<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 811 to 825.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-sanjeeb-mukherjee-july-14-2017-centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-priyanka-mittal-july-12-2017-supreme-court-sets-up-constitution-bench-to-hear-aadhaar-privacy-issues"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-july-10-2017-reliance-jio-data-leaked-on-website-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ivir-summer-course-on-privacy-law-and-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/biometric-update-july-4-2017-justin-lee-uidai-declining-multiple-requests-by-police-to-share-indian-citizens-biometrics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/data-protection-understanding-the-general-data-protection-regulation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/freedom-of-expression-on-the-internet-possibilities-and-challenges"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-june-28-2017-jyotika-sood-utpal-bhaskar-golden-eye-ransomware-attack-hit-operations-at-pipavav-port-jnpt"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/second-india-china-think-tank-forum"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/dsci-best-practices-meet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bis-litd-17-privacy-panel-meeting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/2nd-india-think-tank-forum"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cybersecurity-compilation-indian-context"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/international-symposium-on-electronic-art-isea-2017"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-sanjeeb-mukherjee-july-14-2017-centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks">
    <title>Centre to form panel to 'encrypt' MGNREGA-DBT database and prevent leaks </title>
    <link>https://cis-india.org/internet-governance/news/business-standard-sanjeeb-mukherjee-july-14-2017-centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks</link>
    <description>
        &lt;b&gt;Around 5 crore bank accounts of active MGNREGA workers yet to be seeded with Aadhaar.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;div&gt;The article by Sanjeeb Mukherjee was &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks-117071400329_1.html"&gt;published in the Business Standard&lt;/a&gt; on July 14, 2017.&lt;/div&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Alarmed over reports of ‘public disclosure’ of sensitive Aadhaar data  through various portals and payment gateways, the Centre is in the  process of appointing a high-powered panel of almost 20 experts to  suggest ways and means through which data, particularly one which can be  accessed through the MGNREGA-DBT platform can be encrypted.&lt;/p&gt;
&lt;p&gt;Encryption, officials believe, would prevent the Aadhaar data and other related information from falling into wrong hands.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The need for proper encryption of Aadhaar data rose after the  government made it mandatory for availing almost all benefits - be it  school scholarships, payments of &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA &lt;/a&gt;wages, identification of beneficiaries under mid-day meal scheme and even public distribution system along with others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ensuring cyber security has become all the more necessary as the  Central government, in a notification issued last month, has made it  mandatory for all bank accounts to be seeded with Aadhaar numbers by  December 31, 2017, or else they would cease to be operational until the  time the account holder furnishes his &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar+Number" target="_blank"&gt;Aadhaar number.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This could seriously hamper payment of wages to &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA &lt;/a&gt;workers because as per available information almost 5 crore active workers don’t have their bank accounts seeded with Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To complete the process before December 2017, the ministry of rural  development has planned special Aadhaar camps to be held in villages  from July 20 to September 2017.&lt;/p&gt;
&lt;p&gt;Recently, a website published all confidential details of customers of a  private telecom company including Aadhaar numbers and other  information.&lt;/p&gt;
&lt;p&gt;The breach was another instance of secure confidential information falling into public domain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Officials of the panel, which would be headed by former NASSCOM head  Kiran Karnik are expected to submit their report on the same within the  next few months.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other members of the panel include Director General of National  Institute of Smart Governance (NISG), officials from Indian Computer  Emergency Response Team (ICERT) and others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, cyber security experts believe that encrypting Aadhaar-DBT  details mainly for those schemes and programmes which have a direct  linkage with the public at this later stage has its own challenges as  the entire ecosystem around Aadhaar has grown manifold ever since it was  made mandatory for a variety of programmes.&lt;/p&gt;
&lt;p&gt;Also, in the absence of a national encryption policy, such a move will have its own legal and regulatory challenges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Ever since the government made Aadhaar mandatory for many things, the  entire ecosystem around it including the Central Identities Data  Repository (the agency which stores Aadhaar data is exposed to leaks,”  noted cyber law expert Pawan Duggal told &lt;i&gt;Business Standard.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He said that without a proper national encryption law, it would be  extremely challenging to provide legal and regulatory backing to encrypt  all Aadhaar- DBT data details for &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA.&lt;/a&gt; “Also now that the ‘cat is out of the bag,’ encryption of Aadhaar details will be hugely challenging,” Duggal said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Already, civil society activists said that after some concern, the  central government has removed all Aadhaar numbers and bank details from  &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA &lt;/a&gt;website, which has made tracking payments difficult.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A recent study by Amber Sinha and Srinivas Kodali from the Centre for  Internet and Society (CIS) found that granular details about individuals  including sensitive personally identifiable information such as Aadhaar  number, caste, religion, address, photographs and financial information  are only a few clicks away through government schemes dashboard and  portals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While initiatives such as the government open data portals may be  laudable for providing easy access to government data condensed for easy  digestion, however in the absence of proper controls exercised by the  government departments the results can be disastrous by divulging  sensitive and adversely actionable information about the individuals who  are responding units of such databases,” the report said.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;It specifically studied two major schemes of the ministry of rural  development; the National National Social Assistance Programme and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA &lt;/a&gt;along with some state schemes.&lt;br /&gt;
&lt;blockquote class="styleQ1 blockquoteBG"&gt;
&lt;div&gt;&lt;span&gt;&lt;b&gt;Pointers&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;a)  Centre to form a panel to encrypt all MGNREGA-DBT database to prevent leaks.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;b) The panel might also suggest ways and means in which such ‘encryption’ could be applied in other platforms.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;c)  The panel is expected to be headed by former NASSCOM head Kiran Karnik.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;d) The encryption is essential as from January 2018 all non-Aadhaar  seeded bank accounts will cease to be operational unless the holders  seed them.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;e)  A recent study found that vivid details about individuals can be easily accessed from government platforms and databases.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;f)   The &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA &lt;/a&gt;database was one such publicly available platform which formed part of the study.&lt;/div&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-sanjeeb-mukherjee-july-14-2017-centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks'&gt;https://cis-india.org/internet-governance/news/business-standard-sanjeeb-mukherjee-july-14-2017-centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-14T10:46:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-priyanka-mittal-july-12-2017-supreme-court-sets-up-constitution-bench-to-hear-aadhaar-privacy-issues">
    <title>Supreme Court sets up constitution bench to hear Aadhaar privacy issues</title>
    <link>https://cis-india.org/internet-governance/news/livemint-priyanka-mittal-july-12-2017-supreme-court-sets-up-constitution-bench-to-hear-aadhaar-privacy-issues</link>
    <description>
        &lt;b&gt;The Supreme Court ‘s five-judge constitution bench will also decide if the Aadhaar privacy issue should be heard by a larger bench.&lt;/b&gt;
        &lt;p&gt;The article by Priyanka Mittal was &lt;a class="external-link" href="http://www.livemint.com/Politics/qgZWZgkGo2S7QUTRo53jMN/Aadhaar-case-Constitution-Bench-hearing-on-18-19-July.html"&gt;published in Livemint&lt;/a&gt; on July 12, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;A five-judge constitution bench will hear  arguments on 18-19 July as  to whether Indian citizens have the right to privacy, and whether the  Aadhaar unique identity project breaches the right.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chief Justice  of India (CJI) J.S. Khehar on Wednesday set the dates for the hearing by  the constitution bench, which will decide whether the issue should be  heard by a larger bench.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Should the five-judge bench decide to rule on the case itself and not  refer it to a larger bench, it will decide the future of Aadhaar, which  has become the backbone of government welfare programmes, the tax  administration network and online financial transactions.&lt;/p&gt;
&lt;p&gt;This will be based on whether the right to privacy is a fundamental right of Indian citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy  rights activists argue that personal data gathered under the Aadhaar  programme, aimed at giving a unique 12-digit identity number to every  Indian, is vulnerable to abuse. Then attorney general Mukul Rohatgi told  the Supreme Court in 2015 that Indian citizens don’t have a fundamental  right to privacy under the Indian Constitution—an argument he repeated  subsequently.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In the two-day hearing, the court is not  going to decide the full issue of privacy,” said Alok Prasanna Kumar, a  lawyer and visiting fellow at think tank Vidhi Centre for Legal Policy,  explaining how the Constitution bench is likely to proceed. “They are  going to take a call on whether, in light of precedents, there is a need  to refer the issue to a larger bench. There are past judgements and the  court will have to look at the scope of privacy under each to decide  the number of judges.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He added: “If the five-judge bench agrees with the precedents, then it would continue to address the angle of privacy; if not, then it would be referred back to the CJI to constitute a larger bench of nine judges.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All cases related to Aadhaar, including the right to privacy, will be  heard by the constitution bench; the court decided to set up the  constitution bench to hear the privacy case in August 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CJI’s decision came on a plea by advocate Shyam Divan, who has  appeared in several cases opposing Aadhaar, and attorney general K.K.  Venugopal seeking the speedy creation of a Constitution bench. It came a  week after justice J. Chelameswar said that all matters related to  Aadhaar should be addressed by a constitution bench.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I see it as  a step in the right direction. Personally, I hope that the privacy  issue is heard by a five-judge bench as against a larger bench as that  can bring more disagreement,” said Sunil Abraham, executive director of  Bengaluru-based research think tank Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last  month, the Supreme Court court upheld the government’s decision to link  Aadhaar with the permanent account number (PAN) for filing of  income-tax returns but ruled that non-compliance with the law will carry  no retrospective consequences.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the Aadhaar (Targeted  Delivery of Financial and Other Subsidies, Benefits and Services) Act,  2016, the unique identity number is mandatory only to receive social  welfare benefits.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-priyanka-mittal-july-12-2017-supreme-court-sets-up-constitution-bench-to-hear-aadhaar-privacy-issues'&gt;https://cis-india.org/internet-governance/news/livemint-priyanka-mittal-july-12-2017-supreme-court-sets-up-constitution-bench-to-hear-aadhaar-privacy-issues&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-14T10:55:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-july-10-2017-reliance-jio-data-leaked-on-website-report">
    <title>Reliance Jio data leaked on website : report</title>
    <link>https://cis-india.org/internet-governance/news/livemint-july-10-2017-reliance-jio-data-leaked-on-website-report</link>
    <description>
        &lt;b&gt;Reliance Jio customer data was leaked on independent website magicapk.com, including details such as names, mobile numbers and email IDs , said a report.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.livemint.com/Industry/ucK2SJDM4Ws8k36ovZVj6H/Reliance-Jio-customer-data-allegedly-compromised-report.html"&gt;published by Livemint&lt;/a&gt; on July 10, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Reliance Jio Infocomm Ltd’s customer data was allegedly leaked on an  independent website, magicapk.com, a report said. Jio, which crossed the  100 million mark in February, barely six months after it was launched,  ended the financial year with &lt;b&gt;&lt;a href="http://www.livemint.com/Industry/wVDwB0wKqaXxqVFqEWp4kK/Reliance-Jio-crosses-108-million-subscribers-claims-to-be-l.html" target="_blank"&gt;108.9 million subscribers &lt;/a&gt;&lt;/b&gt;as of 31 March.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report, published first in a late-night article on Sunday on &lt;b&gt;&lt;a href="http://www.fonearena.com/blog/224741/jio-customer-database-of-over-120-million-users-leaked-could-be-biggest-data-breach-in-india.html#more-224741" target="_blank"&gt;Fonearena.com&lt;/a&gt;&lt;/b&gt;,  alleged that “several sensitive details” were exposed, including  customers’ first and last names, mobile numbers, email IDs, circles, SIM  activation dates and even the Aadhaar numbers. The Aadhaar numbers,  however, were redacted on magicapk.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“To my disbelief I found my own details in the database and also couple  of my colleagues are affected too,” wrote Varun Krish, the author of the  article. However, if you now click on Magicapk.com, it reads: “This  Account has been &lt;a href="http://magicapk.com/cgi-sys/suspendedpage.cgi" target="_blank"&gt;suspended&lt;/a&gt; .” The Registrar of the site, according to the &lt;b&gt;&lt;a href="https://www.whois.com/whois/magicapk.com"&gt;whois database&lt;/a&gt;&lt;/b&gt;, is Godaddy.com, LLC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When contacted, a Reliance Jio spokesperson said, “We have come  across the unverified and unsubstantiated claims of the website and are  investigating it. Prima facie, the data appears to be unauthentic. We  want to assure our subscribers that their data is safe and maintained  with highest security. Data is only shared with authorities as per their  requirement. We have informed law enforcement agencies about the claims  of the website and will follow through to ensure strict action is  taken.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fonearena.com, on its site, has responded with a: “We still stand by our story.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  report assumes significance because the site exposed redacted Aadhaar  card details. There are nearly 1.2 billion Aadhaar number holders in the  country. Aadhaar aims to plug leakages in the delivery of state  benefits, such as subsidized grains to the poor, and aid in generating a  savings of about Rs70,000 crore a year for the government. But data  breaches have rattled citizens, especially since India does not have a  Privacy Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In March, the Unique Identification Authority of  India (UIDAI) blacklisted a common services centre for 10 years after it  shared the Aadhaar details of former cricket captain Mahendra Singh  Dhoni. On 25 April, &lt;i&gt;Mint &lt;/i&gt;reported that many government  departments, including the ministry of drinking water and sanitation,  the Jharkhand Directorate of Social Security, and the Kerala  government’s pension department, had published Aadhaar numbers of  beneficiaries of the schemes they run in &lt;b&gt;&lt;a href="http://www.livemint.com/Politics/bM6xWCw8rt6Si4seV43C2H/Govt-departments-breach-Aadhaar-Act-leak-details-of-benefic.html" target="_blank"&gt;violation of the Aadhaar Act&lt;/a&gt;&lt;/b&gt; .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On 1 May, Bengaluru-based think tank Centre for Internet and Society  (CIS) reported that a Central government ministry and a state government  may have &lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1"&gt;made public up to 135 million Aadhaar numbers&lt;/a&gt;&lt;/b&gt; .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the Aadhaar (Targeted Delivery of Financial Subsidies, Benefits  and Services) Act, 2016, the unique identity number is mandatory only to  receive social welfare benefits. However, tagging of the Aadhaar number  is being made mandatory by the government for various schemes including  PAN (permanent account number) accounts for taxation. On 7 July, the  Supreme Court refused to pass any interim order against the mandatory  use of Aadhaar for various government schemes. It, instead, suggested  that petitioners call for&lt;a href="http://www.livemint.com/Politics/5bZrxjf4FpfbxZFhc9inbI/Aadhaarlinked-issues-to-be-decided-by-constitution-bench-S.html" target="_blank"&gt; immediate formation of a Constitution bench &lt;/a&gt;to decide on the case .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;News of the alleged data leak also comes at a time when there have been a spate of cyber hacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, just when companies started believing that WannaCry—the  malware that held over 200,000 individuals across 10,000 organizations  in nearly 100 countries to ransom—was on the wane, a virus christened  GoldenEye (a variant of the Petya ransomware) by security firm  Bitdefender Labs attacked companies, mostly in Ukraine. And while the  target primarily appeared to be European countries, the &lt;b&gt;&lt;a href="http://www.livemint.com/Technology/IUkweIPadyeIHRW7lFTysI/GoldenEye-ransomware-follows-in-WannaCrys-footsteps.html" target="_blank"&gt;ransomware was also reported&lt;/a&gt;&lt;/b&gt; to be making inroads in countries like India.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-july-10-2017-reliance-jio-data-leaked-on-website-report'&gt;https://cis-india.org/internet-governance/news/livemint-july-10-2017-reliance-jio-data-leaked-on-website-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-10T14:53:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks">
    <title>Act now to protect yourself against future ransomware attacks</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks</link>
    <description>
        &lt;b&gt;There was Wannacry, then Petya, and several other lesser-known ones: With ransomware attacks coming thick and fast, get proactive about protecting yourself.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sanjay Kumar Singh was published by &lt;a class="external-link" href="http://www.business-standard.com/article/markets/act-now-to-protect-yourself-against-future-attacks-117070400742_1.html"&gt;Business Standard&lt;/a&gt; on July 5, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Wannacry ransomware attack in May was followed by the Petya attack last week. This attack affected the Ukrainian government and large corporates like Maersk and Merck. In India it affected the operations of terminals at Jawaharlal Nehru Port Trust (JNPT), operated by Maersk. According to Kaspersky Lab, the rate of ransomware attacks on businesses grew from one every 120 seconds in January 2016 to one every 40 seconds by October that year. The rate of attack on individuals' computers rose from one every 20 seconds to one every 10 seconds over this period. Today, it has become imperative for everyone, including entrepreneurs and small business owners, to learn how to defend themselves against such attacks.          &lt;br /&gt;&lt;br /&gt;A trend witnessed in 2016 was the growth of ransomware-as-a-service business model. "Code creators offer their malicious product on demand, selling uniquely modified versions to criminals who then distribute it through spam and websites, paying a commission to the creator," says Altaf Halde, managing director, Kaspersky Lab (South Asia). He adds that the growth of cashless payments in India will undoubtedly attract the attention of cyber criminals and lead to more attacks in future.   &lt;br /&gt;&lt;br /&gt;Next, let us turn to how ransomware works. An operating system (OS) is a large and complicated piece of software with millions of lines of software code. A malware exploits vulnerabilities within the OS to infiltrate it. An infiltration can happen in multiple ways: if you download a malicious email attachment, visit a code-carrying web site, via an infected pen drive, and so on.&lt;br /&gt;&lt;br /&gt;Ransomware is a form of malware that encrypts the files in a critical part of the computer, such as My Documents or Desktop, where people usually store their files. It could also encrypt specific file types, say, such .doc files. The user is then informed that his files have been encrypted along with the warning that unless he pays up within the next few hours his files will be deleted. Says Udbhav Tiwari, policy officer at the Centre for Internet and Society, Bengaluru: "You first have to first pay the attackers using anonymous money like bitcoins and then they give you the key for decrypting your files."&lt;br /&gt;&lt;br /&gt;A ransomware attack can be dealt with in two ways: either pay the money and get the files unlocked, or find a way to circumvent the encryption. The latter option can, however, take a fair bit of time.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;Safeguard measure you should adopt&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Back up important files regularly. Check periodically that these files have not  got damaged&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Enable ‘Show file extensions’ option in Windows settings. Stay away from extensions like “exe”, “vbs” and “scr”. Many &lt;a href="http://www.howtogeek.com/137270/50-file-extensions-that-are-potentially-dangerous-on-windows/" target="_blank"&gt;familiar file types can be dangerous&lt;/a&gt; as scammers use multiple extensions (like hot-chics.avi.exe or doc.scr)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If you discover an unknown process on your machine, cut off the Internet connection immediately&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If you have been infected, find the name of the ransomware. If it's an older version, your files can be restored. For restoration tools visit &lt;a href="https://www.nomoreransom.org/" target="_blank"&gt;https://www.nomoreransom.org/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Among the safeguard measures you should adopt, first and foremost, never open a suspicious file. By being vigilant you can avoid a lot of ransomware attacks.&lt;br /&gt;&lt;br /&gt;Most malware exploit vulnerabilities within the OS. "These vulnerabilities are frequently patched by the creators of the OS. But if people use pirated OS, or don't upgrade it regularly, they could land in trouble," says Tiwari. Soon after the Wannacry attack, Microsoft had issued a patch. People who updated their computers immediately didn't get affected by it. Also, use the latest version of an OS.&lt;br /&gt;&lt;br /&gt; Use a quality antivirus (AV) solution, which is usually one you have to pay for. A high-quality AV can even protect you against vulnerabilities not patched by the OS manufacturer. AVs scan files. If they detect patterns indicating the presence of malware, they lock them apart from the rest of the computer, thereby preventing them from spreading.&lt;br /&gt;&lt;br /&gt; One option is to use an OS that is less vulnerable, like Mac and Linux. Fewer malware are designed for these OS as fewer people use them.&lt;br /&gt;&lt;br /&gt;Finally, if your files do get encrypted, don’t pay the ransom, unless instant access to those files is critical. "Each payment only fuels this unlawful business," says Halde.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks'&gt;https://cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-07-10T14:46:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ivir-summer-course-on-privacy-law-and-policy">
    <title>IViR Summer Course on Privacy Law and Policy</title>
    <link>https://cis-india.org/internet-governance/news/ivir-summer-course-on-privacy-law-and-policy</link>
    <description>
        &lt;b&gt;attended the 2016 IViR Summer Course on International Privacy Law as a beneficiary of the OSF Civil Society Scholarship in Amsterdam from July 3 to 7, 2017. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The University of Amsterdam’s Institute for Information Law (IViR) announces the 6th &lt;b&gt;IVIR Summer Course on Privacy Law and Policy&lt;/b&gt;.  The course will focus on privacy law and policy related to the  Internet, electronic communications and online and social media.  It  will explore the broader trends and recent developments in this rapidly  changing field and explain how businesses, governments and other  stakeholders can achieve their goals within it. The course will feature a  distinguished faculty of European and US academics, regulators and  practitioners who will investigate the EU and US legal frameworks and  how they operate together. Participants will acquire the essential  knowledge necessary to navigate privacy law and policy for online  services that operate in the EU and the US. The seminar format promotes  interaction among participants and faculty, and incorporates a range of  practical exercises to apply the knowledge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For more information &lt;a class="external-link" href="https://www.ivir.nl/courses/plp/"&gt;see the website&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ivir-summer-course-on-privacy-law-and-policy'&gt;https://cis-india.org/internet-governance/news/ivir-summer-course-on-privacy-law-and-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-08-23T02:00:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/biometric-update-july-4-2017-justin-lee-uidai-declining-multiple-requests-by-police-to-share-indian-citizens-biometrics">
    <title>UIDAI declining multiple requests by police to share Indian citizens’ biometrics</title>
    <link>https://cis-india.org/internet-governance/news/biometric-update-july-4-2017-justin-lee-uidai-declining-multiple-requests-by-police-to-share-indian-citizens-biometrics</link>
    <description>
        &lt;b&gt;The Unique Identification Authority of India (UIDAI), the governing agency in charge of Aadhaar, has declined multiple requests from all law enforcement agencies, including the Delhi Police, for biometrics of citizens for criminal investigations, according to a report by The Indian Express.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Justin Lee was &lt;a class="external-link" href="http://www.biometricupdate.com/201707/uidai-declining-multiple-requests-by-police-to-share-indian-citizens-biometrics"&gt;published by Biometric Update&lt;/a&gt; on July 4, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Investigating agencies such as CBI and NIA have been repeatedly  requesting the details of Aadhaar cardholders including their  biometrics, UIDAI said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI Deputy Director General Rajesh Kumar Singh has written to the  heads of each agency, ordering them to stop asking for such details.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is regarding requests frequently received by the UIDAI from  police and other law enforcement agencies, seeking demographic and  biometric information of residents for facilitating identification of  individuals in different cases,” Singh said in his letter. “In this  regard, I would like to draw your kind attention to provisions under  Sections 28 and 29 of the Aadhaar (Targeted delivery of financial and  other subsidies, benefits and services) Act, 2016, which prohibits  sharing of core biometric and identity related information with other  authorities.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rather than asking forensic labs to match fingerprints, state police  and investigating agencies are requesting biometrics data from UIDAI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Identity information cannot be shared by UIDAI,” Singh said. “The  requests received from law enforcement agencies lead to avoidable delays  in investigation by the police authorities and unnecessary increase in  the workload of subordinate authorities.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI is also concerned about data potentially leaking as the central  government has confirmed that identities of individuals, including  Aadhaar numbers and other private information, has been leaked to the  public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.biometricupdate.com/201705/report-claims-millions-of-aadhaar-registration-and-bank-numbers-compromised"&gt;In May&lt;/a&gt;,  the Centre for Internet and Society published a report that claimed  between 130 to 135 million numbers in India’s Aadhaar biometric registry  system, and around 100 million bank numbers of pensioners and rural  jobs-for-work beneficiaries, have been leaked online by four key  government programs.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/biometric-update-july-4-2017-justin-lee-uidai-declining-multiple-requests-by-police-to-share-indian-citizens-biometrics'&gt;https://cis-india.org/internet-governance/news/biometric-update-july-4-2017-justin-lee-uidai-declining-multiple-requests-by-police-to-share-indian-citizens-biometrics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-06T15:25:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/data-protection-understanding-the-general-data-protection-regulation">
    <title>Data Protection: Understanding the General Data Protection Regulation</title>
    <link>https://cis-india.org/internet-governance/blog/data-protection-understanding-the-general-data-protection-regulation</link>
    <description>
        &lt;b&gt;As recently as May 27, 2016, the General Data Protection Regulation (REGULATION (EU) 2016/679) (hereinafter referred to as GDPR) was adopted. The Data Protection Directive (1995/46/EC) (hereinafter referred to as DPD) will be replaced by this Regulation.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;It will come into force on 25th May 2018 and it is expected that under this Regulation data privacy will be strengthened. Substantive and procedural changes have been introduced and for compliance, industries and law enforcement agencies will have to adjust the ways in which they have operated thus far. &lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/GDPR_IndustrySheet_07.pdf"&gt;Click here to read the report&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/data-protection-understanding-the-general-data-protection-regulation'&gt;https://cis-india.org/internet-governance/blog/data-protection-understanding-the-general-data-protection-regulation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aditi Chaturvedi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-04T16:12:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/freedom-of-expression-on-the-internet-possibilities-and-challenges">
    <title>Freedom of Expression on the Internet : Possibilities and Challenges</title>
    <link>https://cis-india.org/internet-governance/news/freedom-of-expression-on-the-internet-possibilities-and-challenges</link>
    <description>
        &lt;b&gt;Sharat Chandra Ram was a speaker at an international seminar organized by Bolivar Technological University, Cartagena in Colombia on June 29, 2017. The theme of the seminar was ‘Freedom of Expression on the Internet : Possibilities and Challenges”.

&lt;/b&gt;
        &lt;p&gt;For more info on the event, &lt;a class="external-link" href="http://www.unitecnologica.edu.co/noticias/libertad-de-expresion-en-internet-posibilidades-y-desafios"&gt;click here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/freedom-of-expression-on-the-internet-possibilities-and-challenges'&gt;https://cis-india.org/internet-governance/news/freedom-of-expression-on-the-internet-possibilities-and-challenges&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-07-09T02:30:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-june-28-2017-jyotika-sood-utpal-bhaskar-golden-eye-ransomware-attack-hit-operations-at-pipavav-port-jnpt">
    <title>GoldenEye ransomware attack hit operations at Pipavav Port, JNPT</title>
    <link>https://cis-india.org/internet-governance/news/livemint-june-28-2017-jyotika-sood-utpal-bhaskar-golden-eye-ransomware-attack-hit-operations-at-pipavav-port-jnpt</link>
    <description>
        &lt;b&gt;Shipping ministry says the GoldenEye ransomware attack at JNPT and Pipavav port may result in bunching of inbound and outbound cargo.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Jyotika Sood and Utpal Bhaskar was &lt;a class="external-link" href="http://www.livemint.com/Industry/mh9nxJNR2NRgFh5zKThhqK/Jawaharlal-Nehru-Port-Trust-said-to-be-affected-as-cyberatta.html"&gt;published in Livemint&lt;/a&gt; on June 28, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Operations  at one of three terminals at India’s largest container port, Jawaharlal  Nehru Port Trust (JNPT) run by AP Moller-Maersk, near Mumbai, were  disrupted by a global ransomware attack, the port said on Wednesday. The  version that caused the disruption has been dubbed GoldenEye by  security firm Bitdefender Labs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Operations at the Danish firm’s  terminal at Gujarat Pipavav Port were also affected, but by the Petya   variant of the ransomware.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ransomware typically logs users out of  their own systems and asks them to pay a ransom if they want to access  the encrypted data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The central server is in Europe which we  can’t control. It is not a problem aimed at India... we have become  collateral damage,” said a senior Indian government official involved in  cybersecurity operations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ransomware hit the integrated  transport and logistics firm’s global operations on Tuesday across its  75 terminals. It also impacted Chernobyl’s radiation monitoring system,  law firm DLA Piper, pharma firm Merck, a number of banks, an airport,  the Kiev metro, British advertising giant WPP and Russian oil firm  Rosneft, according to Bitdefender Labs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The IT  (information technology) department of JNPT became aware of the attack  at around 4.30pm on Tuesday. The Windows server started conking off and  the master file got encrypted and we couldn’t access any data. The  operations immediately came to a standstill,” said a JNPT official  requesting anonymity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;AP Moller-Maersk operates the Gateway  Terminals India (GTI) at JNPT which has a capacity to handle 1.8 million  standard container units. JNPT, which ships more than half the  containerized cargo passing through India’s ports, serves a vast  hinterland comprising all of northern and western India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While  DP World and JNPT terminals are operational, the Gateway Terminals India  operated by APM is completely shut,” said the JNPT official.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This  is the second major ransomware attack since May after hackers exploited  a loophole that was first identified by the US National Security  Agency, to create WannaCry, that affected several businesses in more  than 150 countries including India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ministry of corporate affairs and the Andhra Pradesh Police were affected, besides several large organizations..&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While  the terminal operator is taking steps to address the issues disrupting  operations, it is anticipated that there could be bunching of in-bound  and out-bound container cargo,” India’s shipping ministry said in a  statement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Maersk group, through its terminal and infrastructure business, has invested $800 million in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The  global attack has impacted APM terminal of the JNPT port. The  operations at the terminal have slowed down and are being entered  manually. We are trying to handle the crisis by diverting traffic to  other terminals,” JNPT chairman Anil Diggikar said, adding that JNPT’s  operations have not been affected to a great extent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He said it would take around 24 hours to clear the backlog.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gujarat  Pipavav Port told stock exchanges that the ransomware did not have “any  major impact on the company at this point in time”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns have  been expressed about the safety of India’s infrastructure projects with  power generation and transmission projects figuring high on terrorist  threat lists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ravi Shankar Prasad, minister of electronics and  information technology, on Wednesday said advisories have been issued  and the government is keeping a close watch on developments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  Indian Computer Emergency Response Team (CERT-In), the agency  coordinating efforts on cybersecurity issues, in a 27 June advisory  warned, “It has been reported that variants of Petya ransomware with  work-like capabilities are spreading.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such attacks pose a grave threat to the economy and businesses. Cybersecurity Ventures &lt;a href="http://bit.ly/2sfWYPd" target="_blank"&gt;predicts &lt;/a&gt;global annual cybercrime costs will grow from $3 trillion in 2015 to $6 trillion by 2021.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts believe India is ill-equipped to face such attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“These  cases of malware attacks highlight the need for proper planning of  cybersecurity at all levels, especially for the government  infrastructure networks,” said Pranesh Prakash, policy director at the  Centre for Internet and Society, a Bengaluru-based think tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Transportation  and shipping companies are ill-prepared for cyberattacks,” added Amit  Jaju, executive director, fraud investigation and dispute services, EY.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  emergency playing out at the ports assumes significance, given India’s  Rs8 trillion investment plan until 2035 under the Sagarmala programme,  which involves the construction of new ports to harness the country’s  7,517km coastline and setting up of as many as 142 cargo terminals at  major ports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Indian companies lose approximately Rs40,000 crore  due to cybercrime every year. India is among the top 5 countries today  in terms of the frequency and the number of cyber attacks,” Jaju said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We  are not prepared at all. This is a question of cyber literacy because  the latest attack has reused the same Windows vulnerability that was  exploited by WannaCry ransomware last month and for which security  patches were released almost three months ago by Microsoft,” added  cybersecurity expert Mohit Kumar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Anirudh Laskar, Mayank Aggarwal, Shally Seth &amp;amp; Komal Gupta contributed to the story.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-june-28-2017-jyotika-sood-utpal-bhaskar-golden-eye-ransomware-attack-hit-operations-at-pipavav-port-jnpt'&gt;https://cis-india.org/internet-governance/news/livemint-june-28-2017-jyotika-sood-utpal-bhaskar-golden-eye-ransomware-attack-hit-operations-at-pipavav-port-jnpt&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-07-06T22:53:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/second-india-china-think-tank-forum">
    <title>Second India China Think-Tank Forum</title>
    <link>https://cis-india.org/internet-governance/news/second-india-china-think-tank-forum</link>
    <description>
        &lt;b&gt;The second India-China Think-Tank Forum was held in Beijing from June 22 to 27, 2017. The Forum was jointly organized by the Institute of Chinese Studies, the Indian Council of World Affairs, and the Chinese Academy of Social Sciences. Saikat Dutta represented an Indian think tank. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Forum was set up following an MoU between India and China during the visit of Prime Minister Narendra Modi in 2015. The idea of the forum is to explore contentious issues and new areas of cooperation between India and China as a Track 1.5 dialogue. &lt;a class="external-link" href="http://niasindiainchina.in/2017-06-25/the-second-india-china-think-tank-forum-was-held/"&gt;Read More&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/2nd-china-india-think-tank-forum-report"&gt;Click here&lt;/a&gt; for the report&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cybersecurity-threat-or-opportunity"&gt;Click&lt;/a&gt; to read Saikat Dutta's presentation&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/second-india-china-think-tank-forum'&gt;https://cis-india.org/internet-governance/news/second-india-china-think-tank-forum&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-07-07T02:43:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/dsci-best-practices-meet">
    <title>DSCI Best Practices Meet</title>
    <link>https://cis-india.org/internet-governance/news/dsci-best-practices-meet</link>
    <description>
        &lt;b&gt;Udbhav Tiwari represented CIS on a Panel titled "Reposing Trust in Citizen Identity Systems" at the DSCI Best Practices Meet held at the ITC Gardenia on June 22 and 23, 2017 in Bangalore. &lt;/b&gt;
        &lt;p&gt;The event discussions featured around privacy and Aadhaar.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/dsci-best-practices-meet'&gt;https://cis-india.org/internet-governance/news/dsci-best-practices-meet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-07T01:39:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bis-litd-17-privacy-panel-meeting">
    <title>BIS LITD 17 Privacy Panel meeting</title>
    <link>https://cis-india.org/internet-governance/news/bis-litd-17-privacy-panel-meeting</link>
    <description>
        &lt;b&gt;Udbhav Tiwari represented CIS at this meeting organized by National Law School of India University in Bangalore on June 21, 2017.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The bare-bones structure for what as discussed at the meeting can be found in the trailing email below. The standard itself is still in the drafting stage, which makes it confidential. I will share it on this thread once it hits the public draft stage, which should happen by September 2017. (approx)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bis-litd-17-privacy-panel-meeting'&gt;https://cis-india.org/internet-governance/news/bis-litd-17-privacy-panel-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-07T01:31:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/2nd-india-think-tank-forum">
    <title>2nd India Think Tank Forum</title>
    <link>https://cis-india.org/internet-governance/news/2nd-india-think-tank-forum</link>
    <description>
        &lt;b&gt;Udbhav Tiwari participated in a panel titled "The New Cold War: Information and Cyber Wars" at the  Second India Think Tank Forum organized by ORF, the Think Tank Programme at UPenn and the McKinsey Institute between 19 to 21 June 2017 at Claridges in New Delhi. &lt;/b&gt;
        &lt;h3&gt;Agenda&lt;/h3&gt;
&lt;p&gt;June 19, 2017&lt;br /&gt;18.00 – 18.30 – Registration&lt;br /&gt;18.30 – 18.40 – Welcome Remarks&lt;br /&gt;18.45 – 20.00 – Big Politics: OBOR, India, and the Liberal International Order&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This panel will explore the emerging trends in geo-politics and the implications thereof on the liberal international order. It will explore the rise of China, in particular the ambitious Belt &amp;amp; Road Initiative and in its strategic and economic impact on Asia. It will discuss the role of the U.S. and Europe in what is now referred to as the Asian century. Lastly, it will discuss India’s role as a liberal actor in a rapidly changing global order.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chair: Sanjaya Baru, Distinguished Fellow, USI&lt;br /&gt;Speakers:&lt;br /&gt;Indrani Bagchi, Diplomatic Editor, Times of India&lt;br /&gt;Lt. Gen. Aditya Singh, Senior Fellow, Delhi Policy Group&lt;br /&gt;Nitin Pai, co-Founder, Takshashila Institute&lt;br /&gt;Seshdari Vasan, Chennai Centre for China Studies, Chennai&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;20.00 – 20.30 – Three Years of the Modi Government: Looking Back, Looking Ahead&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Conversation: Smt. Smriti Irani, Union Cabinet Minister for Textiles, Govt. of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;20.30 - Dinner&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/2nd-india-think-tank-forum'&gt;https://cis-india.org/internet-governance/news/2nd-india-think-tank-forum&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-07-07T01:16:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cybersecurity-compilation-indian-context">
    <title>Cybersecurity Compilation: Indian Context</title>
    <link>https://cis-india.org/internet-governance/blog/cybersecurity-compilation-indian-context</link>
    <description>
        &lt;b&gt;This document intends to serve as a comprehensive source compiling all the cyber-security related regulations, policies, guidelines, notifications, executive orders, court rulings, etc.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Ultimately, it attempts to collect all the cyber security initiatives that have been put out by Indian regulatory bodies and organizations. To approach this end, we identified they actors and institutions in cyber security and record their published guidelines, frameworks, ongoing projects and any policies released to strengthen cyber security. We have mostly followed a general framework in which, for each document found, we indicate the definition of cyber security (if stated), the objectives, recommendations/guidelines and scope. This format was sometimes difficult to follow for some types of initiatives in the documents. For example, a document of questions and answers to parliament could not be recorded in this fashion. As a result, the document is not entirely uniform in structure. This research compendium is in continuous progress, expanding along with the base of our knowledge and ongoing research.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cyber-security-compilation.pdf"&gt;&lt;b&gt;Download the Compendium&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cybersecurity-compilation-indian-context'&gt;https://cis-india.org/internet-governance/blog/cybersecurity-compilation-indian-context&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Leilah Elmokadem and edited by Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-18T13:16:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/international-symposium-on-electronic-art-isea-2017">
    <title>International Symposium on Electronic Art (ISEA 2017)</title>
    <link>https://cis-india.org/internet-governance/news/international-symposium-on-electronic-art-isea-2017</link>
    <description>
        &lt;b&gt;Sharat Chandra Ram was part of a 90 minute academic panel at ISEA 2017 organized by the University of Caldas, Manizales in Columbia. The event was held from June 11 to 16, 2017.&lt;/b&gt;
        &lt;div&gt;The Panel was titled - “&lt;b&gt;Biocreation of Informatics: Rethinking Data Ecosystems in the Network Economy&lt;/b&gt;. The Panel consisted of 4 papers:&lt;/div&gt;
&lt;div&gt;1. &lt;b&gt;Pilar Saenz&lt;/b&gt; - Karisma Foundation, Bogota -&lt;b&gt; Data and Public Policy&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;2. &lt;b&gt;Offray Vladimir Luna&lt;/b&gt; - HackBo &amp;amp; University of Caldas  - &lt;b&gt;Civic Media and Data (H)ac(K)tivism&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;3. &lt;b&gt;Jose Cuartas&lt;/b&gt; - Los Libertadores &amp;amp; University of Caldas  - &lt;b&gt;Democratisation of Data and Internet of Things&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;4. Sharath Chandra Ram - Signal Territories, Infrastructures and Intermediaries&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/international-symposium-on-electronic-art-isea-2017'&gt;https://cis-india.org/internet-governance/news/international-symposium-on-electronic-art-isea-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-07-07T01:49:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
