<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 936 to 950.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/policy-brief-on-the-report-of-the-un-group-of-governmental-experts-on-ict"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/policies-for-the-platform-economy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-times-of-india-nilesh-christopher-and-naveen-menezes-june-14-2018-police-to-counter-fake-news-on-whatsapp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/apc-june-14-2017-point-view-wins-laadli-media-award"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/point-by-point-rebuttal"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/podcast-on-abortion-rights-and-privacy-with-pi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-april-10-2016-somesh-jha-pmo-no-to-smart-cards-insists-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/pma-policy-and-coai-recommendations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/free-press-journal-march-25-2018-pm-app-also-susceptible"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-may-11-2017-plug-data-leak-before-imposing-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livelaw-june-10-2017-simran-sahni-placements-at-nujs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-telegraph-july-10-2016-place-for-a-safety-net"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/www-livemint-september-25-2012-surabhi-agarwal-pitroda-seeks-to-put-govt-information-in-public-domain"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/picking-2018wholes2019-thinking-in-systems-workshop"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/pibplans-a-fact-checking-unit-to-counter-fake-news"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/policy-brief-on-the-report-of-the-un-group-of-governmental-experts-on-ict">
    <title>Policy Brief on the Report of the UN Group of Governmental Experts on ICT</title>
    <link>https://cis-india.org/internet-governance/blog/policy-brief-on-the-report-of-the-un-group-of-governmental-experts-on-ict</link>
    <description>
        &lt;b&gt;In light of the complex challenges and threats posed to, and by, the field of information telecommunications in cyberspace, in 1998 the draft resolution in the First Committee of the UN General Assembly was introduced and adopted without a vote (A/RES/53/70) ]. Since then, the Secretary General to the General Assembly has invited annual reports on the issue.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The most recent report, Developments in the Field of Information and Telecommunications in the Context of International Security, was published in June 2015. The 2015 Report touches upon a number of issues, including international cooperation, norms and principles for responsible state behavior, confidence building measures cross border  exchange of information, and capacity building measures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Annual reports will continue to be accepted by the General Assembly, and the 2016/2017 Group of Governmental Experts will have it's first meeting in August 2016.  India was a member of the Group of Governmental Experts in 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society (CIS) has written an article analyzing India’s alignment with the recommendations of the report of the Group of Governmental Experts. This policy brief attempts to articulate the major policy actions that may be considered by India to further incorporate and implement the principles enunciated in the Report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS believes that the report of the Group of Governmental Experts provides important minimum standards that countries could adhere to in light of challenges to international security posed by ICT developments. Given the global nature of these challenges and the need for nations to holistically address such challenges from a human rights and security perspective, CIS believes that the Group of Governmental Experts and similar international forums are useful and important forums for India to continue to actively engage with.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Below are our specific recommendations:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(a) Consistent with the purposes of the United Nations, including to maintain international peace and security, States should cooperate in developing and applying measures to increase stability and security in the use of ICTs and to prevent ICT practices that are acknowledged to be harmful or that may pose threats to international peace and security;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has entered into treaties on ICT issues with countries such as Belarus, Canada, China, Egypt, and France. Additionally, India’s IT Act addresses a number of  the cyber crimes listed in the Budapest Convention. However, India is not yet a signatory to the Convention. This leaves scope for India to consider further forums and means of international cooperation to better realise this principle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has been invited to accede to the Budapest Convention in the past but for various tactical and political reasons has not yet agreed to do so. Although whether to accede to an International Convention or not is usually a well discussed and thought out policy decision of the diplomatic core of a country, the mutual assistance framework, however flawed it may be, would offer a better opportunity for India for international cooperation for increasing the stability and security of ICTs and prevent harmful ICT practices as envisaged in the Report of the Group of Governmental Experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(b) In case of ICT incidents, States should consider all relevant information, including the larger context of the event, the challenges of attribution [of cybercrime] in the ICT environment and the nature and extent of the consequences;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the Department of Electronics and Information Technology (DEITY) as well as the Computer Emergency Response Team, India (CERT-In) have a number of policies which talk about maintaining security and means of addressing threats in the ICT environment, most ICT incidents, crimes or illegal activities using ICT, unless they involve large or government institutions, are handled by the regular police establishment of the country. The lack of capacity, both in terms of infrastructure and skill, of the regular police to adequately address most cyber crimes is an area that needs to be strengthened. The need for cyber security capacity building in India was highlighted in 2015 by the Standing Committee on Information Technology.   It would be useful for dedicated cyber crime departments to be established in all districts. This would be a step in the right direction to provide the requisite capacity and resources to deal with the various technical issues such as attribution, jurisdiction, etc. arising out of ICT incidents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(d) States should consider how best to cooperate to exchange information, assist each other, prosecute terrorist and criminal use of ICTs and implement other cooperative measures to address such threats. States may need to consider whether new measures need to be developed in this respect;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Owing to the growing irrelevance of physical and political borders in the age of globally networked devices, one of the most important issues arising out of ICTs and cyber crimes is the need for greater and more efficient exchange of information between nations. It has been widely accepted that sharing of information on a regular and sustained basis between nation states would be a very important tool. Limitations in the traditional mechanisms (MLATs, Letters Rogatory, etc.) such as the delay in accessing the information as well as denial of access due to differences in legal standards, present  hurdles to the efficacy of law enforcement agencies only emphasize the urgency of developing a new mechanism of international information sharing that would be able to deal with ICT incidents, while at the same time protecting the freedoms and privacy rights of the citizens of the world. Exploration and participation in dialogues and solutions that are evolving at the international level around cross border sharing of information is key.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(i) States should take reasonable steps to ensure the integrity of the supply chain [of ICT equipment] so that end users can have confidence in the security of ICT products. States should seek to prevent the proliferation of malicious ICT tools and techniques and the use of harmful hidden functions; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the National Electronics Policy of 2012 states that the government should mandate technical and safety standards in order to curb the inflow of sub-standard and unsafe electronic products, the government is yet to mandate any broad standards in the Indian market for ICT equipment. Considering the enormous security implications of compromised ICT this is an area where the government should prioritize and must act immediately. Mandating standards may require the establishment of a monitoring or enforcement mechanism to ensure that the standards are being implemented. This should be done with the aim of ensuring security while not hindering innovation or the flow of business. To achieve such a balance, research and discussion is needed within the government to formulate a mechanism which would ensure the safety and quality of ICT tools while at the same time ensuring that industry is not hindered.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The suggestions given above are some of the major lessons from the analysis of the UN Report on ICT which CIS believe the government of India could adopt and pursue to strengthen its enlightenment with the recommendations of the Report. It is also imperative that the Government of India continues to realise the importance of the work being done by the Group of Governmental Experts and take measures to ensure that a representative from India is included in future Groups. Meanwhile, India can take positive steps by strengthening domestic privacy safeguards, improving transparency and efficiency of relevant policies and processes, and looking towards solutions that respect rights and strengthen security.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/policy-brief-on-the-report-of-the-un-group-of-governmental-experts-on-ict'&gt;https://cis-india.org/internet-governance/blog/policy-brief-on-the-report-of-the-un-group-of-governmental-experts-on-ict&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok and Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2016-08-23T15:37:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/policies-for-the-platform-economy">
    <title>Policies for the Platform Economy</title>
    <link>https://cis-india.org/internet-governance/news/policies-for-the-platform-economy</link>
    <description>
        &lt;b&gt;Anubha Sinha and Amber Sinha will be panelists in this event being organized by IT for Change at India Habitat  Centre in New Delhi on August 30, 2019. &lt;/b&gt;
        &lt;p&gt;The agenda for the event &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/agenda-for-policies-for-the-platform-economy"&gt;is here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/policies-for-the-platform-economy'&gt;https://cis-india.org/internet-governance/news/policies-for-the-platform-economy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2019-08-27T00:19:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-times-of-india-nilesh-christopher-and-naveen-menezes-june-14-2018-police-to-counter-fake-news-on-whatsapp">
    <title>Police to counter fake news on WhatsApp</title>
    <link>https://cis-india.org/internet-governance/news/the-times-of-india-nilesh-christopher-and-naveen-menezes-june-14-2018-police-to-counter-fake-news-on-whatsapp</link>
    <description>
        &lt;b&gt;State police across Karnataka, Assam, Telangana and Kerala are designing social media campaigns as an antidote to fake news on messaging apps like WhatsApp following claims that these platforms have been used to incite violence across several locations in recent weeks.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nilesh Christopher and Naveen Menezes was published in the &lt;a class="external-link" href="https://www.gadgetsnow.com/tech-news/police-to-counter-fake-news-on-whatsapp/articleshow/64584326.cms"&gt;Times of India&lt;/a&gt; on June 14, 2018. Pranesh Prakash was quoted. Also see the story on &lt;a class="external-link" href="https://economictimes.indiatimes.com/news/politics-and-nation/police-join-social-media-to-counter-whatsapp-vitriol/articleshow/64580982.cms"&gt;Economic Times&lt;/a&gt; here.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Alarmed by the rising incidence of attacks on individuals as a result of rumours spread by users of the app — owned by social network &lt;a class="key_underline" href="https://www.gadgetsnow.com/topic/facebook"&gt;Facebook&lt;/a&gt; — law enforcement authorities across several states are intensifying community policing using the same platforms.&lt;br /&gt;&lt;br /&gt;Bengaluru police commissioner T Suneel Kumar said the department is creating awareness about #FakeRumourOnChildKidnappers on social media as well as by distributing pamphlets across the city. “We have not written to either Facebook or WhatsApp as they would take their own time to respond. Instead, we have alerted our police personnel to be aware of repetition and are reaching out to people through different means,” he told ET.&lt;br /&gt;&lt;br /&gt;Last month, a mob lynched a man in a Bengaluru locality suspecting him to be a child abductor.&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;SPECIAL POLICE TEAMS FORMED&lt;/strong&gt;&lt;br /&gt;This was preceded by widely circulated videos on WhatsApp warning people about kidnappers being on the prowl in the city. Police arrested 25 people including four women and a minor in connection with the case.&lt;br /&gt;&lt;br /&gt;Incidents of lynching have also been reported across Assam, Telangana, Tamil Nadu and Kerala, where fake news and videos about suspected child abductors distributed on WhatsApp caused alarm among villagers.&lt;br /&gt;&lt;br /&gt;In Assam, over a dozen people have been arrested after a mob lynched two youngsters last week suspecting them to be child kidnappers. “We are monitoring social media and have chalked out counter strategies to ensure fake messages are not spread. The department also interacts with the public constantly,” DS Chauhan, Additional Commissioner of Police (Law and Order), Hyderabad City, told ET.&lt;br /&gt;&lt;br /&gt;“I do not have the details on whether anyone is arrested for spreading fake messages. It’s difficult to trace who started the rumours,” he said.&lt;br /&gt;&lt;br /&gt;In response to ET’s queries, a WhatsApp spokesperson said, “The privacy and security of our users is very important to WhatsApp. We've made it easy to block any phone number or report spam and we encourage people to report problematic messages so that we can take action. We’re also stepping up our education efforts so that people know about our safety features, as well as how to spot fake news or hoaxes on WhatsApp.”&lt;br /&gt;&lt;br /&gt;In Telangana and Assam, special police teams have been formed to monitor social media and to track fake messages and prepare a counter response.&lt;br /&gt;&lt;br /&gt;“In a week we get at least three calls of WhatsApp rumours causing unrest in various locations”, said an officer from the cybercrime branch of the Kerala Police.&lt;br /&gt;&lt;br /&gt;“We have given them (people) directions to start counter propaganda immediately, and we are assisting them in dispelling the rumour. We try to identify the administrator of the (WhatsApp) group that is used to spread rumours,” said the officer. He said the social messaging app has, so far, not cooperated with the police on these efforts.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;ANALYSTS DIVIDED&lt;/strong&gt;&lt;br /&gt;Cyber security analysts are divided on whether more can be done by social media platforms to counter the rising threat of fake news on these platforms. “This is clearly a case of a platform like WhatsApp (owned by Facebook) not doing enough. Just because WhatsApp is end-to-end encrypted it does not mean their hands are tied,” said Pranesh Prakash, a fellow at the Centre for Internet and Society, a policy advocacy group.&lt;br /&gt;&lt;br /&gt;“The WhatsApp application is linked to a mobile number, the platform has access to trace the individual who spread rumours,” said Prakash. They (social media networks) can “remind or signal to users about the terms of services when anyone spreads rumours,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has the largest user base for both WhatsApp and Facebook with over 240 million people accessing the platform. WhatsApp is also testing a digital payment system using the homegrown UPI network in the country.&lt;br /&gt;&lt;br /&gt;On the other hand, Apar Gupta, cofounder of Internet Freedom Foundation (IFF), reckons the danger from rumours that spread on WhatsApp is not just a technology issue but also a societal one.&lt;br /&gt;&lt;br /&gt;“Looking to decrease privacy in these platforms as a solution to curb fake news, or introducing a pre-screening mechanism to check every message that is sent is not a credible solution,” he said.&lt;br /&gt;&lt;br /&gt;To be sure, WhatsApp is testing a new feature wherein messages that are forwarded carry the tagline saying ‘forwarded as received’ alerting users that it is not an original creation but just a forward. The feature has not been rolled to all users in India.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-times-of-india-nilesh-christopher-and-naveen-menezes-june-14-2018-police-to-counter-fake-news-on-whatsapp'&gt;https://cis-india.org/internet-governance/news/the-times-of-india-nilesh-christopher-and-naveen-menezes-june-14-2018-police-to-counter-fake-news-on-whatsapp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-06-26T01:45:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/apc-june-14-2017-point-view-wins-laadli-media-award">
    <title>Point of View wins Laadli Media Award: “An encouragement to keep fighting for gender equality”</title>
    <link>https://cis-india.org/internet-governance/news/apc-june-14-2017-point-view-wins-laadli-media-award</link>
    <description>
        &lt;b&gt;The first season of Deep Dives - Sexing the Interwebs won the South Asian Laadli Media Award for Gender Sensitivity 2017 in the “Best web series" /"Special edition” category. Rohini Lakshané was one of ten contributors to the series of long form essays on the intersection of gender, sexuality and the Internet.&lt;/b&gt;
        
&lt;h4&gt;Rohini's essay titled "The trouble with being a woman in FOSS" shines a light on women's experiences of facing sexism and abuse in the FOSS domain.&lt;/h4&gt;
&lt;h4&gt;URL: &lt;a href="https://deepdives.in/the-trouble-with-being-a-woman-in-foss-75181981bfdd"&gt;https://deepdives.in/the-trouble-with-being-a-woman-in-foss-75181981bfdd&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;The series contributors, who Point of View congratulated as “the real stars of this award”, are:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;
&lt;p&gt;Neha Mathews, for a piece on the &lt;a href="https://deepdives.in/inside-the-world-of-india-s-badass-girl-gamers-eacb0c19b5a4"&gt;lives of gamer girls in India&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Nishita Jha, who reported &lt;a href="https://deepdives.in/behind-the-lens-of-women-s-nudies-8f01235106fd"&gt;behind the lens of women’s nudies&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Nadika Nadja, for a personal essay on &lt;a href="https://deepdives.in/the-smartphone-freed-me-a-journey-of-dating-as-a-transwoman-884cd2b786fa"&gt;dating as a transwoman&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Priya-Alika Elias, for a heartbreaking poem on &lt;a href="https://deepdives.in/text-3c0b0925794"&gt;young love and revenge porn&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Sheena D’Lima, who explored &lt;a href="https://deepdives.in/what-schoolgirls-in-india-can-teach-us-about-social-media-9d9e61c45f55"&gt;what schoolgirls use social media for&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;P. Mani, for an essay on &lt;a href="https://deepdives.in/reading-is-where-the-wild-things-are-what-i-learned-on-literotica-com-9c16aa960138"&gt;the joys of Literotica&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Rohini Lakshane, who took a hard look at &lt;a href="https://deepdives.in/the-trouble-with-being-a-woman-in-foss-75181981bfdd"&gt;what it means to be a woman in FOSS&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Afrah Shafiq, for an illustrated piece on &lt;a href="https://deepdives.in/searching-for-network-an-illustrated-story-7fa4c804f9ea"&gt;lesbian women finding love online&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Amba Salelkar, for a piece on &lt;a href="https://deepdives.in/what-was-the-first-sex-question-you-asked-google-a076ef546db3"&gt;asking Google sex questions&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Shreya Ila Anasuya, for a report on &lt;a href="https://deepdives.in/a-twist-in-a-straight-line-inside-india-s-kinky-networks-e3e19a90c144"&gt;India’s kinky social networks.&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;hr style="text-align: justify;" /&gt;
&lt;p style="text-align: justify;"&gt;Read more about the award and the series on &lt;a class="external-link" href="https://www.apc.org/en/news/point-view-wins-laadli-media-award-%E2%80%9C-encouragement-keep-fighting-gender-equality%E2%80%9D"&gt;APC website&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/apc-june-14-2017-point-view-wins-laadli-media-award'&gt;https://cis-india.org/internet-governance/news/apc-june-14-2017-point-view-wins-laadli-media-award&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-09-14T12:10:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/point-by-point-rebuttal">
    <title>Point By Point Rebuttal Of Indian Government’s Statement On Internet Control Rules</title>
    <link>https://cis-india.org/news/point-by-point-rebuttal</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has published a point-by-point rebuttal of the statement issued by India’s Department of Information Technology on India’s Internet Control Rules. The text below is reproduced from CIS India’s website, under a CC-BY license (which means anyone can re-publish it, with attribution. You can, too). We’ve highlighted (in bold) certain statements in the rebuttal. This article by Nikhil Pahwa was published in Medianama on May 13, 2011.&lt;/b&gt;
        
&lt;p&gt;The press statement issued on May 11 by the Department of Information Technology (DIT) on the furore over the newly-issued rules on ‘intermediary due diligence’ is misleading and is, in places, plainly false. We are presenting a point-by-point rebuttal of the DIT’s claims.&lt;/p&gt;
&lt;p&gt;In its &lt;a class="external-link" href="http://pib.nic.in/newsite/erelease.aspx?relid=72066"&gt;press release on Wednesday, May 11, 2011&lt;/a&gt; , the DIT stated:&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The attention of Government has been drawn to news items in a section of media on certain aspects of the Rules notified under Section 79 pertaining to liability of intermediaries under the Information Technology Act, 2000. These items have raised two broad issues. One is that words used in Rules for objectionable content are broad and could be interpreted subjectively. Secondly, there is an apprehension that the Rules enable the Government to regulate content in a highly subjective and possibly arbitrary manner.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;/em&gt;There are actually more issues than merely "subjective interpretation" and "arbitrary governmental regulation".&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;The Indian Constitution limits how much the government can regulate citizens’ fundamental right to freedom of speech and expression. Any measure afoul of the constitution is invalid.&lt;/li&gt;&lt;li&gt;Several portions of the rules are beyond the limited powers that Parliament had granted the Department of IT to create interpretive rules under the Information Technology Act. Parliament directed the Government to merely define what “due diligence” requirements an intermediary would have to follow in order to claim the qualified protection against liability that Section 79 of the Information Technology Act provides; &lt;strong&gt;these current rules have gone dangerously far beyond that, by framing rules that insist that intermediaries, without investigation, has to remove content within 36-hours of receipt of a complaint, keep records of a users’ details and provide them to law enforcement officials&lt;/strong&gt;.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;The Department of Information Technology (DIT), Ministry of Communications &amp;amp; IT has clarified that the Intermediaries Guidelines Rules, 2011 prescribe that due diligence need to be observed by the Intermediaries to enjoy exemption from liability for hosting any third party information under Section 79 of the Information Technology Act, 2000. These due diligence practices are the best practices followed internationally by well-known mega corporations operating on the Internet. &amp;nbsp;The terms specified in the Rules are in accordance with the terms used by most of the Intermediaries as part of their existing practices, policies and terms of service which they have published on their website&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;We are not aware of any country that actually goes to the extent of deciding what Internet-wide ‘best practices’ are and actually converting those ‘best practices’ into law by prescribing a universal terms of service that all Internet services, websites, and products should enforce.&lt;/p&gt;
&lt;p&gt;The Rules require all intermediaries to include the government-prescribed terms in an agreement, no matter what services they provide. It is one thing for a company to choose the terms of its terms of service agreement, and completely another for the government to dictate those terms of service. As long as the terms of service of an intermediary are not unlawful or bring up issues of users’ rights (such as the right to privacy), &lt;strong&gt;there is no reason for the government to jump in and dictate what the terms of service should or should not be&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The DIT has not offered any proof to back up its assertion that ‘most’ intermediaries already have such terms. &amp;nbsp;Google, a ‘mega corporation’ which is an intermediary, &lt;a class="external-link" href="http://www.google.com/accounts/TOS?hl=en"&gt;does not have such an overarching policy&lt;/a&gt;. &amp;nbsp;Indiatimes, another ‘mega corporation’ intermediary, &lt;a class="external-link" href="http://www.indiatimes.com/policyterms/1555176.cms"&gt;does not either&lt;/a&gt;. &amp;nbsp;Just because a company like Rediff and Blizzard’s World of Warcraft have some of those terms does not mean a) that they should have all of those terms, nor that b) everyone else should as well.&lt;/p&gt;
&lt;p&gt;In attempting to take different terms of service from different Internet services and products—the very fact of which indicate the differing needs felt across varying online communities—the Department has put in place a one-size-fits-all approach. &amp;nbsp;How can this be possible on the Internet, when we wouldn’t regulate the post-office and a book publisher under the same rules of liability for, say, defamatory speech.&lt;/p&gt;
&lt;p&gt;There is also a significant difference between the effect of those terms of service and that of these Rules. &amp;nbsp;An intermediary-framed terms of service suggest that the intermediary may investigate and boot someone off a service for violation, while the &lt;strong&gt;Rules insist that the intermediary simply has to mandatorily remove content, keep records of users’ details and provide them to law enforcement officials, else be subject to crippling legal liability&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;So to equate the effect of these Rules to merely following ‘existing practices’ is plainly wrong. An intermediary—like the CIS website—should have the freedom to choose not to have terms of service agreements. We now don’t.&lt;/p&gt;
&lt;p&gt;"&lt;em&gt;In case any issue arises concerning the interpretation of the terms used by the Intermediary, which is not agreed to by the user or affected person, the same can only be adjudicated by a Court of Law. The Government or any of its agencies have no power to intervene or even interpret. DIT has reiterated that there is no intention of the Government to acquire regulatory jurisdiction over content under these Rules. It has categorically said that these rules do not provide for any regulation or control of content by the Government.&lt;/em&gt;"&lt;/p&gt;
&lt;p&gt;The Rules are based on the &lt;strong&gt;presumption that all complaints (and resultant mandatory taking down of the content) are correct, and that the incorrectness of the take-downs can be disputed in court. &amp;nbsp;Why not just invert that, and presume that all complaints need to be proven first?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Indeed, the courts have insisted that presumption of validity is the only constitutional way of dealing with speech. (See, for instance, Karthikeyan R. v. Union of India, a 2010 Madras High Court judgment.)&lt;/p&gt;
&lt;p&gt;Further, only constitutional courts (namely High Courts and the Supreme Court) can go into the question of the validity of a law. &amp;nbsp;Other courts have to apply the law, even if it the judge believes it is constitutionally invalid. &amp;nbsp;So, most courts will be forced to apply this law of highly questionable constitutionality until a High Court or the Supreme Court strikes it down.&lt;/p&gt;
&lt;p&gt;What the Department has in fact done is to explicitly &lt;strong&gt;open up the floodgates for increased liability claims and litigation&lt;/strong&gt; – which runs exactly counter to the purpose behind the amendment of Section 79 by Parliament in 2008.&lt;/p&gt;
&lt;p&gt;"&lt;em&gt;The Government adopted a very transparent process for formulation of the Rules under the Information Technology Act. The draft Rules were published on the Department of Information Technology website for comments and were widely covered by the media. None of the Industry Associations and other stakeholders objected to the formulation which is now being cited in some section of media.&lt;/em&gt;"&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;This is a blatant lie.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Civil society voices, including CIS, Software Freedom Law Centre, and individual experts (such as the lawyer and published author Apar Gupta) sent in comments. &amp;nbsp;Companies such as Google and others had apparently raised concerns as well. We at CIS even received a ‘read notification’ from the email account of the Group Coordinator of the DIT’s Cyber Laws Division—Dr. Gulshan Rai—on Thursday, March 3, 2011 at 12:04 PM (we had sent the mail to Dr. Rai on Monday, February 28, 2011). &amp;nbsp;We never received any acknowledgement, though, not even after we made an express request for acknowledgement (and an offer to meet them in person to explain our concerns) on Tuesday, April 5, 2011 in an e-mail sent to Mr. Prafulla Kumar and Dr. Gulshan Rai of DIT.&lt;/p&gt;
&lt;p&gt;The process can hardly be called ‘transparent’ when the replies received from ‘industry associations and other stakeholders’ have not been made public by the DIT. Those comments which are public all indicate that serious concerns were raised as to the constitutionality of the Rules.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The Government has been forward looking to create a conducive environment for the Internet medium to catapult itself onto a different plane with the evolution of the Internet. The Government remains fully committed to freedom of speech and expression and the citizen’s rights in this regard.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;The DIT has limited this statement to the rules on intermediary due diligence, and has not spoken about the controversial new rules that stifle cybercafes, and restrict users’ privacy and freedom to receive information.&lt;/p&gt;
&lt;p&gt;If the government is serious about creating a conducive environment for innovation, privacy and free expression on the Internet, then it wouldn’t be passing Rules that curb down on them, and it definitely will not be doing so in such a non-transparent fashion.&lt;/p&gt;
&lt;p&gt;Read the original published in Medianama &lt;a class="external-link" href="http://www.medianama.com/2011/05/223-point-by-point-rebuttal-of-indian-governments-statement-on-internet-control-rules/"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/point-by-point-rebuttal'&gt;https://cis-india.org/news/point-by-point-rebuttal&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-05-25T12:46:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/podcast-on-abortion-rights-and-privacy-with-pi">
    <title>Podcast on 'Abortion rights and privacy' with PI</title>
    <link>https://cis-india.org/internet-governance/news/podcast-on-abortion-rights-and-privacy-with-pi</link>
    <description>
        &lt;b&gt;Ambika Tandon recorded a podcast with Privacy International on abortion rights, bodily autonomy, and privacy in the Indian and Argentinian context, which was released on December 6, 2018.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The participants in the podcast are Eva Blum-Dumontet from Privacy International, Eduardo Ferreyra from Asociacion pos los Derechos Civiles, and Ambika herself. Listen to the &lt;a class="external-link" href="https://soundcloud.com/privacyinternational/gender-and-privacy-series-abortion"&gt;podcast here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/podcast-on-abortion-rights-and-privacy-with-pi'&gt;https://cis-india.org/internet-governance/news/podcast-on-abortion-rights-and-privacy-with-pi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-25T01:09:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-april-10-2016-somesh-jha-pmo-no-to-smart-cards-insists-aadhaar">
    <title>PMO’s no to smart cards, insists on Aadhaar </title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-april-10-2016-somesh-jha-pmo-no-to-smart-cards-insists-aadhaar</link>
    <description>
        &lt;b&gt;The government has decided to stop issuing new smart cards to beneficiaries of government schemes as Aadhaar is now backed by a law. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Somesh Jha was published in the Hindu on April 10, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Prime Minister’s Office (PMO) has issued strict instructions to the Information Technology Ministry to ensure that States and the Central governmentstop issuing smart cards for new programmes for beneficiaries, and to rely on the Aadhaar-based Direct Benefit Transfer platform instead.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move will impact ministries such as Labour, Social Justice and Health, which are in the process or have already rolled out smart cards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government had said earlier that over 100 crore people, constituting 93 per cent of the adult population, had a unique identification (UID) number under the Aadhaar platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The undersigned is directed to request the department to examine the need for state and central government departments to issue separate smart cards in the light of the near universal coverage of Aadhaar and the delivery of the most public welfare benefits through Aadhaar enabled platforms,” according to a directive issued by Gulzar N, Director, PMO, to Aruna Sharma, Secretary, Department of Electronics and Information Technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The undersigned is also directed to request the department to prepare policy on the delivery of various public services using Aadhaar, Jan Dhan Yojana and existing platforms without the issuance of new smart cards.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last month, Union Minister for Social Justice and Empowerment Thaawar Chand Gehlot had announced that all differently abled persons would soon get a unique identity card to avail welfare schemes. .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;State governments had also planned to use smart card technology for welfare schemes. For instance, Odisha was mulling smart cards for construction workers in the State.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The PMO sent a separate communiqué to Labour Secretary Shankar Aggarwal in the context of a proposal to issue 40 crore smart cards to informal sector workers, called the Unorganised Workers’ Identification Number (U-WIN). The UWIN cards were to be used by these workers to access benefits under schemes such as Rashtriya Swasthya Bima Yojana , Aam Aadmi Bima Yojana , Atal Pension Yojana, Pradhan Mantri Suraksha Bima Yojana and Jeevan Jyoti Bima Yojana.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The PMO rejected the proposal noting that Aadhaar would act as a “universal unique identifier for each citizen.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Adding a UWIN number would not only duplicate work, but also introduce further problems in linking up with other databases which have already been linked with Aadhaar,” said the missive reviewed by The Hindu.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, experts are sceptical of the government’s move.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Smart cards are always better than biometrics. If that was not the case, the global financial infrastructure today will be working on biometrics and not on smart cards,” said Sunil Abraham, executive director of The Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Why are these banks working on smart cards? Smart cards work using cryptography, which is more fool-proof than biometrics. Biometrics allow for remote, covert and non-consensual identification,” Mr. Abraham said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Smart card vendors, however, said the move may not impact their market. “The demand for smart cards is massive in all the other segments such as for use in debit and credit cards or driving licenses and vehicle registration numbers,” said Deven Mehta, managing director of the Mumbai-based Smart Card IT Solutions.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-april-10-2016-somesh-jha-pmo-no-to-smart-cards-insists-aadhaar'&gt;https://cis-india.org/internet-governance/news/the-hindu-april-10-2016-somesh-jha-pmo-no-to-smart-cards-insists-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-04-20T02:19:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/pma-policy-and-coai-recommendations">
    <title>PMA Policy and COAI Recommendations </title>
    <link>https://cis-india.org/internet-governance/blog/pma-policy-and-coai-recommendations</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Ministry of Communications and Information Technology on the 10th of February, 2012 released a notification &lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt; in the Official Gazette outlining the Preferential Market Access &lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt; Policy for Domestically Manufactured Electronic Goods 2012. The Policy is applicable to procurement of telecom products by Government Ministries/Departments and to such electronics that had been deemed to having security concerns, thus making the policy applicable to private bodies in the latter half. The Notification reasoned that preferential access was to be given to domestically manufactured electronic goods predominantly for security reasons. Each Ministry or Department was to notify the products that had security implications, with reasons, after which the notified agencies would be required to procure the same from domestic manufacturers. This policy was also meant to be applicable to even procurement of electronic goods by Government Ministries/Agencies for Governmental purposes except Defence. Each Ministry would be required to notify its own percentage of such procurement, though it could not be less than 30%, and also had to specify the Value Addition that had to be made to a particular product to qualify it as a domestically manufactured product, with the policy again specifying the minimum standards. The policy was also meant for procurement of electronic hardware as a service from Managed Service Providers (MSPs).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The procurement was to be done as according to the policies of the each procuring agency. The tender was to be apportioned according to the procurement percentage notified and the preference part was to be allotted to the domestic manufacturer at the lowest bid price. If there were no bidders who were domestic manufacturers or if the tender was not severable, then it was to be awarded to the Foreign Manufacturer and the percentage adjusted as against other electronic procurement for that period.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Telecom equipment that qualifies as domestically manufactured telecom products for preferential market access include: encryption and UTM platforms, Core/Edge/Enterprise routers, Managed leased line network equipment, Ethernet Switches, IP based Soft Switches, Media gateways, Wireless/Wireline PABXs, CPE, 2G/3G Modems, Leased-line Modems, Set Top Boxes, SDH/Carrier Ethernet/Packet Optical Transport Eqiupments, DWDN systems, GPON equipments, Digital Cross connects, small size 2G/3G GSM based Base Station Systems, LTE based broadband wireless access systems, Wi-Fi based broadband wireless access systems, microwave radio systems, software defined radio cognitive radio systems, repeaters, IBS, and distributed antenna system, satellite based systems, copper access systems, network management systems, security and surveillance communication systems (video and sensors based), optical fiber cable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Policy also mentioned the creation of a self-certification system to declare domestic value addition to the vendor. The checks would be done by the laboratories accredited by the Department of Information Technology. The policy was to be in force for a period of 10 years and any dispute concerning the nature of product was to be referred to the Department of Information Technology.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;International and Domestic Response to the Policy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There was a large scale opposition, usually from international sectors, towards the mooting of this policy. Besides business houses, even organizations like those of the United States Trades Representatives criticized the policy as being harmful to the global market and in violation of the World Trade Organization Guidelines.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; Criticism also poured in from domestic bodies in terms of recommendations towards modification of the policy largely on three grounds: (i) the high domestic value addition requirement and the method of calculation of the same, (ii) the lack of a link between manufacturing and security and (iii) application of the policy to the private sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Cellular Operations Association of India (COAI) in a letter dated March 15, 2012 to the Secretary of the Department Technology and Chairman of the Telecom Commission expressed its views on the telecom manufacturing in the country.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;The COAI stated that such a development had to be done realistically and holistically so that the whole eco-system was developed as a comprehensive whole. In that regard it also forwarded a study that had been commissioned by COAI and conducted by M/s. Booz and Company titled “Telecom Manufacturing Policy – Developing an Actionable Roadmap”. The report was a comprehensive study of the telecom industry and outlined the challenges and opportunities that lay on its development trajectory. It also talked about Government involvement in the development process. The Report while citing the market share of Indian Telecom Industry which would be around 3% &lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt; of the Global Market highlighted the fact that no country could be self-sufficient in technology. It further talked about the development of local clusters in order to cut costs and encourage manufacturing, while ensuring that the PMA Policy was consistent with the WTO Guidelines. It further recommended opening up of foreign investments and making capital available to ensure growth of innovation. Finally it highlighted the lack of a connection between manufacturing and security and instead stressed upon proper certification, checks and development of a comprehensive CIIP framework across all sensitive networks for security purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a further letter to the Joint Secretary of the Department of Information and Technology dated April 25, 2012 the COAI expressed some reservations concerning the draft guidelines that had been published along with the notification.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; While stressing upon the fact that a higher value addition would be impossible with the lack of basic manufacturing capabilities for the development of technological units, it also highlighted the need to redefine Bill of Materials which had been left ambiguous and subject to exploitation. It further highlighted the fact that allowing every Ministry to make its own specifications would lead to inconsistent definitions and an administrative challenge and hence such matters should be handled by a Central Body. Furthermore it opined that the calculation of BOMs and the Value Additions should be done using the concept of substantial transformation as has been given in the Booz Study. Furthermore, while discouraging the use of disincentives, it stated that one individual Ministry should be in charge of specifying such incentives to avoid confusion and for the sake of ease of business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In another letter to a Member of the Department of Telecommunications dated July 12, 2012 the COAI stressed upon the futility of having high value additions as the same was impossible under the present scenario.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; There was a lack of manufacturing sector which had to be comprehensively developed backed by fiscal incentives and comprehensive policies. In spite of that, it stressed that no country could become self-reliant and that such policies, like the PMA, were reminiscent of the “license and permit raj” era. It further said that such policies should be consistent with WTO Guidelines and should not give undue preference to domestic manufacturers to the detriment of other manufacturers. Countering the security aspect, it said that the same had been addressed by the DoT License Amendment of May 31, 2011 whereby all equipments on the network would have to comply with the “Safe to Connect” standard, and stressed upon the lack of any link between manufacturing and security. Furthermore for calculation of Value Addition it suggested an alternative to the method proposed by the Government as the same would lead to disclosures of sensitive commercial information which were contained in the BOMs. The COAI said that the three stages as laid out in the Substantial Transformation (as mentioned in the Booz Study) should be used for calculating the VA. It made several proposals to develop the telecom manufacturing industry in India including provision of fiscal incentives, development of telecom clusters and comprehensive policies which led to harmonization with laws and creation of SEZs among other such benefits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In October 2012 the Government released a draft notification notifying products due to security consideration in furtherance of the PMA Policy.&lt;a href="#fn8" name="fr8"&gt;[8] &lt;/a&gt;The document outlined the minimum PMA and VA specification for a range of products. It also stated several security reasons for pursuing such a policy and stated that India had to be completely self-reliant for its active telecom products. It also contained data on the predicted growth of the telecom market in India. The COAI thereafter released a document commenting upon the draft notification of the Government.&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides highlighting the fact that the COAI still had not received a response to its former comments, it again stressed upon the lack of a link between security and manufacturing. It reiterated its point on the impossibility of a complete self-reliance on any nation’s part, and stressed upon the need of involving other stakeholders in the promulgation of such policies. It also made changes to the notified list of equipments, reclassifying it according to technology and only listing equipments which had volumes. Furthermore it also suggested changes towards the calculation of value addition to include materials sourced from local suppliers, in-house assemblage to be considered local material and the calculation to be done for complete order and not for each item in the order. It further recommended a study be conducted and the industry be involved while predicting demands as such were dated and needed revision. The Government thereafter released a revised notification&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; on October 5, 2012 but it did not contain much of the commented changes that the COAI had proposed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thereafter in April 2013, the DeitY released draft guidelines&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; for providing preference to domestically manufactured electronic products in Government Procurement in further of the second part of the PMA Policy. The guidelines besides containing definitions to several terms such as BOM also prescribed a minimum of 20% domestic procurement while leaving the specifications onto individual Ministries. It recommended the establishment of a technical committee by the concerned Ministry or Department that would recommend value addition to products. It followed a BOM based calculation of Value Addition while leaving the matter of certification to be dealt by DeitY certified laboratories that are notified for such purposes by the concerned Ministry/Department. DeitY was the nodal ministry for monitoring the implementation of the policy while particular monitoring was left to each Ministry or Department concerned. Among the annexures were indicative lists of generic and telecom products and a format for Self Certification regarding Domestic Value Addition in an Electronic Product.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The COAI thereafter released a revised draft containing its own comments on April 15, 2013.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; The COAI pointed out faults in the definition of BOM. It highlighted the difficulty in splitting R&amp;amp;D according to countries, and also stressed upon the impractical usage of BOM in calculation of value addition as the same was confidential business information. As it had already suggested earlier, it reiterated the usage of the Substantial Transformation process for the calculation of Value Addition. While removing the lists of equipments mentioned, it further pointed out that the disqualification in the format for self-certification would be a very harsh disincentive and would result in driving away manufacturers. It suggested that there should be incentives for compliance instead.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The COAI along with the Association of Unified Telecom Service Providers of India sent a letter dated January 24, 2013 to the Secretary, DoT containing their inputs on Draft List of Security Sensitive Telecom Products for Preferential Market Access (PMA).&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; It again stressed upon the fact that security and manufacturing were not related and that the security aspect had been dealt by the “Safe to Connect” requirement mandated by the DoT License Amendment. It talked of the impossibility of arriving at VA figures until the same is defined to internationally accepted norms. Further it opined that if the Government had security concerns it should consider VA at a network level in the configurations as would be deployed in the network or its segments rather at element or subsystem levels as the latter would leave too many calculations open and the procurement entities will find it very difficult to ensure if they meet the PMA requirement or not. It further stressed upon the need to comply with WTO Guidelines while stressing upon the need to pay heed to certification standards than pursue the unavailable link between manufacturing and security through a PMA Policy. Finally it suggested a grouping of telecom products for the policy based on technology rather than individual products.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pursuant to a Round Table Conference Organized by the Department of Information and Technology, AUSPI and COAI sent another letter dated April 15, 2013 to the Secretary, Department of Information and Technology.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; It reiterated several points that both the AUSPI and COAI had been suggesting to the Government on the Telecom Manufacturing Policy. It cited the examples of other manufacturing nations to reiterate the fact that no country could be completely self-reliant in manufacturing electronics and such positions would only lead to creation of an environment that would not be conducive to global business. It further stressed upon the need to change the manner of calculation of VA while highlighting the fact that every Department should notify its list of products having security implications and the list of telecom equipment should be deleted from the draft guidelines being issued by DeitY to ensure better implementation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A major change came in on July 8, 2013 when the Prime Minister’s Office made a press release withdrawing the PMA policy for review and withholding all the notifications that had been issued in that regard.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; It said that  he revised proposal will incorporate a detailed provision for project / product / sector specific security standards, alternative modes of security certification, and a roadmap for buildup of domestic testing capacity. It further noted that the revised proposal on PMA in the private sector for security related products will not have domestic manufacturing requirements, percentage based or otherwise and that the revised proposal will incorporate a mechanism for a centralised clearing house mechanism for all notifications under the PMA Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The COAI thereafter on November 7, 2013 sent a letter to the DoT containing feedback on the list of items slated for Government procurement.&lt;a href="#fn16" name="fr16"&gt;[16] &lt;/a&gt;It noted that there were 23 products on which PMA was applicable. It pointed out that there were no local manufacturers for many of the products notified. It also asked the Government to take steps to ensure that fiscal incentives were given to encourage manufacturing sector which was beset by several costs such as landing costs which acted as impediments to its development. It stressed upon the tiered development of the industry needed to ensure that a holistic and comprehensive growth is attained which would result in manufacturing of local products. It requested that the Government "focus on right enablers (incentives, ecosystem, infrastructure, taxation) as the outcome materializes once all of these converge."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The COAI sent a further letter dated November 13, 2013 to the DoT concerning the investment required in the telecom manufacturing industry.&lt;a href="#fn17" name="fr17"&gt;[17] &lt;/a&gt;It noted the projected required investment of 152bn USD in the telecom sector and that the Government had projected that 92% of the investment would have to come from the Private Sector. COAI, while stressing upon the need of the Government and the Private Industry to work in tandem with each other, suggested that the Government devise methods to attract investments in the telecom sectors from international telecom players and that the Telecom Equipment Manufacturing Council meet to review and revise methods for attracting such investments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pursuant to the PMO directive, DeitY released a revised PMA Policy on the 23rd of December, 2014.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; While there have been a few major changes, not all of recommendations by various bodies have been adhered to.&lt;a href="#fn19" name="fr19"&gt;[19] &lt;/a&gt;The major changes in the revised policy included the exemption of the private sector from the policy and the removal of PMA Policy to equipments notified for security reasons. The manner of calculation of the domestic value addition has not been changed though there has been a reduction in the percentage of value addition needed to qualify a product as domestic product. Another addition has been of a two-tiered implementation mechanism for the Policy. Tier-I includes a National Planning and Monitoring Council for Electronic Products which would design a 10-year roadmap for the implementation of the policy including notification of the products and subsequent procurement. Under Tier-II, the Ministries and Departments will be issuing notifications specifying products and the technical qualifications of the same, after approval by the Council. The former notifications under the 2012 Policy, including the notification of 23 telecom products by Department of Telecom,&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; are still valid until revised further.&lt;a href="#fn21" name="fr21"&gt;[21] &lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. No. 8(78)/2010-IPHW. Available at http://www.dot.gov.in/sites/default/files/5-10-12.PDF (accessed 03 June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Preferential Market Access&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See &lt;i&gt;The PMA Debate, &lt;/i&gt;DataQuest at http://www.dqindia.com/dataquest/feature/191001/the-pma-debate/page/1 (accessed June 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. The letter is available at http://www.coai.com/Uploads/MediaTypes/Documents/letter-to-dit-on-pma-notification.pdf (accessed  June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Around $17bn.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. The letter is available at http://www.coai.com/Uploads/MediaTypes/Documents/letter-to-dit-on-pma-notification.pdf (accessed  June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. The letter is available at http://www.coai.com/Uploads/MediaTypes/Documents/coai-to-dot-on-enhancing-domestic-manufacturing-of-telecom-equipment-bas.pdf (accessed  June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. The notification no. 18-07/2010-IP can be found at http://www.coai.com/Uploads/MediaTypes/Documents/DoT-draft-notification-on-Policy-for-preference-to-domestically-manufactured-telecom-products-in-procurement-October-2012.pdf  (accessed  June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. The commented COAI draft can be found at http://www.coai.com/Uploads/MediaTypes/Documents/Annexure-1-Comments-on-draft-notification-by-DoT.pdf (accessed  June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Available at http://www.coai.com/Uploads/MediaTypes/Documents/dots-notification-on-telecom-equipment-oct-5,-2012.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. The draft guidelines can be found at http://www.coai.com/Uploads/MediaTypes/Documents/pma_draft-govt-procurement-guidelines-april-2013.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. The COAI commented draft can be found at http://www.coai.com/Uploads/MediaTypes/Documents/pma-draft-security-guidelines-15-april-2013.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. The letter can be found at http://www.coai.com/Uploads/MediaTypes/Documents/jac-007-to-dot-on-Januarys-list-of-telecom-products-final.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. The letter can be found at http://www.coai.com/Uploads/MediaTypes/Documents/jac-to-moc-on-pma.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. The press release can be found at http://www.coai.com/Uploads/MediaTypes/Documents/pmo-on-pma.pdfhttp://www.coai.com/Uploads/MediaTypes/Documents/pmo-on-pma.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. The letter can be found at http://www.coai.com/Uploads/MediaTypes/Documents/COAI-letter-to-DoT-on-Feedback-on-List-of-Items-for-Govt-Procurement.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. The letter can be found at http://www.coai.com/Uploads/MediaTypes/Documents/COAI-letter-to-DoT-on-Investments-Required-(TEMC)-Nov%2013-2013.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. The Notification No. 33(3)/2013-IPHW can be found at http://deity.gov.in/sites/upload_files/dit/files/Notification_Preference_DMEPs_Govt_%20Proc_23_12_2013.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. For more information, see http://electronicsb2b.com/policy-corner/revised-preferential-market-access-policy/# (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. The notification has been mentioned and discussed above.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. A list of notifications dealing with electronic products except telecom products can be found on the website of DeitY at http://deity.gov.in/esdm/pma (accessed June, 2014).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/pma-policy-and-coai-recommendations'&gt;https://cis-india.org/internet-governance/blog/pma-policy-and-coai-recommendations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>dipankar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-02T06:45:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/free-press-journal-march-25-2018-pm-app-also-susceptible">
    <title>PM’s app also susceptible</title>
    <link>https://cis-india.org/internet-governance/news/free-press-journal-march-25-2018-pm-app-also-susceptible</link>
    <description>
        &lt;b&gt;Even the Narendra Modi app of PM Modi is susceptible to data theft as a 22-year old Indian hacker established, claiming that privacy of more than 70 lakh users on it is at stake. &lt;/b&gt;
        &lt;p&gt;This was published by &lt;a class="external-link" href="http://www.freepressjournal.in/india/pms-app-also-susceptible/1244038"&gt;Free Press Journal&lt;/a&gt; on March 25, 2018&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Still worse is that anybody downloading the app may not know that all data on his mobile automatically goes to CleverTap without his or her consent to let the firm populate it alike British firm Cambridge Analytica that helped the US President Donald Trump in the last election with the vast data stolen from Facebook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Congress social media chief Divya Spandana/ Ramya on Saturday retweeted a tweet by one Pranesh Prakash to know whether Law Minister Ravi Shankar Prasad talking of summoning Facebook CEO Mark Zuckerberg will also summon the PM for privacy violation and data theft.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once you download the Narendra Modi app, all your data like your phone numbers, emails, name, location and interests as also all on your phone list, WhatsApp list and email is captured and then populated to know your interests and send you mails and messages accordingly, Divya explained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hacker Javed Khatri, who was able to crack the app late last year says he is able to access private data of any user and that is how he “successfully managed to extract the personal phone numbers and email ids of ministers like Smriti Irani.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Not only that, I can make any user on the platform follow any other user on the platform. This is just the summary of this huge security loophole which I want to report. The privacy of more than seven million users is at stake if this gets ignored.” Javed said, stressing that he did not want to cause any harm but wanted to demonstrate how poor the security of the app is that he could easily hack it.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/free-press-journal-march-25-2018-pm-app-also-susceptible'&gt;https://cis-india.org/internet-governance/news/free-press-journal-march-25-2018-pm-app-also-susceptible&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-03-27T01:23:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-may-11-2017-plug-data-leak-before-imposing-aadhaar">
    <title>Plug data leak before imposing Aadhaar</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-may-11-2017-plug-data-leak-before-imposing-aadhaar</link>
    <description>
        &lt;b&gt;As the Central government continues to expand the scope and boundaries of the applicability of Aadhaar, the unique identification number, even before the Supreme Court’s verdict on its constitutional validity, reports suggesting that millions of Aadhaar numbers may have been leaked deliberately or inadvertently are a matter of grave concern.&lt;/b&gt;
        &lt;p&gt;The article was published in the &lt;a class="external-link" href="http://www.deccanherald.com/content/611047/plug-data-leak-imposing-aadhaar.html"&gt;Deccan Herald&lt;/a&gt; on May 11, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society, a Bengaluru-based organisation, has  claimed that close to 135 million Aadhaar numbers and 100 million bank  account numbers have been exposed by government portals dealing with  pension, social welfare and employment guarantee schemes. The report  says that with Aadhaar being used or planned to be used for  authenticating and authorising several transactions, the financial risks  of the disclosure of such data are greatly exacerbated. Virtually  confirming that some ‘over-enthusiastic’ government agencies have been  making the Aadhaar data public, Aruna Sundararajan, secretary, Union  Electronics and Information Technology Ministry, has said that the  Centre is in the process of ‘educating officials’ about the sanctity of  the material collected, besides drafting amendments to the Information  Technology Act to ensure data protection and secrecy. That’s indeed a  late realisation, and hopefully, not a case of locking the stables once  the horses have bolted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court is also rightly concerned about the invasion of a citizen’s body in obtaining fingerprints and iris impressions for Aadhaar and the violation of an individual’s privacy. Attorney General Mukul Rohatgi raised several eyebrows by arguing that “citizens don’t have an absolute right over their own bodies” and there was nothing illegal about obtaining biometric details. He may be legally right, but as the court pointed out, it is the duty of the state to maintain the liberty and dignity of all individuals. As almost 98% of the population has already been covered by Aadhaar, the question of privacy is now more academic, though making Aadhaar mandatory for the filing of income tax along with PAN card is not. As the government is unable to come to grips with millions of benami transactions and largescale evasion of income tax in the country, if the linking of Aadhaar is going to bring down such cases, it needs to be welcomed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Aadhaar is not a magic bullet that has a solution for every problem. The government shoulddrop the idea of making it mandatory for social welfare programmes such as children availing midday mealsin schools, supply of nutrition under ICDS programme and provision of scholarship for the disabled. The government certainly has a responsibility to prevent misuse of the schemes, while making sure that welfare measures are not denied to the needy on technical grounds.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-may-11-2017-plug-data-leak-before-imposing-aadhaar'&gt;https://cis-india.org/internet-governance/news/deccan-herald-may-11-2017-plug-data-leak-before-imposing-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-17T02:10:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livelaw-june-10-2017-simran-sahni-placements-at-nujs">
    <title>Placements at NUJS: Class of 2017 Scores 100%</title>
    <link>https://cis-india.org/internet-governance/news/livelaw-june-10-2017-simran-sahni-placements-at-nujs</link>
    <description>
        &lt;b&gt;The Campus Recruitment Committee of the Class of 2017, NUJS is proud to confirm that NUJS has once again topped the placement tally among the premier national law schools, in terms of number of jobs, for the year 2016-17 with the graduating class having secured offers for all its 78 members who partook in the recruitment process. &lt;/b&gt;
        &lt;p&gt;The blog post by Simran Sahni was published in &lt;a class="external-link" href="http://www.livelaw.in/placements-nujs-class-2017-scores-100/"&gt;Livelaw&lt;/a&gt; on June 10, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The number of students hired by the domestic law firms on Day Zero with a tally totaling 57, inclusive of the 24 accepted pre-placement offers (PPOs).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ‘Big 7’ firms contributed to 53 of these jobs and ICICI Bank recruited 4. New recruiters including Indus Partners and Singh &amp;amp; Associates hired from campus this year, picking three students each. Three students bagged offers from international law firms: Herbert Smith Freehills, Linklaters, and Allen &amp;amp; Overy respectively.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The salaries remain the same as last year with the average foreign firm package ranging from INR 38 lakhs to 44 lakhs for traineeships and the average domestic firm packages ranging from INR 8 lakhs to 18 lakhs. The firm with the highest domestic package was AZB and Partners, Mumbai.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, more than six students this year have decided to pursue higher education. Students have received admission offers in LLM from Harvard Law School, Cambridge Faculty of Law, NYU Faculty of Law, London School of Economics and Graduate Institute Geneva respectively. Charting new courses, while one student opting for a master’s in management has been offered admission at the renowned London Business School, another joined as a policy officer at the Centre for Internet and Society in Bangalore. Interestingly, even the topper of the class opted out of placements this year and set a new record by being the third in the line of scholars from NUJS to secure the prestigious Rhodes scholarship to Oxford University. Similarly, students have also decided to take up the meritorious one year Young India Fellowship program at Ashoka University.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the current placement figures, NUJS beats all market trends to secure the highest number of job offers among premier law schools. The Class of 2017 also marginally trumps the record of the Class of 2016 in terms of total number of ‘Big 7’ jobs, even with a large chunk of the batch opting out of campus recruitment and pursing litigation, higher education, civil and judicial services and roles in think tanks and other non-profit organization's - the results of which shall be released by us as and when they come.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This entire feat would not have been possible without the support of the respected Vice Chancellor, Prof. P. Ishwara Bhat, CRC team and faculty advisor Ms. Vaneeta Patnaik, and all the faculty members at NUJS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;NUJS has built an exceedingly steady placement record for itself over the years. The placement figures for the Class of 2017 of NUJS are now live on the website &lt;a class="external-link" href="http://sja.nujs.edu/newsroom/2017/06/07/placements-at-nujs-class-of-2017-scores-100"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livelaw-june-10-2017-simran-sahni-placements-at-nujs'&gt;https://cis-india.org/internet-governance/news/livelaw-june-10-2017-simran-sahni-placements-at-nujs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Placement</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-06-12T01:23:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-telegraph-july-10-2016-place-for-a-safety-net">
    <title>Place for a safety net</title>
    <link>https://cis-india.org/internet-governance/news/the-telegraph-july-10-2016-place-for-a-safety-net</link>
    <description>
        &lt;b&gt;Vinupriya took her life last week, humiliated by the morphed images of her naked body posted on a social media site. Experts warn that the spike in Internet traffic brings with it an increase in online sexual crimes. Measures must be taken urgently to save lives, they tell T.V. Jayan.

&lt;/b&gt;
        &lt;p align="justify"&gt;&lt;a class="external-link" href="http://www.telegraphindia.com/1160710/jsp/7days/story_95759.jsp"&gt;The article was published in the Telegraph on July 10, 2016&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="justify"&gt;Sangeeta (not her name) was 25 and working for a private company in  Mumbai when she suddenly told her family that she was going to quit her  job and stay at home. Her parents were flummoxed, but questioning and  coaxing yielded no answers. As the days rolled on, the management  graduate slipped into depression. Her worried family took her to a  counsellor. And it was only then that she came out with her story.&lt;/p&gt;
&lt;p align="justify"&gt;Soon after she joined the company, Sangeeta got romantically involved  with her boss. By the time she learnt he was married, the involvement  had taken a physical turn. And when she tried to put an end to it, the  man, who had recorded their intimate moments, used the video clips to  blackmail her for sexual favours. After Sangeeta's confession and a  police complaint, the blackmailing boss was nabbed and put behind bars.&lt;/p&gt;
&lt;p align="justify"&gt;Vinupriya, an undergraduate student from Salem, Tamil Nadu, was not  so lucky. She found that her morphed images had been uploaded on  Facebook. She committed suicide last week after her parents refused to  believe her story, and the police failed to act swiftly.&lt;/p&gt;
&lt;p align="justify"&gt;Cyber experts are alarmed by the increase in online crimes against  women in India. According to them, what is more worrying is that though  the risks are catastrophic, the issues are not being addressed at a  larger level.&lt;/p&gt;
&lt;p align="justify"&gt;"Vinupriya's case is particularly frightening. I suspect this would  be the first of many such tragedies. They might even result in honour  killings, as such crimes can destroy the reputation of families," says  American cyber lawyer Parry Aftab, executive director of the voluntary  organisation, Wired Safety, which she founded 20 years ago, and which  deals extensively with cyber stalking and other crimes.&lt;/p&gt;
&lt;p align="justify"&gt;Earlier this week, a man was arrested in Delhi for sending obscene  messages to more than 1,500 women in the National Capital Region.  According to the police, the miscreant would randomly dial any number  and if the caller turned out to be a woman, he would save the number and  later check out her WhatsApp profile picture. He would then send  obscene clips to the woman. One news report said some of the marriages  were in trouble because husbands had seen the messages and suspected  that their wives were in a relationship with the man sending those  explicit messages.&lt;/p&gt;
&lt;p align="justify"&gt;Aftab has been studying the dangers of online stalking for a while.  There are no figures on this in India, but a top United Nations  official, stationed in New Delhi and dealing with trafficking, told her  that about 500 rape and sexual assault cases were recorded and shared  over WhatsApp in India this year.&lt;/p&gt;
&lt;p align="justify"&gt;She referred to a study conducted in the US that said one in three  girls and boys engaged in sexting. Children involved in sexting  contemplated suicide three times more than others of the same age, she  said.&lt;/p&gt;
&lt;p align="justify"&gt;According to her, Wired Safety volunteers come across five cases of  sextortion and sexting every day from Asian countries, including India,  and act upon them by red-flagging social media organisations where such  images are posted.&lt;/p&gt;
&lt;p align="justify"&gt;Pavan Duggal, a cyber lawyer based in Delhi, feels that social media  service providers are not doing enough to stop online sexual abuse.  "They are hiding behind a 2015 Supreme Court judgment, which said  content can be removed only on judicial orders or in response to  government notifications," he says.&lt;/p&gt;
&lt;p align="justify"&gt;The verdict he refers to was delivered in a case filed by a student  called Shreya Singhal. In 2012, two girls were arrested over their  Facebook post questioning the Mumbai shutdown for Shiv Sena patriarch  Bal Thackeray's funeral. The incident made an impression on Singhal, a  student of astrophysics at the University of Bristol, who was in India  at the time.&lt;/p&gt;
&lt;p align="justify"&gt;Upon research she discovered that Section 66(A) of India's IT Act was  subjective and any seemingly offensive social media post could land  anyone in jail. Singhal filed a writ petition in the Supreme Court  protesting that the section violated the constitutional right to freedom  of speech and expression, and in 2015, the apex court ruled in her  favour.&lt;/p&gt;
&lt;p align="justify"&gt;This judgment, however, emboldened cyber miscreants. "All the cyber  bullies and cyber stalkers now have a misplaced feeling that nothing can  happen to them," says Duggal. He points out that while the delivery of  justice takes time, the harassment happens 24x7.&lt;/p&gt;
&lt;p align="justify"&gt;"Who do the victims turn to for help? There are provisions in the  2011 IT rules that clearly say that social medial service providers  should have rules and regulations in place to deal with objectionable  content, but they do not act," he holds.&lt;/p&gt;
&lt;p align="justify"&gt;Aftab, however, believes that some efforts are in place. She cites  the example of Microsoft's PhotoDNA technology, which is used by many  social media and online search firms, including Facebook, Google and  Twitter, to prevent child pornography on the Internet. PhotoDNA works by  creating a number of mini hashes on a single image and combining them  to have a full hash. If anything is changed, even a pixel, then the hash  signature will not match.&lt;/p&gt;
&lt;p align="justify"&gt;But she holds that on a larger scale, it is difficult to  technologically deal with revenge porn, sextortion (using a sexual or  provocative image to blackmail people for sexual favours) and sexting  (sharing sexually provocative images of people, especially women) with  the intention of damaging reputation.&lt;/p&gt;
&lt;p align="justify"&gt;Sunil Abraham, executive director of the Bangalore-based Centre for  Internet and Society, hints at a lack of initiative on the part of the  social media organisations. "When it comes to enforcing intellectual  property, organisations like Facebook do an excellent job of keeping  their platform free of copyright infringement," he says. "So, clearly  these companies can police activities on their platform when it affects  their bottom-line."&lt;/p&gt;
&lt;p align="justify"&gt;And while this debate continues, more and more Indians join the  online experience, thereby increasing the chances of more such cases.  Aftab, who plans to set up a voluntary organisation relating to cyber  safety in India, says it is best to focus on proactive measures in the  interim.&lt;/p&gt;
&lt;p align="justify"&gt;Last month, she addressed 1,200 teenage girls from a Bangalore  college. "One of the first questions posed to me was from a young girl  who said she was currently being blackmailed by someone who threatened  to morph her pictures into sexually explicit images and send them to her  family and others. Morphed image issue seems to be a lot more serious  in India than in the West."&lt;/p&gt;
&lt;p align="justify"&gt;The problem, she stresses, is that such incidents can lead to  self-harm. To counter this, the affected person needs to inform his or  her family and enlist their support. Together, they should approach  social media organisations to ensure that the objectionable content is  removed in time. To prevent the offenders from doing further harm, they  then need to take the help of law enforcement agencies.&lt;/p&gt;
&lt;p align="justify"&gt;"The government for its part must amplify the voices of women and  hold these Internet corporations accountable for an information escrow.  There should be an independent mechanism to monitor whether Internet  platforms are taking complaints from women seriously," Abraham says.  Only then can a young girl like Vinupriya pluck up the courage to fight  online abuse.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-telegraph-july-10-2016-place-for-a-safety-net'&gt;https://cis-india.org/internet-governance/news/the-telegraph-july-10-2016-place-for-a-safety-net&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-13T02:45:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/www-livemint-september-25-2012-surabhi-agarwal-pitroda-seeks-to-put-govt-information-in-public-domain">
    <title>Pitroda seeks to put govt information in public domain</title>
    <link>https://cis-india.org/news/www-livemint-september-25-2012-surabhi-agarwal-pitroda-seeks-to-put-govt-information-in-public-domain</link>
    <description>
        &lt;b&gt;In the first-ever Indian government press conference on Twitter, Sam Pitroda, adviser to Prime Minister Manmohan Singh on public information infrastructure and innovations, championed the cause of putting government information in the public domain to usher in openness and empowerment. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Surabhi Agarwal's article was &lt;a class="external-link" href="http://origin-www.livemint.com/Politics/5xXKN9JH15noiYuQtVQtrL/Governments-first-ever-conference-on-Twitter-to-begin-short.html"&gt;published in LiveMint&lt;/a&gt; on September 25, 2012. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;img alt="  " src="http://origin-www.livemint.com/rw/LiveMint/Period1/2012/09/26/Photos/sam%20pitroda1--621x414.jpg" title="  " /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In India, we have the Right to Information (Act) but the information is locked up in files,” he said in a video that was uploaded on YouTube before the conference started. Pitroda said the government has various plans to build robust information infrastructure on a scale that has never been done before.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I firmly believe that information is the fourth pillar of democracy along with (the) legislature, executive and judiciary,” he tweeted as opening remarks during the press conference titled “Democratization of information”.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img alt="photo" height="220" src="http://origin-www.livemint.com/rf/Image-330x220/LiveMint/Period1/2012/09/26/Photos/web_socialmedia.jpg" width="330" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Even though Pitroda largely reiterated the government’s already announced plans in the space of digitization, the move to hold a press conference over Twitter has been largely construed as as a sign that the administration, criticised for attempting to rein in social media, is trying to come to terms with it.&lt;/p&gt;
&lt;p&gt;Sunil Abraham, executive director of Bangalore-based research organization Centre for Internet and Society, said too much shouldn’t be read into Pitroda holding a press conference on Twitter. One government bureaucrat available on Twitter for a fixed period doesn’t make up for the non-existence of the government on social media, he said. “They (government) should be available all the time.”&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The department of electronics and information technology recently issued guidelines for government agencies on improved engagement with citizens through social media. Tuesday’s press conference may spark a trend of more such engagements on social media platforms by government agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pitroda said that the public information infrastructure (PII) will include a national knowledge network that will connect 1,500 nodes for universities, colleges, research labs and libraries along with connecting 250,000 panchayats in the country through fibre optics. The information network will be operational in the next two year, Pitroda said in the YouTube video.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government’s open data platform (&lt;i&gt;http://www.data.gov.in&lt;/i&gt;), the beta site for which was launched some time ago, will provide access to government data and documents, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even though the government’s battles with the Internet continue over issues of regulation, which have often been construed as censorship, an increasing number of political leaders and agencies have been using the route to get their message across.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gujarat chief minister &lt;a href="http://origin-www.livemint.com/Search/Link/Keyword/Narendra%20Modi"&gt;Narendra Modi&lt;/a&gt; has sought to engage with people through video chat on &lt;a href="http://origin-www.livemint.com/Search/Link/Keyword/Google+"&gt;Google+&lt;/a&gt; Hangout. West Bengal chief minister and Trinamool Congress (TMC) chief &lt;a href="http://origin-www.livemint.com/Search/Link/Keyword/Mamata%20Banerjee"&gt;Mamata Banerjee&lt;/a&gt; has been using &lt;a href="http://origin-www.livemint.com/Search/Link/Keyword/Facebook"&gt;Facebook&lt;/a&gt; to make public her views on recent economic and political developments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Prime Minister’s Office (PMO) has also been communicating over Twitter in the recent past. The authorities have sought to block accounts that style themselves as belonging to the Prime Minister. Account holders have said that some of these are satirical in nature.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/www-livemint-september-25-2012-surabhi-agarwal-pitroda-seeks-to-put-govt-information-in-public-domain'&gt;https://cis-india.org/news/www-livemint-september-25-2012-surabhi-agarwal-pitroda-seeks-to-put-govt-information-in-public-domain&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Social media</dc:subject>
    

   <dc:date>2012-09-27T05:13:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/picking-2018wholes2019-thinking-in-systems-workshop">
    <title>Picking ‘Wholes’ - Thinking in Systems Workshop</title>
    <link>https://cis-india.org/internet-governance/blog/picking-2018wholes2019-thinking-in-systems-workshop</link>
    <description>
        &lt;b&gt;A System's Thinking masterclass was conducted by Dinesh Korjan on 27th and 28th May in the CIS Delhi office.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;It was organised as part of the Digital Identity project to explore the use of system’s thinking approach in a digital identity system, and addressing questions of policy choices and uses, while creating such a system. The workshop was attended by Amber Sinha, Ambika Tandon, Anubha Sinha, Pooja Saxena, Radhika Radhakrishnan, Saumyaa Naidu, Shruti Trikanad, Shyam Ponappa, Sumandro Chattapadhyay, Sunil Abraham, Swati Gautam, and Yesha Paul.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dinesh Korjan is a proponent of the strategic use of design for the larger good. He is a product designer and co-founder of Studio Korjan in Ahmedabad. He complements his practice with active engagement in academics and teaches at many leading design schools including NID, Ahmedabad, Indian Institute of Technology (IIT), Gandhinagar, Srishti School of Art Design &amp;amp; Technology, Bangalore, and CEPT University, Ahmedabad.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The masterclass was aimed at learning to address complex problems using systems thinking approach. It involved experiential and collaborative learning through discussions, and doing and making activities. The workshop began with identifying different actors, processes, institutions, and other entities involved in a complex problem. The method of role-playing was introduced to learn to detail out and map the problem. Concepts such as synergy/ emergence, relationships, and flows were introduced through examples and case studies. These concepts were applied while mapping complex problems to find insights such as patterns, purposes, feedback loops, and finally a leverage. The workshop also introduced the idea of ephemeralization. Participants were prompted to find solutions that require least input but have greatest impact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For further reading &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/picking-wholes"&gt;click here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/picking-2018wholes2019-thinking-in-systems-workshop'&gt;https://cis-india.org/internet-governance/blog/picking-2018wholes2019-thinking-in-systems-workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>saumyaa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2019-06-05T14:35:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/pibplans-a-fact-checking-unit-to-counter-fake-news">
    <title>PIB plans a fact-checking unit to counter fake news</title>
    <link>https://cis-india.org/internet-governance/news/pibplans-a-fact-checking-unit-to-counter-fake-news</link>
    <description>
        &lt;b&gt;Countering fake news has been high on the government’s agenda; in 2016; the MIB suggested expanding its analytics wing to monitor social media and set up an early warning system for possible flashpoints that the government may be unprepared for.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Smriti Kak Ramachandran was published in the &lt;a class="external-link" href="https://www.hindustantimes.com/india-news/pib-plans-a-fact-checking-unit-to-counter-fake-news/story-BwNk8Y0TTj5WThE2Cy8BFI.html"&gt;Hindustan Times&lt;/a&gt; on July 3, 2019. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Press Information Bureau (PIB), the government’s nodal agency for dissemination of information, has decided to set up of a fact checking unit to identify and counter any fake news about the government and its policies circulating on social media platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to a senior functionary aware of the development, the ministry of information and broadcasting (MIB), under which PIB is a unit has approved a plan to counter fake news in real-time. No deadline has been set so far for the project to take off, but it is expected to pick pace over the coming weeks. Details of how the tracking will be done, and the kind of accounts that will be tracked, weren’t immediately available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fact check unit will have officials from the PIB as well as employees hired on contract to monitor platforms such as Twitter, Facebook and Youtube to flag news that is fake and has the potential for creating social unrest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We will monitor and detect anything related to the government that is blatantly wrong, and put out correct information to ensure that people do not fall for wrong news,” the functionary quoted above said on condition of anonymity. He added that the possibility of penal action against those accounts found circulating fake news has not been discussed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We had a training session with a Hyderabad-based organisation, which does work in fact checking and putting out data that is meant for the public. Their experts helped us brainstorm on how to proceed with it,” the official said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Countering fake news has been high on the government’s agenda; in 2016; the MIB suggested expanding its analytics wing to monitor social media and set up an early warning system for possible flashpoints that the government may be unprepared for. The social media analytics wing of the ministry, which is now defunct, scrutinized posts on social media platforms to generate reports for the Prime Minister’s Office, the National Security Advisor’ s Office and various intelligence bureaus, aside from ministries including home affairs, external affairs and defence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2018, the ministry constituted a committee to frame rules to regulate news portals and media websites. During the recently concluded Lok Sabha election, the election commission also worked with social media platforms to identify and pull down posts that were fake and could lead to vitiating the elections.&lt;br /&gt;As per EC’s data, 650 posts were taken down by Facebook for voter misinformation, hate speech, violation of the model code of conduct and public morality and decency. Similarly, Twitter took down 220 posts, Sharechat 31, Google 5 and Whatsapp, three.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commenting on the government’s move to set up the fact check unit, Sunil Abraham, of the Centre for Internet and Society, a research organisation said, “It is a good move; but what the government also needs to do is to have a policy in place which makes it necessary for social media companies to pay for the negative externalities being circulated. If they make a certain amount in revenue from advertising then on a similar scale they need to fund the fact checking ecosystem.”&lt;br /&gt;On Monday Congress leader Digvijay Singh also demanded a policy to check fake news. Speaking during Zero Hour in the Rajya Sabha, Singh said fake news is more dangerous than terrorism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He said fake news and unparliamentary language used on social media platforms trigger communal riots and create societal divide. “Many people (tweeting fake news) are followed by big people,” he said without naming anyone.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/pibplans-a-fact-checking-unit-to-counter-fake-news'&gt;https://cis-india.org/internet-governance/news/pibplans-a-fact-checking-unit-to-counter-fake-news&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Smriti Kak Ramachandran</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-07-05T02:31:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
