<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 461 to 475.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-appropriate-use-of-digital-identity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/all-india-privacy-delhi-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-ai-task-force-report-the-first-steps-towards-indias-ai-framework"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-aadhaar-case"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-aadhaar-act-is-not-a-money-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/ijlt-cis-lecture-series-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/global-multistakeholder-community-neither-global-nor-multistakeholder"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/unkindest-cut-mr-sibal"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/policies/website-use"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-appropriate-use-of-digital-identity">
    <title>The Appropriate Use of Digital Identity</title>
    <link>https://cis-india.org/internet-governance/blog/the-appropriate-use-of-digital-identity</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;As governments across the globe implement new, foundational, digital identification systems (“Digital ID”), or modernize existing ID programs, there is dire need for greater research and discussion about appropriate uses of Digital ID systems. This significant momentum for creating Digital ID in several parts of the world has been accompanied with concerns about the privacy and exclusion harms of a state issued Digital ID system, resulting in campaigns and litigations in countries such as UK, India, Kenya, and Jamaica. Given the very large range of considerations required to evaluate Digital ID projects, it is necessary to think of evaluation frameworks that can be used for this purpose.&lt;/p&gt;
&lt;p&gt;At RightsCon 2019 in Tunis, we presented &lt;a class="external-link" href="http://bit.ly/CISDigitalIDAppropriateUse"&gt;working drafts&lt;/a&gt; on appropriate use of Digital ID by the partner organisations of this &lt;a class="external-link" href="https://www.omidyar.com/blog/appropriate-use-digital-identity-why-we-invested-three-region-research%C2%A0alliance"&gt;three-region research alliance&lt;/a&gt; - ITS from Brazil, CIPIT from Kenya, and CIS from India.&lt;/p&gt;
&lt;p&gt;In the &lt;a class="external-link" href="https://digitalid.design/evaluation-framework-01.html"&gt;draft by CIS&lt;/a&gt;, we propose a set of principles against which Digital ID may be evaluated. We hope that these draft principles can evolve into a set of best practices that can be used by policymakers when they create and implement Digital ID systems, provide guidance to civil society examinations of Digital ID and highlight questions for further research on the subject. We have drawn from approaches used in documents such as the necessary and proportionate principles, the OECD privacy guidelines and scholarship on harms based approach.&lt;/p&gt;
&lt;p&gt;Read and comment on CIS’s Draft framework &lt;a class="external-link" href="https://digitalid.design/evaluation-framework-01.html"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Download Working drafts by CIPIT, CIS, and ITS &lt;a class="external-link" href="http://bit.ly/CISDigitalIDAppropriateUse"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-appropriate-use-of-digital-identity'&gt;https://cis-india.org/internet-governance/blog/the-appropriate-use-of-digital-identity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Appropriate Use of Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2019-08-08T10:24:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/all-india-privacy-delhi-report">
    <title>The All India Privacy Symposium: Conference Report</title>
    <link>https://cis-india.org/internet-governance/all-india-privacy-delhi-report</link>
    <description>
        &lt;b&gt;Privacy India, the Centre for Internet and Society and Society in Action Group, with support from the International Development Research Centre, Privacy International and Commonwealth Human Rights Initiative had organised the All India Privacy Symposium at the India International Centre in New Delhi, on February 4, 2012.  Natasha Vaz reports about the event.&lt;/b&gt;
        
&lt;p&gt;The symposium was organized around five thematic panel discussions:&lt;br /&gt;
Panel 1: Privacy and Transparency&lt;br /&gt;
Panel 2: Privacy and E-Governance Initiatives&lt;br /&gt;
Panel 3: Privacy and National Security&lt;br /&gt;
Panel 4: Privacy and Banking&lt;br /&gt;
Panel 5: Privacy and Health&lt;/p&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Elonnai Hickok (Policy Advocate, Privacy India) introduced the 
objectives of Privacy India. The primary objectives were to raise 
national awareness about privacy, do an in-depth study of privacy in 
India and provide feedback on the proposed ‘Right to Privacy’ Bill. 
Privacy India has reviewed case laws, legislations, including the 
upcoming policy and conducted state-level privacy workshops and 
consultations across India in Kolkata, Bangalore, Ahmedabad, Guwahati, 
Chennai, and Mumbai. India like the rest of the world is answering some 
fundamental questions about the powers of the government and citizen’s 
rights and complications that arise from emerging technologies. Through 
our research we have come to understand that privacy varies across 
cultures and contexts, and there is no one concept of privacy but 
instead several distinct core notions that serve as complex duties, 
claims and obligations.&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Privacy and Transparency&lt;/h2&gt;
&lt;p&gt;Panelists:&amp;nbsp; Ponnurangam K, (Assistant Professor, IIIT New Delhi), ), 
Chitra Ahanthem (Journalist, Imphal), Nikhil Dey (Social &amp;amp; Political
 Activist), Deepak Maheshwari (Director, Corporate Affairs, Microsoft), 
Gus Hosein (Executive Director, Privacy International, UK), and Prashant
 Bhushan, (Senior Advocate, Supreme Court of India).&lt;br /&gt;
Moderator: Sunil Abraham (Executive Director, Centre for Internet and Society, Bangalore) &lt;br /&gt;
Poster: Srishti Goyal (Law Student, NUJS)&lt;/p&gt;
&lt;p&gt;Srishti Goyal provided the general contours, privacy protections, 
limits to privacy and loopholes of policy relating to transparency and 
privacy, specifically analyzing the Right to Information Act, Public 
Interest Disclosures Act, and the Official Secrets Act.&lt;/p&gt;
&lt;p&gt;Nikhil Dey commented on the interaction between the right to privacy 
and the right to information (RTI). He referred to Gopal Gandhi, the 
former Governor of West Bengal, “we must ensure that tools like the UID 
must help the citizen watch every move of government; not allow the 
government watch every move of the citizen.” Currently, the RTI and the 
UID stand on contrary sides of the information debate. A privacy law 
could allow for a backdoor to curb RTI. So, utmost care has to be taken 
while drafting legislation with respect to right to privacy.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/1.JPG/image_preview" alt="p1" class="image-inline image-inline" title="p1" /&gt;&lt;/td&gt;
&lt;td&gt;Data and information has leaked furiously in India and it has leaked 
to the powerful. A person who is in a position of power can access 
private information irrespective of any laws in place to safeguard 
privacy. It is necessary to look at the power dynamics, which exists in 
the society before formulating legislation on right to privacy. 
According to Nikhil Dey, there should be different standards of privacy 
with respect to public servants. A citizen should be entitled to 
information related to funds, functions and functionaries. The main 
problem arises while defining the private space of a public servant or 
functionaries.&lt;br /&gt;&lt;br /&gt;The RTI Act has failed to address the legal protection for the right 
to privacy. Perhaps, rules regarding privacy can be added to the Act. It
 can be defined by answering the questions: (i) what is ‘personal 
information’? (ii) what is it’s relation to public activity or public 
interest? (iii) what is the unwarranted invasion of the privacy of an 
individual? and (iv) what is the larger public good? Expanding on these 
four points can provide greater legal protection for the right to 
privacy. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Gus Hosein described the intersection and interaction of the right to 
information and the right to privacy. He referred to a petition filed by
 Privacy International requesting information on the expenses of members
 of parliament. Privacy and transparency of the government are 
compatible in the public interest. Gross abuse of the public funds by 
MPs was revealed by this particular petition such as pornography or 
cleaning of moats of MPs homes. Privacy advocates are supporters of RTI,
 however, it cannot be denied that there is no tension between 
transparency and privacy. In order chalk out the differences, there is a
 need of a legal framework. According to Gus Hosein, in many countries 
the government office that deals with right to information also deals 
with cases related to right to privacy.&lt;/p&gt;
&lt;p&gt;Mumbai and New Delhi police have started using social media very 
aggressively, encouraging citizens to take photographs of traffic 
violations and upload them to Facebook or Twitter. In reference to this,
 Ponnurangam described the perceptions of privacy and if it agreed or 
conflicted with his research findings. Ponnurangam has empirically 
explored the awareness and perspective of privacy in India with respect 
to other countries. He conducted a privacy survey in Hyderabad, Chennai 
and Mumbai. People are very comfortable in posting pictures of others 
committing a traffic violation or running a red light. Ironically, many 
people have posted pictures of police officers committing a traffic 
violation such as not wearing a helmet or running a red light.&lt;br /&gt;
  &lt;br /&gt;
Chitra Ahanthem described the barriers and challenges of using RTI in 
Manipur. There are more than 40 armed militia groups, which are banned 
by the central and state government. The central government provides 
economic packages for the development of the north-east region. However,
 the state government officials and armed groups pocket the economic 
packages. These armed groups have imposed a ban on RTI. Furthermore, 
Manipur is a very small community. If people try and access information 
through RTI they risk getting threatened by the Panchayat members and 
being ostracized from the community or their clan. &lt;br /&gt;
  &lt;br /&gt;
People are apprehensive about filing RTI because they believe that these
 procedures are costly and the police and government may also get 
involved. Officials use the privacy plea to avoid giving out 
information. Since certain information are private and not in the public
 domain, government officials, use the defense of privacy to hide 
information. In addition, the police brutality prevalent in the area 
deters people to even have interactions with government officials. &lt;br /&gt;
  &lt;br /&gt;
According to Deepak Maheshwari, the open data initiative is a subset 
within the larger context of open information. There is an onus on the 
government to publish information, which is in the public domain. As a 
result, one does not necessarily have to go through the entire process 
of filing an RTI to get information, which is already there in the 
public domain. Moreover, if it is freely available in public domain, 
then one can anonymously access such information; this further 
strengthens the privacy aspects of requesting information and 
facilitating anonymity with respect to access to such information in the
 public domain. It has also to be noted that it is not sufficient to put
 data out in the public domain but it should also disclose the basis of 
the data for example, if there is representation of a data on a pie 
chart, the data which was used to arrive at the pie chart should also be
 available in the public domain. The main intention of releasing data to
 the public domain or having open data standards should not only be to 
provide access to such data but also should be in such a fashion so as 
to enable people to use the data for multiple purposes.&lt;/p&gt;
&lt;p&gt;Prashant Bhushan noted that one of the grounds for withholding 
information in the RTI Act is privacy. An RTI officer can disclose 
personal information if he feels that larger public interest warrants 
the disclosure, even if it is personal information, which has no 
relationship to public activity or interest. This raises the important 
question, “what constitutes personal information?” He referred to the 
Radia Tapes controversy. Ratan Tata has filed a petition in the Supreme 
Court on the grounds that the Nira Radia tapes contained personal 
information and that the release of these tapes into the public domain 
violated his privacy. The Centre for Public Interest Litigation has 
filed a counter petition on the grounds that the nature of the 
conversations was not personal but in relation to public activity. They 
were between a lobbyist and bureaucrats, journalists and ministers. 
Prashant Bhushan stressed the importance of releasing these tapes into 
the public domain to show glimpses of all kinds of fixing, deal-making 
and show how the whole ruling establishment functions. It is absurd for 
Ratan Tata to claim that this is an invasion of privacy. Lastly, he felt
 when drafting a privacy law, clearly defining and distinguishing 
personal information and public is extremely important.&lt;/p&gt;
&lt;p&gt;One of the interesting comments made during the panel was on the 
assumption that data is transparent. Transparency can be staged; 
questions have to be asked around whether the word is itself 
transparent.&lt;/p&gt;
&lt;h2&gt;Privacy and E-Governance Initiatives&lt;/h2&gt;
&lt;p&gt;Panelists:&amp;nbsp; Anant Maringanti, (Independent Social Researcher), Usha 
Ramanathan, (Advocate &amp;amp; Social Activist), Gus Hosein, (Executive 
Director, Privacy International, UK), Apar Gupta, (Advocate, Supreme 
Court of India), and Elida Kristine Undrum Jacobsen (Doctoral 
Researcher, The Peace Research Institute Oslo).&lt;br /&gt;
Moderator: Sudhir Krishnaswamy (Centre for Law and Policy Research)&lt;br /&gt;
Poster: Adrija Das (Law Student, NUJS)&lt;/p&gt;
&lt;p&gt;Adrija Das discussed the legal provision relating to identity 
projects and e-governance initiatives in India. The objective of any 
e-governance project is to increase efficiency and accessibility of 
public services. However, a major problem that arises is the linkage of 
the data results in the creation of a central database, accessible by 
every department of the government. Furthermore, implementing data 
protection and security standards are very expensive.&lt;/p&gt;
&lt;p&gt;Sudhir Krishnaswamy highlighted the default assumptions surrounding 
e-governance initiatives: e-governance initiatives solve governance 
problems, increase efficiency, increase transparency and increase 
accountability. It is important to analyze the problems that arise from 
e-governance initiatives, such as privacy.&amp;nbsp;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Usha Ramanathan described the increased number and vastness of 
e-governance initiatives such as UID, NPR, IT Rules and NATGRID. There 
are also many burdens on privacy that emanate from the introduction and 
existence of electronic data management systems. Electronic data 
management systems have allowed state to collect, store and use personal
 information of individual. Currently, the DNA Profiling Bill is pending
 before the Parliament. It is important to question the purpose and need
 for the government to collect such personal information. It is also to 
be noted that, there are certain laws such as Collection of Statistics 
Act, 2008 that penalize individuals if they do not comply with the 
information requests of the government.&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Usha.JPG/image_preview" title="Usha" height="124" width="148" alt="Usha" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Anant Maringanti discussed the limitations of data sharing that once 
existed. Currently, data can move across space in a very short time. He 
analyzed the state and market rationalities involved in e-governance 
initiatives, which raise the question “who can access data and at what 
price?”. Data may seem to be innocent or neutral, but data in the hands 
of wrong people becomes very crucial due to abuse and misuse. For 
example, Andhra Pradesh was praised as the model state for UID 
implementation. However, during the process of collecting data for UID a
 company bought personal information and sold the data to third parties.&lt;br /&gt;
  &lt;br /&gt;
Apar Gupta discussed the dilemmas of e-governance. Generally information
 in the form of an electronic record is presumed to be authentic. The 
data which government collects is most often inaccurate and wrong. So 
the digital identity of a person can be totally different from the real 
identity of that particular person. The process for correcting such 
information is also very inconvenient and sometimes impossible. &lt;br /&gt;
Under the evidence law any electronic evidence is presumed to be 
authentic and admissible as evidence. The Bombay High Court decided a 
case involving the authenticity of a telephone bill generated by a 
machine. The judgment said that since it is being generated by a 
machine, through and automated process, there is no need to challenge 
the authenticity of the document, it is presumed to true and authentic. 
The main danger in such case is that one does away with the process of 
law and attaches certain sanctity to the electronic record and evidence.
 &lt;br /&gt;
  &lt;br /&gt;
It should be also observed that how government maintains secrecy as to 
the ways in which it collects data. For example, the Election Commission
 has refused to disclose the functioning and design of electronic voting
 machines. The reason given for such secrecy is that if such information
 is put in the public domain then the electronic voting machines will be
 vulnerable and can be tampered with. But we, who use the voting 
machines, will never find out its vulnerabilities.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;According to Gus Hosein, politicians generally have this wrong notion
 that technology can solve complex administrative problems. Furthermore,
 the industry is complicit; they indulge in anti-competitive market 
practice to sell these technologies as a solution to problems. However, 
such technology does not solve any problems rather it gives rise to 
problems.&lt;br /&gt;&lt;br /&gt;Huge amount of government funds is associated with collection of 
personal data but such data is rendered useless or rather misused, 
because the government does not have clue as to how to use the data for 
development and security purposes. The UK National Health Records 
project estimated to cost around twelve to twenty billion pounds. 
However, a survey carried out by a professor in University College 
London showed that the hospital and other health institutions do not use
 the information collected by the National Health Records. Similarly, 
the UK Identity Card scheme was estimated to cost 1.3 billion pounds and
 finally it was estimated to cost five billion pounds. The identity 
cards are rendered obsolete, the sole department interested in the 
identity card was the Home Office Department, no other department 
intended on using it.&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Gus.JPG/image_preview" alt="Gus " class="image-inline image-inline" title="Gus " /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Technology should be built in such a manner that it empowers the 
individual. Technology should allow the individual to control his 
identity and as well as access all kinds of information available to the
 government and private bodies on that individual. &lt;br /&gt;
  &lt;br /&gt;
According to Elida Kristine Undrum Jacobsen, technology is regarded in 
this linear manner. It is increasingly being naturalized and as an 
all-encompassing solution. The use of biometric systems in the UID 
raises three areas of concern: power, value and social relationships.&amp;nbsp;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Elida.JPG/image_preview" alt="Elida" class="image-inline image-inline" title="Elida" /&gt;&lt;/td&gt;
&lt;td&gt;With regards to power, there is a difference between providing 
documentation and information for identification. However, problems 
arise when the mode of identification becomes one’s body. It also leads 
to absolute reliance on technology, if the machine says that this is an 
individual’s identity then it is considered to be the absolute truth and
 it does not matter even if the individual is someone else. It becomes 
furthermore problematic with biometric system because it is generally 
used for forensic purposes. &lt;br /&gt;&lt;br /&gt;The other component of UID or any national identification scheme is 
the question of consent and its relationship to privacy. In the case of 
UID project, people are totally unaware about how their information will
 be used and what purposes can it be used or misused for. Therefore, 
there is no informed consent when it comes to collection of biometric 
data under the UID project. &lt;br /&gt;
  &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;On the issue of social value it is to be noted that the value of 
efficiency becomes the most important value, which is valued. Many of 
the UIDAI documents state that the UID will provide a transactional 
identity. However, at the same time it takes away societal layers, which
 is inherently part of one’s identity. In addition, it makes it possible
 for the identity of a person to become a commodity to be sold. This 
also means that the personal information has economic value and players 
in the market such as insurance companies, banks can buy and sell the 
information.&lt;br /&gt;
  &lt;br /&gt;
When there is identification projects using biometrics it gives the 
State a lot of power; the power to determine and dictate one’s identity 
irrespective of the difference in real identity. Moreover, when such 
identifications projects are carried out at a national level it also 
gives rise to problem related to exclusion and inclusion of people or 
various purposes. The classification of the society based on various 
factors becomes easy and there is a huge risk involved with such 
classification.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The issues, which came out from the Q&amp;amp;A session, were:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;The interplay between fairness and lawfulness in the context of 
privacy and data collection. There has to be a question asked as to why 
certain information is required by the State and how is it lawful.&amp;nbsp;&lt;/li&gt;&lt;li&gt;In the neo-liberal era corporations are generally considered to be
 private. This has to be questioned and furthermore the difference 
between what is private and what is public. There are also concerns 
about corporations increasingly collaborating with the State. Can it be 
still considered as private?&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;Privacy and National Security&lt;/h2&gt;
&lt;p&gt;Panelists: PK Hormis Tharakan (Former Chief of Research and Analysis 
Wing, Government of India), Saikat Datta (Journalist), Menaka Guruswamy,
 (Advocate, Supreme Court, New Delhi), Prasanth Sugathan, (Legal 
Counsel, Software Freedom Law Center), and Oxblood Ruffin, (Cult of the 
Dead Cow Security and Publishing Collective).&lt;br /&gt;
Moderator:&amp;nbsp; Danish Sheikh (Alternative Law Forum)&lt;br /&gt;
Poster: Suchitra Menon (Law Student, NUJS)&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Suchitra Menon discussed the legal provisions for national security 
in relation to privacy. Specifically, she described the guidelines and 
procedural safeguards with respect to phone tapping and interception of 
communication decisional jurisprudence.&lt;/p&gt;
&lt;p&gt;In the year 2000, the Information Technology Act (IT Act), 2000 was 
enacted, this Act had under section 69 allowed the State to monitor and 
intercept information through intermediaries. Prasanth Sugathan 
described how the government has been trying to bypass the procedural 
safeguard laid down by the Supreme Court in the PUCL case by using 
Section 28 of the IT Act, 2000. The provision deals with certifying 
authority for digital signatures. The certifying authority under the Act
 also has the authority to investigate offences under the Act. The 
provision mainly deals with digital signature but it is used by the 
government to intercept communication without implementing the 
procedural safeguards laid down for such interception. Furthermore, the 
IT Rules which was notified by the government in April, 2007 allows the 
government to intercept any communication with the help of the 
intermediaries. The 2008 amendment to the IT Act was an after effect of 
the 26/11 attacks in Mumbai. The legislation has become draconian since 
then and privacy has been sacrificed to meet the ends of national 
security.&lt;/p&gt;
&lt;p&gt;Oxblood Ruffin read out his speech and the same is reproduced below.&lt;/p&gt;
&lt;p&gt;“The online citizenry of any country is part of its national security
 infrastructure. And the extent to which individual privacy rights are 
protected will determine whether democracy continues to succeed, or 
inches towards tyranny. The challenge then is to balance the legitimate 
needs of the state to secure its sovereignty with protecting its most 
valuable asset: The citizen.&lt;br /&gt;
  &lt;br /&gt;
It has become trite to say that 9/11 changed everything. Yet it is as 
true for the West as it is for the global South. 9/11 kick started the 
downward spiral of individual privacy rights across the entire internet.
 It also ushered in a false dichotomy of choice, that in choosing 
between security and privacy, it was privacy that had adapted to the new
 realities, or so we’ve been told.&lt;br /&gt;
  &lt;br /&gt;
Let’s examine some of the fallacies of this argument.&lt;br /&gt;
&amp;nbsp;&lt;br /&gt;
The false equation which many argue is that we must give up privacy to 
ensure security. But no one argues the opposite. We needn’t balance the 
costs of surveillance over privacy, because rarely banning a security 
measure protects privacy. Rather, protecting privacy typically means 
that government surveillance must be subjected to judicial oversight and
 justification of the need to surveillance. In most cases privacy 
protection will not diminish the state’s effectiveness to secure itself.&lt;br /&gt;
  &lt;br /&gt;
The deference argument is that security advocates insist that the courts
 should defer to elected officials when evaluating security measures. 
But when the judiciary weighs privacy against surveillance, privacy 
almost always loses. Unless the security measures are explored for 
efficacy they will win every time, especially when the word terrorism is
 invoked. The courts must take on a more active role to balance the 
interests of the state and its citizens.&lt;br /&gt;
  &lt;br /&gt;
For the war time argument security proponents argue that the war on 
terror requires greater security and less privacy. But this argument is 
backwards. During times of crisis the temptation is to make unnecessary 
sacrifices in the name of security. In the United States, for example, 
we saw that Japanese-American internment and the McCarthy-era witch-hunt
 for communists was in vain. The greatest challenge for safeguarding 
privacy comes during times when we are least inclined to protect it. We 
must be willing to be coldly rational and not emotional during such 
times.&lt;br /&gt;
  &lt;br /&gt;
We are often told that if you have nothing to hide, you have nothing to
 fear. This is the most pervasive argument the average person hears. But
 isn’t privacy a little like being naked? We might not be ashamed of our
 bodies but we don’t walk around naked. Being online isn’t so different.
 Our virtual selves should be as covered as our real selves. It’s a form
 of personal sovereignty. Being seen should require our consent, just as
 in the real world. The state has no business taking up the role of 
Peeping Tom.&lt;br /&gt;
  &lt;br /&gt;
I firmly believe that the state has a right and a duty to secure itself.
 And I equally believe that its citizens are entitled to those same 
rights. Citizens are part of the national security infrastructure. They 
conduct business; they share information; they are the benefactors of 
democratic values. Privacy rights are what, amongst others, separate us 
from the rule of tyrants. To protect them is to protect and preserve 
democracy. It is a fight worth dying for, as so many have done before 
us.&lt;/p&gt;
&lt;p&gt;PK Hormis Tharakan discussed the importance of interception 
communication in intelligence gathering. In the western liberal 
democracies, restrictions of privacy were introduced for the 
anti-terrorism campaigns and these measures are far restrictive than 
what the Indian legislations contemplate. Preventive intelligence is a 
major component in maintenance of national security and this 
intelligence is generated and can be procured through interception. &lt;br /&gt;
  &lt;br /&gt;
We do need laws to make sure that the power of interception is not 
excessive or out of proportion. But the graver issue is that the 
equipment used for interception of communication is freely available in 
the market at a cheap price. This allows private citizens also to snoop 
into others conversation. So, interception by civilians should be the 
main concern.&lt;br /&gt;
  &lt;br /&gt;
Menaka Guruswamy discussed the lack of regulation of Indian intelligence
 agencies that creates burdens on privacy. When there is a conflict 
between individual privacy and national security, the court will always 
rule in favour of the national security. Public interest always takes 
precedence over individual interest. &lt;br /&gt;
  &lt;br /&gt;
When there is a claim right to privacy vis-à-vis national security, 
generally these claims are characterized by dissent, chilling effects on
 freedom of expression and government accountability. In India, privacy 
is fragile and relatively a less justifiable right. Another challenge to
 privacy is that, when communication is intercepted, which part of the 
conversation can be considered to be private and which part cannot be 
considered so.&lt;br /&gt;
  &lt;br /&gt;
Saikat Datta described his experience of being under illegal 
surveillance by an unauthorized intelligence agency. When a person is 
under surveillance, he or she is already considered to be suspect. If 
the State commits any mistake as to surveillance, carrying surveillance,
 who is not at all a person of interest in such case upon discovery, 
there is no penalty for such discrepancy.&lt;br /&gt;
He warned of the dangers of excessive wiretapping, a practice that 
currently generates such a “mountain” of information that anything with 
real intelligence value tends to be ignored until it is too late, as 
happened with the Mumbai bombings in 2008. It is clear that the Indian 
government’s surveillance and interception programmes far exceed what is
 necessary for legitimate law enforcement.&lt;br /&gt;
  &lt;br /&gt;
The issues, which came during the Q&amp;amp;A session was:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;In case of national security vis-à-vis privacy in heavily 
militarized zone, legislations such as Armed Forces Special Powers Act 
actually give authority to the army to search and seizure on mere 
suspicion? This amounts gross violation of privacy.&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;Privacy and Banking&lt;/h2&gt;
&lt;p&gt;Panelists: M R Umarji, (Chief Legal Advisor, Indian Banks Associations), N A Vijayashankar, (Cyber Law Expert), Malavika Jayaram, (Advocate, Bangalore)&lt;br /&gt;Moderator: Prashant Iyengar (Associate Professor, Jindal Law University)&lt;br /&gt;Poster: Malavika Chandu (Law Student, NUJS)&lt;/p&gt;
&lt;p&gt;Prashant Iyengar highlighted how privacy has been a central feature in banking and finance. Even before the notion of privacy came into existence, banks had developed an evolved notion of secrecy and confidentiality, which was fairly robust. Every legislation dealing with banking and finance generally have a clause related to privacy and confidentiality. It might seem that it would be easy to implement privacy in banking and finance given the long relationship between banking and secrecy and confidentiality. However, this is not the case in the contemporary times. Specifically, with the growth in issues related to national security, transparency and technology, the highly regarded notion of privacy seems to be slowly depleting.&lt;/p&gt;
&lt;p&gt;Malavika Chandu described the data protection standards that govern the banking industry. As part of the know-you-customer guidelines, banks are required to provide the Reserve Bank with customer profiles and other identification information. Lastly, she described case laws in relation to privacy with respect to financial records.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;N A Vijayashankar noted that the confidentiality and secrecy practices 
in the banking sector emanate from the banker-customer relationship. In 
the present context, secrecy and privacy maintained by the banks should 
be analyzed from the perspective of the right of the customer to 
safeguard his or her information from any third party. Generally, banks 
and other financial institutions protect personal information as a fraud
 control measure and not as duty to protect the privacy of a customer.&lt;br /&gt;&lt;br /&gt;There has been a paradigm shift in banking practices from traditional 
banking practices to more efficient but less secure banking practice. 
Some of the terms and conditions of internet banking are illegal and do 
not stand the test of law. In contemporary times, banking institutions 
use confidentiality to cover up problems and data breach rather than 
protecting the customer. But the banks are not ready to disclose data 
breach as it apprehends that it will result in public losing faith in 
the system. The Reserve Bank of India, has recently notified that 
protection which is provided to the customers in banking services should
 also be extended to e-banking services. However, the banks have not 
properly implemented this. &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Naavi.JPG/image_preview" alt="NA Vijayashankar" class="image-inline image-inline" title="NA Vijayashankar" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;M R Umarji highlighted fourteen laws related to banking which carries confidentiality clauses. In India, public sector banks dominate the market. These banks are created under a statute and such statute governs them. Therefore, they are duty bound to maintain secrecy and confidentiality. Private banks and cooperative banks are not bound by any statute. They do not have any obligations to maintain secrecy, but they do strictly observe confidentiality as a form of banking practice. &lt;br /&gt;&lt;br /&gt;Banks are not allowed to reveal any personal information of an individual unless it is sought by some authority that has a legitimate right to claim such information. There has been a constant erosion of confidentiality due to various laws which empowers authorities to seek confidential information from the banks. Recently, in the light of the growing national security concerns, banks also have an obligation to report suspicious transactions. These have caused heavy burdens on right to privacy of an individual.&lt;br /&gt;&lt;br /&gt;Under the Right to Information Act, 2005 public sector banks are considered to be public authorities. By the virtue of the Statute, any person can access information from banks. For example, in a recent case an information officer directed Reserve Bank of India, to disclose Inspection Reports. These reports generally contain information regarding doubtful accounts, non-performing account, etc. There is a need that banks should be exempted from the Right to Information Act, 2005. Since they are not dealing with public funds there is no need to apply transparency law to the banks.&amp;nbsp; &lt;br /&gt;&lt;br /&gt;Malavika Jayaram described the major conflicts and tensions with respect to privacy vis-à-vis banking and financial systems and financial data. Other privacy and transparency issues include:&amp;nbsp; the publication of online tax information and income data. &lt;br /&gt;&lt;br /&gt;Surveillance is built in the design of banking system, so it is capable of tracking personal information and activity. There is a need to implement more privacy friendly and privacy by design systems in the banking sector. Customers are generally ignorant about privacy policies and this influences informed consent and furthermore marketing institution may influence customers to behave in a particular manner. In this context privacy by design becomes very important.&lt;br /&gt;&lt;br /&gt;Data minimization principles should be applied; since the more data collected the more there is a risk of data breach and misuse. In case of data retention it is necessary that person giving such data should know how much proportion of the data is being retained and for how long&amp;nbsp; it is stored and also what is the scope of the data and for what purpose will it be used. &lt;br /&gt;&lt;br /&gt;Personal information and data, which was previously collected by the government, are gradually being outsourced to private bodies. On one hand it is a good thing that private sector get their technology and security measures right as compared to the government agencies but it comes with the risk that it can be sold out by private bodies as commodities in the market. Private bodies that are harvesting the data can also be forced by the government to disclose it under a particular law or statute without taking into consideration the consent of the individual whose personal information is sought for. &lt;br /&gt;&lt;br /&gt;There is multiplicity of documentation for identification, which makes transactions less efficient. This has attracted customers to more convenient systems such as one-access point systems, but people tend to forget the issues related to privacy, in using such a system. What is portrayed as efficient for the consumer is a tool for social control and who has access and authority to use such information.&amp;nbsp; &lt;br /&gt;&lt;br /&gt;Often the reason given for collecting information is that it will help the service provider to combat fraud. However, studies have shown people more often fake situation rather than identity. The other concerns are that of sharing of information and lack of choice with respect to such sharing. There should be check as to sharing of personal information as the data belongs to the individual and not the bank or any other institution which requires furnishing personal information in lieu of services. This gives rise to a binary choice to the user; either the individual has to provide information to avail the service or else one cannot avail the services.&lt;/p&gt;
&lt;p&gt;There is supposed to be market for privacy. The notion of personal information is subjective and varies from person to person. For example, one might be comfortable to share certain information. However, others might not be.&lt;br /&gt;&lt;br /&gt;The issues that came out of the Q&amp;amp;A sessions are:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;The default settings are generally put at the low protection settings. Unless the user is aware of the privacy protection setting, he or she is prone to breach of privacy. Should the default privacy setting be set to maximum security and option can be given to the user to change it according to his or her preference?&lt;/li&gt;&lt;li&gt;Is there any system in the banks, which allows the customers of bank to know about which all third parties the bank has shared his or her personal information with?&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;Health Privacy&lt;/h2&gt;
&lt;p&gt;Panelists: K. K. Abraham, (President, Indian Network for People with HIV), Dr. B. S. Bedi, (Advisor, CDAC &amp;amp; Media Lab Asia), and Raman Chawla, (Senior Advocacy Officer, Lawyers Collective).&lt;br /&gt;Moderator: Ashok Row Kavi (Journalist and LGBT Activist) &lt;br /&gt;Poster: Danish Sheikh (Researcher, Alternative Law Forum)&lt;/p&gt;
&lt;p&gt;Danish Sheikh outlined the possible health privacy violations. These included the disclosure of personal health information to third parties without consent, inadequate notification to a patient of a data breach, the purpose of collecting data is not specified and improper security standards, storage and disposal. The disclosure of personal health information has the potential to be embarrassing, stigmatizing or discriminatory. &lt;br /&gt;&lt;br /&gt;Subsequently, Danish Sheikh examined the status of sexual minorities’ vis-à-vis the privacy framework. Culling out some real life examples based on various studies, media reports and judgments from the Supreme Court and the High Courts of Delhi and Allahabad, he also described privacy violations committed by both individuals as well as state authorities. &lt;br /&gt;&lt;br /&gt;Ashok Row Kavi recounted how privacy was very contextual when debating section 377 in the LGBT community. The paradigm upon which they were going to fight the anti-sodomy law was that it was consenting sex between two adults in private space. However, this paradigm was not well received by women, as women did not see private space as safe space, due to domestic violence. Perceptions of privacy are very subjective and it differs from person to person.&lt;br /&gt;&lt;br /&gt;Raman Chawla recounted the history of the Draft HIV/AIDS Bill. In 2002, the need for law related to HIV/AIDS was realized in order to protect right to consent, right against discrimination and right to confidentiality of HIV patients. The bill was finalized in the year 2006. Alarmingly, it is yet to be tabled before the Parliament. &lt;br /&gt;&lt;br /&gt;The privacy provisions in the HIV bill clearly state that no person can be tested, treated or researched for HIV without the consent of the patient. It also casts that in a fiduciary relationship the health care provider must maintain confidentiality, however if the patient provides written consent then their status may be disclosed. The HIV condition of the patient can also revealed by the doctor if there is a court order demanding such disclosure. The doctor may disclose the status of the patient to his or her partner but he has to follow a particular protocol. The doctor should have sufficient belief that his or her partner is at risk of contracting HIV. The person who is infected will be asked for his/her views and counseled before his/her partner is informed. However, there are doubts as to the implementation and enforcement of this protocol.&lt;/p&gt;
&lt;p&gt;Danish Sheikh outlined the possible health privacy violations. These included the disclosure of personal health information to third parties without consent, inadequate notification to a patient of a data breach, the purpose of collecting data is not specified and improper security standards, storage and disposal. The disclosure of personal health information has the potential to be embarrassing, stigmatizing or discriminatory. &lt;br /&gt;&lt;br /&gt;Subsequently, Danish Sheikh examined the status of sexual minorities’ vis-à-vis the privacy framework. Culling out some real life examples based on various studies, media reports and judgments from the Supreme Court and the High Courts of Delhi and Allahabad, he also described privacy violations committed by both individuals as well as state authorities. &lt;br /&gt;&lt;br /&gt;Ashok Row Kavi recounted how privacy was very contextual when debating section 377 in the LGBT community. The paradigm upon which they were going to fight the anti-sodomy law was that it was consenting sex between two adults in private space. However, this paradigm was not well received by women, as women did not see private space as safe space, due to domestic violence. Perceptions of privacy are very subjective and it differs from person to person.&lt;br /&gt;&lt;br /&gt;Raman Chawla recounted the history of the Draft HIV/AIDS Bill. In 2002, the need for law related to HIV/AIDS was realized in order to protect right to consent, right against discrimination and right to confidentiality of HIV patients. The bill was finalized in the year 2006. Alarmingly, it is yet to be tabled before the Parliament. &lt;br /&gt;&lt;br /&gt;The privacy provisions in the HIV bill clearly state that no person can be tested, treated or researched for HIV without the consent of the patient. It also casts that in a fiduciary relationship the health care provider must maintain confidentiality, however if the patient provides written consent then their status may be disclosed. The HIV condition of the patient can also revealed by the doctor if there is a court order demanding such disclosure. The doctor may disclose the status of the patient to his or her partner but he has to follow a particular protocol. The doctor should have sufficient belief that his or her partner is at risk of contracting HIV. The person who is infected will be asked for his/her views and counseled before his/her partner is informed. However, there are doubts as to the implementation and enforcement of this protocol.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/AP.JPG/image_preview" alt="AI" class="image-inline image-inline" title="AI" /&gt;&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;Natasha Vaz (Policy Advocate, Privacy India) brought the symposium to a close by thanking the partners, the panelists, the moderators and the participants for their sincere efforts in making the All India Privacy Symposium a grand success. In India, a public discussion regarding privacy has been long over due. The symposium provided a platform for dialogue and building greater awareness around privacy issues in health, banking, national security, transparency and e-governance. Using our research, expert opinions, personal experiences, questions and comments various facets of privacy were explored.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Press Coverage&lt;/h2&gt;
&lt;p&gt;The event was featured in the media as well:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2012-02-02/news/31017368_1_privacy-law-privacy-international-cis"&gt;India needs an independent privacy law, says NGO Privacy India&lt;/a&gt;, Economic Times, February 2, 2012&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.tehelka.com/story_main51.asp?filename=Ws060212Privacy.asp"&gt;New Bill to decide on individual’s right to privacy&lt;/a&gt;, Tehelka, February 6, 2012&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.dnaindia.com/analysis/column_lack-of-strong-privacy-law-in-healthcare-a-big-worry_1649366"&gt;Lack of strong privacy law in healthcare a big worry&lt;/a&gt;, Daily News &amp;amp; Analysis, February 13, 2012&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.washingtonpost.com/world/asia_pacific/privacy-concerns-grow-in-india/2012/01/26/gIQAyM0UmQ_story.html"&gt;Privacy concerns grow in India&lt;/a&gt;, Washington Post, February 3, 2012&lt;/li&gt;&lt;/ol&gt;
&lt;hr /&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/privacy-symposium-agenda.pdf" class="internal-link" title="All India Privacy Symposium - Profiles &amp;amp; Speakers"&gt;Click &lt;/a&gt;to download the Agenda and Profile of Speakers (PDF, 1642 Kb)&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/all-privacy-symposium.pdf" class="internal-link" title="All India Privacy Symposium (File)"&gt;Download the PDF&lt;/a&gt; (555 Kb)&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/all-india-privacy-symposium-webcast" class="external-link"&gt;Follow the webcast of the event&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/all-india-privacy-delhi-report'&gt;https://cis-india.org/internet-governance/all-india-privacy-delhi-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>natasha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-04-30T05:16:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-ai-task-force-report-the-first-steps-towards-indias-ai-framework">
    <title>The AI Task Force Report - The first steps towards India’s AI framework </title>
    <link>https://cis-india.org/internet-governance/blog/the-ai-task-force-report-the-first-steps-towards-indias-ai-framework</link>
    <description>
        &lt;b&gt;The Task Force on Artificial Intelligence was established by the Ministry of Commerce and Industry to leverage AI for economic benefits, and provide policy recommendations on the deployment of AI for India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was edited by Swagam Dasgupta. &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/ai-task-force-report.pdf"&gt;Download &lt;strong&gt;PDF&lt;/strong&gt; here&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;The Task Force’s Report, released on March 21st 2018, is a result of the combined expertise of members from different sectors&lt;/span&gt;&lt;a name="_ftnref1"&gt;&lt;/a&gt;&lt;span style="text-align: justify; "&gt; and examines how AI will benefit India. It sheds light on the Task Force’s perception of AI, the sectors in which AI can be leveraged in India, the challenges endemic to India and certain ethical considerations. It concludes with a set of policy recommendations for the government to leverage AI for the next five years. While acknowledging AI as a social and economic problem solver,&lt;/span&gt;&lt;a name="_ftnref2"&gt;&lt;/a&gt;&lt;span style="text-align: justify; "&gt; the Report attempts to answer three policy questions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What are the areas where government should play a role?&lt;/li&gt;
&lt;li&gt;How can AI improve quality of life and solve problems at scale for Indian citizens?&lt;/li&gt;
&lt;li&gt;What are the sectors that can generate employment and growth by the use of AI technology?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;This blog will look at how the Task Force answered these three policy questions. In doing so, it gives an overview of salient aspects and reflects on the strengths and weaknesses of the Report.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Sectors of Relevance and Challenges&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In order to navigate the outlined questions, the Report looks at ten sectors that it refers to as ‘domains of relevance to India’. Furthermore, it examines the use of AI along with its major challenges, and possible solutions for each sector. These sectors include: Manufacturing, FinTech, Agriculture, Healthcare, Technology for the Differently-abled, National Security, Environment, Public Utility Services, Retail and Customer Relationship, and Education.&lt;a name="_ftnref3"&gt;&lt;/a&gt; While these ten domains are part of the 16 domains of focus listed in the AITF’s web page,&lt;a name="_ftnref4"&gt;&lt;/a&gt; it would have been useful to know the basis on which these sectors were identified. A particular strength of the identified sectors is the consideration of technology for the differently abled as well as the recognition to the development of AI systems in spoken and sign languages in the Indian context.&lt;a name="_ftnref5"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Some of the problems endemic to India that were recognized include infrastructural barriers, managing scale and innovation, and the collection, validation and distribution of data.&lt;/span&gt;&lt;a name="_ftnref6"&gt;&lt;/a&gt;&lt;span&gt; The Task Force also noted the lack of consumer awareness, and inability of technology providers to explain benefits to end users as further challenges.&lt;/span&gt;&lt;a name="_ftnref7"&gt;&lt;/a&gt;&lt;span&gt; The Task Force — by putting the onus on the individual — seems to hint that the impediment to the uptake of technology is the inability of individuals to understand the benefits of the technology, rather than aspects such as poor design, opacity, or misuse of data and insights. Furthermore, although the Report recognizes the challenges associated to data in India and highlights the importance of quality and quantity of data; it overlooks the importance of data curation in creatinge reliable AI systems.&lt;/span&gt;&lt;a name="_ftnref8"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the Report examines challenges to AI in each sector, it fails to include all challenges that require addressal. For example, the report fails to acknowledge challenges such as the lack of appropriate certification systems for AI driven health systems and technologies.&lt;a name="_ftnref9"&gt;&lt;/a&gt; In the manufacturing sector, the Report fails to highlight contextual challenges associated with the use of AI. This includes the deployment of autonomous vehicles compared to the use of industrial robots.&lt;a name="_ftnref10"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the use of AI in retail, the Report while examining consumer data and its respective regulatory policies, identified the issues to be related to the definition, discrimination, data breaches, digital products and safety awareness and reporting standards.&lt;a name="_ftnref11"&gt;&lt;/a&gt; In this, the Report is limited in its understanding of what categories of data can lead to discrimination and restricts mechanisms for transparency and accountability to data breaches. The Report could have also been more forward looking in its position on security — including security by design and security by default. Furthermore, these issues were noted only in the context of the retail sector and ideally should have been discussed across all sectors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The challenges for utilizing AI for national security could have been examined beyond cost and capacity to include associated ethical and legal challenges such as the need for legal backing. The use of AI in national security demands clear accountability and oversight as it is a ground for legitimate state interference with fundamental rights such as privacy and freedom of expression. As such, there is a need for human rights impact assessments, as well as a need for such uses to be aligned with international human rights norms. Government initiatives that allow country wide surveillance and AI decisions based on such data should ideally be implemented only after a comprehensive privacy law is in place and India’s surveillance regime has been revisited.&lt;a name="_ftnref12"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recognizing the potential of AI for the benefit of the differently abled is one of the key takeaways from this section of the Report. Furthermore, it also brings in the need for AI inclusivity. AI in natural language generation and translation systems have the potential to help the large number of youth that are disabled or deprived.&lt;a name="_ftnref13"&gt;&lt;/a&gt; Therefore, AI could have a large positive impact through inclusive growth and empowerment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the Report examines each of the ten domains in an attempt to provide an insight into the role the government can play, there seems to be a lack of clarity in terms of the role that each department will and is playing with respect to AI. Even the section which lays down the relevant ministries for each of the ten domains failed to include key ministries and departments. For example, the Report does not identify the Ministry of Education, nor does it list the Ministry of Law for national security. The Report could have also identified government departments which would be responsible for regulation and standardization. This could include the Medical Council of India (healthcare), CII (manufacture and retail), RBI (Fintech) etc. The Report also does not recognize other developments around AI emerging out the government. For example, the Draft National Digital Communications Policy (published on May 1, 2018) seeks to empower the Department of Telecommunication to provide a roadmap for AI and robotics.&lt;a name="_ftnref14"&gt;&lt;/a&gt; Along similar lines, the Department of Defence Production has also created a task force earlier this year to study the use of AI to accelerate military technology and economic growth.&lt;a name="_ftnref15"&gt;&lt;/a&gt; The government should look at building a cohesive AI government body, or clearly delineating the role of each ministry, in order to ensure harmonization going forward.&lt;/p&gt;
&lt;h3&gt;Areas in need of Government Intervention&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Report also lists out the grand challenges where government intervention is required. This includes data collection and management and the need for widespread expertise contributing to research, innovation, and response. However, while highlighting the need for AI experts from diverse backgrounds, it fails to include experts from law and policy into the discussion.&lt;a name="_ftnref16"&gt;&lt;/a&gt; While identifying manufacturing, agriculture, healthcare and public utility to be places where government intervention is needed, the Report failed to examine national security beyond an important domain to India and as a sector where government intervention is needed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Participation in International Forums&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another relevant concern that the Report underscores is India’s scarce participation as researchers, AI developers and government engagement in global discussions around AI. The Report states that although efforts were being made by Indian universities to increase their presence in international AI conferences, they were lagging behind other nations. On the subject of participation by the government it recommends regular presence in International AI policy forums. Hence, emphasising the need for India’s active participation in global conversations around AI and international rulemaking.&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Key Enablers to AI&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Report while analysing the key enablers for AI deployment in India states that positive societal attitudes will be the driving force behind the proliferation of AI.&lt;a name="_ftnref17"&gt;&lt;/a&gt; Although relying on positive social attitudes alone will not help in increasing the trust on AI, steps such as making algorithms that are used by public bodies public, enacting a data protection law etc. will be important in enabling trust beyond highlighting success stories.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Data and Data Marketplaces&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the Report identifies data as a challenge where government intervention is needed, it also points to the Aadhaar ecosystem as an enabler. It states that Aadhaar will help in the proliferation of AI in three ways: one as a creator of jobs as related to the collection and digitization of data, two as a collector of reliable data, and three as a repository of Indian data. However, since the very constitutionality of Aadhaar is yet to be determined by the Supreme Court,&lt;a name="_ftnref18"&gt;&lt;/a&gt; the task force should have used caution in identifying Aadhaar as a definitive solution. Especially while making statements that the Aadhaar along with the SC judgement has created adequate frameworks to protect consumer data. Additionally, the Task Force should have recognized the various concerns that have been voiced about Aadhaar, particularly in the context of the case before the Supreme Court.&lt;a name="_ftnref19"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;This section also proposes the creation of a Digital Data Marketplace. A data marketplace needs to be framed carefully so as to not create a situation where privacy becomes a right available to only those who can afford it.&lt;/span&gt;&lt;a name="_ftnref20"&gt;&lt;/a&gt;&lt;span&gt; It is concerning that the discussion on data protection and privacy in the Report is limited to policies and guidelines for businesses and not centered around the individual.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;strong&gt;Innovation and Patents&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Report states that the Indian startups working in the field of AI must be encouraged, and industry collaborations and funding must be taken up as a policy measure. One of the ways in which this could be achieved is by encouraging innovations, and one of the ways to do so is by adding a commercial incentive to it, such as through IP rights. Although the Report calls for a stronger IP regime that protects and incentivises innovation, it remains ambiguous as to which aspect of IP rights — patents, trade secrets and copyrights — need significant changes.&lt;a name="_ftnref21"&gt;&lt;/a&gt; If the Report is specifically advocating for stronger patent rights in order to match those of China and US, then it shows that the the task force fails to understand the finer aspects of Indian patent law and the history behind India’s stance on patenting. This includes the fact that Indian patent law excludes algorithms from being patented. Indian patent law, by providing a higher threshold for patenting computer related inventions (CRIs), ensures that only truly innovative patents are granted.&lt;a name="_ftnref22"&gt;&lt;/a&gt; Given the controversies over CRIs that have dotted the Indian patent landscape&lt;a name="_ftnref23"&gt;&lt;/a&gt;, the task force would have done well to provide more clarity on the ‘how’ and ‘why’ of patenting in this sector, if that is their intent with this suggestion.&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Ethical AI framework&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Responsible AI&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In terms of establishing an ethical AI framework, the Task Force suggests measures such as making AI explainable, transparent, and auditable for biases. The Report addresses the fact that currently with the increase in human and AI interaction there is a need to have new standards set for the deployment of AI as well as industrial standards for robots. However, the Report does not go into details of how AI could cause further bias based on various identifiers such as gender and caste, as well as the myriad concerns around privacy and security. This is especially a concern given that the Report envisions widespread use of AI in all major sectors. In this way, the Report looks at data as both a challenge and an enabler, but fails to dedicate time towards explaining the various ethical considerations behind the collection and use of data in the context of privacy, security and surveillance as well as account for unintended consequences. In laying out the ethical considerations associated with AI, the report does not make a distinction between the use of AI by the public sector and private sector. As the government is responsible for ensuring the rights of citizens and holds more power than the citizenry, the public sector needs to be more accountable in their use of AI. This is especially so in cases where AI is proposed to be used for sovereign functions such as national security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Privacy and Data&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Report also recognises the significance of the implementation of the Aadhaar Act&lt;a name="_ftnref24"&gt;&lt;/a&gt;, the privacy judgement&lt;a name="_ftnref25"&gt;&lt;/a&gt; and the proposed data protection laws&lt;a name="_ftnref26"&gt;&lt;/a&gt;, on the development and use of AI for India. Yet, the Report does not seem to recognize the importance of a robust and multi-faceted privacy framework as it assumes that the Aadhaar Act and the Supreme Court Judgement on privacy and potential privacy law have already created a basis for safe and secure utilization and sharing of customer data.&lt;a name="_ftnref27"&gt;&lt;/a&gt; Although the Report has tried to be an expansive examination of various aspects of AI for India, it unfortunately has not looked in depth at the current issues and debates around AI privacy and ethics and makes policy recommendations without appearing to fully reflect on the implementation and potential impact of the same. Similar to the discussion paper by the Niti Aayog,&lt;a name="_ftnref28"&gt;&lt;/a&gt; this Report does not consider the emerging principles of data protection such as right to explanation and right to opt-out of automated processing, which directly relate to AI.&lt;a name="_ftnref29"&gt;&lt;/a&gt; Furthermore, there is a lack of discussion on issues such as data minimisation and purpose limitation which some big data and AI proponents argue against.&lt;a name="_ftnref30"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;strong&gt;Liability&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the question of liability, the Report only states that specific liability mechanisms need to be worked out for certain categories of machines. The Report does not address the questions of liability that should be applicable to all AI systems, and on whom the duty of care lies, not only in case of robots but also in the case of automated decision making etc. Thus, there is a need for further thinking on mechanisms for determining liability and how these could apply to different types of AI (deep learning models and other machine learning models) and AI systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;AI and Employment &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the topic of jobs and employment, the Report states that AI will create more jobs than it takes as a result of an increase in the number of companies and avenues created by AI technologies. Additionally, the Report provides examples of jobs where AI could replace the human (autonomous drivers, industrial robots etc,) but does not go as far as envisioning what jobs could be created directly from this replacement. Though the Report recognizes emerging forms of work such as crowdsourcing platforms like Mturk&lt;a name="_ftnref31"&gt;&lt;/a&gt;, it fails to examine the impact of such models of work on workers and traditional labour market structures and processes.&lt;a name="_ftnref32"&gt;&lt;/a&gt; Going forward, it will be important that the government and the private sector undertake the necessary steps to ensure that fair, protected, and fulfilling jobs are created simultaneously with the adoption of AI. This will include revisiting national and organizational skilling programmes, labor laws, social benefit schemes, relevant economic policies, and exploring best practices with respect to the adoption and integration of AI in work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Education and Re-skilling&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The task force emphasised the need for a change in the education curriculum as well as the need to reskill the labour force to ensure an AI ready future. This level of reskilling will be a massive effort, and a thorough review and audit of existing skilling programmes in India is needed before new skilling programmes are established and financed. The Report also clarifies that the statistics used were based on a study on the IT component of the industry, and that a similar study was required to analyse AI’s effect on the automation component.&lt;a name="_ftnref33"&gt;&lt;/a&gt; Going forward, there is the need for a comprehensive study of the labour intensive sectors and formal and informal sectors to develop evidence based policy responses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Policy Recommendations &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Task Force&lt;sub&gt;,&lt;/sub&gt; in its policy recommendations, notes that the successful adoption of AI in India will depend on three factors: people, process and technology. However, it does not explain these three factors any further.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;National Artificial Intelligence Mission&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most significant suggestion made in the Report is for the establishment of the National Artificial Intelligence Mission (N-AIM) — a centralised nodal agency for coordinating and facilitating research, collaboration and providing economic impetuous to AI startups.&lt;a name="_ftnref34"&gt;&lt;/a&gt; The mission with a budget allocation of Rs 1,200 crore over five years aims, among other things, to look at various ways to encourage AI research and deployment.&lt;a name="_ftnref35"&gt;&lt;/a&gt; Some of the suggestions include targeting and prototyping AI systems and setting up of a generic AI test bed. These suggestions seems to draw inspiration from other countries such as the US DARPA Challenge&lt;a name="_ftnref36"&gt;&lt;/a&gt; and Japan’s sandbox for self driving trucks.&lt;a name="_ftnref37"&gt;&lt;/a&gt; The establishment of N-AIM is a welcome step to encourage both AI research and development on a national scale. The availability of public funds will encourage more AI research and development.&lt;a name="_ftnref38"&gt;&lt;/a&gt;Additionally, government engagement in AI projects has thus far been fragmented&lt;a name="_ftnref39"&gt;&lt;/a&gt;and a centralised body will presumably bring about better coordination and harmonization. Some of the initiatives such as Capture the flag competition&lt;a name="_ftnref40"&gt;&lt;/a&gt; that seeks to centre around the provision for real datasets to catalyze innovation will need to be implemented with appropriate safeguards in place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Other recommendations&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are other suggestions that are problematic — particularly that of funding “an inter-disciplinary large data integration center in pilot mode to develop an autonomous AI Machine that can work on multiple data streams in real time and provide relevant information and predictions to public across all domains.”&lt;a name="_ftnref41"&gt;&lt;/a&gt; Before such a project is developed and implemented there are a number of factors where legal clarity is required; a few being: data collection and use, accuracy and quality of the AI system. There is also a need to ensure that bias and discrimination have been accounted for and fairness, responsibility and liability have been defined with consideration that this will be a government driven AI system. Additionally, such systems should be transparent by design and should include redress mechanisms for potential harms that may arise. This can be through the presence of a human in the loop, or the existence of a kill switch. These should be addressed through ethical principles, standards, and regulatory frameworks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The recommendations propose establishing operation standards for data storage and  privacy, communication standards for autonomous systems, and standards to allow for interoperability between AI based systems. A significant lacuna in this list is the development of safety, accuracy, and quality standards for AI algorithms and systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, although the proposed public private partnership model for research and startups is a good idea, this initiative should be undertaken only after questions such as the implications of liability, ownership of IP and data, and the exclusion of critical sectors are thought through.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, the suggestion to ‘fund a national level survey on identification of cluster of clean annotated data necessary for building effective AI systems’&lt;a name="_ftnref42"&gt;&lt;/a&gt; needs to recognize the existing initiatives around open data or use this as a starting place. The Report does not clarify if this survey would involve identifying data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The inconspicuous release of the Report as well as the lack of a call for public comments&lt;a name="_ftnref43"&gt;&lt;/a&gt; results in the fact that the Report does not incorporate or reflect on the sentiments of the public or draw upon the expertise that exists in India on the topic or policies around emerging technologies, which will have a pervasive and wide effect on society. The need for multi stakeholder engagement and input cannot be understated. Nonetheless, the Report of the Task Force is a welcome step towards understanding the movement towards an definitive AI policy. The task force has attempted answering the three policy questions keeping people, process and technology in mind. However, it could have provided greater details about these indices. The Report, which is meant for a wider audience, would have done well to provide greater detail, while also providing clarity on technical terms. On a definitional plane, a list of technologies that the task force perceived as AI for this Report, could have also helped keep it grounded on possible and plausible 5 year recommendations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Compared to the recent Niti Aayog Discussion Paper&lt;/span&gt;&lt;a name="_ftnref44"&gt;&lt;/a&gt;&lt;span&gt;, this Report misses out on a detailed explanation on AI and ethics, however, it does spend some considerable amount of time on education and the use of AI for the differently abled. Additionally, the Report’s statement on the democratization of development and equal access as well as assigning ownership and framing transparent rules for usage of the infrastructure is a positive step towards making AI inclusive. Overall, the Report is a progressive step towards laying down India’s path forward in the field of Artificial Intelligence. The emphasis on India’s involvement in International rulemaking gives India an opportunity to be a leader of best practice in international forums by adopting forward looking and human rights respecting practices. Whether India will also become a strong contender in the AI race, with policies favouring the development of a socio-economically beneficial, and ethical-AI backed industries and services is yet to be seen.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn1"&gt;&lt;/a&gt;&lt;span&gt; The Task Force consists of 18 members in total. Of these, 11 members are from the field of AI technology both research and industry, three from the civil services, one from healthcare research, one with and Intellectual property law background, and two from a finance background. The specializations of the members are not limited to one area as the members have experience or education in various areas relevant to AI. &lt;/span&gt;&lt;a href="https://www.aitf.org.in/"&gt;https://www.aitf.org.in//&lt;/a&gt;&lt;span&gt; There is a notable lack of members from Civil Society. It may also be noted that only 2 of the 18 members are women&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn2"&gt;&lt;/a&gt; The Report on the Artificial Intelligence Task Force, Pg. 1,&lt;span&gt;http://dipp.nic.in/sites/default/files/Report_of_Task_Force_on_ArtificialIntelligence_20March2018_2.pdf&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn3"&gt;&lt;/a&gt; ibid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn4"&gt;&lt;/a&gt; The Artificial Intelligence Task Force https://www.aitf.org.in/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn5"&gt;&lt;/a&gt; The Report on the Artificial Intelligence Task Force, Pg. 8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn6"&gt;&lt;/a&gt; The Report on the Artificial Intelligence Task Force, Pg. 9,10.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn7"&gt;&lt;/a&gt; The Report on the Artificial Intelligence Task Force, Pg. 9&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn8"&gt;&lt;/a&gt; ibid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn9"&gt;&lt;/a&gt; Artificial Intelligence in the Healthcare Industry in India https://cis-india.org/internet-governance/files/ai-and-healtchare-report&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn10"&gt;&lt;/a&gt;Artificial Intelligence in the Manufacturing and Services Sector https://cis-india.org/internet-governance/files/AIManufacturingandServices_Report   _02.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn11"&gt;&lt;/a&gt; The Report on the Artificial Intelligence Task Force, Pg. 21.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn12"&gt;&lt;/a&gt; Submission to the Committee of Experts on a Data Protection Framework for India, Centre for Internet and Society https://cis-india.org/internet-governance/files/data-protection-submission&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn13"&gt;&lt;/a&gt; The Report on the Artificial Intelligence Task Force, Pg. 22&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn14"&gt;&lt;/a&gt; Draft National Digital Communications Policy-2018, http://www.dot.gov.in/relatedlinks/draft-national-digital-communications-policy-2018&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn15"&gt;&lt;/a&gt; Task force set up to study AI application in military,https://indianexpress.com/article/technology/tech-news-technology/task-force-set-up-to-study-ai-application-in-military-5049568/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn16"&gt;&lt;/a&gt;It is not just technical experts  that are needed, ethical, technical, and legal experts as well as domain experts need to be part of the decision making process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn17"&gt;&lt;/a&gt; The Report on the Artificial Intelligence Task Force, Pg. 31&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn18"&gt;&lt;/a&gt;Constitutional validity of Aadhaar: the arguments in Supreme Court so far, http://www.thehindu.com/news/national/constitutional-validity-of-aadhaar-the-arguments-in-supreme-court-so-far/article22752084.ece&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn19"&gt;&lt;/a&gt; ibid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn20"&gt;&lt;/a&gt; CIS Submission to TRAI Consultation on Free Data http://trai.gov.in/Comments_FreeData/Companies_n_Organizations/Center_For_Internet_and_Society.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn21"&gt;&lt;/a&gt; The Report on the Artificial Intelligence Task Force, Pg. 30&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn22"&gt;&lt;/a&gt; Section 3(k) of the patent act describes that a mere mathematical or business method or a computer programme or algorithm cannot be patented.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn23"&gt;&lt;/a&gt;Patent Office Reboots CRI Guidelines Yet Again: Removes “novel hardware” Requirement&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;https://spicyip.com/2017/07/patent-office-reboots-cri-guidelines-yet-again-removes-novel-hardware-requirement.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn24"&gt;&lt;/a&gt; The Report on the Artificial Intelligence Task Force, Pg. 37&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn25"&gt;&lt;/a&gt;The Report on the Artificial Intelligence Task Force, Pg. 7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn26"&gt;&lt;/a&gt; ibid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn27"&gt;&lt;/a&gt; The Report on the Artificial Intelligence Task Force, Pg. 8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn28"&gt;&lt;/a&gt; National Strategy for Artificial Intelligence: &lt;a href="http://niti.gov.in/writereaddata/files/document_publication/NationalStrategy-for-AI-Discussion-Paper.pdf"&gt;http://niti.gov.in/writereaddata/files/document_publication/NationalStrategy-for-AI-Discussion-Paper.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn29"&gt;&lt;/a&gt; Meaningful information and the right to explanation,Andrew D Selbst  Julia Powles, International Data Privacy Law, Volume 7, Issue 4, 1 November 2017, Pages 233–242&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn30"&gt;&lt;/a&gt; The Principle of Purpose Limitation and Big Data, https://www.researchgate.net/publication/319467399_The_Principle_of_Purpose_Limitation_and_Big_Data&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn31"&gt;&lt;/a&gt; M-Turk https://www.mturk.com/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn32"&gt;&lt;/a&gt; For example a lesser threshold of minimum wages, no job secuirity etc, https://blogs.scientificamerican.com/guilty-planet/httpblogsscientificamericancomguilty-planet20110707the-pros-cons-of-amazon-mechanical-turk-for-scientific-surveys/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn33"&gt;&lt;/a&gt; The Report on the Artificial Intelligence Task Force, Pg. 41&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn34"&gt;&lt;/a&gt; Report of Artificial Intelligence Task Force Pg, 46, 47&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn35"&gt;&lt;/a&gt; ibid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn36"&gt;&lt;/a&gt;The DARPAChallenge https://www.darpa.mil/program/darpa-robotics-challenge&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn37"&gt;&lt;/a&gt;Japan may set regulatory sandboxes to test drones and self driving vehicles http://techwireasia.com/2017/10/japan-may-set-regulatory-sandboxes-test-drones-self-driving-vehicles/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn38"&gt;&lt;/a&gt; Mariana Mazzucato in her 2013 book The Entrepreneurial State, argued that it was the government that drives technological innovation. In her book she stated that high-risk discovery and development were made possible by government spending, which the private enterprises capitalised once the difficult work was done.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn39"&gt;&lt;/a&gt;&lt;a href="https://tech.economictimes.indiatimes.com/news/technology/govt-of-karnataka-launches-centre-of-excellence-for-data-science-and-artificial-intelligence/61689977"&gt;https://tech.economictimes.indiatimes.com/news/technology/govt-of-karnataka-launches-centre-of-excellence-for-data-science-and-artificial-intelligence/61689977&lt;/a&gt;,https://analyticsindiamag.com/amaravati-world-centre-for-ai-data/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn40"&gt;&lt;/a&gt; The Report on the Artificial Intelligence Task Force, Pg. 47&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn41"&gt;&lt;/a&gt; Report of Artificial Intelligence Task Force Pg. 49&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn42"&gt;&lt;/a&gt; The Report on the Artificial Intelligence Task Force, Pg. 47&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn43"&gt;&lt;/a&gt; The AI task force website has a provision for public comments although it is only for the vision and mission and the domains mentioned in the website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn44"&gt;&lt;/a&gt;National Strategy for Artificial Intelligence: &lt;a href="http://niti.gov.in/writereaddata/files/document_publication/NationalStrategy-for-AI-Discussion-Paper.pdf"&gt;http://niti.gov.in/writereaddata/files/document_publication/NationalStrategy-for-AI-Discussion-Paper.pdf&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-ai-task-force-report-the-first-steps-towards-indias-ai-framework'&gt;https://cis-india.org/internet-governance/blog/the-ai-task-force-report-the-first-steps-towards-indias-ai-framework&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok, Shweta Mohandas and Swaraj Paul Barooah</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-06-27T14:32:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame">
    <title>The Age of Shame</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame</link>
    <description>
        &lt;b&gt;The ability to capture private images is breeding a dangerous form of digital shaming. Within the online space, where wonderments often run rife, and conspiracy theories travel at the speed of light, there are many dark recesses where netizens half-jokingly, self-referentially, in a spirit of part-truth, part-exaggeration, often wonder on what the real reason is for the internet to exist.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dr. Nishant Shah's column was &lt;a class="external-link" href="http://indianexpress.com/article/opinion/columns/the-age-of-shame/99/"&gt;published in the Indian Express&lt;/a&gt; on March 30, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Within the online space, where wonderments often run rife, and conspiracy theories travel at the speed of light, there are many dark recesses where netizens half-jokingly, self-referentially, in a spirit of part-truth, part-exaggeration, often wonder on what the real reason is for the internet to exist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One suggestion, and probably the most persuasive one, drawing from the Broadway musical Avenue Q, is that the internet was made for porn. Positing a competing argument is a clowder of cat lovers, who insist that the internet was made for cats. Or, at least, it is definitely made of cats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the first internet memes like LOL Cats (and then subsequently Grumpy Cat, Ceiling Cat and Hipster Kitty), which had pictures of cats used for strong social, cultural and political commentary, to Caturday — a practice where users on the Web’s largest unmoderated discussion board, 4Chan, post pictures of cats every Saturday — cats are everywhere.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I want to add to this list and suggest that the internet was meant for “shame”. With the explosion of the interactive Web, more people getting access to mobile computing devices, and more websites inviting users to write reviews, leak pictures, expose videos and reveal more personal and private information online, there seems to be no doubt that we live in the age of digital shaming.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The aesthetic, also embedded in peer-to-peer platforms like chatroulete, or snapchat, where people often engage in sexting, is also becoming common in popular media. The ability to spy, to capture private images and videos, and expose the people who violate some imagined moral code has dangerous implications for the future of the Web and our own private lives. And as more of it goes unpunished and gets naturalised in our everyday digital practices, it is time to realise that the titillation it offers through scandal is far outweighed by the growing stress and grief it causes to victims. While there are some values to public shaming that ask for more transparency and accountability, we need to reflect on how it is creating societies of shame.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It sometimes emerges as an attempt to shame governments, private institutions, places of consumption, for compromise of the rights of the users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anything, from denial of service and corruption in government offices to bad food and substandard goods in restaurants and malls, is now reported in an attempt to shame the people responsible for it. This kind of “citizen journalism” allows for individual voices and experiences to be heard and documented, and the people in question are forced to be accountable for their jobs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From fascinating websites like IPaidABribe.com to restaurant review sites like Zomato, we have seen an interesting phenomenon of “naming and shaming” that gives voice to individual discontent and anger. And so commonplace has this become, that most managers of different services and goods track, respond and mitigate the situation, often offering apologies and freebies to make up for that one bad experience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most big organisations have Twitter handles that function in a similar way, addressing grievances of users in real time, and helping to deliver better services and products. It is a new era of granular accountability that ensures that individual acts of discrimination, neglect or just disservice get reported and have direct impact on those responsible for it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other end of the spectrum of this call for transparent and accountable structures, is the phenomenon of shaming and cyber bullying that is also increasing, especially with digital natives who spend more time online. On social networking sites, it has become almost passé, for personal and sensitive information to be leaked in order to shame and expose a person’s weaknesses and vulnerabilities. Especially for young teens who might be in a disadvantaged position — for reasons of sexual orientation, location, practices or interests — the shaming through exposing their private information often creates extremely traumatic conditions, even leading people to take their lives.&lt;br /&gt;Shaming takes up particularly dire forms on websites and platforms that are designed to leak this kind of information. Hunter Moore, who has recently earned the title of being the most hated man on the internet, was the founder of a revenge-porn website, which invited male users to reveal sexual and embarrassing pictures of their former girlfriends and even spouses, to reveal them in compromising positions and shame them for being “sluts”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moore’s website has been shut down now and he is facing multiple charges of felony in the US, but that one site was just the tip of the iceberg. Slut shaming and trying to humiliate women has become a strong underground practice on the dark web. Hidden by anonymity and the security that the Web can sometimes offer, people betray the trust of their friends and lovers and expose them to be punished by voyeuristic audiences.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame'&gt;https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-04T04:05:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things">
    <title>The Aadhaar of all things</title>
    <link>https://cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things</link>
    <description>
        &lt;b&gt;From a severely critical stand against Aadhaar in 2014, the Modi-led BJP in power has made a sharp U-turn to bulldoze its way into having every Indian scanned, tagged and labelled. A timeline of the country’s chequered date with the unique identification project.&lt;/b&gt;
        &lt;p&gt;The article by Shriya Mohan was published in the &lt;a class="external-link" href="http://www.thehindubusinessline.com/blink/cover/the-aadhaar-of-all-things/article9609603.ece"&gt;Hindu Businessline &lt;/a&gt;on March 31, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;You’ve probably read the WhatsApp joke about a post-Aadhaar scenario in  2020 India. A man orders pizza over phone. He is asked for his Aadhaar  number first. He then orders a family-size seafood pizza, only to be  reminded by the attendant about his high blood pressure and cholesterol  levels (thanks to his Aadhaar history visible to everybody “on the  system”) and is advised to order the low-fat Hokkien Mee pizza instead,  based on his recent search history on Hokkien cuisine. As if this isn’t  creepy enough, the pizza guy refuses a card payment, citing the man’s  maxed-out credit cards, advises against ATM withdrawal owing to his  massive overdraft and even decides to hold off the free cola offer given  his dire health situation. When the man turns livid, he is told to mind  his language, given that in 2007 he was already imprisoned for verbally  abusing a policeman!&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;2020 is two and a half years away, and the WhatsApp scenario appears less incredulous by the day.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;By the government’s latest estimate, 112,01,12,468 Aadhaar cards have  been issued since January 2009, when the Unique Identification Authority  of India (UIDAI) was set up under the Planning Commission. So if you  are an adult Indian resident without an Aadhaar card, you are in a two  per cent minority (98 per cent adults are covered).&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Last week, Finance Minister Arun Jaitley said the 12-digit number would  be the single monolith identity for all Indians in the coming years,  replacing every other identity card. The government is serious because  each week a new scheme is added to the three dozen schemes in which  Aadhaar has been made mandatory. All the 84 schemes under the direct  subsidy benefit transfer programme are expected to follow suit.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Here are just a few instances in which you should be ready to whip out  your Aadhaar card — a free midday meal at a government school, access to  Sarv Shiksha Abhiyan, LPG subsidy and foodgrains under the public  distribution system, six scholarship schemes for students with  disabilities, getting your EPF pensions, booking a train ticket online,  getting a backward caste quota or benefit, and, according to the most  recent directive in the Finance Bill, filing your tax returns.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Why did a dispensation so critical of Aadhaar in 2014 make a sharp  U-turn to bulldoze its way into having every single Indian citizen  scanned, tagged and labelled?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The earliest felt need for an identification project can be traced to  the Kargil Review Committee, instituted by the Vajpayee Government in  1999, in the wake of the Indo-Pak war. The Krishnaswamy Subrahmanyam-led  panel had recommended a citizenship database for the identification of  legitimate Indian citizens living in border areas.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;As outlined in a Scroll article, this quickly expanded to include all  Indians under the Multipurpose National Identity Card project, which was  pilot tested in a few villages. The Citizenship Act was also amended to  give a legislative backing to the scheme, which built on the Bharatiya  Janata Party’s general stance against illegal immigrants.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The search for identity&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Citizenship Act was amended in 2004 by the incumbent Congress  government to make way for the National Population Register (NPR), a  database of the identities of all Indian residents, maintained by the  Registrar General and Census Commissioner of India.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Eventually, in 2009, Aadhaar, or UIDAI, surfaced as a 12-digit  identification number that served as proof of identity and address —  meaning, it applies to all residents whether they are citizens or not,  unlike with the NPR. Aadhaar, which means ‘basis’ in Hindi, is intended  to be an all-encompassing substratum of identities that can provide  “instant access to services like banking, mobile phone connections and  other government and non-government services”. The United Progressive  Alliance government managed to link it to its Direct Benefit Transfer  (DBT) system for subsidies provided to targeted groups.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;As the main Opposition party, the BJP had felt that the Aadhaar number  ought to have been given only to Indian citizens, and not all residents,  which, in its view, would include millions of illegal immigrants.&lt;/p&gt;
&lt;p class="_hoverrDone body" style="text-align: justify; "&gt;Nandan Nilekani, the former CEO of IT giant Infosys, was appointed UIDAI  chairman in July 2009. The first Aadhaar number was issued in September  2010, and then the pace accelerated: 100 million by November 2011, 200  million by February 2012 and 500 million by end of 2013. “We felt speed  was strategic. Doing and scaling things quickly was critical. If you  move very quickly it doesn’t give opposition the time to consolidate,”  Nilekani told Forbes India in a 2013 interview.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Here’s the part most of us forget: The largest opposition that Nilekani was referring to at that time was the BJP.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“The people who thought of themselves as having given birth to IT in  this country refused to listen to a common man like me. Even the SC has  demanded answers,” Narendra Modi, then Gujarat chief minister, had said  and alleged that the Aadhaar programme was a bundle of lies to loot the  country’s treasury.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;As the BJP’s prime ministerial candidate for the 2014 Lok Sabha  elections, days ahead of delivering the party’s biggest-ever victory, he  had tweeted: “On Aadhaar, neither the Team that I met nor PM could  answer my Qs on security threat it can pose. There is no vision, only  political gimmick.” Recently, when Aadhaar enrolments had crossed the  billion mark, this tweet was dug out prominently.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The U-turn&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;So, what changed? How did the Aadhaar’s primary opposition become it’s key crusader?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There were two meetings that supposedly changed the destiny of the  Aadhaar project. In the first week of June 2014, as Nilekani was  vacating his government-allotted Lutyen’s bungalow as UIDAI chief, he  met Modi and Jaitley and persuaded the new regime to persist with  Aadhaar. The more important meeting was with Vijay Madan, the UIDAI  director general and mission director. According to a Governance Now  article, when the UID team spoke of the potential savings from plugging  subsidy leakages, and weeding out “ghost beneficiaries”, Modi asked them  to give a precise estimate. The figure was “up to ₹50,000 crore a year”  or a good 9.4 per cent of India’s ₹5,31,177-crore fiscal deficit.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Modi in his keenness to showcase the arrival of “acche din” immediately  sought a 100-crore enrolment target at the ‘earliest’, putting paid to  speculations that the new government would shelve the UIDAI project. A  funding of ₹2,039.64 crore was formalised in the 2014-2015 Budget  presented a week later, to create the infrastructure to enrol 30 crore  people to add to the 70 crore already enrolled. The UIDAI targeted the  1-billion mark by the end of that fiscal.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Money bill to beat legal hurdles&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It was in November 2012 that the SC admitted a PIL filed by retired  Karnataka High Court judge KS Puttaswamy and advocate Parvesh Khanna,  questioning the government’s decision to issue Aadhaar even as the  National Identification Authority of India Bill 2010 was pending before  the Rajya Sabha since December 3, 2010. They argued that there was no  legislative backing for obtaining personal information. Also, the  proposed law was rejected by the Parliamentary Standing Committee on  Finance.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The PIL argued that linking the Aadhaar number with food security, LPG  subsidy, the Employees’ Provident Fund and other direct benefit  transfers made the enrolment mandatory, thereby falsifying the  government’s claim that it was voluntary. Several other PILs too voiced  similar privacy concerns.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Currently, there are two legal strictures governing the validity of  Aadhaar: the apex court order of October 15, 2015, limiting the card’s  voluntary use to six schemes (PDS, MGNREGA, LPG, NEPS and social  assistance programmes) and prohibiting the government from making it  mandatory for receiving any benefits or services; and the Aadhaar  (Targeted Delivery of Financial and Other Subsidies, Benefits and  Services) Act, 2016, which is under challenge today. Both strictures  have distinct operational status, but petitioners argue that recent  government directives making Aadhaar mandatory are leading them to  wonder whether the SC’s interim order is overshadowed by the Aadhaar Act  or if the government is defying the court.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;On March 3, 2016, in a surprise move, to put all dissent to rest, the  Aadhaar Act was introduced as a Money Bill in Parliament to give it  legislative backing. Things moved pretty fast thereon. On March 11, the  Aadhaar Act 2016 was passed in the Lok Sabha. On March 26, the Act was  notified. Accusing the BJP-led NDA government of showing “utter  contempt” for the Rajya Sabha by taking the Money Bill route, senior  Congress leader Jairam Ramesh challenged it in the Supreme Court in  April. He likened the use of the Money Bill, which was passed overruling  amendments moved in the Rajya Sabha, to “knocking a nail in the coffin  of the Upper House”.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The government’s move took many, including Aadhaar advocates, by  surprise. “We need to separate Aadhaar as identity from its specific  functionality for which it’s used,” says Praveen Chakravarty, a senior  fellow at the IDFC institute and a former member of Nilekani’s core  team. He believes that just as a voter ID alone isn’t enough to vote,  seeing the ownership of an Aadhaar card as key for any transaction is  “fear-mongering”. Its use will still involve a process of checks and  balances.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;But can’t thumb prints be replicated with Fevicol?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Sure, there could be failures, as there are with any system. But this  is a far more foolproof method than any we’ve had before.  Internationally also, biometric is to authenticate a higher level of  security.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The argument for privacy&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Aadhaar has the potential to improve welfare service delivery. But it  has to be achieved in an inclusive manner befitting a truly liberal  society and not through coercion,” says Chakravarty.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;His only misgiving is with the use of the Money Bill to introduce the  Aadhaar, without any right to privacy. “It should have gone through the  process of debate in Parliament. Then it wouldn’t have been passed  without a strong right to privacy safeguard,” he says, pointing that  even a junior UIDAI officer can access the data of anybody he/she  chooses.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Aadhaar inverts the idea of transparency. It makes people transparent  but the State opaque,” says legal expert Usha Ramanathan, a legal expert  and anti-Aadhaar crusader.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The use of Aadhar as verification at every instance can help piece  together very detailed information about citizens. These include banking  transactions, online purchases, travel itineraries, mobile phone usage,  location history and practically anything that can be electronically  recorded and verified with an Aadhaar.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In February this year, the UIDAI filed a police case against Axis Bank  and others for alleged unauthorised authentication and impersonation  attempts by illegally storing Aadhaar biometrics.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The latest outcry over breached privacy involved a screenshot of  cricketer Mahendra Singh Dhoni’s personal details that went viral on  Twitter. The UIDAI blacklisted the agency that revealed Dhoni’s Aadhaar  details after his wife complained to the IT Minister. A recent Scroll  report shows the UIDAI received 1,390 similar complaints but took no  action.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There are legitimate fears such an information database might eventually  be misused, for instance in racial profiling or revealing voting  preferences.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In January this year, Hyderabad-based ECIL developed a biometric-enabled  mobile terminal for instant authentication of a voter “to prevent  rigging of votes”. Till August 2015, the Election Commission was working  on seeding Aadhaar data with that of voter ID card, in an attempt to  weed out fake voters. However, the poll panel stopped this exercise  after the SC ruled that Aadhaar be made compulsory only for PDS and LPG  distribution.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;a href="http://www.thehindubusinessline.com/blink/cover/nandan-nilekani-demonising-of-aadhaar-is-irresponsible/article9608232.ece" target="_blank"&gt;Nilekani, in an interview to BLink&lt;/a&gt;,  insisted that the Aadhaar has more privacy regulations than any other  service in the world. He also pointed out that all election commission  data is already online, and anyone can look up any voter’s name, date of  birth, gender and address.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Additionally, social media profiles too are shared publicly of our own volition.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Concurring with this view, Chakravarty says, “It is surprising that  we’re perfectly okay with giving all our life information to a  32-year-old named Mark Zuckerberg. However, this is voluntary. Whether  we fully know consequences or not is another matter altogether.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;With the Finance Bill requiring all PAN cards to be linked to Aadhaar,  there is added concern over privacy. Sunil Abraham, founder of the  Centre for Internet and Society, says Aadhaar runs the risk of being  used fraudulently. “If I want to get you in trouble, I can make a large  purchase of gold against your Aadhaar number, which is linked to your  PAN,” he explains.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;He advocates for a system where different government departments don’t  store Aadhaar numbers in their databases but instead use a token issued  by UIADI kiosks. This would prevent proliferation of the number.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Technical glitches&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In February this year, Modi claimed in the Lok Sabha that plugging  leakages through Aadhaar had saved the government ₹14,000 crore. And  that nearly four crore fake ration cards have been seized till date.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;One method of establishing a fake ration card is if the owner has not  availed himself of his ration. Ever since Aadhaar’s biometric  identification has been linked to point-of-sale (POS) machines at ration  shops, residents have had to queue up with a prayer on their lips. A  lot could go wrong — the biometric might not recognise them or, worse,  there could be a network failure, forcing everyone to return home  empty-handed. In both instances, while ration shop owners should ideally  mark such transactions under ‘Transactions with “N” response from  Aadhaar’, they invariably mark them under “Household yet to take  ration”, implying that the beneficiary has chosen not to take home her  share.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The February 2017 data for 22 ration shops across Delhi, accessed on the  Department of Food &amp;amp; Supplies website, shows that none have a  single beneficiary marked under “N”. At a Delhi Cantonment outlet, of  the 1,038 registered beneficiaries only 168 have been marked “Y”, or  ‘Yes’, showing they have taken their rations. Another 871 have been  marked “Household yet to take ration” and none have been marked ‘N’ to  indicate glitches in the Aadhaar authentication.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;As Amrita Johri of citizens’ action group Satark Nagrik Sangathan  explains, “Aadhaar relies on internet and electricity. This might seem  like a problem only of rural areas. But we don’t have to go far. In  South Delhi’s East Mehraam Nagar, there is a ration shop with no mobile  signal and no network. Officials said we have to show that Aadhaar is a  success, so the shop’s POS machine was finally hung on a jamun tree to  get it to work.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;She questions the government’s reluctance to acknowledge the many instances of failure in the project.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Frighteningly, three consecutive failed attempts could lead to the card  being placed in an abeyance list and possibly invalidated.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Top performers and laggards&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Delhi is rated one of the better performing States/union territories,  while Rajasthan has one of the worst records with the maximum number of  biometric and network failures.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;According to the government’s 2017 monthly estimates, 27 per cent of the  residents whose Aadhaar cards have been seeded to the PDS were denied  rations owing to biometric or network failure. This figure would be  higher if the unseeded cards are also taken into account.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Nikhil Dey, founder of Rajasthan’s Mazdoor Kisan Shakti Sangathan (MKSS)  says his organisation is fighting with its back against a wall.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Nearly 73 lakh households get their monthly rations in this State,  where a little over a crore households are eligible to receive them.  We’re not even talking about exclusions here,” says Dey. Besides network  failure, there are many instances of the old and sick who are unable to  visit the shop to physically verify themselves.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Back-up options such as OTP (one-time password) or facial recognition  only work in theory,” says Dey. He alleges that shop owners often fudge  the OTP system by punching in their own numbers and stealing the quotas  of genuine beneficiaries.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;He too believes that several names have been struck off as dead to  project that the Aadhaar has weeded out a high number of fake social  security pension ers.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Nilekani applauds Andhra Pradesh for its progress in the Aadhaar project  by investing in infrastructure to eliminate technical glitches. J  Satyanarayana, the UIDAI’s part-time chairperson, told BLink in an email  interview that Aadhaar has led to transparency and efficiency in nearly  all government schemes in AP.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;During March 2017, 42.29 lakh (93.02 per cent) pensioners received their  payment through Aadhaar-based biometric authentication, he says, adding  that real-time monitoring systems are in place.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“The entire PDS (rations) is linked to Aadhaar,” he says. As many as  1.21 crore (87.39 per cent) card holders collected their ration this  month, and 95.94 lakh received wages (totalling ₹5,283 crore under  MNREGA through Aadhaar-enabled systems, he informs.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Neighbouring Telangana too is known for its 99 per cent Aadhaar  enrollment, leading to an impressive 80 per cent of its population  accessing the PDS.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;BP Acharya, special chief secretary in Telangana’s planning department  says, “Aadhaar’s use can perhaps be most seen in Telangana’s speedy  clearances, investment promotion, creating licences and clearances for  shops and establishments.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Telangana took the Aadhaar database project one step further through its  Citizen 360 programme. In August 2014, months after the State was newly  formed, it conducted one of the largest household surveys in a single  day, covering one crore households. This data was integrated with the  Aadhaar database and now links different benefits on the same platform.  Now the Aadhaar identity is linked to other details such as the holder’s  driving licence and even crime record.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The UIDAI holds out AP and Telangana as shining examples of Aadhaar’s  efficiency when backed by the right network and infrastructure. But for  the lakhs of biometric factory rejects who are denied their rights,  Aadhaar can only mean a mass experiment gone horribly wrong.&lt;/p&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="body"&gt;&lt;b&gt;&lt;i&gt;Aadhaar Timeline&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2006&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The ministry of communications and information technology approves the  ‘Unique ID for Below Poverty Line (BPL) families’ project under the  chairmanship of Arvind Virmani, then principal advisor, Planning  Commission&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2008&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Empowered group of ministers formed by former Prime Minister Manmohan  Singh decides to collate two schemes — the National Population Register  under the Citizenship Act, 1955 and the UID project — to conceive  Aadhaar.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2009&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Planning Commission issues a notification to constitute the Unique Identification Authority of India (UIDAI).&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Government appoints Infosys co-founder Nandan Nilekani as the first  chairman of UIDAI, with the rank and status of a cabinet minister.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2012&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Former Karnataka high court judge justice K Puttaswamy files a public  interest litigation before the Supreme Court (SC) declaring that Aadhaar  violates an individual’s right to privacy and that the scheme lacks  legislative backing.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2014&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In an interim order, the SC restrains the UIDAI from transferring  biometric information with an Aadhaar number to any other agency without  the individual’s consent in writing.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2015&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Three-judge bench of the apex court rules the unique identity number is  not mandatory to avail of benefits from government programmes,  restricting the use of Aadhaar to beneficiaries of the public  distribution system and subsidies on cooking gas and kerosene, and  refers the question on privacy to a larger constitution bench.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Centre moves SC seeking a review and modification of the August 11  interim order. A five-judge constitution bench modifies the same and  extends the use of Aadhaar to Mahatma Gandhi National Rural Employment  Guarantee Scheme, Jan Dhan Yojana, pensions and the Employees’ Provident  Fund scheme.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2016&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Finance minister Arun Jaitley announces in the budget speech that the  government will offer statutory backing for Aadhaar. The Lok Sabha  passes the Aadhaar (Targeted Delivery of Financial and Other Subsidies,  Benefits and Services) Bill, 2016 as a Money Bill, rejecting Rajya Sabha  recommendations.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2017&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aadhaar is made mandatory for three dozen schemes with 84 more expected  under direct benefit transfers, including midday meal scheme and  universal education.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;SC again rules that Aadhaar cannot be made mandatory for welfare schemes.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things'&gt;https://cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-03T15:46:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-aadhaar-case">
    <title>The Aadhaar Case</title>
    <link>https://cis-india.org/internet-governance/blog/the-aadhaar-case</link>
    <description>
        &lt;b&gt;In 2012 a writ petition was filed by Justice K.S. Puttaswamy in the Supreme Court of India challenging the policy of the government in making an Aadhaar card for every person in India and its later plans to link various government benefit schemes to the same.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Over time a number of other cases have been filed in the Supreme Court challenging the Aadhaar mechanism and/or its procedure most of which have now been 	linked to the main petition filed by Justice Puttaswamy.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; This means that the Supreme Court now hears all 	these cases together (i.e. at the same time) since they throw up similar questions and involve the same or similar issues. The court while hearing the case 	made an interim order on September 23, 2013 whereby it ordered that no person should suffer on account of not having an Aadhaar card and that Aadhaar cards 	should not be issued to any illegal immigrants. The relevant extract from the Order of the court is reproduced below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"No person should suffer for not getting the Aadhaar card in spite of the fact that some authority had issued a circular making it mandatory and when any 	person applies to get the Aadhaar card voluntarily, it may be checked whether that person is entitled for it under the law and it should not be given to any 	illegal immigrant."&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It must be noted that the above order was only an interim measure taken by the Supreme Court till the time it finally decided all the issues involved in 	the case, which is still pending in the Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In November 2013 during one of the hearings of the matter, the Supreme Court came to the conclusion that it was an important enough matter for all the states and union territories to be impleaded as parties to the case and passed an order to this effect.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; This was probably because the Aadhaar cards will be issued in the entire country and this is a national issue and therefore it is possible that the court 	thought that if any of the states have any concerns regarding the issue they should have the opportunity to present their case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In another petition filed by the Unique Identification Authority of India (UIDAI), the Supreme Court on March 24, 2014 reiterated its earlier order and held that no 	person shall be deprived of any service just because such person lacked an aadhaar number if he/she was otherwise eligible for the service. A direction was 	issued to all government authorities and departments to modify their forms/circulars, etc., so as to not compulsorily require an aadhaar number. In the same 	order the Supreme Court also restrained the UIDAI from transferring any biometric data to any agency without the consent of the person in writing as an 	interim measure.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; After passing these orders the Supreme Court linked this case as well to the petition 	filed by Justice Puttaswamy on which final arguments were being heard in February 2014 which so far do not seem to have concluded.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Note&lt;/b&gt; : Please note that the case is still being heard by the Supreme Court and the orders given so far and explained in this blog are all interim measures till 	the case is finally disposed off. The status of the cases can be seen on the following link:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://courtnic.nic.in/supremecourt/casestatus_new/caseno_new_alt.asp"&gt;http://courtnic.nic.in/supremecourt/casestatus_new/caseno_new_alt.asp&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The names and number of the cases that have been covered in this blog are given below:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;W.P(C) No. 439 of 2012 titled &lt;i&gt;S. Raju &lt;/i&gt;v. &lt;i&gt;Govt. of India and Others &lt;/i&gt; pending before the D.B. of the High Court of Judicature at Madras.&lt;/li&gt;
&lt;li&gt;PIL No. 10 of 2012 titled &lt;i&gt;Vickram Crishna and Others&lt;/i&gt; v. &lt;i&gt;UIDAI and Others&lt;/i&gt; pending before the High Court of Judicature at Bombay.&lt;/li&gt;
&lt;li&gt;W.P. No. 833 of 2013 titled &lt;i&gt;Aruna Roy &amp;amp; Anr&lt;/i&gt; v. &lt;i&gt;Union of India &amp;amp; Ors&lt;/i&gt;.&lt;/li&gt;
&lt;li&gt;W.P. No. 829 of 2013 titled &lt;i&gt;S.G. Vombatkere &amp;amp; Anr&lt;/i&gt; v. &lt;i&gt;Union of India &amp;amp; Ors.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Petition(s) for Special Leave to Appeal (Crl) No(s).2524/2014 titled &lt;i&gt;Unique Identification Authority of India &amp;amp; another&lt;/i&gt; v.	&lt;i&gt;Central Bureau of Investigation&lt;/i&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;All the above cases have now been linked with the ongoing Supreme Court case of &lt;i&gt;K. Puttaswamy&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; W.P(C) No. 439 of 2012 titled &lt;i&gt;S. Raju &lt;/i&gt;v. &lt;i&gt;Govt. of India and Others &lt;/i&gt; pending before the D.B. of the High Court of Judicature at 			Madras and PIL No. 10 of 2012 titled &lt;i&gt;Vickram Crishna and Others&lt;/i&gt; v. &lt;i&gt;UIDAI and Others&lt;/i&gt; pending before the High Court of Judicature 			at Bombay were transferred to the Supreme Court vide Order dated September 23, 2013. Also W.P. No. 833 of 2013 titled Aruna Roy &amp;amp; Anr Vs Union 			of India &amp;amp; Ors, W.P. No. 829 of 2013 titled S G Vombatkere &amp;amp; Anr Vs Union of India &amp;amp; Ors and Petition(s) for Special Leave to Appeal 			(Crl) No(s).2524/2014 titled &lt;i&gt;Unique Identification Authority of India &amp;amp; another&lt;/i&gt; v. &lt;i&gt;Central Bureau of Investigation&lt;/i&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;a href="http://judis.nic.in/temp/494201232392013p.txt"&gt;http://judis.nic.in/temp/494201232392013p.txt&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; &lt;a href="http://judis.nic.in/temp/4942012326112013p.txt"&gt;http://judis.nic.in/temp/4942012326112013p.txt&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; &lt;a href="http://courtnic.nic.in/supremecourt/temp/sr%20252414p.txt"&gt;http://courtnic.nic.in/supremecourt/temp/sr%20252414p.txt&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-aadhaar-case'&gt;https://cis-india.org/internet-governance/blog/the-aadhaar-case&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-05T09:12:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-aadhaar-act-is-not-a-money-bill">
    <title>The Aadhaar Act is Not a Money Bill</title>
    <link>https://cis-india.org/internet-governance/blog/the-aadhaar-act-is-not-a-money-bill</link>
    <description>
        &lt;b&gt;While the authority of the Lok Sabha Speaker is final and binding, Jairam Ramesh’s writ petition may allow the Supreme Court to question an incorrect application of substantive principles. This article by Amber Sinha was published by The Wire on April 24, 2016.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Originally published by &lt;a href="http://thewire.in/2016/04/24/the-aadhaar-act-is-not-a-money-bill-31297/"&gt;The Wire&lt;/a&gt; on April 24, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Since its introduction as a money bill in the Lok Sabha in the first week of March &lt;strong&gt;[1]&lt;/strong&gt;, the Aadhaar (Targeted delivery of Financial and other subsidies, benefits and services) Bill, 2016 has been embroiled in controversy. The Lok Sabha rejected the five recommendations of the Rajya Sabha and adopted the bill on March 16 and only presidential assent was required for it become to become valid law. However, former Union Minister Jairam Ramesh filed a writ petition contesting the decision to treat the Aadhaar Bill as a money bill. The petition is due to be heard before the Supreme Court on April 25, and should the court decide to entertain the petition, it could have far-reaching implications for the Aadhaar project and the manner in which money bills are passed by the Parliament.&lt;/p&gt;
&lt;p&gt;There are three broad categories of bills (all legislations or Acts are known as ‘bills’ till they are passed by the Parliament) that the Parliament can pass. The first kind, Constitution Amendment Bills, are those that seek to amend a provision in the Constitution of India. The second are financial bills which contain provisions on matters of taxation and expenditure. Money bills are a subset of the financial bills which contain provisions only related to taxation, financial obligations of the government, expenditure from or receipt to the Consolidated Fund of India and any matters incidental to the above. The third category is of ordinary bills which includes all other bills. The process for the enactment of all these bills is different. Money bills are peculiar in that they can only be introduced in the Lok Sabha where it can be passed by simple majority. Following this, it is transmitted to the Rajya Sabha. The Rajya Sabha’s powers are restricted to giving recommendations on the Bill and sending it back to the Lok Sabha, which the Lok Sabha is under no obligation to accept. The decision to introduce the Aadhaar Bill as a money bill has been widely seen as an attempt to circumvent the Rajya Sabha where the ruling party is in a minority.&lt;/p&gt;
&lt;p&gt;Article 110 (1) of the Constitution defines a money bill as one containing provisions only regarding the matters enumerated or any matters incidental to them. These are a) imposition, regulation and abolition of any tax, b) borrowing or other financial obligations of the Government of India, c) custody, withdrawal from or payment into the Consolidated Fund of India (CFI) or Contingent Fund of India, d) appropriation of money out of CFI, e) expenditure charged on the CFI or f) receipt or custody or audit of money into CFI or public account of India. Article 110 is modelled on Section 1(2) of the (UK) Parliament Act, 1911 which also defines the money bills as those only dealing with certain enumerated matters. The use of the word “only” was brought up by Ghanshyam Singh Gupta during the Constituent Assembly Debates. He pointed out that the use of the word “only” limits the scope of money bills to only those legislations which did not deal with other matters. His amendment to delete the word “only” was rejected clearly establishing the intent of the framers of the Constitution to keep the ambit of money bills extremely narrow.&lt;/p&gt;
&lt;p&gt;While the Aadhaar Bill does make references to benefits, subsidies and services funded by the Consolidated Fund of India (CFI), even a cursory reading of the bill reveals its main objectives as creating a right to obtain a unique identification number and providing for a statutory apparatus to regulate the entire process. The mere fact of establishing the Aadhaar number as the identification mechanism for benefits and subsidies funded by the CFI does not give it the character of a money bill. The bill merely speaks of facilitating access to unspecified subsidies and benefits rather than their creation and provision being the primary object of the legislation. Erskine May’s seminal textbook, ‘Parliamentary Practice” is instructive in this respect and makes it clear that a legislation which simply makes a charge on the Consolidated Fund does not becomes a money bill if otherwise its character is not that of one.&lt;/p&gt;
&lt;p&gt;PDT Achary, former secretary general of the Lok Sabha, has expressed concern about the use of Money Bills as a means to circumvent the Rajya Sabha. He has written here &lt;strong&gt;[2]&lt;/strong&gt; and here &lt;strong&gt;[3]&lt;/strong&gt;, on what constitutes a money bill and how the attempts to pass off financial bills like the Aadhaar Bill as money bills could erode the supervisory role Rajya Sabha is supposed to play. This is especially true in the case of a legislation like the Aadhaar Bill which has far reaching implications for individual privacy as it governs the identification system conceptualised to provide a unique and lifelong identity to residents of India dealing with both the analog and digital machinery of the state and by virtue of Section 57 of any private entities. Already over 1 billion people have been enrolled under this identification scheme, and the project has been a subject of much debate and a petition before the Supreme Court. The project has been portrayed as both the last hope for a welfare state and  surveillance infrastructure. Regardless of which of the two ends of spectrum one leans towards, it is undeniable that the law governing the Aadhaar project deserved a proper debate in the Parliament. Even those who are strong proponents of the project must accept the decision to pass it off as a money bill undermines the importance of democratic processes and is a travesty on the Constitution and a blatant abrogation of the constitutional duties of the speaker.&lt;/p&gt;
&lt;p&gt;The petition by Jairam Ramesh would hinge largely on the powers of the judiciary to question the decision of the Speaker of the Lok Sabha. Article 110 (3) is very clear in pronouncing the authority of the Speaker as final and binding. Additionally, Article 122 prohibits the courts from questioning the validity of any proceedings in Parliament on the ground of any alleged irregularity of procedure. The powers of privilege that Parliamentarians enjoy are integral to the principle of separation of powers. However, the courts may be able to make a fine distinction between inquiring into procedural irregularity which is prohibited by the Constitution; and questioning an incorrect application of substantive principles, which I would argue, is the case with the Speaker decision.&lt;/p&gt;
&lt;h3&gt;References&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://thewire.in/2016/03/07/arun-jaitley-introduces-money-bill-on-aadhar-in-lok-sabha-24115/"&gt;http://thewire.in/2016/03/07/arun-jaitley-introduces-money-bill-on-aadhar-in-lok-sabha-24115/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://indianexpress.com/article/opinion/columns/show-me-the-money-4/"&gt;http://indianexpress.com/article/opinion/columns/show-me-the-money-4/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="http://www.thehindu.com/opinion/lead/circumventing-the-rajya-sabha/article7531467.ece"&gt;http://www.thehindu.com/opinion/lead/circumventing-the-rajya-sabha/article7531467.ece&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-aadhaar-act-is-not-a-money-bill'&gt;https://cis-india.org/internet-governance/blog/the-aadhaar-act-is-not-a-money-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2016-04-25T10:51:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum">
    <title>The 12-digit conundrum</title>
    <link>https://cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum</link>
    <description>
        &lt;b&gt;Even as the Centre plans to link as many as 500 schemes to Aadhaar, concerns over data safety are rising. Richa Mishra reports.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The article by Richa Mishra was published in the       &lt;a href="http://www.thehindubusinessline.com/specials/india-file/aadhaar-the-12digit-conundrum/article9582271.ece"&gt;Hindu         Businessline&lt;/a&gt; on March 13, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The developments of last few weeks       seem to have made real some of the worst fears about Aadhaar. In       February, UIDAI (Unique Identification Authority of India) filed a       police complaint alleging attempts of unauthorised authentication       and impersonation of data related to Aadhaar. Since then, each and       every machinery within the government has been trying to convince       otherwise, that Aadhaar database is safe and secure, and that the       data is protected both by the best available advanced technology       as well as by the stringent legal provisions in the Aadhaar Act.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Not everyone is convinced. Critics       say, biometrics only make the citizen transparent to the State, it       does not make the State transparent to citizens. “We warned the       government six years ago, but they ignored us,” said Sunil       Abraham, Executive Director of Bengaluru-based research       organisation, Centre for Internet and Society. According to him,       the legislation implementing Aadhaar has almost no data protection       guarantees for citizens. He also believes that by opting for       biometrics instead of smart cards the government is using       surveillance technology instead of e-governance technology.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Biometrics is remote, covert and       non-consensual identification technology. It is totally       inappropriate for authentication. This has only increased the       fragility of Indian cyber security,” he stresses.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;However, officials associated with       UIDAI dismiss these arguments. Collecting biometrics does not pose       any threat to the right to privacy because people have been giving       their thumb impression for ages, they say. “The biometrics are       encrypted at source and kept safe and secure. Unauthorised sharing       and leakage of the data does not happen. Fears related to       collection of biometrics are not justified,” an official at the       helm of affairs said. He requested anonymity.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“However, as and when we find that       some suspicious activity or misuse is happening, we will strike at       the very beginning itself. UIDAI has full authentication       regulation under the Aadhaar Act that has to be followed. It       specifies in what manner authorities can use Aadhaar,” the       official pointed out.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;On the ground&lt;/b&gt;&lt;/div&gt;
&lt;p class="body" style="text-align: justify; "&gt;Even as the debate over data       security rages, the &lt;i&gt;aam aadmi &lt;/i&gt; seem to be little       perturbed about the alleged risks involved. For Padmini, who works       as a domestic help in East Delhi and is the sole bread earner for       her family of four, the Aadhaar card meant access to all       government benefits.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“&lt;i&gt;Koi farak nahi padta, kaun         dekhta hai mera card. Mujhko &lt;/i&gt;LPG cylinder &lt;i&gt;ka paisa bank         mein mil jata hai,”&lt;/i&gt; (It doesn’t matter to me who sees my       card. The subsidy for LPG gets transferred to my account) she       says. “&lt;i&gt;Baccho ke school admission mein bhi zaroorat pada,&lt;/i&gt;”       (I needed it to get my children’s admission in school), she added.       Sukh, a cab driver also uses it to get the LPG subsidy.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;While everyone &lt;i&gt;BusinessLine &lt;/i&gt;talked       to were convinced that Aadhaar was not a citizenship card, the       more aware ones saw it as a door that gave access to government       schemes.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;While they had a point, government       officials are careful to make it clear that Aadhaar is not       mandatory. But the popular perception increasingly points to the       opposite view, especially after it emerged that Aadhaar might be       made mandatory for children to receive midday meals at schools.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Another senior government official       said, “Aadhaar is not mandatory under any welfare scheme of the       government and no one is being deprived of a service or benefit       for the want of Aadhaar…it’s required for availing a       service/subsidy/benefit that accrues through the Consolidated Fund       of India.” He added that those who do not have the 12-digit number       would be provided with the facility to enrol by the Requiring       Agency. “And till the time Aadhaar is assigned, alternative IDs       would be allowed,” he said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;If a school which has to get Aadhaar       enrolment done for its students puts the Aadhaar numbers of its       students on its site and the same is used by someone, you can’t       blame us, the official argues. Then, who is accountable?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Pushing for Aadhaar, the UIDAI       officials cite the example of Kerala’s Department of General       Education (DGE), which has integrated Aadhaar with the student       databases and has thereby optimised the teacher-student ratio and       identified the schools with excess teachers. In a single academic       year, 3,892 excess teacher posts were identified.&lt;/p&gt;
&lt;p class="_hoverrDone body" style="text-align: justify; "&gt;“Due to this exercise,       no new posts have been sanctioned for the last two years,       resulting in notional savings of ₹540 crore per annum,” said a       UIDAI official. After student enrolment in the state was linked to       Aadhaar since 2012-2013, the head count of pupils have fallen by 5       lakh. Similar trends have been reported in Haryana. Critics have       also pointed out the possible security risk in using AadhaarPay,       the Andriod-based app. Merchants can download the app in their       phone and install a fingerprint scanner linked to the phone.       Customers with Aadhaar numbers can use their fingerprints (like       the secret PIN in case of debit cards) to do a transaction. While       doubts have been raised about the safety of fingerprint data,       officials in the know blame the controversy on the “card lobbies.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Thirty crore Indians have no       mobiles. They find it difficult to handle password, pin or card,       this is where AadhaarPay will come handy,” the official added.       “They don’t need a smart phone or feature phone. They don’t need a       debit card.&lt;/p&gt;
&lt;p class="_hoverrDone body" style="text-align: justify; "&gt;“Today more than 112       crore people have the Aadhaar card. Approximately, 52.95 crore       people have linked their Aadhaar numbers to their bank accounts.       We already have a system of Aadhaar authentication in place,” the       official added.&lt;/p&gt;
&lt;p class="_hoverrDone body" style="text-align: justify; "&gt;Government officials are       at pain to point out the larger benefits of Aadhaar, including       savings of more than ₹49,000 crore by plugging leakages in       government schemes like PDS. Government plans to increase the       number of welfare schemes linked to Aadhaar from 36 to over 500.       While the intent is good, concerns remain.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum'&gt;https://cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-14T13:50:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/ijlt-cis-lecture-series-report">
    <title>The 2nd IJLT-CIS Lecture Series — A Post-event Report</title>
    <link>https://cis-india.org/internet-governance/ijlt-cis-lecture-series-report</link>
    <description>
        &lt;b&gt;The Indian Journal of Law and Technology (IJLT) and the Centre for Internet and Society (CIS), organised the 2nd IJLT-CIS Lecture Series on the 21st and 22nd of May 2011 at the National Law School of India University, Nagarbhavi, Bangalore. The main theme for this year was Emerging Issues in Privacy Law: Law, Policy and Practice.&lt;/b&gt;
        
&lt;h3&gt;Speakers and Topics&lt;/h3&gt;
&lt;p&gt;Spread over two days, the National Law School hosted six speakers who held forth on the different aspects of privacy law, speaking from perspectives that were grounded in theory and actual practice and some that were India-centric while others applied equally to any jurisdiction.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Vivek Durai&lt;/strong&gt;, Partner, Atman Law Partners, addressed the gathering and gave the general introduction to the need for a discussion relating to privacy and the law. He spoke of technology and certain current events, including technological advances, have made privacy an issue with which serious engagement of the law has become imperative. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Usha Ramanathan&lt;/strong&gt;, an independent law researcher, spoke of the Unique Identity Project (Aadhar) launched by the Government of India and its implications on the privacy and data relating to the citizens. Ms. Ramanathan was critical of the Government’s plans on the basis that an ill-planned and executed project that sought to collect data such as this could provide easy fodder for data-mining. The latest 2011 rules that outline the relationship between the citizen and the state and the extent of privacy the citizen has in respect of this relationship.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Hamish Fraser&lt;/strong&gt;, a leading Australian practitioner in the field of technology law, addressed the gathering via video conference and spoke about cloud computing and privacy of parties using such facilities. He highlighted how technology such as cloud computing where the storage of data is almost fully virtual, with only the weakest of links to any physical storage space, were being increasingly widely used. He helped provide a practitioners perspective to the lecture as well by discussing how companies and individuals seeking to utilise cloud computing facilities, particularly for business purposes, must check for some essential legal provisions that would allow them to retain control over their data and prevent their data from being misappropriated by the provider of the virtual storage space in the cloud. He briefly also discussed the draft Australian privacy legislation.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Sean Blagsvedt&lt;/strong&gt;, founder of Baba Jobs, discussed the interplay between privacy and transparency and argued convincingly that under certain circumstances, transparency holds greater value than blind protection of privacy. He spoke of his experience in setting up Baba Jobs that seeks to act as a job portal-cum-social networking site for persons providing essential services such as plumbers, electricians, carpenters, house painters, etc. Rather than seeking to strictly protect the details and identity of these persons, Blagsvedt found that one of the most important factors for future employers while considering hiring such service personnel were the details of their previous assignments and testimonials from previous employers – the transparency that Baba Jobs offered became its USP. Blagsvedt talked of how a misplaced over-emphasis on privacy could often lead to greater detriments than benefits and prevent trust due to a lack of information. He concluded by predicting that as people increasingly shifted social and commercial transactions to the online world, the demands for privacy online would soon be offset by demands for greater transparency. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Sudhir Krishnaswamy&lt;/strong&gt;, Professor of Law at the Azim Premji University, Bangalore delivered a lecture on the state and privacy in India illustrating the development of the law on the matter. He also discussed about the balance that needs to be struck between the individual’s requirement for privacy and the state’s desire for secrecy. He also spoke about two manners in which to conceptualise privacy — recognising privacy as an inherent right that may be at times restricted to a certain extent, vis-a-vis seeing privacy as a right that the state grants to a citizen.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Abhayraj Naik&lt;/strong&gt;, Assistant Professor, Jindal Global Law School, Sonepat, gave a lecture on informational privacy in comparative contexts. The discussion centred on information surveillance in different jurisdictions and how the values attached to the attribution of information reflects in the laws relating to privacy in those different jurisdictions. His approach included mathematical modelling of information attribution and provided an interdisciplinary approach.&lt;/p&gt;
&lt;h3&gt;Participation&lt;/h3&gt;
&lt;p&gt;The lecture series saw registration from over 50 people, including students from law schools all over the country, practitioners, and even educators. Since the lectures were streamed live online, and this was only the second event in NLS to use this facility apart from the Annual Convocation, many more people listened to the lectures online. The lectures were available online for a period of one week after the conclusion of the lecture series.&lt;/p&gt;
&lt;h2&gt;IJLT-CIS Lecture Series 2011 Registration&lt;/h2&gt;
&lt;p&gt;The following people participated in the event:&lt;/p&gt;
&lt;p&gt;Adithya Banavar, Akanksha Arora, Anand VJ, Aniket Singhania, Ankit 
Verma, Anupama Kumar, Aparna Gokhale, Arjun Krishnamoorthy, Arjun 
Sharma, Arun Menon, Asif Ayaz, B. N. Vivek, Batool, Chirag Tanna, 
Deepakar Livingston.P., Deepthi R, Dheer Bhatnagar, Dinesh Subramany, 
Esha Goel, Gopalakrishnan R., J Suresh, Jamshed Ansari, Kanti Jadia, 
Khadeeja Nadeem, Khumtiya Debbarma, Mani Bhushan, Manish, Nayan Jain, 
Neha Baglani, Panduranga Acharya, Partha Chakravarty, Parul Bali, 
Prashanth Ramdas, Prateek Rath, Preyanka Sapru, Prianca Ravichander, 
Priytosh Singh, Purushotham.G, Ralph A, Ruhi Chanda, S. Badrinath, S. 
Bhushan, S. K. Mohanty, Sahana Manjesh, Sanjana Chappalli, Santosh 
Dindima, Shalini Iyengar, Shalini S, Sibani Saxena, Spoorthy M. S., 
Tarang Shashishekar, Tarun Kovvali, Tejaswini Rajkumar, Vaishali Kant, 
and Y. Shiva Santosh Kumar.&lt;/p&gt;
&lt;p&gt;See the &lt;a href="https://cis-india.org/internet-governance/letter-of-agreement.pdf" class="internal-link" title="Letter of Agreement"&gt;Letter of Agreement&lt;/a&gt; [PDF, 1 MB]&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/ijlt-cis-lecture-series-report'&gt;https://cis-india.org/internet-governance/ijlt-cis-lecture-series-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-11-17T10:25:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/global-multistakeholder-community-neither-global-nor-multistakeholder">
    <title>The 'Global Multistakholder Community' is Neither Global Nor Multistakeholder</title>
    <link>https://cis-india.org/internet-governance/blog/global-multistakeholder-community-neither-global-nor-multistakeholder</link>
    <description>
        &lt;b&gt;CIS research shows how Western, male, and industry-driven the IANA transition process actually is.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In March 2014, the &lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;US government announced that they were going to end the contract they have with ICANN&lt;/a&gt; to run something called the Internet Assigned Numbers Authority (IANA), and hand over control to the “global multistakeholder community”. They insisted that the plan for transition had to come through a multistakeholder process and have stakeholders “across the global Internet community”.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Analysis of the process since then shows how flawed the “global multistakeholder community” that converges at ICANN has not actually represented the disparate interests and concerns of different stakeholders. CIS research has found that the discussions around IANA transition have not been driven by the “global multistakeholder community”, but mostly by males from industry in North America and Western Europe.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CIS analysed the five main mailing lists where the IANA transition plan was formulated: ICANN’s &lt;a href="http://mm.ianacg.org/pipermail/icg-forum_ianacg.org/"&gt;ICG&lt;/a&gt; &lt;a href="https://forum.icann.org/lists/icg-forum/"&gt;Stewardship&lt;/a&gt; and &lt;a href="https://mm.icann.org/pipermail/accountability-cross-community/"&gt;CCWG Accountability&lt;/a&gt; lists; IETF’s &lt;a href="https://mailarchive.ietf.org/arch/browse/ianaplan/"&gt;IANAPLAN&lt;/a&gt; list; and the NRO’s &lt;a href="https://www.nro.net/pipermail/ianaxfer/"&gt;IANAXFER&lt;/a&gt; list and &lt;a href="https://www.nro.net/pipermail/crisp/"&gt;CRISP&lt;/a&gt; lists. What we found was quite disheartening.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A total of &lt;em&gt;239 individuals&lt;/em&gt; participated cumulatively, across all five lists.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Only 98 substantively contributed to the final shape of the ICG proposal&lt;/em&gt;, if one takes a count of 20 mails (admittedly, an arbitrary cut-off) as a substantive contribution, with 12 of these 98 being ICANN staff some of whom were largely performing an administrative function.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;We decided to look at the diversity within these substantive contributors using gender, stakeholder grouping, and region. We relied on public records, including &lt;a href="https://community.icann.org/display/gnsosoi/"&gt;GNSO SOI statements&lt;/a&gt;, and extensive searches on the Web. Given that, there may be inadvertent errors, but the findings are so stark that even a few errors wouldn’t affect them much.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;2 in 5&lt;/strong&gt; (39 of 98, or 40%) were from a single country: the &lt;strong&gt;United States of America&lt;/strong&gt;.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;4 in 5&lt;/strong&gt; (77 of 98) were from countries which are part of the WEOG UN grouping (which includes &lt;em&gt;Western Europe, US, Canada, Israel, Australia, and New Zealand&lt;/em&gt;), which only has developed countries.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;None&lt;/strong&gt; were from the EEC (Eastern European and Russia) group, and only &lt;strong&gt;5 of 98&lt;/strong&gt; from all of GRULAC (Latin American and Caribbean Group).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;4 in 5&lt;/strong&gt; (77 of 98) were &lt;em&gt;male&lt;/em&gt; and 21 were female.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;4 in 5&lt;/strong&gt; (76 of 98) were from industry or the technical community, and only 4 (or 1 in 25​) were identifiable as primarily speaking on behalf of governments.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;This shows also that the process has utterly failed in achieving the recommendation of Paragraph 6 of the &lt;a href="http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf&amp;gt;NETMundial outcome document&amp;lt;/a&amp;gt;, which states:
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;In the follow up to the recent and welcomed announcement of US Government with regard to its intent to transition the stewardship of IANA functions, the discussion about mechanisms for guaranteeing the transparency and accountability of those functions after the US Government role ends, has to take place through an open process with the participation of all stakeholders &amp;lt;b&amp;gt;extending beyond the ICANN community&amp;lt;/b&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;p&amp;gt;Beyond the IANA transition, one notes that even the communities within ICANN are not very diverse. For instance:&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li style="&gt;&lt;strong&gt;3 in 5 registrars are from the United States of America&lt;/strong&gt; (624 out of 1010, as of March 2014, according to ICANN's &lt;/a&gt;&lt;a href="https://www.icann.org/registrar-reports/accreditation-qualified-list.html"&gt;accredited registrars list&lt;/a&gt;), with only 0.6% being from the 54 countries in Africa (7 out of 1010).&lt;/p&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;45% of all the registries are from the United States of America&lt;/strong&gt;! (307 out of 672 registries listed in &lt;a href="https://www.icann.org/resources/pages/listing-2012-02-25-en"&gt;ICANN’s registry directory&lt;/a&gt; in August 2015.)&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;66% (34 of 51) of &lt;a href="http://www.bizconst.org/members/"&gt;the Business Constituency&lt;/a&gt; at ICANN are from a single country: the United States of America&lt;/strong&gt;. (N.B.: This page doesn’t seem to be up-to-date.)&lt;/li&gt;
&lt;p style="text-align: justify;"&gt;This shows that businesses from the United States of America continues to dominate ICANN to a very significant degree, and this is also reflected in the nature of the dialogue within ICANN, including the fact that the proposal that came out of the ICANN ‘global multistakeholder community’ on IANA transition proposes a clause that requires the ‘IANA Functions Operator’ to be a US-based entity. For more on that issue, see this post on the jurisdiction issue at ICANN (or rather, on the lack of a jurisdiction issue at ICANN).&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/global-multistakeholder-community-neither-global-nor-multistakeholder'&gt;https://cis-india.org/internet-governance/blog/global-multistakeholder-community-neither-global-nor-multistakeholder&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Multi-stakeholder</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-11-03T10:42:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/unkindest-cut-mr-sibal">
    <title>That’s the unkindest cut, Mr Sibal</title>
    <link>https://cis-india.org/internet-governance/unkindest-cut-mr-sibal</link>
    <description>
        &lt;b&gt;There’s Kolaveri-di on the Internet over Kapil Sibal’s diktat to social media sites to prescreen users’ posts. That diktat goes far beyond the restrictions placed on our freedom of expression by the IT Act. But, says Sunil Abraham of the Centre for Internet and Society, India is not going to be silenced online.&lt;/b&gt;
        
&lt;p&gt;Thanks to leaked reports about unpublicised meetings that communications minister Kapil Sibal had with social media operators – or Internet intermediaries, to use legalese — such as Facebook, Google and Indiatimes.com, censorship policy in India has gained public attention, and caused massive outrage.&lt;/p&gt;
&lt;p&gt;According to The New York Times India Ink reportage, quoting unnamed sources from the Internet intermediaries, Mr Sibal demanded proactive and pre-emptive screening of posts that people make on social media sites, ostensibly to filter out or remove “offensive” content and hate speech. In a television interview, however, the minister denied he wanted to censor what Indians thought and shared with others online.&lt;/p&gt;
&lt;p&gt;One is tempted to believe him. He was, after all, the amicus for the landmark People’s Union of Civil Liberties (PUCL) wiretapping judgment of 1996, which is pivotal to protecting our civil liberties when using communication technology in India.&lt;br /&gt;&lt;br /&gt;Last week, though, Mr Sibal came out in public with his demands, saying that there was a lot of content that risked hurting the sensibilities of people and could lead to violence. “It was brought to my notice some of the images and content on platforms like Facebook, Twitter and Google are extremely offensive to the religious sentiments of people ...”We will not allow Indian sentiments and religious sentiments of large sections of the community to be hurt,” he said.&lt;br /&gt;&lt;br /&gt;There was even a threat of state action if Internet companies did not comply with demands to screen content before it was posted online.&lt;br /&gt;&lt;br /&gt;The NYT blogpost said, however, quoting executives from the Internet companies Mr Sibal had reportedly met, that the minister showed them a Facebook page that maligned Congress president Sonia Gandhi and told them, “This is unacceptable.”&lt;br /&gt;&lt;br /&gt;Google responded to Mr Sibal by releasing its Transparency Report, saying that out of 358 items that it had been requested to remove between January and June 2011, only eight requests pertained to hate speech, while as many as 255 complaints were against “government criticism”.&lt;br /&gt;&lt;br /&gt;Indian netizens raged against Mr Sibal, and very quickly #IdiotKapil Sibal was ‘trending’ on Twitter, with thousands posting comments against attempts to ‘censor’ Internet content. Much has changed, in Mr Sibal’s reckoning, between 1996 and 2011.&lt;br /&gt;&lt;br /&gt;So, what’s all the fuss over ‘pre-screening’ and what’s at stake here? Critics of Mr Sibal say, our freedom of speech and expression is under threat. They see a pattern in the way the government has sought to impose rules and restrictions on Internet and telecommunications players, with demands on BlackBerry-maker RIM to give it access to its users’ email and messenger content, on telecom players to install electronic surveillance equipment and let the government eavesdrop as it sees fit, and on the likes of Google and Yahoo to part with email content and users’ details.&lt;br /&gt;&lt;br /&gt;It all started with the amendments to the Information Tech-nology Act 2000 in 2008. Together, they constitute damaging consequences for citizens, including the creation of a multi-tier blanket surveillance regime, inappropriate security recommendations, and undermining freedom of speech and expression.&lt;br /&gt;&lt;br /&gt;The amendments passed in 2008 — without any discussion in Parliament – did solve some existing policy concerns, but simultaneously introduced new ones. For instance, Section 66, introduced during this amendment, criminalises sending offensive messages through any ICT-based communication service.&lt;br /&gt;&lt;br /&gt;Offensive messages are described as “grossly offensive, menacing character..... or causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will.” These terms are not defined in the IT Act or in any other existing law, rules or case-law, except for a couple of exceptions such as what constitutes “criminal intimidation”. These limits on the freedom of expression go well beyond Article 19(2) of the Constitution, which only permits “reasonable restrictions...in the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality or in relation to contempt of court, defamation or incitement to an offence.”&lt;br /&gt;&lt;br /&gt;If Mr Sibal himself were to don his lawyer’s coat again and launch a legal challenge to Section 66, in all likelihood, courts in India would strike it down as unconstitutional.&lt;br /&gt;&lt;br /&gt;Section 79, which was amended, brought into being an intermediary liability regime. This was in part precipitated by the arrest of Avnish Bajaj, the former CEO of bazee.com in December 2004 for the infamous Delhi Public School MMS clip which was being sold on his e-commerce platform. Policy-makers were, however, convinced to follow international best practices and grant intermediaries immunity under certain conditions.&lt;br /&gt;&lt;br /&gt;Just as the postal department is not considered liable for the content of letters or telecom operators liable for the content of phone conversations, Internet intermediaries, too, were to be considered “dumb pipes” or “common carriers” of content produced and distributed by users. Intermediaries therefore earned immunity from legal action so long as they acted upon take-down notices, or written requests for deletion of illegal content.&lt;br /&gt;&lt;br /&gt;Section 79 was further clarified in April this year when the Intermediaries Guidelines Rules were notified. Stakeholders from the technology industry, media and civil society had sent feedback to the Department of Information Technology under the Ministry of Communication and Information Technology in February, but DIT choose to ignore the feedback and finalised rules with serious flaws in them. For one, a standardised “Terms of Service” that focused on limits on free expression had to be implemented by all intermediaries – forcing a one-size-fits-all approach.&lt;br /&gt;&lt;br /&gt;Content that was 'harmful to minors' was not permissible regardless of the target market of the website. All intermediaries were supposed to act upon take-down notices within 36 hours, something that a Google may be able to do, but an average blogger could not.&lt;br /&gt;&lt;br /&gt;Two, the vague terms introduced in Section 66A were left undefined. Intermediaries were asked to sit on judgment on the question of whether an article, image or video was causing 'inconvenience'.&lt;br /&gt;&lt;br /&gt;Three, all principles of natural justice were ignored – the person responsible for posting the content would not be informed, s/he would not be given an opportunity to file a counter-notice to challenge the intermediary’s decision in court.&lt;br /&gt;&lt;br /&gt;Four, the rules left it open for economically or politically motivated actors to seriously damage opponents online using fraudulent take-down notices, instead of treating abuse of the take-down notice system as an offence.&lt;br /&gt;&lt;br /&gt;How the take-down system terrorises free expression on the Internet was illustrated when the Centre for Internet and Society, where this author works, undertook a research project. A pro-bono independent researcher who led the exercise sent fraudulent take-down notices to seven Internet companies in India. These included some of the largest and most popular Indian and foreign search engines, news portals and social media platforms.&lt;br /&gt;&lt;br /&gt;Although they all employ the most competent lawyers in the country, six of the seven intermediaries over-complied, confirming our worst fears. In one case, a news portal deleted not just the specific comment that was mentioned in the take-down notice but 14 other comments as well. Most importantly, it must be pointed out, the comment identified in the take-down notice was itself an excellent piece of writing that could not be construed as “offensive” by any stretch!&lt;br /&gt;&lt;br /&gt;In the single exception to the rule, one e-commerce portal refused to act upon a take-down notice trying to prevent the sale of diapers on the grounds that it was “harmful to minors”, rightly dismissing the notice as frivolous. But that exception simply proved a rule: Private intermediaries use their best lawyers to protect their commercial interests, but are highly risk-averse and do not value freedom of expression, unless it affects their bottomline.&lt;br /&gt;&lt;br /&gt;Proactive and pre-emptive screening of social media content, as Mr Sibal has demanded, will only further compromise online civil liberties in what’s already a dismal situation. In short, we move from a post-facto to a pre-emptive censorship regime.&lt;br /&gt;&lt;br /&gt;In fact, given the magnitude of the task of pre-screening in a nation with a 100 million Internet users and growing, such an intense censorship regime will mean not only that what Indian citizens say or post will be censored by private companies, but those private companies will, in turn, use machines to screen what humans are saying and doing! After all, otherwise, companies would require armies of human censors to screen the millions of posts that are made on Twitter and Facebook every minute.&lt;br /&gt;&lt;br /&gt;But the Supreme Court has held that even the executive arm of government cannot engage in censorship prior to publication, let alone ordering private companies to do so. In any case, it’s a policy that’s bound to fail, for both technical reasons and for its failure to take into account human motivations.&lt;br /&gt;&lt;br /&gt;Machines, as we know, continue to be poor judges of the nuances of human expression and will likely cause massive damage to the idea of public debate. Humans, on the other hand, will begin to circumvent machine filters – for example, content labelled as PRON instead of PORN will go through.&lt;br /&gt;&lt;br /&gt;Draconian crackdown on certain types of fringe content is likely to have the counterproductive result of the general society developing an unhealthy obsession for exactly such content. Despite the comprehensive censorship controls in Saudi Arabia, for instance, pornography consumption is rampant, usually accessed via pirated satellite TV and circulated using personal computing devices and mobile phones.&lt;br /&gt;&lt;br /&gt;But all is not lost yet, perhaps. Faced with the barrage of criticism, Mr Sibal has now called for public consultations on the issue of pre-screening content. There’s hope yet for freedom of speech and expression in India. Thanks to the Internet, a throwback to 1975 simply does not look possible.&lt;/p&gt;
&lt;p&gt;Sunil Abraham is executive director of the Centre for Internet and Society, Bengaluru. He wrote this article in the Deccan Chronicle on December 11, 2011. Read the original &lt;a class="external-link" href="http://www.deccanchronicle.com/node/76807"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/unkindest-cut-mr-sibal'&gt;https://cis-india.org/internet-governance/unkindest-cut-mr-sibal&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-12T04:59:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors">
    <title>Thank You To Our 2014 Sponsors</title>
    <link>https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors</link>
    <description>
        &lt;b&gt;Today’s the last day of work in 2014 for the editorial team at MediaNama, though we’ll run a Holiday Wire update intermittently this week, we’ll have a brief year end review for each major segment. Thank you for reading us in 2014, and have a great Christmas and New Year.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog entry was &lt;a class="external-link" href="http://www.medianama.com/2014/12/223-thank-you-to-our-2014-sponsors-spice-digital-antfarm-astro-vision-bruceclay-buongiorno-ccavenue-cis-e2e-fortumo-getit-google-india-com-info-edge-onmobile-qualcomm-times-internet/"&gt;published in Medianama&lt;/a&gt; on December 22, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;From the business side, it’s been a great 2015 for us, and we really  appreciate the support we received in 2014 from all our sponsors,  especially Spice Digital, our annual sponsor, and Antfarm,  which supported us for almost the entire year. We’re still working, for  an idea of our 2015 plans and editorial calendar, please see the  presentation &lt;a href="http://www.medianama.com/advertise/" target="_blank" title="advertise on medianama"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Annual Sponsor:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.medianama.com/2011/08/223-thank-you-sponsors-one97-spice-digital/spice-logo-3/" rel="attachment wp-att-34993"&gt;&lt;/a&gt;-&lt;a href="http://www.spicedigital.in/" title="Spice Digital "&gt; Spice Digital Ltd&lt;/a&gt;:  a part of Spice Global Group – US$2 Billion conglomerate promoted by  Dr. BK Modi, is one of India’s leading Mobile Value Added Services  company and offers innovative solutions for Telecom Operators,  Enterprises and Government using mobile connectivity media – Voice, SMS,  USSD, WAP &amp;amp; 3G. We are preferred partner of all major telecom  service providers in India and providing services to international  telecom players in over 20 countries across the globe. We are pioneers  in innovation and technology and committed to deliver excellent Award  winning products and services to the customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We have exclusive tie-ups with Hungama and PPL for music streaming services.&lt;br /&gt; We have acquired two leading international VAS players, MMS (Indonesia) and Beoworld (Malaysia).&lt;br /&gt; Recently, we had a major financial investment from MediaTek (Taiwan).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Our sponsors during 2014:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://antfarm.in/" title="Antfarm"&gt;Antfarm&lt;/a&gt; is  an innovation sandbox based out of Mumbai. It is led by a team of blue  sky thinkers, entrepreneurs and professionals. The company takes great  ideas with disruptive potential, puts together all the key ingredients  of people, technology, strategy, marketing and capital to build these  into scalable companies. The ultimate aim is to create global businesses  that are ideated and built out of India. The first set of companies  launched are &lt;a href="http://stylista.com/"&gt;Stylista.com&lt;/a&gt;, &lt;a href="http://arrive.com/signin"&gt;Arrive.com&lt;/a&gt;, Fork Media, and the farm is currently scaling up ideas in education, travel &amp;amp; leisure, retail, ad-tech and healthcare.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.clickastro.com/"&gt;Astro-Vision&lt;/a&gt; is a name easily recognized and held in great esteem in the world of  astrology services. Its products range from software that run on the  latest operating systems to web based solutions for major portals and  the latest range of mobile phones. Astro-Vision’s focus has always been  on providing innovative astrology solutions using the latest  technologies in the field of IT and communications. From Desktop PCs to  internet portals and mobiles phones, Astro- Vision’s range of solutions  includes stand alone applications, online apps and astro content  services. The company has strategic tie-ups with major IT enabled  service networks like Suvidhaa, Reliance world, One stop shop and many  networks under the Government of India’s CSC scheme, including Spanco  and GNG. Many popular Indian websites today are powered by  Astro-Vision’s web based astrology solutions and astrology content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.bruceclay.com/in/" title="Bruceclay"&gt;Bruce Clay&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.buongiorno.com/" title="Buongiorno"&gt;Buongiorno&lt;/a&gt;, founded  in 1999, is known in the worldwide mobile commerce ecosystem for  developing and managing paid apps and content that help consumers get  greater enjoyment from mobile devices. On July 2012, after the  settlement of a successful public tender offer, Buongiorno became a  wholly-owned subsidiary of NTT DOCOMO – a global leader in mobile  telecommunications technologies and services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With direct connections to more than 130 telecom operators in 25  countries, over 10 years’ experience and a team of 600 professionals,  Buongiorno makes the mobile internet experience happen for consumers  globally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.medianama.com/wp-content/uploads/ccavenue_highres.jpg"&gt;&lt;/a&gt;- &lt;a href="http://www.ccavenue.com/" title="CCAvenue"&gt;CCAvenue&lt;/a&gt; is India’s largest payment gateway solution powering 85% of the  eMerchants in India across all verticals &amp;amp; has played the role of a  catalyst to the growth of ecommerce with real time, multi-currency,  multiple payment options online payment processing services. The  solution is powered by proprietary technology that integrates  transaction-processing, advance shopping cart, Invoicing, mobile page,  risk assessment and fraud control, smart analytical dashboards, live  monitoring of bank gateways, financial reporting etc. CCAvenue is the  only complete PG solution in the country that has the unique ability to  offer the full spectrum of 100+ Internet payment options.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;5 Credit Cards&lt;/li&gt;
&lt;li&gt;50 Debit Cards&lt;/li&gt;
&lt;li&gt;6 ATM cum Debit Cards&lt;/li&gt;
&lt;li&gt;50+ Netbankings&lt;/li&gt;
&lt;li&gt;Mobile Payments&lt;/li&gt;
&lt;li&gt;4 Cash Cards&lt;/li&gt;
&lt;li&gt;CCAvenue PhonePay IVRS Based Payment Systems.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://cis-india.org/"&gt;The Centre for Internet and Society&lt;/a&gt; (CIS)  is a non-profit research organization that works on policy issues  relating to freedom of expression, privacy, accessibility for persons  with disabilities, access to knowledge and IPR reform, and openness  (including open government data, free/open source software, open  standards, open access to scholarly literature, open educational  resources, and open video), and engages in academic research on digital  natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS critically engages with concerns of &lt;a href="http://cis-india.org/about/substantive-areas/digital-pluralism" title="Digital Pluralism"&gt;digital pluralism&lt;/a&gt;, &lt;a href="http://cis-india.org/about/substantive-areas/public-accountability"&gt;public accountability&lt;/a&gt; and &lt;a href="http://cis-india.org/publications/curricula-and-teaching"&gt;pedagogic practices&lt;/a&gt;, in the field of Internet and Society, with particular emphasis on South-South dialogues and exchange.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Hosting and Support&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.e2enetworks.com" rel="nofollow" title="E2E Networks"&gt;E2E Networks&lt;/a&gt;:  India’s most clued in dedicated hosting company founded by geeks. E2E  Networks Private Limited has been into the business of providing Low  latency Dedicated Servers and VPS Servers in India since 2009. E2E  Networks goes way beyond merely provisioning servers/cloud  infrastructure. Our expertise includes strategies and managed services  help for implementing the most suitable cloud architecture based on  public, private or hybrid cloud platforms for your web facing or  enterprise applications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://fortumo.com/" title="Fortumo"&gt;Fortumo&lt;/a&gt; allows any developer to set up payment processing for web and mobile  services, games or apps using carrier billing. Payments work for PC  applications, web services and HTML5, Android, Windows Phone &amp;amp;  Windows 8 apps. Fortumo supports payments in 81 countries through 300  mobile operators. Get started with our self-service setup (no monthly  fees or minimum volume commitments) at &lt;a href="http://fortumo.com/"&gt;http://fortumo.com&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.freeads.in/" title="FreeAds"&gt;Getit Infomedia&lt;/a&gt; is India’s digital supermarket for SMEs  to get relevant business leads. We seamlessly deliver excellent value  across all media platforms be it Voice, Mobile Applications, Online,  WAP, Web chat, Print etc. The services provide presence, enquiries and  leads to its advertisers while ensuring end users (consumers) have  access to the best information, benefits and offers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Sponsor&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.google.com" title="Google"&gt;Google&lt;/a&gt; is a global technology leader focused on improving the ways people  connect with information. Google’s innovations in web search and  advertising have made its website a top internet property and its brand  one of the most recognized in the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.india.com/" title="India.com"&gt;India.com&lt;/a&gt; is a joint venture between two media giants – Zee Entertainment Enterprise Ltd (ZEEL) and www.&lt;a href="http://pmc.india.com/"&gt;PMC.com&lt;/a&gt; is  all about the new India that is funny, witty, shocking. It shows the  new age Indian in their language. India.com provides a perspective that  is reflective of the changing dynamic of the role media plays in India.  Find out what the new India is saying only at &lt;a href="http://india.com/"&gt;india.com&lt;/a&gt;. Discover India and Indians at &lt;a href="http://india.com/"&gt;india.com&lt;/a&gt; for  no one covers the new India as &lt;a href="http://india.com/"&gt;india.com&lt;/a&gt;! Get the latest updates follow @indiacom on Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.infoedge.in/"&gt;Info Edge (India) Limited&lt;/a&gt; is among the leading internet companies in India. Info Edge runs leading  internet businesses – Naukri.com -India’s no. 1 job site,  Jeevansathi.com – one of the leading matrimonial portal,99acres.com –  India’s No.1 real estate portal and Shiksha.com – India’s leading  education portal. The company also owns Quadrangle – an offline  executive search business, and Naukri Gulf (a leading jobsite in the  Middle East market). Info Edge also owns Brijj.com, a professional  networking site and Allcheckdeals.com, an online real estate brokerage  firm which is run as a subsidiary company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.onmobile.com/"&gt;OnMobile Global Ltd&lt;/a&gt;.  is a pioneer in white-labelled, Value Added Products and Services [VAS]  for mobile, landline and media service providers. The #1 VAS specialist  in emerging and high-growth markets, OnMobile touches the lives of over  1500 million mobile users across 55 countries each month. With our  diverse product portfolio of Mobile Music, multi-screen Video Gateway  and delivery solutions, Phone Backup and Personal Cloud Management  solutions, Voice and Video portals, M-Commerce products and services, we  generate 2 – 5% contribution for top customers and top line revenues of  over US $800 million for over 92 customers globally. We deliver our  products by the best combination of a hosted Cloud with on-site  operations at the customer premises or through products deployed in  customer networks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Founded in 2000, OnMobile has business spread across India, U.S.,  LATAM, Africa, Australia, Middle East and Europe. The company was  publicly listed in India in 2008. Recent acquisitions include Voxmobili  (2007), Telisma (2008), Dilithium Networks (2010) and LiveWire (2013).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;OnMobile is the first Indian telecom VAS Company to go public. The  company’s shares are listed on the Bombay Stock Exchange (BSE) and the  National Stock Exchange (NSE) as on March 31, 2010&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://qualcommventures.com/" title="Qualcomm Ventures"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.qualcommventures.com/" title="Qualcomm Ventures"&gt;Qualcomm Ventures&lt;/a&gt; is the investment arm of Qualcomm Inc. (NASDAQ: QCOM), a Fortune 500  company with operations across the globe.As the Venture Capital  investment arm of Qualcomm, the world leader in next-generation mobile  technologies, Qualcomm Ventures has been making strategic investments in  early-stage technology companies since 2000. With a $500 million fund  commitment, Qualcomm Ventures seeks to make strategic investments in  early stage high-technology companies that have the potential to  dramatically transform our world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;QPRIZE (&lt;a href="http://www.qprize.com/"&gt;www.qprize.com&lt;/a&gt;)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;QPrize™ is Qualcomm Venture’s Seed investment competition. It’s  designed to provide entrepreneurs their first level of funding so they  can launch their idea into a successful start-up business. The QPRIZE  competition was first launched in 2009 to promote innovation in the  technology industry and is designed to identify the industry’s most  promising early-stage technology companies. We are looking for bright,  energetic and resourceful entrepreneurs who have a passion for bringing  new technologies and services to market. Our goal is to have QPrize act  as a catalyst for our winners, providing the initial capital to launch  their great ideas and support the company to its first institutional  funding round.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.timesinternet.in/"&gt;Times Internet (TIL)&lt;/a&gt; is a premier digital product company and the digital arm of The Times  of India Group. It reaches over 100m visitors and serves 2 billion  pageviews every month across web and mobile, with businesses across  news, entertainment, sports, local, ecommerce, classifieds, startup  investments, local partnerships, and more.TIL’s key properties in the  news category include&lt;a href="http://t.signauxtrois.com/link?url=http://timesofindia.com/&amp;amp;ukey=agxzfnNpZ25hbHNjcnhyGAsSC1VzZXJQcm9maWxlGICAgPesw9YKDA&amp;amp;k=9862a753-3036-4fb0-d995-d0f039be5863"&gt;timesofindia.com&lt;/a&gt;, &lt;a href="http://t.signauxtrois.com/link?url=http://economictimes.com/&amp;amp;ukey=agxzfnNpZ25hbHNjcnhyGAsSC1VzZXJQcm9maWxlGICAgPesw9YKDA&amp;amp;k=ad63a5e6-eeea-4036-a025-091733356fe5"&gt;economictimes.com&lt;/a&gt; and &lt;a href="http://t.signauxtrois.com/link?url=http://navbharattimes.com/&amp;amp;ukey=agxzfnNpZ25hbHNjcnhyGAsSC1VzZXJQcm9maWxlGICAgPesw9YKDA&amp;amp;k=deefd481-21fd-4574-f85e-bd03ecd42c23"&gt;navbharattimes.com&lt;/a&gt;.  Under its fold are topmost internet entertainment portals in India —  Gaana.com – the music broadcasting service and BoxTV.com – the video  streaming site. Indiatimes Shopping emerges as one of the top five  e-commerce companies in India &amp;amp; TimesCity, a lifestyle destination  covering recommendations across Restaurants, Movies, Events, Nightlife  in your city. Times Internet has also entered into partnerships with  global companies offering them its tremendous reach through online media  platforms under its initiative called &lt;a href="http://timesofindia.indiatimes.com/topic/TLP"&gt;Times Global Partners(TGP)&lt;/a&gt;.  The TGP portfolio ranges from licensing partnerships to investments and  acquisition. In the last year, TGP has made four acquisitions, twelve  global partnerships, four minority investments and over 20 investments  into start-ups through TLabs in the Indian ecosystem.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors'&gt;https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-27T14:27:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking">
    <title>Text of DIT's Response to Second RTI on Website Blocking</title>
    <link>https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking</link>
    <description>
        &lt;b&gt;CIS had filed a request under the Right to Information Act with the government, asking a number of questions relating to blocking of content under the IT Act.  We have reproduced below the response we got from the government.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Government of India&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;Ministry of Communications &amp;amp; Information Technology&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;Department of Information Technology&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;Electronics Niketan, 6 CGO Complex,&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;New Delhi-110003&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No: 14(12)/2011-ESD&lt;br /&gt;10.6.2011&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Shri Pranesh Prakash,&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;Centre for Internet and Society,&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;194, 2C Cross, Domlur Stage II,&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;Bangalore - 560071&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Subject: Request for information under RTI Act, 2005.&lt;/p&gt;
&lt;p&gt;Sir,&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; Reference your request dated 13 May 2011, which was received in this office on 18.5.2011 on the above subject.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;The information as received from the custodian of information is attached herewith (Annexure-I, II and III).&lt;br /&gt;&amp;nbsp;&lt;br /&gt;&amp;nbsp; &amp;nbsp;Yours faithfully,&lt;br /&gt;&amp;nbsp;&amp;nbsp; (A.K.Kaushik)&lt;br /&gt;&amp;nbsp; &amp;nbsp;Additional Director &amp;amp; CPIO&lt;br /&gt;&amp;nbsp; &amp;nbsp;Cyber Laws &amp;amp; E-Security Division&lt;br /&gt;&amp;nbsp; &amp;nbsp;Tel: 011-24364803&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&amp;nbsp;Annexure I&lt;/h2&gt;
&lt;h3&gt;&amp;nbsp;&lt;strong&gt;Reply to Shri Pranesh Prakash&lt;/strong&gt;&lt;/h3&gt;
&lt;div style="text-align: left;"&gt;
&lt;ol&gt;&lt;li&gt;How many orders have been issued for blocking of computer resources prior to the coming into force of the Information Technology (Amendment) Act, 2008 (i.e., before October 27, 2009) under the Information Technology Act, 2000, or any other law for the time being in force.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Five orders were issued for blocking access to web content.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide a list of all the websites for which the DIT has issued blocking orders and the dates on which each website was blocked.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - The following websites have been blocked pursuant to court orders&lt;br /&gt;&lt;br /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Sl&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Website&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Date of issuing&amp;nbsp;direction by designated&amp;nbsp;officer&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.zone.h.org/"&gt;www.zone-h.org&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;08.03.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://donotdiall00.webs.com"&gt;http://donotdiall00.webs.com&amp;nbsp;&lt;/a&gt;&amp;nbsp;(IP 216.52.115.50)&lt;/td&gt;
&lt;td&gt;&amp;nbsp;08.08.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.bloggernews.net/124029"&gt;www.bloggernews.net/124029&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;15.11.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.google.co.in/#hl=en&amp;amp;source=hp&amp;amp;biw=-1276&amp;amp;bih=843&amp;amp;=dr+babasaheb+ambedkar+wallpaper&amp;amp;aq=4&amp;amp;aqi=gl0&amp;amp;aql=&amp;amp;oq=dr+babas&amp;amp; gs_ rfai=&amp;amp;fp=e791fe993fa412ba"&gt;http://www.google.co.in/#hl=en&amp;amp;source=hp&amp;amp;biw=-1276&amp;amp;bih=843&amp;amp;=dr+babasaheb+ambedkar+wallpaper&amp;amp;aq=4&amp;amp;aqi=gl0&amp;amp;aql=&amp;amp;oq=dr+babas&amp;amp; gs_ rfai=&amp;amp;fp=e791fe993fa412ba&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.cinemahd.net/desktopenhancements/wallpaper/23945-wallpapers-beautiful-girl-wallpaper.html"&gt;http://www.cinemahd.net/desktopenhancements/wallpaper/23945-wallpapers-beautiful-girl-wallpaper.html&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.chakpak.com/find/images/kamasutra-hindi-movie"&gt;http://www.chakpak.com/find/images/kamasutra-hindi-movie&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.submitlink.khatana.net/2010/09/jennifer-stano-is-engaged-to.html"&gt;http://www.submitlink.khatana.net/2010/09/jennifer-stano-is-engaged-to.html&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.result.khatana.net/2010/11/im-no-panty-girl-yana-gupta-wardrobe.html"&gt;http://www.result.khatana.net/2010/11/im-no-panty-girl-yana-gupta-wardrobe.html&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.facebook.com/pages/I-Hate-Ambedkar/172025102828076"&gt;http://www.facebook.com/pages/I-Hate-Ambedkar/172025102828076&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;25.02.2011&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.indvbav.org/"&gt;&amp;nbsp;&lt;/a&gt;&lt;a class="external-link" href="http://www.indybay.org/"&gt;www.indybay.org&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;17.03.2011&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;a class="external-link" href="http://www.arizona.indymedia.org/"&gt;www.arizona.indymedia.org&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;17.03.2011&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/li&gt;&lt;li&gt;Please provide a list of all the persons to whom such orders were issued.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - The directions were issued to Department of Telecommunications.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide a list of all the requests for blocking of information that have been received by the Designated Officer under the Information Technology (Procedures and Safeguards for Blocking Access of Information by Public) Rules, 2009 ("Rules").&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide a list of all persons/authorities from whom the Designated Officer under the Rules has received requests for blocking of information and the dates these requests were received.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply 4 &amp;amp; 5&lt;/strong&gt; - The details are given in Annexure-II.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide the files on all the complaints and requests that have been rejected,&amp;nbsp;including file noting.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide the files on all the complaints and requests that have been&amp;nbsp;accepted, including file noting.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide the files on all the complaints and requests that are still being&amp;nbsp;processed (e.g. more information has been sought on the request), including file notings.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply 6,7 &amp;amp; 8&lt;/strong&gt; - Files are available in section and can be viewed.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide us copies of the minutes of all meetings held by the Committee for&amp;nbsp;Examination of Requests under Rule 8(4) of the Rules.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide copies of all the recommendations of the Committee for Examination&amp;nbsp;of requests under Rule 8(4) of the Rules.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply 9 &amp;amp; 10&lt;/strong&gt; - &amp;nbsp;Copy of the minutes/recommendation of the meeting of the Committee is&amp;nbsp;at Annexure III.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide us the dates and copies of the minutes of all meetings held by the&amp;nbsp;Review Committee under Rule 14 of the Rules to periodically review the blocked&amp;nbsp;resources.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide us copies of all the findings of the Review Committee.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;If the Review Committee has not met, please provide us the reason for the meetings&amp;nbsp;not happenings as per the requirement of Rule 14 of the Rules.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply 11, 12 &amp;amp; 13&lt;/strong&gt; - This meeting is coordinated by Department of Telecommunications&amp;nbsp;and DIT is not in possession of details.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Does "intermediary" in Rule 13 include intermediaries not located in India?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; -&amp;nbsp;Such type of information is not permitted under RTI Act as per DOPT OM No. 1/7/2009 - IR dated 1st June 2009.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Has any block ordered by the DIT ever been revoked by the DIT or any other&amp;nbsp;governmental authority?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Such questions are not permitted under RTI Act as per DOPT OM No. 1 /7/2009&amp;nbsp;IR dated 1st June 2009.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;On what basis does the DIT decide whether the appropriate intermediary is the person&amp;nbsp;who has put up content, the web host, or the different Internet service providers in India?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Such type of information is not permitted under RTI Act as per DOPT OM No. 1/7/2009 - IR dated 1st June 2009.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Does Rule 16 of the Rules override the Right to Information Act?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Such type of information is not admissible under RTI Act as per DOPT OM No. 1/7/2009 - IR dated 1st June 2009.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;If the answer to the previous question is yes, please provide any correspondence with any legal officer who provided the DIT advice that it could override the Right to Information Act through delegated legislation.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Such type of information is not admissible under RTI Act as per DOPT OM No. 1/7/2009 - IR dated 1st June 2009.&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;Annexure II&lt;/h2&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-style-span"&gt;Request received by Designated Officer&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;div style="text-align: left;"&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Website&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Date of receipt of request &lt;/strong&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Request by&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/www.tamil.net.in" class="external-link"&gt;www.tamil.net.in&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;29.03.2010&lt;/td&gt;
&lt;td&gt;Secretary Public (Law &amp;amp; Order) Deptt.&lt;br /&gt;Secretariat, Chennai 600 009&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.betfair.com/"&gt;www.betfair.com&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;28.06.2010&lt;/td&gt;
&lt;td&gt;Sr. Inspector, Cyber Crime Cell, &lt;br /&gt;Mumbai&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="https://www.youtube.com/watch?v=tHUNESaC0E4"&gt;http://www.youtube.com/ch?&lt;span class="Apple-style-span"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="external-link" href="https://www.youtube.com/watch?v=tHUNESaC0E4"&gt;wat&lt;/a&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="https://www.youtube.com/watch?v=tHUNESaC0E4"&gt;v=tHUNESaC0E4&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;05.07.2010&lt;/td&gt;
&lt;td&gt;Jt. Commissioner of Police (Crime), &lt;br /&gt;Mumbai&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="http://ulaginazhagiyamuthalpenn.blogspot.com"&gt;http://ulaginazhagiyamuthalpenn.blogspot.com&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;21.07.2010&lt;/td&gt;
&lt;td&gt;Principal Secretary, &lt;br /&gt;IT Department, &lt;br /&gt;Chennai–600 009&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/en.wikipedia.org/Wiki/Sukhbir Singh Badal" class="external-link"&gt;en.wikipedia.org/Wiki/Sukhbir Singh Badal&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;11.08.2010&lt;/td&gt;
&lt;td&gt;Principal Secretary to Govt. of Punjab, &lt;br /&gt;Dept. of IT, &lt;br /&gt;Chandigarh&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.exbii.com"&gt;http://www.exbii.com&lt;/a&gt;&lt;br /&gt;&lt;a class="external-link" href="http://www.topix.net/"&gt;http://www.topix.net&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;05.10.2010&lt;/td&gt;
&lt;td&gt;Commissioner, &lt;br /&gt;Maharashtra State, &lt;br /&gt;Colaba, Mumbai–400 001&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="http://ashsyumul.blogspot.com/2009/12/penginaan-terhadap-islam.html"&gt;http://ashsyumul.blogspot.com/2009/12/penginaan-terhadap-islam.html&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;20.08.2010&lt;/td&gt;
&lt;td&gt;Shri Haneef Ali, &lt;br /&gt;State President, &lt;br /&gt;Bharatiya Janata Minority Morcha, &lt;br /&gt;Andhra Pradesh&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.angelsofindia.com/"&gt;http://www.angelsofindia.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.adult-gals.com/"&gt;http://www.adult-gals.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianangels.net/"&gt;http://www.indianangels.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.arabexposed.com/"&gt;http://www.arabexposed.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indiamafia.com/"&gt;http://indiamafia.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianasfuckers.com/"&gt;http://www.indianasfuckers.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianpronvideos.in/"&gt;http://www.indianpronvideos.in/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.peterporntube.com/"&gt;http://www.peterporntube.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.bollywood-sex.net/"&gt;http://www.bollywood-sex.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianworldsex.com/"&gt;http://www.indianworldsex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indianhomevideo.com/"&gt;http://indianhomevideo.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indian-pakistani-girls.com/"&gt;http://indian-pakistani-girls.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indianvidz.com/"&gt;http://indianvidz.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianparadise.net/"&gt;http://indianparadise.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://bollywoodscandals.net/"&gt;http://bollywoodscandals.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indiansexpics.net/"&gt;http://indiansexpics.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-hardcore-movies.com/"&gt;http://www.indian-hardcore-movies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.bollywoodnudesex.net/"&gt;http://www.bollywoodnudesex.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.bangmyindianwife.com/"&gt;http://www.bangmyindianwife.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-angel-teens.com/"&gt;http://www.indian-angel-teens.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://south-indian-sex.com/"&gt;http://south-indian-sex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianseduction.com/"&gt;http://www.indianseduction.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indiansexuniversity.com/"&gt;http://www.indiansexuniversity.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianpassion.com/"&gt;http://www.indianpassion.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://fuckmyindianass.com/"&gt;http://fuckmyindianass.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indiansexwebcams.com/"&gt;http://indiansexwebcams.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://exoticpics4u.com/"&gt;http://exoticpics4u.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianfreesexmovies.com/"&gt;http://www.indianfreesexmovies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.newsindiansexmovies.com/"&gt;http://www.newsindiansexmovies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.peterporn.net/"&gt;http://www.peterporn.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.3xindianmovies.com/"&gt;http://www.3xindianmovies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.amateur-indian-girls.com/"&gt;http://www.amateur-indian-girls.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.bollywoodhardcore.net/"&gt;http://www.bollywoodhardcore.net&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indiansexpost.com/"&gt;http://www. indiansexpost.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.desi-amateurs.com/"&gt;http://www.desi-amateurs.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.3xasianmovies.com/"&gt;http://www.3xasianmovies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://allindiansex.com/"&gt;http://allindiansex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indiapornmovies.com/"&gt;http://www.indiapornmovies.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.3xindiansex.com/"&gt;http://www.3xindiansex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianxclips.com/"&gt;http://www.indianxclips.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indiansexvideos.org/"&gt;http://indiansexvideos.org&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.pureindianporn.com/"&gt;http://www.pureindianporn.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indian-porn-sex.com/"&gt;http://indian-porn-sex.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.newsindianpornmovies.com/"&gt;http://www.newsindianpornmovies.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://juicyindiangirls.com/"&gt;http://juicyindiangirls.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www/hardcoreindiansex.net/"&gt;http://www/hardcoreindiansex.net&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://bollywoodboobs.com/"&gt;http://bollywoodboobs.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indianmovietgp.com/"&gt;http://indianmovietgp.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.365indian.com/"&gt;http://www.365indian.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-sex-hoes.com/"&gt;http://www.indian-sex-hoes.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-sex-photos.net/"&gt;http://www.indian-sex-photos.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-free-sex.com/"&gt;http://www.indian-free-sex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-sex-movies.org/"&gt;http://www.indian-sex-movies.org&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://ww.tamil-sex-movies.net/"&gt;http://ww.tamil-sex-movies.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianteens.org/"&gt;http://www.indianteens.org/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://secredir.com/?sov=rook-sexyindianbooty.com"&gt;http://www.sexyindianbooty.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianposing.com/"&gt;http://www.indianposing.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.pornhub.com/"&gt;http://www.pornhub.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianpornhub.com/"&gt;http://www.indianpornhub.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;a class="external-link" href="http://www.exvideos.com"&gt;http://www.exvideos.com&amp;nbsp;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;25.11.2010&lt;/td&gt;
&lt;td&gt;Jt.Commissioner of Police (Crime), Mumbai&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;h2&gt;Annexure III&lt;/h2&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Minutes of the meeting held on 24-08-2010 for the request for blocking of website &lt;a class="external-link" href="http://www.betfair.com/"&gt;www.betfair.com&lt;/a&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;A meeting of "Committee for examination of request"&amp;nbsp;constituted under the provisions of Information Technology&amp;nbsp;(Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009&amp;nbsp;under section 69A of the Information Technology Act, 2000 was held on 24.08.2010 at&amp;nbsp;Electronics Niketan. New Delhi to examine the Request sent by Government of Maharashtra to block the website&amp;nbsp;&lt;a class="external-link" href="http://www.betfair.com"&gt;www.betfair.com&lt;/a&gt;. The meeting was participated by the following members:&lt;/div&gt;
&lt;ol&gt;&lt;li&gt;Dr. Gulshan Rai, Group Coordinator, Department of Information Technology&lt;/li&gt;&lt;li&gt;Shri Dharmendra Sharma, Joint Secretary, Ministry of Home Affairs&lt;/li&gt;&lt;li&gt;Shri Arvind Kumar, Joint Secretary, Ministry of Information &amp;amp; Broadcasting&lt;/li&gt;&lt;li&gt;Shri Ashok C. Prakash, Additional L.A., Department of Legal Affairs&lt;/li&gt;&lt;li&gt;Shri B.J. Srinath, Sr. Director, CERT-In&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;The Committee discussed the case and observed that Govt. of Maharashtra has requested for blocking of website &lt;a class="external-link" href="http://www.betfair.com"&gt;www.betfair.com&lt;/a&gt; on the grounds of "public order". The Committee also noted the reply from Cyber Crime Cell, Mumbai that no case has been registered against &lt;a class="external-link" href="http://www.betfair.com"&gt;www.betfair.com&lt;/a&gt;. Further, no details suggesting the "impact" of the said site on public order has been made available by the State Government.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Keeping in view the directions of the Hon'ble High Court to dispose the application strictly as per law, the Committee assessed that based on the data/facts/details provided by Government of Maharashtra and Cyber Crime Cell, Mumbai, violation of section 69A of the Information Technology Act, 2000 is not being established.&amp;nbsp;&lt;/p&gt;
&lt;p class="callout"&gt;&lt;strong&gt;Download a scanned version of the letter received from the DIT office &lt;a href="https://cis-india.org/internet-governance/request-for-website-blocking.pdf" class="internal-link" title="Request for Blocking of Websites"&gt;here&lt;/a&gt; &lt;/strong&gt;[PDF, 1.74 MB]&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking'&gt;https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>RTI</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2011-10-28T14:37:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet">
    <title>Terror recruiters target Indians on internet</title>
    <link>https://cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet</link>
    <description>
        &lt;b&gt;What's in a name? If it indicates your religious identity, then you could get trolled by strangers wanting to draw you in with videos on the importance of archaic customs and doctored accounts of world history.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sandhya Soman was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/india/Terror-recruiters-target-Indians-on-internet/articleshow/38565102.cms"&gt;published in the Times of India&lt;/a&gt; on July 18, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;City-based lawyer Shakeel Ahmed recently took one such bait on the Holocaust from a stranger on WhatsApp just to know what kind of propaganda is in circulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I can laugh at such videos and false images but they might confuse youngsters," says Ahmed. Online baiting to lure sympathizers and recruits by seasoned extremists has been on the police radar. If the four youngsters from Thane and Kalyan are indeed now in Iraq fighting for the Islamic militia ISIS, then a good part of their indoctrination could have happened online, say experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ISIS is known to have an aggressive social media policy, including an Arabic-language Twitter app, to spread their message and recruit supporters even after the Iraqi government curtailed internet in areas captured by the group recently. "There are many websites, including jihadi ones, favoured by people with extremist leanings," says Anti-Terrorism Squad (ATS) chief Himanshu Roy. Often, the initial contact is made on social networking sites and messenger services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The organizations spot youngsters and befriend them before inviting the trusted select to closed chat rooms," says K P Raghuvanshi, senior police official and former ATS head.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion ranges from arranging finance to direct involvement, says Roy. "We have reason to believe that these four boys, who are all educated and come from reasonably well-off families, would have visited such sites and exchanged views with others," he says, refusing to elaborate. The youngsters are supposed to have been in touch with each other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Those without a wide social network are easy targets, says Sunil Abraham, executive director of Centre for Internet and Society, a research organization. "If, as a young Muslim, you are in touch with only your friends and family, you might believe the false information that enters your circle of trust," he says. Contrary to belief, you don't meet a variety of people on social media. "Unless you have a critical understanding of internet, the medium with its interactivity and multi-media potential could aid propaganda," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was terrorist group Al-Qaeda that started using technology effectively since 2001. Its supporters came together to upload good quality videos of beheadings and suicide bombings to grab attention. Now, there is a variety of 'jihadist' software to prevent detection, whether it is a plug-in for instant messaging service, encryption for text messages or a stealth online network, according to media reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, terrorists took to technology in a big way from 2008 onwards when Indian groups like Indian Mujahideen recruited educated people, says an official. "Even a man who didn't know English, learnt to type Hindi using English alphabets and send and receive attachments," says the officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While officials say that it is difficult to monitor all the online activity, Roy says that ATS will tackle it. "This is the first instance of youngsters from Maharashtra going out to fight some other war," he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet'&gt;https://cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-07-18T06:57:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/policies/website-use">
    <title>Terms of Website Use</title>
    <link>https://cis-india.org/about/policies/website-use</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;h2&gt;Parties and Ownership&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;These Terms of Website Use (&lt;b&gt;"Terms"&lt;/b&gt;) is made between the Centre for Internet &amp;amp; Society (&lt;b&gt;"CIS"&lt;/b&gt;) and you.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In these Terms, all references to "&lt;b&gt;you&lt;/b&gt;" or "&lt;b&gt;user&lt;/b&gt;" shall mean the end-user accessing the Website, its contents and using the services offered through the Website. "&lt;b&gt;Service providers&lt;/b&gt;" mean independent third party service providers. All references to "&lt;b&gt;we&lt;/b&gt;", "&lt;b&gt;us&lt;/b&gt;" and "&lt;b&gt;our&lt;/b&gt;" shall mean CIS.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The domain name www.cis-india.org ("&lt;b&gt;Website&lt;/b&gt;") is owned by CIS. CIS offers this web site, including all information, tools and services available from this site, to you, the user, conditioned upon your acceptance of all the terms, conditions, policies and notices stated here. Your use of this site indicates that you have read, acknowledged and agreed to these Terms.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Due Diligence&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;These Terms are published in compliance with Rule 3(1) of the Information Technology (Intermediaries Guidelines) Rules, 2011 notified by the Central Government in the Gazette of India Extraordinary vide Notification GSR 314(E) on 11 April 2011 ("&lt;b&gt;Intermediaries Rules&lt;/b&gt;"). These Terms constitute an electronic record for the purposes of the Information Technology Act, 2000 ("&lt;b&gt;IT Act&lt;/b&gt;").&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;You agree that you will &lt;span style="text-decoration: underline;"&gt;not&lt;/span&gt; host, display, upload, modify, publish, transmit, update or share any information that:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;belongs to another person and to which you do not have any right to;&lt;/li&gt;
&lt;li&gt;is grossly harmful, harassing, blasphemous defamatory, obscene, pornographic, paedophilic, libellous, invasive of another's privacy, hateful, racially or ethnically objectionable, disparaging, relating or encouraging money laundering or gambling, or otherwise unlawful in any manner whatever;&lt;/li&gt;
&lt;li&gt;harms minors in any way;&lt;/li&gt;
&lt;li&gt;infringes any patent, trademark, copyright or other proprietary rights;&lt;/li&gt;
&lt;li&gt;violates any law for the time being in force;&lt;/li&gt;
&lt;li&gt;deceives or misleads the addressee about the origin of such messages or communicates any information which is grossly offensive or menacing in nature;&lt;/li&gt;
&lt;li&gt;impersonates another person;&lt;/li&gt;
&lt;li&gt;contains software viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer resource; or,&lt;/li&gt;
&lt;li&gt;threatens the unity, integrity, defence, security or sovereignty of India, friendly relations with foreign states, or public order or causes incitement to the commission of any cognisable offence or prevents investigation of any offence or is insulting to any other nation.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;You agree that in the event of any non-compliance with these Terms, we have the right to immediately terminate your access or usage rights to this Website and our services and/or remove any information that is, or is deemed by us to be, non-compliant.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Use of this Website&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Unauthorised use of this Website, any information contained therein and unauthorised entry into our systems is strictly prohibited. You may not use contact information provided on this Website for unauthorized purposes, including marketing. You may not use any hardware or software intended to damage or interfere with the proper working of this Website or to surreptitiously intercept any system, data or personal information from this Website. You agree not to interrupt or attempt to interrupt the operation of this Website in any way.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;We reserve the right, in our sole discretion, to limit or terminate your access to or use of this Website at any time without notice. Termination of your access or use will not waive or affect any other right or relief to which we may be entitled at law or in equity.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;You represent and warrant that you own or otherwise control all the rights to the content you supply; that the content is accurate; that use of the content you supply does not violate any provision herein and will not cause injury to any person or entity; and that you will indemnify us for all claims resulting from content you supply.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;You shall comply, and cause compliance, with all applicable provisions of any law, statute, ordinance, order, rule, regulation, bye-law, notification, custom, circular, press note, policy or other usage or mandatory requirement having, in the territory of India, the force of law.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Information on this Website&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;We are not responsible if information made available on this Website is not accurate, complete or current. The material on this Website is provided for general information only and should not be relied upon or used as the sole basis for making decisions without consulting primary, more accurate, more complete or timelier sources of information. Any reliance on the material on this Website is at your own risk. This Website may contain information that has typographical errors or inaccuracies. This Website may contain certain historical information. Historical information is provided for your reference only. We reserve the right to modify the contents of this Website at any time, but we have no obligation to update any information on this Website. You agree that it is your responsibility to monitor changes to this Website. Your use of this Website constitutes agreement to all such changes. We may discontinue or change any product or service described or offered on this Website at any time.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Trademarks, Copyright and Other Proprietary Rights&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;You or third parties acting on your behalf are not allowed to frame this site or use our proprietary marks as meta tags, without our written consent. These marks include, but are not limited to:&lt;br /&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_logo.jpg/@@images/6aeb5910-e761-415d-9df0-efe1d60a3c94.jpeg" alt="CIS Logo" class="image-inline" title="CIS Logo" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
You may not use frames or utilize framing techniques or technology to enclose any content included on the site without our express written consent. Further, you may not utilize any site content in any meta tags or any other "hidden text" techniques or technologies without our express written consent.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Trademarks, logos and service marks displayed on this site are registered and unregistered trademarks of ours and our partners, sponsors, content providers, or other third parties. All of these trademarks, logos and service marks are the property of their respective owners. Nothing on this site shall be construed as granting, by implication, estoppel, or otherwise, any license or right to use any trademark, logo or service mark displayed on the site without the owner's prior written permission, except as otherwise described herein. We reserve all rights not expressly granted in and to the site and its content.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Disclaimer of Warranties&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Your use of this Website is at your sole risk. This Website is provided on an "as is" basis. We reserve the right to restrict or terminate your access to this Website or any feature or part thereof at any time. We expressly disclaim all warranties of any kind, whether express or implied, including but not limited to the implied warranties of merchantability and fitness for a particular purpose and any warranties that materials on this Website are non-infringing, as well as warranties implied from a course of performance or course of dealing; that access to this Website will be uninterrupted or error-free; that this Website will be secure; that the site or the server that makes this Website available will be virus-free; or that information on this Website will be complete, accurate or timely. If you download any materials from this Website, you do so at your own discretion and risk. You will be solely responsible for any damage to your computer system or loss of data that results from the download of any such materials. No advice or information, whether oral or written, obtained by you from us shall create any warranty of any kind. We do not make any warranties or representations regarding the use of the materials on this Website in terms of their completeness, correctness, accuracy, adequacy, usefulness, timeliness, reliability or otherwise.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Limitation of Liability&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;You acknowledge and agree that you assume full responsibility for your use of this Website. You acknowledge and agree that any information you send or receive during your use of this Website may not be secure and may be intercepted by unauthorized parties. You acknowledge and agree that your use of this Website is at your own risk. Recognizing such, you acknowledge and agree that, to the fullest extent permitted by applicable law, neither we, our partners, sponsors or content providers will be liable for any direct, indirect, punitive, exemplary, incidental, special, consequential or other damages arising out of or in any way related to this Website, or any other site you access through a link from this Website or from any actions we take or fail to take as a result of communications you send to us, or the delay or inability to use this Website, or for any information, products or services advertised in or obtained through this Website, removal or deletion of any materials submitted or posted on this Website, or otherwise arising out of the use of this Website, whether based on contract, tort, strict liability or otherwise, even if we, our affiliates or any of our suppliers have been advised of the possibility of damages.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;This disclaimer applies, without limitation, to any damages or injury arising from any failure of performance, error, omission, interruption, deletion, defects, delay in operation or transmission, computer viruses, file corruption, communication-line failure, network or system outage, your loss of profits, or theft, destruction, unauthorized access to, alteration of, loss or use of any record or data, and any other tangible or intangible loss. You specifically acknowledge and agree that neither we nor our suppliers shall be liable for any defamatory, offensive or illegal conduct of any user of this Website. Your sole and exclusive remedy for any of the above claims or any dispute with us is to discontinue your use of this Website. Subject to the terms of the Limitation Act, 1963, you agree that any cause of action arising out of or related to the site must commence within one (1) year after the cause of action accrues otherwise the cause of action is permanently barred.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Indemnification&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;You agree to indemnify us, defend us and hold us harmless, including our affiliates and our officers, members, directors, employees, consultants, contractors, agents, licensors, service providers, subcontractors and suppliers from and against any and all losses, liabilities, expenses, damages and costs, including reasonable attorneys' fees and court costs, arising or resulting from your use of this Website and any violation of these Terms. If you cause a technical disruption to this Website or the systems transmitting this Website to you or others, you agree to be responsible for any and all losses, liabilities, expenses, damages and costs, including reasonable attorneys' fees and court costs, arising or resulting from that disruption. We reserve the right to assume exclusive defence and control of any matter otherwise subject to indemnification by you and, in such an event, you agree to cooperate with us in the defence of such matter.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Governing Law, Jurisdiction and Definitive Agreement&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;This Website is controlled, operated and administered within India. We do not make any representation that materials on this Website are appropriate or available for use at other locations outside India and access to them from territories where their contents are illegal is prohibited. You may not use this Website in violation of Indian laws. If you access this Website from locations outside India, you are responsible for compliance with all local laws. These Terms shall be governed by the laws of India, without giving effect to its conflict of laws provisions. You agree that the courts at Bangalore shall have exclusive jurisdiction to settle any dispute or claim that arises out of or in connection with your use of this Website and these Terms.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;These Terms constitute the entire and definitive agreement between you and us with respect to your use of this Website. If for any reason a court of competent jurisdiction finds any provision of these Terms, or portion thereof, to be unenforceable, that provision shall be enforced to the maximum extent permissible so as to give effect to the intent of these Terms, and the remainder of these Terms shall continue in full force and effect.&lt;/li&gt;
&lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
&lt;div id="_mcePaste"&gt;﻿&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/policies/website-use'&gt;https://cis-india.org/about/policies/website-use&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-07-01T07:16:15Z</dc:date>
   <dc:type>Page</dc:type>
   </item>




</rdf:RDF>
