<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 821 to 835.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/pycon-india-2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/ian"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-publicstatement-UID"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/public-panel-discussion-digitalisation-for-social-change"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/public-debate-on-differential-pricing-series-3"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/public-debate-on-differential-pricing-series-2"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/a-series-of-public-debates-on-differential-pricing-series-1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/public-data-on-web"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-august-3-2015-siladitya-ray-proxies-and-vpns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-times-of-india-mahendra-singh-may-18-2017-provide-hacker-details-outfit-that-claimed-data-leak-told"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/protest-at-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/protection-of-privacy-in-mobile-phone-apps"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/medianama-march-18-2019-zaheer-merchant-proposed-intermediary-liability-rules-threat-privacy-and-free-speech"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy">
    <title>Q&amp;A to the Report of the Group of Experts on Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy</link>
    <description>
        &lt;b&gt;In January 2012 Justice A.P. Shah formed a committee consisting of a group of experts to contribute to and create a report of recommendations for a privacy legislation in India. The committee met a total of seven times from January to September 2012.  The Centre for Internet and Society (CIS) was a member of the committee creating the report. This blog post is CIS’s attempt to answer questions that have arisen from media coverage on the report, based on our understanding. &lt;/b&gt;
        &lt;h2&gt;Executive Summary&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The executive summary explains how the need for a horizontal privacy legislation that recognizes the right to privacy has come about in India in light of projects and practices such as the UID, NATGRID, and the changing nature of business and technology. The executive summary highlights the committee’s recommendations of what should be considered by legislatures while enacting a privacy legislation in India.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are the salient features of the committee’s recommendations? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; In its report the committee recommended that any privacy legislation passed should:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; Be technologically neutral and interoperable with international standards to ensure that the regulation can adapt to changing technology, and that business will be promoted. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Recognize the multiple dimensions of privacy including physical and informational privacy. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Apply to all data controllers both in the private sector and the public sector to ensure that businesses and governments are held accountable to protecting privacy. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Establish a set of privacy principles that can be applicable to different practices, policies, projects, departments, and businesses to create a uniform level of privacy protection across all sectors. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Create an enforcement regime of co-regulation, where industry has the choice of developing privacy principles and ensuring compliance at the sectoral level with regular oversight by the Privacy Commissioners. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Chapter 1: Constitutional Basis for Privacy&lt;/h2&gt;
&lt;p&gt;This chapter summarizes a number of decisions from the Indian Judiciary that demonstrate how the right to privacy in India has been defined on a case to case basis and has been defined as either a fundamental right or a common law right.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are the contexts of the cases covered? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; This chapter covers cases that speak to the:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Right to privacy in the context of surveillance by the State &lt;/li&gt;
&lt;li&gt;Balancing the ‘right to privacy’ against the ‘right to free speech’ &lt;/li&gt;
&lt;li&gt;The ‘right to privacy’ of HIV patients &lt;/li&gt;
&lt;li&gt;Prior judicial sanctions for tapping telephones &lt;/li&gt;
&lt;li&gt;The ‘search and seizure’ powers of revenue authorities &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Chapter 2: International Privacy Principles&lt;/h2&gt;
&lt;p&gt;This chapter summarizes recent developments in privacy laws, international privacy principles, and privacy principles developed by specific countries. This review aided the Committee in forming its recommendations for the report.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Privacy principles from which countries were reviewed by the Committee?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; The Committee reviewed privacy principles from the following countries and international organizations.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;EU Regulations of January 2012 &lt;/li&gt;
&lt;li&gt;US Consumer Privacy Bill of Rights &lt;/li&gt;
&lt;li&gt;OECD Privacy Principles &lt;/li&gt;
&lt;li&gt;APEC Privacy Framework &lt;/li&gt;
&lt;li&gt;Australia &lt;/li&gt;
&lt;li&gt;Canada &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Chapter 3: National Privacy Principles, Rationales, and Emerging Issues&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This chapter lays out the nine national privacy principles and describes the rationale for each principle along with emerging issues around each principle.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What could the principles apply to? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The principles apply to the collection, processing, storage, retention, access, disclosure, destruction, sharing, transfer, and anonymization of sensitive personal information, personal identifiable information, and identifiable information by data controllers. The national privacy principles can also be applied to legislation, projects, practices, and policies to ensure that provisions and requirements are in compliance with the national privacy principles.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Who could be brought under the scope of the principles?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The principles are applicable to every data controller in the private sector and the public sector. For example organizations and government departments that determine the purposes and means of processing personal information will be brought under the scope of the principles and will be responsible for carrying out the processing of data in accordance with sectoral privacy standards or the national privacy principles.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: How could the National Privacy Principles impact individuals? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The principles provide individuals with the right to 1. Receive notice before giving consent stating what personal information is being collected, the purposes for which personal information is being collected, the uses of collected personal information, whether or not personal information will be disclosed to third persons, security safeguards established by the data controller, processes available to data subjects to access and correct personal information, and contact details of privacy officers. 2. Opt in and out of providing personal information 3. Withdraw given consent at any point of time. 4. Access and correct any personal information held by data controllers 5. Allow individuals to issue a complaint with the respective ombudsman, privacy commissioner, or court.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Would the National Privacy Principles be binding for every data controller? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; Yes, but Self Regulating Organizations at the industry level have the option of developing principles for that specific sector. These principles must be approved by the privacy commissioner and be in compliance with the National Privacy Principles.&lt;/p&gt;
&lt;h2&gt;Chapter 4: Analysis of Relevant Legislation, Bills, and Interests from a Privacy Perspective&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This chapter examines relevant legislation, bills, and interests from a privacy perspective. In doing so the chapter clarifies how the right to privacy should intersect with the right to information and the freedom of expression, and anaylzes current and upcoming legislation to demonstrate what existing provisions in the legislation uphold the privacy principles, what existing provisions are in conflict with the principles, and what provisions are missing to ensure that the legislation is compliant to the extent possible with the principles.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: How does the report understand the relationship between the Right to Information and the Right to Privacy?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; When applied the Privacy Act should not circumscribe the Right to Information Act. Furthermore, RTI recipients should not be considered data controllers and thus should not be brought under the ambit of the privacy principles.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: How does the report understand the relationship between the freedom of expression and privacy? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; Questions about how to balance the right to privacy with the freedom of expression can arise in many circumstances including: the right to be forgotten and data portability, journalistic expression, state secrecy and whistle blowers, and national security. Most often, public interest is the test used to determine if the right to privacy should supersede the freedom of expression or vice versa.&lt;/p&gt;
&lt;h2&gt;Chapter 5: The Regulatory Framework&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This chapter outlines the committee’s recommendations for a regulatory framework for the Privacy Act.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Who are the main actors in the regulatory framework?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The report recommends that a regulatory framework be comprised of one privacy commissioner at the central level and four commissioners at the regional level, self regulating organizations (SRO’s) at the industry level, data controllers and privacy officers at the organization level, and courts.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are the salient features of the regulatory framework? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The salient features of the regulatory framework include 1. A framework of co-regulation 2. Complaints 3. Exceptions to the Privacy Act 4. Offenses under the Act&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are exceptions to the right to privacy? Are these blanket exceptions?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; National security; public order; disclosure of information in public interest; prevention, detection, investigation and prosecution of criminal offences; and protection of the individual or of the rights and freedoms of others are suggested exceptions to the right to privacy. The committee has qualified these exceptions with the statement that before an exception can be made for the following circumstances, the proportionality, legality, and necessity in a democratic state should be used to measure if the exception applies and the extent of the exception. Thus, they are not blanket exceptions to the right to privacy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Historical and scientific research and journalistic purposes were also recommended as additional exceptions to the right to privacy that may be considered. These exceptions will not be subjected to the principles of proportionality, legality, and necessary in a democratic state.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are the powers and responsibilities of the privacy commissioners? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; The powers and responsibilities of the Privacy Commissioners are the following:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Responsibilities:&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Enforcement of the Act &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Broadly oversee interception/access, audio &amp;amp; video recordings, the use of personal identifiers, and the use of bodily or genetic material. &lt;/li&gt;
&lt;li&gt;Evaluate and approve privacy principles developed by SRO’s &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Collaborate with stakeholders to endure effective regulation, promote awareness of the Act, and sensitize citizens to privacy considerations &lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Powers: &lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Order privacy impact assessments on organisations &lt;/li&gt;
&lt;li&gt;Investigate complaints suomotu or based off of complaints from data subjects (summon documents, call and examine witnesses, and take a case to court if necessary ) &lt;/li&gt;
&lt;li&gt;Fine non-compliant data controllers &lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Q: How does Co-regulation work? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The purpose of establishing a regulatory framework of co-regulation is to ensure that appropriate policies and principles are articulated and enforced for all sectors. If a sector wishes to develop its own privacy standards, the industry level self regulating organization will submit to the privacy commissioner a sub set of self regulatory norms. If these norms are approved by the privacy commissioner the SRO will be responsible for enforcing those norms, but the privacy commissioner will have the power to sanction member data controllers for violating the norms. If a sector does not have an SRO or does not wish to develop its own set of standards, the National Privacy Principles will be binding.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are data controllers? What are privacy officers? What are ombudsmen? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; A data controller is any entity that handles or process data. Privacy officers receive and handle complaints at the organizational level and may be appointed as part of a SRO’s privacy requirements for a sector.  Ombudsmen are appointed at the SRO level and are also responsible for receiving and handling complaints. The objective of having ombudsman and privacy officers is to reduce the burden of handling complaints on the commissioner and the courts.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: When can an individual issue a complaint? Which body should individuals issue complaints to? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; An individual can issue a complaint at any point of time when they feel that their personal information has not been handled by a data controller according to the principles, or that a data controller is not in compliance with the Act. When applicable complaints are encouraged to be issued first to the organization. If the complaint is not resolved, the individual can take the complaint to the SRO or privacy commissioner. The individual also has the option of taking a complaint straight to the courts. When a complaint is received by the commissioner, the commissioner may fine the data controller if it is found to be non-compliant. Data controllers cannot appeal fines issued by the commissioner, but they can appeal the initial decision of non-compliance.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Can an individual receive compensation for a violation of privacy: &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; Yes. Individuals who suffer damages caused by non-compliance with the principles or any obligation under the Act can receive compensation, but the compensation must be issued by the courts and cannot be issued by a privacy commissioner. Actors that can be held liable by individuals include data controllers, organization directors, agency directors, and heads of Governmental departments.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What offences does the report reccomend?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; The following constitutes as an offence under the Act:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Non-compliance with the  privacy principles &lt;/li&gt;
&lt;li&gt;Unlawful  collection,  processing,  sharing/disclosure,  access,  and  use  of personal data &lt;/li&gt;
&lt;li&gt;Obstruction of commissioner &lt;/li&gt;
&lt;li&gt;Failure to comply with notification issued by commissioner        
&lt;ul&gt;
&lt;li&gt; Processing data after receiving a notification &lt;/li&gt;
&lt;li&gt; Failure to appear before commissioner &lt;/li&gt;
&lt;li&gt;Failure to produce documents requested by commissioner &lt;/li&gt;
&lt;li&gt; Sending report to commissioner with false or misleading information&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Chapter 6: The Multiple Dimensions of Privacy&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This chapter gives examples of practices that impact privacy in India which the national privacy principles could be applied to. These include interception/access, the use of electronic recording devices, the use of personal identifiers, and the use of bodily and genetic material. The current state of each practice in India is described, and the inconsistencies and gaps in the regimes are highlighted. Each section also provides recommendations of which privacy principles need to be addressed and strengthened in each practice, and how the privacy principles would be affected by each practice.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Does the report give specific recommendations as to how each practice should be amended to incorporate the National Privacy Principles?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; No. Each section explains the current state of the practice in India, gaps and inconsistencies with the current practice,  and recommends broadly what principles need to be addressed and strengthened in the regime, and how the National Privacy Principles may be affected by the practice.&lt;/p&gt;
&lt;h3&gt;Summary of Recommendations&lt;/h3&gt;
&lt;p&gt;This chapter consolidates and clarifies all of the Committee’s recommendations for a Privacy Act in India.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Are the recommendations in this chapter different from chapters above?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; No.  The recommendations in this chapter reflect the recommendations made earlier. This chapter does clarify the recommended scope and objectives of the Privacy Act  including:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The Act should define and harmonize with existing laws in force. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Act should extend the right of privacy to all individuals in India and all data processed by any company or equipment locating in India, and all data that originated in India. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Act should clarify that the publication of personal data for artistic and journalistic purposes in public interest, the use of personal information for household purposes, and the disclosure of information as required by the Right to Information Act should not constitute an infringement of privacy. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Act should not require a ‘reasonable expectation’ of privacy to be present for the right to be evoked. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If any other legislation provides more extensive protections than those set out by the Privacy Act, than the more extensive protections should apply. &lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/report-of-group-of-experts-on-privacy.pdf" class="internal-link"&gt;Report of the Group of Experts on Privacy&lt;/a&gt; [PDF, 1270 Kb]&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy'&gt;https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-11-09T10:20:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/pycon-india-2019">
    <title>Pycon India 2019</title>
    <link>https://cis-india.org/internet-governance/news/pycon-india-2019</link>
    <description>
        &lt;b&gt;K. Bhuvana Meenakshi gave a talk at BangPypers organized by Python Software Society in Bangalore on August 25, 2019. She spoke on Let the world experience WebXR!&lt;/b&gt;
        &lt;p&gt;For more info, &lt;a class="external-link" href="https://www.meetup.com/BangPypers/events/kswpqqyzlbwb/"&gt;click here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/pycon-india-2019'&gt;https://cis-india.org/internet-governance/news/pycon-india-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2019-08-27T00:04:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/ian">
    <title>Public Talk by Dr. Ian Brown on Privacy, Trust and Biometrics</title>
    <link>https://cis-india.org/events/ian</link>
    <description>
        &lt;b&gt; Trust is hard to build, but easy to lose. What factors affect individuals' trust in new technologies? How can governments create citizen trust in biometric security tools? Can biometrics be designed to be privacy-friendly? And how did these questions lead to the cancellation of the UK's national identity scheme, after a decade of development costing tens of millions of pounds?
About the speaker: Dr Ian Brown's research is focused on public policy issues around information and the Internet, particularly privacy and copyright. He also works in the more technical fields of communications security and healthcare informatics.
&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/ian'&gt;https://cis-india.org/events/ian&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Lecture</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T07:15:29Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-publicstatement-UID">
    <title>Public Statement to Final Draft of UID Bill </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-publicstatement-UID</link>
    <description>
        &lt;b&gt;The final draft of the UID Bill that will be submitted to the Lok Sabha was made public on 8 November 2010. If the Bill is approved by Parliament, it will become a legal legislation in India. The following note contains Civil Society's response to the final draft of the Bill. &lt;/b&gt;
        
&lt;p&gt;On 8 November 2010, the UID Authority issued the final draft of the UID Bill that will be submitted to the Lok Sabha for review and approval. Earlier this year in June 2010 the Authority issued a draft UID Bill to the public for comment and review. Civil Society responded with a detailed summary and high summary of points that amended the draft or were missing in the draft Bill. We are disappointed that none of the concerns raised by Civil Society, including those listed below, were addressed.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Architecture&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The centralized architecture of the UID project is unnecessary. A federated and decentralized structure to the UID project would achieve the same goal of providing identity, authentication, and delivery of benefits.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Scope&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The scope of the Bill is overboard. Though the main purpose of the Bill is to facilitate the delivery of benefits to residents, the loose language and&amp;nbsp;intermixing of terms&amp;nbsp;creates a threat&amp;nbsp;that data will be collected and used&amp;nbsp;beyond delivery of benefits&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Voluntary and not Mandatory&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill should prohibit the denial of goods, services, entitlements, and benefits for lack of a UID number- provided that an individual furnishes equivalent ID, thus ensuring that the &lt;em&gt;Aadhaar&lt;/em&gt; number is truly voluntary.&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Inadequate Privacy Safeguards&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill inadequately elaborates on the principles of privacy relating to identity and transaction data. The protections needed should be self-contained within the Bill. Thus, the UID Bill itself should be clear and concise about&amp;nbsp;data collection, transfer, retention, security, and dissemination.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Unwarranted Data Retention&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill does not provide adequate privacy protection for transaction data. In particular section 32(2) empowers the Authority to determine the duration that data is to be retained for.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Lack of accountability for all Actors&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill holds only the Authority accountable for violations. Rather the Bill needs to hold enrolling agencies, registrars, and other service providers accountable. Furthermore, the Bill does not provide adequate regulations or accountability for the data that are outsourced.&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Lack of Exceptions&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill does not detail the circumstances and categories of people who will be excused or accommodated with respect to the issuing of &lt;em&gt;Aadhaar&lt;/em&gt; numbers or authentication of transactions.&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Lack of Anonymity&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill does not provide adequate specificity as to the situations in which anonymity will be preserved and/or an&lt;em&gt; Aadhaar &lt;/em&gt;number should not be requested.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Inadequacy of Penalties&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The penalties provided in the Bill are inadequate, because they do not cover several types of misuse.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Unaffordability of Fees&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;It is incompatible with the Bill’s stated purpose of inclusion to require an individual to pay to be authenticated.&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Lack of Rollback and Ombudsman Office&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill does not provide adequate redress for system/transaction errors and fraud.&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Inappropriate Structure and Governance&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill does not provide appropriate judicial and parliamentary oversight.&lt;/p&gt;
&lt;p&gt; Upon comparison of the draft Bill and the final Bill, CIS finds the following changes the most&amp;nbsp;&amp;nbsp; significant:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Definition of Resident&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Section 2 (q): “resident” means an individual usually residing in a
 village or rural area or town or ward or demarcated area (demarcated by
 the Registrar General of Citizen Registration) within&amp;nbsp; ward in a town 
or urban area”&lt;em&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Comment&lt;/em&gt;: This section clarifies the definition of 
‘resident’ from the draft Bill, which defined resident as an “individual
 usually residing within the territory of India”. By specifying that 
individuals in demarcated areas will not receive UID numbers, the 
definition of resident is brought into line with the scope of the Bill 
as laid out in the preamble. We see this change as a positive revision.&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Prohibition of Dissemination of Information&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Section 30 (3): “Notwithstanding anything contained in 
any other law and save as otherwise provided in this Act, the Authority 
or any of its officer or other employee or any agency who maintains the 
Central Identities Data Repository shall not, whether during his service
 as such or thereafter, reveal any information stored in the Central 
Identities Data Repository to any person”&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Comment&lt;/em&gt;: This 
section prohibits the dissemination of any information that is stored in
 the Central Identities Data Repository. This prohibition extends to 
anyone or any entity that handles information, and supersedes other laws
 that might permit dissemination of information. We see this change as a
 positive revision. &lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Disclosure of Information in the Case of a National Security&lt;br /&gt;&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;Section 33 (b):“Any disclosure of information (including identity information) made in the interests of national security in pursuance of a direction to that effect issued by an officer or officers not below the rank of Joint Secretary or equivalent in the Central Government specifically authorised in this behalf by an order of the Central Government”&lt;strong&gt;&lt;em&gt;&amp;nbsp; &lt;/em&gt;&lt;/strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Comment&lt;/em&gt;: This section is a minor improvement on the previous draft since it requires&amp;nbsp; specific authorization from the Central Government (rather than from a Minister in charge). Unfortunately, however,&amp;nbsp; it retains the undesirable language of "national security" from the previous draft which, as we had previously pointed out,&amp;nbsp; is not currently clearly defined under Indian law. An alternative phrase that we recommend instead is the Constitutional vocabulary of&amp;nbsp; "public emergency" which already has a considerable volume of judicial reasoning that has elaborated what it means.&amp;nbsp; Eg. in Hukam Chand v. Union of India (AIR 1976 SC 789) it was held that a public emergency "is one which raises problems concerning the interest of public safety", the sovereignty and integrity of India, the security of the State, friendly relations with foreign States or public order, or the prevention of incitement to the commission of an offence."&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-publicstatement-UID'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-publicstatement-UID&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-22T05:48:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/public-panel-discussion-digitalisation-for-social-change">
    <title>Public Panel Discussion: Digitalisation for Social Change</title>
    <link>https://cis-india.org/internet-governance/news/public-panel-discussion-digitalisation-for-social-change</link>
    <description>
        &lt;b&gt;Sunil Abraham is participating as a panelist in a discussion co-organized by Mount Carmel College, Bangalore and Friedrich-Ebert-Stiftung, India Office in Bangalore on August 22, 2016.&lt;/b&gt;
        &lt;p&gt;Welcome Remarks by Sunanda BV , Mount Carmel College, Bangalore and Patrick Ruether, Friedrich-Ebert-Stiftung, India Office&lt;/p&gt;
&lt;p&gt;On the Panel:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Digital Solutions to social problems and development challenges or Social Entrepreneurship and digital transformation: Sunil Abraham, Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;Gendered perspective on digital transformation: Anita Gurumurthy , IT for Change&lt;/li&gt;
&lt;li&gt;India 2030 – the change I want Maureen Almeida, Student, Mount Carmel College&lt;/li&gt;
&lt;li&gt;Technology as best practice: Anurag Shanker, NASVI, New Delhi&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Note: Each panelist will give an input for about 5-7 minutes and this will be followed by Q&amp;amp;A session moderated by Rakhee Bakshee, Women's Feature Service&lt;/p&gt;
&lt;p&gt;For more info contact: Jyoti Rawal, &lt;a class="mail-link" href="mailto:jyoti@fesindia.org"&gt;jyoti@fesindia.org&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/public-panel-discussion-digitalisation-for-social-change'&gt;https://cis-india.org/internet-governance/news/public-panel-discussion-digitalisation-for-social-change&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-08-19T13:47:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis">
    <title>Public Law and Jurisprudential Issues of Privacy: A Talk at CIS</title>
    <link>https://cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis</link>
    <description>
        &lt;b&gt;On Friday, September 27, 2013, Abhayraj Naik will give a talk on public law and jurisprudential issues related to privacy. CIS will host the talk at its office in Bangalore from 4.30 p.m. to 6.00 p.m.&lt;/b&gt;
        
&lt;h3&gt;Abhayraj Naik&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Abhayraj Naik is a graduate of the National Law School of  India University, Bangalore, and the Yale Law School. He  previously  taught public law at the Jindal Global Law School of the OP  Jindal Global University where he also co-directed  the Centre for Public Law &amp;amp; Jurisprudence from September 2009 to  July 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Abhay is actively associated with the Environment Support Group, Bangalore  (&lt;a href="http://www.esgindia.org"&gt;http://www.esgindia.org&lt;/a&gt;), and has also been associated with the  Meiklejohn Civil Liberties Institute, Berkeley, USA; Universities Allied  for Essential Medicines, USA; Culture Move, Bangalore and other  national and international advocacy, activism and research groups for  several years now.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Abhay's research interests include legal theory,  philosophy, criminal justice reform, urban governance, ecology, and  technology policy. His current research projects include interdisciplinary studies  of urban street vending, information privacy, fiduciary duties,  forgiveness, biopiracy, and criminal justice reform.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;He enjoys cycling, travel, poetry, music, and radical educational and ecological activism.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Abhay currently teaches at the Azim Premji University in Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/eTWSXa8g0gA" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis'&gt;https://cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-12-30T12:39:23Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/public-debate-on-differential-pricing-series-3">
    <title>Public Debate on 'Differential Pricing': Series 3</title>
    <link>https://cis-india.org/internet-governance/events/public-debate-on-differential-pricing-series-3</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, in association with ICRIER and the Department of Civics and Politics, University of Mumbai, is pleased to announce “A Series of Public Debates on Differential Pricing” in the cities of Bangalore, Mumbai and New Delhi. The third public debate will be held at India Habitat Centre, Lodhi Road near Air Force Bal Bharti School, New Delhi on February 5, 2016.&lt;/b&gt;
        &lt;div class="kssattr-target-parent-fieldname-text-b0c8dac0221d45df8f2e6e8e3a8d7a4a kssattr-macro-rich-field-view kssattr-templateId-widgets/rich kssattr-atfieldname-text " id="parent-fieldname-text-b0c8dac0221d45df8f2e6e8e3a8d7a4a"&gt;
&lt;p style="text-align: justify; "&gt;In light of the recent  consultation paper released by the Telecom Regulatory Authority of India  (TRAI), the objective of these debates will be to deconstruct the issue  of differential pricing through a discussion on the variety of views  this subject has attracted. Speakers will also discuss possible  implications of differential pricing policy on questions of access,  diversity, competition and entrepreneurship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each debate will comprise three rounds.  In the first round, speakers will present the body of their arguments  over 10 minutes each. The second round will be a rebuttal round, with  each speaker being given 5 minutes. The third and final round will see  the floor being opened to the audience who will engage the speakers with  comments and questions.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/blog/public-debates-on-differential-pricing" class="internal-link"&gt;Download the Invite&lt;/a&gt;&lt;/h2&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/public-debate-on-differential-pricing-series-3'&gt;https://cis-india.org/internet-governance/events/public-debate-on-differential-pricing-series-3&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vidushi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-28T13:53:12Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/public-debate-on-differential-pricing-series-2">
    <title>Public Debate on 'Differential Pricing': Series 2</title>
    <link>https://cis-india.org/internet-governance/events/public-debate-on-differential-pricing-series-2</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, in association with ICRIER and the Department of Civics and Politics, University of Mumbai, is pleased to announce “A Series of Public Debates on Differential Pricing” in the cities of Bangalore, Mumbai and New Delhi. The second public debate will be held at Pherozeshah Mehta Bhavan, Vidyanagari, Kalina, Mumbai on February 3, 2016. 
 &lt;/b&gt;
        &lt;div class="kssattr-target-parent-fieldname-text-b0c8dac0221d45df8f2e6e8e3a8d7a4a kssattr-macro-rich-field-view kssattr-templateId-widgets/rich kssattr-atfieldname-text " id="parent-fieldname-text-b0c8dac0221d45df8f2e6e8e3a8d7a4a"&gt;
&lt;p style="text-align: justify; "&gt;In light of the recent  consultation paper released by the Telecom Regulatory Authority of India  (TRAI), the objective of these debates will be to deconstruct the issue  of differential pricing through a discussion on the variety of views  this subject has attracted. Speakers will also discuss possible  implications of differential pricing policy on questions of access,  diversity, competition and entrepreneurship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each debate will comprise three rounds.  In the first round, speakers will present the body of their arguments  over 10 minutes each. The second round will be a rebuttal round, with  each speaker being given 5 minutes. The third and final round will see  the floor being opened to the audience who will engage the speakers with  comments and questions.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/blog/public-debates-on-differential-pricing" class="internal-link"&gt;Download the Invite&lt;/a&gt;&lt;/h2&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/public-debate-on-differential-pricing-series-2'&gt;https://cis-india.org/internet-governance/events/public-debate-on-differential-pricing-series-2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vidushi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-28T13:51:06Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/a-series-of-public-debates-on-differential-pricing-series-1">
    <title>Public Debate on 'Differential Pricing': Series 1</title>
    <link>https://cis-india.org/internet-governance/events/a-series-of-public-debates-on-differential-pricing-series-1</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, in association with ICRIER and the Department of Civics and Politics, University of Mumbai, is pleased to announce “A Series of Public Debates on Differential Pricing” in the cities of Bangalore, Mumbai and New Delhi. The first public debate will be held at the Centre for Internet &amp; Society office in Bangalore on February 1, 2016. &lt;/b&gt;
        &lt;div class="kssattr-target-parent-fieldname-text-b0c8dac0221d45df8f2e6e8e3a8d7a4a kssattr-macro-rich-field-view kssattr-templateId-widgets/rich kssattr-atfieldname-text " id="parent-fieldname-text-b0c8dac0221d45df8f2e6e8e3a8d7a4a"&gt;
&lt;p style="text-align: justify; "&gt;In light of the recent  consultation paper released by the Telecom Regulatory Authority of India  (TRAI), the objective of these debates will be to deconstruct the issue  of differential pricing through a discussion on the variety of views  this subject has attracted. Speakers will also discuss possible  implications of differential pricing policy on questions of access,  diversity, competition and entrepreneurship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each debate will comprise three rounds.  In the first round, speakers will present the body of their arguments  over 10 minutes each. The second round will be a rebuttal round, with  each speaker being given 5 minutes. The third and final round will see  the floor being opened to the audience who will engage the speakers with  comments and questions.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="resolveuid/a01978fec6244f86b178b26006f1b312" class="internal-link"&gt;Download the Invite&lt;/a&gt;&lt;/h2&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/a-series-of-public-debates-on-differential-pricing-series-1'&gt;https://cis-india.org/internet-governance/events/a-series-of-public-debates-on-differential-pricing-series-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vidushi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-27T13:51:06Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/public-data-on-web">
    <title>Public data on the Web leaves much to be desired</title>
    <link>https://cis-india.org/news/public-data-on-web</link>
    <description>
        &lt;b&gt;Making government data accessible to all is a vital challenge, says Deepa Kurup in her article published in the Hindu on May 28, 2011.&lt;/b&gt;
        
&lt;p&gt;Tim Berners-Lee, chief architect and inventor of the World Wide Web and an ardent advocate of open data, said, earlier this year, that countries should be judged on their willingness to open up public data to their citizens. This, along with 'network neutrality', he considered as important as free speech, he had emphasised, adding that this was particularly critical for developing nations.&lt;/p&gt;
&lt;p&gt;In January 2011, the British Government, led by Mr. Berners-Lee, launched www.data.gov.uk, a site aimed at creating a platform for disclosing data to citizens, civil society organisations and even private institutions from a wide range of government departments and processes.&lt;/p&gt;
&lt;p&gt;In India, while ‘civic hackers' and non-governmental organisations are coming up with interesting initiatives that attempt to put government data in the form of mash-ups and easily readable content online, government data on the Web leaves much to be desired. Half a decade after the powerful and progressive Right to Information Act was implemented, accessing government data online is still a challenge. Given the huge amount of public information that has been generated this year through Census 2011, and some sections of these even being GIS mapped, it is imperative that government data be ‘set free', researchers say. They believe that this could not only aid governance and public planning but also increase citizen engagement in public processes.&lt;/p&gt;
&lt;h3&gt;Technology aid&lt;/h3&gt;
&lt;p&gt;A recent study by a research team at the Centre for Internet and Society, a Bangalore-based research organisation, finds that despite challenges, the Government and bureaucrats in India are receptive to using technology to open up more data to the public. Speaking to policymakers across the country, the report records various impediments and accessibility barriers, and surveys existing open data initiatives in the Government.&lt;/p&gt;
&lt;p&gt;Drawing from these, the report presents a set of recommendations to help the Government move towards an open data ecosystem. These include re-examining the end goals and the end users of this data, involving volunteers and citizens in putting out the data in accessible forms, and seeking support from pre-existing ‘open content' communities such as Wikipedia editors or open street mappers, to name a few.&lt;/p&gt;
&lt;h3&gt;For a start&lt;/h3&gt;
&lt;p&gt;Nishant Shah, researcher at CIS, says it is heartening to see that governments, and policymakers, are already thinking along the lines of open government data. There are several initiatives, such as the Bhoomi project or Nemmadi of the Karnataka Government, that may not look at themselves as open data initiatives, but are certainly going that way, Mr. Shah points out. There are several critical infrastructure changes that are happening such as the use of computers at different levels of governance, setting up of community Internet centres in villages and various e-governance programmes; so there is a lot of hope that data will be accessible to more people, he adds.&lt;/p&gt;
&lt;h3&gt;Challenges&lt;/h3&gt;
&lt;p&gt;However, Mr. Shah points out that while there is talk about taking government data into the public domain, the larger ecosystem for this has not been worked out. The report points out that there is insufficient standardisation, while e-governance, to a large degree, has been far from perfect. System interoperability issues and the larger issues of privacy (in the absence of any existing law) are both challenges.&lt;/p&gt;
&lt;p&gt;Speaking to &lt;em&gt;The Hindu&lt;/em&gt;, a senior official from the department of e-governance said it was indeed on the Government's agenda to open up more data, and offer it in more accessible formats. He pointed out that interoperability of formats is a huge problem, one that he hopes the recently enforced National Policy on Open Standards will accurately address.&lt;/p&gt;
&lt;p&gt;"However, it is a gargantuan process to get departments across the country, at different levels of governance, to comply. This may take time and effort. Another problem is that the input formats are not standardised, which means a lot of vital data is being offered in cumbersome formats that are barely useable," he says. However, a bigger concern is to provide the information ecosystem to take this to the millions that are left out of the Internet loop. That is a greater challenge, he points out.&lt;/p&gt;
&lt;p&gt;Read the original story published by the Hindu &lt;a class="external-link" href="http://www.thehindu.com/todays-paper/tp-national/article2056061.ece"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/public-data-on-web'&gt;https://cis-india.org/news/public-data-on-web&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-05-30T07:38:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-august-3-2015-siladitya-ray-proxies-and-vpns">
    <title>Proxies and VPNs: Why govt can't ban porn websites?</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-august-3-2015-siladitya-ray-proxies-and-vpns</link>
    <description>
        &lt;b&gt;The government's move to block more than 800 pornographic websites has led experts to question whether this latest attempt to police the internet is even feasible.

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Siladitya Ray was &lt;a class="external-link" href="http://www.hindustantimes.com/technology-topstories/is-the-government-s-attempt-to-block-online-porn-futile/article1-1375866.aspx"&gt;published in the Hindustan Times&lt;/a&gt; on August 3, 2015. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Internet service providers (ISPs) have confirmed they received  letters from the Department of Telecommunications (DoT) on Saturday that  directed them to block certain websites. But can the government stop  users from visiting porn sites?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The answer seems to be no.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It is extremely easy to circumvent these blocks, using virtual  private networks (VPNs) and proxies that anonymise your traffic," said  Pranesh Prakash, policy director at the Centre for Internet and Society  in Bengaluru.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A cursory Google search on how to unblock porn websites throws up  millions of how-tos and guides on using proxies and VPNs to get around  restrictions set by authorities. All these services anonymise users’ web  traffic by routing them through foreign servers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to data from Pornhub, one of the world's biggest porn  sites, India ranks fifth for the most daily visitors to the website.  Pornhub saw a total of 78.9 billion video views globally in 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government can try to keep up with proxies and block them too.  But as proxies change on a daily basis and there are always dozens of  functioning proxies to choose from across, blocking all of them will be a  near impossible task.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tor, an anonymity network, is also a popular way to surf blocked sites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But is it legal to circumvent blocks put in place by authorities by using VPNs and proxies?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no law in India that prohibits viewing pornography, experts  say. Section 67 of the Information Technology Act only deals with  "publishing obscene information in electronic form".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision has been interpreted as a measure to criminalise the  posting of pornographic content online. However, accessing "obscene"  content privately – such as within the four walls of a person’s home –  is not illegal, say experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In July, while hearing a petition seeking the blocking of  pornographic websites, Supreme Court Chief Justice HL Dattu wondered  whether the court could restrain an adult from watching pornography  within his home and described such a ban as a violation of Article 21 of  the Constitution, which grants the right to personal liberty to its  citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But what about the legality of using VPNs and proxies? “There are no  laws preventing the use of VPNs and proxies in India," said Prakash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Are proxies and VPNs safe?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the use of proxies and VPNs is very simple, they do come with  their own set of problems. These services have access to all your  browsing data and may push adware and other forms of malware.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash advised that users should only choose services that are well known and have a good reputation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Sites like TorrentFreak put out annual lists of the top VPNs  available," he said. These can be used as a guide to determine what  services are safe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-august-3-2015-siladitya-ray-proxies-and-vpns'&gt;https://cis-india.org/internet-governance/news/hindustan-times-august-3-2015-siladitya-ray-proxies-and-vpns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-09-13T08:26:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-times-of-india-mahendra-singh-may-18-2017-provide-hacker-details-outfit-that-claimed-data-leak-told">
    <title>Provide hacker details, outfit that claimed data leak told</title>
    <link>https://cis-india.org/internet-governance/news/the-times-of-india-mahendra-singh-may-18-2017-provide-hacker-details-outfit-that-claimed-data-leak-told</link>
    <description>
        &lt;b&gt;The Unique Identification Authority of India (UIDAI), the regulatory authority for Aadhaar, has written to a Bengaluru-based research organisation, Centre for Internet &amp; Society (CIS), seeking details about a suspected hack attack on government websites that led to the leak of information about 13 crore users.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Mahendra Singh was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/india/provide-hacker-details-outfit-that-claimed-data-leak-told/articleshow/58725132.cms"&gt;published in the Times of India&lt;/a&gt; on May 18, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;In a recent report, CIS had highlighted that websites run by various  government departments, owing to a poor security framework, had publicly  displayed sensitive personal financial information and Aadhaar numbers  of beneficiaries of certainprojects.   &lt;br /&gt; &lt;br /&gt; In its letter, UIDAI argued that the data downloaded from one of the  websites could not have been accessed unless the website was hacked. As  hacking is a grave offence under the law, the UIDAI has asked CIS to  provide details of the persons involved in the data theft.   &lt;br /&gt; &lt;br /&gt; According to a source, the UIDAI said that access to data on the  website for the 'National Social Assistance Program' was only possible  for someone in possession of authorised login details, or if the site  (http://nsap.nic.in) was hacked or breached. The UIDAI said in its  letter that such illegal access was against the provisions of the  Aadhaar Act, 2016, and the IT Act, 2000, and that the persons involved  had committed a grave offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Asking the CIS to reply before May 30, the UIDAI also said, "Aadhaar system is a protected system under Section 70 of the IT Act, 2000, the violation of which is punishable with rigorous imprisonment for a period up to 10 years." It added that the penalty clauses for violations are also provided in Section 36, Section 38 and Section 39 of the Aadhaar Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI, however, maintained that even if the Aadhaar details were known to someone it did not pose a real threat to the people whose information was publicly available because the Aadhaar number could not be misused without biometrics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI letter said, "While, as your report suggests, there is a need to strengthen IT security of government websites, it is also important that the persons involved in hacking such sensitive information are brought to justice for which your assistance is required under the law."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Your report mentions 13 crore people's data has been 'leaked'. Please specify how much of this data had been downloaded by you or are in your possession or in the possession of any other persons that you know. Please provide the details," the UIDAI added in its letter. The UIDAI also urged CIS to provide the details of the persons/organisations with whom it shared the data, if it did.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-times-of-india-mahendra-singh-may-18-2017-provide-hacker-details-outfit-that-claimed-data-leak-told'&gt;https://cis-india.org/internet-governance/news/the-times-of-india-mahendra-singh-may-18-2017-provide-hacker-details-outfit-that-claimed-data-leak-told&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T12:14:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/protest-at-censorship">
    <title>Protest@ censorship.com </title>
    <link>https://cis-india.org/news/protest-at-censorship</link>
    <description>
        &lt;b&gt;Activism goes online as more angry young citizens decide to make their voices heard, writes Sandhya Soman in an article published in the Times of India. Pranesh Prakash is quoted in the article.&lt;/b&gt;
        
&lt;p&gt;If there was a software code to ‘Invite All’, then Ashish D and friends would’ve called the world to land up at Gateway of India on June 9. The next best option for this netizen from Mumbai was to go online.&lt;/p&gt;
&lt;p&gt;Hacktivism –– a form of activism for social change that uses computers and electronic networks –– is back. And the most recent protest is from hacker group Anonymous, which is trying to gather public support to stem internet censorship and blocking of websites in India by service providers and the government recently.&lt;/p&gt;
&lt;p&gt;Since showing up in front of the town hall is not enough, Ashish has set up a Facebook page. Fellow netizens, irritated by the arbitrary blocking of sites and impressed by Anonymous OpIndia’s jabs at websites of political parties and corporates, are signing up to discuss the best possible venues to protest from.&lt;/p&gt;
&lt;p&gt;Is there a better place than Marina beach in Chennai to make the maximum impact, wonders one user while another says it would be better to split up to cover more area in Mumbai. According to Pranesh Prakash, lawyer and programme manager at The Centre for Internet and Society, a Bangalore-based research organisation, a strong online presence helps protests to get publicity. A lot of the Jan Lokpal agitation happened online, he says.&lt;/p&gt;
&lt;p&gt;“It is not enough to fast at Jantar Mantar. If you get 1,000 people to click ‘like’ or 40 people to retweet your tweet, then the site becomes the default area of protest,” he says. If those petitioners are 10 influential people, then it carries more weight with the media than a few hundred shouting slogans on the street.&lt;/p&gt;
&lt;p&gt;“Also called electronic civil disobedience, hacktivism is geared to political ends,” writes Pramod K Nayar in his book ‘An Introduction to New Media and Cybercultures.’ Virtual sit-ins involving intellectuals and ordinary citizens and bombarding authorities with emails have been used by Mexican revolutionaries, Tamil separatists and protesters in Iran and the Middle East. “Hacktivism is clearly here to stay,” writes Nayar.&lt;/p&gt;
&lt;p&gt;But it is not enough to collect a few digital signatures, says Nithin Manayath, one of the people behind the 2009 ‘Pink Chaddi’ campaign, which sought to protest in an irreverent manner the attacks against women by the radical Sri Ram Sena. Manayath and his friends sustained the campaign through a Facebook group, which saw thousands of pairs of pink underwear being sent to the office of the group that attacked women for what it considered ‘violations of Indian culture’.&lt;/p&gt;
&lt;p&gt;“Marches, candlelight vigils and dharnas are something we do regularly. By the tenth dharna you will be so jaded that you go to the protest venue to meet friends,” says Manayath. After a while, this happens to online petitions also if you are not thinking about what you are doing. “What I liked about the ‘Pink Chaddi’ campaign was that we were responding to violence with a shameless act. It made me aware about many things and the novelty of the protest resonated with many people,” he says.&lt;/p&gt;
&lt;p&gt;Though the current campaign is going the offline way on June 9, the hacking and denial of service attacks on websites by Anonymous have ensured that issue of blocking got publicity. “There is corporate and private censorship of internet and it is being done without enough proof of who is violating the copyrights of moviemakers. If these protests create awareness about the larger issues and developments in the areas of e-governance, IT Act and copyright law, then they could be helpful,” says Pranesh Prakash.&lt;/p&gt;
&lt;p&gt;Meanwhile, Anonymous OpIndia, which is hoping for lifting of ban on websites, is already getting feelers from eager citizens on future issues. “Many people have requested us to protest other issues such gasoline price hike,” says a member. “And we always tell them that there are no strict rules, they can protest as per their needs.”&lt;/p&gt;
&lt;h3&gt;NET ANGST&lt;/h3&gt;
&lt;p&gt;Through Facebook, the ‘Pink Chaddi’ campaign of 2009 encouraged women to send undergarments to Sri Ram Sena. The right-wing group had attacked women for ‘violations of Indian culture’&lt;/p&gt;
&lt;p&gt;Jan Lokpal campaign in 2011 had support from various online forums. They sent petitions to political parties and inundated a government website with e-mails.&lt;/p&gt;
&lt;p&gt;Following the blocking of websites due to a court order to prevent copyright violations.&lt;/p&gt;
&lt;p&gt;Anonymous OpIndia targeted government and corporate websites. It is mobilising people for protests in nearly 11 cities on June 9.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://epaper.timesofindia.com/Default/Scripting/ArticleWin.asp?From=Archive&amp;amp;Source=Page&amp;amp;Skin=TOINEW&amp;amp;BaseHref=TOICH/2012/06/03&amp;amp;PageLabel=4&amp;amp;EntityId=Ar00400&amp;amp;ViewMode=HTML"&gt;Read the original here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/protest-at-censorship'&gt;https://cis-india.org/news/protest-at-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-05T04:23:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/protection-of-privacy-in-mobile-phone-apps">
    <title>Protection of Privacy in Mobile Phone Apps</title>
    <link>https://cis-india.org/internet-governance/blog/protection-of-privacy-in-mobile-phone-apps</link>
    <description>
        &lt;b&gt;The term “Fintech” refers to technology-based businesses that compete against, enable and/or collaborate with financial institutions. The year 2015 was a critical year for the Indian fintech industry, which saw the rise of numerous fintech start-ups, incubators and investments from the public and private sector.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;According to NASSCOM, the Indian fintech market is worth an estimated USD 1.2 billion, and is predicted to reach USD 2.4 billion by 2020.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;The services brought forth by Fintech, such as digital wallets, lending, and insurance, have transformed the ways in which businesses and institutions execute dayto-day transactions. The rise of fintech in India has rendered the nation’s market a point of attraction for global investment.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;Fintech in India is perceived both as a catalyst for economic growth and innovation, as well as a means of financial inclusion for the millions of unbanked individuals and businesses. The government of India, along with regulators such as SEBI (Securities and Exchange Board of India) and RBI (Reserve Bank India), has consistently supported the digitalization of the nation’s economy and the formation of a strong fintech ecosystem through funding and promotional initiatives.&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The RBI has been pivotal in enabling the development of India’s fintech sector and adopting a cautious approach in addressing concerns around consumer protection and law enforcement. Its key objective as a regulator has been to create an environment for unimpeded innovations by fintech, expanding the reach of banking services for unbanked populations, regulating an efficient electronic payment system and providing alternative options for consumers. The RBI’s prime focus areas for enabling fintech have been around payment, lending, security/biometrics and wealth management. For example, the RBI has introduced “Unified Payment Interface” with the NPCI (National Payments Corporation of India), which has been critical in revolutionizing digital payments and pushing India closer to the objective of a cash-less society. It has also released a consultation paper on regulating Peer 2 Peer (P2P) lending market in India, highlighting the advantages and disadvantages of regulating the sector.&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The consultation paper offers a definition of P2P lending as well as a general explanation of the activity and the digital platforms that facilitate transactions between lenders and borrowers. It also provides a set of arguments for and against regulating P2P lending. The arguments against regulating the sector mainly pertain to the risk of stifling the growth of an innovative, efficient and accessible avenue for borrowers who either lack access to formal financial channels or are denied loans by them.&lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is the general consensus around the positive impact of the Fintech sector in India: its facilitation of financial inclusion and economic opportunity. However, the paper lists many more arguments for regulation than against. One of the main points made is with regards to P2P lending’s potential to disrupt the financial sector by challenging traditional banking channels. There is also the argument that, if properly regulated, the P2P lending platforms can more efficiently and effectively exercise their potential of promoting alternative forms of finance.&lt;a href="#fn6" name="fr6"&gt;[6] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The paper concludes that the balance of advantage would lie in developing an appropriate regulatory and supervisory toolkit that facilitates the orderly growth of the P2P lending sector in order to harness its ability to provide an alternative avenue for credit for the right borrowers&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The RBI’s regulatory framework for P2P lending platforms encompasses the permitted activity, prudential regulations on capital, governance, business continuity plan (BCP) and customer interface, apart from regulatory reporting.&lt;a href="#fn8" name="fr8"&gt;[8] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Securities and Exchange Board of India (SEBI) is also a prominent regulator of the Indian fintech sector. They issued a consultation paper on “crowdfunding”, which is defined as the solicitation of funds (small amounts) from multiple investors through a web-based platform or social networking site for a specific project, business venture or social cause. P2P lending is then a form of crowdfunding, which can be understood as an umbrella term that covers fintech lending practices. SEBI’s paper aimed to provide a brief overview of the global scenario of crowdfunding including the various prevalent models under it, the associated benefits and risks, the regulatory approaches in different jurisdictions, etc. It also discusses the legal and regulatory challenges in implementing the framework for crowdfunding. The paper proposes a framework for ushering in crowdfunding by giving access to capital markets to provide an additional channel of early stage funding to Start-ups and SME’s and seeks to balance the same with investor protection.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; Unlike RBI’s consultation paper on P2P lending, SEBI’s paper on crowdfunding was intended mainly to invite discussion and not necessarily to implement a framework for regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the benefits cited in SEBI’s crowdfunding paper pertain to the commonly mentioned advantages of fintech: economic opportunity for the SME sector and start-ups, alternative lending systems to keep SMEs alive when traditional banks crash, new investment avenues for the local economy and increased competition in the financial sector.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The paper also lists a set of risks that suggest the need for a regulatory framework for crowdfunding. For example, it mentions the “substitution of institutional risk by retail risk”, meaning that individual lenders, who’s risk tolerance may be low, bear the risk of low/no return investors when they lend to SMEs without adequate assessment of credit worthiness. Also, there is the risk that the digital platform that facilitates lending and issues all the transactions, may not conduct proper due diligence. If the platform is temporarily shut down or closed permanently, no recourse is available to the investors.&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The SEBI paper mentions a long list of other risks associated with crowdfunding, mostly associated with systemic failures, loan defaults, fraud practices, and information asymmetry. Information asymmetry refers partially to the chance that lending decisions are made based on incomplete data sets that are based on social networking platforms. There is a lack of transparency and reporting obligations in issuers including with respect to the use of funds raised.&lt;a href="#fn12" name="fr12"&gt;[12] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similar to the RBI consultation paper, SEBI makes a decent effort to weigh the costs and benefits of crowdfunding practices but only does this from an economic/financial perspective. Most of the cited risks, benefits and concerns tend to overlook information security and risks of privacy breaches of the implicated borrowers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India Stack is a paperless and cashless service delivery system that has been supported by the Indian government as part of the fintech sector. It is a new technology paradigm that is designed to handle massive data inflows, and is poised to enable entrepreneurs, citizens and governments to interact with one another transparently. It is intended to be an open system to electronically verify businesses, people and services. It allows the smartphone to become the delivery platform for services such as digital payments, identification and digital lockers. The vision of India Stack is to shift India towards a paperless economy.&lt;a href="#fn13" name="fr13"&gt;[13] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The central government, based on its experience with the Aadhaar project, decided to launch the opendata initiative in 2012 supported by an open API policy, which would pave the way for private technology solutions to build services on top of Aadhaar and to make India a digital cash economy. Unified Payments Interface (UPI), which will make mobile payments card-less and completely digital, allows consumers to transact directly through their bank account with a unique UPI identity that syncs to Aadhaar’s verification and connects to the merchant, the settlement and the issuing bank to close transactions.&lt;a href="#fn14" name="fr14"&gt;[14] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is suspected that India Stack will shift in business models in banking from low-volume, high-value, high-cost and high fees to high-volume, low-value, low cost and no fees. This well lead to a drastic increase in accessibility and affordability, and the market force of consumer acquisition and the social purpose of mass inclusion will converge.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India Stack serves as an example of how the Government of India has supported initiatives that would promote the fintech sector while facilitating economic growth and financial opportunity for unbanked individuals. However, there is continuous discussion around India Stack’s attachment to the Aadhaar system, which can lead to the exclusion of unregistered individuals from the benefits that would otherwise be reaped from the open-data initiative. It can also result in many privacy and security breaches when records of individuals’ daily transactions are attached to their Aadhaar numbers, which carry their biometric information and is linked to other personal data that is held by the government such as health records.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/protection-of-privacy-in-mobile-phones.pdf/view"&gt;&lt;b&gt;Download the Full Report&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. KPMG: https://assets.kpmg.com/content/dam/kpmg/pdf/2016/06/FinTech-new.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. RBI 2P2 Consultation Paper, https://rbidocs.rbi.org.in/rdocs/content/pdfs/CPERR280416.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. SEBI Crowdfunding consultation paper, http://www.sebi.gov.in/cms/sebi_data/attachdocs/1403005615257.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Krishna, https://yourstory.com/2016/07/india-stack/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Nilekani, http://indianexpress.com/article/opinion/columns/the-coming-revolution-in-indian-banking-2924534/&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/protection-of-privacy-in-mobile-phone-apps'&gt;https://cis-india.org/internet-governance/blog/protection-of-privacy-in-mobile-phone-apps&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Hitabhilash Mohanty and Edited by Leilah Elmokadem</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-15T14:18:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/medianama-march-18-2019-zaheer-merchant-proposed-intermediary-liability-rules-threat-privacy-and-free-speech">
    <title>Proposed Intermediary Liability Rules threat to privacy and free speech, global coalition tells MeitY</title>
    <link>https://cis-india.org/internet-governance/news/medianama-march-18-2019-zaheer-merchant-proposed-intermediary-liability-rules-threat-privacy-and-free-speech</link>
    <description>
        &lt;b&gt;“We respectfully call on you to withdraw the draft amendments proposed to the Information Technology (Intermediary Guidelines) Rules in December. As published, the draft amendments would erode digital security and undermine the exercise of human rights globally.”&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Zaheer Merchant was published by &lt;a class="external-link" href="https://www.medianama.com/2019/03/223-proposed-intermediary-liability-rules-threat-to-privacy-and-free-speech-global-coalition-tells-meity/"&gt;Medianama &lt;/a&gt;on March 18, 2019.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;A global coalition of 31 civil society organizations and technology  experts has called on MeitY to reconsider the proposed amendments to the  Intermediary Liability Rules, terming them a threat to privacy and free  speech. In a letter to the ministry dated March 15, the coalition said  that the proposed amendments “would harm fundamental rights and the  space for a free internet, without necessarily addressing the problems  that the ministry aims to resolve.” Some of the signatories are Centre  for Internet and Society, SFLC.in, Internet Freedom Foundation,  Government Accountability Project and Human Rights Watch, among others  (A copy of the letter is attached at the bottom). The letter breaks down  its reasons for opposing the proposed amendments:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. Traceability would undermine security, lead to surveillance&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the proposed guidelines, intermediaries would have to ensure  ‘traceability’ of messages by providing information related to its  originator and receivers. This, the letter argues, would force  intermediaries to undermine the security of of their platforms and  create a surveillance regime. “Undermining security features to ensure  traceability would affect all users of that platform, not just those  that are the subjects of the information request,” the letter reads. “…  such wide and ambiguous powers… on interception of communications would  directly harm the fundamental right to privacy of Indians and facilitate  unchecked surveillance.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. Data retention antithetical to privacy, must go&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The letter also states that the data retention mandate included in  the draft guidelines is antithetical to privacy. The guidelines state  that intermediaries must preserve content requested by law enforcement  for 180 days or longer. This open-ended data retention, the letter  argues, contradicts the principle of ‘Storage Limitation’ recommended by  the Srikrishna Committee. “Provisions regarding storage limitation and  data retention must not be included within the fold of the Intermediary  Guidelines, and should be subject to parliamentary law-making,” the  letter reads.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. Proactive monitoring contradicts SC’s Shreya Singhal judgment, would result in censorship&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The letter also criticizes the requirement that intermediaries  proactively monitor and automatically delete ‘unlawful content’. “[This]  would directly conflict with the legal standard laid down by the  Supreme Court of India in the Shreya Singhal judgment, which holds that  intermediaries should only be legally compelled to take down content on  the basis of court orders or legally empowered government agencies,” the  letter reads. It could also cause intermediaries to err in favor of  takedowns, resulting in unnecessary censorship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“With the upcoming General Elections in India and the imposition of  the Model Code of Conduct on new policy decisions in place, we urge the  government to not push through these amended regulations given their  impact on fundamental rights and secure communications,” the letter  concludes.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;The proposed amendments to Intermediary Liability Rules &lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Released at the end of December 2018, the proposed amendments to the  Intermediary Guidelines would modify guidelines under the Information  Technology Act concerning intermediaries, ostensibly to prevent misuse  of social media platforms and check the spread of fake news. Under  India’s Information Technology Act, any entity, person or platform that  receives, stores, processes, or transmits electronic information on  behalf of another is considered an intermediary. These include social  media platforms, cloud services, internet service providers, email  service providers and more. For an intermediary to avoid liability for  its users’ actions, it must comply with the proposed guidelines which  are being amended to the following:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Traceability, and information within 72 hours:&lt;/b&gt; The  new rules require platforms to introduce traceability to find where a  piece of information originated. For this, platforms may have to break  end-to-end encryption. The rules require the intermediary to hand over  information or assistance to government bodies in 72 hours, including in  matters of security or cybersecurity, and for investigative purposes.  [Rule 3(5)]&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Platforms with more than 50 lakh users are required to be registered&lt;/b&gt; under the Companies Act, have a physical address in the country, have a  nodal officer who will cooperate with law enforcement agencies, etc.  [Rule 3(7)]&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Platforms have to pull down unlawful content&lt;/b&gt; within  a shorter duration of 24 hours from the earlier 36 hours. They also  have to keep records of the “unlawful activity” for 180 days – double  the period of 90 days in the 2011 rules – as required by the court or  government agencies [Rule 3(8)]&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Platforms have to deploy tools&lt;/b&gt; to proactively identify, remove and disable public access to unlawful information or content. [Rule 3(9)]&lt;/li&gt;
&lt;li&gt;&lt;b&gt;The new rules insert a monthly requirement on platforms&lt;/b&gt; to inform users of the platforms’ right to terminate usage rights and  to remove non-compliant information at their own discretion. [Rule 3(4)]&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/medianama-march-18-2019-zaheer-merchant-proposed-intermediary-liability-rules-threat-privacy-and-free-speech'&gt;https://cis-india.org/internet-governance/news/medianama-march-18-2019-zaheer-merchant-proposed-intermediary-liability-rules-threat-privacy-and-free-speech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Zaheer Merchant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-03-20T15:56:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
