<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 921 to 935.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-may-2-2017-details-of-135-million-aadhaar-card-holders-may-have-leaked-claims-cis-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/pti-news-may-2-2017-aadhaar-numbers-of-135mn-may-have-leaked-claims-cis-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-quint-may-2-2017-mahima-kapoor-aadhaar-details-of-people-available-on-govt-sites"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/comments-on-the-statistical-disclosure-control-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/inforisk-today-april-26-2017-suparna-goswami-varun-haran-analysis-data-protection-in-india-getting-it-right"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/national-herald-sebastian-pt-april-26-2017-now-aadhaar-details-displayed-in-mizoram-too"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-world-regina-mihindukulasuriya-april-26-2017-stop-the-haphazard-internet-shutdown-says-mp-jay-panda"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/iso-iec-jtc1-sc-27-meetings"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-telegraph-april-27-2017-india-bans-social-media-in-kashmir-for-one-month"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/internet-shutdowns-in-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-april-21-2017-komal-gupta-apurva-vishwanath-suranjana-roy-aadhaar-a-widening-net"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/shuttleworth-foundation-april-19-2017-sunil-abraham-honorary-steward-september-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/regulating-bitcoin-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/11th-meeting-of-information-systems-security-sectional-committee-litd-17"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-may-2-2017-details-of-135-million-aadhaar-card-holders-may-have-leaked-claims-cis-report">
    <title>Details of 135 million Aadhaar card holders may have leaked, claims CIS report</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-may-2-2017-details-of-135-million-aadhaar-card-holders-may-have-leaked-claims-cis-report</link>
    <description>
        &lt;b&gt;The disclosure came as part of a CIS report titled ‘Information Security Practices of Aadhaar (or lack thereof): A Documentation of Public Availability of Aadhaar Numbers with Sensitive Personal Financial Information’.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The news from the Press Trust of India was published in the &lt;a class="external-link" href="http://www.hindustantimes.com/india-news/details-of-135-million-aadhaar-card-holders-may-have-leaked-claims-cis-report/story-39nojShtnAmr3EruCKbdrL.html"&gt;Hindustan Times&lt;/a&gt; on May 2, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar numbers and personal information of as many as 135 million Indians could have been leaked from four government portals due to lack of IT security practices, the Centre for Internet and Society has claimed.&lt;br /&gt;&lt;br /&gt;“Based on the numbers available on the websites looked at, estimated number of Aadhaar numbers leaked through these four portals could be around 130-135 million,” the report by CIS said.&lt;br /&gt;&lt;br /&gt;Further, as many as 100 million bank account numbers could have been “leaked” from the four portals, it added.&lt;br /&gt;&lt;br /&gt;The portals where the purported leaks happened were those of National Social Assistance Programme, National Rural Employment Guarantee Scheme, as well as two websites of the Andhra Pradesh government.&lt;br /&gt;&lt;br /&gt;“Over 23 crore beneficiaries have been brought under Aadhaar programme for DBT (Direct Benefit Transfer), and if a significant number of schemes have mishandled data in a similar way, we could be looking at a data leak closer to that number,” it cautioned.&lt;br /&gt;&lt;br /&gt;The disclosure came as part of a CIS report titled ‘Information Security Practices of Aadhaar (or lack thereof): A Documentation of Public Availability of Aadhaar Numbers with Sensitive Personal Financial Information’.&lt;br /&gt;&lt;br /&gt;When contaced, a senior official of the Unique Identification Authority of India (UIDAI) said that there was no breach in its own database. The UIDAI issues Aadhaar to citizens.&lt;br /&gt;&lt;br /&gt;The CIS report claimed that the absence of “proper controls” in populating the databases could have disastrous results as it may divulge sensitive information about individuals, including details about address, photographs and financial data.&lt;br /&gt;&lt;br /&gt;“The lack of consistency of data masking and de- identification standard is an issue of great concern...the masking of Aadhaar numbers does not follow a consistent pattern,” the report added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-may-2-2017-details-of-135-million-aadhaar-card-holders-may-have-leaked-claims-cis-report'&gt;https://cis-india.org/internet-governance/news/hindustan-times-may-2-2017-details-of-135-million-aadhaar-card-holders-may-have-leaked-claims-cis-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T08:42:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/pti-news-may-2-2017-aadhaar-numbers-of-135mn-may-have-leaked-claims-cis-report">
    <title>Aadhaar numbers of 135 mn may have leaked, claims CIS report</title>
    <link>https://cis-india.org/internet-governance/news/pti-news-may-2-2017-aadhaar-numbers-of-135mn-may-have-leaked-claims-cis-report</link>
    <description>
        &lt;b&gt;Aadhaar numbers and personal information of as many as 135 million Indians could have been leaked from four government portals due to lack of IT security practices, the Centre for Internet and Society has claimed.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The news was published by the &lt;a class="external-link" href="http://www.ptinews.com/news/8665876_Aadhaar-numbers-of-135-mn-may-have-leaked--claims-CIS-report.html"&gt;Press Trust of India &lt;/a&gt;on May 2, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;"Based on the numbers available on the websites looked at, estimated number of Aadhaar numbers leaked through these four portals could be around 130-135 million," the report by CIS said.&lt;br /&gt;&lt;br /&gt; Further, as many as 100 million bank account numbers could have been "leaked" from the four portals, it added.&lt;br /&gt;&lt;br /&gt;The portals where the purported leaks happened were those of National Social Assistance Programme, National Rural Employment Guarantee Scheme, as well as two websites of the Andhra Pradesh government.&lt;br /&gt;&lt;br /&gt;"Over 23 crore beneficiaries have been brought under Aadhaar programme for DBT (Direct Benefit Transfer), and if a significant number of schemes have mishandled data in a similar way, we could be looking at a data leak closer to that number," it cautioned.&lt;br /&gt;&lt;br /&gt;The disclosure came as part of a CIS report titled 'Information Security Practices of Aadhaar (or lack thereof): A Documentation of Public Availability of Aadhaar Numbers with Sensitive Personal Financial Information'.&lt;br /&gt;&lt;br /&gt;When contaced, a senior official of the Unique Identification Authority of India (UIDAI) said that there was no breach in its own database. The UIDAI issues Aadhaar to citizens.&lt;br /&gt;&lt;br /&gt;The CIS report claimed that the absence of "proper controls" in populating the databases could have disastrous results as it may divulge sensitive information about individuals, including details about address, photographs and financial data.&lt;br /&gt;&lt;br /&gt;"The lack of consistency of data masking and de- identification standard is an issue of great concern...the masking of Aadhaar numbers does not follow a consistent pattern," the report added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/pti-news-may-2-2017-aadhaar-numbers-of-135mn-may-have-leaked-claims-cis-report'&gt;https://cis-india.org/internet-governance/news/pti-news-may-2-2017-aadhaar-numbers-of-135mn-may-have-leaked-claims-cis-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T10:42:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-quint-may-2-2017-mahima-kapoor-aadhaar-details-of-people-available-on-govt-sites">
    <title>Aadhaar Details Of 13.5 Crore People Available On Government Sites </title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-quint-may-2-2017-mahima-kapoor-aadhaar-details-of-people-available-on-govt-sites</link>
    <description>
        &lt;b&gt;Up to 13.5 crore Aadhaar numbers can be easily accessed through government portals and nearly three-fourths of these are linked to bank accounts, said non-profit research organisation the Centre For Internet &amp; Society (CIS).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Calling the Unique Identification Authority of India (UIDAI)  “extremely irresponsible” in maintaining privacy standards, CIS blamed  the Aadhaar governing body for turning a "blind eye" to the lack of  standards regarding use of Aadhaar data by private and public bodies&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It  is staggering that while these databases have existed in the public  domain for months, while framing the Aadhaar Act Regulations in late  2016, the UIDAI did not even deem these as important matters to be  addressed by way of regulations or standards," CIS said in a report  titled ‘Information Security Practices of Aadhaar (or lack thereof)’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIS report points out several government sites which showcase  inefficiently masked Aadhaar codes with sensitive personally  identifiable information, also available for download as spreadsheets.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="https://www.bloombergquint.com/technology/2017/05/20/why-flipkart-needs-more-than-softbank-to-take-on-amazon"&gt;Read the full story on Bloomberg Quint&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-quint-may-2-2017-mahima-kapoor-aadhaar-details-of-people-available-on-govt-sites'&gt;https://cis-india.org/internet-governance/news/bloomberg-quint-may-2-2017-mahima-kapoor-aadhaar-details-of-people-available-on-govt-sites&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T11:00:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/comments-on-the-statistical-disclosure-control-report">
    <title>Comments on the Statistical Disclosure Control Report</title>
    <link>https://cis-india.org/internet-governance/comments-on-the-statistical-disclosure-control-report</link>
    <description>
        &lt;b&gt;This submission presents comments by the Centre for Internet and Society, India (“CIS”) on the ​Statistical Disclosure Control Report published on March 30th by Ministry of Statistics and Programme Implementation. 
&lt;/b&gt;
        
&lt;p&gt;&lt;strong id="docs-internal-guid-a12fe2b3-c746-4c1a-0287-1814414668af"&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;1. PRELIMINARY&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;This submission presents comments by the Centre for Internet and Society, India (“CIS”) on the ​Statistical Disclosure Control Report published on March 30th by Ministry of Statistics and Programme Implementation.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;CIS is thankful for the opportunity to put forth its views.&lt;br class="kix-line-break" /&gt;This submission is divided into three main parts. The first part, ‘Preliminary’, introduces the document; the second part, ‘About CIS’, is an overview of the organization; and, the third part contains the ‘Comments’.&lt;br class="kix-line-break" /&gt;&lt;br class="kix-line-break" /&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;2. ABOUT CIS&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;CIS is a non-​profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, freedom of speech and expression, intermediary liability, digital privacy, and cybersecurity.​&lt;br class="kix-line-break" /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;CIS values the fundamental principles of justice, equality, freedom and economic development. This submission is consistent with CIS' commitment to these values, the safeguarding of general public interest and the protection of India's national interest at the international level. Accordingly, the comments in this submission aim to further these principles.&lt;/p&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;3. Comments&lt;/h3&gt;
&lt;h4 style="text-align: justify;" dir="ltr"&gt;3.1 General Comments&lt;/h4&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;As a non-profit organisation we recognize the importance of the efforts by the Ministry of Statistics and Programme Implementation (MoSPI) to make the &amp;nbsp;data you collect available to the public in open formats with relevant information about reliability of statistical estimates.&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;We at CIS have recently released a report titled “Information Security Practices of Aadhaar (or lack thereof): A documentation of public availability of Aadhaar Numbers with sensitive personal financial information”. We encountered several central and state government departments collecting socioeconomic data from citizens, linking it with Aadhaar and even publishing them in exportable data formats like EXCEL and MS ACCESS Databases. &amp;nbsp;&lt;/span&gt;&lt;span style="text-align: justify;"&gt;While we understand this issue primarily concerns to Unique Identification Authority of India (UIDAI), the lack of standards around information/statistical disclosure are a general threat to transparency in a democracy and privacy of individuals.&amp;nbsp;&lt;/span&gt;&lt;span style="text-align: justify;"&gt;Going through the report we understand the committee is unable to prescribe a standard for other ministries and departments until they try and pilot these standards within Ministry of Statistics and Programme Implementation. This delay in prescribing the standards can be really dangerous in the current circumstances of massive data collection by government departments and linking all the databases with a unique identifier, Aadhaar Number. &amp;nbsp;&lt;/span&gt;&lt;span style="text-align: justify;"&gt;At the same time we understand the importance of data dissemination to be carried out and we recommend the following for improving the standards around data disclosure control.&lt;/span&gt;&lt;/p&gt;
&lt;h4 style="text-align: justify;" dir="ltr"&gt;3.2 Integrity of Information and Data&lt;/h4&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;We agree with the committee that the error rates need to be kept in mind while designing practices to convert raw data. But we request the process of changes being made be actively measured and documented. In case of errors being computed, guidelines can be made to decrease the possibilities of misinterpretation of errors causing loss of integrity of information. Statistics are important for decision making in governance, errors in computations can be biased towards millions of people. Statistical biases are important to be looked into while converting data from its raw format to make sure there are no damage caused by information.&lt;/p&gt;
&lt;h4 style="text-align: justify;" dir="ltr"&gt;3.3 Data Security&lt;/h4&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;One of the important issues around storage and publication of Aadhaar information is the lack of masking standards. With the availability of data from multiple departments, it is possible to reconstruct identification details by linking data from multiple databases. It is recommended to bring masking standards while personally identifiable micro data is being published. There is an urgent need for departments to also look at auditing access to information and tracking sharing of information. It is recommended the department digitally signs all the information and documents being published or shared by them to keep track of who had accessed the information and verifying the authenticity of information.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;We request the department to define what exactly is “usage for statistical purposes only” and recommend standards to control and restrict usage of information for this purpose. It is important they design frameworks or mechanisms to allow others to report violations around this. This process should be transparent and documented heavily.&lt;/p&gt;
&lt;h4 style="text-align: justify;" dir="ltr"&gt;3.4 Anonymization of microdata&lt;/h4&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;We recommend the data being collected be anonymized at source to evade the possibility of the accidental disclosure of personally identifiable information. While the current anonymization efforts have been helpful, with steady increase in data mining and classification algorithms and practices it is recommended to evolve the standards around this area.&lt;/p&gt;
&lt;h4 style="text-align: justify;" dir="ltr"&gt;3.5 Data Dissemination&lt;/h4&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Data dissemination is an important aspect for district statistics officers, we recommend they actively communicate their work through monthly newsletters, quarterly workshops to help improve the conversations around statistics and at the same time engage with the users who would benefit from the data.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;We also recommend that data when being published includes metadata of collection, modification, storage and other important information. Also the information needs to be published in open formats which does not require proprietary software to be used to open them. At the same time data should be published in multiple formats like CSV, XLS, PDF,&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The committee also recognizes the need for having data users part of discussions around important decisions and be part of committees. We would like the department to recognize our efforts and consider us for future committee representations.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Thank you for this opportunity and we look forward to work with you in future.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/comments-on-the-statistical-disclosure-control-report'&gt;https://cis-india.org/internet-governance/comments-on-the-statistical-disclosure-control-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Srinivs Kodali and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Call for Comments</dc:subject>
    
    
        <dc:subject>Digital Access</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Digitisation</dc:subject>
    
    
        <dc:subject>Information Security</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Management</dc:subject>
    

   <dc:date>2019-03-13T00:28:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1">
    <title>(Updated) Information Security Practices of Aadhaar (or lack thereof): A documentation of public availability of Aadhaar Numbers with sensitive personal financial information</title>
    <link>https://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1</link>
    <description>
        &lt;b&gt;Since its inception in 2009, the Aadhaar project has been shrouded in controversy due to various questions raised about privacy, technological issues, welfare exclusion, and security concerns. In this study, we document numerous instances of publicly available Aadhaar Numbers along with other personally identifiable information (PII) of individuals on government websites. This report highlights four government projects run by various government departments that have made sensitive personal financial information and Aadhaar numbers public on the project websites.
&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Read the updated report: &lt;a class="external-link" href="https://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof/" target="_blank"&gt;Download&lt;/a&gt; (pdf)&lt;/h4&gt;
&lt;h4&gt;Read the first statement of clarification (May 16, 2017): &lt;a class="external-link" href="https://cis-india.org/internet-governance/clarification-on-information-security-practices-of-the-aadhaar-report/" target="_blank"&gt;Download&lt;/a&gt; (pdf)&lt;/h4&gt;
&lt;h4&gt;Read the second statement of clarification (November 05, 2018): &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/clarification-on-the-information-security-practices-of-aadhaar-report" target="_blank"&gt;Link to page&lt;/a&gt; (html)&lt;/h4&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;em&gt;We are grateful to Yesha Paul and VG Shreeram for research support.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;In the last month, there have been various reports pointing out instances of the public disclosure of Aadhaar number through various databases, accessible easily on Twitter under the hashtag #AadhaarLeaks. Most of these public disclosures reported contain personally identifiable information of beneficiaries or subjects of the non UIDAI databases containing Aadhaar numbers of individuals along with other personal identifiers. All of these public disclosures are symptomatic of a significant and potentially irreversible privacy harm, however we wanted to point out another large fallout of such events, those that create a ripe opportunity for financial fraud. For this purpose, we identified benefits disbursement schemes which would require its databases to store financial information about its subjects. During our research, we encountered numerous instances of publicly available Aadhaar Numbers along with other PII of individuals on government websites. In this paper, we highlight four government projects run by various government departments with publicly available financial data and Aadhaar numbers. Our research is focussed largely on the data published by or pertaining to where Aadhaar data is linked with banking information. We chose major government programmes using Aadhaar for payments and banking transactions. We found sensitive and personal data and information very easily accessible on these portals.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1'&gt;https://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha and Srinivas Kodali</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>NDSAP</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Digitisation</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Management</dc:subject>
    

   <dc:date>2019-03-13T00:29:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/inforisk-today-april-26-2017-suparna-goswami-varun-haran-analysis-data-protection-in-india-getting-it-right">
    <title>Analysis: Data Protection in India - Getting It Right</title>
    <link>https://cis-india.org/internet-governance/news/inforisk-today-april-26-2017-suparna-goswami-varun-haran-analysis-data-protection-in-india-getting-it-right</link>
    <description>
        &lt;b&gt;Indian Government Plans Ambitious Data Protection Legislation Rollout by October&lt;/b&gt;
        &lt;p&gt;The blog post by Suparna Goswami and Varun Haran was &lt;a class="external-link" href="http://www.inforisktoday.in/analysis-data-protection-in-india-getting-right-a-9866"&gt;published by Info Risk Today&lt;/a&gt; on April 26, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The government of India recently informed the Supreme Court of India that it expects to put in place a comprehensive data protection framework by October. The Telecom Regulatory Authority of India will be heading up the initiative and has already started consultations for preparing a draft framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government on April 5 acknowledged that there was no proper regulatory framework to deal with privacy concerns of citizens arising out of "over-the-top" popular messaging services such as Whatsapp, Facebook and Skype. Consequently, the Department of Telecommunications is exploring creating a "regulatory framework" through legislation to address data protection and citizens' privacy concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the European Union already preparing to enforce its &lt;a href="http://gdpr.inforisktoday.com/"&gt;General Data Protection Regulation&lt;/a&gt; next year, India may be late to the party. But the need for a data  protection and privacy law in India is pressing. And when it's enacted,  it will define provisions for protecting sensitive personally  identifiable information and spell out liabilities in the event PII gets  breached.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many security practitioners, however, say the government's goal of having a law by October seems aggressive.&lt;/p&gt;
&lt;p&gt;Shivangi Nadkarni, co-founder &amp;amp; CEO at Arrka Consulting, points  out that once the government publishes a draft regulation for public  comment, it must allow two months for gathering feedback. "It has to  align with the schedule of the Monsoon Session of Parliament if it has  to meet the October deadline," Nadkarni says (see: &lt;a href="http://www.inforisktoday.in/blogs/its-time-to-get-serious-about-privacy-p-2054"&gt;&lt;i&gt;It's Time to get Serious About Privacy&lt;/i&gt;&lt;/a&gt;).&lt;/p&gt;
&lt;h3&gt;Existing Provisions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India already has some data protection and privacy provisions in the  Information Technology Act 2000, amended in 2008 and the subsequent IT  rules defined in 2011. But the IT Act 2000/8 doesn't define sensitive  personal information directly and only provides guidance for reasonable  security practice and due diligence - the actual implementation  standards have not been explicitly prescribed, says Bengaluru-based &lt;a href="http://www.inforisktoday.in/interviews/legal-expert-poor-infosec-culture-to-blame-in-tcs-vs-epic-i-3173"&gt;Na. Vijayashankar&lt;/a&gt;, a cyber law expert and information risk consultant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The current data protection regime is under section 43A of the IT Act  2000/8, and the regulations made thereunder, says Pranesh Prakash,  policy director at Bengaluru-based research think tank the Center for  Internet and Society. He contends those regulations are weak, do not  specify any governmental agency, and do not lay out penalties for  violations.  Other relevant provisions, such as section 72A, are also  far too onerous and aren't ever applied in practice to such cases, he  says (see: &lt;a href="http://www.inforisktoday.in/interviews/evolution-cyberlaw-i-2844"&gt;&lt;i&gt;Pavan Duggal&lt;/i&gt;&lt;/a&gt;&lt;i&gt; on &lt;/i&gt;&lt;a href="http://www.inforisktoday.in/interviews/indias-cyberlaw-must-rapidly-evolve-i-2617"&gt;&lt;i&gt;Why India's Cyberlaw Must Rapidly Evolve&lt;/i&gt;&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Section 43A and the 'reasonable security rules' didn't change much,  given the lack of teeth in the regulations, and the onerous job of  proving "wrongful gain or wrongful loss" of property due to data  breaches," Prakash says. In addition, as a complement to a strong, yet  flexible, data protection/data security regime, the government also  needs to put in a &lt;a href="http://www.inforisktoday.in/privacy-c-151"&gt;privacy&lt;/a&gt; regime that covers both the private and public sectors, he adds.&lt;/p&gt;
&lt;h3&gt;Right to Privacy&lt;/h3&gt;
&lt;p&gt;India lacks a clear framework that categorically recognizes the sanctity of privacy, says &lt;a href="http://www.inforisktoday.in/interviews/re-evaluating-privacy-i-3058"&gt;J. Sai Deepak&lt;/a&gt;,  an independent cyber law expert and arguing counsel at the Delhi High  Court. Because the status of the fundamental right to privacy is yet to  be adjudicated upon by the Supreme Court, Sai Deepak is uncertain of the  basis on which the regulatory mechanism that the government is  developing, would function (see: &lt;a href="http://www.inforisktoday.in/interviews/india-needs-comprehensive-privacy-law-i-2565"&gt;&lt;i&gt;Why India Needs Comprehensive Privacy Law&lt;/i&gt;&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"This is important because if you treat privacy as a fundamental right,  then the mechanism has to take into account the constitutional  obligations and limitations that come with such treatment," Sai Deepak  says. A telecom-centric or a single sector-centric approach to privacy  as a reaction to a particular litigation may do more harm than good, he  adds (see: &lt;a href="http://www.inforisktoday.in/interviews/re-evaluating-privacy-i-3058"&gt;&lt;i&gt;Re-Evaluating Privacy in India&lt;/i&gt;&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I hope the government goes beyond this context and addresses privacy  comprehensively. It is for this reason that I am not sure TRAI is the  best entity to vest this mandate with," he says. "After all, we are  looking at safeguarding privacy even outside the telecom sphere" he  adds.&lt;/p&gt;
&lt;p&gt;The government needs to clearly spell out all principles and rights  of individuals in the context of privacy as a foundation, experts say.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Declare that privacy is a right of an Indian citizen and is protected  by law," Vijayashankar says. The law should apply to protection of data  in any form and require appropriate security measures to be adopted by  anyone who collects, processes and manages PII, he adds (see: &lt;a href="http://www.inforisktoday.in/interviews/privacy-india-inc-needs-it-i-3086"&gt;&lt;i&gt;Privacy: Why India Inc. Needs It&lt;/i&gt;&lt;/a&gt;).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Viable Roadmap&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.inforisktoday.in/interviews/evolving-security-mindset-i-2921"&gt;Vinayak Godse&lt;/a&gt;,  senior director at Data Security Council of India, says Indian  companies, including IT services and outsourcing firms, are losing in  European markets because of the high data protection standards followed  in those countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We have already been struggling in some markets as our data protection  mechanisms don't match to the evolving global expectations for privacy,"  Godse says. "Questions have been raised by several geographies  especially EU on India's regulatory posture in terms of data  protection." (See: &lt;a href="http://www.inforisktoday.in/interviews/indias-2015-data-privacy-agenda-i-2547"&gt;&lt;i&gt;India's 2015 Data Privacy Agenda&lt;/i&gt;&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vijayashankar says India needs to immediately appoint a data  commissioner to efficiently address data privacy violations, which are  currently being judged under ITA 2000/8. This will also help Indian  enterprises that conduct business with the EU when the GDPR is enforced  starting May 25, 2018 (see: &lt;a href="http://www.inforisktoday.in/interviews/how-will-europes-gdpr-affect-businesses-worldwide-i-3518"&gt;&lt;i&gt; How Will Europe's GDPR Affect Businesses Worldwide?&lt;/i&gt;&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nadkarni of Arrka says the framework should:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Clearly define and articulate what qualifies a personal information.&lt;/li&gt;
&lt;li&gt;Clearly spell out all principles and rights of individuals in the  context of privacy and elaborate on specific aspects as required within  each principle/ right.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf" target="_blank"&gt;Justice AP Shah committee report&lt;/a&gt; of 2012 which proposed comprehensive set of data privacy principles and  measures had a wide acceptance by various stakeholders, and should be a  good starting point to draft an omnibus data privacy law in India,   says Srinivas Poosarla, vice president and head (global), privacy &amp;amp;  data protection at Infosys.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the way the enforcement of any such law enacted, would differ at the center and at state level, some of the areas that Poosarla contends need attention are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mandating that organizations appoint data privacy officers;&lt;/li&gt;
&lt;li&gt;Providing platforms to report grievances and receive compensation from organizations in a timely manner;&lt;/li&gt;
&lt;li&gt;Ensuring accountability of organizations for data privacy and to have them promptly &lt;a href="http://www.inforisktoday.in/notification-c-327"&gt;report&lt;/a&gt; any data breach to affected individuals where there is likely to be material impact;&lt;/li&gt;
&lt;li&gt;Identifying and empowering a body at national or state level to enforce implementation of the law.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;GDPR as a Model&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Nadkarni suggests that the EU's GDPR would be a good benchmark for India. Poosarla and others also agree that the EU GDPR is a good template to draw from. Most importantly, the government should involve all stakeholders, especially privacy and data security advocates, in the drafting of the law, they say.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The best practices and principles from GDPR should be adopted, keeping the cultural and demographic needs of Indian society in mind, Vijayshankar adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash of CIS notes: "Any law must keep the evolution of technology in mind. The law can't be so rigid that technological developments are prevented, nor can it be so flexible that technology defeats the basic guarantees provided by the law. For instance, the role of "consent" in a world where indefinite consent is easily obtained by inserting a clause in a long standard-form contract that no one reads, must be taken into account."&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/inforisk-today-april-26-2017-suparna-goswami-varun-haran-analysis-data-protection-in-india-getting-it-right'&gt;https://cis-india.org/internet-governance/news/inforisk-today-april-26-2017-suparna-goswami-varun-haran-analysis-data-protection-in-india-getting-it-right&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-28T01:42:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/national-herald-sebastian-pt-april-26-2017-now-aadhaar-details-displayed-in-mizoram-too">
    <title>Now, Aadhaar details displayed in Mizoram too</title>
    <link>https://cis-india.org/internet-governance/news/national-herald-sebastian-pt-april-26-2017-now-aadhaar-details-displayed-in-mizoram-too</link>
    <description>
        &lt;b&gt;Contrary to the Centre’s assurances, government websites are revealing digital details of the poor, leaving them vulnerable to financial frauds and identity theft.&lt;/b&gt;
        &lt;p&gt;The article by Sebastian PT was &lt;a class="external-link" href="https://www.nationalheraldindia.com/news/2017/04/26/aadhaar-details-displayed-in-mizoram-jharkhand-chandigarh-financial-fraud-violating-supreme-court-order"&gt;published in the National Herald&lt;/a&gt; on April 26, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Could there be a method to the madness? Or is it just carelessness? From the Jharkhand Government to the Union Territory of Chandigarh to the Union Ministry of Water and Sanitation to even Mizoram’s Food and Civil Supplies Department, government websites are found to have displayed Aadhaar details of citizens, a crime under the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Jharkhand, details of 16 lakh beneficiaries – their bank account details, ration card and the 12-digit Aadhaar number – were displayed on the website of the Directorate of Social Security. Similar blunders were witnessed from different corners of the country from Chandigarh to Kerala, where details of 35 lakh people have been breached. This flies in the face of the Government’s repeated claims on data privacy, that Aadhaar details are completely safe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The law doesn’t allow this. The displaying of the Aadhaar data, for instance, is in clear violation of Section 29 of the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016. The provision clearly says that “no” Aadhaar number or core biometric information of an Aadhaar number holder shall be “published, displayed or posted publicly”.&lt;br /&gt;&lt;br /&gt;“There appears to be no regulation worth the name as far as the Aadhaar project is concerned,” says economist Reetika Khera from IIT Delhi.&lt;br /&gt;&lt;br /&gt;So, will these officials responsible be punished according to the Act? More importantly, what about the damage of leaking such sensitive, apparently confidential data?&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Irreparable Damage&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Several cyber security experts have been warning of the possibility of precisely such leaks and Opposition parties were vociferously pointing this out while the Centre was brazenly violating the Supreme Court’s orders and forcibly extending Aadhaar to almost everything – including it being linked to one’s Permanent Account Number (PAN), used for filing income tax.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“What has been broken through technology, can’t be fixed with the law,” says Sunil Abraham, Executive Director of Bangalore-based research organisation, the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The data breach just made it easy for players in the black market for ID (identification) documents to be lapped up to create false ID cards, for instance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When demonetisation was being implemented, sources say that black money hoarders apparently bought fake IDs which were made from stolen Aadhaar details to get the old notes exchanged – one way for doing this was perhaps by opening new bank accounts or to, say, utilise unused Jan Dhan accounts to deposit the money. Now, one can only imagine what terrorists can do with these details.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So far, perhaps, the only solace is that the biometric details of the beneficiaries weren’t leaked. But, in the backdrop of the lax attitude of the various government departments, even that too is just waiting to happen, fear experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham warns that Aadhaar was always a risky proposition as it was based on biometrics, which “made it very insecure”. He terms it as a “mass surveillance technology” – that too a poorly-designed technology – which, in fact, “undermines security”. Once biometric data are compromised, it cannot be secured again. Instead of biometrics, he suggests the UIDAI shift to using smart cards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The unfettered forcible linking of almost everything – from bank accounts to one’s PAN card – to Aadhaar only makes things worse. “The Centre is ‘seeding’ the various data bases with the Aadhaar number, which is a very bad move. And, involving various private and public agencies in this only makes the entire thing very precarious,” warns Abraham. He points out that, for instance, when the PAN cards are linked with the Aadhaar number, breach made possible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead, he says, the government should adopt the ‘tokenisation approach’, instead of the ‘seeding approach’. What this means is that, say, if the PAN card is to be linked to Aadhaar, then UIDAI issues a token number and not the original 12-digit Aadhaar number. So, even if a breach happens, the hacker will not be able to get all the Aadhaar details, he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the government does not seem to be taking the issue of privacy very seriously. What perhaps is not being understood is that this is not just a privacy issue, but making the masses vulnerable to frauds. Instead of treading cautiously in implementing Aadhaar, the government seems to be in a hurry to extend it to almost every possible silo in an individual’s life.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Given the callous attitude of central and state governments, I hope that the Supreme Court will stop the government from a forced linking of Aadhaar, on the one hand, and bank accounts and PAN numbers on the other hand,” says Khera.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/national-herald-sebastian-pt-april-26-2017-now-aadhaar-details-displayed-in-mizoram-too'&gt;https://cis-india.org/internet-governance/news/national-herald-sebastian-pt-april-26-2017-now-aadhaar-details-displayed-in-mizoram-too&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-27T16:59:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-world-regina-mihindukulasuriya-april-26-2017-stop-the-haphazard-internet-shutdown-says-mp-jay-panda">
    <title>Stop the Haphazard Internet Shutdown Says MP Jay Panda</title>
    <link>https://cis-india.org/internet-governance/news/business-world-regina-mihindukulasuriya-april-26-2017-stop-the-haphazard-internet-shutdown-says-mp-jay-panda</link>
    <description>
        &lt;b&gt;In just one year India lost $968M due to Internet shutdowns; “Cops may not be the right decision makers when it comes to imposing what is a digital curfew,” added an entrepreneur journalist. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Regina Mihindukulasuriya was &lt;a class="external-link" href="http://bwdisrupt.businessworld.in/article/Stop-the-Haphazard-Internet-Shutdown-Says-MP-Jay-Panda/26-04-2017-117091/"&gt;published in the Businessworld&lt;/a&gt; on April 26, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;An entrepreneur from the troubled state of Kashmir, Muheet Mehraj, is cofounder and CEO of &lt;a href="https://www.kashmirbox.com/" target="_blank"&gt;Kashmirbox.com&lt;/a&gt;.  He said that businesses that run on the Internet are crippled by  Internet shutdowns. “A lot of people's livelihood depends on the  Internet. If you shut down the Internet, you shut down their lives.  Also, hospitals and academic institutes need constant Internet access  and a way must be found to ensure they are never impacted by a  shutdown.”&lt;br /&gt;&lt;br /&gt;In 2016, &lt;a href="https://www.brookings.edu/" target="_blank"&gt;Brookings Institution&lt;/a&gt; released a survey of 19 countries and the Internet shutdowns each of  them experienced. India was in that list and according to the century  old research institute, suffered the biggest economic loss to GDP at 968  million dollars all due to Internet shutdowns.&lt;br /&gt;&lt;br /&gt;The general  secretary of Maha Gujarat Bank Employees Association was quoted in 2016  as saying that an Internet shutdown for 6 days across Gujarat culminated  in a loss of rupees 7000 crore for banks in the state.&lt;br /&gt;&lt;br /&gt;The  Brookings survey recorded the maximum number of disruptions in India at  22. According to IndiaSpend.org, The Centre for Communication Governance  at the National Law University of Delhi counts 37 shutdowns across 11  states since 2015 and 22 of them happened in the first 9 months of 2016.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://sflc.in/" target="_blank"&gt;The Software Freedom Law Centre (SFLC) &lt;/a&gt;claims there have been 72 instances of Internet shutdown in India since 2012 and that not all of them are justified.&lt;br /&gt;&lt;br /&gt;The  SFLC.in along with other civil society organizations addressed the  increasing frequency of Internet shutdowns in the country. Baijayant  'Jay' Panda, Member of Parliament said that India needs effective checks  and balances on the process and power to order Internet Shutdowns in  India. He added that, “The power to shut Internet should be exercised by  the district's Superintendent of Police only in rare cases when there  is imminent threat to breakdown of law and order, and risk of loss of  life and property". &lt;br /&gt;&lt;br /&gt;He was speaking at a public discussion  organized by SFLC.in, in association with Digital Empowerment Foundation  (DEF); IT for Change, Internet Democracy Project (IDP); Centre for  Internet and Society (CIS), and Foundation for Media Professionals  (FMP).&lt;br /&gt;&lt;br /&gt;Mr Panda remarked that this power should be limited to 24  or 48 hours. “If Internet must be shut down for a longer duration, the  decision must be taken by Director General of Police or the chief  secretary of state”, he said.&lt;br /&gt;&lt;br /&gt;Abhinandan Sekhri, cofounder and  CEO of Newslaundry raised concerns that there is a fundamental flaw in  how Indians approach law making, in that they first look at the worst  case scenario before taking a liberal and democratic point of view.  “Cops may not be the right decision makers when it comes to imposing  what is a digital curfew,” Mr. Sekhri said.&lt;br /&gt;&lt;br /&gt;Snehashish Ghosh,  associate manager for public policy at Facebook said, “Even though we  may not have ready data to measure the impact of shutdowns, there is no  denying that businesses suffer.” The Facebook Inc. – owned, WhatsApp is  often reported as one of the most missed services whenever the Internet  is shutdown in Kashmir during days of social unrest.&lt;br /&gt;&lt;br /&gt;Mishi  Choudhary, president and legal director of SFLC.in said, “According to  our Internet Shutdown Tracker, India has experienced at least 72  instances of Internet Shutdowns since 2012. Several communities and  states have suffered irreversible socioeconomic losses because they were  denied Internet access for extended durations.”&lt;br /&gt;&lt;br /&gt;Mishi continued,  “The shutdown of Internet not only restrains basic human rights such as  the right to freedom of speech and expression, but also cripples  activities like e-commerce, e-governance, e-health and e-learning,  entirely reliant on the Internet.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-world-regina-mihindukulasuriya-april-26-2017-stop-the-haphazard-internet-shutdown-says-mp-jay-panda'&gt;https://cis-india.org/internet-governance/news/business-world-regina-mihindukulasuriya-april-26-2017-stop-the-haphazard-internet-shutdown-says-mp-jay-panda&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-04-27T16:44:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/iso-iec-jtc1-sc-27-meetings">
    <title>ISO/IEC JTC1/SC 27 Meetings</title>
    <link>https://cis-india.org/internet-governance/news/iso-iec-jtc1-sc-27-meetings</link>
    <description>
        &lt;b&gt;Udbhav Tiwari represented the Centre for Internet &amp; Society in a series of meetings held at University of Waikato and Novotel in Hamilton, New Zealand between April 18 and 25, 2017. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The participation was by the virtue of our institutional membership in Information Systems Security Sectional Committee (LITD 17) at the Bureau of Indian Standards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first 5 days of the meetings (18 to 23 April, 2017) were the working group meetings, where Udbhav participated in Working Group 1 - Information security management systems and Working Group 5 - Identity management and privacy technologies. Udbhav's participation in WG1 was largely exploratory, where I made some connections and tagged projects for us to comment on prior to the next set of meetings. These projects were Cyber Security, Cyber Insurance, Government Use of the ISO 27001 Standards, International Framework for Cyber Security and the Standing Document on Regulatory Use of 27001.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In WG5, Udbhav was appointed as Co-Rapporteur in the Study Period on Smart Cities, which will go on for another 6 months. The plenary of SC 27 was held on April 24 and 25, 2017. The final resolutions from the Working Groups plenary can be accessed below:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/wg-1-recommendations-and-resolutions"&gt;WG1 Recommendations and Resolutions&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/wg-1-recommendations-and-resolutions"&gt;WG5 Resolutions&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/iso-iec-jtc1-sc-27-meetings'&gt;https://cis-india.org/internet-governance/news/iso-iec-jtc1-sc-27-meetings&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-04-27T16:38:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-telegraph-april-27-2017-india-bans-social-media-in-kashmir-for-one-month">
    <title>India bans social media in Kashmir for one month </title>
    <link>https://cis-india.org/internet-governance/news/the-telegraph-april-27-2017-india-bans-social-media-in-kashmir-for-one-month</link>
    <description>
        &lt;b&gt;Authorities in Indian-controlled Kashmir have banned 22 social media sites including Facebook, WhatsApp and Twitter in an effort to calm tensions in the disputed region.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="http://www.telegraph.co.uk/technology/2017/04/27/india-bans-social-media-kashmir-one-month/"&gt;published in the Telegraph&lt;/a&gt; on April 27, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The government said Wednesday that the one-month ban was necessary for public safety because social media were being "misused by anti-national and anti-social elements." Videos depicting the alleged abuse of Kashmiris by Indian forces fueled protests have been shown on social media in recent days.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It's being felt that continued misuse of social networking sites and instant messaging services is likely to be detrimental to the interests of peace and tranquility in the state," the public order said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The sites remained online Thursday as the local telecom company struggled to block them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy director for the Indian advocacy group the Center for Internet and Society, called the ban a "blow to freedom of speech" and "legally unprecedented in India."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An official with Kashmir's state-owned telecom company, Bharat Sanchar Nigam, said engineers were still working on shutting down the 22 sites, including Facebook and Twitter, but so far had been unable to do so without freezing the internet across the Himalayan region. The official spoke on condition of anonymity because he was not authorized to give technical details of the effort to the media.&lt;br /&gt;&lt;br /&gt;Meanwhile, 3G and 4G cellphone service has been suspended for more than a week, but slower 2G service is still available.&lt;br /&gt;&lt;br /&gt;Residents of Srinagar, the region's main city, were busily downloading documents, software and applications onto their smartphones which would likely be able to circumvent the social media block once it goes into effect. Many expressed relief to still have internet access Thursday morning.&lt;br /&gt;&lt;br /&gt;"It was a welcome surprise," said Tariq Ahmed, a 24-year-old university student. "It appears they've hit a technical glitch to block social media en mass."&lt;br /&gt;&lt;br /&gt;While the government has halted internet service in Kashmir in previous attempts to prevent anti-India demonstrations, this is the first time they have done so in response to the circulation of videos and photos showing alleged military abuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others mocked the government. A Facebook post by Kashmiri writer Arif Ayaz Parrey said the ban showed "the Indian government has decided to take on the collective subversive wisdom of cyberspace humanity."&lt;br /&gt;&lt;br /&gt;Indian police and paramilitary officials accuse agitators of using social media to instigate violence.&lt;br /&gt;&lt;br /&gt;An international journalists' rights group urged Indian authorities to immediately revoke the "sweeping censorship of social media," saying it "will bring neither peace nor order" in the region.&lt;br /&gt;&lt;br /&gt;"Such broad censorship clearly violates the democratic ideals and human rights India purports to uphold," said Steven Butler, Asia Program coordinator at the New York-based Committee to Protect Journalists.&lt;br /&gt;&lt;br /&gt;Kashmiris have been uploading videos and photos of alleged abuse for some years, but several recently posted clips, captured in the days surrounding a violence-plagued local election on April 9, have proven to be especially powerful and have helped to intensify anti-India protests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One video shows a stone-throwing teenage boy being shot by a soldier from a few meters (yards) away. Another shows soldiers making a group of young men, held inside an armored vehicle, shout profanities against Pakistan while a soldier kicks and slaps them with a stick.&lt;br /&gt;&lt;br /&gt;The video pans to a young boy's bleeding face as he cries. Yet another clip shows three soldiers holding a teenage boy down with their boots and beating him on his back.&lt;br /&gt;&lt;br /&gt;The video that drew the most outrage was of young shawl weaver Farooq Ahmed Dar tied to the hood of an army jeep as it patrolled villages on voting day. A soldier can be heard saying in Hindi over a loudspeaker, "Stone throwers will meet a similar fate," as residents look on aghast.&lt;br /&gt;&lt;br /&gt;Protests and clashes are an almost daily occurrence in Indian-administered Kashmir, where anti-India sentiment runs deep among the mostly Muslim population after decades of military crackdowns. Disputes over control of the Kashmir region, claimed by both India and Pakistan, have sparked two wars between the nations since 1947.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-telegraph-april-27-2017-india-bans-social-media-in-kashmir-for-one-month'&gt;https://cis-india.org/internet-governance/news/the-telegraph-april-27-2017-india-bans-social-media-in-kashmir-for-one-month&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-04-27T16:09:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/internet-shutdowns-in-2016">
    <title>Internet Shutdowns in 2016</title>
    <link>https://cis-india.org/internet-governance/blog/internet-shutdowns-in-2016</link>
    <description>
        &lt;b&gt;An internet shutdown is an intentional disruption of internet or electronic communications, rendering them inaccessible or effectively unusable, for a specific population or within a location, often to exert control over the flow of information.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the report: &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/internet-shutdowns"&gt;PDF&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;There is no consolidated research on internet shutdowns worldwide and government policies relating to this phenomenon. Access, however, has been tracking instances of internet shutdowns here. According to this tracker, there were 56 internet shutdowns worldwide in 2016.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In this report, we have identified countries where shutdowns took place more than once in the past one year. We were able to identify these countries from the tracker that is being operated by Access. We have looked at the internet shutdown practices and government policies on shutdowns in these countries. The countries include Brazil, Egypt, Ethiopia, Gambia, India, Iraq, Pakistan, Syria, Turkey and Uganda.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We have greatly relied on media coverage of internet shutdowns in the aforementioned countries and reports by various organisations including Freedom House, Amnesty International, Human Rights Watch, Article 19, Access, Electronic Frontier Foundation, Brookings Institution, Annenberg School of Communication, OSCE, Centre for Communication Governance, OONI and Dyn documenting and/or analysing internet censorship in these countries.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While documenting internet shutdown practices in the countries identified above, we have looked at the&amp;nbsp;&amp;nbsp; geographical coverage of a shutdown i.e. whether it was carried out nationwide or in specific regions and type of internet services that were restricted i.e. whether access was restricted to the whole internet, mobile internet services or specific messaging services and/or applications. In this regard, we have referred to a report published by the Brookings Institution, Internet shutdowns cost countries $2.4 billion last year that has analysed the economic impact of internet shutdowns. In this report, the author has identified six categories of disruptions: national internet, subnational internet, national mobile internet, subnational mobile internet, national app/service, and subnational app/ service. I have used this classification to understand and document internet shutdown practices in the aforementioned countries.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;em&gt;This report was featured on the website of the &lt;a href="https://keepusonline.in/"&gt;Keep Us Online&lt;/a&gt; campaign led by the Internet Freedom Foundation.&lt;/em&gt;&lt;/p&gt;
&lt;em&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/em&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/internet-shutdowns-in-2016'&gt;https://cis-india.org/internet-governance/blog/internet-shutdowns-in-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>japreet</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-04-28T13:50:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-april-21-2017-komal-gupta-apurva-vishwanath-suranjana-roy-aadhaar-a-widening-net">
    <title>Aadhaar: A widening net</title>
    <link>https://cis-india.org/internet-governance/news/livemint-april-21-2017-komal-gupta-apurva-vishwanath-suranjana-roy-aadhaar-a-widening-net</link>
    <description>
        &lt;b&gt;As India makes Aadhaar compulsory for a range of services, concerns about potential data breaches remain more than six years after the govt started building the world’s largest biometric identification system.&lt;/b&gt;
        &lt;p&gt;The article by Komal Gupta, Apurva Vishwanath and Suranjana Roy was &lt;a class="external-link" href="http://www.livemint.com/Politics/eTxrtAxzFq738LzFdx7yXK/Aadhaar-A-widening-net.html"&gt;published in Livemint&lt;/a&gt; on April 21, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: center; "&gt;&lt;img alt="The Aadhaar project, under which a 12-digit identification number is to be allotted to every Indian resident, was originally supposed to be a way of plugging leakages in the delivery of state benefits such as subsidized grains to the poor. Photo: Priyanka Parashar/Mint" class="img-responsive" height="378" src="http://www.livemint.com/rf/Image-621x414/LiveMint/Period2/2017/04/21/Photos/Processed/asia-cover.JPG" title="The Aadhaar project, under which a 12-digit identification number is to be allotted to every Indian resident, was originally supposed to be a way of plugging leakages in the delivery of state benefits such as subsidized grains to the poor. Photo: Priyanka Parashar/Mint" width="582" /&gt;&lt;/p&gt;
&lt;p&gt;On 29 March, a storm broke out on social media after private data  that former Indian cricket captain M.S. Dhoni had furnished to get  enrolled in India’s unique identity system, known as Aadhaar, were  leaked online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The popular cricketer’s wife, Sakshi, flagged the matter on Twitter,  tagging information technology (IT) minister Ravi Shankar Prasad. “Is  there any privacy left? Information of Aadhaar card, including  application, is made public property,” Sakshi fumed on the microblogging  site.&lt;/p&gt;
&lt;p&gt;The minister replied: “Sharing personal information is illegal. Serious action will be taken against this.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It turned out to be the fault of an overenthusiastic common services  centre in Dhoni’s home town of Ranchi licensed to enrol people in  Aadhaar. The centre was promptly blacklisted. “We have ordered further  inquiry on the matter and action will be taken against all those  involved in the leak,” said Ajay Bhushan Pandey, chief executive officer  of the Unique Identification Authority of India (UIDAI), which  administers Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The matter blew over soon enough, but it served to illustrate the lingering concerns about potential data breaches and privacy violations surrounding Aadhaar, which has become the world’s largest biometric identification database with 1.13 billion people enrolled in it in the past six years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The project, under which a 12-digit identification number is to be allotted to every Indian resident, was originally supposed to be a way of plugging leakages in the delivery of state benefits such as subsidized grains to the poor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has now become mandatory for everything ranging from opening a bank account and getting a driver’s licence or a mobile phone connection to filing of income tax returns. Even government school students entitled to a free mid-day meal need an Aadhaar number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/AadhaarMint.jpg" alt="Aadhaar " class="image-inline" title="Aadhaar " /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The use of Aadhaar has only expanded with the government going on an overdrive to promote cashless transactions and payment systems linked to the biometric ID system after banning old, high-value bank notes in November in a crackdown on unaccounted wealth hidden away from the taxman.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, the Aadhaar-Enabled Payment System (AEPS) empowers a bank customer to use Aadhaar as her identity to access her Aadhaar-enabled bank account and perform basic banking transactions like cash deposit or withdrawal through a bank agent or business correspondent.&lt;br /&gt;&lt;br /&gt;The customer can carry out transactions by scanning her fingerprint at any micro ATM or biometric point-of-sale (POS) terminal, and entering the Aadhaar number linked to the bank account. A merchant-led model of AEPS, called Aadhaar Pay, has also been launched.&lt;br /&gt;&lt;br /&gt;Last week, Prime Minister Narendra Modi launched the BHIM-Aadhaar platform—a merchant interface linking the unique identification number to the Bharat Interface for Money (BHIM) mobile application. This will enable merchants to receive payments through fingerprint scans of customers.&lt;br /&gt;&lt;br /&gt;“Any citizen without access to smartphones, Internet, debit or credit cards will be able to transact digitally through the BHIM-Aadhaar platform,” a government statement said.&lt;br /&gt;&lt;br /&gt;Aadhaar’s growing importance in the economy has only served to deepen concerns about potential data breaches. And there are other concerns as well.&lt;br /&gt;&lt;br /&gt;For instance, the Aadhaar biometric authentication failure rate in the rural job guarantee scheme, which assures 100 days of work a year to one member of every rural household, is as high as 36% in the southern state of Telangana, according to data released by the state government.&lt;br /&gt;&lt;br /&gt;“Aadhaar is supposed to be an enabler and it will happen only when it is made voluntary. Biometric authentications might fail due to poor data connectivity and transactions might not happen even though the Aadhaar number of the person is there; so, what’s the benefit,” asked Pranesh Prakash, policy director of the Centre for Internet and Society, a Bengaluru-based think tank.&lt;br /&gt;&lt;br /&gt;Aadhaar was the brainchild of the previous United Progressive Alliance (UPA) government, which lost power in the 2014 general election to the National Democratic Alliance (NDA). The first 10 Aadhaar numbers were handed over to residents of a small village called Tembhli in Maharashtra on 29 September 2010 in the presence of then prime minister Manmohan Singh, Congress party president Sonia Gandhi and Aadhaar’s chief architect Nandan Nilekani, a co-founder of software services giant Infosys Ltd.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After coming to power, the NDA systematically went about making Aadhaar the pivot of government welfare programmes. In March last year, Parliament passed the Aadhaar Bill to make the use of Aadhaar mandatory for availing of government subsidies despite resistance from opposition parties.&lt;br /&gt;&lt;br /&gt;Last month, finance minister Arun Jaitley said the 12-digit number would eventually become a single, monolithic proof of identity for every Indian, replacing every other identity card.&lt;br /&gt;&lt;br /&gt;To be sure, Aadhaar has helped the government better target beneficiaries of its welfare programmes, cutting out middlemen and corruption. For instance, the government claims to have saved about Rs50,000 crore in cooking gas subsidies by linking the Aadhaar number with bank accounts in which the subsidy is directly transferred.&lt;br /&gt;&lt;br /&gt;Yet, Aadhaar has its critics, who have challenged the project on grounds including potential compromise of national security, violation of the right to privacy and exclusion of people from welfare programmes. The Supreme Court has cautioned the government that no citizen can be denied access to welfare programmes for lack of an Aadhaar number.&lt;br /&gt;&lt;br /&gt;Before cricketer Dhoni’s data breach made the headlines, in February, UIDAI filed a complaint against Axis Bank Ltd, business correspondent Suvidhaa Infoserve and e-sign provider eMudhra, alleging they had attempted unauthorized authentication and impersonation by illegally storing Aadhaar biometrics. The breach was noticed after one individual performed 397 biometric transactions between 14 July 2016 and 19 February 2017. All three entities have been temporarily barred from offering Aadhaar-related services until UIDAI makes a final decision.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash of the Centre for Internet and Society said rules on the use of Aadhaar data are inadequate.&lt;br /&gt;&lt;br /&gt;“UIDAI is allowed to share the information of a person from its database on its website, after taking proper consent of that person. However, there is no law which states what should be done if any other party does that with the same individual. Such rules must be in place,” Prakash said.&lt;br /&gt;&lt;br /&gt;Four years after the Aadhaar project took off, a retired judge took the government to court. K. Puttaswamy, a former judge of the Karnataka high court, moved the Supreme Court in 2013, arguing that Aadhaar violated his fundamental right to privacy under the constitution. The case opened the gates for legal challenges to Aadhaar. Over the next few years till date, at least a dozen cases had questioned the legality of the project.&lt;br /&gt;&lt;br /&gt;Ramon Magsaysay award winner Aruna Roy brought a case on behalf of manual workers whose faint finger prints, she said, often go undetected. Currently, only 44 million out of the 101 million beneficiaries of India’s rural job entitlement are paid through Aadhaar.&lt;br /&gt;&lt;br /&gt;To be sure, India’s Constitution does not contain a black and white reference to a “fundamental right to privacy”, that the government cannot violate. The list of rights says “no person shall be deprived of his life or personal liberty except according to a procedure established by law”—often interpreted by courts as an all-encompassing right including right to live with dignity, right to speedy justice and even a right to clean air.&lt;br /&gt;&lt;br /&gt;Nilekani, the man behind Aadhaar, has cautioned that privacy is a broader issue involving how people retain their privacy in day-to-day life. “Privacy is an all-encompassing issue because of the rapid rate of digitization the world is seeing. Your smartphone has sensors, GPS and is generating more and more information about everything; voice-activated devices could also be recording your conversations. There’s a profusion of CCTV cameras at malls, restaurants, ATMs recording your movements,” Nilekani said in a recent interview with The Economic Times.&lt;br /&gt;&lt;br /&gt;But this is where a problem arises. Although there is concurrence on the need for a privacy law, there is a great reluctance on the part of the government to come out with one.&lt;br /&gt;&lt;br /&gt;“We don’t have a comprehensive privacy law; all our databases are unlinked. The government is trying to link the databases using Aadhaar for all schemes but a separate privacy law must be there for protecting any piece of information, whether or not linked to Aadhaar,” said Rahul Matthan, a partner at law firm Trilegal and a Mint columnist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Matthan said first a privacy law must be put in place and then there has to be a discussion on what all it must include.&lt;br /&gt;&lt;br /&gt;The government on its part pointed out that India’s apex court itself has been indecisive on a right to privacy.&lt;br /&gt;&lt;br /&gt;“The larger question on privacy needs to be settled by the court. Till then, one cannot comment on secondary concerns,” attorney general Mukul Rohatgi said in an interview.&lt;br /&gt;&lt;br /&gt;In 2015, the Supreme Court decided that a bench of at least seven judges will rule on the privacy issue, while clarifying that the government cannot make Aadhaar a mandatory proof of identity for its welfare schemes. Twenty months after the judicial order, the larger bench is yet to be formed by the apex court. The passing of the Aadhaar Act in Parliament to provide statutory backing to Aadhaar also indicates a departure from the Indian government’s position of not taking a legislative stand while an issue is under the apex court’s consideration.&lt;br /&gt;&lt;br /&gt;For example, one of the reasons the Indian government has shown restraint in repealing a colonial law that criminalizes homosexuality is because the apex court is seized of the issue.&lt;br /&gt;&lt;br /&gt;In the absence of legislation and pending an authoritative ruling by the top court, whether 1.3 billion Indians are entitled to their privacy remains a grey area. Meanwhile, the government is seemingly in the final stretch of its Aadhaar enrolment drive.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-april-21-2017-komal-gupta-apurva-vishwanath-suranjana-roy-aadhaar-a-widening-net'&gt;https://cis-india.org/internet-governance/news/livemint-april-21-2017-komal-gupta-apurva-vishwanath-suranjana-roy-aadhaar-a-widening-net&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-22T05:06:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/shuttleworth-foundation-april-19-2017-sunil-abraham-honorary-steward-september-2017">
    <title>Sunil Abraham: Honorary steward September 2017</title>
    <link>https://cis-india.org/internet-governance/news/shuttleworth-foundation-april-19-2017-sunil-abraham-honorary-steward-september-2017</link>
    <description>
        &lt;b&gt;Shuttleworth Foundation has announced Sunil Abraham as Honorary Steward for its September 2017 fellowship round. &lt;/b&gt;
        &lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/copy7_of_Sunil.png/@@images/d422e35a-b81f-4160-b601-ac052fad406a.png" alt="Sunil" class="image-inline" title="Sunil" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham is the &lt;a href="http://cis-india.org/publications-automated/cis/sunil"&gt;Executive Director&lt;/a&gt; of Bangalore based research organisation, the &lt;a href="http://cis-india.org/"&gt;Centre for Internet and Society&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;“I have admired the stewardship of the Shuttleworth Foundation  towards the access to knowledge and free culture movements ever since I  interviewed Mark Shuttleworth at WSIS 2005. Many of my personal heroes  have become Fellows over the years and it is therefore my privilege to  contribute a southern perspective to this fellowship round.” – Sunil  Abraham&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://www.shuttleworthfoundation.org/apply/"&gt;Applications close&lt;/a&gt; 15 May 2017 for a 1 September 2017 fellowship start date. Read the original post on Shuttleworth Foundation &lt;a class="external-link" href="https://shuttleworthfoundation.org/thinking/2017/04/19/thinking-Steward-Sunil-Abraham/"&gt;website here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/shuttleworth-foundation-april-19-2017-sunil-abraham-honorary-steward-september-2017'&gt;https://cis-india.org/internet-governance/news/shuttleworth-foundation-april-19-2017-sunil-abraham-honorary-steward-september-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-04-20T13:30:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/regulating-bitcoin-in-india">
    <title>Regulating Bitcoin in India</title>
    <link>https://cis-india.org/internet-governance/blog/regulating-bitcoin-in-india</link>
    <description>
        &lt;b&gt;The article discusses the possible contours of future bitcoin regulation in India. Bitcoin, often considered a ‘notorious’ virtual currency limited only to techies or speculators, is currently fighting a battle to become a bona fide mainstream means of exchange.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;While most currencies in the real world have the backing of a central authority of some kind (such as a sovereign or a Central Bank) infusing them with an air of legitimacy, Bitcoin has no such central authority which issues or controls it. Additionally, the distributed and decentralised nature of the Bitcoin network makes regulation a tricky issue. This article seeks to touch upon the issue of Bitcoin regulation and makes certain broad suggestions for the future. It is a follow-up to a previous article by this author discussing the legal treatment of Bitcoin under Indian law, available at &lt;a href="http://cis-india.org/internet-governance/bitcoin-legal-regulation-india"&gt;http://cis-india.org/internet-governance/bitcoin-legal-regulation-india&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Reserve Bank of India (&lt;b&gt;RBI&lt;/b&gt;) has not exactly been shy in recognising and even regulating technological advances in the financial sector as is evident from their detailed guidelines on Internet Banking,&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; Prepaid Payment Instruments&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; Account Aggregator Regulations,&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; and the consultation paper on proposed regulations for P2P lending platforms,&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; etc. However, though the RBI has acknowledged the existence of Bitcoin (it issued a note cautioning the public against dealing in virtual currencies including Bitcoin way back in 2013&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; and again in 2017&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;), there have been no clear guidelines regarding the same. Nevertheless, Bitcoin has come a long way since its inception and a consensus is emerging amongst the more technically inclined individuals that Bitcoin is infact here to stay.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if a sceptical view is taken that Bitcoin may not last for a long time, that does not mean that regulation is useless as there is already a large amount of money invested in Bitcoin entities in India and Bitcoin exchanges seem to be betting big on this sector really taking off - especially in the backdrop of the government’s recent push towards a more digital and less cash dependent economy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the Indian government is trying to hard sell the idea of digital payments, primarily using existing banking channels as well as the relatively new National Payments Corporation of India (&lt;b&gt;NPCI&lt;/b&gt;) and the various applications that are cropping up around the NPCI’s UPI platform, one must note that going digital could involve high administrative costs. These costs are typically charged by banks and intermediary merchants, and may not be palatable to all stakeholders, as was evident in the recent fracas between petrol pump owners and banks over proposed transactional charges on card payments.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is this vacuum that alternatives such as prepaid payment instruments and virtual currencies can fill while addressing the concern of high administrative charges, which is likely to be a major hurdle in going digital. Administrative charges for most of these instruments are significantly lower than what existing payment channels charge for digital transactions.&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legality of Bitcoin and the need for Regulation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bitcoin technology is being widely embraced all over the world, including neighbouring China which has become one of the biggest markets for the uniquely decentralised currency. However the biggest hurdle that Bitcoin enthusiasts see in mainstreaming this technology is the fact that most countries are treading too cautiously around Bitcoin and therefore do not have regulation governing them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The creation and transfer of Bitcoin is based on an open source cryptographic protocol and is not managed by any central authority.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; It is the decentralized nature of this virtual currency that makes regulation a major challenge. This does not mean that regulators are not capable of regulating Bitcoin, in fact attempts have been made in several jurisdictions but these are mostly in the discussion stage, for eg. the Washington Department of Financial Institutions (“DFI”) introduced a bill in December, 2016 which proposes amendments to certain portions of the Washington Uniform Money Services Act and includes provisions specific to digital currencies;&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; the U.S. District Court for the Southern District of New York has in a decision in September, 2016 taken the view that Bitcoin is money under the plain meaning of Section 1960, the federal money transmission statute.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This article does not intend to undertake a discussion on how Bitcoin is dealt with in various jurisdictions, but instead is aimed at suggesting a possible way forward for Indian regulators to regulate Bitcoin in a manner that satisfies the regulatory zeal towards security as well as ensures that the technology does not get stifled through overregulation. It is important that the regulators create a balanced regulation because an impractical ecosystem for Bitcoin exchanges and their users, may lead to traders seeking alternative methods of purchasing Bitcoin such as P2P trading, over-the-counter (OTC) markets and underground trading platforms, which are significantly more difficult to regulate.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Suggestions for Regulation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since Bitcoin is a decentralised cryptocurrency, it is impossible to regulate it through one single centralised point for all transactions. Neither is it feasible to regulate each and every Bitcoin user. A pragmatic compromise between these two extremes could be to regulate the points at which fiat currency or valuable goods enter the Bitcoin system, i.e. the Bitcoin exchanges where people may buy and sell Bitcoin for actual real world money, or websites which offer Bitcoin as a means of payment. Such an approach would reduce the number of points of supervision and lead to effective enforcement of the regulations. The regulations may require any entity providing services such as buying and selling of Bitcoin for actual money, trading in Bitcoin (such as non-cash exchanges) or providing other Bitcoin related services (such as Bitcoin wallets, merchant gateways, remittance facilities, etc.) to be registered with a central government agency, preferably the Reserve Bank of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One legal issue regarding the regulation of companies transacting in Bitcoin is whether the RBI has the authority or jurisdiction to regulate Bitcoin in the first place. Without getting into the arguments regarding whether it is a dangerous trend or not, an easy way in which the RBI could ensure it has the authority to regulate Bitcoin would be to follow the path that the RBI adopted while regulating Account Aggregators under the Non-Banking Financial Company - Account Aggregator (Reserve Bank) Directions, 2016 wherein the RBI declared Account Aggregators as Non Banking Finance Companies under section 45-I(f)(iii) thereby getting the authority to regulate and supervise them under section 45JA of the Reserve Bank of India Act, 1934.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Regulations, once issued by the Reserve Bank of India, can prescribe mandatory registration, capital adequacy provisions, corporate governance conditions, minimum security protocols, Know Your Customer (KYC) requirements and most importantly provide for regular and ongoing reporting requirements as well as supervision of the Reserve Bank of India over the activities of Bitcoin companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Any proposed Bitcoin regulatory framework would seek to address certain issues; for the purposes of this article, we will assume that the following three issues are the ones that must necessarily be addressed by a regulatory framework:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Security of the consumer’s property and prevention of fraud on the consumer. In the technology sector this translates into specific emphasis on increased security (against hacking) for accounts that the consumers maintain with the service provider.&lt;/li&gt;
&lt;li&gt;India has robust exchange control laws and the inherently decentralised and digital nature of Bitcoin can enable transfer of value from one jurisdiction to another without any oversight by a central agency, potentially violating the exchange control laws of India.&lt;/li&gt;
&lt;li&gt;Bitcoin has for long been associated with criminal and nefarious activities, infact many believe that the famous black market website “Silk Road” played a big role in making Bitcoin famous&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; and therefore preventing Bitcoin from being used for illegal activities (or creating a mechanism to ensure a digital trail to help investigations post facto) would be a major issue that the regulations would seek to tackle.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Given the above assumptions, let us examine whether the Regulations suggested above can satisfactorily address the concerns of security of consumers, exchange control, and keeping a tab on criminal activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the regulations provide for minimum capital adequacy requirements as well as registration by the RBI or some other central agency, then the chances of consumers being duped by “fly-by-night” operators would be significantly reduced. The Regulations can also provide for minimum security protocols to be maintained by the companies, which protocols can themselves be developed in concert with Bitcoin experts. Critics may point to the hacking of various Bitcoin exchanges in the recent past, including that of MtGox, in which Bitcoin worth millions of dollars were siphoned off, and argue that the security protocols may not be enough to prevent future instances of hacking. But that is true even for the current security protocols for online banking; and that has not prevented a large number of banks from providing online banking facilities and the RBI regulating the same. The other vital issue that legally mandated security protocols would address (and potentially solve) is the issue of liability in case of hackings. Regulations may provide clarity on this issue and protect innocent customers from negligent companies while at the same time protecting entrepreneurs by defining and limiting the liability for &lt;i&gt;bona fide&lt;/i&gt; and vigilant companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other issue that may be of major concern to the authorities is exchange control. India has extremely specific exchange control laws, and if any person in India wants to transfer any amount to any person overseas, the only legal way to do so is through a bank transfer, which requires filling paperwork giving the reason for the transfer (although the RBI and banks usually don’t ask for any proof for small amounts upto a few lakhs). This means that all transfers outside India are done through proper banking channels and are therefore under the supervision of the RBI. However the decentralised nature of Bitcoin enables individuals to transfer money outside the borders of India without going through any banking channels and hence stay completely outside the purview of the RBI’s supervision. Such a system which lets users transfer money beyond national borders outside legal banking channels could be easily misused by nefarious actors and this is exactly what happened as international drug cartels turned to Bitcoin and other digital currencies to move their ill gotten wealth beyond the borders of various countries.&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; Regulating the entities which provide Bitcoin wallets and Bitcoin exchanges will ensure that the RBI can exercise its supervisory jurisdiction over Bitcoin transactions of individual customers even though these transactions do not go through the regular banking channels. The Regulations could impose an obligation on the companies to provide information on any suspicious activities or provide greater information about accounts which see very high volumes, etc. to ensure that Bitcoin is not used to finance organised crime. Thus, the regulations could have provisions that would require the companies providing the Bitcoin wallets or exchanges to flag and monitor customers whose trading accounts or Bitcoin wallets have transactions of an amount greater than a specified limit. This would provide the RBI with the ability to enquire as to the reasons for such high volumes and weed out illegal transactions while at the same time allowing bona fide transactions to continue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Very closely linked to the issue of exchange control and supervision of transactions is the issue of checking the furtherance of criminal activities using the apparent anonymity offered by Bitcoin. However if the RBI has regulatory oversight over all the Bitcoin companies that are operating in India, then it would be possible for it to keep an eye on most Bitcoin transactions in India as long as the wallet that originates or terminates the transaction has been provided by a Bitcoin service provider located in India. An argument may be made that a criminal may use the services of Bitcoin wallet services provided by companies outside India and therefore outside the purview of the RBI and its regulations. However this argument may not be as plausible as it may seem at first look; if we assume that for any criminal activity the ultimate goal is to get the money in the form of recognizable legal tender (preferably cash or money in a bank account) then it stands to reason that the Bitcoin in the wallet would be exchanged for currency at some point or the other in the chain, which can only be done through a Bitcoin exchange if the transaction is of a fairly high value (which most criminal transactions are) and these exchanges as well as the accounts maintained by them will be under the purview of the RBI, thus providing the law enforcement agencies with the final link in the chain of transactions. Further, the public nature of the blockchain (the ledger where each Bitcoin trade is registered and verified) also makes it possible for the enforcement agencies to follow the trail of money for each and every Bitcoin or part thereof.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the discussion above, we see that the major arguments that have been given by sceptics regarding Bitcoin and its attractiveness to criminals due to its decentralised nature are actually not very viable on a closer look. Bitcoin and the blockchain technology are extremely important steps in the direction of better and more efficient financial transactions in the global economy, which is why a number of mainstream banks are also showing a keen interest in the blockchain technology.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; Regulations governing Bitcoin or virtual currencies would clear the air regarding their legal status so that consumers as well as entrepreneurs and investors can invest more money in this technology which could potentially change the way financial transactions are carried out across jurisdictions.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; &lt;a href="https://www.rbi.org.in/scripts/NotificationUser.aspx?Id=414&amp;amp;Mode=0"&gt;https://www.rbi.org.in/scripts/NotificationUser.aspx?Id=414&amp;amp;Mode=0&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;a href="https://rbi.org.in/scripts/NotificationUser.aspx?Id=10799&amp;amp;Mode=0"&gt;https://rbi.org.in/scripts/NotificationUser.aspx?Id=10799&amp;amp;Mode=0&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; &lt;a href="https://www.rbi.org.in/scripts/BS_ViewMasDirections.aspx?id=10598"&gt;https://www.rbi.org.in/scripts/BS_ViewMasDirections.aspx?id=10598&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; &lt;a href="https://rbidocs.rbi.org.in/rdocs/content/pdfs/CPERR280416.pdf"&gt;https://rbidocs.rbi.org.in/rdocs/content/pdfs/CPERR280416.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; &lt;a href="https://rbi.org.in/scripts/BS_PressReleaseDisplay.aspx?prid=30247"&gt;https://rbi.org.in/scripts/BS_PressReleaseDisplay.aspx?prid=30247&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; &lt;a href="https://rbi.org.in/Scripts/BS_PressReleaseDisplay.aspx?prid=39435"&gt;https://rbi.org.in/Scripts/BS_PressReleaseDisplay.aspx?prid=39435&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; &lt;a href="http://timesofindia.indiatimes.com/business/india-business/petrol-pumps-wont-accept-cards-from-monday-to-protest-banks-transaction-fee/articleshow/56402253.cms"&gt;http://timesofindia.indiatimes.com/business/india-business/petrol-pumps-wont-accept-cards-from-monday-to-protest-banks-transaction-fee/articleshow/56402253.cms&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; For example, currently the network fee for a person to person Bitcoin transfer is 0.0001 Bitcoin, which comes to roughly Rs. 6 per transaction irrespective of the amount involved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; The processing of Bitcoin transactions is secured by servers called Bitcoin “miners”. These servers communicate over an internet-based network and confirm transactions by adding them to a ledger which is updated and archived periodically using peer-to-peer filesharing technology, also known as the “blockchain”. The integrity and chronological order of the blockchain is enforced with cryptography. In addition to archiving transactions, each new ledger update creates some newly-minted Bitcoins.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; &lt;a href="https://www.virtualcurrencyreport.com/2017/01/washington-department-of-financial-institutions-proposes-virtual-currency-regulation/"&gt;https://www.virtualcurrencyreport.com/2017/01/washington-department-of-financial-institutions-proposes-virtual-currency-regulation/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; &lt;a href="https://www.virtualcurrencyreport.com/2016/09/sdny-opinion-re-bitcoin/"&gt;https://www.virtualcurrencyreport.com/2016/09/sdny-opinion-re-bitcoin/&lt;/a&gt;. For a discussion on how different States and agencies in the United States deal with Bitcoin, please see Misha Tsukerman, “THE BLOCK IS HOT: A SURVEY OF THE STATE OF BITCOIN REGULATION AND SUGGESTIONS FOR THE FUTURE, Berkeley Technology Law Journal, Vol. 30:385, 2015, p. 1127, available at &lt;a href="http://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=2084&amp;amp;context=btlj"&gt;http://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=2084&amp;amp;context=btlj&lt;/a&gt; .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; &lt;a href="http://themerkle.com/why-china-isnt-interested-in-banning-bitcoin-importance-of-regulation/"&gt;http://themerkle.com/why-china-isnt-interested-in-banning-bitcoin-importance-of-regulation/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; See generally, Nathaniel Popper, “Digital Gold: Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money”, Harper Collins, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; &lt;a href="https://www.bloomberg.com/view/articles/2013-11-18/are-bitcoins-the-criminal-s-best-friend-"&gt;https://www.bloomberg.com/view/articles/2013-11-18/are-bitcoins-the-criminal-s-best-friend-&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; &lt;a href="http://www.morganstanley.com/ideas/big-banks-try-to-harness-blockchain"&gt;http://www.morganstanley.com/ideas/big-banks-try-to-harness-blockchain&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/regulating-bitcoin-in-india'&gt;https://cis-india.org/internet-governance/blog/regulating-bitcoin-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Financial Technology</dc:subject>
    
    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Bitcoin</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Virtual Currencies</dc:subject>
    

   <dc:date>2017-04-20T13:17:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/11th-meeting-of-information-systems-security-sectional-committee-litd-17">
    <title>11th Meeting of Information Systems Security Sectional Committee (LITD 17)</title>
    <link>https://cis-india.org/internet-governance/news/11th-meeting-of-information-systems-security-sectional-committee-litd-17</link>
    <description>
        &lt;b&gt;Udbhav Tiwari represented CIS at this meeting organized by the Bureau of Indian Standards (BIS) at Manak Bhavan, New Delhi on April 13, 2017.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The meeting was the national mirror meeting for the 28th ISO/IEC JTC 1/SC 27 Plenary and Working Group Meetings being held at Hamilton, New Zealand between the April 18 and 25, 2017. The meeting provided a fascinating insight into the government and industry viewpoints on key cyber security and privacy issues, especially on the Aadhaar.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/11th-meeting-of-information-systems-security-sectional-committee-litd-17'&gt;https://cis-india.org/internet-governance/news/11th-meeting-of-information-systems-security-sectional-committee-litd-17&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-19T02:57:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
