<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 546 to 560.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/summary-of-cis-workshop-on-dna-profiling-bill-2012"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-times-of-india-kim-arora-may-5-2017-suicide-videos-facebook-beefs-up-team-to-monitor-content"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-quint-rohit-pathak-may-21-2016-suckly-attacks-national-stock-exchange-tech-vendor-among-others"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/submission-to-the-facebook-oversight-board-policy-on-cross-checks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/submission-to-igf-2025-call-for-thematic-inputs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-september-9-2019-submission-to-global-commission-on-stability-of-cyberspace"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/submission-on-indias-draft-comments-on-proposed-changes-to-itus-itrs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/submission-on-proposals-for-future-itrs-and-related-processes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-may-21-2014-sruthy-susan-ullas-students-lead-the-way-with-apps-for-ideas"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-world-regina-mihindukulasuriya-april-26-2017-stop-the-haphazard-internet-shutdown-says-mp-jay-panda"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/outlook-feb-22-2013-arindam-mukherjee-stop-press-counsel"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/stockholm-internet-forum-2019"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/summary-of-cis-workshop-on-dna-profiling-bill-2012">
    <title>Summary of the CIS workshop on the Draft Human DNA Profiling Bill 2012</title>
    <link>https://cis-india.org/internet-governance/blog/summary-of-cis-workshop-on-dna-profiling-bill-2012</link>
    <description>
        &lt;b&gt;On March 1st, 2013, the Centre for Internet and Society organized a workshop which analysed the April 2012 draft Human DNA Profiling Bill and its potential implications on human rights in India.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Think you control who has access to your DNA data? That might just be a myth of the past. Today, clearly things have changed, as draft Bills with the objective of creating state, regional, and national DNA databases in India have been leaked over the last years. Plans of profiling certain residents in India are being unravelled as, apparently, the new policy when collecting, handling, analysing, sharing and storing DNA data is that all personal information is welcome; the more, the merrier!&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Who is behind all of this? The Centre for DNA Fingerprinting and Diagnostics in India created the 2007 draft DNA Profiling Bill&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn1"&gt;[1]&lt;/a&gt;, with the aim of regulating the use of DNA for forensic and other purposes. In February 2012 another draft of the Bill was leaked which was created by the Department of Biotechnology. The most recent version of the Bill was drafted in April 2012 and seeks to create DNA databases at the state, regional and national level in India&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn2"&gt;[2]&lt;/a&gt;. According to the latest 2012 draft Human DNA Profiling Bill, each DNA database will contain profiles of victims, offenders, suspects, missing persons and volunteers for the purpose of identification in criminal and civil proceedings. The Bill also establishes a process for certifying DNA laboratories, and a DNA Profiling Board for overseeing the carrying out of the Act.&lt;/p&gt;
&lt;p&gt;However, the 2012 draft Human DNA Profiling Bill lacks adequate safeguards and its various loopholes and overreaching provisions could create a potential for abuse. The creation of DNA databases is currently unregulated in India and although regulations should be enacted to prevent data breaches, the current Bill raises major concerns in regards to the collection, use, analysis and retention of DNA samples, DNA data and DNA profiles. In other words, the proposed DNA databases would not only be restricted to criminals…&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;DNA databases...and Justice for All?&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;img src="http://farm8.staticflickr.com/7197/6959954129_fefd0f928a.jpg" /&gt;&lt;/p&gt;
&lt;p class="italized"&gt;Source: &lt;span&gt; &lt;/span&gt;&lt;a href="http://www.flickr.com/photos/libertasacademica/"&gt;Libertas Academica&lt;/a&gt; on flickr&lt;/p&gt;
&lt;p class="italized"&gt;&lt;a class="external-link" href="http://dnaphenomena.blogspot.in/2011/05/dna-profiling.html"&gt;&lt;/a&gt;Du&lt;span&gt;ring the workshop &lt;/span&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn3"&gt;[3]&lt;/a&gt;&lt;span&gt;on the 2012 draft Human DNA Profiling Bill, DNA&lt;/span&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn4"&gt;[4]&lt;/a&gt;&lt;span&gt; was defined as a material that determines a persons´ hereditary traits, whilst DNA profiling&lt;/span&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn5"&gt;[5]&lt;/a&gt;&lt;span&gt; was defined as the processing and analysis of unique sequences of parts of DNA. Thus the uniqueness of DNA data is clear and the implications that could potentially occur through its profiling could be tremendous. The 2007 DNA Profiling Bill has been amended, yet its current 2012 version appears not only to be more intrusive, but to also be extremely vague in terms of protecting data, whilst very deterministic in regards to the DNA Profiling Board´s power. A central question in the meeting was:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;i&gt;Should DNA databases be created at all? &lt;/i&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;The following concerns were raised and discussed during the workshop:&lt;/p&gt;
&lt;h3&gt;●      The myth of the infallibility of DNA evidence&lt;/h3&gt;
&lt;p&gt;The Innocence Project&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn6"&gt;[6]&lt;/a&gt;, which was presented at the workshop, appears to provide an appeal towards the storage of DNA samples and profiles, as it represents clients seeking post-conviction DNA testing to prove their innocence. According to statistics presented at the workshop, there have been 303 post-conviction exonerations in the United States, as a result of individuals proving their innocence through DNA testing. Though post-conviction exonerations can be useful, they cannot be the basis and main justification for creating DNA databases. Although DNA testing could enable post-conviction exonerations, errors in matching data remain a high probability and could result in innocent people being accused, arrested and prosecuted for crimes they did not commit. Thus, arguments towards the necessity and utility of the creation of DNA databases in India appear to be weak, especially since DNA evidence is &lt;i&gt;not &lt;/i&gt;infallible&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn7"&gt;[7]&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;False matches can occur based on the type of profiling system used, and errors can take place in the chain of custody of the DNA sample, all of which indicate the weakness of DNA evidence being used. DNA data only provides&lt;i&gt; probabilities&lt;/i&gt; of potential matches between DNA profiles and the larger the amount of DNA data collected, the larger the probability of an error in matching profiles&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn8"&gt;[8]&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;●      &lt;b&gt;The non-criteria of DNA data collection&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;How and when can DNA data be collected? The amended draft 2012 Bill remains extremely vague and broad. In particular, the Bill states that &lt;i&gt;all&lt;/i&gt; offences under the Indian Penal Code and other laws, such as the Immoral Traffic (Prevention) Act, 1956, are applicable instances of human DNA profiling. Section B(viii) of the Schedule states that human DNA profiling will be applicable for offences under &lt;i&gt;´any other law as may be specified by the regulations made by the Board´&lt;/i&gt;. This incredibly vague section empowers the DNA Profiling Board with the ultimate power to decide upon the offences under which DNA data will be collected. The issue is this: most laws have loopholes. A Bill which lists applicable instances of human DNA profiling, under the umbrella of a potentially indefinite number of laws, exposes individuals to the collection of their DNA data, which could lead to potential abuse.&lt;/p&gt;
&lt;h3&gt;●      &lt;b&gt;The DNA Profiling Board´s power&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;The DNA Profiling Board has ´absolute´ power, especially according to the 2012 draft Human DNA Profiling Bill. Some of the Board´s functions include providing recommendations for provision of privacy protection laws, regulations and practices relating to access to, or use of, stored DNA samples or DNA analyses&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn9"&gt;[9]&lt;/a&gt;.  The Board is also required to advise on all ethical and human rights issues, as well as to take ´necessary steps´ to protect privacy. However, it remains unclear how a Board which lacks human rights expertise will carry out such tasks.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;No human rights experts&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Despite the various amendments&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn10"&gt;[10]&lt;/a&gt; to the section on the composition of the Board, no privacy or human rights experts have been included. According to the Bill, the Board will be comprised of many molecular biologists and other scientists, while human rights experts have not been included to the list. This can potentially be problematic as a lack of expertise on privacy and human rights laws can lead to the regulation of DNA databases without taking civil liberties into consideration.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Vague authorisation for communication of DNA profiles&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The Bill also empowers the Board to ´authorise procedures for communication of DNA profiles for&lt;i&gt; civil proceedings&lt;/i&gt; and for crime investigation by law enforcement and &lt;i&gt;other agencies&lt;/i&gt;´&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn11"&gt;[11]&lt;/a&gt;. Although the 2007 Bill &lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn12"&gt;[12]&lt;/a&gt;restricted the Boards´ authorisation to crime investigation by law enforcement agencies, its 2012 amendment extends such authorisation to ´civil proceedings´ which can also be carried out by so-called ´other agencies´.&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn13"&gt;[13]&lt;/a&gt; This amendment raises concerns, as the ´other agencies´ and the term ´civil proceedings´ remain vague.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Protecting the public&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The Board is also authorised to ´assist law enforcement agencies in using DNA techniques to protect the public´&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn14"&gt;[14]&lt;/a&gt;. Over the last years, laws are being enacted that enable law enforcement agencies to use technologies for surveillance purposes in the name of ´public security´, and the 2012 draft Bill is no exception. Many security measures have been applied to ´protect the public´, such as CCTV cameras and other technologies, but their actual contribution to public safety still remains a controversial debate&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn15"&gt;[15]&lt;/a&gt;. DNA techniques which would effectively protect the public have not been adequately proven, thus it remains unclear how the Board would assist law enforcement agencies.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Sharing data with international agencies…and regulating DNA laboratories&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;In addition to the above, the Board would also encourage cooperation between Indian investigation agencies and international agencies&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn16"&gt;[16]&lt;/a&gt;. This would potentially enable the sharing of DNA data between third parties and would enhance the probability of data being leaked to unauthorised third parties.&lt;/p&gt;
&lt;p&gt;The Board would &lt;i&gt;also &lt;/i&gt;be authorised to regulate the standards, quality control and quality assurance obligations of the DNA laboratories&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn17"&gt;[17]&lt;/a&gt;. The draft 2012 Bill ultimately gives &lt;i&gt;monopolistic control&lt;/i&gt; to the DNA Profiling Board over&lt;i&gt; all&lt;/i&gt; the procedures related to the handling of DNA data!&lt;/p&gt;
&lt;h3&gt;●      &lt;b&gt;The DNA Data Bank Manager&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;According to the 2012 draft Human DNA Profiling Bill&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn18"&gt;[18]&lt;/a&gt;, it is the DNA Data Bank Manager who would carry out ´all operations of and concerning the National DNA Data Bank´. All such operations are not clearly specified. The powers and duties that the DNA Data Bank Manager would be expected to have are not specified in the Bill, which merely states that they would be specified by regulations made by the DNA Profiling Board.&lt;/p&gt;
&lt;p&gt;The Bill also empowers the Manager to determine appropriate instances for the communication of information&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn19"&gt;[19]&lt;/a&gt;. In other words, law enforcement agencies and DNA laboratories can request the disclosure of information from the DNA Data Bank Manager, without prior authorisation. The DNA Data Bank Manager is empowered to decide the requested data.&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;DNA access restrictions&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Are you a victim or a cleared suspect? You better be, if you want access to your data to be restricted! The 2012 draft Human DNA Profiling Bill &lt;/span&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn20"&gt;[20]&lt;/a&gt;&lt;span&gt;states that access to information will be restricted in cases when a DNA profile derives from a victim or a person who has been excluded as a suspect. The Bill is unclear as to how access to the data of non-victims or suspects is regulated.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;●      Availability of DNA profiles and DNA samples&lt;/h3&gt;
&lt;p&gt;According to the amended draft 2012 Bill&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn21"&gt;[21]&lt;/a&gt;, DNA profiles and samples can be made available in criminal cases, judicial proceedings and for defence purposes among others. However, ´criminal cases´ are loosely defined and could enable the availability of DNA data in low profile cases. Furthermore, the availability of DNA data is also enabled for the ´creation and maintenance of a&lt;i&gt; population statistics database&lt;/i&gt;´. This is controversial because it remains unclear how such a database would be used.&lt;/p&gt;
&lt;h3&gt;●      Data destruction&lt;/h3&gt;
&lt;p&gt;According to an amendment to section 37, DNA data will be kept on a ´permanent basis´ and the DNA Data Bank Manager will expunge a DNA profile only once the court has certified that an individual is no longer a suspect. This raises major concerns, as it does not clarify under what conditions individuals can have access to their data during its retention, nor does it give volunteers and missing persons the opportunity to have their data deleted from the data bank.&lt;/p&gt;
&lt;h2&gt;Workshop conclusions&lt;/h2&gt;
&lt;p&gt;&lt;img src="http://farm4.staticflickr.com/3235/3080247531_bf04a5cbe5.jpg" /&gt;&lt;/p&gt;
&lt;p&gt;Source: &lt;span&gt; &lt;/span&gt;&lt;a href="http://www.flickr.com/photos/micahb37/"&gt;micahb37&lt;/a&gt; on flickr&lt;/p&gt;
&lt;p&gt;The various loopholes in the Bill which can create a potential for abuse were discussed throughout the workshop, as well as various issues revolving around DNA data retention, as previously mentioned.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;During the workshop, some participants questioned the creation of DNA databases to begin with, while others argued that they are inevitable and that it is not a question of whether they should exist, but rather a question of how they should be regulated. All participants agreed upon the need for further safeguards to protect individuals´ right to privacy and other human rights. Further research on the necessity and utility of the creation of DNA databases in regards to human rights was recommended. In addition to all the above, the Ministry of Law and Justice was recommended to pilot the draft DNA Profiling Bill to ensure better provisions in regards to privacy and data protection.&lt;/p&gt;
&lt;p&gt;A debate on the use of DNA data in civil cases versus criminal cases was largely discussed in the workshop, with concerns raised in regards to DNA sampling being enabled in civil cases. The fact that the terms ´civil cases´ and ´criminal cases´ remain broad, vague and not legally-specified, raised huge concerns in the workshop as this could enable the misuse of DNA data by authorities. Thus, the members attending the workshop recommended the creation of two separate Bills regulating the use of DNA data: a DNA Profiling Bill for Criminal Investigation and a DNA Profiling Bill for Research. The creation of such Bills would restrict the access to, collection, analysis, sharing of and retention of DNA data to strictly criminal investigation and research purposes.&lt;/p&gt;
&lt;p&gt;However, even if separate Bills were created, who is to say that when implemented DNA in the database would not be abused? Criminal investigations can be loosely defined and research purposes can potentially cover anything and everything. So the question remains:&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;i&gt;Should DNA databases be created at all? &lt;/i&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;br clear="all" /&gt;&lt;/p&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref1"&gt;[1]&lt;/a&gt; Draft DNA Profiling Bill 2007, &lt;a href="http://dbtindia.nic.in/DNA_Bill.pdf"&gt;http://dbtindia.nic.in/DNA_Bill.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref2"&gt;[2]&lt;/a&gt; Human DNA Profiling Bill 2012: Working draft versión – 29th April 2012,&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref3"&gt;[3]&lt;/a&gt; Centre for Internet and Society, &lt;i&gt;Analyzing the Draft Human DNA Profiling Bill 2012, &lt;/i&gt;25 February 2013, &lt;a href="https://cis-india.org/internet-governance/events/analyzing-draft-human-dna-profiling-bill"&gt;http://cis-india.org/internet-governance/events/analyzing-draft-human-dna-profiling-bill&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref4"&gt;[4]&lt;/a&gt; Genetics Home Reference: Your Guide to Understanding Genetic Conditions, &lt;i&gt;What is DNA?, &lt;/i&gt;&lt;a href="http://ghr.nlm.nih.gov/handbook/basics/dna"&gt;&lt;i&gt;http://ghr.nlm.nih.gov/handbook/basics/dna&lt;/i&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref5"&gt;[5]&lt;/a&gt; Shanna Freeman, &lt;i&gt;How DNA profiling Works, &lt;/i&gt;&lt;a href="http://science.howstuffworks.com/dna-profiling.htm"&gt;&lt;i&gt;http://science.howstuffworks.com/dna-profiling.htm&lt;/i&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref6"&gt;[6]&lt;/a&gt; Innocence Project, &lt;i&gt;DNA exoneree case profiles, &lt;/i&gt;&lt;a href="http://www.innocenceproject.org/know/"&gt;&lt;i&gt;http://www.innocenceproject.org/know/&lt;/i&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref7"&gt;[7]&lt;/a&gt; Australian Law Reform Commission (ALRC), &lt;i&gt;Essentially Yours: The Protection of Human Genetic Information in Australia (ALRC Report 96), &lt;/i&gt;´Criminal Proceedings: Reliability of DNA evidence´, Chapter 44, &lt;a href="http://www.alrc.gov.au/publications/44-criminal-proceedings/reliability-dna-evidence"&gt;http://www.alrc.gov.au/publications/44-criminal-proceedings/reliability-dna-evidence&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref8"&gt;[8]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref9"&gt;[9]&lt;/a&gt; Human DNA Profiling Bill 2012: Working draft version – 29th April 2012, Section 12(o, p, t), &lt;a href="https://cis-india.org/internet-governance/blog/draft-dna-profiling-bill-2012.pdf"&gt;http://cis-india.org/internet-governance/blog/draft-dna-profiling-bill-2012.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref10"&gt;[10]&lt;/a&gt; Ibid: Section 4(q)&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref11"&gt;[11]&lt;/a&gt; Ibid: Section 12(j)&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref12"&gt;[12]&lt;/a&gt; Draft DNA Profiling Bill 2007, Section 13, &lt;a href="http://dbtindia.nic.in/DNA_Bill.pdf"&gt;http://dbtindia.nic.in/DNA_Bill.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref13"&gt;[13]&lt;/a&gt; : Human DNA Profiling Bill 2012: Working draft version – 29&lt;sup&gt;th&lt;/sup&gt; April 2012, Sections 12(j), &lt;a href="https://cis-india.org/internet-governance/blog/draft-dna-profiling-bill-2012.pdf"&gt;http://cis-india.org/internet-governance/blog/draft-dna-profiling-bill-2012.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref14"&gt;[14]&lt;/a&gt; Ibid: Section 12(l)&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref15"&gt;[15]&lt;/a&gt; Schneier, B.(2008), &lt;i&gt;Schneier on Security, &lt;/i&gt;´CCTV cameras´, &lt;a href="http://www.schneier.com/blog/archives/2008/06/cctv_cameras.html"&gt;http://www.schneier.com/blog/archives/2008/06/cctv_cameras.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref16"&gt;[16]&lt;/a&gt; Human DNA Profiling Bill 2012: Working draft version – 29&lt;sup&gt;th&lt;/sup&gt; April 2012, Sections 12(u) and 12(v), &lt;a href="https://cis-india.org/internet-governance/blog/draft-dna-profiling-bill-2012.pdf"&gt;http://cis-india.org/internet-governance/blog/draft-dna-profiling-bill-2012.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref17"&gt;[17]&lt;/a&gt; Ibid: Section on the ´Standards, Quality Control and Quality Assurance Obligations of DNA Laboratories´&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref18"&gt;[18]&lt;/a&gt; Ibid: Section 33&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref19"&gt;[19]&lt;/a&gt; Ibid: Section 35&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref20"&gt;[20]&lt;/a&gt; Ibid: Section 43&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref21"&gt;[21]&lt;/a&gt; Ibid: Section 40&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/summary-of-cis-workshop-on-dna-profiling-bill-2012'&gt;https://cis-india.org/internet-governance/blog/summary-of-cis-workshop-on-dna-profiling-bill-2012&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    

   <dc:date>2013-07-12T15:33:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-times-of-india-kim-arora-may-5-2017-suicide-videos-facebook-beefs-up-team-to-monitor-content">
    <title>Suicide videos: Facebook beefs up team to monitor content</title>
    <link>https://cis-india.org/internet-governance/news/the-times-of-india-kim-arora-may-5-2017-suicide-videos-facebook-beefs-up-team-to-monitor-content</link>
    <description>
        &lt;b&gt;Responding to the spate of suicides being livestreamed, social media giant Facebook has announced it will add another 3,000 people to its 4,500-strong review team that moderates content. The review team will also work in tandem with law enforcement agencies on this issue. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Kim Arora was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/india/suicide-videos-facebook-beefs-up-team-to-monitor-content/articleshow/58523818.cms"&gt;published in the Times of India&lt;/a&gt; on May 5, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;"Over the last few weeks, we've seen people hurting themselves and  others on Facebook, either live or in video posted later. It's  heartbreaking, and I've been reflecting on how we can do better for our  community," Facebook co-founder and CEO &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Mark-Zuckerberg"&gt;Mark Zuckerberg&lt;/a&gt; wrote in a status update and added, "Over the next year, we'll be  adding 3,000 people to our community operations team around the world,  on top of the 4,500 we have today, to review the millions of reports we  get every week, and improve the process for doing it quickly."   &lt;br /&gt; &lt;br /&gt; "...we'll keep working with local community groups and law enforcement  who are in the best position to help someone if they need it, either  because they're about to harm themselves, or because they're in danger  from someone else," Zuckerberg added announcing the move.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the last year, several violent incidents and suicides have been streamed live on Facebook. In India last April, a young student went live on Facebook minutes before he jumped off the 19th floor of Taj Lands End hotel in Mumbai. The same month saw similar news coming out of the US and Thailand as well. A 49-year-old from Alabama went live on Facebook before shooting himself in the head. Another man from Bangkok made a video of hanging his 11-month-old daughter, and uploaded it to Facebook. He was later discovered to have killed himself too.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It's a positive development that Facebook is adding human power and  tools for dealing with hate speech, child abuse and suicide attempts. It  would be interesting to see how Facebook coordinates with the Indian  police departments to get an emergency response to a potential suicide  attempt or attempt to harm someone else," says Rohini Lakshane, program  officer, &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Center-for-Internet-and-Society"&gt;Center for Internet and Society&lt;/a&gt;, though she warns against false reports clogging up reviewers' feeds and police notifications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Facebook, a video, picture or any other piece of content reaches the review team after it is reported by users for flouting its "community guidelines".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chinmayi Arun, research director at the Centre for Communication Governance, National Law University, Delhi, says Facebook must be transparent about this process. "Facebook should also announce how it is keeping this process accountable. It is a public platform of great importance which has been guilty of over-censorship in the past. It should be responsive not just to government censorship requests but also to user requests to review and reconsider its blocking of legitimate content," she says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-times-of-india-kim-arora-may-5-2017-suicide-videos-facebook-beefs-up-team-to-monitor-content'&gt;https://cis-india.org/internet-governance/news/the-times-of-india-kim-arora-may-5-2017-suicide-videos-facebook-beefs-up-team-to-monitor-content&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-05-20T02:59:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-quint-rohit-pathak-may-21-2016-suckly-attacks-national-stock-exchange-tech-vendor-among-others">
    <title>Suckfly Attacks National Stock Exchange Tech Vendor, Among Others</title>
    <link>https://cis-india.org/internet-governance/news/the-quint-rohit-pathak-may-21-2016-suckly-attacks-national-stock-exchange-tech-vendor-among-others</link>
    <description>
        &lt;b&gt;A cyber espionage group attacked an Indian IT firm that provides support to India’s largest stock exchange. It’s one of many attacks in the recent past.
&lt;/b&gt;
        &lt;p&gt;The blog post by Rohit Pathak was &lt;a class="external-link" href="http://www.thequint.com/business/2016/05/21/suckfly-attacks-national-stock-exchange-tech-vendor-among-others"&gt;published in the Quint&lt;/a&gt; on May 21, 2016. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;For 24 months now, several Indian government and private organisations have been victims of highly-targeted and sustained cyberattacks by Suckfly. &lt;/span&gt;&lt;span style="text-align: justify; "&gt;Cyber security firm Symantec has been tracking Suckfly since April 2014 and believes it is a Chinese cyber-espionage group. According to Symantec, Suckfly uses stolen digital certificates to breach the internal networks of Indian organisations.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Infographic.jpg/@@images/7bae6498-baf6-4067-8933-f17182920bda.jpeg" alt="Infographic" class="image-inline" title="Infographic" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;div id="_mcePaste"&gt;
&lt;p style="text-align: justify; "&gt;While Symantec has declined to name any of the victims, it says the high-profile targets include one of India’s largest financial institutions, an e-commerce company and its primary shipping vendor, a leading Indian IT company, two government organisations, and an American health care provider’s Indian business unit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So far, the highest infection rate has been at a government organisation responsible for implementing network software across various ministries and departments of the Indian central government. Symantec’s investigation report says Suckfly uses custom malware called Backdoor.Nidiran to orchestrate the attacks. While Suckfly had used the same backdoor in its previous campaigns in other countries, in India the post-infection activity was significantly higher.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We should be aware that this attack isn’t yet over. Suckfly has been targeting organisations since at least May 2014, and it very likely continues to have access to governmental and corporate servers in India thanks to the Nidiran backdoor,” says Pranesh Prakash, Policy Director, Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He added that, “Depending on what access Suckfly got, the damage could be anything from them having conducted fraudulent financial transactions to obtaining classified governmental secrets.”&lt;/p&gt;
&lt;div class="story-element-wrapper" style="text-align: start; "&gt;
&lt;div style="text-align: justify; "&gt;
&lt;blockquote&gt;It is as yet unclear what data has been exfiltrated by Suckfly, but the fact that no organisations have reported this to their customers shows that the current laws with regard to data security and data breaches are inadequate.&lt;br /&gt;
&lt;div class="story-element-wrapper" style="text-align: start; "&gt;
&lt;div class="story-element story-element-text story-element-quote"&gt;&lt;span class="attribution" style="text-align: right; float: right; "&gt;Pranesh Prakash, Policy Director, Centre for Internet and Society&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: start; "&gt;&lt;span style="text-align: justify; "&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;In a detailed email exchange with Bloomberg Quint, Symantec’s security experts describe how Suckfly operates, its motives, and what Indian entities can do to protect themselves.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;h3&gt;Suckfly’s Modus Operandi&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2015, between 22 April and 4 May, Suckfly conducted a multistage attack on an Indian e-commerce company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It first identified a user – an employee of the e-commerce company – to attempt its initial breach into the e-commerce company’s internal network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Symantec says, “We don’t have hard evidence of how Suckfly obtained information on the targeted user, but we did find a large open-source presence on the initial target. The target’s job function, corporate email address, information on work-related projects, and publicly accessible personal blog could all be freely found online.’&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suckfly then exploited a vulnerability in the employee’s operating system (Windows) that allowed it to bypass the User Account Control and install the malware. It’s likely that Suckfly used a spear-phishing email to gain entry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Having entered the employee’s system, Suckfly gained access to the employee’s account credentials and then used them to access the victim’s account and navigate the e-commerce company’s internal corporate network as though it were the employee.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suckfly’s final step was to exfiltrate data off the victim’s network and onto Suckfly’s infrastructure.&lt;/p&gt;
&lt;h3&gt;Weekends Off&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The attack took place over 13 days, but Symantec discovered that Suckfly was active only Monday to Friday. There was no activity from the group on weekends. This could be because the attackers’ hacktools are command line driven and can provide insight into when operators are behind keyboards actively working.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Suckfly’s Motives?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to Symantec, “Suckfly targeted one of India’s largest e-commerce companies, a major Indian shipping company, one of India’s largest financial organizations, and an IT firm that provides support for India’s largest stock exchange. All of these targets are large corporations that play a major role in India’s economy. By targeting all of these organisations together, Suckfly could have had a much larger impact on India and its economy. While we don’t know the motivations behind the attacks, the targeted commercial organisations, along with the targeted government organisations, may point in this direction. Symantec’s research shows that Suckfly is well-equipped to carry out targeted attacks for years while staying off the radar of security organisations.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Symantec refused to name the victims and when contacted, the National Stock Exchange (NSE) said its systems were secure and that it had not heard of any such attack on any of its tech vendors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the last two years, from 2013 to 2015, the total number of reported cyber breaches worldwide have increased 25%. India is amongst the most vulnerable – ranking third on the list of countries that have faced financial intrusion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Smokescreen is a cybersecurity firm and CEO Sahir Hidayatullah claims virtually every large company in India has been compromised to varying degrees already.&lt;/p&gt;
&lt;div class="story-element-wrapper"&gt;
&lt;div class="story-element story-element-text story-element-quote"&gt;
&lt;div&gt;
&lt;div&gt;
&lt;blockquote&gt;Strategic economic advantage and intellectual property theft are the primary motivators for nation state attackers targeting energy, pharma, and manufacturing. Attacks against the financial sector are more commonly done by financially-motivated cybercriminals, however, nation state attackers have an interest here as well – being deeply embedded into critical systems affords opportunities for both mass data collection as well as the ability to cripple financial systems if required. All major governments aspire to have this offensive capability and are in various stages of having developed it already.&lt;span style="text-align: right; "&gt;Sahir Hidayatullah, CEO, Smokescreen&lt;/span&gt;&lt;/blockquote&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="story-element-wrapper"&gt;
&lt;div class="story-element story-element-text story-element-blockquote" style="padding-left: 1.5em; "&gt;
&lt;div&gt;
&lt;div&gt;
&lt;blockquote style="text-align: justify; "&gt;Over the last few months, our decoy detection network in India has seen an up-tick in targeted attacks specifically aimed at companies in banking, energy, pharmaceuticals and manufacturing. Manufacturing has seen the single largest increase in targeted attempts to compromise infrastructure. We have seen a large increase in ‘malware-less’ attacks including the use of stolen credentials on VPN systems.&lt;/blockquote&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="story-element-wrapper" style="text-align: start; "&gt;
&lt;div class="story-element story-element-text story-element-blockquote"&gt;
&lt;div&gt;
&lt;div&gt;
&lt;blockquote&gt;More worrisome is that over the last year, we have conducted breach-readiness assessments for many of the large names in these verticals, and in every instance, the internal controls were unable to detect and respond to our simulated attacks in time. According to our assessment, none of them are prepared to withstand a targeted attack.&lt;/blockquote&gt;
&lt;span class="attribution" style="text-align: left; padding-left: 2em; "&gt; &lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;According to a 2015 survey conducted by PWC spanning 250 Indian companies, 72% of the respondents claimed they faced some sort of cyberattack over the last year. 63% claimed intrusions lead to financial losses and 55% claimed there was loss of sensitive information. But the worrying number is this – 78% have no cyber incident response plan. That’s good news for Suckfly and its comrades.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-quint-rohit-pathak-may-21-2016-suckly-attacks-national-stock-exchange-tech-vendor-among-others'&gt;https://cis-india.org/internet-governance/news/the-quint-rohit-pathak-may-21-2016-suckly-attacks-national-stock-exchange-tech-vendor-among-others&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-05-29T08:07:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india">
    <title>Submitted Your Biometrics for Aadhaar? Here’s How You Can Lock/Unlock That Data</title>
    <link>https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india</link>
    <description>
        &lt;b&gt;Did you know that UIDAI provides a facility that allows users to lock/unlock their Aadhaar biometric data online?&lt;/b&gt;
        &lt;p&gt;The blog post by Vidya Raja was &lt;a class="external-link" href="https://www.thebetterindia.com/170550/aadhaar-biometric-privacy-safety-online-india/"&gt;published in the Better India&lt;/a&gt; on January 24, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Imagine someone hacking into your Netflix account – all you have to do is change the password. However, if there is a security &lt;a href="https://www.thebetterindia.com/99520/aadhaar-card-right-over-our-body-privacy-government/" rel="noopener" target="_blank"&gt;breach&lt;/a&gt; with respect to your biometric details, there is no reversing it.  So think carefully about how and where you submit your details.  While the Supreme Court has said that it is no longer mandatory to  link Aadhaar with your bank accounts or your telecom service provider,  it does not lessen the importance of Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Policy Director, The Centre for Internet &amp;amp; Society, in a report published in &lt;a href="https://www.livemint.com/Money/YD7dqEVRJbrqoAs3h4PuJO/Are-biometrics-hackproof.html" rel="noopener" target="_blank"&gt;The Mint&lt;/a&gt;,  says, “Biometric devices are not hack-proof. It depends on the ease  with which this can be done. In Malaysia, thieves who stole a car with a  fingerprint-based ignition system simply chopped off the owner’s  finger. When a biometric attendance system was introduced at the  Institute of Chemical Technology (ICT) in Mumbai, students continued  giving proxies by using moulds made from Fevicol.”  Over the last year, there has been so much chatter about the Aadhaar number and how one can protect one’s information.&lt;/p&gt;
&lt;p&gt;Did you know that UIDAI provides a facility that allows users to lock/unlock their Aadhaar biometric data online?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;In this article, we explain how you can do that.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Locking biometrics online:&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Visit UIDAI’s &lt;a href="https://uidai.gov.in/" rel="noopener" target="_blank"&gt;online&lt;/a&gt; portal to lock or unlock your biometrics&lt;/li&gt;
&lt;li&gt;Once there, you will need to click on ‘My Aadhaar’ and under the Aadhaar Services tab, click on Lock/Unlock Biometrics&lt;/li&gt;
&lt;li&gt;You will then be redirected to a new page and prompted to enter the 12-digit Aadhaar number and the security code&lt;/li&gt;
&lt;li&gt;Once the details have been entered, click on ‘Send OTP’&lt;/li&gt;
&lt;li&gt;You will receive an OTP on your registered mobile number&lt;/li&gt;
&lt;li&gt;Enter this and click on the Login button&lt;/li&gt;
&lt;li&gt;This feature will allow you to lock your biometrics&lt;/li&gt;
&lt;li&gt;Enter the 4-digit security code mentioned on the screen and click on the ‘Enable’ button&lt;/li&gt;
&lt;li&gt;Your biometrics will be locked, and you will have to unlock it in case you want to access it again&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Unlocking biometrics online:&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;To unlock your biometrics, click on the ‘Login’ button&lt;/li&gt;
&lt;li&gt;Enter your Aadhaar number and the security code in the designated spaces&lt;/li&gt;
&lt;li&gt;Now click on ‘Send OTP’&lt;/li&gt;
&lt;li&gt;An OTP will be sent to your registered mobile number&lt;/li&gt;
&lt;li&gt;Enter it in the space provided and click on ‘Login’&lt;/li&gt;
&lt;li&gt;In case you want to temporarily unlock the biometrics, enter the security code and click on the unlock button&lt;/li&gt;
&lt;li&gt;Your biometrics will be unlocked for 10 minutes&lt;/li&gt;
&lt;li&gt;The locking date and time is mentioned on the screen after which biometrics will be automatically locked&lt;/li&gt;
&lt;li&gt;When you do not want to lock your biometrics, you can disable the lock permanently.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Using mAadhaar to lock/unlock biometrics:&lt;/h2&gt;
&lt;p&gt;mAadhaar is the official mobile application developed by the Unique  Identification Authority of India (UIDAI). Presently, it is available on  the &lt;a href="https://play.google.com/store/apps/details?id=in.gov.uidai.mAadhaarPlus&amp;amp;hl=en_IN" rel="noopener" target="_blank"&gt;Android&lt;/a&gt; platform.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Once the mAadhaar app has been downloaded, the user must use their Aadhaar card registered mobile number to login.&lt;/li&gt;
&lt;li&gt;You will then be sent an OTP that you are required to enter for  authentication. Do remember to change your password once registered.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;On the top right side, tap on ‘Biometric lock’, and enter your  password to lock the biometrics. Once locked, it will show a small lock  icon next to your profile.&lt;/li&gt;
&lt;li&gt;To unlock, tap on the same icon followed by your password. The  information will unlock for 10 minutes. After that, it will be locked  again.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Once you lock this information, it ensures that even the Aadhaar  holder will not be able to use their biometric data (iris scan and  fingerprints) for authentication, until unlocked.&lt;/li&gt;
&lt;li&gt;If you try to use this information without unlocking, it will show you an error code 330.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Remember to lock and unlock your biometrics through a trusted  channel. The fact that there is no fee involved in either exercise will  make this easier. Also, even with the biometric locked, you can continue  to use the OTP-based authentication process for transactions, where you  will receive the OTP on your registered mobile number and e-mail  address.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(Edited by Shruti Singhal)&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india'&gt;https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-02-02T02:09:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/submission-to-the-facebook-oversight-board-policy-on-cross-checks">
    <title>Submission to the Facebook Oversight Board: Policy on Cross-checks</title>
    <link>https://cis-india.org/internet-governance/blog/submission-to-the-facebook-oversight-board-policy-on-cross-checks</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) submitted public comments to the Facebook Oversight Board on a policy consultation.&lt;/b&gt;
        
&lt;h2&gt;Whether a cross-check system is needed?&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Recommendation for the Board&lt;/strong&gt;: The Board should investigate the cross-check system as part of Meta’s larger problems with algorithmically amplified speech, and how such speech gets moderated.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Explanation&lt;/strong&gt;: The issues surrounding Meta’s cross-check system are not an isolated phenomena, but rather a reflection of the problems of algorithmically amplified speech, as well the lack of transparency in the company’s content moderation processes at large. At the outset, it must be stated that the majority of information on the cross-check system only became available after the media &lt;a href="https://www.wsj.com/articles/facebook-files-xcheck-zuckerberg-elite-rules-11631541353?mod=article_inline"&gt;reports&lt;/a&gt; published by the Wall Street Journal. While these reports have been extensive in documenting various aspects of the system, there is no guarantee that the disclosures obtained by them provides the complete picture regarding the system. Further, given that Meta has been found to purposely mislead the Board and the public on how the cross-check system operates, it is worth investigating the incentives that necessitate the cross-check system in the first place.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Meta claims that the cross-check system works as a check for false positives: they “employ additional reviews for high-visibility content that may violate our policies.” Essentially they want to make sure that content that stays up on the platform and reaches a large audience, is following their content guidelines. However, previous disclosures have &lt;a href="https://www.wsj.com/articles/facebook-hate-speech-india-politics-muslim-hindu-modi-zuckerberg-11597423346"&gt;proven&lt;/a&gt; policy executives have prioritized the company’s ‘business interests’ over removing content that violates their policies; and have &lt;a href="https://www.theguardian.com/technology/2021/apr/12/facebook-fake-engagement-whistleblower-sophie-zhang"&gt;waited to act on known problematic content&lt;/a&gt; until significant external pressure was built up, including in India. In this context, the cross-check system seems less like a measure designed to protect users who might be exposed to problematic content, and more as a measure for managing public perception of the company.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Thus the Board should investigate both how content gains an audience on the platform, and how it gets moderated. Previous &lt;a href="https://www.theguardian.com/technology/2021/apr/12/facebook-fake-engagement-whistleblower-sophie-zhang"&gt;whistleblower disclosures&lt;/a&gt; have shown that the mechanics of algorithmically amplified speech, which prioritizes &lt;a href="https://www.technologyreview.com/2021/03/11/1020600/facebook-responsible-ai-misinformation/"&gt;engagement and growth over safety&lt;/a&gt;, are easily taken advantage of by bad actors to promote their viewpoints through artificially induced virality. The cross-check system and other measures of content moderation at scale would not be needed if it was harder to spread problematic content on the platform in the first place. Instead of focusing only on one specific system, the Board needs to urge Meta to re-evaluate the incentives that drive content sharing on the platform and come up with ways that make the platform safer.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Meta’s Obligations under Human Rights Law&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Recommendation for the Board: &lt;/strong&gt;The Board must consider the cross-check system to be violative of Meta’s obligations under the International Covenant of Civil and Political Rights (ICCPR). Additionally, the cross-check ranker must be incorporated with Meta’s commitments towards human rights, as outlined in its Corporate Human Rights Policy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Explanation: Meta’s content moderation, and by extension, its cross-check system, is bound by both international human rights law as well as the Board’s past decisions. At the outset, The system fails the three-pronged test of legality, legitimacy and necessity and proportionality, as delineated under Article 19(3) of the International Covenant of Civil and Political Rights (ICCPR). Firstly, this system has been “&lt;a href="https://www.wsj.com/articles/facebook-files-xcheck-zuckerberg-elite-rules-11631541353?mod=article_inline"&gt;scattered throughout the company, without clear governance or ownership&lt;/a&gt;”, which violates the legality principle, since there is no clear guidance on what sort of speech, or which classes of users, would deserve the treatment of this system. Secondly, there is no understanding about the legitimacy of aims with which this system had been set up in the first place, beyond Meta’s own assertions, which have been &lt;a href="https://www.oversightboard.com/news/215139350722703-oversight-board-demands-more-transparency-from-facebook/"&gt;countered&lt;/a&gt; by evidence to the contrary. Thirdly, the necessity and proportionality of the restriction has to be &lt;a href="https://www.oversightboard.com/decision/FB-691QAMHJ"&gt;read along&lt;/a&gt; with the &lt;a href="https://www.ohchr.org/en/issues/freedomopinion/articles19-20/pages/index.aspx"&gt;Rabat Plan of Action&lt;/a&gt;, which requires that for a statement to become a criminal offense, a six-pronged test of threshold is to be applied: a) the social and political context, b) the speaker’s position or status in the society, c) intent to incite the audience against a target group, d) content and form of the speech, e) extent of its dissemination and f) likelihood of harm. As news reports have indicated, Meta has been utilizing the cross-check system to privilege speech from influential users, and in the process, have shielded inflammatory, inciting speech that would have otherwise qualified the Rabat threshold. As such, the third requirement is not fulfilled either.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Additionally, Meta’s own &lt;a href="https://about.fb.com/wp-content/uploads/2021/03/Facebooks-Corporate-Human-Rights-Policy.pdf"&gt;Corporate Human Rights Policy&lt;/a&gt; commits to respecting human rights in line with the UN Guiding Principles on Business and Human Rights (UNGPs). Therefore, the cross-check ranker must incorporate these existing commitments to human rights, including:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;The right to freedom of expression:, UN Special Rapporteur on freedom of opinion and expression report &lt;a href="https://ap.ohchr.org/documents/dpage_e.aspx?si=A/HRC/38/35"&gt;A/HRC/38/35&lt;/a&gt; (2018); &lt;a href="https://www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=25729&amp;amp;LangID=E"&gt;Joint Statement of international freedom of expression monitors on COVID-19 (March, 2020)&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;The Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression addresses the regulation of user-generated online content.&lt;/p&gt;
&lt;p&gt;The Joint Statement issued regarding Governmental promotion and protection of access to and free flow of information during the pandemic.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The right to non-discrimination: International Convention on the Elimination of All Forms of Racial Discrimination (&lt;a href="https://www.ohchr.org/EN/ProfessionalInterest/Pages/CERD.aspx"&gt;ICERD&lt;/a&gt;), Articles 1 and 4.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Article 1 of the ICERD defines racial discrimination.&lt;/p&gt;
&lt;p&gt;Article 4 of the ICERD condemns propaganda and organisations that attempt to justify discrimination or are based on the idea of racial supremacism.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Participation in public affairs and the right to vote: ICCPR Article 25.&lt;/li&gt;
&lt;li&gt;The right to remedy: General Comment No. 31, Human Rights Committee (2004) (&lt;a href="https://tbinternet.ohchr.org/_layouts/15/treatybodyexternal/Download.aspx?symbolno=CCPR%2fC%2f21%2fRev.1%2fAdd.13&amp;amp;Lang=en"&gt;General Comment 31&lt;/a&gt;); UNGPs, Principle 22.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The General Comment discusses the nature of the general legal obligation imposed on State Parties to the Covenant.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Guiding Principle 22 states that where business enterprises identify that they have caused or contributed to adverse impacts, they should provide for or cooperate in their remediation through legitimate processes.&lt;/p&gt;
&lt;h2&gt;Meta’s obligations to avoid political bias and false positives in its cross-check system&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Recommendation for the Board: &lt;/strong&gt;The Board must urge Meta to adopt and implement the Santa Clara Principles on Transparency and Accountability to ensure that it is open about risks to user rights when there is involvement from the State in content moderation. Additionally, the Board must ask Meta to undertake a diversity and human rights audit of its existing policy teams, and commit to regular cultural training for its staff. Finally, the Board must investigate the potential conflicts of interest that arise when Meta’s policy team has any sort of nexus with political parties, and how that might impact content moderation.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Explanation: For the cross-check system to be free from biases, it is important for Meta to come clear to the Board regarding the rationale, standards and processes of the cross check review, and report on the relative error rates of determinations made through cross check compared with ordinary enforcement procedures. It also needs to disclose to the Board in which particular situations it uses the system and in which it does not. Principle 4 under the Foundational Principles of the &lt;a href="https://santaclaraprinciples.org/"&gt;Santa Clara Principles on Transparency and Accountability in Content Moderation&lt;/a&gt; encourage companies to realize the risk to user rights when there is involvement from the State in processes of content moderation and asks companies to makes users aware that: a) a state actor has requested/participated in an action on their content/account, and b) the company believes that the action was needed as per the relevant law. Users should be allowed access to any rules or policies, formal or informal work relationships that the company holds with state actors in terms of content regulation, the process of flagging accounts/content and state requests to action.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Board must consider that erroneous lack of action (false positives) might not always be a system's flaw, but a larger, structural issue regarding how policy teams at Meta functions. As previous disclosures have &lt;a href="https://www.wsj.com/articles/facebook-hate-speech-india-politics-muslim-hindu-modi-zuckerberg-11597423346"&gt;proven&lt;/a&gt;, the contours of what sort of violating content gets to stay up on the platform has been ideologically and politically coloured, as policy executives have prioritized the company’s ‘business interests’ over social harmony. In such light, it is not sufficient to simply propose better transparency and accountability measures for Meta to adopt within its content moderation processes to avoid political bias. Rather, the Board’s recommendations must focus on the structural aspect of the human moderator and policy team that is behind these processes. The Board must ask Meta to a) urgently undertake a diversity and human rights audit of its existing team and its hiring processes, b) commit to regular training to ensure that their policy staffs are culturally literate in the socio-political regions they work in. Further, the Board must seriously investigate the potential &lt;a href="https://time.com/5883993/india-facebook-hate-speech-bjp/"&gt;conflicts of interest&lt;/a&gt; that happen when regional policy teams of Meta, with nexus to political parties, are also tasked with regulating content from representatives of these parties, and how that impacts the moderation processes at large.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Finally, in case decision &lt;a href="https://www.oversightboard.com/decision/FB-691QAMHJ"&gt;2021-001-FB-FBR&lt;/a&gt;, the Board made a number of recommendations to Meta which must be implemented in the current situation, including: a) considering the political context while looking at potential risks, b) employment of specialized staff in content moderation while evaluating political speech from influential users, c) familiarity with the political and linguistic context&amp;nbsp; d) absence of any interference and undue influence, e) public explanation regarding the rules Meta uses when imposing sanctions against influential users and f) the sanctions being time-bound.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Transparency of the cross-check system&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Recommendation for the Board: &lt;/strong&gt;The Board must urge Meta to adopt and implement the Santa Clara Principles on Transparency and Accountability to increase the transparency of its cross-check system.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Explanation: &lt;/strong&gt;There are ways in which Meta can increase the transparency of not only the cross-check system, but the content moderation process in general. The following recommendations draw from &lt;a href="https://santaclaraprinciples.org/"&gt;The Santa Clara Principles&lt;/a&gt; and the Board’s own previous decisions:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Considering Principle 2 of the Santa Clara Principles: Understandable Rules and Policies, Meta should ensure that the policies and rules governing moderation of content and user behaviors on Facebook are&lt;strong&gt; clear, easily understandable, and available in the languages&lt;/strong&gt; in which the user operates.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Drawing from Principle 5 on Integrity and Explainability and from the Board’s recommendations in case decision &lt;a href="https://www.oversightboard.com/decision/FB-691QAMHJ"&gt;2021-001-FB-FBR&lt;/a&gt; which advises Meta to“&lt;em&gt;Provide users with accessible information on how many violations, strikes and penalties have been assessed against them, and the consequences that will follow future violations&lt;/em&gt;”, Meta should be able to &lt;strong&gt;explain the content moderation decisions to users in all cases&lt;/strong&gt;: when under review, when the decision has been made to leave the content up, or take it down. We recommend that Meta keeps a publicly accessible running tally of the number of moderation decisions made on a piece of content till date with their explanations. This would allow third parties (like journalists, activists, researchers and the OSB) to keep Facebook accountable when it does not follow its own policies, as has previously been the case.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the same case decision, the Board has also previously recommended that Meta “&lt;em&gt;Produce more information to help users understand and evaluate the process and criteria for applying the newsworthiness allowance, including how it applies to influential accounts. The company should also clearly explain the rationale, standards and processes of the cross-check review, and report on the relative error rates of determinations made through cross-checking compared with ordinary enforcement procedures.&lt;/em&gt;” Thus, Meta should &lt;strong&gt;publicly explain the cross check system &lt;/strong&gt;in detail with examples, and make public the list of attributes that qualify a piece of content for secondary review.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Operational Principles further provide actionable steps that Meta can take to improve the transparency of their content moderation systems. Drawing from Principle 2: Notice and Principle 3: Appeals, Meta should make a satisfactory &lt;strong&gt;appeals process available &lt;/strong&gt;to users - whether they be decisions to leave up or takedown content. The appeals process should be handled by context aware teams. Meta should then &lt;strong&gt;publish the results&lt;/strong&gt; of the cross check system and the appeals processes as part of their transparency reports including data like total content actioned, rate of success in appeals and cross check process, decisions overturned and preserved etc, which would also satisfy the first Operational Principle: Numbers.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Resources needed to improve the system for users and entities who do not post in English&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Recommendations for the Board: &lt;/strong&gt;The Board must urge Meta to urgently invest in resources to expand Meta’s content moderation services into the local contexts in which the company operates and invest in training data for local languages.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Explanation: &lt;/strong&gt;The cross-check system is not a fundamentally different problem than content moderation. It has been shown time and time again that Meta’s handling of content from non-Western, non-English language contexts is severely lacking. It has been shown how content hosted on the platform has been used to&lt;a href="https://www.theguardian.com/technology/2021/apr/12/facebook-fake-engagement-whistleblower-sophie-zhang"&gt; inflame existing tensions in developing countries&lt;/a&gt;, &lt;a href="https://www.wsj.com/articles/facebook-services-are-used-to-spread-religious-hatred-in-india-internal-documents-show-11635016354?mod=article_inline"&gt;promote religious hatred in India&lt;/a&gt;, &lt;a href="https://www.wsj.com/articles/burn-the-houses-rohingya-survivors-recount-the-day-soldiers-killed-hundreds-1526048545?mod=article_inline"&gt;genocide in Mynmar&lt;/a&gt;, and continue to support &lt;a href="https://www.wsj.com/articles/facebook-drug-cartels-human-traffickers-response-is-weak-documents-11631812953?mod=article_inline"&gt;human traffickers and drug cartels&lt;/a&gt; on the platform even when these issues have been identified.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;There is an urgent need to invest resources to expand Meta’s content moderation services into the local contexts in which the company operates. The company should make all policies and rule documents available in the languages of its users; invest in creating automated tools that are capable of flagging content that is not posted in English; and add people familiar with the local contexts to provide context aware second level reviews. The Facebook Files show that even according to company engineering, &lt;a href="https://www.wsj.com/articles/facebook-ai-enforce-rules-engineers-doubtful-artificial-intelligence-11634338184?mod=article_inline"&gt;automated content moderation&lt;/a&gt; is still not very effective in identifying hate speech and other harmful content. Meta should focus on hiring, training and retaining human moderators who have knowledge of local contexts. Bias training of all content moderators, but especially those who will participate in the second level reviews in the cross check system is also extremely important to ensure acceptable decisions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Additionally, in keeping with Meta’s human rights commitments, the company should develop and publish a policy for responding to human rights violations when they are pointed out by activists, researchers, journalists and employees as a matter of due process. It should not wait for a negative news cycle to stir them into action &lt;a href="https://www.theguardian.com/technology/2021/apr/12/facebook-fake-engagement-whistleblower-sophie-zhang"&gt;as it seems to have done in previous cases&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Benefits and limitations of automated technologies&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Meta &lt;a href="https://www.theverge.com/2020/11/13/21562596/facebook-ai-moderation%5C"&gt;recently changed&lt;/a&gt; its moderation practice wherein it uses technology to prioritize content for human reviewers based on their severity index. Facebook &lt;a href="https://transparency.fb.com/policies/improving/prioritizing-content-review/"&gt;has not specified&lt;/a&gt; the technology it uses to prioritize high-severity content but its research record shows that it &lt;a href="https://ai.facebook.com/blog/the-shift-to-generalized-ai-to-better-identify-violating-content"&gt;uses&lt;/a&gt; a host of automated &lt;a href="https://ai.facebook.com/tools#frameworks-and-tools"&gt;frameworks and tools&lt;/a&gt; to detect violating content, including image recognition tools, object detection tools, natural language processing models, speech models and reasoning models. One such model is the &lt;a href="https://ai.facebook.com/blog/community-standards-report/"&gt;Whole Post Integrity Embeddings&lt;/a&gt; (“WPIE”) which can judge various elements in a given post (caption, comments, OCR, image etc.) to work out the context and the content of the post. Facebook also uses image matching models (SimSearchNet++) that are trained to match variations of an image with a high degree of precision and improved recall; multi-lingual masked language models on cross-lingual understanding such as &lt;a href="https://ai.facebook.com/blog/-xlm-r-state-of-the-art-cross-lingual-understanding-through-self-supervision/"&gt;XLM-R&lt;/a&gt; that can accurately identify hate-speech and other policy-violating content across a wide range of languages. More recently, Facebook introduced its machine translation model called the &lt;a href="https://analyticsindiamag.com/facebooks-new-machine-translation-model-works-without-help-of-english-data/"&gt;M2M-100&lt;/a&gt; whose goal is to perform bidirectional translation between 7000 languages.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Despite the advances in this field, there are inherent &lt;a href="https://www.ofcom.org.uk/__data/assets/pdf_file/0028/157249/cambridge-consultants-ai-content-moderation.pdf"&gt;limitations&lt;/a&gt; of such automated tools. &lt;a href="https://www.theverge.com/2019/2/27/18242724/facebook-moderation-ai-artificial-intelligence-platforms"&gt;Experts&lt;/a&gt; have repeatedly maintained that AI will get better at understanding context but it will not replace human moderators for the foreseeable future. One such instance where these limitations were &lt;a href="https://www.politico.eu/article/facebook-content-moderation-automation/"&gt;exposed&lt;/a&gt; was during the COVID-19 pandemic, when Facebook sent its human moderators home - the number of removals flagged as hate speech on its platform more than doubled to 22.5 million in the second quarter of 2020 but the number of successful content appeals was dropped to 12,600 from the 2.3 million figure for the first three months of 2020.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a href="https://www.wsj.com/articles/facebook-ai-enforce-rules-engineers-doubtful-artificial-intelligence-11634338184?mod=article_inline"&gt;The Facebook Files&lt;/a&gt; show that Meta’s AI cannot consistently identify first-person shooting videos, racist rants and even the difference between cockfighting and car crashes. Its automated systems are only capable of removing posts that generate just 3% to 5% of the views of hate speech on the platform and 0.6% of all content that violates Meta’s policies against violence and incitement. As such, it is difficult to accept the company’s claim that nearly all of the hate speech it takes down was discovered by AI before it was reported by users.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, the benefits of such technology cannot be discounted, especially when one considers automated technology as a way of reducing &lt;a href="https://www.theverge.com/2019/2/25/18229714/cognizant-facebook-content-moderator-interviews-trauma-working-conditions-arizona"&gt;trauma&lt;/a&gt; for human moderators. Using AI for prioritizing content for review can turn out to be effective for human moderators as it can increase their efficiency and reduce harmful effects of content moderation on them. Additionally, it can also limit the exposure of harmful content to internet users. Moreover, AI can also reduce the impact of harmful content on human moderators by allocating content to moderators on the basis of their exposure history. Theoretically, if the company’s claims are to be believed, using automated technology for prioritizing content for review can help to improve the mental health of Facebook’s human moderators.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Click to download the file &lt;a class="external-link" href="https://cis-india.org/internet-governance/policy-on-cross-checks"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/submission-to-the-facebook-oversight-board-policy-on-cross-checks'&gt;https://cis-india.org/internet-governance/blog/submission-to-the-facebook-oversight-board-policy-on-cross-checks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>[in alphabetical order] Anamika Kundu, Digvijay Singh, Divyansha Sehgal and Torsha Sarkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Freedom</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2022-02-09T05:31:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india">
    <title>Submission to the Committee of Experts on a Data Protection Framework for India</title>
    <link>https://cis-india.org/internet-governance/submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india</link>
    <description>
        &lt;b&gt;This submission presents comments by the Centre for Internet and Society, India (“CIS”) on the ‘White Paper of the Committee of Experts on a Data Protection Framework for India’ (“White Paper”) released by the Ministry of Electronics and Information Technology. The White paper was drafted by a Committee of Expert (“Committee”) constituted by the Ministry. CIS has conducted research on the issues of privacy, data protection and data security since 2010 and is thankful for the opportunity to put forth its views. The submission was made on January 31, 2018.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india'&gt;https://cis-india.org/internet-governance/submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-02-05T13:39:00Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/submission-to-igf-2025-call-for-thematic-inputs">
    <title>Submission to IGF 2025 Call for Thematic Inputs</title>
    <link>https://cis-india.org/internet-governance/submission-to-igf-2025-call-for-thematic-inputs</link>
    <description>
        &lt;b&gt;Below are CIS's inputs submitted in response to the IGF 2025 Call for Thematic Inputs. They will inform the MAG’s discussions and assist them in determining the thematic priorities of the IGF 2025 programme.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div class="views-field views-field-webform-submission-value-21"&gt;&lt;span class="field-content"&gt;On AI governance, AI risks and AI and data: &lt;br /&gt;
In the past many years, there has been rapid advances in the use of AI, 
most recently with the use of generative AI by end users and citizens. 
While questions of ethical use of AI, need for fairness, accountability 
and transparency are not new, the very rapid scale deployment of AI 
across different fields and also the easy use of AI across different 
users, have raised questions of exacerbated harms, infringement of 
copyright among others and a lot of focus currently is on developing 
governance for AI. Somewhere, there has been an acceptance of 
inevitability and almost omnipresence of AI across different contexts 
which has furthered deliberations around harnessing AI for good. We ask 
that while “AI for good” as an issue is being mainstreamed, it is most 
critical that there are avenues to discuss and understand areas where AI
 should not be used  (because of the outsized harms as compared to its 
benefits) or can be used through limited use of resources (given the 
wide ranging environmental impacts associated with AI and the resource 
intensive areas of computational power and data centers) and mechanisms 
to actualize that. This means that not only do we discuss AI governance 
in the context of where it is already deployed but also discuss 
conditions in which it should not be deployed. &lt;br /&gt;
There also needs to be greater and more specific regional conversations 
around data use for AI, especially for developing predictive AI systems,
 in sensitive settings such as healthcare and financial services. The 
challenges of using different data for different geographical settings 
have been well documented (consider for example training data from 
global north to develop and deploy AI diagnostics for a country in 
global south). There needs to be more specific conversations and 
transparency around data sources that are being used and how they can be
 both ethically sourced but also made contextually relevant. IGF can 
support these conversations by inviting specific inputs from the 
multi-stakeholder community on these specific issues. &lt;br /&gt;
&lt;br /&gt;
On digital identity: &lt;br /&gt;
There is growing interest in digital public infrastructure and its use 
for public service delivery and has potential to offer benefits and 
meaningful governance, if done well, as certain examples may suggest. 
However,  the implementation of digital ID systems for example, 
particularly when they are the sole means of identification, raises 
critical questions. Such systems must have robust legislative backing, 
including privacy and data protection frameworks, if not regulations, 
along with sufficient legislative and judicial oversight to ensure 
accountability. Concerns about mission creep—where systems initially 
introduced for specific purposes gradually expand to other uses without 
adequate scrutiny—highlight the need for clearly defined objectives and 
legal safeguards. These systems should proactively assess and mitigate 
risks and harms before implementation. Furthermore, given that many of 
these systems rely heavily on private companies with limited oversight, 
it is crucial to ensure meaningful community participation and 
accountability throughout the entire process to prioritize public 
interest over private gains. As we think about DPIs, we urge that its 
applicability, necessary infrastructural availability, assessment of 
risks are adequately considered and detailed through the themes and 
sessions at IGF. &lt;br /&gt;
&lt;br /&gt;
On data governance and youth engagement: &lt;br /&gt;
Personal data is being captured by different actors in an unprecedented 
manner, and at times without any legislative backing or grievance 
redressal mechanism.  With the advent of generative AI- there are also 
concerns regarding the extent to which data which is publicly available 
is being used and for what purposes. These concerns are exacerbated when
 children’s data is being used for generative AI purposes; in most cases
 without the knowledge or consent of the children. In an increasingly 
digitised world, how should children navigate the digital world; what is
 the appropriate age for children to access the internet and should 
there be age-gating, and if yes, how should that be implemented? What 
are the mechanisms to determine parental verification? As we have more 
and more young people online, it will be essential to define and develop
 frameworks for children’s use and experience of the internet, including
 having young people participate in these discussions. &lt;/span&gt;&lt;/div&gt;
&lt;div class="views-field views-field-nothing-2"&gt;&lt;span class="field-content"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="views-field views-field-webform-submission-value-20"&gt;&lt;span class="field-content"&gt;We request some steps to be taken at the IGF annual meeting and during its intersessional work: &lt;br /&gt;
-Reduce duplication of processes and efforts when it comes to 
implementation of GDC and continue to look at existing arenas like the 
WSIS+20 and IGF. Greater coordination and collaboration among various UN
 bodies. &lt;br /&gt;
-Robust support for civil society participation at the IGF and other 
internet governance processes, especially so from Global South.  &lt;br /&gt;
-Creation of well resourced working groups that look through the GDC implementation work where relevant. &lt;/span&gt;&lt;/div&gt;
&lt;div class="views-field views-field-webform-submission-value-27"&gt;&lt;span class="field-content"&gt;Given
 the diverse set of stakeholders and the wide ranging nature topics 
discussed, it is understandable that the IGF covers a lot of ground. It 
would be beneficial if there might be deeper reflections on fewer issues
 if possible, so that there is greater depth in conversations as opposed
 to a much wider coverage. We understand that this might be difficult 
given what IGF sets out to do, but a more focused approach might help 
stakeholders have a better understanding of priorities and areas of 
focus. It will also be very helpful if all sessions have space for 
Q&amp;amp;A, even if it is for 10 minutes. It allows for listeners to 
reflect and also ask questions, where possible. &lt;/span&gt;&lt;/div&gt;
&lt;div class="views-field views-field-nothing-3"&gt;&lt;span class="field-content"&gt;&lt;br /&gt;For all inputs, please visit: https://intgovforum.org/en/igf-2025-proposed-issues (CIS's inputs are under ID322)&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/submission-to-igf-2025-call-for-thematic-inputs'&gt;https://cis-india.org/internet-governance/submission-to-igf-2025-call-for-thematic-inputs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amrita Sengupta, Yesha Tshering Paul, and Pallavi Bedi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2025-03-06T06:36:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-september-9-2019-submission-to-global-commission-on-stability-of-cyberspace">
    <title>Submission to Global Commission on Stability of Cyberspace on the definition of Cyber Stability</title>
    <link>https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-september-9-2019-submission-to-global-commission-on-stability-of-cyberspace</link>
    <description>
        &lt;b&gt;"The Global Commission on the Stability of Cyberspace  released a public consultation process that sought to  solicit comments and obtain feedback on the definition of “Stability of Cyberspace”, as developed by the Global Commission on the Stability of Cyberspace (GCSC).&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The definition of cyberspace the GCSC provided was :&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Stability of cyberspace is the condition where individuals and institutions can be reasonably confident in their ability to use cyberspace safely and securely, where the availability and integrity of services in cyberspace is generally assured, where change is managed in relative peace, and where tensions are resolved in a peaceful manner.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="moz-quote-pre"&gt;CIS gave detailed commentary on the definitions [attached] and suggested a new definition of cyber stability documented below:&lt;/p&gt;
&lt;p style="text-align: justify;" class="moz-quote-pre"&gt;Stability of cyberspace is the objective where individuals, i&lt;strong&gt;nstitutions and communities &lt;/strong&gt;are confident in the safety and security of cyberspace; the  &lt;strong&gt;accessibility,&lt;/strong&gt;availability and integrity of services in cyberspace can be relied upon and  where change is managed and tensions ranging  from &lt;strong&gt;external interference in sovereign processes to the use of force in cyberspace &lt;/strong&gt;are resolved  peacefully in &lt;strong&gt;line with the tenets of International Law,specifically the principles of the UN Charter and universally recognised human rights.&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="moz-quote-pre"&gt;&lt;strong&gt;Cyber stability can only be fostered if key stakeholders in cyberspace conform to a due diligence obligation of not undertaking and preventing actions that may prevent cyber stability. The end goal of cyber stability must minimize or eliminate immaterial or peripheral incentives while preserving and potentially legitimizing those cyber offensive operations that can further effective deterrence and thereby foster stability, while also minimising any collateral damage to civilian life or property.&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="moz-quote-pre"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/files/gcsc-response"&gt;Click to view the detailed submission here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-september-9-2019-submission-to-global-commission-on-stability-of-cyberspace'&gt;https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-september-9-2019-submission-to-global-commission-on-stability-of-cyberspace&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-09-11T14:52:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/submission-on-indias-draft-comments-on-proposed-changes-to-itus-itrs">
    <title>Submission on India's Draft Comments on Proposed Changes to the ITU's ITRs</title>
    <link>https://cis-india.org/internet-governance/blog/submission-on-indias-draft-comments-on-proposed-changes-to-itus-itrs</link>
    <description>
        &lt;b&gt;Given below are the responses from the representatives of civil society in India (The Society for Knowledge Commons, Centre for Internet &amp; Society, The Delhi Science Forum, Free Software Movement of India, Internet Democracy Project and Media for Change) to the Government of India's proposals for the upcoming WCIT meeting, in December 2012, in Dubai.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Our detailed comments on India's draft proposals can be &lt;a href="https://cis-india.org/internet-governance/blog/reaction-to-draft-proposal-from-india-on-final-draft-itr-document-of-itu" class="internal-link"&gt;found here&lt;/a&gt;. Also read the &lt;a href="https://cis-india.org/internet-governance/blog/indian-govts-submission-to-itu" class="internal-link"&gt;final version&lt;/a&gt; of Indian Government's submission to ITU on November 3, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Background&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We believe that, aspects of Internet governance that have been and are presently addressed by bodies other than ITU should not be brought under the mandate of the ITU through the ITRs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the proposed changes to the ITR's could have a significant negative impact on the openness of the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, the processes related to the WCIT lack openness and transparency: the WCIT / ITU excludes civil society, academia and other stakeholders from participation in and access to most dialogues and documents, contrary to established principles of Internet governance as laid down in the Tunis Agenda and as supported by the Indian government at several national and international fora. The WCIT process needs to be improved both at the domestic and global level. We urge the Indian government to support a more open process in the future, with respect to deliberations that will have a significant impact on the people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We recognise that concerns regarding cyber-security, spam, fraud, etc. are real and that some of these concerns require to be addressed at the global level. However, we believe that as a number of parallel processes are working on these specific issues, these need not be brought under the ITRs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We therefore strongly recommend that the ITRs continue to be restricted to the infrastructure layer that has traditionally been the area of its focus and not the content or the application layer of the Internet. Any measure that impinges on these layers should be kept out of ITRs and taken up at other appropriate (multi-stakeholder) fora.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We note that the proposal ARB/7/24 defines an "operating agency" as "&lt;i&gt;any individual, company, corporation or governmental agency which operates a telecommunication installation intended for an international telecommunication service or capable of causing harmful interference with such a service&lt;/i&gt;" and believe that this definition is too broad in scope and ambit. Inclusion of such a term would broaden the mandate of the ITU to regulate numerous actors in the Internet sphere who do not fall under the infrastructure layer of the Internet. We call on the Indian government to ensure that the term "operating agency" is defined in a narrower or more restrictive manner and only used in exceptional cases. Normally, the obligations of member states should be with respect to "recognised operating agencies" and not omnibus all "operating agencies".&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Follow-up&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We would like to note that we have never officially received this document directly from the Indian government. In view of the support the Indian government continually espouses for multi-stakeholder Internet governance, this is a matter of deep regret.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We are aware that the official closing date for proposals is early November. However, we also know that several governments intend to submit proposals right upto the beginning of the WCIT meeting. In addition, several governments have included civil society representatives on their official delegation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;We therefore call upon the Department of Telecommunications to&lt;/i&gt; organise an open consultation with civil society representatives, to discuss both India's proposals and the comments of various civil society representatives on them, in greater depth, &lt;/b&gt;as part of DoT’s preparation for the WCIT meeting and in line with India's espoused commitment to multi-stakeholderism. We look forward to discussing our inputs with the Government to make the decision making process on governance more participatory and inclusive.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/submission-on-indias-draft-comments-on-proposed-changes-to-itus-itrs'&gt;https://cis-india.org/internet-governance/blog/submission-on-indias-draft-comments-on-proposed-changes-to-itus-itrs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WCIT</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-07T04:15:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior">
    <title>Submission by the Centre for Internet and Society on Revisions to ICANN Expected Standards of Behavior</title>
    <link>https://cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior</link>
    <description>
        &lt;b&gt;Prepared by Vidushi Marda, with inputs from Dr. Nirmita Narasimhan and Sunil Abraham.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;We at the Centre for Internet and Society (“CIS”) are grateful for the opportunity to comment on the proposed revisions to ICANN’s Expected Standards of Behavior (“Standards”).&lt;/p&gt;
&lt;p&gt;Before providing specific comments on the proposed revisions, CIS would like to state for the record our extreme disappointment while noting that there is no indication of the intention to draft and adopt a dedicated anti - harassment policy. We are of the firm opinion that harassment, and particularly sexual harassment, is not only a sensitive topic, but also a deeply complex one. Such a policy should consider scope, procedural questions, redressal and remedies in cases of harassment in general and sexual harassment in particular. A mere change in language to these Standards, however well intentioned, cannot go too far in preventing and dealing with cases of harassment in the absence of a framework within which such instances can be addressed.&lt;/p&gt;
&lt;p&gt;Some of the issues that arose at ICANN55 were confusion surrounding the powers and limits of the Ombudsman’s office in dealing with cases of harassment, the exact procedure to be followed for redressal surrounding such incidents, and the appropriate conduct of parties to the matter. There will be no clarity in these respects, even if these proposed changes are to be adopted.&lt;/p&gt;
&lt;p&gt;Specifically, the proposed language is problematic and completely inadequate for the following reasons:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Vague&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Terms like “professional conduct” and “appropriate behavior” mean little in the absence of a definition that entails such conduct. These terms could mean vastly different things to each community member and such language will only encourage a misalignment of expectation of conduct between community members. The “general” definition of harassment is at best, an ineffective placeholder, as it does not encompass exactly what kind of behavior would fall under its definition.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Fails to consider important scenarios&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The proposed language fails to consider situations where some attempts or advances at communication, sexual or otherwise, occur. For example, consider a situation in which one community member stalks another online, and catalogues his/her every move. This is most certainly foreseeable, but will not be adequately covered by the proposed language. Further, terms like “speech or behavior that is sexually aggressive or intimidates” &amp;nbsp;could or could not include types of speech such as art, music, photography etc, depending on who you ask. It also does not explain the use of the word behavior - physical, emotional, professional, online behavior are all possible, but the scope of this term would depend on the interpretation one chooses to apply. In part 4 below, we will demonstrate how ICANN has applied a far more detailed framework for harassment elsewhere.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Ignores complexity&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In discussions surrounding the incident at ICANN55, a number of issues of arose. These included, inter alia, the definition of harassment and sexual harassment, what constituted such conduct, the procedure to be followed in such cases, the appropriate forum to deal with such incidents and the conduct that both parties are expected to maintain. These questions cannot, and have not been answered or addressed in the proposed change to the Standards. CIS emphasizes the need to understand this issue as one that must imbibe differences in culture, expectation, power dynamics, and options for redressal. If ICANN is to truly be a safe space, such issues must be substantively and procedurally fair for both the accused and the victim. This proposed definition is woefully inadequate in this regard.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Superficial understanding of harassment, sexual harassment&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The proposed changes do not define harassment, and sexual harassment in an adequate fashion. The change currently reads, “Generally, harassment is considered unwelcome hostile or intimidating behavior -- in particular, speech or behavior that is sexually aggressive or intimidates based on attributes such as race, gender, ethnicity, religion, age, color, national origin, ancestry, disability or medical condition, sexual orientation, or gender identity.” These are subject to broad interpretation, and we have already highlighted the issues that may arise due to this in 1, above. Here, we would like to point to a far more comprehensive definition.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;ICANN’s own Employment Policy includes within the scope of sexual harassment “verbal, physical and visual conduct that creates an intimidating, offensive or hostile working environment, or interferes with work performance.” The policy also states:&lt;/p&gt;
&lt;blockquote&gt;Harassing conduct can take many forms and includes, but is not limited to, the following:&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;Slurs, jokes, epithets, derogatory comments, statements or gestures;&lt;/li&gt;
&lt;li&gt;Assault, impeding or blocking another’s movement or otherwise physically interfering with normal work;&lt;/li&gt;
&lt;li&gt;Pictures, posters, drawings or cartoons based upon the characteristics mentioned in the first paragraph of this policy.&lt;/li&gt;&lt;/ol&gt;
Sexually harassing conduct includes all of the above prohibited actions, as well as other unwelcome conduct, such as requests for sexual favors, conversation containing sexual comments, and unwelcome sexual advances.”&lt;/blockquote&gt;
&lt;p&gt;This definition is not perfect, it does not comprehensively consider advances or attempts at communication, sexual or otherwise, which are unwelcome by the target. Nonetheless, CIS believes that this is a far more appropriate definition that does not include vague metrics that the proposed changes do. Since it is one ICANN has already adopted, it can act as an important stepping stone towards a comprehensive framework.&lt;/p&gt;
&lt;p&gt;Like ICANN, UNESCO’s organisational approach has been to adopt a comprehensive &lt;a href="http://www.un.org/womenwatch/osagi/UN_system_policies/(UNESCO)Anti-harassment_Policy.pdf"&gt;Anti-Harassment Policy&lt;/a&gt; which lays down details of definition, prevention, complaint procedure, investigations, sanctions, managerial responsibility, etc. Acknowledging the cultural sensitivity of harassment particularly in international situations, the policy also recognizes advances or attempts at communication, sexual or otherwise. Most importantly, it states that for conduct to come within the definition of sexual harassment, it “must be unwelcome, i.e. unsolicited and regarded as offensive or undesirable by the victim.”&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;In conclusion, we would like to reiterate the importance of adopting and drafting a dedicated anti-harassment policy and framework. The benefits of safety, certainty and formal redressal mechanisms in cases of harassment cannot be over emphasized.&lt;/p&gt;
&lt;p&gt;Importantly, such measures have already been taken elsewhere. The IETF has adopted an &lt;a href="http://tools.ietf.org/html/rfc7776"&gt;instrument&lt;/a&gt; to address issues of harassment that occur at meetings, mailing lists and social events. This instrument contemplates in detail, problematic behavior, unacceptable conduct, the scope of the term harassment, etc. It further envisages a framework for redressal of complaints, remediation, and even contemplates issues that may arise with such remediation. It is particularly important to note that while it provides a definition of harassment, it also states that "[a]ny definition of harassment prohibited by an applicable law can be subject to this set of procedures, recognising harassment as a deeply personal and subjective experience, and thus encouraging members to take up issues of harassment as per their cultural norms and national laws, which are then considered as per procedures laid down."&lt;/p&gt;
&lt;p&gt;A similar effort within the ICANN community is critical.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior'&gt;https://cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vidushi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-06-30T06:07:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/submission-on-proposals-for-future-itrs-and-related-processes">
    <title>Submission by Indian Civil Society Organisations on Proposals for the Future ITRs and Related Processes</title>
    <link>https://cis-india.org/internet-governance/blog/submission-on-proposals-for-future-itrs-and-related-processes</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society was one of the signatories of this submission which was sent in November 2012, in response to the International Telecommunication Union's call for public comments in relation to the  revision of International Telecommunication Regulations that are to take place at the ITU's World Conference on International Telecommunications in Dubai from December 3 to 14, 2012.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We, the undersigned civil society organisations from India, respectfully acknowledge the important role that the ITU has played in the spread of telecommunications around the world. However, we are concerned about the lack of transparency and openness of the processes related to the WCIT: the WCIT/ITU excludes civil society, academia and other stakeholders from participation in and access to most dialogues and documents.  The documents that are publicly available show that some of the proposals might deal with Internet governance. According to established principles as laid down in the Tunis Agenda - which process the ITU helped to lead - Internet governance processes are required to be multistakeholder in nature. The WCIT and ITU processes require urgent improvement with regard to openness, inclusiveness and transparency. While we appreciate the current opportunity to share our comments, we would like to encourage the ITU and its Member States to adopt a genuine multistakeholder approach at the earliest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As mentioned, we do welcome the current opportunity to share our thoughts. Though this list is not exhaustive, some of our major concerns are as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We believe that, given the historical development of present methods of internet regulation, aspects of Internet governance that have been and are presently addressed by bodies other than ITU should not be brought under the mandate of the ITU through the ITRs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We therefore strongly recommend that the ITRs continue to be restricted to aspects of the physical layer that have traditionally been the areas of its focus. The ITRs scope should not be expanded to other layers, nor to content - any measure that impinges on these layers should be kept out of ITRs and taken up at other appropriate (multi-stakeholder) fora. In addition, it is crucial that “ICTs” and the term “processing” be excluded from the definition of telecommunication as this clearly opens up the possibility for Member States to regulate/attempt to regulate the “content/“application” layer on the internet at the ITU.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We also recommend that provisions regarding international naming, numbering, addressing and identification resources will be restricted to telephony, as should provisions regarding transit rate, originating identification and end-to-end QoS. Provisions regarding the routing of Internet traffic should not find a place in the ITRs at all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We recognise that concerns regarding cyber security, spam, fraud, etc. are real and that some of these concerns require to be addressed at the global level. However, as these are being discussed in many other fora, we believe that the ITRs are not the best place to address these. Their inclusion here could inhibit the further evolution and expansion of the Internet. We also believe that any fora discussing cyber security should be multistakeholder, open and transparent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We note that the proposal ARB/7/24 defines an “operating agency” as “&lt;i&gt;any individual, company, corporation or governmental agency which operates a telecommunication installation intended for an international telecommunication service or capable of causing harmful interference with such a service&lt;/i&gt;” and believe that this definition is too broad in scope and ambit. Inclusion of such a term would broaden the mandate of the ITU to regulate numerous actors in the Internet sphere who do not fall under the infrastructure layer of the Internet. The term “operating agency” should be defined in a narrower or more restrictive manner and, irrespective of its exact definition, only be used in exceptional cases. Normally, the obligations of member states should be with respect to “recognised operating agencies” and not omnibus all “operating agencies”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Signed:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;Delhi Science Forum&lt;/li&gt;
&lt;li&gt;Free Software Movement India&lt;/li&gt;
&lt;li&gt;Internet Democracy Project&lt;/li&gt;
&lt;li&gt;Knowledge Commons (India)&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/submission-on-proposals-for-future-itrs-and-related-processes'&gt;https://cis-india.org/internet-governance/blog/submission-on-proposals-for-future-itrs-and-related-processes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WCIT</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-07T08:00:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-may-21-2014-sruthy-susan-ullas-students-lead-the-way-with-apps-for-ideas">
    <title>Students lead the way with apps for ideas</title>
    <link>https://cis-india.org/news/times-of-india-may-21-2014-sruthy-susan-ullas-students-lead-the-way-with-apps-for-ideas</link>
    <description>
        &lt;b&gt;At 1am, the lights are still on in 15-year-old Pratik's room at his house on 80 Feet Road, Indiranagar. The NPS-Koramangala student is busy typing code on his laptop for his latest app called Resolve.&lt;/b&gt;
        &lt;p&gt;The article &lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/bangalore/Students-lead-the-way-with-apps-for-ideas/articleshow/35399402.cms"&gt;published in the Times of India&lt;/a&gt; on May 21, 2014 quotes Nishant Shah.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT" style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pratik epitomizes Gen X. Coding and decoding, these school children, barely into their teens, are developing apps drawing attention worldwide.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I learnt coding by myself with the help of the internet. The world wants things simplified and that's why apps are a hit. The first app I made was a calculator because my dad was unhappy with the one on his phone. My work was initially rejected, but I knew that would happen. But I continued working. When I went to a Microsoft conference, they told me youngsters have ideas to change the world and we have the time," said Pratik.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He was felicitated with a Nokia Lumia 1520 at the Windows Azure Conference 2014 for his work in developing apps for Windows and Windows Phone store.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rahul Yedida, a Class 12 student at the National Centre for Excellence, has around 18,000 downloads for the app he and his friend created. "I wasn't too happy with the amount of Maths homework. I started wondering whether an app could do it. At the same time, I had learnt a new language and wanted to test my skills. That's how I started working on it," said Rahul.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Programming is fun. Seeing a computer work the way you want it to gives you special joy," said Vaisakh M, Rahul's co-developer. They sent a letter to Bill Gates about the app and got a reply lauding their achievement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Quote hanger&lt;br /&gt;&lt;/b&gt;* During my free time, I read about programming which helps me when I write programs. My friends in the colony join me when I watch videos about it. They do programs in other languages. I play games and used to wonder how they're made. My dad promised to get me a laptop if I start programming and that's how it started.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Thrisha Mohan| 12, Vidyashilp Academy, now working on a jewellery app&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;* Apps are the cool things to do now. With the kind of access possible thanks to smart phones, they have gone to the masses. I wouldn't be surprised at the number of apps being created. When an app is created in a college dormitory, 1,000 students in the college will download it. That's instant gratification. The ecosystem is such that with social networking sites, you become an instant hero. The question is: How many can be successful and have a long life?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;S Sadagopan | director, IIIT-B&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;* Apps are more relevant for those growing up with interfaces which are mobile and wearable. We also need to realise there is a growing generation of people whose first point of access to the digital as well as to the connected worlds of the internet is through mobile devices. And apps are a natural way of interaction. It is a positive trend because it allows users to think of themselves not only as 'users' but as active producers of the digital world. They look beyond platforms made available by multi-national companies or private enterprises, and it allows them to build communities of interaction and learning between them. We need to make sure they are safe and not susceptible to invasive presence of others who might exploit their presence on the web.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Nishant Shah | director- research, The Centre for Internet and Society&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-may-21-2014-sruthy-susan-ullas-students-lead-the-way-with-apps-for-ideas'&gt;https://cis-india.org/news/times-of-india-may-21-2014-sruthy-susan-ullas-students-lead-the-way-with-apps-for-ideas&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-05-28T09:24:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-world-regina-mihindukulasuriya-april-26-2017-stop-the-haphazard-internet-shutdown-says-mp-jay-panda">
    <title>Stop the Haphazard Internet Shutdown Says MP Jay Panda</title>
    <link>https://cis-india.org/internet-governance/news/business-world-regina-mihindukulasuriya-april-26-2017-stop-the-haphazard-internet-shutdown-says-mp-jay-panda</link>
    <description>
        &lt;b&gt;In just one year India lost $968M due to Internet shutdowns; “Cops may not be the right decision makers when it comes to imposing what is a digital curfew,” added an entrepreneur journalist. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Regina Mihindukulasuriya was &lt;a class="external-link" href="http://bwdisrupt.businessworld.in/article/Stop-the-Haphazard-Internet-Shutdown-Says-MP-Jay-Panda/26-04-2017-117091/"&gt;published in the Businessworld&lt;/a&gt; on April 26, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;An entrepreneur from the troubled state of Kashmir, Muheet Mehraj, is cofounder and CEO of &lt;a href="https://www.kashmirbox.com/" target="_blank"&gt;Kashmirbox.com&lt;/a&gt;.  He said that businesses that run on the Internet are crippled by  Internet shutdowns. “A lot of people's livelihood depends on the  Internet. If you shut down the Internet, you shut down their lives.  Also, hospitals and academic institutes need constant Internet access  and a way must be found to ensure they are never impacted by a  shutdown.”&lt;br /&gt;&lt;br /&gt;In 2016, &lt;a href="https://www.brookings.edu/" target="_blank"&gt;Brookings Institution&lt;/a&gt; released a survey of 19 countries and the Internet shutdowns each of  them experienced. India was in that list and according to the century  old research institute, suffered the biggest economic loss to GDP at 968  million dollars all due to Internet shutdowns.&lt;br /&gt;&lt;br /&gt;The general  secretary of Maha Gujarat Bank Employees Association was quoted in 2016  as saying that an Internet shutdown for 6 days across Gujarat culminated  in a loss of rupees 7000 crore for banks in the state.&lt;br /&gt;&lt;br /&gt;The  Brookings survey recorded the maximum number of disruptions in India at  22. According to IndiaSpend.org, The Centre for Communication Governance  at the National Law University of Delhi counts 37 shutdowns across 11  states since 2015 and 22 of them happened in the first 9 months of 2016.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://sflc.in/" target="_blank"&gt;The Software Freedom Law Centre (SFLC) &lt;/a&gt;claims there have been 72 instances of Internet shutdown in India since 2012 and that not all of them are justified.&lt;br /&gt;&lt;br /&gt;The  SFLC.in along with other civil society organizations addressed the  increasing frequency of Internet shutdowns in the country. Baijayant  'Jay' Panda, Member of Parliament said that India needs effective checks  and balances on the process and power to order Internet Shutdowns in  India. He added that, “The power to shut Internet should be exercised by  the district's Superintendent of Police only in rare cases when there  is imminent threat to breakdown of law and order, and risk of loss of  life and property". &lt;br /&gt;&lt;br /&gt;He was speaking at a public discussion  organized by SFLC.in, in association with Digital Empowerment Foundation  (DEF); IT for Change, Internet Democracy Project (IDP); Centre for  Internet and Society (CIS), and Foundation for Media Professionals  (FMP).&lt;br /&gt;&lt;br /&gt;Mr Panda remarked that this power should be limited to 24  or 48 hours. “If Internet must be shut down for a longer duration, the  decision must be taken by Director General of Police or the chief  secretary of state”, he said.&lt;br /&gt;&lt;br /&gt;Abhinandan Sekhri, cofounder and  CEO of Newslaundry raised concerns that there is a fundamental flaw in  how Indians approach law making, in that they first look at the worst  case scenario before taking a liberal and democratic point of view.  “Cops may not be the right decision makers when it comes to imposing  what is a digital curfew,” Mr. Sekhri said.&lt;br /&gt;&lt;br /&gt;Snehashish Ghosh,  associate manager for public policy at Facebook said, “Even though we  may not have ready data to measure the impact of shutdowns, there is no  denying that businesses suffer.” The Facebook Inc. – owned, WhatsApp is  often reported as one of the most missed services whenever the Internet  is shutdown in Kashmir during days of social unrest.&lt;br /&gt;&lt;br /&gt;Mishi  Choudhary, president and legal director of SFLC.in said, “According to  our Internet Shutdown Tracker, India has experienced at least 72  instances of Internet Shutdowns since 2012. Several communities and  states have suffered irreversible socioeconomic losses because they were  denied Internet access for extended durations.”&lt;br /&gt;&lt;br /&gt;Mishi continued,  “The shutdown of Internet not only restrains basic human rights such as  the right to freedom of speech and expression, but also cripples  activities like e-commerce, e-governance, e-health and e-learning,  entirely reliant on the Internet.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-world-regina-mihindukulasuriya-april-26-2017-stop-the-haphazard-internet-shutdown-says-mp-jay-panda'&gt;https://cis-india.org/internet-governance/news/business-world-regina-mihindukulasuriya-april-26-2017-stop-the-haphazard-internet-shutdown-says-mp-jay-panda&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-04-27T16:44:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/outlook-feb-22-2013-arindam-mukherjee-stop-press-counsel">
    <title>Stop Press Carousel </title>
    <link>https://cis-india.org/news/outlook-feb-22-2013-arindam-mukherjee-stop-press-counsel</link>
    <description>
        &lt;b&gt;The silent blocking of URLs by the DoT assaults freedom of expression.&lt;/b&gt;
        &lt;hr /&gt;
&lt;div class="fsptext" id="divouterfullstorytext" style="text-align: justify; "&gt;
&lt;div id="ctl00_cphpagemiddle_reparticle_ctl00_divfullstorytext"&gt;
&lt;div&gt;
&lt;p&gt;Arindam Mukherjee's article was &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?284011"&gt;published&lt;/a&gt; in the Outlook on February 22, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Five Questions&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;On what grounds did the DoT ask for a ban on the &lt;a href="http://www.outlookindia.com/article.aspx?283960" target="_blank"&gt;55 Facebook URLs&lt;/a&gt; pertaining to Afzal Guru?&lt;/li&gt;
&lt;li&gt;Why did the Gwalior court rush into blocking of &lt;a href="http://www.outlookindia.com/article.aspx?283938" target="_blank"&gt;73 URLs related to IIPM &lt;/a&gt;even though the content was very old and clearly some  of it was even prima facie non-defamatory?&lt;/li&gt;
&lt;li&gt;Why is the Gwalior court order not being made public?&lt;/li&gt;
&lt;li&gt;Why doesn’t DoT keep the whole process transparent by putting up  all its block orders on its website, giving reasons in each case?&lt;/li&gt;
&lt;li&gt;How many URLs in all has the DoT asked for a ban on so far?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: center; "&gt;***&lt;/p&gt;
&lt;p&gt;It’s the perfect recipe for a potboiler—a sudden, mysterious and  arbitrary blocking of web pages, sparked off by an irate ‘educationist’;  several upset publications (&lt;i&gt;Outlook&lt;/i&gt; included); a government  department with a blocked web page; a ministry trying to figure out how  to react to a court order that is at the root of all the action, but  which no one has been able to see.&lt;/p&gt;
&lt;p&gt;As the cliche goes, truth is often stranger than fiction—as the  affected parties discovered on February 15. That’s when it became known  that the government had sought to block 78 web pages, reportedly  following an order from a court in Gwalior. Around 73 of these articles  sought to be blocked are on the controversial Indian Institute of  Planning and Management (IIPM), promoted by self-styled management guru  Arindam Chaudhuri.&lt;/p&gt;
&lt;p&gt;What has taken everyone by surprise is how the blocks were  executed­—in a clandestine manner, without informing the affected  parties, without serving them a notice or a copy of the order, or giving  them a chance to react or defend themselves. The enormity of the ban is  evident from the list of websites targeted, which include &lt;i&gt;The Economic Times, The Indian Express, The Wall Street Journal, FirstPost, Careers360, Rediff.com&lt;/i&gt; and &lt;i&gt;Caravan&lt;/i&gt;. When it came to &lt;i&gt;Outlook&lt;/i&gt;,  there was a clear case of overreach, as not just the web pages, but the  entire blogs area was blocked for more than eight hours (see Jump Cut).&lt;/p&gt;
&lt;p&gt;What is even more surprising is the smokescreen that is being  maintained over the Gwalior court order that has caused this  consternation on the Internet. At the time of going to print, no one—the  affected websites, auth­ors, lawyers or activists—had access to the  order or had seen it, and the government was evading media queries on  details of the order and the case. Despite repeated requests, the head  of the Computer Emergency Response Team (CERT), Gulshan Rai, did not  speak to &lt;i&gt;Outlook&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;So, in the absence of the order, no one even knows who the  complainant is. Sig­nificantly, IIPM’s Chaudhuri has said that one of  his ‘channel partners’ app­roached the court, though he clearly is the  chief beneficiary of the episode. What this entire episode serves up is a  blatant use of the law to muzzle press criticism while the government  and official machinery have been willy-nilly forced to become mute  players.&lt;/p&gt;
&lt;p&gt;This surreal, Kafkaesque scenario continues apace at &lt;i&gt;Outlook&lt;/i&gt;’s  website, where on protesting the block on its blogs, the ISP said, “As  only some of the URLs are mentioned in the DoT letter, we have  reactivated the website and requested you to delete the mentioned  contents,” adding that they had “att­ached the DoT instructions  alongwith”. What they had attached was not one but two DoT orders, both  dated February 14. One was, of course, the order about the 78 URLs. The  other order came as news: an order on 55 Facebook URLs on Afzal Guru  that the DoT wanted blocked.&lt;/p&gt;
&lt;p&gt;As expected, internet activists and advocates of freedom of speech are livid. Shivam Vij, founder of &lt;i&gt;kafila.org&lt;/i&gt;,  one of the blogs that was blocked in the IIPM matter, says, “We were  never given a chance to defend or explain. If only the DoT had put up  the notice on their website, there would have been a healthier debate on  regulation or censorship. But this was done in an opaque and arbitrary  manner. If a book is banned, everyone gets to know. Why was there so  much secrecy here?”&lt;/p&gt;
&lt;p&gt;The arbitrariness of the twin government action also stems from the  new IT Act which authorises the gov­ernment or a competent authority to  block or take down content considered “harmful”. And, according to the  law, there is no obligation on the auth­orities’ part to inform the  defendants. Cyber law expert Apar Gupta says, “Under the blocking rules,  there is nothing that says that a copy of the court order has to be  given to the aff­ected parties. The rules also do not talk about the  authors being given a chance to explain. It permits ad int­erim  injunction to block content.”&lt;/p&gt;
&lt;p&gt;Says Nikhil Pahwa, internet activist and editor of &lt;i&gt;Medianama&lt;/i&gt;,  which first reported about the IIPM blocks, “It is not clear why the  DoT has taken this cloak-and-dagger approach. These are legitimate  issues being raised by people regarding IIPM and its students. This is  an infringement on the freedom of speech and expression. The DoT should  have executed the blocks in a transparent manner by sending the affected  parties a copy of the court order and making it public.”&lt;/p&gt;
&lt;p&gt;That’s important, because legal exp­erts feel that full facts may not  have been considered in the IIPM case. “For this kind of a blocking  order, the content should have come to the notice of the plaintiff  recently. In this case, most of the content was much older. But  sometimes plaintiffs also do not provide full details in a case,” says  Gupta. Lawyers also feel that the Gwalior court may not be equipped to  deal with litigation on new technologies.&lt;/p&gt;
&lt;p&gt;There are other issues. In the IIPM case, the issue is primarily of  defamation. But it is not clear whether defamation was established in  all the articles that were sought to be taken down, especially a  University Grants Commission (UGC) notice. Thus, the evidence that was  presented to the court is important. Once again, till the court order  becomes public, no one will know who the complainant was or what  evidence was presented. The temporary ban on UGC’s web page is  particularly surprising—and this has been noted by Shashi  Tharoor—considering it is an independent regulator. “The regulatory  body’s job is to regulate and nobody considers its notice as  defamatory,” says Parminder Jeet Singh of IT for Change, an organisation  dealing with internet issues.&lt;/p&gt;
&lt;p&gt;The real purpose of such exercises, say experts, is to create a scare  and embroil people in the legal process so that the process itself  becomes a punishment and acts as a deterrent to others to engage in such  writing. And that is why such cases are filed in remote and unusual  destinations like Gwalior, Silchar, Dehradun and Guwahati. “There is a  concept of forum shopping and forum shifting where cases are filed at  remote destinations and by asking for huge damages, an attempt is made  to scare people away from free speech. There are also many bullies who  use defamation to create a scare effect. IIPM seems to have pioneered  forum shopping in India,” says Sunil Abraham, executive director of the  Bangalore-based Centre for Internet and Society (CIS).&lt;/p&gt;
&lt;p&gt;The problem, everyone agrees, stems from the faulty nature of the  Information Technology Act, which is open to interpretation and misuse.  Says Singh, “The law tries to cover everything under a single head. It  does not look specifically at the nuances of new media and give an  appropriate response. So it is misused.” It is time that DoT became  transparent and stopped its arbitrary, covert war against freedom of  expression.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/outlook-feb-22-2013-arindam-mukherjee-stop-press-counsel'&gt;https://cis-india.org/news/outlook-feb-22-2013-arindam-mukherjee-stop-press-counsel&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-03-06T04:27:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/stockholm-internet-forum-2019">
    <title>Stockholm Internet Forum 2019 </title>
    <link>https://cis-india.org/internet-governance/news/stockholm-internet-forum-2019</link>
    <description>
        &lt;b&gt;Swedish International Development Agency (Sida)  organized the Stockholm Internet Forum 2019 in Stockholm from 16 - 17 May 2019. Gurshabad Grover was a panelist in the discussion on 'Influencing Internet Governance' co-organised by Article 19. The other panelists were Sylvie Coudray (UNESCO), Grace Githaiga (Kictanet), J. Carlos Lara (Derechos Digitales) and Charles Bradley (GPD). The discussion was moderated by Mallory Knodel (Article 19).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Gurshabad's &lt;span&gt;primary contributions were around the motivations for civil society &lt;/span&gt;&lt;span&gt;organisations to participate in technical internet governance fora, and &lt;/span&gt;&lt;span&gt;how their role has matured at such fora in the last couple of years. Gurshabad extends his thanks to the inputs of Akriti Bopanna and Arindrajit Basu primarily for their contributions &lt;/span&gt;&lt;span&gt;around the motivations for civil society organisations to participate in technical internet governance fora, and how their role has matured at such fora in the last couple of years.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Click to &lt;a class="external-link" href="https://www.stockholminternetforum.se/agenda/"&gt;view the agenda&lt;/a&gt;. See the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/sif-concept-note"&gt;concept note here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/stockholm-internet-forum-2019'&gt;https://cis-india.org/internet-governance/news/stockholm-internet-forum-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-06-05T04:15:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
