<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 546 to 560.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/death-by-whatsapp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/is-privacy-obsolete"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-june-19-2018-anushka-finds-support-her-anti-litter-tirade"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-telecom-commercial-communications-customer-preference-regulations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/niti-aayog-discussion-paper-an-aspirational-step-towards-india2019s-ai-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/economic-times-june-10-2018-sunil-abraham-why-npci-and-facebook-need-urgent-regulatory-attention"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/network-disruptions-report-by-global-network-initiative"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-quint-june-9-2018-draft-bill-seeks-to-revolutionise-data-collection-storage-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-draft-national-policy-on-official-statistics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/comments-on-draft-national-policy-on-official-statistics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-june-6-2018-akshatha-m-ec-disables-easy-access-to-electoral-data-across-states"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/times-of-india-june-1-2018-allow-admins-to-add-users-to-online-group-chats-only-after-permission-sflc-in"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-manavi-kapur-alnoor-peermohamed-may-31-2018-patanjali-s-kimbho-swiftly-retreats-over-security-scare-ripped-on-twitter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-rajitha-menon-surupasree-sarmmah-dont-blindly-forward-whatsapp-messages-you-could-be-sued"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/india-spend-madhur-singh-may-31-2018-india-proposes-law-to-give-indians-complete-control-of-their-digital-data"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/death-by-whatsapp">
    <title>Death By WhatsApp</title>
    <link>https://cis-india.org/internet-governance/news/death-by-whatsapp</link>
    <description>
        &lt;b&gt;The fatal messages were both in text and in audio. They were in Telugu, Kannada, Tamil, Hindi, Assamese and Gujarati among others.&lt;/b&gt;
        &lt;p&gt;This was published by News18.com on June 25, 2018. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;div class="main"&gt;&lt;section class="standar"&gt;
&lt;div class="article"&gt;
&lt;div class="chat"&gt;
&lt;p class="guest-chat chat-item"&gt;Guys please be on high alert&lt;span class="time" style="float: right; "&gt;10:24 PM&lt;/span&gt;&lt;/p&gt;
&lt;p class="guest-chat chat-item"&gt;Three kids were kidnapped from my friend’s area this morning.. There were 10 guys giving biscuits and people from that area have caught all 10 n 5 more based on their info...&lt;span class="time" style="float: right; "&gt;10:24 PM&lt;/span&gt;&lt;/p&gt;
&lt;p class="guest-chat chat-item"&gt;Cops arrived at scene and informed that 400 people have landed in Hyderabad (or Bangalore or Chennai or KarbiAnglong or Singhbhum or any other place) for child trafficking. Check my next video and repost. Parents pls be on high alert.&lt;span class="time" style="float: right; "&gt;10:25 PM&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;/div&gt;
&lt;p&gt;&lt;span&gt;The Snowball Effect&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;section class="standar"&gt;
&lt;div class="article"&gt;
&lt;p&gt;No one had any idea where the messages originated from or who was the original sender. But when it comes to the safety of one’s children, these questions become irrelevant.&lt;/p&gt;
&lt;p&gt;Maybe, if someone had stopped to ask these questions, this fake WhatsApp message wouldn’t have led to 22 murders in one year. These 22 ‘outsiders’ were lynched by mobs on the mere suspicion of being the non-existent ‘child lifters’.&lt;/p&gt;
&lt;p&gt;Phony as a three-dollar bill, the message spread like forest fire from Jharkhand to Tamil Nadu and Assam to Gujarat. In each state, it preyed on the raging ‘local versus outsider’ sentiment. It started doing the rounds of southern states around the time when political discourse was hijacked by the ‘North versus South’ debate.&lt;/p&gt;
&lt;p&gt;It might be easy now to scoff at those who believed and further shared the fake message, but hindsight is always a perfect 20/20.&lt;/p&gt;
&lt;p&gt;In fact, according to a research by University of Warwick, 40% of fake news cannot be spotted by average educated adults. Even if they do feel something is amiss, only 45% adults can place their finger on what exposes the news as fake.&lt;/p&gt;
&lt;blockquote style="text-align: center; "&gt;Social media and internet penetration have only aggravated the problem in India, where the written word is rarely doubted.&lt;/blockquote&gt;
&lt;p&gt;Social media and internet penetration have only aggravated the problem in India, where the written word is rarely doubted.&lt;/p&gt;
&lt;section class="creative fullContent" style="text-align: center; "&gt;&lt;/section&gt;
&lt;p&gt;In the last four years, social media usage in the country has gone up by 150% with an 83% increase in smartphone ownership. Such proliferation and the availability of competitive data plans have ensured digital intrusion in areas where people have had no exposure to the concept of fake news or digital privacy.&lt;/p&gt;
&lt;p&gt;Caveat emptor does not apply in this case, says Sunil Abraham, the Executive Director of Bangalore-based research organisation Centre for Internet and Society.&lt;/p&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;a id="timeline"&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;section class="standar"&gt;
&lt;div class="article"&gt;
&lt;h3&gt;A Timeline of Deaths&lt;/h3&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;iframe frameborder="0" height="650" src="https://cdn.knightlab.com/libs/timeline3/latest/embed/index.html?source=1d_HmPpGkzy1jK9MI83KY2I0FF8uPTuLVVcoPhSDKDkA&amp;amp;font=Default&amp;amp;lang=en&amp;amp;initial_zoom=2&amp;amp;height=650" width="100%"&gt;&lt;/iframe&gt;&lt;span&gt; &lt;/span&gt;&lt;section class="standar"&gt;
&lt;div class="article"&gt;&lt;/div&gt;
&lt;/section&gt;&lt;a id="propaganda"&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;section class="propaganda fullContent" style="text-align: center; "&gt;&lt;/section&gt;&lt;section class="intro" style="text-align: center; "&gt;
&lt;h3&gt;CHAPTER 1&lt;/h3&gt;
&lt;h1&gt;The Propaganda Machine&lt;/h1&gt;
&lt;/section&gt;&lt;section class="standar"&gt;
&lt;div class="article"&gt;
&lt;p&gt;WhatsApp has unfortunately become a fertile breeding ground for parasites that prey on fear. At present, it has 200 million active users. These users are potential victims of fake news given the complex form of anonymity that WhatsApp offers. It is mainly to arrest the fake news propaganda that the first step in violence-hit areas is to suspend internet services.&lt;/p&gt;
&lt;p&gt;In this case, too, the original culprits took cover in this anonymity and experts believe they may never be unmasked. While Facebook and other social media websites are under pressure to address the menace, an inter-personal software, such as WhatsApp, skirts the scanner.&lt;/p&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;section class="standard" style="text-align: center; "&gt;
&lt;div class="flourish-embed"&gt;&lt;iframe frameborder="0" scrolling="no" src="https://public.flourish.studio/visualisation/63741/embed?auto=1"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;/section&gt;&lt;section class="standar"&gt;
&lt;div class="article"&gt;
&lt;p&gt;“Those who are passing the rumours cannot be traced or haven’t been traced purely because they are on WhatsApp groups. My guess is that they would have started it (the rumours) on WhatsApp because it is difficult to trace. Once it starts, it (the message) makes its way to everywhere. Somebody gets it on WhatsApp, they put it on their Facebook profile or forward to other WhatsApp users. It goes across multiple platforms. It is not limited to one platform,” says Alt News co-founder Pratik Sinha.&lt;/p&gt;
&lt;blockquote style="text-align: center; "&gt;Those who are passing the rumours cannot be traced or haven’t been traced purely because they are on WhatsApp groups&lt;/blockquote&gt;
&lt;p&gt;Given its penetration, WhatsApp has emerged as a cheap medium to propagate hate.&lt;/p&gt;
&lt;p&gt;Police officials investigating the murder of senior journalist and Left-leaning thinker Gauri Lankesh in Bengaluru were surprised to find out that a key suspect was an ‘admin’ for hundreds of groups.&lt;/p&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;section class="standard" style="text-align: center; "&gt;
&lt;div class="flourish-embed"&gt;&lt;iframe frameborder="0" scrolling="no" src="https://public.flourish.studio/visualisation/63722/embed?auto=1"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;/section&gt;&lt;section class="standar"&gt;
&lt;div class="article"&gt;
&lt;p&gt;KT Naveen Kumar, a college dropout, floated his outfit ‘Hindu Yuva Sena’ in Mandya near Bengaluru three years ago. The Hindutva activist confessed to the police that he created several WhatsApp groups — Hindu Yuva Sena, Jago Hindu Maddur, Bajrang Maddur and Kaveri Boys among others — to propagate his ‘Save Hinduism’ agenda.&lt;/p&gt;
&lt;p&gt;Once you create a WhatsApp group and add ‘participants’, you are free to make others the ‘admin’, who in turn can add scores of people to the group. There is no known cap to the number of participants in a WhatsApp group.&lt;/p&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;section class="intro" style="text-align: center; "&gt;
&lt;p style="text-align: left; "&gt;&lt;strong&gt;How To Spot Fake News&lt;/strong&gt;&lt;/p&gt;
&lt;/section&gt;&lt;section class="standar"&gt;
&lt;div class="article"&gt;
&lt;div class="embed-container"&gt;&lt;iframe frameborder="0" src="https://www.youtube.com/embed//jIBYG9Lr2ps"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;a id="jharkhand"&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;section class="jharkhand fullContent" style="text-align: center; "&gt;&lt;/section&gt;&lt;section class="intro" style="text-align: center; "&gt;
&lt;h3&gt;CHAPTER 2&lt;/h3&gt;
&lt;h1&gt;Jharkhand&lt;/h1&gt;
&lt;/section&gt;&lt;section class="standar"&gt;
&lt;div class="article"&gt;
&lt;p&gt;The fake message on ‘child lifters’ added fuel to fire in Jharkhand, which has been plagued by child abductions and kidnappings for years. Young girls from the state have been known to be abducted and forced into modern-day slavery in other states.&lt;/p&gt;
&lt;p&gt;Villagers, who had never heard of the concept of fake news, bought into the rumours. And since a photo can say a 1,000 fake words as well, graphic images freely available on the internet were used alongside the message. The propaganda did the trick and aroused murderous rage among the local tribal population.&lt;/p&gt;
&lt;p&gt;At least nine people were killed in separate incidents over as many days in Singhbhum district. Angry mobs beat and hacked the victims to death, assuming they were saving their young ones from ‘child lifting’ gangs that were rumoured to be abducting children for organ trade.&lt;/p&gt;
&lt;p&gt;The death toll would have been higher had protest marches against the fake news and the killings not been held in cities like Jamshedpur. While these protests did not get the police to act against hate mongers on social media, the uproar publicised the fact that the message was a fake one.&lt;/p&gt;
&lt;p&gt;Over the next few days, alleged ‘child lifters’ were caught in other villages, but were duly handed over to the police.&lt;/p&gt;
&lt;p&gt;The disinformation campaign died a natural death in Jharkhand, but moved to a new hunting ground.&lt;/p&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;a id="tamilnadu"&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;section class="tamilnadu fullContent" style="text-align: center; "&gt;&lt;/section&gt;&lt;section class="intro" style="text-align: center; "&gt;
&lt;h3&gt;CHAPTER 3&lt;/h3&gt;
&lt;h1&gt;Tamil Nadu&lt;/h1&gt;
&lt;/section&gt;&lt;section class="standar"&gt;
&lt;div class="article"&gt;
&lt;p&gt;More than 2,000 km from Jharkhand, the message landed in Tamil Nadu with an additional detail — be wary of ‘North India people’. It warned of a gang of 400 ‘North Indians’ out to lure children for organ trade. These people, the message added, may try to gain entry inside homes on the pretext of being repair men or hawkers. Again, the images of mutilated bodies did the trick.&lt;/p&gt;
&lt;p&gt;No one stopped to think whether a ‘gang of 400 outsiders’ could travel undetected. No one called the 100 helpline to confirm the rumour with the police. The mere ‘police-arrived-at-the-scene’ was enough to convince people of its authenticity.&lt;/p&gt;
&lt;p&gt;A man in Thiruvalluvar, north of Chennai, became the state’s first victim of the fake news. A mob beat him mercilessly and hung him from a bridge in Pulicat on May 10.&lt;/p&gt;
&lt;blockquote style="text-align: center; "&gt;The mob didn’t even give her a chance to be heard.&lt;/blockquote&gt;
&lt;p&gt;The second lynching came in less than 24 hours. This time the victim was an elderly woman identified as Rukmani in the temple town of Thiruvannamalai. She was returning from a temple visit with her relatives when they stopped their car at a village. Rukmani was handing out ‘foreign chocolates’ to local children when word spread that a woman was ‘luring’ kids with sweets.&lt;/p&gt;
&lt;p&gt;“The mob didn’t even give her a chance to be heard. Giving out chocolates to children doesn’t make you a child trafficker. I’m scared to even step out after this incident,” says a relative who was in the car with Rukmani and was grievously injured.&lt;/p&gt;
&lt;p&gt;Police officials rounded up at least 30 people and charged them with murder.&lt;/p&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;a id="aptelangana"&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;section class="aptelangana fullContent" style="text-align: center; "&gt;&lt;/section&gt;&lt;section class="intro" style="text-align: center; "&gt;
&lt;h3&gt;CHAPTER 4&lt;/h3&gt;
&lt;h1&gt;Andhra Pradesh &amp;amp; Telangana&lt;/h1&gt;
&lt;/section&gt;&lt;section class="standar"&gt;
&lt;div class="article"&gt;
&lt;p&gt;The mob madness spread to Andhra Pradesh and Telangana next, again preying on anti-migrant sentiment. The first attack was reported mid-May when 12 people were suspected to be members of ‘Parthi’ gang, a group notorious for dacoity in Madhya Pradesh and Maharashtra.&lt;/p&gt;
&lt;p&gt;A couple of days later, a mob beat up two beggars in Vishakhapatnam, killing one of them.&lt;/p&gt;
&lt;p&gt;Another horrific attack unfolded in Hyderabad where a transgender was stoned to death by a mob of 200. The victim had travelled from Mahabubnagar district with three others to seek alms in the holy month of Ramzan.&lt;/p&gt;
&lt;p&gt;Soon, the fake news reached other districts. A man visiting a relative in Nizamabad was killed when he failed to give ‘satisfactory’ explanation to the mob about his presence there.&lt;/p&gt;
&lt;p&gt;A murder in Yadadri district of Telangana, an attack on nine people in Vikarabad district and an assault on a woman at the Guntur railway station followed within days.&lt;/p&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;a id="karnataka"&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;section class="karnataka fullContent" style="text-align: center; "&gt;&lt;/section&gt;&lt;section class="intro" style="text-align: center; "&gt;
&lt;h3&gt;CHAPTER 5&lt;/h3&gt;
&lt;h1&gt;Karnataka&lt;/h1&gt;
&lt;/section&gt;&lt;section class="standar"&gt;
&lt;div class="article"&gt;
&lt;p&gt;The mob mentality fuelled by the fake news campaign reached Karnataka, where the ‘local versus outsider’ debate had reached fever pitch during election campaigning.&lt;/p&gt;
&lt;p&gt;WhatsApp users in Bengaluru, India’s Silicon Valley, started receiving warnings on ‘child lifters’ in Kannada.&lt;/p&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;section class="standar"&gt;
&lt;div class="article"&gt;
&lt;div class="chat"&gt;
&lt;p class="guest-chat chat-item"&gt;“Don’t leave your kids unattended..if you find such traffickers, tie them up and call the cops (sic),” one such message advised.&lt;span class="time" style="float: right; "&gt;04:24 PM&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;section class="standar"&gt;
&lt;div class="article"&gt;
&lt;p&gt;A 26-year-old construction labourer from Rajasthan, identified as Kalu Ram, who had come to look for work was tied with a rope, dragged through the streets of Chamarajpet in west Bengaluru. Beaten with bats and other household ‘weapons’, he succumbed to his injuries.&lt;/p&gt;
&lt;p&gt;According to Additional Commissioner (West) BK Singh, India saw a similar kind of 'madness’ 20 years ago with the ‘Ganesha drinking milk’ rumour, but WhatsApp has taken it to a dangerous new height.&lt;/p&gt;
&lt;p&gt;“This hapless man was walking alone. Two persons standing there saw him and started following him to a shop just 100 metres away. Suddenly, a crowd gathered. People brought whatever they could find in their homes — cricket bats, stumps, ropes etc,” Singh says.&lt;/p&gt;
&lt;p&gt;“Once a crowd becomes a mob, you cannot control it. Many of them may be meek persons individually, but they are taken in by the presence of the mob. The mob thinks that if they act collectively, police won’t act and they can get away easily,” Singh adds.&lt;/p&gt;
&lt;blockquote style="text-align: center; "&gt;People brought whatever they could find in their homes — cricket bats, stumps, ropes etc.&lt;/blockquote&gt;
&lt;p&gt;Around 20 people were arrested based on CCTV footage and videos taken by bystanders, who did nothing to help the hapless victim. One of the main accused is 26-year-old Anbu, who has other criminal cases pending against him. Four women and a minor were among those in custody. All of them face murder charges now.&lt;/p&gt;
&lt;p&gt;The spread of the fake news in Tamil Nadu may also have led to the violence.&lt;/p&gt;
&lt;p&gt;Pension Mohalla in Bakshi Garden where the attack took place has a dominant Tamil population. Some of them could have been aware of the rumours before it made its way to Bengaluru. When the WhatsApp messages started doing the Silicon Valley’s rounds, it may have been perceived as a confirmation of the fake news.&lt;/p&gt;
&lt;p&gt;Another person was killed under similar circumstances in Salem. The state witnessed seven more such attacks.&lt;/p&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;a id="assam"&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;section class="assam fullContent" style="text-align: center; "&gt;&lt;/section&gt;&lt;section class="intro" style="text-align: center; "&gt;
&lt;h3&gt;CHAPTER 6&lt;/h3&gt;
&lt;h1&gt;Assam&lt;/h1&gt;
&lt;/section&gt;&lt;section class="standar"&gt;
&lt;div class="article"&gt;
&lt;p&gt;The latest casualty of the fake news was reported in Assam, again a state which deals with anti-migrant sentiment.&lt;/p&gt;
&lt;p&gt;On June 8, two youths from Guwahati were battered to death in Karbi Anglong district on suspicion of being child lifters. Police said Abhijit Nath and Nilutpal Das were on their way to the Kanthe Langshu picnic spot when their vehicle was attacked by a group of men at Panjuri Kachari village, 16 km from Dokmoka town.&lt;/p&gt;
&lt;p&gt;Eyewitnesses said the two boys were brutally beaten with bamboo poles and wood, and tortured to death by a mob of allegedly inebriated villagers.&lt;/p&gt;
&lt;p&gt;“It happened when some locals informed a group of villagers about two men travelling in a black car with an abducted child. These few villagers were drinking in the roadside &lt;em&gt;dhaba&lt;/em&gt; and immediately called upon more people to trace the car and catch them. The mob stopped the car and surrounded the two boys inside. The village elders tried to stop them from beating the boys, but they would not listen,” said a local shopkeeper.&lt;/p&gt;
&lt;blockquote style="text-align: center; "&gt;The two boys were brutally beaten with bamboo poles and wood, and tortured to death by a mob of allegedly inebriated villagers.&lt;/blockquote&gt;
&lt;p&gt;This incident was yet again preceded by paranoia fuelled by WhatsApp forwards. The messages warned people of 'sopadhora' (child lifters) being on the prowl. Many in Karbi Anglong, one of the most backward areas of the country, took those messages as gospel.&lt;/p&gt;
&lt;p&gt;“We have arrested 35 people so far. Some of them are directly involved in the attack, while one has been arrested for posting objectionable content on social media, inciting communal violence soon after the incident took place. There’s no substance to the rumour of ‘sopadhora’ (child lifters) in the area. But it had created a fear psychosis among people here,” says Agarwal.&lt;/p&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h4 class="desktop"&gt;Death By Whatsapp&lt;/h4&gt;
&lt;ul style="list-style-type: none; "&gt;
&lt;li class="link01 item" style="padding-left: 25px; "&gt;&lt;a href="https://www.news18.com/news/immersive/death-by-whatsapp.html#timeline"&gt;&lt;span class="desktop"&gt;TIMELINE OF DEATHS&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li class="link03 item"&gt;&lt;a href="https://www.news18.com/news/immersive/death-by-whatsapp.html#propaganda"&gt;&lt;span class="desktop"&gt;THE PROPAGANDA MACHINE&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li class="link03 item"&gt;&lt;a href="https://www.news18.com/news/immersive/death-by-whatsapp.html#jharkhand"&gt;&lt;span class="desktop"&gt;JHARKHAND&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li class="link03 item"&gt;&lt;a href="https://www.news18.com/news/immersive/death-by-whatsapp.html#tamilnadu"&gt;&lt;span class="desktop"&gt;TAMILNADU&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li class="link03 item"&gt;&lt;a href="https://www.news18.com/news/immersive/death-by-whatsapp.html#aptelangana"&gt;&lt;span class="desktop"&gt;ANDHRA PRADESH &amp;amp; TELANGANA&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li class="link03 item"&gt;&lt;a href="https://www.news18.com/news/immersive/death-by-whatsapp.html#karnataka"&gt;&lt;span class="desktop"&gt;KARNATAKA&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li class="link03 item"&gt;&lt;a href="https://www.news18.com/news/immersive/death-by-whatsapp.html#assam"&gt;&lt;span class="desktop"&gt;ASSAM&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;footer style="text-align: center; "&gt;
&lt;h5&gt;Credits&lt;/h5&gt;
&lt;p class="sources"&gt;Producer &lt;i&gt;— Sheikh Saaliq&lt;/i&gt; &lt;br /&gt;Concept &lt;i&gt;— Subhajit Sengupta&lt;/i&gt;&lt;br /&gt;Reporters &lt;i&gt;— Deepa Balakrishnan, Stacy Pereira, Sakshi Khanna, Poornima Murali, Karishma Hasnat, Suhas Munshi, Nitya Thirumalai &lt;/i&gt;&lt;br /&gt;Illustrations: &lt;i&gt;— Mir Suhail&lt;/i&gt;&lt;br /&gt;Timeline&lt;i&gt; — Mayank Mohanti&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Data: News18 research&lt;/p&gt;
&lt;/footer&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/death-by-whatsapp'&gt;https://cis-india.org/internet-governance/news/death-by-whatsapp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-06-25T15:47:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/is-privacy-obsolete">
    <title>Is Privacy Obsolete?</title>
    <link>https://cis-india.org/internet-governance/news/is-privacy-obsolete</link>
    <description>
        &lt;b&gt;Pranesh Prakash was a panelist at this event organized by TERI in Bangalore on June 22, 2018.&lt;/b&gt;
        &lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_BIC.png/@@images/5fdcc0f8-eef2-4d3d-b33b-800722a235e1.png" alt="BIC" class="image-inline" title="BIC" /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/is-privacy-obsolete'&gt;https://cis-india.org/internet-governance/news/is-privacy-obsolete&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-06-23T05:01:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-june-19-2018-anushka-finds-support-her-anti-litter-tirade">
    <title>Anushka finds support for her anti-litter tirade</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-june-19-2018-anushka-finds-support-her-anti-litter-tirade</link>
    <description>
        &lt;b&gt;She is well within her rights to shame the affluent man who threw plastic waste out of his swanky car, many say.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nina C. George was published in &lt;a class="external-link" href="https://www.deccanherald.com/metrolife/your-bond-bengaluru/anushka-finds-support-her-anti-litter-tirade-675797.html"&gt;Deccan Herald&lt;/a&gt; on June 19, 2018. Swaraj Barooah was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;On Tuesday, movie star Anushka Sharma caught a man throwing out litter from the window his luxury car, and took him to task. In a 17-second-long clip that went viral, she gave a furious dressing down to the man, identified as Arhhan Singh, sitting in a chaffeur-driven sedan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Arhhan Singh later described her as a “crazy roadside person”. Many started trolling Anushka. Her cricketer-husband Virat Kohli soon jumped in to back her and her cause.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Elli AvrRam&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The actor says Anushka was right in shaming Arhhan Singh. “It is everybody’s duty to stop littering,” she says.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Pooja Chopra&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The actor says the video is a message loud and clear to all those in chauffeur-driven cars who don’t think twice before littering. “The man who threw out plastic should have apologised. It’s not about Anushka flaunting her celebrity status. I would have also done it had I been in her place," she says.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;MK Raghavendra&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The well-known film critic feels celebrities have, for once, proved useful. “Anybody who sees people throwing garbage on the street must take exception to it. Throwing garbage is a social nuisance and I think it should be ideally treated as a minor criminal offence."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Rahul Rajashekharan&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Actor and Mr. India runner-up says, “She wasn’t rude and was only telling the man not to throw garbage. Educated people throwing garbage on the street is unacceptable.” People in Mumbai have been working towards cleaning their beaches, and movements across the world are campaigning against the use of plastic. She did the right thing by posting the video on social media, he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Raghu Dixit&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The singer and composer says he has protested against anything that “goes against basic civic sense.” The people he confronts, he says, sometimes apologise, and at other times get defensive. “It’s not about being a celebrity. We should decisively act towards making our country litter-free," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Guru Prasanna, Advocate, HC, Karnataka&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was natural for Anushka to question somebody throwing garbage on the street. The damaging part was perhaps Virat Kohli’s tweet calling Arhhan Singh, the man in the car, “brainless.” Arhhan Singh and his family have taken offence to the public shaming but they don’t really have a legal case against Anushka and Virat. “There is no action here against which a person can claim any sort of injury. If there is a conscious campaign to bring down somebody’s reputation then it could have legal implications."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Swaraj Barooah, senior programme manager, Centre for Internet and Society, Bengaluru&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It may be poor form to shame a private person, as the point about littering could be made as easily without revealing the identity of the person. But it would be incorrect to claim a legitimate expectation of privacy while committing a public act, which is littering, in this case. On the question of whether this is harassment: This is unlikely to be seen as a legal case of harassment, as it is just one act, and not one of many acts. Nor do Virat and Anushka have a history of going about and ‘shaming’ people online.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-june-19-2018-anushka-finds-support-her-anti-litter-tirade'&gt;https://cis-india.org/internet-governance/news/deccan-herald-june-19-2018-anushka-finds-support-her-anti-litter-tirade&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-06-23T01:11:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-telecom-commercial-communications-customer-preference-regulations">
    <title>Comments on the Telecom Commercial Communications Customer Preference Regulations</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-telecom-commercial-communications-customer-preference-regulations</link>
    <description>
        &lt;b&gt;This submission presents comments by the Centre for Internet &amp; Society, India (“CIS”) on the Telecom Commercial Communications Customer Preference Regulations which was released to the public by the Telecom Regulatory Authority of India (TRAI) on 29th May 2018 for comments and views. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Preliminary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This submission presents comments by the Centre for Internet &amp;amp; Society (“CIS”), India on ‘The Telecom Commercial Communications Customer Preference Regulations, 2018’ which were &lt;a class="external-link" href="https://www.trai.gov.in/sites/default/files/DraftUCCRegulation29052018.pdf"&gt;released&lt;/a&gt; on 29th May 2018 for comments and counter-comments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS appreciates the intent and efforts of Telecom Regulatory Authority of India (TRAI) to curb the problem of Unsolicited Commercial Communication (UCC), or spam. Spam messages are constant irritants for telecom subscribers. Acknowledging the same, TRAI has &lt;a class="external-link" href="https://www.trai.gov.in/sites/default/files/PRNo5829052018.pdf"&gt;proposed&lt;/a&gt; regulations which aim to empower subscribers in effectively dealing with UCC. CIS is grateful for the opportunity to put forth its views and comments on the regulations. This submission was made on 18th June 2018. This text has been slightly edited for readability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The first part of the submission highlights some general issues with the regulations. While TRAI has offered a technological solution to the menace of UCC, the policy documents have no accompanying technical details. TRAI has not made a compelling case for why Distributed Ledger Technologies (DLTs) should be used for storing data instead of a distributed database. There is no clarity on the technical aspects of the proposed DLTs: the participating nodes in the network, how these nodes arrive at a consensus, whether they are independent of each other, are questions that remain unanswered. The draft regulations also mention curbing Robocalls, but technical challenges associated with the same have not been discussed. Spam which is non-commercial in nature remains out of the scope of the current regulations.&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The second part of this submission puts forth specific comments related to various sections of the draft and suggests improvements therein. &lt;span&gt;While CIS appreciates the extension of the deadline from 11th June to 18th June, we would like to highlight that the Draft was released on 29th May, and despite the extension, the time to submit comments remains less than a month. Considering the fact that the draft regulations hold significance for the entire telecom industry and nearly 1.5 billion subscribers, TRAI should have granted at least a month’s time for the stakeholder’s sound scrutiny.&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;h2 style="text-align: justify; "&gt;General Comments&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Distributed Ledger Technology (DLT)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The draft greatly emphasizes the fact that data regarding Consent, Complaints, Headers, Preferences, Content Template Register and Entities are stored on distributed ledgers. The intent is to keep data cryptographically secure with no centralized point of control. However, the regulations do not go into the technical details of the working of these distributed ledgers leading to several potential pitfalls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the draft, every access provider has to establish distributed ledgers for Complaints, Consent, Content, Preference, Header, Entities and so on. There are specific entities mentioned which will act as nodes in the network, and these nodes are preselected.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Whenever a sender seeks to send commercial communications across a list of subscribers, the list is ‘scrubbed’ against the DL-Consent and DL-Preference, to check whether the subscriber has given consent and registered their preference. The sender can only send the commercial communication to the numbers which are present in the scrubbed list.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The objective of these regulations is to protect consumers’ rights but the consumer, i.e., the subscriber, is not a node in the distributed ledger. Since the primary benefits of decentralization are gained when the trust is devolved to the individual subscribers, and the individual users are not specified as participating nodes in the ledger, the justification behind a distributed ledger is unclear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the proposed regime requires the subscriber to place her trust in the access provider to register the complaint, thus offers no tangible benefit over the current regulation. While there are penalties for non-compliant Access Providers (APs), there are no business incentives for APs to expend the extra amount of resources required in for effective implementation of this technology, to act in the users’ interest. This builds a system where APs interests clash with subscribers, but they are nonetheless required to be the guardian of the subscribers’ concerns.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Further, the nodes are entities constituted by the access providers (APs), and there is no mechanism to ensure that they behave independently of each other. In such case, it is wholly possible that all nodes on a distributed ledger are run by the same entity, thus defeating the purpose of establishing consensus. The proposed regulations do not address this scenario.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;One solution would be to add subscribers as nodes to the DLT network. But this would be impractical as the technical challenges associated therein, including generating public-private key pairs of each user, the computational complexity of the network, are immense. If this is indeed the intention of TRAI, this has not been spelled out clearly in the draft regulations. Additionally, in such a scenario, there would be no requirement for mandating every AP to maintain their own DLT for customer preference and consent artifacts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Considering the points mentioned above, we request TRAI to publish the technical specifications of DLTs, which addresses the following issues:&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;ol&gt;
&lt;li&gt;Who can participate in the network other than the entities mentioned in the regulations? Are these participating entities independent of each other? If not, then how will the conflict of interest be resolved?&lt;/li&gt;
&lt;li&gt;What is the consensus algorithm used in the DLTs?&lt;/li&gt;
&lt;li&gt;Will the code to implement DLTs be open-source?&lt;/li&gt;
&lt;/ol&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Our recommendations are three-fold in this regard:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If distributed ledger is used, then, mechanisms should be devised to ensure the integrity of the consensus. For this, participating nodes in the network must be independent of each other. Aforementioned points regarding consensus protocol should be taken into consideration as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In place of DLTs, we recommend the use of a distributed database with signature-based authentication and encryption of the data to be stored. The immutability and non-repudiation of data can be achieved in this way. Distributed ledgers such as DL-consent, DL-preference, DL-complaints are instances where authentication of data and subscriber can be done using simplers means such as OTP verification, etc. So, such ledgers need not necessarily utilize DLTs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The regulations should mandate the open-source publication of the implementation of the DLTs. This will enable interoperability, add transparency to the functioning of the regulations, and enable security audits to ensure accountability of the APs.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Broadening the scope of the Regulations to non-commercial communication&lt;/h3&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The proposed regulations attempt to specifically curb unsolicited commercial communications as defined in Regulation 2(bt). But, there are other forms of communication which are unsolicited and non-commercial, including political messages and market surveys.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;We recommend that the scope of the regulations should be broadened to include both commercial and non-commercial communications. And both of these should be grouped under the category of Institutional Communications. Wherever needed, changes should be made to the regulations dealing with UCC to suit the specific requirements of dealing with unsolicited non-commercial communications as well. At the same time, the regulations should ensure that individual communications are not brought within their ambit.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;h3 style="text-align: justify; "&gt;Technical challenges in combating Robocalls&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Robocalls are defined in Regulation 2(ba) and in Schedule IV, provision 3, it has been clubbed with other kinds of spam. However, there are some specific technical challenges in regulating robocalls. Right now, ‘block listing’ is a prevalent model where one can identify a number and then block it so that it cannot be used further. But with robocalls, spoofing of other numbers is easily achievable which makes the blocking of the real identity of caller difficult. The proposed regulations do not adequately address this challenge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Alliance for Telecommunications Industry Solutions, with working groups of the Internet Engineering Task Force (IETF), has been &lt;a class="external-link" href="https://www.wired.com/story/robocall-getting-worse-but-help-is-here"&gt;working&lt;/a&gt; on a different approach to solve this problem. They are working on standards for all mobile and VoIP calling services which would enable them to do cryptographic digital call signing, “so calls can be validated as originating from a legitimate source, and not a spoofed robocall system. The protocols, known as ‘STIR’ and ‘SHAKEN,’ are in industry testing right now through ATIS's Robocalling Testbed, which has been used by companies like Sprint, AT&amp;amp;T, Google, Comcast, and Verizon so far”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TRAI should take into account these developments and propose a specific regime accordingly. One possible way forward, for now, could be the banning of robocalls unless there is explicit opt-in by subscribers.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;h3 style="text-align: justify; "&gt;Registration of content-template&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The draft envisages a distributed ledger system for registration of content template which would have both a fixed part and a variable part. The content template needs to be registered by the content template registrar, which would be an authorized entity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Problematically, the content template is defined to include the fixed part as well as the variable part. Further, Schedule I, provision 4(3)(e) mandates that content template registration functions should be utilized to extract fixed and the variable portion from actual messages offered for delivery or already delivered. The variable portion of the message contains information specific to a customer, as defined in regulation 2(q)(ii). In addition to privacy concerns with accessing the variable part, there is no functional reason for variable portions to be extracted from the actual message, as only the fixed portion needs to be verified.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The hash of the fixed portion of the message can be used to identify whether a user has received UCC or not. We, therefore, recommend that the variable portion of the message shall not be made accessible to entities because it is not required for the identification of a message as UCC.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;‘Safe and Secure Manner’&lt;/h3&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Throughout the draft, reference is made to the data collected being stored and/or exchanged in a ‘safe and secure manner’, without any clarification as to what this term implies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We recommend that the term be defined as ‘measures in accordance with reasonable security practices and procedures’ as given in section 43A of the Information Technology Act, 2008 read with section 8 of the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Bulk Registration&lt;/h3&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div&gt;In the Consultation paper &lt;a class="external-link" href="http://trai.gov.in/sites/default/files/UCC_CP_14092017.pdf"&gt;published&lt;/a&gt; by TRAI, bulk registration was envisaged as a way to curb UCC wherein one member of the family can register on behalf of the family. Australia has already &lt;a class="external-link" href="https://www.donotcall.gov.au/consumers/bulk-applications-register-remove-check"&gt;implemented&lt;/a&gt; this mechanism.&lt;/div&gt;
&lt;p&gt;In India, evidence suggests that major victims of spam are the elderly and people with &lt;a class="external-link" href="https://www.news18.com/news/tech/5-common-types-of-scam-calls-in-india-and-how-to-deal-them-1366587.html"&gt;limited&lt;/a&gt; financial capacities. In such cases, consent and preference registration on behalf of these people by one person may help in the successful control of UCC.&lt;/p&gt;
&lt;p&gt;Some telecom service providers &lt;a class="external-link" href="http://trai.gov.in/sites/default/files/Reliance_Jio_Infocomm_Ltd_14112017.pdf"&gt;argued&lt;/a&gt; against this by emphasizing the individual choice of a subscriber. However, in cases where there is authorization given by the customer, the primary user can &lt;a class="external-link" href="http://trai.gov.in/sites/default/files/Bharti_Airtel_Ltd_10_11_2017.pdf"&gt;register&lt;/a&gt; consent on his/her behalf. Similarly, since corporate connections are by definition owned and paid for by corporates, bulk registration in those situations can be also be done.&lt;/p&gt;
&lt;p&gt;We recommend that given the situation in India, the provision for bulk registration be incorporated in the regulations for specific scenarios, as mentioned above. An authorization template giving the nominee power to register on behalf of a class can be incorporated to this effect. Also, an opt-out option must be incorporated in case an individual choice differs from the choice registered in the bulk-registration.&lt;/p&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;h2 style="text-align: justify; "&gt;Specific Comments&lt;/h2&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;h3 style="text-align: justify; "&gt;Inferred Consent [Regulation 2(k)(II)(A)]&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Comments&lt;br /&gt;&lt;/strong&gt;Regulation 2(k)(ii)(a) of the Draft defines consent as “voluntary permission given by the customer to the sender to receive commercial communication”. However, the draft also includes, “inferred consent”, which is defined as consent that can be “reasonably inferred from the customer’s conduct or the business and the relationship between the individual and the sender”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When consent is derived from the customer’s conduct, rather than being given explicitly, it defeats its ‘voluntary nature’. The provision of consent being ‘reasonably inferred’ from the customer’s conduct is also vague, and there is no indication given in the draft as to what kind of conduct would lead to a reasonable inference of implied consent. The definition can also be interpreted to mean that customer’s conduct will be subject to monitoring, which raises privacy concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Recommendations &lt;br /&gt;&lt;/strong&gt;Consent shall not be derived from the customer’s conduct unless the person provides it explicitly. We recommend amendment to the definition of ‘inferred consent’ accordingly.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;h3 style="text-align: justify; "&gt;Three years history to be stored in DL-Complaints [Regulations 24(3) and 24(4)]&lt;/h3&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Regulation 24(3) and (4) states that the DL-Ledger for Complaints (DL-Complaints) shall record ‘three years history’ of both the complainant and the sender, with details of complaints made, date, time and status of the resolution of the complaint. It is not clear from the regulation whether the mentioned set of data is exhaustive or not.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Recommendations &lt;br /&gt;&lt;/strong&gt;We recognize that the legislative intent behind drafting Regulation 24(3) and (4) was to curb frivolous or false complaints, which has already been a concern of TRAI. Storing both the complainant and the sender’s history, in such cases, may aid in resolving these.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;We recommend that the language of the regulations may be amended to “three years history which only includes details of all complaint(s) made by him, with date(s) and time(s) . . .”, thereby giving a limiting qualification to the broad scope of the term.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;h3 style="text-align: justify; "&gt;The responsibility of the APs to ensure that the devices support the requisite permissions [Regulation 34]&lt;/h3&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Comments&lt;br /&gt;&lt;/strong&gt;Regulation 34 mandates that the APs are to ensure that the devices “registered in the network” shall support the requisite permissions of the Apps under this regulations.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;In terms of jurisdiction, regulation of the functioning of electronic devices (which can be phones, tablets or smart watches) is outside the scope of the proposed regulations, and probably out of TRAI's regulatory competence.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Even if TRAI can impose the regulation on end devices, this regulation puts the burden on the APs to ensure that devices support the pertinent app permissions. Considering that TRAI itself has been weighing legal recourse against device manufacturers on similar grounds, it is unclear why TRAI assumes that APs have any legal or technical method to ensure control of a device which has neither been manufactured by them nor is it under their physical or remote control.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;In modern smartphones, the end-user has full control over most app installations and permissions. This practice is consistent with a consumer's autonomy over the device and its functioning. Considering the fact that TRAI has not implemented basic security features in the 'Do Not Disturb' app, TRAI is putting at risk the privacy of millions of device owners by legally mandating permissions for an app with the second proviso. The proviso further gives TRAI the power to order APs to derecognize devices from their network. This regulation is draconic and inimical to the rights of consumers, who are at risk of losing network access and connectivity because of their device choice, which is a completely different business and market.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Recommendations &lt;br /&gt;&lt;/strong&gt;Reporting unsolicited messages or calls is a consumer right, and the regulations are in furtherance of the same goals. TRAI should enable consumer rights by giving subscribers the option to report spam and has no reason to force users to report spam possibly through legal overreach and privacy invasion. Accordingly, we recommend the removal of Regulation 34.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;h2 style="text-align: justify; "&gt;Additional Suggestions&lt;/h2&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;h3 style="text-align: justify; "&gt;Consumer and subscriber&lt;/h3&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The usage of the terms ‘customer’ and ‘subscriber’ in Regulation 3(1) implies that the terms have two different meanings. This interpretation, however, clashes with the actual definition given in Regulation 2(u) and 2(bk), whereby a customer is a subscriber. This is an inconsistent interpretation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Either the definition of a ‘customer’ must be clarified or differentiated from that of a ‘subscriber’ in regulation 2, or regulation 3 must be amended to indicate what its actual object of regulation is - the customer or the subscriber.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Drafting misnumbering&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There are a few instances of misnumbering of regulations and reference regulations which are non-existent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regulations 25(5)(b) and (c) make a reference to regulation 25(3)(a), which does not exist in the given draft. A bare reading of regulation 25, however, indicate that the intention was to refer to regulation 25(5)(a), and as such, this misnumbering should be rectified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regulation 34 makes a reference to regulation 7(2), which again, does not exist. In such case, either regulation 34 or regulation 7(2) must be amended to keep a consistent interpretation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Ambiguous terms&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;‘Allocation and assignment principles and policies’ - Provision 4(1)(a) of Schedule I of the regulations indicate that header assignment should be done on the basis of ‘allocation and assignment principles and policies’, without any clarification to the meaning of this term. We recommend an amendment to this provision accordingly.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-telecom-commercial-communications-customer-preference-regulations'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-telecom-commercial-communications-customer-preference-regulations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sandeep Kumar, Torsha Sarkar, Swaraj Barooah, Gurshabad Grover</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-06-23T00:44:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/niti-aayog-discussion-paper-an-aspirational-step-towards-india2019s-ai-policy">
    <title>NITI Aayog Discussion Paper: An aspirational step towards India’s AI policy</title>
    <link>https://cis-india.org/internet-governance/blog/niti-aayog-discussion-paper-an-aspirational-step-towards-india2019s-ai-policy</link>
    <description>
        &lt;b&gt;The National Strategy for Artificial Intelligence — a discussion paper on India’s path forward in AI, is a welcome step towards a comprehensive document that reflects the government's AI ambitions. The 115-page discussion paper attempts to be an all encompassing document looking at a host of AI related issues including privacy, security, ethics, fairness, transparency and accountability.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/niti-aayog-discussion-paper"&gt;&lt;strong&gt;Download the Report&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The 115-page discussion paper attempts to be an all encompassing document looking at a host of AI related issues including privacy, security, ethics, fairness, transparency and accountability. The paper identifies five focus areas where AI could have a positive impact in India.&lt;/span&gt;&lt;span&gt; It also focuses on reskilling as a response to the potential problem of job loss due the future large-scale adoption of AI in the job market.&lt;/span&gt;&lt;span&gt; This blog is a follow up to the comments made by CIS on Twitter&lt;/span&gt;&lt;span&gt; on the paper and seeks to reflect on the National Strategy as a well researched AI roadmap for India. In doing so, it identifies areas that can be strengthened and built upon.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Identified Focus Areas for AI Intervention&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The paper identifies five focus areas—Healthcare, Agriculture, Education, Smart Cities and Infrastructure, Smart Mobility and Transportation, which Niti Aayog believes will benefit most from the use of AI in bringing about social welfare for the people of India.&lt;/span&gt;&lt;span&gt; Although these sectors are essential in the development of a nation, the failure to include manufacturing and services sectors is an oversight. Focussing on  manufacturing is fundamental not only in terms of economic development and user base, but also regarding questions of safety and the impact of AI on jobs and economic security. The same holds true for the service sector particularly since AI products are being made for the use of consumers, not just businesses. Use of AI in the services sector also raises critical questions about user privacy and ethics. Another sector the paper fails to include is defense, this is worrying since India is chairing the Group of Governmental Experts &lt;/span&gt;&lt;span&gt;on Lethal Autonomous Weapons Systems (LAWS) in 2018.&lt;/span&gt;&lt;span&gt; Across sectors, the report fails to look at how AI could be utilised to ensure accessibility and inclusion for the disabled. This is surprising, as  aid for the differently abled and accessibility technology was one of the 10 domains identified in the Task Force Report on AI published earlier this year. &lt;/span&gt;&lt;span&gt;This should have been a focus point in the paper as it  aims to identify applications with maximum social impact and inclusion.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In its vision for the use of AI in smart cities, the&lt;/span&gt;&lt;span&gt; paper suggests the adoption of a sophisticated surveillance system as well as the use of social media intelligence platforms to check and monitor people’s movement both online and offline to maintain public safety.&lt;/span&gt;&lt;span&gt; This is at variance with constitutional standards of due process and criminal law principles of reasonable ground and reasonable suspicion. Further, use of such methods will pose issues of judicial inscrutability. From a rights perspective, state surveillance can directly interfere with fundamental rights including privacy, freedom of expression, and freedom of assembly. Privacy organizations around the world have raised concerns regarding the increased public surveillance through the use of AI.&lt;/span&gt;&lt;span&gt; Though the paper recognized the impact on privacy that such uses would have, it failed to set a strong and forward looking position on the issue - such as advocating that such surveillance must be lawful and inline with international human rights norms.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;Harnessing the Power of AI and Accelerating Research&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;One of the ways suggested for the proliferation of AI in India was to increase research, both core and applied, to bring about innovation that can be commercialised.&lt;/span&gt;&lt;span&gt; In order to attain this goal the paper proposes a two-tier integrated approach: the establishment of  COREs (Centres of Research Excellence in Artificial Intelligence) and ICTAI (International Centre for Transformational Artificial Intelligence).&lt;/span&gt;&lt;span&gt; However the roadmap to increase research in AI fails to acknowledge the principles of public funded research such as free and open source software (FOSS), open standards and open data. The report also blames the current Indian  Intellectual Property regime for being “unattractive” and averse to incentivising research and adoption of AI.&lt;/span&gt;&lt;span&gt; Section 3(k) of Patents Act exempts algorithms from being patented, and the Computer Related Inventions (CRI) Guidelines have faced much controversy over the patentability of mere software without a novel hardware component.&lt;/span&gt;&lt;span&gt; The paper provides no concrete answers to the question of whether it should be permissible to patent algorithms, and if yes, to  to what extent. Furthermore, there needs to be a standard either in the CRI Guidelines or the Patent Act, that distinguishes between AI algorithms and non-AI algorithms. Additionally, given that there is no historical precedence on the requirement of patent rights to incentivise creation of AI,  innovative investment protection mechanisms that have lesser negative externalities, such as compensatory liability regimes&lt;/span&gt;&lt;span&gt; would be more desirable.  The report further failed to look at the issue holistically and recognize that facilitating rampant patenting can form a barrier to smaller companies from using or developing  AI. This is important to be cognizant of given the central role of startups to the AI ecosystem in India and because it can work against the larger goal of inclusion articulated by the report.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;Ethics, Privacy, Security and Safety&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In a positive step forward, the paper addresses a broader range of ethical issues concerning AI including transparency, fairness, privacy and security and safety in more detail when compared to the earlier report of the Task Force.&lt;/span&gt;&lt;span&gt; Yet despite a dedicated section covering these issues, a number of concerns still remain unanswered.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;Transparency&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The section on transparency and opening the Black Box has several lacunae.&lt;/span&gt;&lt;span&gt; First, AI that is used by the government, to an acceptable extent, must be available in the public domain for audit, if not under Free and Open Source Software (FOSS). This should hold true in particular for uses that impinge on fundamental rights. Second, if the AI is utilised in the private sector, there currently exists a right to reverse engineer within the Indian Copyright Act,&lt;/span&gt;&lt;span&gt; which is not accounted for in the paper. Furthermore, if the AI was involved both in the commission of a crime or the violation of human rights, or in the investigations of such transgressions, questions with regard to judicial scrutability of the AI remain. In addition to explainability, the source code must be made circumstantially available, since explainable AI&lt;/span&gt;&lt;span&gt; alone cannot solve all the problems of transparency. In addition to availability of source code and explainability, a greater discussion is needed about the tradeoff between a complex and potentially more accurate AI system (with more layers and nodes)  vs. an AI system which is potentially not as accurate but is able to provide a human readable explanation.&lt;/span&gt;&lt;span&gt; It is interesting to note that transparency within human-AI interaction is absent in the paper. Key questions on transparency, such as whether an AI should disclose its identity to a human have not been answered.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;Fairness&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;With regards to fairness, the paper mentions how AI can amplify bias in data and create unfair outcomes.&lt;/span&gt;&lt;span&gt; However, the paper neither suggests detailed or satisfactory solutions nor does it deal with biased historical data in an Indian context. More specifically, there seems to be no mention of regulatory tools to tackle the problem of fairness, such as:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Self-certification&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Certification by a self-regulatory body&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Discrimination impact assessments&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Investigations by the privacy regulator &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt;Such tools will proactively need to ensure&lt;/span&gt;&lt;span&gt; inclusion, diversity, and equity in composition and decisions.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Additionally, with reference to correcting bias in AI, it should be noted that the technocratic view that as an AI solution continues to be trained on larger amounts of data  , systems will self correct, does not fully recognize the importance of data quality and data curation, and is inconsistent with fundamental rights. Policy objectives of AI innovation must be technologically nuanced and cannot be at the cost of intermediary denial of rights and services.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Further, the paper does not deal with issues of multiple definitions and principles of fairness, and that building definitions into AI systems may often involve choosing one definition over the other. For instance, it can be argued that the set of AI ethical principles articulated by Google&lt;/span&gt;&lt;span&gt; are more consequentialist in nature involving a a cost-benefit analysis, whereas a human rights approach may be more deontological in nature. In this regard, there is a need for interdisciplinary research involving computer scientists, statisticians, ethicists and lawyers.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;Privacy&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Though the paper underscores the importance of privacy and the need for a privacy legislation in India - the paper limits the potential privacy concerns arising from AI to collection, inappropriate use of data, personal discrimination, unfair gain from insights derived from consumer data  (the solution being to explain to consumers about the value they as consumers gain from this), and unfair competitive advantage by collecting mass amounts of data (which is not directly related to privacy).&lt;/span&gt;&lt;span&gt; In this way the paper fails to discuss the full implications on privacy that AI might have and fails to address the data rights necessary to enable the right to privacy in a society where AI is pervasive. The paper fails to engage with emerging principles from data protection such as right to explanation and right to opt-out of automated processing, which directly relate to AI. Further, there is no discussion on the issues such as data minimisation and purpose limitation which some big data and AI proponents argue against. To that extent, there is a lack of appreciation of the difficult policy questions concerning privacy and AI. The paper is also completely silent on redress and remedy.  Further the paper endorses the seven data protection principles postulated by the Justice Srikrishna Committee.&lt;/span&gt;&lt;span&gt; However CIS has pointed out that these principles are generic and not specific to data protection.&lt;/span&gt;&lt;span&gt; Moreover, the law chapter of IEEE’s ‘&lt;/span&gt;&lt;em&gt;&lt;span&gt;Global Initiative on Ethics of Autonomous and Intelligent Systems’&lt;/span&gt;&lt;/em&gt;&lt;span&gt; has been ignored in favor of the chapter on ‘&lt;/span&gt;&lt;em&gt;&lt;span&gt;Personal Data and Individual Access Control in Ethically Aligned Design&lt;/span&gt;&lt;/em&gt;&lt;span&gt;’&lt;/span&gt;&lt;span&gt; as the recommended international standard.&lt;/span&gt;&lt;span&gt; Ideally, both chapters should be recommended for a holistic approach to the issue of ethics and privacy with respect to AI. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;AI Regulation and Sectoral Standards&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The discussion paper’s approach towards sectoral regulation advocates collaboration with industry to formulate regulatory frameworks for each sector.  However, the paper is silent on the possibility of reviewing existing sectoral regulation to understand if they require amending. We believe that this is an important solution to consider since amending existing regulation and standards often takes less time than formulating and implementing new regulatory frameworks.&lt;/span&gt;&lt;span&gt; Furthermore, although the emphasis on awareness in the paper is welcome, it must complement regulation and be driven by all stakeholders, especially given India’s limited regulatory budget. The over reliance on industry self-regulation, by itself, is not advisable, as there is an absence of robust industry governance bodies in India and self-regulation raises questions about the strength and enforceability of such practices. The privacy debate in India has recognized this and reports, like the Report of the Group of Experts on Privacy, recommend a co-regulatory framework with industry developing binding standards that are inline with the national privacy law and that are approved and enforced by the Privacy Commissioner.&lt;/span&gt;&lt;span&gt; That said, the UN Guiding Principles on Business and Human Rights and its “protect, respect, and remedy” framework should guide any self regulatory action.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;Security and Safety of AI Systems&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In terms of security and safety of AI systems the paper seeks to shift the discussion of accountability being primarily about liability, to that of one about the  explainability of AI.&lt;/span&gt;&lt;span&gt; Furthermore, there is no recommendation of immunities or incentives for whistleblowers or researchers to report on privacy breaches and vulnerabilities. The report also does not recognize certain uses of AI as being more critical than others because of their potential harm to the human. This would include uses in healthcare and autonomous transportation. A key component of accountability in these sectors will be the evolution of appropriate testing and quality assurance standards. Only then, should safe harbours be discussed as an extension of the negligence test for damages caused by AI software. Additionally, the paper fails to recommend kill switches, which should be mandatory for all kinetic AI systems.&lt;/span&gt;&lt;span&gt; Finally, there is no mention of mandatory human-in-the-loop in all systems where there are significant risks to safety and human rights. Autonomous AI is only viewed as an economic boost, but its potential risks have not been explored sufficiently. A welcome recommendation would be for all autonomous AI to go through human rights impact assessments.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;Research and Education&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Being a government think-tank, the NITI Aayog could have dealt in detail with the AI policies of the government and looked at how different arms of the government are aiming to leverage AI and tackle the problems arising out of the use of AI. Instead of tabulating the government’s role in each area and especially research, the report could have also listed out the various areas where each department could play a role in the AI ecosystem through regulation, education, funding research etc. In terms of the recommendations for introducing AI curriculums in schools, and colleges,&lt;/span&gt;&lt;span&gt; the government could also ensure that ethics and rights are  part of the curriculum - especially in technical institutions. A possible course of action could include corporations paying for a pan-Indian AI education campaign.This would also require the government to formulate the required academic curriculum that is updated to include rights and ethics. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;Data Standards and Data Sharing&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Based on the amount of data the Government of India collects through its numerous schemes, it has the potential to be the largest aggregator of data specific to India. However the paper does not consider the use of this data with enough gravity. For example, the paper recommends Corporate Data Sharing for “social good” and making government datasets from the social sector available publicly.&lt;/span&gt;&lt;span&gt; Yet  this section does not mention privacy enhancing technologies/standards such as pseudonymization, anonymization standards, differential privacy etc. Additionally there should be provisions that allow the government to prevent the formation of monopolies by regulating companies from hoarding user data. The open data standards could also be applicable to the private companies, so that they can also share their data in compliance with the privacy enhancing technologies mentioned above. The paper also acknowledges that AI Marketplaces require monitoring and maintenance of quality. It recognises the need for “continuous scrutiny of products, sellers and buyers”&lt;/span&gt;&lt;span&gt;, and proposes that the government enable these regulations in a manner that private players could set up the marketplace. This is a welcome suggestion, but the legal and ethical framework of the AI Marketplace requires further discussion and clarification.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;An AI Garage for Emerging Economies&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The discussion paper also qualifies India as an “ideal test-bed”&lt;/span&gt;&lt;span&gt; for trying out AI related solutions. This is problematic since questions of regulation in  India with respect to AI have yet to be legally clarified and defined and India does not have a comprehensive privacy law. Without a strong ethical and regulatory framework, the use of new and possibly untested technologies in India could lead to unintended and possibly harmful outcomes.The government's ambition to position India as a leader amongst developing countries on AI related issues should not be achieved by using Indians as test subjects for technologies whose effects are unknown.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In conclusion, NITI Aayog’s discussion paper represents a welcome step towards a comprehensive AI strategy for India. However, the trend of inconspicuously releasing reports (this and the AI Task Force) as well as the lack of a call for public comments, seems to be the wrong way to foster discussion on emerging technologies that will be as pervasive as AI. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The blanket recommendations were provided without looking at its viability in each sector.&lt;/span&gt;&lt;span&gt; Furthermore, the discussion paper does not sufficiently explore or, at times, completely omits key areas. It barely touched upon societal, cultural and sectoral challenges to the adoption of AI — research that CIS is currently in the process of undertaking.&lt;/span&gt;&lt;span&gt;Future reports on Indian AI strategy should pay more attention to the country’s unique legal context and to possible defense applications and take the opportunity to establish a forward looking, human rights respecting, and holistic position in global discourse and developments. Reports should also consider infrastructure investment as an important prerequisite for AI development and deployment. Digitised data and connectivity as well as more basic infrastructure, such as rural electricity and well-maintained roads, require more funding to more successfully leverage AI for inclusive economic growth. Although there are important concerns, the discussion paper is an aspirational step toward India’s AI strategy. &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/niti-aayog-discussion-paper-an-aspirational-step-towards-india2019s-ai-policy'&gt;https://cis-india.org/internet-governance/blog/niti-aayog-discussion-paper-an-aspirational-step-towards-india2019s-ai-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sunil Abraham, Elonnai Hickok, Amber Sinha, Swaraj Barooah, Shweta Mohandas, Pranav M Bidare, Swagam Dasgupta, Vishnu Ramachandran and Senthil Kumar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2018-06-13T13:08:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/economic-times-june-10-2018-sunil-abraham-why-npci-and-facebook-need-urgent-regulatory-attention">
    <title>Why NPCI and Facebook need urgent regulatory attention </title>
    <link>https://cis-india.org/internet-governance/blog/economic-times-june-10-2018-sunil-abraham-why-npci-and-facebook-need-urgent-regulatory-attention</link>
    <description>
        &lt;b&gt;The world’s oldest networked infrastructure, money, is increasingly dematerialising and fusing with the world’s latest networked infrastructure, the Internet. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="https://economictimes.indiatimes.com/industry/banking/finance/banking/why-npci-and-facebook-need-urgent-regulatory-attention/articleshow/64522587.cms"&gt;Economic Times&lt;/a&gt; on June 10, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;As the network effects compound, disruptive acceleration hurtle us towards financial utopia, or dystopia. Our fate depends on what we get right and what we get wrong with the law, code and architecture, and the market.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Internet, unfortunately, has completely transformed from how it was first architected. From a federated, generative network based on free software and open standards, into a centralised, environment with an increasing dependency on proprietary technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In countries like Myanmar, some citizens misconstrue a single social media website, Facebook, for the internet, according to LirneAsia research. India is another market where Facebook could still get its brand mistaken for access itself by some users coming online. This is Facebook put so many resources into the battle over Basics, in the run-up to India’s network neutrality regulation. an odd corporation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On hand, its business model is what some term surveillance capitalism. On the other hand, by acquiring WhatsApp and by keeping end-toend (E2E) encryption “on”, it has ensured that one and a half billion users can concretely exercise their right to privacy. At the time of the acquisition, WhatsApp founders believed Facebook’s promise that it would never compromise on their high standards of privacy and security. But 18 months later, Facebook started harvesting data and diluting E2E.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In April this year, my colleague Ayush Rathi and I wrote in Asia Times that WhatsApp no longer deletes multimedia on download but continues to store it on its servers. Theoretically, using the very same mechanism, Facebook could also be retaining encrypted text messages and comprehensive metadata from WhatsApp users indefinitely without making this obvious.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;My friend, Srikanth Lakshmanan, founder of the CashlessConsumer collective, is a keen observer of this space. He says in India, “we are seeing an increasing push towards a bank-led model, thanks to National Payments Corporation of India (NPCI) and its control over Unified Payments Interface (UPI), which is also known as the cashless layer of the India Stack.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;NPCI is best understood as a shape shifter. Arundhati Ramanathan puts it best when she says “depending on the time and context, NPCI is a competitor. It is a platform. It is a regulator. It is an industry association. It is a profitable non-profit. It is a rule maker. It is a judge. It is a bystander.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This results in UPI becoming, what Lakshmanan calls, a NPCI-club-good rather than a new generation digital public good. He also points out that NPCI has an additional challenge of opacity — “it doesn’t provide any metrics on transaction failures, and being a private body, is not subject to proactive or reactive disclosure requirements under the RTI.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technically, he says, UPI increases fragility in our financial ecosystem since it “is a centralised data maximisation network where NPCI will always have the superset of data.” Given that NPCI has opted for a bank-led model in India, it is very unlikely that Facebook able to leverage its monopoly the social media market duopoly it shares with in the digital advertising market to become a digital payments monopoly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, NCPI and Facebook both share the following traits — one, an insatiable appetite for personal information; two, a fetish for hypercentralisation; three, a marginal commitment to transparency, and four, poor track record as a custodian of consumer trust. The marriage between these like-minded entities has already had a dubious beginning.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previously, every financial technology wanting direct access to the NPCI infrastructure had to have a tie-up with a bank. But for Facebook and Google, as they are large players, it was decided to introduce a multi-bank model. This was definitely the right thing to do from a competition perspective. But, unfortunately, the marriage between the banks and the internet giant was arranged by NPCI in an opaque process and WhatsApp was exempted from the full NPCI certification process for its beta launch.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both NPCI and Facebook need urgent regulatory attention. A modern data protection law and a more proactive competition regulator is required for Facebook. The NPCI will hopefully also be subjected to the upcoming data protection law. But it also requires a range of design, policy and governance fixes to ensure greater privacy and security via data minimisation and decentralisation; greater accountability and transparency to the public; separation of powers for better governance and open access policies to prevent anti-competitive behaviour.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/economic-times-june-10-2018-sunil-abraham-why-npci-and-facebook-need-urgent-regulatory-attention'&gt;https://cis-india.org/internet-governance/blog/economic-times-june-10-2018-sunil-abraham-why-npci-and-facebook-need-urgent-regulatory-attention&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-06-12T02:07:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/network-disruptions-report-by-global-network-initiative">
    <title>Network Disruptions Report by Global Network Initiative</title>
    <link>https://cis-india.org/internet-governance/blog/network-disruptions-report-by-global-network-initiative</link>
    <description>
        &lt;b&gt;Around 70% of all known shutdowns in the world took place in India in 2017. The same year Telecom Authority of India (TRAI) released the “Temporary Suspension of Internet Services” giving State and Central Government officials the power to terminate Internet services as per the guidelines.&lt;/b&gt;
        &lt;p&gt;The report by Global Network Initiative &lt;a class="external-link" href="https://cis-india.org/internet-governance/files/disconnected-network-disruptions"&gt;can be read here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;However S.144 of the Criminal Procedure Code as well Section 5 of the Telegraph Act are still used as legal grounds. The former targets unlawful assembly while the latter gives authorities the right to prevent transmission of messages, applicable to messages sent over the Internet as well. A case in the Gujarat High Court challenging the validity of using S.144 of the CrPC was dismissed essentially stating the Government could use the section to enforce shutdowns to maintain law and order.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The right to Internet has been accepted as a &lt;a class="external-link" href="https://www.independent.co.uk/life-style/gadgets-and-tech/un-declares-online-freedom-to-be-a-human-right-that-must-be-protected-a7120186.html"&gt;fundamental right by the United Nations&lt;/a&gt; and one which, cannot be disassociated from the exercise of freedom of expression and opinion and the right to peaceful assembly. These are rights guaranteed by the Constitution, affirmed in the Universal Declaration of Human Rights and thus should be provided, both, online and offline.  Online movements are unpredictable and dynamic making Governments fearful of their lack of control over content hosting websites. Their fear becomes their de facto perception of online services resulting in network shutdowns regardless of the reality on ground.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the rising importance of this issue, Global Network Initiative has published a report on such Network Disruptions by Jan Rydzak . A former Google Policy fellow and now a PhD candidate at the University of Arizona, he, conducts research on the nexus between technology and protest. The report, which uses India as a case study calls for more attention on network disruptions, the 'new form of digital repression' and delves into its impact on human rights.  Rydzak aims at widening the gambit of affected rights by discussing the civil and political rights of freedom of assembly, right to equality, religious belief and such. These are ramifications not widely discussed so far and helps shine a light on the collateral damage incurred due to these shutdowns.  Through a multitude of interviews with various stakeholders, the author brings to forefront the human rights implications of network disruptions on different groups of individuals such as women, immigrants and certain ethnic groups. These dangers are even more when it comes to vulnerable populations and the report does a comprehensive analysis of all of the above.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/network-disruptions-report-by-global-network-initiative'&gt;https://cis-india.org/internet-governance/blog/network-disruptions-report-by-global-network-initiative&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>akriti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Network Disruptions</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-06-12T01:31:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-quint-june-9-2018-draft-bill-seeks-to-revolutionise-data-collection-storage-in-india">
    <title>Citizens’ Draft Privacy Bill Seeks To Revolutionise Data Collection, Storage In India</title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-quint-june-9-2018-draft-bill-seeks-to-revolutionise-data-collection-storage-in-india</link>
    <description>
        &lt;b&gt;A draft privacy bill proposes sweeping reforms to the way personal data is collected, processed and stored in India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Arpan Chaturvedi was published in &lt;a class="external-link" href="https://www.bloombergquint.com/law-and-policy/2018/06/08/draft-bill-seeks-to-revolutionise-data-collection-storage-in-india"&gt;Bloomberg Quint&lt;/a&gt; on June 9, 2018. CIS research was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Titled Indian Privacy Code, 2018, the draft proposes that “all data collected, processed and stored by data controllers and data processors prior to the date on which this Act comes into force shall be destroyed within a period of two years from the date on which this Act comes into force”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft has been put together by a group of lawyers and policy analysts and uploaded on the website of ‘Save our Privacy’ — a public initiative to put forth a model law on data protection. The initiative is backed by the India Privacy Foundation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No person, including a data controller and data processor, shall collect any personal data without obtaining the consent of the data subject to whom it pertains, the draft bill says. Collection of personal data without consent can happen only when:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;It’s necessary for the provision of an emergency medical service.&lt;/li&gt;
&lt;li&gt;Prevent, investigate or prosecute a cognizable offence.&lt;/li&gt;
&lt;li&gt;Exempted by a privacy commission that the draft seeks to institute&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Also, the draft bill proposes that no person shall store any personal data for a period longer than is necessary to achieve the purpose for which it was collected or received. The same applies to the processing of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft bill has been submitted to the Justice Sri Krishna Committee — which will deliberate on a data-protection framework for the country. The committee’s first draft is likely to be submitted this month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bill prescribes punishment for offenses related to interception of communication, surveillance, abetment, repeat offenders and offenses by companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bill, according to information on the website, is based on seven principles, foremost of which is the importance of individual rights. The others are:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A data protection law must be based on privacy principles and guidelines discussed in the report of Justice AP Shah Committee of Experts; the Supreme Court judgement on Right to Privacy and European Union’s General Data Protection Regulation.&lt;/li&gt;
&lt;li&gt;A strong privacy commission must be created to enforce privacy principles. The commission should be granted wide powers of investigation, adjudication, rule-making and enforcement. The privacy commission must have jurisdiction over the government as well as private bodies.&lt;/li&gt;
&lt;li&gt;The government must respect user privacy. The government cannot deny essential services to citizens if they choose not to share data with it. The draft says government withholding services on pretext of collection of information effectively amounts to “extortion of consent”.&lt;/li&gt;
&lt;li&gt;A complete privacy code must come with surveillance reform. Even when individual interception and surveillance is carried out this should be severely limited in substance and practiced through procedural safeguards.&lt;/li&gt;
&lt;li&gt;Strengthen the Right To Information Act and exempt information commissioners from interference or control by the privacy commissioner&lt;/li&gt;
&lt;li&gt;International protection and harmonisation is a must to protect the open internet. The group suggests the law must have extraterritorial effect and apply to web services and platforms which are accessible in India and gather personal data of Indians.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The bill takes inspiration from the Privacy (Protection) Bill, 2013 which was drafted over a series of roundtable discussions and inputs conducted by the Centre for Internet and Society, Bengaluru.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The individuals who were involved in the drafting of the model law are Raman Jit Singh Cheema, Apar Gupta, Gautam Bhatia, Kritika Bhardwaj, Maansi Verma, Naman N Aggarwal, Praavita Kashyap, Prasanna S, Ujjwala Uppaluri, Vrinda Bhandari.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-quint-june-9-2018-draft-bill-seeks-to-revolutionise-data-collection-storage-in-india'&gt;https://cis-india.org/internet-governance/news/bloomberg-quint-june-9-2018-draft-bill-seeks-to-revolutionise-data-collection-storage-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-06-11T02:47:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-draft-national-policy-on-official-statistics">
    <title>Comments on the Draft National Policy on Official Statistics</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-draft-national-policy-on-official-statistics</link>
    <description>
        &lt;b&gt;This submission presents comments by the Centre for Internet &amp; Society, India (“CIS”) on the Draft National Policy on Official Statistics which was released to the public by the Ministry of Statistics and Programme Implementation on 17th May 2018 for comments and views.&lt;/b&gt;
        &lt;p&gt;Edited by Swaraj Barooah. Download a PDF of the submission &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/comments-on-draft-national-policy-on-official-statistics"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Preliminary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS appreciates the Government’s efforts in realising the importance of the need for high quality statistical information enshrined in the Fundamental Principles of Official Statistics as adopted by the UN General Assembly in January 2014. CIS is grateful for the opportunity to put forth its views on the draft policy. This submission was made on 31st May, 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First, this submission highlights some general defects in the draft policy: there is lack of principles guiding data dissemination policies; there are virtually no positive mandates set for Government bodies for secure storage and transmission of data; and while privacy is mentioned as a concern, it has been overlooked in designing the principles of the implementation of surveys. Then, this submission puts forward specific comments suggesting improvements to various sections in the draft policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS would also like to point out the short timeline between the publication of the &lt;a class="external-link" href="http://mospi.gov.in/announcements/suggestions-invited-draft-national-policy-official-statistics"&gt;draft policy&lt;/a&gt; (18th May, 2018), and the deadline set for the stakeholders to submit their comments (31st May, 2018). Considering that the policy has widespread implications for all Ministries, citizens, and State legislation rights (proposed changes include a Constitutional Amendment), it is necessary that such call-for-comments are publicised widely, and enough time is given to the public so that the Government can receive well-researched comments.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;General Comments&lt;/h2&gt;
&lt;h3&gt;Data dissemination&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For data dissemination, the draft policy does not stress upon a general principle or set of principles, and often disregards principles specified in the Fundamental Principles of Official Statistics, which are the very principles the Government intends to draw its policies on official statistics from. Rather it relies on context-specific provisions that fail to summarise and articulate a general philosophy for the dissemination of official statistics, and fails to practically embody some stated goals. The first principle on Official Statistics, as realised by the United Nations General Assembly, clearly states that: “[...] official  statistics  that  meet  the  test  of  practical utility  are  to  be  compiled  and  made  available  on  an  impartial  basis  by  official statistical agencies to honour citizens’ entitlement to &lt;a class="external-link" href="https://unstats.un.org/unsd/dnss/gp/FP-New-E.pdf"&gt;public information&lt;/a&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Let us compare this with Section 5.1.7 (9) of the draft policy, which refers to policies regarding core statistics: it mentions a data “warehouse” to be maintained by the NSO which should be accessible to private and public bodies. While this does point towards an open data policy, such a vision has not been articulated in any part thereof.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft policy, at the outset, should have general guiding principles of publishing data openly and freely (once it meets the utility test, and it has been ensured that individual privacy will not be violated by the publishing of such statistics). This should serve well to inform further regulations and related policies governing the use and publishing of statistics, like the &lt;a class="external-link" href="https://cis-india.org/internet-governance/comments-on-the-statistical-disclosure-control-report"&gt;Statistical Disclosure Control Report&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A general commitment to a well-articulated policy on data dissemination will ensure easy-to-follow principles for the various Ministries that will refer to the document. The additional principles that come with open data principles should also be described by the policy document: a commitment to publishing data in a machine-readable format, making it available in multiple data formats (.txt, .csv, etc.), and including its metadata.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data storage and usage&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the absence of a regime for data protection, it is absolutely necessary that a national policy on statistics provide positive mandates for the encryption of all digitally-stored personal and sensitive information collected through surveys. Even though the current draft of the policy mentions the need to protect confidential information, it sets no mandatory requirements on the Government to ensure the security of such information, especially on digital platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, all transmission of potentially sensitive information should be done with the digital signatures of the employee/Department/Ministry authorising said transmission. This will ensure the integrity and authenticity of the information, and provide with an auditable trail of the information flowing between entities in the various bodies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It is appreciable that Section 5.7.9 of the draft policy notes, “[a]ll statistical surveys represent a degree of privacy invasion, which is justified by the need for an alternative public good, namely information.” However, all statistical surveys may not be proportionate in their invasiveness, even if they might serve a legitimate public goal in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft policy does not address how privacy concerns can be taken into account while designing the survey itself. A necessary outcome of the realisation of the possible privacy violations that may arise due to surveys is that all data collection be “minimally intrusive”, the data be securely stored (see previous comment section, ‘Data storage and usage’), and the surveyed users have control over the data even after they have parted with their information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the policy deals extensively with the implementation of surveys, the following should details should be clearly laid out in the policy:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The extent to which an individual has control over the data they have provided to the surveying agency.&lt;/li&gt;
&lt;li&gt;The means of redressal available to an individual who feels that his/her privacy has been violated through the publication of certain statistical information&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Specific Comments&lt;/h2&gt;
&lt;p&gt;Section 5.1: Dichotomising official statistics as core statistics and other official statistics&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The reasons for dichotomising official statistics has not been appropriately substantiated with evidence, considering the wide implications of policy proposals that arise from the definition of “core statistics.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Firstly, the descriptions of what constitutes “core statistics” casts too wide a net by only having a single vague qualitative criterion, i.e. “national importance.” All the other characteristics of the “core statistics” are either recommendations or requirements as to how the data will be handled and thus, pose no filter to what can constitute “core statistics.” The wide net is apparent in the fact that even the initially-proposed list of “core statistics”, given in Annex-II of the policy, has 120 categories of statistics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secondly, the policy does not provide reasons for why the characteristics of “core statistics”, highlighted in Section 5.1.5, should not apply to all official statistics at the various levels of Government. Therefore, the utility of the proposed dichotomy has also not been appropriately substantiated with illustrative examples of how “core statistics” should be considered qualitatively different from all official statistics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This definition may lead to widespread disagreement between the States and the Centre, because Section 5.2 proposes that “core statistics” be added to the Union List of the Seventh Schedule of the Constitution. How the proposal may affect Centre-State responsibilities and relations pertaining to the collection and dissemination of statistics is elaborated in the next section.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Recommendations&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy should not make a forced dichotomy between “core” and (&lt;i&gt;ipso facto&lt;/i&gt;) non-core statistics. If a distinction is to be made for any reason(s) (such as for the purposes of delineating administrative roles) then such reason must be clearly defined, along with a clear explanation for why such a dichotomy would alleviate the described problem. The definitions should have tangible and unambiguous qualitative criteria.&lt;/p&gt;
&lt;p&gt;Section 5.2: Constitutional amendment in respect of core statistics&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The main proposal in the section is that the Seventh Schedule of the Constitution be amended to include “core statistics” in the Union List. This would give the Parliament the legislative competence to regulate the collection, storage, publication and sharing of such statistics, and the Central Government the power to enforce such legislation. Annex-II provides a tentative list of what would constitute “core statistics”; as is apparent, this list is wide-ranging and consists over 120 items which span the gamut of administrative responsibilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The list includes items such as “Landholdings Number, area, tenancy, land utilisation [...]” (S. No. 21), and “Statistics on land records” (S. No. 111) while most responsibilities of land regulation currently lie with the States. Similarly, items in Annex-II venture into statistics related to petroleum, water, agriculture, electricity, and industry; some of which are in the Concurrent or State List.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Statistics are metadata. There is no reason for why the administration of a particular subject lie with the State, and the regulation of data about such subject should lie with solely with the Central Government. It is important to recognise that adding the vaguely defined “core statistics” to the Union List, while enabling the Central Government to execute and plan such statistical exercises, will also prevent the States from enacting any legislation that regulates the management of statistics regarding its own administrative responsibilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The regulation of State Government records in general has been a contentious issue, and its place in our federal structure has been debated several times &lt;a class="external-link" href="https://thewire.in/tech/states-power-enact-data-protection-laws"&gt;in the Parliament&lt;/a&gt;&lt;span&gt;:&lt;/span&gt; the enactment of Public Records Act, 1993; the Right to Information Act, 2005; and the Collection of Statistics Act, 2008 are predicated on an assumption of such competence lying with the Parliament. However, it is equally important to recognise the role States have played in advancing transparency of Government records. For example, State-level Acts analogous to the Right to Information Act existed in Tamil Nadu and Karnataka before the Central Government enactment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Recommendations&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;We strongly recommend that “statistics” be included in the Concurrent List, so that States are free to enact progressive legislation which advances transparency and accountability, and is not in derogation of Parliamentary legislation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Ministry should view this statistical policy document as a venue to set the minimum standards for the collection, handling and publication of statistics regarding its various functions. If the item is added to the Concurrent List, the States, through local legislation, will only have the power to improve on the Central standards since in a case of conflict, State-levels laws will be superseded by Parliamentary ones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 5.3: Mechanism for regulating core statistics including auditing&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft policy in Section 5.3.2 says, “[...] The Committee will be assisted by a Search Committee headed by the Vice-Chairperson of the NITI Aayog, in which a few technical experts could be included as Members.” The non-commital nature of the word ‘could’ in this statement detracts from the importance of having technical experts on this committee, by making their inclusion optional. The policy also does not specify who has the power to include technical experts as Members in the Search Committee. The statement should include either a minimum number of a  specific number or members, and not use the non-committal word “could”&lt;/p&gt;
&lt;p&gt;The National Statistical Development Council, as mentioned in 5.3.9, is supposed to “handle Centre-State relations in the areas of official statistics, the Council should be represented by Chief Ministers of six States to be nominated by the Centre” (Section 5.3.10). The draft does not elaborate on the rationale behind including just six states in the Council. It does not recommend any mechanism on the basis of which Centre will nominate states in the council.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Recommendations&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The policy should recommend a minimum number of technical experts who &lt;i&gt;must&lt;/i&gt; be included in the search committee, along with a clear process for how such members are to be appointed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the policy appropriately recognises the great diversity in India and the unique challenges faced by each State. Thus, each State has its unique requirements. Since in Section 5.3.11, the policy recommends that council meet at a low frequency of at least once in a year, all States should be represented in the Council.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 5.4: Official Machinery to implement directions on core statistics&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The functions of Statistics Wing in the MOSPI, laid out in Section 5.4.7, include advisory functions which overlap with functions of National Statistical Commission (NSC) mentioned in Section 5.3.5. Some regulatory functions of Statistics Wing, like “conducting quality checks and auditing of statistical surveys/data sets”, overlap with the regulatory functions of NSC mentioned in Section 5.3.7.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In section 5.3.1, the draft policy explicitly mentions that “what is feasible and desirable is that production of official statistics should continue with the Government, whereas the related regulatory and advisory functions could be kept outside the Government”. But Statistics Wing is a part of the government and it also has regulatory and advisory functions. It will adversely affect the power of NSC as an autonomous body.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are inconsistencies in the draft-policy regarding the importance and need of a decentralized statistical system. In section 3 [Objectives], it has been emphasized that the Indian Statistical System shall function within decentralized structure of the system.  But, in section 5.4.15, the draft says that decentralized statistical system poses a variety of problems, and advocates for a unified statistical system. Again, in section 5.15, draft emphasizes the development of sub-national statistical systems. These views are inconsistent and create confusion regarding the nature of statistical system that policy wants to pursue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Recommendations&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The functions of the NSC should be kept in its exclusive domain. Any such overlapping functions should be allocated to one agency taking into consideration the Fundamental Principles on Official Statistics.&lt;/p&gt;
&lt;p&gt;The inconsistencies regarding the decentralisation philosophy of the statistical system should be addressed.&lt;/p&gt;
&lt;p&gt;Section 5.5: Identifying statistical products required through committees&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Section 5.5.2 recognises data confidentiality as a goal for statistical coordination, it does not take into account the violation of privacy that might occur due to the sharing of data. For example, a certain individual might agree to share personal information with a particular Ministry, but have apprehensions about it being shared with other Ministries or private parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Recommendations&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We recommend that point 4 in Section 5.5.2 be read as, “enabling sharing of data without compromising the privacy of individuals and the confidentiality/security of data.”The value of of the individual privacy stems from both the recent Supreme Court judgment that affirmed privacy as a Fundamental Right, and also Principle 6 of the of the Fundamental Principles of Official Statistics. Realising privacy as a goal in this section will add a realm of individual control that is already articulated in Section 5.7.9.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Annex-VII: Guidelines on Outsourcing statistical activities&lt;/h2&gt;
&lt;h3&gt;Comments&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 6 defines “sensitive information” in an all-inclusive manner and does not leave space for further inclusion of any information that may be interpreted as sensitive. For example, biometric data has not been listed as “sensitive information”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 9.1, draft says, “[t]he identity of the Government agency and the Contractor may be made available to informants at the time of collection of data”. It is imperative that informants have the right to verify the identity of the Government agency and the Contractor before parting with their personal information.&lt;/p&gt;
&lt;h3&gt;Recommendations&lt;/h3&gt;
&lt;p&gt;The definition of “sensitive information” should be broad-based with scope for further inclusion of any kind of data that may be deemed “sensitive.”&lt;/p&gt;
&lt;p&gt;Section 9.1 must mandate that the identity of the Government agency and the Contractor be made available to informants at the time of collection of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 9.6 can be redrafted to state that each informant must be informed of the manner in which the informant could access the data collected from the informant in a statistical project, as also of the measures taken to deny access on that information to others, except in the cases specified by the policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 10.2 can be improved to state that if information exists in a physical form that makes the removal of the identity of informants impracticable (e.g. on paper), the information should be recorded in another medium and the original records must be destroyed.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-draft-national-policy-on-official-statistics'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-draft-national-policy-on-official-statistics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Gurshabad Grover and Sandeep Kumar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-06-07T02:54:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/comments-on-draft-national-policy-on-official-statistics">
    <title>Comments on Draft National Policy on Official Statistics</title>
    <link>https://cis-india.org/internet-governance/files/comments-on-draft-national-policy-on-official-statistics</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/comments-on-draft-national-policy-on-official-statistics'&gt;https://cis-india.org/internet-governance/files/comments-on-draft-national-policy-on-official-statistics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Gurshabad Grover</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-06-07T01:58:22Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-june-6-2018-akshatha-m-ec-disables-easy-access-to-electoral-data-across-states">
    <title>EC disables easy access to electoral data across states </title>
    <link>https://cis-india.org/internet-governance/news/economic-times-june-6-2018-akshatha-m-ec-disables-easy-access-to-electoral-data-across-states</link>
    <description>
        &lt;b&gt;The recently-concluded Assembly elections may have set more than just one precedent with implications for the entire nation. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Akshatha M was published in &lt;a class="external-link" href="https://economictimes.indiatimes.com/news/politics-and-nation/ec-disables-easy-access-to-electoral-data-across-states/articleshow/64474558.cms"&gt;Economic Times&lt;/a&gt; on June 5, 2018. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;While the poll result led to what many see as the beginning of a national front comprising regional parties, the steps Karnataka’s chief electoral officer took to protect the privacy of its electoral rolls will be emulated across the country. &lt;br /&gt;&lt;br /&gt;The Election Commission of India, in an internal circular issued in January, ordered the chief electoral officers of all states and union territories to publish electoral rolls only in image PDF and CAPTCHA formats. These formats ensure that no individual can access electoral data, except as readonly files. While the image PDF format disables the search option in the rolls, CAPTCHA does not allow visitors to either extract or download the rolls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It has been decided that electoral rolls should be published on (the) website in image PDF only. If presently-available PDF electoral rolls are not image PDF, then the same shall be done immediately,” the EC circular said. &lt;br /&gt;&lt;br /&gt;It all started in the latter part of 2017 when Karnataka’s chief electoral officer published the draft electoral rolls as image PDF with CAPTCHA formats. Earlier, rolls were published in text PDF (minus CAPTCHA) format. Electoral analysts and citizen groups took exception to the new formats on the grounds that that did not allow them to analyse errors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CEO Sanjiv Kumar’s contention was that analysts were seeking easy access to data. He defended his move on the grounds that the personal data of voters need to be protected. The tiff eventually reached the EC’s doorstep. It turns out that the chief election commissioner was convinced about Sanjiv Kumar’s intent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speaking to ET, CEC Om Prakash Rawat said: “After Cambridge Analytica and Facebook episodes, the EC has decided to protect voters’ data from data harvesting and data manipulation as a precautionary measure. We are also working towards adding special data security features in the electoral rolls.” &lt;br /&gt;&lt;br /&gt;Electoral roll analysts continue to see the EC’s decision as a bid to cover up flaws in the rolls. “Their argument is self-defeating on two counts: One, an individual can still extract the data, though it is a little time-consuming. Two, voter data is sold in broad daylight for 7 paise per record and despite knowing this, the election authorities have not taken any action to prevent the same,” said Bengaluru-based electoral roll analyst PG Bhat.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data security researchers say the EC decision to have the new formats is no long-term solution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director of the Centre for Internet and Society, said that the image PDF format would not be a longterm solution at a time when the optical character recognition software has become all-powerful. “The EC should first remove EPIC numbers from the public database as it allows people who are into data-mining exercise to combine data. The solution would be to have mandatory registration in order to access data, even for voters,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He said the EC should have a system that enables it to track those who access electoral data. “Mass export of data should be permitted only for those who are monitoring electoral rolls at the polling-station level,” he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-june-6-2018-akshatha-m-ec-disables-easy-access-to-electoral-data-across-states'&gt;https://cis-india.org/internet-governance/news/economic-times-june-6-2018-akshatha-m-ec-disables-easy-access-to-electoral-data-across-states&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-06-29T01:59:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/times-of-india-june-1-2018-allow-admins-to-add-users-to-online-group-chats-only-after-permission-sflc-in">
    <title>Allow admins to add users to online group chats only after permission: SFLC.in</title>
    <link>https://cis-india.org/internet-governance/news/times-of-india-june-1-2018-allow-admins-to-add-users-to-online-group-chats-only-after-permission-sflc-in</link>
    <description>
        &lt;b&gt;SFLC.in -- a donor supported legal services organisation -- has written an open letter to messaging service providers like WhatsApp, Facebook and others, urging them to modify their platforms to ensure that users are not added to group chats without their permission.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="https://timesofindia.indiatimes.com/business/india-business/allow-admins-to-add-users-to-online-group-chats-only-after-permission-sflc-in/articleshow/64416022.cms"&gt;Times of India&lt;/a&gt; on June 1, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In its letter, Software Freedom Law Centre, India (SFLC.in) said any user with administrator rights can currently add another person to the group without the latter's permission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the absence of a mechanism to prevent themselves from being added to groups that they would not like to participate in, users have no option but to manually exit the groups.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"This is a troubling state of affairs because users may be forcefully exposed to a range of subjectively undesirable content that they would never have signed up for otherwise, which can be particularly damaging, especially in situations where malicious actors attempt to intimidate, disparage, harass or harm individuals in any way," the letter said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The letter has also been co-signed by Digital Empowerment Foundation, Centre for Internet and Society and a few others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Emails sent to Facebook, Tencent and others seeking their comments did not elicit any response.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;SFLC.in argued that the current format is an issue for many, including those belonging to minority and vulnerable groups.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"While blocking malicious actors can usually help mitigate the damage to an extent, on online messaging services like yours, they are able to easily circumvent blocks by creating groups and adding their targets to these groups," it said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The problem is only made worse when personal information like phone numbers, user IDs and photographs are shared with a large number of users, which could open the doors to even greater abuse, it added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;SFLC.in argued that there are no adequate safeguards to prevent infringement of user rights and therefore, these platforms should take immediate steps to address this issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"...implement measures to make it so that being added to group conversations without permission is no longer a possibility. Not only will this greatly help in limiting abusive uses of your services, but it will also make users less wary of using the services, making the Internet a safer space for us all," it added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/times-of-india-june-1-2018-allow-admins-to-add-users-to-online-group-chats-only-after-permission-sflc-in'&gt;https://cis-india.org/internet-governance/news/times-of-india-june-1-2018-allow-admins-to-add-users-to-online-group-chats-only-after-permission-sflc-in&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-06-26T02:03:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-manavi-kapur-alnoor-peermohamed-may-31-2018-patanjali-s-kimbho-swiftly-retreats-over-security-scare-ripped-on-twitter">
    <title>Patanjali's Kimbho swiftly retreats over security scare, ripped on Twitter</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-manavi-kapur-alnoor-peermohamed-may-31-2018-patanjali-s-kimbho-swiftly-retreats-over-security-scare-ripped-on-twitter</link>
    <description>
        &lt;b&gt;Swadeshi" messaging app targeted at WhatsApp taken off from app stores hours after launch.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Alnoor Peermohamed and Manavi Kapur was published in the &lt;a class="external-link" href="https://www.business-standard.com/article/companies/patanjali-s-kimbho-swiftly-retreats-over-security-scare-ripped-on-twitter-118053101326_1.html"&gt;Business Standard&lt;/a&gt; on May 31, 2018. Gurshabad Grover was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The fate of Patanjali’s “swadeshi” instant messaging app Kimbho was sealed in the span of just a few hours, thanks to viral messages being shared on Facebook-owned WhatsApp, the app that the Baba Ramdev-promoted company was trying to combat.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=patanjali" target="_blank"&gt;Patanjali &lt;/a&gt;on Thursday launched Kimbho with the sole intent of checking the rise of messaging giant &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=whatsapp" target="_blank"&gt;WhatsApp &lt;/a&gt;in India. However, after Kimbho’s various data vulnerabilities were exposed by the security expert and whistleblower who goes by the pseudonym Elliot Alderson on Twitter, the app made a quiet exit from Google’s Play Store.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;iframe frameborder="0" height="1" marginheight="0" marginwidth="0" scrolling="no" title="3rd party ad content" width="1"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jokes surrounding the app’s quick retreat spread like wildfire on rival platform &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=whatsapp" target="_blank"&gt;WhatsApp.&lt;/a&gt; It was perhaps the quickest rise and fall in the popularity of a mobile application.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Alderson, who has exposed data breaches in the UIDAI’s website, took to Twitter to rip apart the &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=kimbho+app" target="_blank"&gt;Kimbho app.&lt;/a&gt; “This @KimbhoApp is a joke, next time before making press statements, hire competent developers... If it is not clear, for the moment don't install this app,” he wrote. His next tweet sent alarm bells ringing among users: “The #Kimbho #android #app is a security disaster. I can access the messages of all the users...”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kimbho, though, claims that every message on its platform is encrypted by the Advance Encryption Standard and that it saves “no data on our servers or cloud”. But Alderson pointed out that the one-time password security could be worked around. “It's possible to choose a security code between 0001 and 9999 and send it to the number of your choice,” he tweeted. Kimbho, explained as a Sanskrit greeting by S K Tijarawala, Ramdev’s spokerperson, on Twitter, is also a patched-up application over the existing Bolo messaging app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is most likely the reason the app was taken off the Google Play Store. “There were basic authentication and authorisation related vulnerabilities where an end user can see the data of other users. These flaws may be the reason the developers took down the app. Google flags such things,” said Anand Prakash, a Bengaluru-based ethical hacker.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=whatsapp" target="_blank"&gt;WhatsApp &lt;/a&gt;uses end-to-end encryption that essentially means even they can’t access the messages you send. But Kimbho, on the other hand, was not using end-to-end security and probably even saving every message as plain text on its server,” adds Gurshabad Grover, policy officer at the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google did not respond to queries about whether the developer took the app down or Google flagged it as unsecure. Kimbho declared on its Twitter handle that its app was removed from the Play Store because of heavy traffic, claiming that it was downloaded 150,000 times in a mere three hours since its launch.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Apple’s App Store, it was trending in the social networking category at the fourth position in India, just below WhatsApp, Facebook and Facebook’s Messenger, and above popular messaging apps such as Skype, LinkedIn and hike messenger.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tijarawala had announced Kimbho’s launch on Twitter, calling it an app developed by the “shishyas” (disciples) and “navdikshit sadhus” (newly ordained priests) of Ramdev and Acharya Balkrishna, managing director, &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=patanjali" target="_blank"&gt;Patanjali &lt;/a&gt;Ayurved and co-founder, &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=patanjali" target="_blank"&gt;Patanjali &lt;/a&gt;Yogpeeth in Haridwar. Tijarawala’s tweet also claimed that this app was built using “swadeshi” techniques, though what these are remains a mystery. Emails, text messages and calls to Tijarawala went unanswered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In keeping with an “Indian” aesthetic, the app’s logo has a “shankh” (conch shell), perhaps signifying a war cry against foreign-born WhatsApp, which has over 200 million active users in India. The conch shell also blends well with Kimbho’s tag line, “Ab Bharat Bolega” (now India will speak). But that is where its tenuous Indianness begins to crumble.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the app was registered as a product of &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=patanjali+ayurved" target="_blank"&gt;Patanjali Ayurved &lt;/a&gt;on the Play Store, the developer on Apple’s App Store is Appdios Inc, a San Francisco-based app development company. Aditi Kamal and Sumit Kumar are this company’s founders according to LinkedIn. The duo has worked with technology giants such as Google and Apple and hold masters degrees from University of Southern California in the US. A blonde man features on the screenshots that the app has featured on its landing page on the App Store.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Taking forward Bolo’s keyboard suggestions, cheekily called “Quickies”, Kimbho offers pre-typed messages such as “hugs and kisses”, “what the heck” and “parents are watching”. Whether these millennial-friendly features and Kimbho itself are an attempt to get young millennials in touch with their “swadeshi” roots remains to be seen.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-manavi-kapur-alnoor-peermohamed-may-31-2018-patanjali-s-kimbho-swiftly-retreats-over-security-scare-ripped-on-twitter'&gt;https://cis-india.org/internet-governance/news/business-standard-manavi-kapur-alnoor-peermohamed-may-31-2018-patanjali-s-kimbho-swiftly-retreats-over-security-scare-ripped-on-twitter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-06-01T14:15:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-rajitha-menon-surupasree-sarmmah-dont-blindly-forward-whatsapp-messages-you-could-be-sued">
    <title>Don't blindly forward WhatsApp messages. You could be sued</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-rajitha-menon-surupasree-sarmmah-dont-blindly-forward-whatsapp-messages-you-could-be-sued</link>
    <description>
        &lt;b&gt;Never before in Bengaluru has the Internet and social media taken such a vicious and violent turn as it did last week.&lt;/b&gt;
        &lt;p&gt;The article by Rajitha Menon and Surupasree Sarmmah was published in the &lt;a class="external-link" href="https://www.deccanherald.com/metrolife/your-bond-bengaluru/don-t-blindly-forward-whatsapp-messages-you-could-be-sued-672304.html"&gt;Deccan Herald&lt;/a&gt; on May 29, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;A fake Whatsapp message that went viral has led to the death of a man in Chamarajpet. But Bengaluru is not alone. In the recent past many have been lynched in Andhra Pradesh, Telangana, Tamil Nadu, Uttarakhand, Jharkhand and Hyderabad over rumours and fake videos.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In tech-savvy Bengaluru, a 26-year old man was beaten to death in Chamarajpet by a mob that mistook him for a kidnapper. "The big problem is that for a large part of India, WhatsApp is the first exposure to the Internet. What they see there becomes news; people don't do a critical analysis of what comes their way," says Swaraj Barooah, senior programme manager, Centre for Internet &amp;amp; Society, Bengaluru.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What are the legal implications of forwarding fake WhatsApp news? "It's a grey area in terms of current regulation," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, he advises caution: don't circulate messages you can't vouch for.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;MT Nanaiah, senior advocate says, "If a message is intended to harm a person's reputation, it might come under the purview of the Indian Penal Code Section 499 A, which defines defamation and Section 500, which defines the punishment."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Defamation can attract a punishment of up to two years in jail and a fine. Victims of fake forwards can also sue for damage, he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Varanasi, district officials are holding WhatsApp admins responsible for fake news, and issued guidelines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I think the courts have been doing a flip-flop on this. I am not sure but the legal validity is weak to hold admins responsible for what happens in the group," notes Barooah.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-rajitha-menon-surupasree-sarmmah-dont-blindly-forward-whatsapp-messages-you-could-be-sued'&gt;https://cis-india.org/internet-governance/news/deccan-herald-rajitha-menon-surupasree-sarmmah-dont-blindly-forward-whatsapp-messages-you-could-be-sued&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-05-31T23:49:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/india-spend-madhur-singh-may-31-2018-india-proposes-law-to-give-indians-complete-control-of-their-digital-data">
    <title>India Proposes Law to Give Indians Complete Control of their Digital Health Data</title>
    <link>https://cis-india.org/internet-governance/news/india-spend-madhur-singh-may-31-2018-india-proposes-law-to-give-indians-complete-control-of-their-digital-data</link>
    <description>
        &lt;b&gt;India’s health ministry has proposed a law to govern data security in the healthcare sector that would give individuals complete ownership of their health data. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Madhur Singh was published as a cover story in &lt;a class="external-link" href="http://www.indiaspend.com/cover-story/india-proposes-law-to-give-indians-complete-control-of-their-digital-data-58073"&gt;IndiaSpend &lt;/a&gt;on May 31, 2018. Shweta Mohandas and Amber Sinha were quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Individuals would have the absolute right to refuse or allow data to be generated, collected, accessed, transmitted or used. And data collectors such as hospitals would be prohibited from refusing treatment to those who do not want their data collected or used.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This would make India one of the world’s foremost jurisdictions in the regulation of healthcare data, at a time when governments around the world are scrambling to keep a check on who gets to generate and use data and how, especially as citizens do not completely understand the data privacy and security implications of the innumerable applications they wittingly or unwittingly use.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft Digital Information Security in Healthcare Act was proposed by the health ministry on March 11, 2018. The period for stakeholder comment ended April 21, and a bill is currently being finalised. Experts say the health ministry is possibly waiting for a final verdict from the Supreme Court on petitions challenging the constitutional validity of Aadhaar–on which it has just completed the&lt;a href="http://indianexpress.com/article/india/aadhaar-case-supreme-court-reserves-verdict-after-38-days-of-hearing-attorney-general-says-its-second-longest-oral-hearing/"&gt; second-longest&lt;/a&gt; oral hearing in the history of the court. The ruling is expected in July or August.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The verdict will guide India’s data privacy framework, which is already being prepared by the  &lt;a href="http://www.prsindia.org/parliamenttrack/report-summaries/white-paper-on-data-protection-framework-for-india-4986/"&gt;Committee&lt;/a&gt; of Experts on a Data Protection Framework for India being chaired by Justice B. N. Srikrishna. It will also have implications for the health ministry’s proposed law.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Use of data&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Digital health data (DHD), or electronic health records of individuals or the public (when aggregated), typically comprise information such as a patient’s age, contact information, vital signs, lab reports, medical history including immunisations, allergies, and current and past medications.&lt;/p&gt;
&lt;p&gt;The use of DHD promises to revolutionise healthcare services by providing more comprehensive care using the most accurate records possible, possibly reducing costs and timelines for all involved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The law would allow anonymised health data, which cannot be traced to individuals, to be used for specified public health purposes, such as early detection and rapid response to public health emergencies such as bioterror events and infectious disease outbreaks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, for data in identifiable form, the draft stipulates that explicit prior permission would be needed from the digital data owner before each transmission or use. For instance, often companies offer free medical checkups to all employees. By revealing a pregnancy or a serious chronic condition, these tests could imperil an employee’s situation with their employer. With the proposed law, an employee could refuse to allow the pathology laboratory to share their data with the employer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In recognition of the serious privacy and security concerns over uses and misuses of digital health data, the proposed law would completely prohibit use of digital health data for ‘commercial purposes’, whether in an identifiable or anonymised form.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This would mean that insurance companies, employers, human resource consultants and pharmaceutical companies would not be allowed to access or use health data, the law firm Trilegal said in an &lt;a href="http://www.trilegal.com/index.php/publications/update/digital-information-security-in-healthcare-act"&gt;analysis&lt;/a&gt; posted on its website on April 11, 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Currently, employers can process health data for employee benefits, office records and insurance purposes under labour legislations like Maternity Benefits Act, Employee Compensation Act and Employee State Insurance Corporation Act and as part of their internal policies,” Trilegal said, adding that the proposed law would allow the use of digital data only to the extent required by these laws. “However, access, use or disclosure of [digital health data] to employers or human resource consultants for any other purpose is prohibited,” Trilegal noted.&lt;/p&gt;
&lt;p&gt;Similarly, insurance companies and drug makers would not be allowed to access or use digital health data, although use for academic, clinical and public health research would be allowed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The central government would be tasked with establishing ‘health information exchanges’ that would regulate the exchange of DHD between various clinical establishments–hospitals, clinics, diagnostic centres, pathology laboratories, etc.–for purposes and in manners allowed under the law.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Data breach&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The responsibility for ensuring data security and privacy would lie with the entity that has custody of the data, which could be penalised for data breach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, under Indian law, companies in India are not obligated to inform individuals of data breach, with the exception of banks, which are obligated to inform the Reserve Bank of India within six hours. The result is that individuals are often not aware that their details may have been compromised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft law proposes to make breach notification mandatory. Data breaches would be ranked by severity, and the more serious kind would be punishable with a fine of at least Rs 1 lakh and a jail term of up to five years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clinical establishments and health information exchanges would have to notify the owner in case of a breach within three days. Data owners could claim compensation from the person who breached the data, and no limit has been prescribed for the compensation amount.&lt;/p&gt;
&lt;p&gt;The draft also specifies punishment for various other offences such as unauthorised access and data theft of up to five years’ imprisonment.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Some concerns&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The stringent provisions of the proposed law, particularly the blanket ban on use of DHD by insurance and pharmaceutical companies, has raised concerns among these industries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Most data protection laws allow healthcare institutes to process data so long as there exists a legitimate interest in doing so,” Rahul Kumar, country manager and director with security solutions company WinMagic India said, adding that provisions debarring insurance and pharmaceutical companies, “while being protective in nature might be excessively harsh under certain circumstances”.&lt;/p&gt;
&lt;p&gt;The stringent privacy provisions also put the future of wearable devices in doubt, Shweta Mohandas of The Centre for Internet and Society (CIS) told &lt;strong&gt;IndiaSpend&lt;/strong&gt;, “Perhaps a revised draft of the law, or rules framed under the final law, would specify these details.”&lt;/p&gt;
&lt;p&gt;The draft does not clearly define the security measures that must be followed to prevent data breach, Mohandas and Amber Sinha, also of the CIS, told &lt;strong&gt;IndiaSpend&lt;/strong&gt;. However, a National Electronic Health Authority proposed to be set up under the law could possibly define a clear set standards for maintaining security, they said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, the draft proposes to allow for the withdrawal of consent but does not say how data would be removed from the system, Sinha and Mohandas said, adding that the roles of the various bodies to be established must be clearly defined.&lt;/p&gt;
&lt;p&gt;Most commentators expect the finalised bill, which will be drafted after taking into account stakeholder comment, will iron out these issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This law in its current form and further in its revised version will go a long way to help the industry be more secure,” Kumar said, adding, “Compliance is known to bring in a level playing field for industries and also give the end user the confidence that the critical data is secure.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many commentators also have questioned the timing of the health ministry’s draft law, given that India is currently in the process of creating a framework and an overarching legislation on data privacy and security. “It is curious that the Ministry has chosen to not wait for the draft law, before framing and releasing their draft,” Sinha and Mohandas said, “This suggests a lack of coordination between the different ministries, and if due care is not taken, could lead to inconsistencies across sectoral regulations of data.”&lt;/p&gt;
&lt;p&gt;However, they said, it is possible that the health ministry will wait for the Supreme Court verdict in the Aadhaar litigation before finalising the bill.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;(&lt;/em&gt;&lt;strong&gt;&lt;em&gt;Singh&lt;/em&gt;&lt;/strong&gt;&lt;em&gt; is a contributing editor with IndiaSpend.)&lt;/em&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/india-spend-madhur-singh-may-31-2018-india-proposes-law-to-give-indians-complete-control-of-their-digital-data'&gt;https://cis-india.org/internet-governance/news/india-spend-madhur-singh-may-31-2018-india-proposes-law-to-give-indians-complete-control-of-their-digital-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-06-01T13:57:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
