<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 731 to 745.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/round-table-on-user-safety-on-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/round-table-on-privacy-and-data-protection-at-nipfp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/rootconf-2018"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/fostering-freedom-of-expression"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/role-of-intermediaries-in-counting-online-abuse"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/gulf-times-february-24-2019-dr-r-seetharaman-risk-integration-is-key-to-better-cybersecurity-management"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/hindustan-times-january-5-2014-danish-raza-rise-of-the-bot"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/news/rightscon-toronto-2018"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/rightscon-silicon-valley-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/rights-con-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-bill-2010"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/rti-requests-to-bsnl-mtnl-regarding-security-equipment"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/round-table-on-user-safety-on-internet">
    <title>Round-table on User Safety on the Internet</title>
    <link>https://cis-india.org/news/round-table-on-user-safety-on-internet</link>
    <description>
        &lt;b&gt;Elonnai Hickok participated in this round-table meeting organized by Consumer Voice in collaboration with Google at Infantry Road, Bangalore on April 24, 2014.&lt;/b&gt;
        &lt;p&gt;Click to &lt;a href="https://cis-india.org/internet-governance/blog/user-safety-internet.pdf" class="internal-link"&gt;download&lt;/a&gt; the agenda.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/round-table-on-user-safety-on-internet'&gt;https://cis-india.org/news/round-table-on-user-safety-on-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-05-06T09:55:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/round-table-on-privacy-and-data-protection-at-nipfp">
    <title>Round Table on Privacy and Data Protection at NIPFP </title>
    <link>https://cis-india.org/internet-governance/news/round-table-on-privacy-and-data-protection-at-nipfp</link>
    <description>
        &lt;b&gt;National Institute of Public Finance &amp; Policy organized a round-table on privacy and data protection on March 24, 2017 in New Delhi. &lt;/b&gt;
        &lt;p&gt;Click to see the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/nipfp-round-table-on-privacy-and-data-protection"&gt;agenda&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/round-table-on-privacy-and-data-protection-at-nipfp'&gt;https://cis-india.org/internet-governance/news/round-table-on-privacy-and-data-protection-at-nipfp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-27T16:02:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/rootconf-2018">
    <title>Rootconf 2018</title>
    <link>https://cis-india.org/internet-governance/news/rootconf-2018</link>
    <description>
        &lt;b&gt;Rootconf is an annual conference on DevOps and IT Infrastructure and is organised by HasGeek.  On May 11 and 12, 2018, Gurshabad Grover, Natallia Khaniejo and Aayush Rathi attended Rootconf 2018.&lt;/b&gt;
        &lt;p&gt;Rootconf 2018 had two major themes - an infrastructure and systems security track and an infrastructure architecture track. All talks at the event were streamed live and videos of the same can be found at HasGeek's &lt;a class="external-link" href="https://www.youtube.com/channel/UCDHao9FxNRHw1VyLuGXI_rA"&gt;YouTube channel here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Of special interest were the talks entitled 'Death of enterprise security: introduction to abstraction and machine-to-machine orchestration' by Pukhraj Singh and 'On ground realities of Aadhaar' by Rachna Khaira. Of special interest were the talks entitled 'Death of enterprise security: introduction to abstraction and machine-to-machine orchestration' byPukhraj Singh and 'On ground realities of Aadhaar' by Rachna Khaira.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Additionally, the community table was helpful for the purposes of outreach within the tech community about CIS' work and potential ways in which interested parties may engage with CIS.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/rootconf-2018'&gt;https://cis-india.org/internet-governance/news/rootconf-2018&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-05-18T06:40:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance">
    <title>Role of the US Tech Companies in Government Surveillance: A Lecture by Christopher Soghoian </title>
    <link>https://cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance</link>
    <description>
        &lt;b&gt;Christopher Soghoian will deliver a lecture on the role US tech companies play in assisting government surveillance at the Centre for Internet &amp; Society office in Bangalore on August 27, 2012, from 5.00 p.m. to 7.00 p.m.

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Your internet, phone and web application providers are all, for the most part, in bed with US and other foreign government agencies. They all routinely disclose their customers' communications and other private data to law enforcement and intelligence agencies. Worse, firms like Google and Microsoft specifically log data in order to assist the government. How many government requests does your ISP get for its customers' communications each year? How many do they comply with? How many do they fight? How much do they charge for the surveillance assistance they provide? Who knows? Most companies have a strict policy of not discussing such topics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The differences in the privacy practices of the major players in the telecommunications and internet applications market are significant. Some firms retain identifying data for years, while others retain no data at all; some voluntarily provide the government access to user data, while other companies refuse to voluntarily disclose data without a court order; some companies charge government agencies when they request user data, while others disclose it for free. For an individual, later investigated by the police or intelligence services, the data retention practices adopted by their phone company or email provider can significantly impact their freedom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, although many companies claim to care about end-user privacy, and some even that they compete on their privacy features, none seem to be willing to compete on the extent to which they assist or resist the government in its surveillance activities. Because information about each firms' practices is not publicly known, consumers cannot vote with their wallets, and pick service providers that best protect their privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This talk will pierce the veil of secrecy surrounding these practices. Based upon a combination of Freedom of Information Act requests, off the record conversations with industry lawyers, and investigative journalism, the practices of many of these firms will be revealed.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Christopher's Personal Experience&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the year 2006, the Federal Bureau of Investigation (FBI) raided Christopher’s home at 2.00 a.m. seizing his personal documents and computers. Two attorneys, Stephen Braga and Jennifer Granick came to his defence. With their expert assistance, Christopher was able to get back his possessions within three weeks, and FBI’s criminal and TSA’s civil investigations were closed without any charges being filed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jennifer Granick came to Christopher’s assistance once again (joined by Steve Leckar) in 2010 after the Federal Trade Commission’s Inspector General investigated Christopher for using his government badge to attend a closed-door surveillance industry conference. It was at that event that Christopher recorded an executive from wireless carrier ‘Sprint’ bragging about the eight million times his company had obtained GPS data on its customers for law enforcement agencies in the previous years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To know more, read Christopher Soghoian’s dissertation titled "&lt;a href="https://cis-india.org/internet-governance/spies-we-trust" class="internal-link"&gt;The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance&lt;/a&gt;". [PDF, 1056 Kb]&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;About Christopher Soghoian&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Christopher Soghoian is a privacy researcher and activist, working at the intersection of technology, law and policy. He is a Principal Technologist and Senior Policy Analyst at the American Civil Liberties Union and is based in Washington, D.C.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Soghoian completed his Ph.D. at Indiana University in 2012, which focused on the role that third party service providers play in facilitating law enforcement surveillance of their customers. In order to gather data, he has made extensive use of the Freedom of Information Act, sued the Department of Justice &lt;i&gt;pro se&lt;/i&gt;, and used several other investigative research methods. His research has appeared in publications including the &lt;i&gt;Berkeley Technology Law Journal &lt;/i&gt;and been cited by several federal courts, including the Ninth Circuit Court of Appeals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Between the years, 2009-2010, he was the first ever in-house technologist at the Federal Trade Commission's Division of Privacy and Identity Protection, where he worked on investigations of Facebook, Twitter, MySpace and Netflix. Prior to joining the FTC, he co-created the Do Not Track privacy anti-tracking mechanism now adopted by all of the major web browsers.&lt;/p&gt;
&lt;p&gt;He is a TEDGlobal 2012 Fellow, was an Open Society Foundations Fellow between the years, 2011-2012, and was a Student Fellow at the Berkman Center for Internet &amp;amp; Society, Harvard University between 2008 and 2009.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance'&gt;https://cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Lecture</dc:subject>
    
    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-08-26T11:03:19Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/fostering-freedom-of-expression">
    <title>Role of the Internet in Fostering Freedom of Expression and Strengthening Activism in India - A Workshop in Delhi</title>
    <link>https://cis-india.org/events/fostering-freedom-of-expression</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (India) and the Central American Institute for Studies of Social Democracy DEMOS (Guatemala) have the pleasure to invite you to a day-long workshop on the role of the Internet in fostering freedom of expression and strengthening activism in India. The workshop will take place in the Constitution Club in Delhi on 4 March 2011.&lt;/b&gt;
        
&lt;p&gt;With the significant role reported for new technologies in recent revolutions in Tunesia, Egypt, and elsewhere, activists in India, too, have taken a renewed interest in the potential of the Internet to support their struggles for social change and social justice. But what are some of the potential stumble blocks activists in India might run into in their exploration of the Internet's potential? What are the legal restrictions and frameworks activists should be aware of when they use new technologies in their work? And what can we do to create an environment in which the online world unequivocally supports efforts for greater democratisation and social justice offline, rather than thwart them?&lt;/p&gt;
&lt;p&gt;It is questions such as these that this workshop seeks to answer, through a mix of panel discussions, unconference sessions, a film screening, and technical and legal clinics in its day-long&amp;nbsp;program.&lt;/p&gt;
&lt;p&gt;Our hope is that the workshop will help participants as well as organisers to get a stronger sense of the potential and challenges of online activism in the particular context of India, as&amp;nbsp;well as to start building stronger networks among the activists interested in these issues in the country.&lt;/p&gt;
&lt;p&gt;Participation in the workshop is free. However, we would be grateful if you could confirm your attendance by emailing Anja Kovacs at "anja at cisindia dot org", ideally by 2 March.&lt;/p&gt;
&lt;p&gt;We hope you will join us to contribute your own insights and experiences as well as to learn from others about this important new arena of activists' work.&lt;/p&gt;
&lt;p&gt;Looking forward to welcoming you at the workshop!&lt;/p&gt;
&lt;h2&gt;The Agenda&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;9.30-9.45: &amp;nbsp; &amp;nbsp;Welcome and introductions&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;9.45-10.15: &amp;nbsp;&amp;nbsp;Introduction to the Internet and freedom of expression&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;By Frank La Rue, President of the Central American Institute for Studies of Social Democracy &lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;and UN Special Rapporteur for Freedom of Expression and Opinion&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;10.15-10.45: Film screening: “Brave New Medium”&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;By Delhi-based docu film maker Subasri Krishnan&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;The film addresses Internet and censorship in South-East Asia &lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;while raising &amp;nbsp;pertinent questions about the implications of this lessons for Indian activists, &lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;and will be screened in the presence of the filmmaker.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;10.45-11.30:&amp;nbsp;Unconference: Online challenges and ways forward for Indian activists: &lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;where are we today and what to do next?&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Small group discussion sessions, as per the priorities of the participants&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;11.30-11.50: Tea/Coffee Break&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;11.50-12.40:&amp;nbsp;Reporting back and plenary discussion: Challenges for freedom of expression on &lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;the Internet in&amp;nbsp;India and abroad: legal framework, ground realities, alternative visions&amp;nbsp;&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;With national and international activists, lawyers and researchers as additional resource persons&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;12.40-13.00:&amp;nbsp;Consultation: Can a global “Internet Bill of Rights” help?&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;With Lisa Horner, Dynamic Coalition on Internet Rights and Principles of the UN Internet&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Governance Forum&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;13.00 - 14.00:&amp;nbsp;Lunch Break (lunch will be provided)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;14.00 - 15.30:&amp;nbsp;Parallel sessions:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;legal clinic with a representative from Google and human rights lawyers – to answer any&amp;nbsp;legal question regarding freedom of expression online you may have&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;technical clinic with a representative from Tactical Tech – to explore the significance of terms like&lt;br /&gt;“Tor” and “proxy” and ways in which you can stay safe and secure online at all times.&amp;nbsp;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;If you have a laptop, bring it if you intend to attend this session!&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;15.30 - 16.15: Strategies for the way forward&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Moderated by Mr Frank La Rue&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;16.15-16.30 &amp;nbsp;:&amp;nbsp;Closing remarks&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;16.30 - 17.00: Tea/Coffee&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Followed by a public lecture by &lt;strong&gt;Mr. Frank La Rue&lt;/strong&gt; at 6 pm, at the same venue, on &lt;strong&gt;Global Challenges to Freedom of Expression&lt;/strong&gt;. Entrance free. All welcome.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;h2&gt;Information about the Organisers&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;The Centre for Internet and Society&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society is located in Bangalore, India. It critically engages with concerns of digital pluralism and public accountability in the field of Internet and Society,&amp;nbsp;with particular emphasis on South-South dialogues and exchange. Through multidisciplinary research, intervention, and collaboration, it seeks to explore, understand, and affect the shape&amp;nbsp;and form of the internet, and its relationship with the political, cultural, and social milieu of our times.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;DEMOS Institute&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Demos Institute, based in Guatemala, is a research centre that promotes democratic alternatives for Guatemala, under the human rights framework. Within DEMOS, there is a&amp;nbsp;research team which supports the mandate of Frank La Rue, United Nations Special Rapporteur on Freedom of Opinion and Expression, in the making of his annual reports before&amp;nbsp;the United Nations Human Rights Council.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/fostering-freedom-of-expression'&gt;https://cis-india.org/events/fostering-freedom-of-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T07:18:10Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/role-of-intermediaries-in-counting-online-abuse">
    <title>Role of Intermediaries in Countering Online Abuse</title>
    <link>https://cis-india.org/internet-governance/blog/role-of-intermediaries-in-counting-online-abuse</link>
    <description>
        &lt;b&gt;The Internet can be a hostile space and protecting users from abuse without curtailing freedom of expression requires a balancing act on the part of online intermediaries.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This got published as two blog entries in the NALSAR Law Tech Blog. Part 1 can be accessed &lt;a class="external-link" href="https://techlawforum.wordpress.com/2015/06/30/role-of-intermediaries-in-countering-online-abuse-still-a-work-in-progress-part-i/"&gt;here&lt;/a&gt; and Part 2 &lt;a class="external-link" href="https://techlawforum.wordpress.com/2015/06/30/role-of-intermediaries-in-countering-online-abuse-still-a-work-in-progress-part-ii/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;As platforms and services coalesce around user-generated content (UGC) and entrench themselves in the digital publishing universe, they are increasingly taking on the duties and responsibilities of protecting  rights including taking reasonable measures to restrict unlawful speech. Arguments around the role of intermediaries tackling unlawful content usually center around the issue of regulation—when is it feasible to regulate speech and how best should this regulation be enforced?&lt;/p&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Recently, Twitter found itself at the periphery of such questions when an anonymous user of the platform, @LutyensInsider, began posting slanderous and sexually explicit comments about Swati Chaturvedi, a Delhi-based journalist. The online spat which began in February last year,  culminated into&lt;a href="http://www.dailyo.in/politics/twitter-trolls-swati-chaturvedi-lutyensinsider-presstitutes-bazaru-media-delhi-police/story/1/4300.html"&gt; Swati filing an FIR&lt;/a&gt; against the anonymous user, last week. Within hours of the FIR, the anonymous user deleted the tweets and went silent. Predictably, Twitter users &lt;a href="https://twitter.com/bainjal/status/609343547796426752"&gt;hailed this&lt;/a&gt; as a much needed deterrence to online harassment. Swati’s personal victory is worth celebrating, it is an encouragement for the many women bullied daily on the Internet, where harassment is rampant. However, while Swati might be well within her legal rights to counter slander, the rights and liabilities of private companies in such circumstances are often not as clear cut.&lt;/p&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Should platforms like Twitter take on the mantle of deciding what speech is permissible or not? When and how should the limits on speech be drawn? Does this amount to private censorship?The answers are not easy and as the recent Grand Chamber of the European Court of Human Rights (ECtHR)&lt;a href="http://hudoc.echr.coe.int/sites/eng/pages/search.aspx?i=001-126635"&gt; &lt;/a&gt;&lt;a href="http://hudoc.echr.coe.int/sites/eng/pages/search.aspx?i=001-126635"&gt;judgment in the case of&lt;/a&gt; Delfi AS v. Estonia confirms, the role of UGC platforms in balancing the user rights, is an issue far from being settled. In its ruling, the  ECtHR reasoned that because of their role in facilitating expression, online platforms have a requirement “&lt;i&gt;to take effective measures to limit the dissemination of hate speech and speech inciting violence was not ‘private censorship”.&lt;/i&gt;&lt;/p&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;This is problematic because the decision moves the regime away from a framework that grants immunity from liability, as long as platforms meet certain criteria and procedures. In &lt;a href="http://www.jipitec.eu/issues/jipitec-5-3-2014/4091"&gt;other words&lt;/a&gt; the ruling establishes strict liability for intermediaries in relation to manifestly illegal content, even if they may have no knowledge. The 'obligation' placed on the intermediary does not grant them safe harbour and is not proportionate to the monitoring and blocking capacity thus necessitated. Consequently,  platforms might be incentivized to err on the side of caution and restrict comments or confine speech resulting in censorship. The ruling is especially worrying, as the standard of care placed on the intermediary does not recognize the different role played by intermediaries in detection and removal of unlawful content. Further, intermediary liability is its own legal regime and is at the same time, a subset of various legal issues that need an understanding of variation in scenarios, mediums and technology both globally and in India.&lt;/p&gt;
&lt;h3 class="Standard"&gt;Law and Short of IT&lt;/h3&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Earlier this year, in a&lt;a href="http://www.theverge.com/2015/2/4/7982099/twitter-ceo-sent-memo-taking-personal-responsibility-for-the"&gt; leaked memo&lt;/a&gt;, the Twitter CEO Dick Costolo took personal responsibility for his platform's chronic problem and failure to deal with harassment and abuse. In Swati's case, Twitter did not intervene or take steps to address  harrassment. If it had to, Twitter (India),  as all online intermediaries would be bound by the provisions established under Section 79 and accompanying Rules of the Information Technology Act. These legislations outline the obligations and conditions that intermediaries must fulfill to claim immunity from liability for third party content. Under the regime, upon receiving actual knowledge of unlawful information on their platform, the intermediary must comply with the notice and takedown (NTD) procedure for blocking and removal of content.&lt;/p&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Private complainants could invoke the NTD procedure forcing intermediaries to act as adjudicators of an unlawful act—a role they are clearly ill-equipped to perform, especially when the content relates to political speech or alleged defamation or obscenity. The SC judgment in Shreya Singhal addressing this issue, read down the provision (Section 79 by holding that a takedown notice can only be effected if the complainant secures a court order to support her allegation. Further, it was held that the scope of restrictions under the mechanism is restricted to the specific categories identified under Article 19(2). Effectively, this means Twitter need not take down content in the absence of a court order.&lt;/p&gt;
&lt;h3 class="Standard"&gt;Content Policy as Due Diligence&lt;/h3&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Another provision, Rule 3(2) prescribes a content policy which, prior to the Shreya Singhal judgment was a criteria for administering takedown. This content policy includes an exhaustive list of types of restricted expressions, though worryingly, the terms included in it are  not clearly defined and go beyond the reasonable restrictions envisioned under Article 19(2). Terms such as “grossly harmful”, “objectionable”, “harassing”, “disparaging” and “hateful” are not defined anywhere in the Rules, are subjective and contestable as alternate interpretation and standard could be offered for the same term. Further, this content policy is not applicable to content created by the intermediary.&lt;/p&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Prior to the SC verdict in Shreya Singhal, &lt;a href="http://cis-india.org/internet-governance/blog/sc-judgment-in-shreya-singhal-what-it-means-for-intermediary-liability"&gt;actual knowledge could have been interpreted&lt;/a&gt; to mean the intermediary is called upon its own judgement under sub-rule (4) to restrict impugned content in order to seek exemption from liability. While liability accrued from not complying with takedown requests under the content policy was clear, this is not the case anymore. By reading down of S. 79 (3) (b) the court has addressed the issue of intermediaries complying with places limits on the private censorship of intermediaries and the invisible censorship of opaque government takedown requests as they must and should adhere, to the boundaries set by Article 19(2). Following the SC judgment intermediaries do not have to administer takedowns without a court order thereby rendering this content policy redundant. As it stands, the content policy is an obligation that intermediaries must fulfill in order to be exempted from liability for UGC and this due diligence is limited to publishing rules and regulations, terms and conditions or user agreement informing users of the restrictions on content. The penalties for not publishing this content policy should be clarified.&lt;/p&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Further, having been informed of what is permissible users are agreeing to comply with the policy outlined, by signing up to and using these platforms and services. The requirement of publishing content policy as due diligence is unnecessary given that mandating such ‘standard’ terms of use negates the difference between different types of intermediaries which accrue different kinds of liability. This also places an extraordinary power of censorship in the hands of the intermediary, which could easily stifle freedom of speech online. Such heavy handed regulation could make it impossible to publish critical views about anything without the risk of being summarily censored.&lt;/p&gt;
&lt;p class="Standard"&gt;Twitter may have complied with its duties by publishing the content policy, though the obligation does not seem to be an effective deterrence. Strong safe harbour provisions for intermediaries are a crucial element in the promotion and protection of the right to freedom of expression online. By absolving platforms of responsibility for UGC as long as they publish a content policy that is vague and subjective is the very reason why India’s IT Rules are in fact, in urgent need of improvement.&lt;/p&gt;
&lt;h3 class="Standard"&gt;Size Matters&lt;/h3&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;The standards for blocking, reporting and responding to abuse vary across different categories of platforms. For example, it may be easier to counter trolls and abuse on blogs or forums where the owner or an administrator is monitoring comments and UGC. Usually platforms outline monitoring and reporting policies and procedures including recourse available to victims and action to be taken against violators. However, these measures are not always effective in curbing abuse as it is possible for users to create new accounts under different usernames. For example, in Swati’s case the anonymous user behind @LutyensInsider account changed&lt;a href="http://www.hindustantimes.com/newdelhi/twitter-troll-lutyensinsider-changes-handle-after-delhi-journo-files-fir/article1-1357281.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/newdelhi/twitter-troll-lutyensinsider-changes-handle-after-delhi-journo-files-fir/article1-1357281.aspx"&gt;their handle&lt;/a&gt; to @gregoryzackim and @gzackim before deleting all tweets. In this case, perhaps the fear of criminal charges ahead was enough to silence the anonymous user, which may not always be the case.&lt;/p&gt;
&lt;h3 class="Standard"&gt;Tackling the Trolls&lt;/h3&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Most large intermediaries have privacy settings which restrict the audience for user posts as well as prevent strangers from contacting them as a general measure against online harassment. Platforms also publish&lt;a href="http://www.slate.com/articles/technology/bitwise/2015/04/twitter_s_new_abuse_policy_if_it_can_t_stop_it_hide_it.html"&gt; &lt;/a&gt;&lt;a href="http://www.slate.com/articles/technology/bitwise/2015/04/twitter_s_new_abuse_policy_if_it_can_t_stop_it_hide_it.html"&gt;monitoring policy&lt;/a&gt; outlining the procedure and mechanisms for users to&lt;a href="http://www.slate.com/articles/technology/users/2015/04/twitter_s_new_harassment_policy_not_transparent_not_engaged_with_users.html"&gt; &lt;/a&gt;&lt;a href="http://www.slate.com/articles/technology/users/2015/04/twitter_s_new_harassment_policy_not_transparent_not_engaged_with_users.html"&gt;register their complaint&lt;/a&gt; or&lt;a href="https://blog.twitter.com/2015/update-on-user-safety-features"&gt; &lt;/a&gt;&lt;a href="https://blog.twitter.com/2015/update-on-user-safety-features"&gt;report abuse&lt;/a&gt;. Often reporting and blocking mechanisms&lt;a href="https://blog.twitter.com/2015/update-on-user-safety-features"&gt; &lt;/a&gt;&lt;a href="https://blog.twitter.com/2015/update-on-user-safety-features"&gt;rely on community standards&lt;/a&gt; and users reporting unlawful content. Last week Twitter&lt;a href="https://twittercommunity.com/t/removing-the-140-character-limit-from-direct-messages/41348"&gt; &lt;/a&gt;&lt;a href="https://twittercommunity.com/t/removing-the-140-character-limit-from-direct-messages/41348"&gt;announced a new feature&lt;/a&gt; allowing lists of blocked users to be shared between users. An improvement on existing mechanism for blocking, the feature is aimed at making the service safer for people facing similar issues and while an improvement on standard policies defining permissible limits on content, such efforts may have their limitations.&lt;/p&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;The mechanisms follow a one-size-fits-all policy. First, such community driven efforts do not address concerns of differences in opinion and subjectivity. Swati in defending her actions stressed the “&lt;i&gt;coarse discourse”&lt;/i&gt; prevalent on social media, though as&lt;a href="http://www.opindia.com/2015/06/foul-mouthed-twitter-user-files-fir-against-loud-mouthed-slanderer/"&gt; &lt;/a&gt;&lt;a href="http://www.opindia.com/2015/06/foul-mouthed-twitter-user-files-fir-against-loud-mouthed-slanderer/"&gt;this article points out&lt;/a&gt; she might be assumed guilty of using offensive and abusive language. Subjectivity and many interpretations of the same opinion can pave the way for many taking offense online. Earlier this month, Nikhil Wagle’s tweets criticising Prime Minister Narendra Modi as a “pervert” was interpreted as “abusive”, “offensive” and “spreading religious disharmony”. While platforms are within their rights to establish policies for dealing with issues faced by users, there is a real danger of them doing so for&lt;a href="http://www.slate.com/articles/technology/users/2015/05/chuck_c_johnson_suspended_from_twitter_why.2.html"&gt; &lt;/a&gt;&lt;a href="http://www.slate.com/articles/technology/users/2015/05/chuck_c_johnson_suspended_from_twitter_why.2.html"&gt;“&lt;/a&gt;&lt;a href="http://www.slate.com/articles/technology/users/2015/05/chuck_c_johnson_suspended_from_twitter_why.2.html"&gt;political reasons” and based on “popularity” measures&lt;/a&gt; which may chill free speech. When many get behind a particular interpretation of an opinion, lawful speech may also be stifled as Sreemoyee Kundu &lt;a href="http://www.dailyo.in/user/124/sreemoyeekundu"&gt;found out&lt;/a&gt;. A victim of online abuse her account was blocked by Facebook owing to multiple reports from a “&lt;i&gt;faceless fanatical mob”. &lt;/i&gt;Allowing the users to set standards of permissible speech is an improvement, though it runs the risk of mob justice and platforms need to be vigilant in applying such standards.&lt;/p&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;While it may be in the interest of platforms to keep a hands off approach to community policies, certain kind of content may necessiate intervention by the intermediary. There has been an increase in private companies modifying their content policy to place reasonable restriction on certain hateful behaviour in order to protect vulnerable or marginalised voices. &lt;a href="http://www.theguardian.com/technology/2015/mar/12/twitter-bans-revenge-porn-in-user-policy-sharpening"&gt;Twitter&lt;/a&gt; and &lt;a href="http://www.redditblog.com/2015/05/promote-ideas-protect-people.html"&gt;Reddit's&lt;/a&gt; policy change in addressing revenge porn are reflective of a growing understanding amongst stakeholders that in order to promote free expression of ideas, recognition and protection of certain rights on the Internet may be necessary. However, any approach to regulate user content must assess the effect of policy decisions on user rights. Google's &lt;a href="http://www.theguardian.com/technology/2015/jun/22/revenge-porn-women-free-speech-abuse"&gt;stand on tackling revenge porn&lt;/a&gt; may be laudable, though the &lt;a href="https://www.techdirt.com/articles/20141109/06211929087/googles-efforts-to-push-down-piracy-sites-may-lead-more-people-to-malware.shtml"&gt;decision to push down&lt;/a&gt; 'piracy' sites in its search results could be seen to adversely impact the choice that users have. Terms of service implemented with subjectivity and lack of transparency can and does lead to private censorship.&lt;/p&gt;
&lt;h3 class="Standard"&gt;The Way Forward&lt;/h3&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Harassment is damaging, because of the feeling of powerlessness that it invokes in the victims and online intermediaries represent new forms of power through which users' negotiate and manage their online identity. Content restriction policies and practices must address this power imbalance by adopting baseline safeguards and best practices. It is only fair that based on principles of equality and justice, intermediaries be held responsible for the damage caused to users due to wrongdoings of other users or when they fail to carry out their operations and services as prescribed by the law. However, in its present state, the intermediary liability regime in India is not sufficient to deal with online harassment and needs to evolve into a more nuanced form of governance.&lt;/p&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Any liability framework must evolve bearing in mind the slippery slope of overbroad regulation and differing standards of community responsibility. Therefore, a balanced framework would need to include elements of both targeted regulation and soft forms of governance as liability regimes need to balance fundamental human rights and the interests of private companies. Often, achieving this balance is problematic given that these companies are expected to be adjudicators and may also be the target of the breach of rights, as is the case in Delfi v Estonia. Global frameworks such as the Manila Principles can be a way forward in developing effective mechanisms. The determination of content restriction practices should  always adopt the least restrictive means of doing so, distinguishing between the classes of intermediary. They must evolve considering the proportionality of the harm, the nature of the content and the impact on affected users including the proximity of affected party to content uploader.&lt;/p&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Further, intermediaries and governments should communicate a clear mechanism for review and appeal of restriction decisions. Content restriction policies should incorporate an effective right to be heard. In exceptional circumstances when this is not possible, a post facto review of the restricton order and its implementation must take place as soon as practicable. Further, unlawful content restricted for a limited duration or within a specific geography, must not extend beyond these limits and a periodic review should take place to ensure the validity of the restriction. Regular, systematic review of rules and guidelines guiding intermediary liability will go a long way in ensuring that such frameworks are not overly burdensome and remain effective.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/role-of-intermediaries-in-counting-online-abuse'&gt;https://cis-india.org/internet-governance/blog/role-of-intermediaries-in-counting-online-abuse&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Online Harassment</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Online Abuse</dc:subject>
    

   <dc:date>2015-08-02T16:38:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/gulf-times-february-24-2019-dr-r-seetharaman-risk-integration-is-key-to-better-cybersecurity-management">
    <title>Risk integration is key to better cybersecurity management</title>
    <link>https://cis-india.org/internet-governance/news/gulf-times-february-24-2019-dr-r-seetharaman-risk-integration-is-key-to-better-cybersecurity-management</link>
    <description>
        &lt;b&gt;Digital connectivity plays an anchor role in unlocking innovation and prosperity around the world, but increasing cyber threat is a roadblock to collective path of progress.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Dr. R. Seetharaman was &lt;a class="external-link" href="https://www.gulf-times.com/story/623073/Risk-integration-is-key-to-better-cybersecurity-ma"&gt;published in the Gulf Times&lt;/a&gt; on February 24, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The fourth industrial revolution, which combines advanced technologies  in innovative ways, is set to dramatically reshape the way people live,  work and relate to one another. As per Cybersecurity Ventures, the  cybercrime will cost the world $6tn annually by 2021, this is up from  $3tn in 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cybercrime costs include damage and destruction of data, stolen money, lost productivity, and theft of intellectual property, theft of personal and financial data, embezzlement, fraud, and post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hacked data and systems, and reputational harm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The work space is undergoing changes, robotics and artificial intelligence are going to play important roles and the customer will be more empowered in the digital environment. Data breaches in 2018 compromised the personal information of millions of people around the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The latest victims were Marriott hotels, which recently revealed that hackers had accessed the information of an estimated 500mn customers. Payment card information and personal data such as billing addresses, phone numbers and e-mails of British Airways were hacked. For Cathay Pacific, passenger data was accessed without authorisation. Centre for Internet and Society (CIS) also pointed out that about 130mn Aadhar numbers along with other sensitive data were available on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The reason for the data leak was narrowed down to four government-run schemes ranging from National Social Assistance Programme by the Ministry of Rural Development, the National Rural Employment Guarantee Act (NREGA), also by the Ministry of Rural Development, Daily Online Payment Reports under NREGA by the government of Andhra Pradesh and the Chandranna Bima Scheme, also by the government of Andhra Pradesh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The public and private partnership model should be adopted to face the challenges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This can be done by establishing areas of common interest, supporting capacity building and resource pooling and developing benchmarks for resilience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are various reasons for cyber-attacks/data breach incidents – few of them are as follows. In effective vulnerability management, lack of security monitoring, human errors – accidental publishing, hacking, targeted attack, business e-mail compromise, phishing and social engineering attacks, inadequate encryption, on-adherence to strong password policy, state sponsored terrorism/attacks and corporate espionage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The various cyber-attacks, which have left significant impact on global organisations. Institutions need to be more collaborative on security issues. Banks need to manage the change by redefining their business models to manage various stake holders such as customers, regulator and shareholders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The involvement of the company’s board is required which should set the tone for enhancing security and determine whether the full board or a committee should have oversight responsibility.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Board of directors are starting to take note, particularly members of the audit committee, who list cyber security among their top concerns. Test effectiveness of existing security devices/ solutions and fine tune. Adopt new technologies such as artificial intelligence and machine learning to identify abnormal behaviour in networks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Maintain IT system hygiene i.e., effective patching, hardening and baseline. Develop blue/red and purple teams to have balanced check on the vulnerability exploitation, effective threat monitoring and countermeasures. Develop cyber crisis management plan and establish breach response plan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Qatar Central Bank has brought IT security strategy and technology risk circulars, which will provide directions for the banks to build their strategy while adopting advanced technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It also took the initiative for formation of Banking CIRT (Critical incident response team), which will act as platform for sharing of security incidents and enable quick response for its members. The State of Qatar has brought cyber-crime prevention laws, data privacy law, monitoring bank websites and alert on probable cyber-attacks in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The GDPR becomes important in the light of all major banks and FIs in Qatar having their branches/offices where they are collecting personal information of EU resident customers and processing/storing such information in Qatar and EU.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Qatar Data Privacy Law speaks about controls over the data in rest/processing/transmission and role &amp;amp; responsibilities of data processor/controller. “Risk integration is key towards cybersecurity management”.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/gulf-times-february-24-2019-dr-r-seetharaman-risk-integration-is-key-to-better-cybersecurity-management'&gt;https://cis-india.org/internet-governance/news/gulf-times-february-24-2019-dr-r-seetharaman-risk-integration-is-key-to-better-cybersecurity-management&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Dr. R. Seetharaman</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-03-03T06:26:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/hindustan-times-january-5-2014-danish-raza-rise-of-the-bot">
    <title>Rise of the bot: all you need to know about the latest threat online</title>
    <link>https://cis-india.org/news/hindustan-times-january-5-2014-danish-raza-rise-of-the-bot</link>
    <description>
        &lt;b&gt;In the last week of December, 2013, former union railway minister Pawan Kumar Bansal lodged a police complaint in Chandigarh after witnessing “an unusual rise in his online fan following”. The former minister told the police that his Facebook page had received more than 10,000 likes, within a span of 24 hours. While his allegation that the ‘likes’ were “fabricated” may be true, information technology experts believe a bot was at work.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Danish Raza was &lt;a class="external-link" href="http://www.hindustantimes.com/technology/socialmedia-updates/rise-of-the-bot-all-you-need-to-know-about-internet-s-latest-threat/article1-1169500.aspx"&gt;published in the Hindustan Times&lt;/a&gt; on January 5, 2014. Snehashish Ghosh is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A bot is a software that mimics human behaviour on the Internet. Bots can be used to create artificial accounts on social media, provide numerous likes on a particular page, send tweets or visit various websites. All this is done without any human involvement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bots already constitute a significant percentage of Non Human Traffic (NHT) online, which has, according to some estimates, eclipsed human traffic. Comscore, a US-based Internet technology company noted on its blog that NHT, also known as Artificial Traffic, increased from approximately 6% of the total web traffic in 2011, to 36% in 2012. Last month, a report from Incapsula, a cloud-based security service, which aids the security and performance of websites, stated that more than 60% of web traffic was non-human in 2013. The figure was based on data collected from the 20,000 sites on Incapsula’s network .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other than bots, NHT on the web includes traffic generated by Internet routers and back end services used by websites to communicate with third parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is not immune to the problem. According to the Symantec Internet Security Threat Report for 2012, there was a 280% increase in bot infections in India between 2011 and 2012. 17% of bot-infected computers, the highest in the world, are in India and 15% of global bot-net spam is generated here. The report also states that 69 Indian cities are prone to bot infections which includes Bhubaneswar, Surat, Cochin, Jaipur, Visakhapatnam, Indore, Kota, Ghaziabad and Mysore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bot spotting&lt;/b&gt;&lt;br /&gt;How do you spot a bot? When a bot or its friend is at work, the browser directs you to sites other than the ones you intend to visit, you get full-page pop ups and pop unders, and when you quit the browser, it gets relaunched after a few minutes. Chances are your computer is part of a chain of online events which create NHT on the web, the purpose of which may be to attack a site or a server.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Why you should be wary&lt;/b&gt;&lt;br /&gt;Malicious traffic, malware, hacking attempts, viruses slow down the Internet and delay legitimate traffic and services. Used to target systems or take down websites, NHT generates fake clicks on advertisements to increase website statistics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the perils of ignoring artificial web traffic is that it gets counted for real impressions for which clients end up paying. For example, a website owner may hire the services of a digital marketing firm to publicise the site. In the guise of increasing page views, the marketing firm can produce a bill for fake impressions, supplementing actual human traffic to the page with bot usage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Unless there is a curb on this practice of malicious NHT, one stands at risk of being duped by marketers, agencies and even clients,” said Chiragh Cherian, director, online PR at Perfect Relations, a brand management firm. Recent studies have estimated bot traffic to be between 4 - 31% of total web traffic in the US, which translates to between $650 million and $4.7 billion in wasted marketing spend. According to Miaozhen Systems, a leading Chinese advertising technology company, NHT caused advertisers in China to lose approximately US$ 1.6 billion between July 2012 and June 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How to combat Non-Human Traffic&lt;/b&gt;&lt;br /&gt;Most servers have defence mechanisms to tackle spam and cyber attacks. Websites are also now developing mechanisms such as asking for human authentication which is difficult for a bot to execute. “But even personal computers should be equipped with strong Internet security applications such as anti-virus and anti-spyware to prevent hacking and phishing attempts and to prevent being used as slave machines for distributed cyber attacks,” said Chintu Cherian Abraham, a digital media professional. Figures show that we need to watch out where and how we go online. According to Norton Report, 2013, 61% Indians access their social network accounts from unsecured wi-fi connections, while 42% access bank accounts and 44% shop online using unsecured wi-fi connections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media companies are gradually devising mechanisms to filter bots. “When a page and a fan connect on Facebook, we want to ensure that connection involves a real person interested in hearing from a specific page and engaging with that brand’s content. As such, we have recently increased our automated efforts to remove Likes on Pages that may have been gained by means that violate our terms,” mentions Facebook’s site integrity policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Agency-client intervention is necessary to ensure that artificial traffic is not presented as real. “It’s also important to make all agencies, advertisers and clients aware of their responsibility to keep the Internet free from malicious NHT,” said Chiragh Cherian.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government involvement is also needed to control the problem of malicious bots. “A lot needs to be done from the government’s side to tackle bots which can be used to target the country’s critical infrastructure such as banking websites,” said Jiten Jain, a cyber security analyst, adding, “Last year, I highlighted the flaws in HDFC’s net banking website which have been rectified now. They could have been exploited to block the net-banking service.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Until we have a robust mechanism to filter out bogus traffic from real, it will be difficult to say whether the social media followers of Bansal and other public figures are human or not.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/FactFile.png" alt="Fact File" class="image-inline" title="Fact File" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Know your Bots&lt;/b&gt;&lt;br /&gt;Not all bots are used with a negative intent. Some help in research and monitoring.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Malicious&lt;/b&gt;&lt;br /&gt;Bots can be effectively used to impersonate and to hack accounts leading to financial losses and intellectual property theft. “Theft of personal details, username and password to operate one’s bank account is a classic example of how bots can lead to financial losses. It is an organised cyber crime,” explained Commander (Retd) Mukesh Saini, former national information security coordinator, Government of India. In May 2013, cyber criminals broke into the Mumbai-based account of the RPG group and siphoned off `2.4 crore. Three people were arrested in the case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The rate at which NHT is increasing is alarming,” says Tinu 	Cherian Abraham. “Any computer connected to the Internet is 	vulnerable to such attacks. The user will not get to know about it 	unless he or she has installed an Internet security application.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides bots, computers also generate other kinds of secondary 	activities, while the user is surfing the Internet. This activity 	remains in the background and is never seen by the user, unlike the 	bot-generated pop ups, observes Comscore. For example, your computer 	might be being used as a channel to reach a server with the 	intention of hacking it. And you will never know.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Good&lt;/b&gt;&lt;br /&gt;Not all NHT is bad, though. In fact, 	good bots such as scrapers can be effectively used to conduct 	research. “Wikipedia can be scraped to investigate the frequency 	of edits on a Wikipedia page and track the increase in the number of 	editors,” explained Snehashish Ghosh, policy associate at the 	Bangalore-based Centre for Internet &amp;amp; Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Good bots are also used by search engines to track content on 	websites and enhance their search results. Search bots and other 	good bots formed 31% of total bots, the Incapsula report noted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Social&lt;/b&gt;&lt;br /&gt;Apart from malicious and good 	bots, there are social media bots too. “Extensive analysis is done 	on social media traffic for monitoring, business lead generation, as 	well as reputation management. This has amounted to a lot of 	automated or non-human traffic,” said Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Facebook’s filings published in a Forbes report in 	February 2012, around 83 million of its users are bogus. “It’s a 	violation of our policies to use a fake name or operate under a 	false identity, and we encourage people to report any user they 	suspect of doing this, either through the report links we provide on 	the site or through the contact forms in our help centre,” a 	Facebook spokesperson told HT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twitter bots have also made its presence felt on the platform. 	“Twitter has witnessed very interesting bots which have found 	appreciation from the community for being funny and creative. The 	microblogging site cracked down on some harmful bots, but still some 	of the advanced level bots slip through the net,” said Ghosh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In August 2012, London-based firm Digital Evaluators, which 	evaluates social media presence of worldwide companies, released an 	analysis of Twitter followers of the US Presidential Election 	candidates Barack Obama and Mitt Romney. 21.9% of Barack Obama’s 	17.82 million Twitter followers were found to be bogus.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Big Brother&lt;/b&gt;&lt;br /&gt;Ghosh said that the increase 	in NHT related to the Internet of things, the concept which enables 	communication between two or more devices, results in privacy 	issues. “Take a situation where your mobile device is constantly 	tracking your location for the purpose of switching on the air 	conditioner at your home before you reach. Such applications produce 	huge amounts of personal data and there is no clarity whether this 	data is being stored,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“As the new networks link data from products, company assets, 	or the operating environment, they will generate better information 	and analysis, which can enhance decision making significantly. Some 	organisations are starting to deploy these applications in targeted 	areas, while more radical and demanding uses are still in the 	conceptual or experimental stages,” noted a McKinsey &amp;amp; Company 	report on Internet of things.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hindustan-times-january-5-2014-danish-raza-rise-of-the-bot'&gt;https://cis-india.org/news/hindustan-times-january-5-2014-danish-raza-rise-of-the-bot&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-01-31T07:16:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/news/rightscon-toronto-2018">
    <title>RightsCon Toronto 2018</title>
    <link>https://cis-india.org/a2k/news/rightscon-toronto-2018</link>
    <description>
        &lt;b&gt;RightsCon is organizing the 2018 edition of the event at Beanfield Centre at Exhibition Place, Toronto in Canada. A session on Pervasive Technologies project titled "Cheap and chipper: IP in India’s affordable smartphones" is scheduled on May 17, 5.15 p.m. to 6.15 p.m. in the International Trade and the Commons track. (Room #203B, Beanfield Centre).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;We present the findings of the Centre for Internet and Society’s "Pervasive Technologies" research project that concluded last year. The project was an endeavour to study how Internet-enabled mobile phones sold for USD 100 or less interact with India's intellectual property laws. These low-cost technologies that lie in a grey zone of IP laws have been instrumental in bringing access to the Internet and, in turn, access to knowledge and information to people. The project undertook a study of the mobile device landscape in India while developing legal strategies to ensure that consumers continue to have access to inexpensive devices; that manufacturers, software developers and content creators operating in the budget device segment are not snuffed out by litigation; and that the rights of IP holders are not infringed upon. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Each researcher will elucidate on her findings in the areas of patents and copyright pertaining to the hardware, software and media content and the interaction of these findings with public policy.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Maggie Huang, Amba Kak, Rohini Lakshané, Vidushi Marda and Anubha Sinha are among the speakers at the event. For more info &lt;a class="external-link" href="https://rightscon2018.sched.com/event/EHmz/cheap-and-chipper-ip-in-indias-affordable-smartphones"&gt;click here&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Amber               Sinha remotely participated in a private meeting on               'Strategizing Civil Society Roles in the Artificial               Intelligence Debate'. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Anubha               Sinha, Maggie Huang, Rohini Lakshané and Vidushi Marda               presented their findings from the Pervasive Technologies               project in a panel titled "Cheap and Chipper: IP in               India's Affordable Smartphones". Prof Michael Geist               moderated the session. Anubha Sinha and Vidushi Marda               participated remotely.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Elonnai               Hickok participated in these sessions: IDRC cyber policy               meeting; GNI board meeting; GNI learning session on MLATs;               FOC-AN meeting; GNI session on Intermediary Liability.&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/news/rightscon-toronto-2018'&gt;https://cis-india.org/a2k/news/rightscon-toronto-2018&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2018-06-07T14:31:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/rightscon-silicon-valley-2016">
    <title>RightsCon Silicon Valley 2016</title>
    <link>https://cis-india.org/internet-governance/news/rightscon-silicon-valley-2016</link>
    <description>
        &lt;b&gt;RightsCon is the world’s leading event convened around the issues of the internet and human rights. The annual conference convenes business leaders, visionaries, technologists, legal experts, civil society members, activists, and government representatives from across the globe on issues at the intersection of tech and human rights.  The event was organized by RightsCon.&lt;/b&gt;
        &lt;h2&gt;Program&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This year, we had three days of&lt;a href="http://rightscon.sched.org/"&gt;&lt;span style="text-decoration: underline;"&gt;programming&lt;/span&gt;&lt;/a&gt;plus  a day of satellite events (Day Zero satellite events + three full days  of main programming), tackling some of today’s most challenging business  and policy issues: freedom of expression, online harassment and  countering violent extremism, privacy and digital security, encryption,  network discrimination and connectivity, human rights, trade and  business, transparency reporting, digital inclusion, internet  governance, and much more. &lt;a href="http://rightscon.sched.org/"&gt;&lt;span style="text-decoration: underline;"&gt;Click here&lt;/span&gt;&lt;/a&gt; to see our program schedule.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With 250+ sessions and over 1,000 registered participants, RightsCon 2016 provided unparalleled opportunities to engage with leading speakers and organizations, both in sessions and through private meetings and discussions. It was also home to an array of parties, movie screenings, and social events throughout the week to help participants meet others in the space.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Elonnai Hickok participated in the following panels and meetings at RightsCon held at Mission Bay Conference Center in San Francisco, California from March 30 to April 1, 2016:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Beyond CSR: Promoting Strong Human Rights Performance - Centre for Law and Democracy &lt;br /&gt;2. Ranking ICT Companies on Digital Rights; A How to Guide - Ranking Digital Rights &lt;br /&gt;3. Who is an Intermediary? Harmonizing Definitions? - CIS &lt;br /&gt;4. Manila Principles: One Year Later - CIS and EFF &lt;br /&gt;5. Cross Border Data Requests - American University Washington College of Law, University of Kentucky College of Law. &lt;br /&gt;6. Closed door meeting for Ranking Digital Rights &lt;br /&gt;7. GNI meeting on Mutual Legal Assistance&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="https://www.rightscon.org/event-info/"&gt;More info on the RightsCon website&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/rightscon-silicon-valley-2016'&gt;https://cis-india.org/internet-governance/news/rightscon-silicon-valley-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-04-06T15:10:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/rights-con-2014">
    <title>RightsCon 2014</title>
    <link>https://cis-india.org/news/rights-con-2014</link>
    <description>
        &lt;b&gt;RightsCon Silicon Valley 2014 was an incredible mixture of more than 700 attendees from more than 65 countries and 375 institutions. Pranesh Prakash and Malavika Jayaram were speakers at this event organized by RightsCon at San Francisco on March 3 and 4, 2014.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This incredible union of expertise has led to real outcomes, many of which are viewable &lt;a href="https://www.rightscon.org/outcomes.php"&gt;here&lt;/a&gt; or as a PDF report &lt;a href="https://www.rightscon.org/_files/Rightscon%202014%20Outcome%20Report.pdf"&gt;here&lt;/a&gt;. Missed a session? A special thanks to all our &lt;a href="https://www.rightscon.org/speakers.php"&gt;speakers&lt;/a&gt; and &lt;a href="https://www.rightscon.org/sponsors.php"&gt;sponsors&lt;/a&gt; who made 2014 so smart and productive.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Missed a session in San Francisco? Many of the videos are &lt;a class="redHyperlink" href="https://www.rightscon.org/highlights.php"&gt;available for viewing&lt;/a&gt;. To learn more about past RightsCon conferences, head &lt;a class="redHyperlink" href="https://www.rightscon.org/rightscon2014.php"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even as we continue to work diligently on the the work generated from  RightsCon Silicon Valley 2014, we are looking ahead to 2015 and  Southeast Asia, where we will convene civil society and key  decision-makers in this rapidly evolving region. Click  &lt;a class="redHyperlink" href="https://www.rightscon.org/southeastasia.php"&gt;here&lt;/a&gt; to learn more about the planning for  &lt;a class="redHyperlink" href="https://www.rightscon.org/southeastasia.php"&gt;RCSEA2015&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh was invited to be on five panels, and spoke in three.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He spoke in the following sessions:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;March 3 from 14:00-15:15 - Nicolas Seidler's panel on "Localizing the  Global Internet: Data Centers, Traffic Rerouting, and the Implications  of Post-Surveillance Policy Proposals" &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;March 4 from 12:00-13:15 - Paul &amp;amp; Bertrand's panel on "Internet and  Jurisdiction: How Can Heterogenous Laws Coexist in Cross-Border Online  Spaces?" &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;March 4 from 14:30-15:45 - Amie Stepanovich's panel on "The NSA Strikes  Back: Who Really Won the Crypto Wars?" &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;He was also invited to the following panels:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;"Toward Accountability: Reflecting on ICT Industry Action To Protect User Rights"&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;"Policy Laundering: Hacking the International Innovation Policy Machine" &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For more info on the conference, &lt;a class="external-link" href="https://www.rightscon.org/index.php"&gt;click here&lt;/a&gt;. For the full list of speakers, &lt;a class="external-link" href="https://www.rightscon.org/speakers.php#completeSpeakerList"&gt;see here&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/XtwtNvuOUCI" width="400"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/rights-con-2014'&gt;https://cis-india.org/news/rights-con-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-08T05:04:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/right-to-privacy-in-peril">
    <title>Right to Privacy in Peril</title>
    <link>https://cis-india.org/internet-governance/blog/right-to-privacy-in-peril</link>
    <description>
        &lt;b&gt;It seems to have become quite a fad, especially amongst journalists, to use this headline and claim that the right to privacy which we consider so inherent to our being, is under attack. However, when I use this heading in this piece I am not referring to the rampant illegal surveillance being done by the government, or the widely reported recent raids on consenting (unmarried) adults who were staying in hotel rooms in Mumbai. I am talking about the fact that the Supreme Court of India has deemed it fit to refer the question of the very existence of a fundamental right to privacy to a Constitution Bench to finally decide the matter, and define the contours of such right if it does exist.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In an order dated August 11, 2015 the Supreme Court finally gave in to the arguments advanced by the Attorney General and admitted that there is some “unresolved contradiction” regarding the existence of a constitutional “right to privacy” under the Indian Constitution and requested that a Constitutional Bench of appropriate strength.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court was hearing a petition challenging the implementation of the Adhaar Card Scheme of the government, where one of the grounds to challenge the scheme was that it was violative of the right to privacy guaranteed to all citizens under the Constitution of India. However to counter this argument, the State (via the Attorney General) challenged the very concept that the Constitution of India guarantees a right to privacy by relying on an “unresolved contradiction” in judicial pronouncements on the issue, which so far had only been of academic interest. This “unresolved contradiction” arose because in the cases of &lt;b&gt;&lt;i&gt;M.P. Sharma &amp;amp; Others v. Satish Chandra &amp;amp; Others&lt;/i&gt;&lt;/b&gt;,&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; and &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;State of U.P. &amp;amp; Others,&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;b&gt;[2]&lt;/b&gt;&lt;/a&gt; &lt;/b&gt;&lt;/i&gt;(decided by &lt;i&gt;Eight &lt;/i&gt;and &lt;i&gt;Six &lt;/i&gt;Judges respectively) the Supreme Court has categorically denied the existence of a right to privacy under the Indian Constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However somehow the later case of &lt;i&gt;Gobind&lt;/i&gt; v. &lt;i&gt;State of M.P. and another&lt;/i&gt;,&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; (which was decided by a two Judge Bench of the Supreme Court) relied upon the opinion given by the minority of two judges in &lt;i&gt;Kharak Singh&lt;/i&gt; to hold that a right to privacy does exist and is guaranteed as a fundamental right under the Constitution of India.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; Thereafter a large number of cases have held the right to privacy to be a fundamental right, the most important of which are &lt;b&gt;&lt;i&gt;R. Rajagopal &amp;amp; Another &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;State of Tamil Nadu &amp;amp; Others,&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;b&gt;[5]&lt;/b&gt;&lt;/a&gt; &lt;/b&gt;&lt;/i&gt;(popularly known as &lt;i&gt;Auto Shanker’s &lt;/i&gt;case) and &lt;b&gt;&lt;i&gt;People’s Union for Civil Liberties (PUCL) &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;Union of India &amp;amp; Another&lt;/b&gt;&lt;/i&gt;.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; However, as was noticed by the Supreme Court in its August 11 order, all these judgments were decided by two or three Judges only.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The petitioners on the other hand made a number of arguments to counter those made by the Attorney General to the effect that the fundamental right to privacy is well established under Indian law and that there is no need to refer the matter to a Constitutional Bench. These arguments are:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) The observations made in &lt;b&gt;&lt;i&gt;M.P. Sharma &lt;/i&gt;&lt;/b&gt;regarding the absence of right to privacy are not part of the &lt;i&gt;ratio decidendi&lt;/i&gt; of that case and, therefore, do not bind the subsequent smaller Benches such as &lt;b&gt;&lt;i&gt;R. Rajagopal &lt;/i&gt;&lt;/b&gt;and &lt;b&gt;&lt;i&gt;PUCL&lt;/i&gt;&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Even in &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;it was held that the right of a person not to be disturbed at his residence by the State is recognized to be a part of a fundamental right guaranteed under Article 21. It was argued that this is nothing but an aspect of privacy. The observation in para 20 of the majority judgment (quoted in footnote 2 above) at best can be construed only to mean that there is no fundamental right of privacy against the State’s authority to keep surveillance on the activities of a person. However, they argued that such a conclusion cannot be good law any more in view of the express declaration made by a seven-Judge bench decision of this Court in &lt;b&gt;&lt;i&gt;Maneka Gandhi &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;Union of India &amp;amp; Another&lt;/b&gt;&lt;/i&gt;.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Both &lt;b&gt;&lt;i&gt;M.P. Sharma &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;and &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;were decided on an interpretation of the Constitution based on the principles expounded in &lt;b&gt;&lt;i&gt;A.K. Gopalan &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;State of Madras&lt;/b&gt;&lt;/i&gt;,&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; which have themselves been declared wrong by a larger Bench in &lt;b&gt;&lt;i&gt;Rustom Cavasjee Cooper &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;Union of India&lt;/b&gt;&lt;/i&gt;.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other than the points above, it was also argued that world over in all the countries where Anglo-Saxon jurisprudence is followed, ‘privacy’ is recognized as an important aspect of the liberty of human beings. The petitioners also submitted that it was too late in the day for the Union of India to argue that the Constitution of India does not recognize privacy as an aspect of the liberty under Article 21 of the Constitution of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However these arguments of the petitioners were not enough to convince the Supreme Court that there is no doubt regarding the existence and contours of the right to privacy in India. The Court, swayed by the arguments presented by the Attorney General, admitted that questions of far reaching importance for the Constitution were at issue and needed to be decided by a Constitutional Bench.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Giving some insight into its reasoning to refer this issue to a Constitutional Bench, the Court did seem to suggest that its decision to refer the matter to a larger bench was more an exercise in judicial propriety than an action driven by some genuine contradiction in the law. The Court said that if the observations in &lt;b&gt;&lt;i&gt;M.P. Sharma &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;and &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;were accepted as the law of the land, the fundamental rights guaranteed under the Constitution of India would get “denuded of vigour and vitality”. However the Court felt that institutional integrity and judicial discipline require that smaller benches of the Court follow the decisions of larger benches, unless they have very good reasons for not doing so, and since in this case it appears that the same was not done therefore the Court referred the matter to a larger bench to scrutinize the ratio of &lt;b&gt;&lt;i&gt;M.P. Sharma &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;and &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra)&lt;/i&gt; and decide the judicial correctness of subsequent two judge and three judge bench decisions which have asserted or referred to the right to privacy.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; AIR 1954 SC 300. In para 18 of the Judgment it was held: “A power of search and seizure is in any system of jurisprudence an overriding power of the State for the protection of social security and that power is necessarily regulated by law. When the Constitution makers have thought fit not to subject such regulation to constitutional limitations &lt;i&gt;by recognition of a fundamental right to privacy&lt;/i&gt;, analogous to the American Fourth Amendment, &lt;i&gt;we have no justification to import it, into a totally different fundamental right, by some process of strained construction&lt;/i&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; AIR 1963 SC 1295. In para 20 of the judgment it was held: “&lt;b&gt;… &lt;/b&gt;Nor do we consider that Art. 21 has any relevance in the context as was sought to be suggested by learned counsel for the petitioner. As already pointed out, &lt;i&gt;the right of privacy is not a guaranteed right under our Constitution&lt;/i&gt;and therefore the attempt to ascertain the movement of an individual which is merely a manner in which privacy is invaded is not an infringement of a fundamental right guaranteed by Part III.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; (1975) 2 SCC 148.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; It is interesting to note that while the decisions in both &lt;i&gt;Kharak Singh&lt;/i&gt; and &lt;i&gt;Gobind&lt;/i&gt; were given in the context of similar facts (challenging the power of the police to make frequent domiciliary visits both during the day and night at the house of the petitioner) while the majority in &lt;i&gt;Kharak Singh&lt;/i&gt; specifically denied the existence of a fundamental right to privacy, however they held the conduct of the police to be violative of the right to personal liberty guaranteed under Article 21, since the Regulations under which the police actions were undertaken were themselves held invalid. On the other hand, while &lt;i&gt;Gobind&lt;/i&gt; held that a fundamental right to privacy does exist in Indian law, it may be interfered with by the State through procedure established by law and therefore upheld the actions of the police since they were acting under validly issued Regulations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; (1994) 6 SCC 632.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; (1997) 1 SCC 301.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; (1978) 1 SCC 248.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; AIR 1950 SC 27.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; (1970) 1 SCC 248.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/right-to-privacy-in-peril'&gt;https://cis-india.org/internet-governance/blog/right-to-privacy-in-peril&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-08-13T15:32:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-bill-2010">
    <title>Right to Privacy Bill 2010 — A Few Comments</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-bill-2010</link>
    <description>
        &lt;b&gt;Earlier this year, in February 2011, Rajeev Chandrasekhar introduced the Right to Privacy Bill, 2010 in the Rajya Sabha. The Bill is meant to “provide protection to the privacy of persons including those who are in public life”. Though the Bill states that its objective is to protect individuals’ fundamental right to privacy, the focus of the Bill is on the protection against the use of electronic/digital recording devices in public spaces without consent and for the purpose of blackmail or commercial use.&lt;/b&gt;
        
&lt;h2&gt;Specific Recommendations&lt;/h2&gt;
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;The use of electronic recording devices in public is an important and expansive aspect of privacy, which is yet to be directly covered by Indian law. Though the Bill addresses the basic usage of electronic devices with built-in cameras, it frames the violation as a personal violation. In doing so, the Bill has taken a punitive approach, making it criminal to take photographs in situations outside of the laid-out regulations, rather than protective in nature, i.e., working to protect individuals from harassment and blackmail, and offer forms of redress to those damaged.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Bill fails to address scenarios such as Google street view, satellite photographs, news channels, and live feeds at events and conferences. In these situations live data is being transmitted and posted on the Web for public to view by the media. When looking at the dilemma of photographs being taken in public by the media, the privacy interests are different to those that are based on control of personal information alone. They are substantive, as opposed to informational, and engage directly with individual dignity, autonomy, and the freedom of expression. For example, the interest in freedom of expression encompasses both those of the photographers and journalists producing material for his/her journal. Can a journalist print a photograph taken in a public space — of a public figure, which the public figure did not consent to, and which that person considers defamatory?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Interestingly, Europe has strong laws regulating the taking of photographs in public spaces, but these rules are covered by the Protection from Harassment Act, 1997 (UK), which speaks specifically to the media’s behaviour towards public figures — or they fall under a tort of misuse. In the US taking photographs only becomes an issue in the use of the photograph. Essentially anyone can be photographed without consent except when they have secluded themselves in places where they have a reasonable expectation of privacy such as dressing rooms, restrooms, medical facilities, or inside a private residence. This legal standard applies regardless of the age, sex, or other attributes of the individual. Once a photograph is taken, and if that photograph is used for commercial gain without consent or publicizes an otherwise private person inappropriately, then that person can be held liable under the tort of misappropriation.&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Specific Comments to the Bill&lt;/h2&gt;
&lt;h3&gt;Misguiding Title&lt;/h3&gt;
&lt;p&gt;The title of the Bill is, the Personal Data Protection Bill, 2006," but the scope of the Bill is focused on regulating the use of electronic recording devices, and it does not include many aspects of privacy.&amp;nbsp;So we recommend that the title of the Bill be modified to "The Electronic Recording Devices Bill, 2010".&lt;/p&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Inappropriate Blanket Use of Privacy&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;The introduction to the Bill states that its purpose is "for the protection of the right to privacy of persons including those who are in public life so as to protect them from being blackmailed or harassed or their image and reputation being tarnished in order to spoil their public life and for the prevention of misuse of digital technology for such purposes and for matters connected therewith and incidental thereto."&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Comment&lt;/strong&gt;: Notwithstanding the fact that violations of privacy extend beyond blackmail, harassment, and defamation, and that digital technologies are not the only vehicles for privacy violations, it is important to qualify that privacy is not a blanket right, and that for public persons, the privacy that they are afforded is determined by balancing their interest against the public interest.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Narrow Definition of Public Figures&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;Section 2 (b) of the Bill states: "persons in public life" includes the representatives of the people in Parliament, state legislatures, local self government bodies, and office bearers of recognized political parties&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Comment&lt;/strong&gt;: Persons in public life include persons beyond the political sphere, specifically those in higher positions that influence the behaviour, lifestyles, and culture of the general population. Thus, we recommend that this definition be extended to include actors, actresses, athletes, artists, and musicians, CEOs, and authors.&lt;/p&gt;
&lt;h3&gt;Insufficient Limits to the Right to Privacy&lt;/h3&gt;
&lt;p&gt;Section 3 (1) states: “Notwithstanding anything contained in any other law for the time being in force every person, including persons in public life, shall have the right to privacy which shall be exclusive, unhindered and there shall be no unwarranted infringement thereof by any other person, agency, media or anyone:&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Provided that sub-section (1) of section 3 shall not apply in cases of corruption, and misuse of official positions by persons in public life.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Comment&lt;/strong&gt;: We recommend that the right to privacy, as any right, need not be identified as exclusive or unhindered. The right to privacy must be determined on a case by case basis relative to the public interest, and, while cases of corruption and misuse of official position by persons in public life certainly qualify, they do not encompass the wider variety of situations in which an individual’s right to privacy should be limited. For instance, if a public figure speaks out on an issue in a way that contradicts an earlier position that was captured on video, shouldn’t that be allowed to be made public? &amp;nbsp;If a public figure is photographed in a morally questionable position, shouldn’t that be allowed to be made public? &amp;nbsp;Indeed, even for private individuals, privacy is a matter of context. &amp;nbsp;In airports and other sensitive public places it is commonly accepted that an individual’s right to privacy can be limited. If an individual has a disease such as HIV, under what circumstances should some or all of the greater public should be informed and their right to privacy may be limited?&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Limited Scope of Technology&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;Section 4 of the Bill states: "No person shall use a cellular phone with an inbuilt camera, if it does not produce a sound of at least 65 decibels and flash a light when used to take a picture of any object or person, as the case may be.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Comment&lt;/strong&gt;: We recommend that this clause clarifies if only cellular phones, and not cameras, computers, or other devices with built-in cameras are required to produce the sound of at least 65 decibels.&lt;/p&gt;
&lt;h2&gt;Overly Complicated Clauses&amp;nbsp;&lt;/h2&gt;
&lt;p&gt;Section 5 of the Bill states: Notwithstanding anything contained in any other law for the time being in force, no person shall make digital recording or take photographs or make videography in any manner whatsoever of:&amp;nbsp;&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;Section 5(a): any part or whole of a human body which is unclothed or partially clothed without the consent of the person concerned.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Section 5 (b): any part or whole of a human body at any public place without the consent of the person concerned and&lt;/p&gt;
&lt;p&gt;Section 5 (c): the personal and intimate relationship of any couple in a home, hotel, resort, or any place within the four walls by hidden digital or other cameras and such other instruments, or any place within the four walls by hidden digital cameras and such other instruments…with the intent of blackmail or of making commercial gains from it or otherwise.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Comment&lt;/strong&gt;: Section 5 currently lists certain circumstances in which photographs are not allowed to be taken of individuals in public without consent if they are to be used for the purpose of commercial gain or blackmail. Blackmail or commercial gains are not the only ways in which digital recordings of people can be misused. Certainly, taking such pictures to post for purposes of hurting one’s reputation or causing humiliation is as reprehensible as taking pictures for commercial gain, so the provision is too narrow. &amp;nbsp;It may also be overboard, because a person may be captured in an artistic or political photograph but have, for example, bare arms or legs. &amp;nbsp;That would be a picture of a part of a human body at a public place. &amp;nbsp;We recommend that the list of offences include misappropriation and false light, and that the manner of the picture-taking not be limited to clauses (a) to (c) above.&lt;/p&gt;
&lt;p&gt;Section 5 is the first instance in which the use of digital recordings for commercial gain has been mentioned as a violation in the Bill. We recommend that commercial gain as a violation should be added to the introduction of the Bill.&lt;/p&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-bill-2010'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-bill-2010&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-22T06:26:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/rti-requests-to-bsnl-mtnl-regarding-security-equipment">
    <title>  Right to Information (RTI) Requests to BSNL and MTNL Regarding Security Equipment</title>
    <link>https://cis-india.org/internet-governance/blog/rti-requests-to-bsnl-mtnl-regarding-security-equipment</link>
    <description>
        &lt;b&gt;As part of research, on July 2, 2013, the Centre for Internet and Society (CIS) had sent Right to Information (RTI) requests to two of the largest internet service providers (ISPs) in India: Mahanagar Telephone Nigam Limited (MTNL) and Bharat Sanchar Nigam Limited (BSNL) requesting answers to some questions.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Answers to the following questions were requested:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Please list the companies from which MTNL/BSNL has bought all its security equipment.&lt;/li&gt;
&lt;li&gt;What type of security equipment does MTNL/BSNL use to assist Indian law enforcement agencies in detecting and preventing crime, terrorism and all other illegal activity? Please provide the certification for all such equipment.&lt;/li&gt;
&lt;li&gt;What malware does MTNL/BSNL test for? What does MTNL/BSNL use for testing malware in its networks?&lt;/li&gt;
&lt;li&gt;Which proxy server does MTNL/BSNL use and is it used for filtering data? If so, what type of data is being filtered and for what purpose? Is authorisation required and if so, by whom?&lt;/li&gt;
&lt;li&gt;Does MTNL/BSNL use FinFly ISP? If so, who authorises its use and under what conditions?&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;M. K. Sheda, the appellate authority of MTNL, responded to the above questions on August 3, 2013 with the following answers:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;MTNL procures all its equipment through an open competitive bidding process and the details of all past tenders are available on the MTNL website. Equipment from multiple vendors are operational in GSM MTNL Packet-Core Network and specific 	names cannot be given due to security reasons.&lt;/li&gt;
&lt;li&gt;MTNL uses the security equipment by the Department of Telecommunications, Government of India, to assist Indian law enforcement agencies. The details 	cannot be disclosed as the information is classified as "secret" as per MTNL IT Policy Revision 2.0 and also comes under Section -8 (1) (a) and (d) of the 	RTI Act 2005.&lt;/li&gt;
&lt;li&gt;MTNL GSM Packet Core equipment for data access uses MTNL ISP as its interface with external entities. Thus information is pertaining to MTNL ISP and hence a reply may please be taken from the GM (Broadband) unit.&lt;/li&gt;
&lt;li&gt;Same answer as "3" above.&lt;/li&gt;
&lt;li&gt;Same answer as "3" above.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;BSNL has still not responded to the above questions.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Click below to download the respective files:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/bsnl-rti-application-2013.pdf" class="external-link"&gt;RTI Application to BSNL&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/reply-from-mtnl-to-rti-application.pdf" class="external-link"&gt;Reply from MTNL&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/rti-requests-to-bsnl-mtnl-regarding-security-equipment'&gt;https://cis-india.org/internet-governance/blog/rti-requests-to-bsnl-mtnl-regarding-security-equipment&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>RTI Application</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-02-25T15:04:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016">
    <title>Right to Food Campaign, Ranchi Convention, 2016</title>
    <link>https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016</link>
    <description>
        &lt;b&gt;The Right to Food Campaign held its 2016 Convention in Ranchi during September 23-25, 2016. While three years have elapsed since the passage of the National Food Security Act, despite improvements in the Public Distribution System (PDS), large implementation gaps remain. This is what the Convention focused on, and gathered researchers and campaigners from across the country to share experiences and case studies on effectiveness and exclusions from the PDS. Sumandro Chattapadhyay took part in a session of the Convention to discuss how UID-linked welfare delivery is being rolled out across key programmes like provision of pension and rationed distribution of essential commodities, and their impact on people's right to welfare services.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Right to Food Campaign: &lt;a href="http://www.righttofoodcampaign.in/"&gt;Website&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;Right to Food Campaign: &lt;a href="https://docs.google.com/viewer?a=v&amp;amp;pid=sites&amp;amp;srcid=ZGVmYXVsdGRvbWFpbnxoYXFyb3ppcm90aXxneDo3MmQ3MTMyZjU2N2FjOGU"&gt;Cash Transfers and UID: Our Main Demands&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;Ranchi Convention, 2016: &lt;a href="https://docs.google.com/document/d/110_asJ1t14IWALbhWN1RjDiOV8WE-fIK2xJC5Yltyc4/edit"&gt;Programme&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016'&gt;https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Welfare Governance</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    

   <dc:date>2019-03-16T04:40:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
