloguing censorship on the Internet. &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;A standardised code for censorship&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;On December 21, 2015, the Internet Engineering Standards Group (IESG) which is the organisation responsible for reviewing and updating the internet’s operating standards approved the publication of 451-’An HTTP Status Code to Report Legal Obstacles’. The code provides intermediaries a standardised way to notify users know when a website is unavailable following a legal order. Publishing the code allows intermediaries to be transparent about their compliance with court and executive orders across jurisdictions and is a huge step forward for capturing online censorship. HTTP code 451 was introduced by software engineer Tim Bray and the code’s name is an homage to Bradbury’s novel Fahrenheit 451. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Bray began developing the code after  being inspired by a blog post by Terence Eden calling for a  censorship  error code. The code’s official status comes after two years of  discussions within the technical community and is a result of  campaigning from transparency and civil society advocates who have been  pushing for clearer labelling of internet censorship. Initially, the  code received pushback from within the technical community for reasons  enumerated by Mark Nottingham, Chair of the IETF HTTP Working Group in  his &lt;/span&gt;&lt;a href="https://www.mnot.net/blog/2015/12/18/451"&gt;&lt;span&gt;blog&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.  However, soon sites began using the code on an experimental and  unsanctioned basis and faced with increasing demand for and feedback,  the code was accepted. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The HTTP code 451 works as a  machine-readable flag and has immense potential as a tool for  organisations and users who want to quantify and understand censorship  on the internet. Cataloguing online censorship is a challenging,  time-consuming and expensive task. The HTTP code 451 circumvents  confidentiality obligations built into blocking or licensing regimes and  reduces the cost of accessing blocking orders. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The code creates a distinction  between websites blocked following a court or an executive order, and  when information is inaccessible due to technical errors. If implemented  widely, Bray’s new code will help &lt;/span&gt;&lt;a href="http://www.theverge.com/2015/12/21/10632678/http-status-code-451-censorship-tim-bray"&gt;&lt;span&gt;prevent&lt;/span&gt;&lt;/a&gt;&lt;span&gt; confusion around blocked sites. The code addresses the issue of the ISP’s misleading and inaccurate usage of &lt;/span&gt;&lt;a href="https://en.wikipedia.org/wiki/HTTP_403"&gt;&lt;span&gt;Error 403&lt;/span&gt;&lt;/a&gt;&lt;span&gt; ‘Forbidden’ (to indicate that the server can be reached and understood  the request, but refuses to take any further action) or 404 ‘&lt;/span&gt;&lt;a href="https://en.wikipedia.org/wiki/HTTP_404"&gt;&lt;span&gt;Not Found&lt;/span&gt;&lt;/a&gt;&lt;span&gt;’ (to indicate that the requested resource could not be found but may be available again in the future). &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Adoption of the new standard is  optional, though at present there are no laws in India that prevent  intermediaries doing so. Implementing a standardised machine-readable  flag for censorship will go a long way in bolstering the accountability  of ISPs that have in the &lt;/span&gt;&lt;a href="http://www.medianama.com/2014/12/223-india-blocks-imgur/"&gt;&lt;span&gt;past&lt;/span&gt;&lt;/a&gt;&lt;span&gt; targeted an entire domain instead of the specified URL. Adoption of the  standard by ISPs will also improve the understanding of the burden  imposed on intermediaries for censoring and filtering content as  presently, there is no clarity on what constitutes compliance.  Of  course, censorious governments may &lt;/span&gt;&lt;a href="https://nakedsecurity.sophos.com/2015/12/23/welcome-to-http-error-code-451-unavailable-for-legal-reasons/"&gt;&lt;span&gt;prohibit&lt;/span&gt;&lt;/a&gt;&lt;span&gt; the use of the code, for example by issuing an order that specifies not  only that a page be blocked, but also precisely which HTTP return code  should be used. Though such sanctions should be &lt;/span&gt;&lt;a href="https://cdt.org/blog/censorship-transparency-comes-to-the-web/"&gt;&lt;span&gt;viewed&lt;/span&gt;&lt;/a&gt;&lt;span&gt; as evidence of systematic rights violation and totalitarian regimes. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In India where access to software code repositories such as Github and Sourceforge are routinely &lt;/span&gt;&lt;span&gt;&lt;a href="http://cis-india.org/internet-governance/resources/2014-12-17_DoT-32-URL-Block-Order.pdf"&gt;restricted&lt;/a&gt;,&lt;/span&gt;&lt;span&gt; the need for such code is obvious. The use of the code will improve  confidence in blocking practices, allowing  users to understand the  grounds on which their right to information is being restricted.  Improving transparency around censorship is the only way to build trust  between the government and its citizens about the laws and policies  applicable to internet content.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-jyoti-panday-january-29-2016-internet-has-a-new-standard-for-censorship'&gt;https://cis-india.org/internet-governance/blog/the-wire-jyoti-panday-january-29-2016-internet-has-a-new-standard-for-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2016-01-30T09:17:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/the-internet-and-illusions-of-space-and-liberty">
    <title>The Internet and Illusions of Space and Liberty</title>
    <link>https://cis-india.org/events/the-internet-and-illusions-of-space-and-liberty</link>
    <description>
        &lt;b&gt;Talk by Kiran Sahi&lt;/b&gt;
        
&lt;p&gt;The Centre for Internet and Society invites you to a talk by Kiran Sahi on 'The Internet and Illusions of Space and Liberty'. Kiran will use this
talk as an opportunity to look at the parallels that can be drawn
between the spatial elements of the mind, corporal physical space, and
the virtual domains of the internet. Reflecting on
the roles of these parallel domains, we can discuss how dissident
elements within society, traditionally found in geographical
wildernesses, have found new opportunities for freedom in the realms
of the internet. The talk will also explore the idea of
the internet as a heterotopia, a safe space for displaced realities,
and the pressures which make it adopt a panoptic structure.&lt;/p&gt;
&lt;h3&gt;Speaker &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Kiran
Sahi is is a designer and educator working from his home in a village
north of Bangalore.  His work involves presenting and interpreting
the changing socio-political geography of his locality for teachers
and students visiting from  international academic institutions and
education authorities. He also advises on local education development
projects. Kiran works as a consultant design faculty, teaching materials
and sculptural design, and runs a ceramic studio that produces large
scale ceramic murals for public spaces. His previous work has
involved exploring cultural narratives and their visual
representations. He has been interested in exploring the
possibilities of a collaborative community based business involving
professional designers and local craftsmen. &lt;br /&gt;&lt;/p&gt;
&lt;h3&gt;Time and Date&lt;/h3&gt;
&lt;p&gt;Saturday, 7 March, 2009; 5.00-6.30 pm&lt;/p&gt;
&lt;h3&gt;Venue&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Centre for Internet and Society, No. D2, 3rd Floor, Sheriff Chambers, 
14, Cunningham Road, Bangalore - 560052&lt;/p&gt;
&lt;h3&gt;Map &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;For a map, please click &lt;a class="external-link" href="http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=centre+for+internet+and+society+bangalore&amp;amp;jsv=128e&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=61.070016,113.203125&amp;amp;ie=UTF8&amp;amp;cd=1&amp;amp;latlng=12988395,77594450,9857706471034889432&amp;amp;ei=5QXRSKLrNYvAugPX4YSAAg"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/the-internet-and-illusions-of-space-and-liberty'&gt;https://cis-india.org/events/the-internet-and-illusions-of-space-and-liberty&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sachia</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-05T04:40:05Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/india-privacy-monitor-map">
    <title>The India Privacy Monitor Map</title>
    <link>https://cis-india.org/internet-governance/blog/india-privacy-monitor-map</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has started the first Privacy Watch in India! Check out our map which includes data on the UID, NPR and CCTNS schemes, as well as on the installation of CCTV cameras and the use of drones throughout the country.  &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In a country of twenty-eight diverse states and seven union territories, it remained unclear to what extent surveillance, biometric and other privacy-intrusive schemes are being implemented. We are trying to make up for this by mapping out data in every single state in India on the UID, CCTNS and NPR schemes, as well as on the installation of CCTV cameras and the use of Unmanned Aerial Vehicles (UAVs), otherwise known as drones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In particular, the map in its current format includes data on the following:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UID:&lt;/b&gt; The Unique Identification Number (UID), also known as AADHAAR, is a 12-digit unique identification number which the Unique Identification Authority of India (UIDAI) is currently issuing for all residents in India (on a voluntary basis). Each UID is stored in a centralised database and linked to the basic demographic and biometric information of each individual. The UIDAI and AADHAAR currently lack legal backing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;NPR:&lt;/b&gt; Under the National Population Register (NPR), the demographic data of all residents in India is collected on a mandatory basis. The Unique Identification Authority of India (UIDAI) supplements the NPR with the collection of biometric data and the issue of the AADHAAR number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;CCTV:&lt;/b&gt; Closed-circuit television cameras which can produce images or recordings for surveillance purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UAV: &lt;/b&gt;Unmanned Aerial Vehicles (UAVs), otherwise known as drones, are aircrafts without a human pilot on board. The flight of a UAV is controlled either autonomously by computers in the vehicle or under the remote control of a pilot on the ground or in another vehicle. UAVs are used for surveillance purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;CCTNS: &lt;/b&gt;The Crime and Criminal Tracking Networks and Systems (CCTNS) is a nationwide networking infrastructure for enhancing efficiency and effectiveness of policing and sharing data among 14,000 police stations across India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Our India Privacy Monitor Map can be viewed through the following link: http://cis-india.org/cisprivacymonitor &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This map is part of on-going research and will hopefully expand to include other schemes and projects which are potentially privacy-intrusive. We encourage all feedback and additional data!&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/india-privacy-monitor-map'&gt;https://cis-india.org/internet-governance/blog/india-privacy-monitor-map&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-09T16:26:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/india-conference-cyber-security-and-cyber-governance">
    <title>The India Conference on Cyber Security and Cyber Governance</title>
    <link>https://cis-india.org/internet-governance/news/india-conference-cyber-security-and-cyber-governance</link>
    <description>
        &lt;b&gt;Following the success of CYFY 2013 the CYFY 2014 will be held from October 15 to 17, 2014 in New Delhi. The Centre for Internet and Society is a knowledge partner for this event and Sunil Abraham is participating as a panelist in the session "Privacy is Dead". &lt;/b&gt;
        &lt;p&gt;Click to &lt;a href="https://cis-india.org/internet-governance/blog/cyfy-2014-event-programme.pdf" class="internal-link"&gt;download the event details&lt;/a&gt;. The event brochure can be &lt;a href="https://cis-india.org/internet-governance/blog/cyfy-2014-brochure.pdf" class="external-link"&gt;downloaded here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/india-conference-cyber-security-and-cyber-governance'&gt;https://cis-india.org/internet-governance/news/india-conference-cyber-security-and-cyber-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-10-13T07:10:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
