<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 951 to 965.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/phishing-attacks-on-rise"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/perumal-murugan-and-the-law-on-obscenity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/personal-data-public-profile"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/news-nine-shweta-mohandas-and-anamika-kundu-personal-data-protection-bill-must-examine-data-collection-practices-that-emerged-during-pandemic"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/raffaele-angius-august-19-2019-india-kashmir-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ibn-live-april-13-2015-people-voice-their-support-for-net-neutrality-say-internet-a-utility-not-a-luxury"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/newzfirst-march-3-2013-people-should-resist-enforcement-of-uid-scheme-say-experts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-quint-july-16-2018-people-should-have-right-to-their-data-not-companies-says-trai"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/people-driven-and-tech-enabled-2013-how-ai-and-ml-are-changing-the-future-of-cyber-security-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-prashant-k-nanda-and-komal-gupta-pension-wont-be-denied-for-want-of-aadhaar-epfo"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icanns-didp-ii"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/peeping-toms-in-inbox"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-komal-gupta-remya-nair-january-24-2018-paytm-payments-bank-woos-corporates-with-digital-incentives"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-manavi-kapur-alnoor-peermohamed-may-31-2018-patanjali-s-kimbho-swiftly-retreats-over-security-scare-ripped-on-twitter"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/phishing-attacks-on-rise">
    <title>Phishing Attacks on the Rise</title>
    <link>https://cis-india.org/news/phishing-attacks-on-rise</link>
    <description>
        &lt;b&gt;It is very difficult to spot a fake website from the real one these days...with all the new technologies to clearly deceive the eyes. However, there are some ways to make the real from the fake ones with the help of two visual cues. Sunil Abraham was on News 9 on December 2, 2011 speaking about two visual cues to distinguish between the fake and the real websites.&lt;/b&gt;
        &lt;p&gt;Speaking to Nolan Pinto, Sunil said that in the URL instead of "http" you will find an "https" and the second there will be a digital certificate that precedes the url which will give details about the authenticity of this particular website. The locket, the bottom of the browser is just a repetition of the same visual cue which is a difference between http and https, if there is encrypted traffic between you and the website then you are using a protocol called https and you can tell that https exists in the URL and there is also a lock at the bottom of the browser. If there is no encryption then "https" will be missing and also the lock icon will appear open.&lt;/p&gt;
&lt;p&gt;The news was broadcasted on News 9. Watch the recorded video below:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYLinmUA.html" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;embed type="application/x-shockwave-flash" src="http://a.blip.tv/api.swf#AYLinmUA" style="display:none"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/phishing-attacks-on-rise'&gt;https://cis-india.org/news/phishing-attacks-on-rise&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-13T16:15:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/perumal-murugan-and-the-law-on-obscenity">
    <title>Perumal Murugan and the Law on Obscenity </title>
    <link>https://cis-india.org/internet-governance/perumal-murugan-and-the-law-on-obscenity</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;On July 5, 2016, the Madras High Court saved Perumal Murugan’s novel, &lt;i&gt;Mathorubhagan&lt;/i&gt; from oblivion when it dismissed the claims against Murugan on the grounds of obscenity, spreading disharmony between communities, blasphemy, and defamation and upheld his freedom of expression in &lt;i&gt;S. Tamilselvan &amp;amp; Perumal Murugan versus Government of Tamil Nadu&lt;/i&gt;. This judgment has received wide appreciation for its support for freedom of expression. What made it applause-worthy? Do we have reservations with the view of the High Court?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Murugan’s book is about a married couple, Kali and Ponna, who fail to have a child despite decades of their marriage. They succumb to social and familial pressures to allow Ponna (the wife) to participate in a sexual orgy (unrestrained sexual encounter involving many people) at a religious festival (the Vaikasi Car Festival) that takes place in Arthanareeswarar Temple, for begetting a child. The local community claimed that in the book, Murugan denigrated the Arthanareeswarar Temple, the deity, Lord Arthanareeswarar, festivities relating to Vaikasi Car Festival and the women of the Kongu Vellala Gounder community. Some sections of the community believed that the facts in the story were not true and found that the sexual mores associated with the community in the book were offensive.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Court was required to evaluate, whether the novel was obscene (&lt;/span&gt;&lt;i&gt;Section 292 of Indian Penal Code, 1860 (IPC)&lt;/i&gt;&lt;span&gt;), offensive to the community (&lt;/span&gt;&lt;i&gt;Section 153A of IPC&lt;/i&gt;&lt;span&gt;) and the religion (&lt;/span&gt;&lt;i&gt;Section 295 of IPC&lt;/i&gt;&lt;span&gt;); and whether the State had the responsibility to protect the writer from mob violence on account of his controversial book. The Court held that the book was neither offensive nor did it hurt community or religious sentiments. The Court also held that the State had a positive obligation to protect Murugan against the mob. It would be useful to look at the analysis of the Court in drawing these conclusions and see if we completely agree with it.&lt;/span&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The Court relied on the standard for determining obscenity in &lt;a href="https://indiankanoon.org/doc/195958005/"&gt;&lt;i&gt;Aveek Sarkar v. State of West Bengal&lt;/i&gt;&lt;/a&gt; wherein, it was held that what is lascivious/appealing to the prurient interest/depraved or corrupt has to be tested using the contemporary ‘community standards. The Court was of the view that the novel was not offensive by the current mores (&lt;i&gt;para 150 and 151&lt;/i&gt;). &lt;span&gt;The Court further relied on &lt;/span&gt;&lt;a href="https://indiankanoon.org/doc/1191397/"&gt;&lt;i&gt;MF Hussain v. Rajkumar Pandey&lt;/i&gt;&lt;/a&gt;&lt;span&gt;, (&lt;/span&gt;&lt;i&gt;also decided by Justice Sanjay Kishan Kaul&lt;/i&gt;&lt;span&gt;) wherein it was held, that while evaluating obscenity in a work, “&lt;/span&gt;&lt;i&gt;the judge has to place himself in the position of the author in order to appreciate what the author really wishes to convey and thereafter, placing himself in the position of the reader in every age group in whose hand the book is likely to fall, arrive at a dispassionate conclusion&lt;/i&gt;&lt;span&gt;.”It is necessary to mention here that the community standards test has been criticised by scholars, worldwide, as it is difficult to divorce subjective morality of an individual and ascertain what those standards are. This indeterminacy interferes with the ability of judges to apply these standards. There is established scholarship that says that judges cannot divorce themselves from their subjectivities while evaluating obscenity in work of art or literature and may often reinforce the moral norms of the majority in the society thus crushing the moral standards of the minority. In India, we have a mixed bag of judgments that address the issue of obscenity. Seeing the difficulty in application of the community standards test, it is noteworthy that the ultimate fate of a book, painting or a film is dependent on the morality of an individual judge. In fact, the Court had asked a pertinent question in the judgment, “&lt;/span&gt;&lt;i&gt;Would it be desirable for the Courts to intervene or should it be left to the readers to learn for themselves what they think and feel of the issue in question?&lt;/i&gt;&lt;span&gt;” (&lt;/span&gt;&lt;i&gt;para 136&lt;/i&gt;&lt;span&gt;) However, it eventually reinforced these standards by applying the existing precedents on obscenity. &lt;/span&gt;&lt;span&gt;The Court added thatunder Section 292, it was required to first prove whether the novel was obscene at all and only if it was found to be obscene it should be tested within the parameters of exceptionsit would fall under. The Court found that the novel was not obscene. There was no need to evaluate its social character to save it from a ban. While drawing this conclusion, the Court stated that, “&lt;/span&gt;&lt;i&gt;sex, per se, was not treated as undesirable, but was an integral part right from the existence of civilization&lt;/i&gt;&lt;span&gt;” (&lt;/span&gt;&lt;i&gt;para 149&lt;/i&gt;&lt;span&gt;) and that “&lt;/span&gt;&lt;i&gt;in our society, we seem to be more bogged down by conservative Victorian philosophy rather than draw inspiration from our own literature and scriptures.&lt;/i&gt;&lt;span&gt;”The Court also said, “&lt;/span&gt;&lt;i&gt;there are different kinds of books available on the shelves of book stores to be read by different age groups from different strata. If you do not like a book, simply close it.&lt;/i&gt;&lt;span&gt;”&lt;/span&gt;&lt;i&gt;(para 148&lt;/i&gt;&lt;span&gt;) While this reflects a progressive view of the judges on sexual morality, we have reservations on court’s reliance on ancient literature to justify why sex and its depiction in art or literature is not obscene.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;We appreciate the observations that the Court has made while determining whether the novel hurt community or religious sentiments. The Court has acknowledged the declining tolerance level of the society (&lt;/span&gt;&lt;i&gt;para 154&lt;/i&gt;&lt;span&gt;) and stated that “&lt;/span&gt;&lt;i&gt;any contra view or social thinking is met at times with threats or violent behaviour&lt;/i&gt;&lt;span&gt;” (&lt;/span&gt;&lt;i&gt;para 142&lt;/i&gt;&lt;span&gt;).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;The Court addressed the issue of harassment of writers and artists at the hands of a mob and held that there should “&lt;i&gt;be a presumption in favour of free speech and expression as envisaged under Article 19(1)(a) of the Constitution of India&lt;/i&gt;” and emphasized the need for the State to protect those who suffer from hostility of several sections of a society as a consequence of holding a different view (&lt;i&gt;para 175&lt;/i&gt;).Citing &lt;i&gt;MF Hussain v. Rajkumar Pandey&lt;/i&gt;, the Court said “&lt;i&gt;freedom of speech has no meaning if there is no freedom after speech.&lt;/i&gt;”The Court has identified the problematic sphere of mob violence and how it affects freedom of expression. However, we do not agree with what the Court held subsequently. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;Reproducing an extract of the judgment here, &lt;/span&gt;&lt;span style="text-align: justify; "&gt;“&lt;/span&gt;&lt;i style="text-align: justify; "&gt;There is bound to be a presumption in favour of free speech and expression as envisaged under Article 19(1)(a) of the Constitution of India unless a court of law finds it otherwise as falling within the domain of a reasonable restriction under Article 19(2) of the Constitution of India.” &lt;/i&gt;&lt;span style="text-align: justify; "&gt;(&lt;/span&gt;&lt;i style="text-align: justify; "&gt;para 184&lt;/i&gt;&lt;span style="text-align: justify; "&gt;) &lt;/span&gt;&lt;span style="text-align: justify; "&gt;The words, “&lt;/span&gt;&lt;i style="text-align: justify; "&gt;unless a court of law finds it otherwise as falling within the domain of a reasonable restriction under Article 19(2) of the Constitution of India.&lt;/i&gt;&lt;span style="text-align: justify; "&gt;” indicate that the judiciary has the power to determine whether a certain type of speech could be restricted under Article 19 (2) of the Constitution of India. This understanding is incorrect. &lt;/span&gt;&lt;span style="text-align: justify; "&gt;The language of Article 19 (2) makes it clear that speech could only be restricted by ‘law’ and judiciary cannot assume the authority to restrict speech. It has the authority to decide the applicability and the constitutionality of the law that restricts speech. The relevant part of Article 19 (2) is reproduced below for reference. &lt;/span&gt;&lt;i style="text-align: justify; "&gt;“&lt;/i&gt;&lt;i style="text-align: justify; "&gt;(2) Nothing in sub clause (a) of clause ( 1 ) shall affect the operation of any existing law, or prevent the State from making any law, in so far as such law imposes reasonable restrictions on the exercise of the right….&lt;/i&gt;&lt;span style="text-align: justify; "&gt;” &lt;/span&gt;&lt;span style="text-align: justify; "&gt;The Court further acknowledged that &lt;/span&gt;&lt;i style="text-align: justify; "&gt;“the State and the police authorities would not be the best ones to judge such literary and cultural issues, which are best left to the wisdom of the specialists in the field and thereafter, if need be, the Courts”&lt;/i&gt;&lt;span style="text-align: justify; "&gt; (&lt;/span&gt;&lt;i style="text-align: justify; "&gt;para 181&lt;/i&gt;&lt;span style="text-align: justify; "&gt;). The Court thus issued directions to the Government &lt;/span&gt;&lt;i style="text-align: justify; "&gt;to constitute an expert body to deal with situations arising from such conflicts of views so that an independent opinion is forthcoming, keeping in mind the law evolved by the judiciary&lt;/i&gt;&lt;span style="text-align: justify; "&gt;(&lt;/span&gt;&lt;i style="text-align: justify; "&gt;para 181&lt;/i&gt;&lt;span style="text-align: justify; "&gt;)&lt;/span&gt;&lt;i style="text-align: justify; "&gt;. &lt;/i&gt;&lt;span style="text-align: justify; "&gt;There are concerns with this mandate of the Court; firstly, constituting an expert body to resolve conflict of views will not serve any purpose unless there are guidelines to evaluate work. It is difficult to dissociate subjectivity and ascertain objective standards for evaluating offensiveness of literary or artistic work. Secondly, reliance on expert opinion and then courts completely disregards existing law. Under Section 95 of the Code of Criminal Procedure,1973, the Government has the power to declare forfeiture of works which, it considers in violation of section 153A or section 153B or section 292 or section 293 or section 295A of the Indian Penal Code, 1860. The power to evaluate a piece of writing or other work has already been given to the government. The Court has created a parallel mechanism for evaluation by giving directions to constitute an expert panel. In the event this mechanism fails to resolve the conflict, it is suggested that courts would then be approached to address the matter. This is in complete disregard of the powers of the Government under Section 95.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In the Murugan judgment, the Court has attempted to provide a narrow interpretation of what is considered obscene, emphasized the need for the society to be more tolerant and for State to protect those members of the society who, on account of their views, suffer at the hands of an intolerant society. It is for these reasons, the judgment is, undoubtedly a sound precedent for protection of speech in India. However, it is concerning to see that in drawing these conclusions, the Court has reinforced vague legal standards of obscenity and in that regard, it remains yet another addition to the mixed bag of judgments.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/perumal-murugan-and-the-law-on-obscenity'&gt;https://cis-india.org/internet-governance/perumal-murugan-and-the-law-on-obscenity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Japreet Grewal</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Hate Speech</dc:subject>
    
    
        <dc:subject>Article 19(1)(a)</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-08-09T13:01:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/personal-data-public-profile">
    <title>Personal Data, Public Profile</title>
    <link>https://cis-india.org/internet-governance/personal-data-public-profile</link>
    <description>
        &lt;b&gt;Whether we like it or not, we live in a world that is rapidly being Googlised, writes Nishant Shah in an article published by the Financial Express on February 13, 2012.&lt;/b&gt;
        
&lt;p&gt;Apart from its core functions like search and email, we consume Google services and products around the clock and around the click—YouTube, Calendar, Docs, Google+, Google Reader, Google Analytics et al. On March 1, 2012, our increasingly co-dependent relationship with Google will reach a new stage of commitment as Google consolidates its privacy policies for the entire Google universe. If you are logged into your Google account, all your information across Google’s different platforms will be clubbed together to form a comprehensive profile of what you do online.&lt;/p&gt;
&lt;p&gt;Google has suggested this will personalise your interactions with Google platforms. The videos you watch on YouTube might influence your search results; the links that you click on will affect the advertisements displayed to you; the mails that you read will establish proximity with your friends on Google+ ... A comprehensive profile of who you are, what you do, what you like, what you share and what you hide will be created. Google has shown unmatched commitment to transparency on user data retention, storage and usage over the years. However, a centralised profile on users rings a few alarm bells for me. There are three use-cases that immediately crop up with apocalyptic implications.&lt;/p&gt;
&lt;p&gt;Death of anonymity: One of the biggest strengths of the internet, as a space for both political dissent and freedom of expression, is that it has allowed people to talk through their avatars without putting themselves in conditions of bodily harm. So, it was good to have a scenario where my activities on YouTube did not get mapped onto my more identifiable profile on Google+ and did not get correlated with my personal interactions on Gmail. Mapping all the actions of a user who might want a more distributed identity might lead to precarious conditions for users living in critical times.&lt;/p&gt;
&lt;p&gt;Negotiation with governments: While Google claims that it is committed to protecting the safety of its users, we know that it is eventually subject to the rules of the countries that it operates in. In the past, say in skirmishes with China, we have seen that despite its powerful status, it is not exempt from the demands of different governments. Given the current state of negotiations around censorship that are ongoing in India, it is a little scary to think how users’ data can be abused by authoritative government officials. A multi-tiered, distributed system offers users safety which a consolidated one doesn’t.&lt;/p&gt;
&lt;p&gt;Inter-platform repercussions: If something I do on a platform gets flagged as objectionable, does it mean that all my rights to Google World get revoked?&lt;/p&gt;
&lt;p&gt;Hidden data collection: One of the things that a lot of people don’t realise is that Google, in its attempts at enriching our user experience, collects more data than you disclose. So, apart from the personal data that you have more control over, there is a range of other data—pages you visit, the time you spend there, links you click on, comments that you write, information you share, etc—which form a part of Google’s algorithms for you. Consolidation of this data through services like Ad Sense and Double Click might also expose you to third party advertisers who might abuse this information that is about you but not under your control.&lt;/p&gt;
&lt;p&gt;Google’s consolidation of its privacy policies across platforms signal a new wave of information management on the web, where the earlier free-form distributed information practice is getting mapped on to the physical bodies of the users. While it might lead to better web services, it also means that we need to be more aware of our information practices and start preparing for a web that is going to demand more accountability from its users than ever before.&lt;/p&gt;
&lt;p&gt;The author is a digital humanities scholar and Director-Research at the Bangalore-based Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.financialexpress.com/news/personal-data-public-profile/909190/0"&gt;The original article was published in the Financial Express&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/personal-data-public-profile'&gt;https://cis-india.org/internet-governance/personal-data-public-profile&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-02-14T06:19:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/news-nine-shweta-mohandas-and-anamika-kundu-personal-data-protection-bill-must-examine-data-collection-practices-that-emerged-during-pandemic">
    <title>Personal Data Protection Bill must examine data collection practices that emerged during pandemic</title>
    <link>https://cis-india.org/internet-governance/blog/news-nine-shweta-mohandas-and-anamika-kundu-personal-data-protection-bill-must-examine-data-collection-practices-that-emerged-during-pandemic</link>
    <description>
        &lt;b&gt;The PDP bill is speculated to be introduced during the winter session of the parliament soon. The PDP Bill in its current form provides wide-ranging exemptions which allow government agencies to process citizen’s data in order to fulfil its responsibilities. The bill could ensure that employers have some responsibility towards the data they collect from the employees.

&lt;/b&gt;
        &lt;p&gt;The article by Shweta Mohandas and Anamika Kundu was &lt;a class="external-link" href="https://www.news9live.com/technology/personal-data-protection-bill-must-examine-data-collection-practices-that-emerged-during-pandemic-137031?infinitescroll=1"&gt;originally published by &lt;strong&gt;news nine&lt;/strong&gt;&lt;/a&gt; on November 29, 2021.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Personal Data Protection Bill (PDP) is speculated to be introduced during the winter session of the parliament soon, and the report of the Joint Parliamentary Committee (JPC) has already been &lt;a class="external-link" href="https://www.thehindu.com/news/national/parliamentary-panel-retains-controversial-exemption-clause-in-personal-data-protection-bill/article37633344.ece"&gt;adopted&lt;/a&gt; by the committee on Monday. The Report of the JPC comes after almost two years of deliberation and secrecy over how the final version of the Personal Data Protection Bill will be. Since the publication of the &lt;a class="external-link" href="https://prsindia.org/files/bills_acts/bills_parliament/2019/Personal%20Data%20Protection%20Bill,%202019.pdf"&gt;2019 version&lt;/a&gt; of the PDP Bill, the Covid 19 pandemic and the public safety measures have opened the way for a number of new organisations and reasons to collect personal data that was non-existent in 2019. Hence along with changes that have been suggested by multiple civil society organisations, the dissent notes submitted by the members of the JPC, the new version of the PDP Bill must also look at how data processing has changed over the span of two years.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Concerns with the bill&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;At the outset there are certain parts of the PDP Bill which need to be revised in order to uphold the spirit of privacy and individual autonomy laid out in the Puttaswamy judgement. The two sections that need to be in line with the privacy judgement are the ones that allow for non consensual processing of data by the government, and by employers. The PDP Bill in its current form provides wide-ranging exemptions which allow government agencies to process citizen's data in order to fulfil its &lt;a class="external-link" href="https://www.livemint.com/news/india/big-brother-on-top-in-data-protection-bill-11576164271430.html"&gt;responsibilities&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the &lt;a class="external-link" href="https://www.meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf"&gt;2018 version&lt;/a&gt; of bill, drafted by the Justice Srikrishna Committee exemptions granted to the State with regard to processing of data was subject to a four pronged test which required the processing to be (i) authorised by law; (ii) in accordance with the procedure laid down by the law; (iii) necessary; and (iv) proportionate to the interests being achieved. This four pronged test was in line with the principles laid down by the Supreme Court in the Puttaswamy judgement. The 2019 version of the PDP Bill has diluted this principle by merely retaining the 'necessity principle' and removing the other requirements which is not in consonance with the test laid down by the Supreme Court in Puttaswamy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 35 was also widely discussed in the panel meetings where members had &lt;a class="external-link" href="https://www.thehindu.com/news/national/parliamentary-panel-retains-controversial-exemption-clause-in-personal-data-protection-bill/article37633344.ece"&gt;argued&lt;/a&gt; the removal of 'public order' as a ground for exemption. The panel also insisted for '&lt;a class="external-link" href="https://www.thehindu.com/news/national/parliamentary-panel-retains-controversial-exemption-clause-in-personal-data-protection-bill/article37633344.ece"&gt;judicial or parliamentary oversight&lt;/a&gt;' to grant such exemptions. The final report did not accept these suggestions stating a need to balance &lt;a class="external-link" href="https://www.thehindu.com/news/national/parliamentary-panel-retains-controversial-exemption-clause-in-personal-data-protection-bill/article37633344.ece"&gt;national security, liberty and privacy&lt;/a&gt; of an individual. There ought to be prior judicial review of the written order exempting the governmental agency from any provisions of the bill. Allowing the government to claim an exemption if it is satisfied to be "necessary or expedient" can be misused.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another clause which gives the data principal a wide berth is with respect to employee data Section 13 of the current version of the bill provides the employer with a leeway into processing employee data (other than sensitive personal data) without consent based on two grounds: when consent is not appropriate, or when obtaining consent would involve disproportionate effort on the part of the employer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The personal data so collected can only be collected for recruitment, termination, attendance, provision of any service or benefit, and assessing performance. This covers almost all of the activities that require data of the employee. Although the 2019 version of the bill excludes non-consensual collection of sensitive personal data (a provision that was missing in the 2018 version of the bill), there is still a lot of scope to improve this provision and provide employees further right to their data. At the outset the bill does not define employee and employer, which could result in confusion as there is no one definition of these terms across Indian Labour Laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the bill distinguishes between employee and consumer, where the consumer of the same company or service has a greater right to their data than an employee. In the sense that the consumer as a data principal has the option to use any other product or service and also has the right to withdraw consent at any time, in the case of an employee the consequence of refusing consent or withdrawing consent would be being terminated from the employment. It is understood that there is a requirement for employee data to be collected, and that consent does not work the same way as it does in the case of a consumer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bill could ensure that employers have some responsibility towards the data they collect from the employees, such as ensuring that they are only used for the purpose for which they were collected, the employee knows how long their data will be retained, and know if the data is being processed by third parties. It is also worth mentioning that the Indian government is India's largest employer spanning a variety of agencies and public enterprises.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Concerns highlighted by JPC Members&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Going back to the few members of the JPC who have moved dissent notes, specifically with regard to governmental exemptions. Jairam Ramesh filed a &lt;a href="https://www.news9live.com/india/parliament-panel-adopts-report-on-data-protection-amid-dissent-by-opposition-135591"&gt;dissent note&lt;/a&gt;, to which many other opposition members followed suit. While Jairam Ramesh praised the JPC's functioning, he disagreed with certain aspects of the Report. According to him, the 2019 bill is designed in a manner where the right to privacy is given importance only in cases of private activities. He raised concerns regarding the unbridled powers given to the government to exempt itself from any of the provisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The amendment suggested by him would require parliamentary approval before exemption would take place. He also added that Section 12 of the bill which provided certain scenarios where consent was not needed for processing of personal data should have been made '&lt;a href="https://www.hindustantimes.com/india-news/mps-file-dissent-notes-over-glaring-lacunae-in-report-on-data-protection-bill-101637566365637.html"&gt;less sweeping&lt;/a&gt;'. Similarly, Gaurav Gogoi's &lt;a href="https://www.hindustantimes.com/india-news/mps-file-dissent-notes-over-glaring-lacunae-in-report-on-data-protection-bill-101637566365637.html"&gt;note&lt;/a&gt; stated that the exemptions would create a surveillance state and similarly criticised Section 12 and 35 of the bill. He also mentioned that there ought to be parliamentary oversight for the exemptions provided in the bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the same issue, Congress leader Manish Tiwari noted that the bill creates '&lt;a href="https://timesofindia.indiatimes.com/business/india-business/personal-data-protection-bill-what-is-it-and-why-is-the-opposition-so-unhappy-with-it/articleshow/87869391.cms"&gt;parallel universes&lt;/a&gt;' - one for the private sector which needs to be compliant and the other for the State which can exempt itself. He has opposed the entire bill stating there exists an "inherent design flaw". He has raised specific objections to 37 clauses and stated that any blanket exemptions to the state goes against the Puttaswamy Judgement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In their joint &lt;a href="https://www.news9live.com/india/tmc-congress-mps-submit-dissent-notes-to-joint-panel-on-personal-data-protection-bill-135491"&gt;dissent note&lt;/a&gt;, Derek O'Brien and Mahua Mitra have said that there is a lack of adequate safeguards to protect the data principals' privacy and the lack of time and opportunity for stakeholder consultations. They have also pointed out that the independence of the DPA will cease to exist with the present provision of allowing the government powers to choose members and the chairman. Amar Patnaik is to object to the lack of inclusion of state level authorities in the bill. Without such bodies, he says, there would be federal override.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While a number of issues were highlighted by civil society, the members of the JPC, and the media, the new version of the bill should also need to take into account the shifts that have taken place in view of the pandemic. The new version of the data protection bill should take into consideration the changes and new data collection practices that have emerged during the pandemic, be comprehensive and leave very little provisions to be decided later by the Rules.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/news-nine-shweta-mohandas-and-anamika-kundu-personal-data-protection-bill-must-examine-data-collection-practices-that-emerged-during-pandemic'&gt;https://cis-india.org/internet-governance/blog/news-nine-shweta-mohandas-and-anamika-kundu-personal-data-protection-bill-must-examine-data-collection-practices-that-emerged-during-pandemic&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas and Anamika Kundu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2022-03-30T15:15:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/raffaele-angius-august-19-2019-india-kashmir-internet">
    <title>Perché l'India ha tagliato internet al Kashmir</title>
    <link>https://cis-india.org/internet-governance/news/raffaele-angius-august-19-2019-india-kashmir-internet</link>
    <description>
        &lt;b&gt;Lo stato di isolamento imposto a più di 12,5 milioni di persone rischia di causare importanti disagi al Paese, nel quale è diventato praticamente impossibile comunicare con l’esterno. Problemi per ospedali e farmacie&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Raffaele Angius was &lt;a class="external-link" href="https://www.wired.it/internet/web/2019/08/19/india-kashmir-internet/?refresh_ce="&gt;published in WIRED.IT&lt;/a&gt; on August 19, 2019. Gurshabad Grover was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Dopo dodici giorni di blocco totale delle telecomunicazioni, l’India ha concesso il parziale ripristino delle linee telefoniche del Kashmir. Il 5 agosto il governo centrale di Nuova Delhi aveva sospeso lo statuto speciale di cui gode la regione, schierando decine di migliaia di soldati, arrestando diversi rappresentanti politici e sospendendone le linee telefoniche e iltraffico internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;La decisione, presa unilateralmente dal primo ministro indiano Narendra Modi, mira a rimuovere i privilegi sanciti dalla costituzione del Kashmir, che settant’anni fa crearono le basi per l’unione dei due Paesi. Principale obiettivo di Nuova Delhi è l’abrogazione della legge che vieta l’acquisto di proprietà immobiliari ai cittadini non kashmiri, che secondo Modi impedirebbe la piena integrazione dell’area – l’unica a maggioranza musulmana – con l’India.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Blackout nelle comunicazioni&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Ma lo stato di isolamento imposto a più di 12,5 milioni di persone rischia di causare importanti disagi al Paese confinante con il Pakistan, nel quale è diventato praticamente impossibile comunicare con l’esterno e in cui le infrastrutture critiche che fanno affidamento a Internet vivono profondi disagi. Come nel caso di ospedali e farmacie, che utilizzano la rete per ordinare nuovi medicinali.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;“Le reti per le telecomunicazioni sono infrastrutture critiche e stavolta&lt;/em&gt; [il loro blocco]&lt;em&gt; ha avuto un impatto decisivo sul funzionamento del Kashmir”&lt;/em&gt;, ha spiegato a &lt;em&gt;Wired&lt;/em&gt; Gurshabad Grover, funzionario del Center for Internet and Society di Bangalore: &lt;em&gt;“Alcuni report indicano che le linee di comunicazione non sono accessibili neanche per ospedali e cliniche: il risultato è che il personale si sta arrangiando per soddisfare le esigenze sanitarie”&lt;/em&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;“Il governo indiano ha un record di sospensione delle telecomunicazioni e dei servizi internet nel Kashmir: secondo i dati rilevati dallo strumento di monitoraggio della rete del &lt;a href="https://www.softwarefreedom.org/" rel="noopener" target="_blank"&gt;Software Freedom Law Center&lt;/a&gt;, questa è la sessantesima volta che succede solamente quest’anno”&lt;/em&gt;, ha spiegato Grover via mail.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ma stavolta l’operazione di isolamento dell’area è stata più incisiva, con un blocco totale &lt;em&gt;“di internet, reti mobili, linee terrestri, posta e televisione via cavo”&lt;/em&gt;, giustificate con l’esigenza di contenere la diffusione di informazioni false e gli episodi di violenza, come hanno spiegato gli stessi rappresentanti del governo. &lt;em&gt;“Ma impedire ai giornalisti di fare il proprio lavoro, al contrario, favorisce la diffusione di notizie false&lt;/em&gt; -, ha obiettato Grover -. &lt;em&gt;Inoltre, numerosi studi mostrano come lo spegnimento dei canali di comunicazione renda il coordinamento delle proteste pacifiche molto più difficili, con il rischio di portare a episodi di violenza”&lt;/em&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dopo che per quasi due settimane anche le forze dell’ordine hanno dovuto utilizzare i telefoni satellitari per comunicare, parte delle linee telefoniche del Kashmir sono state ripristinate. Una ragione potrebbe essere che proprio il blackout informativo ha creato ulteriori allarmismi, avendo di fatto impedito a milioni di persone di comunicare con i propri familiari. &lt;em&gt;“Ora i social network sono pieni di post allarmati provenienti da cittadini kashmiri che vivono in altri posti”&lt;/em&gt;, osserva Grover. Ma le contromisure non si sono fatte attendere, con la richiesta a Twitter da parte del governo indiano di &lt;a href="https://globalvoices.org/2019/08/16/indian-government-asks-twitter-to-remove-accounts-spreading-rumours-about-kashmir/" rel="noopener" target="_blank"&gt;rimuovere decine di account&lt;/a&gt; che scrivono della crisi, tra cui quelli di giornalisti e attivisti.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;La crisi&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apparentemente lontana dal suo epilogo, l’ennesima crisi del Kashmir è approdata sul tavolo del Consiglio di sicurezza delle Nazioni Unite il 16 agosto, per la prima volta dal 1971. In una riunione a porte chiuse, come &lt;a href="https://edition.cnn.com/2019/08/16/asia/un-security-council-kashmir-intl/index.html" rel="noopener" target="_blank"&gt;riporta&lt;/a&gt; la &lt;em&gt;Cnn&lt;/em&gt;, sono intervenuti anche i diplomatici di Pakistan – il Paese musulmano direttamente confinante con la regione e che da anni sostiene segretamente i gruppi paramilitari dell’area – e Cina, che hanno chiesto all’India di garantire una risoluzione del conflitto. Così come negli ultimi settant’anni, gli emissari di Nuova Delhi hanno replicato che il Kashmir è una questione domestica che non riguarda la diplomazia internazionale. E per assicurarsi che la situazione rimanga tale, sembra che l’unica strategia sia quella di sottoporre a isolamento più di dodici milioni di persone.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/raffaele-angius-august-19-2019-india-kashmir-internet'&gt;https://cis-india.org/internet-governance/news/raffaele-angius-august-19-2019-india-kashmir-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Raffaele Angius</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-08-22T01:31:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ibn-live-april-13-2015-people-voice-their-support-for-net-neutrality-say-internet-a-utility-not-a-luxury">
    <title>People voice their support for net neutrality, say Internet a utility not a luxury</title>
    <link>https://cis-india.org/internet-governance/news/ibn-live-april-13-2015-people-voice-their-support-for-net-neutrality-say-internet-a-utility-not-a-luxury</link>
    <description>
        &lt;b&gt;As the campaign and support for net neutrality is picking up, Politicians, celebrities and a cross section of people are voicing their support for it. Net neutrality means all data and sites are treated and charged equally be it mobile app or any other app.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was &lt;a class="external-link" href="http://ibnlive.in.com/news/people-voice-their-support-for-net-neutrality-say-internet-a-utility-not-a-luxury/539585-3.html"&gt;published in IBN Live&lt;/a&gt; on April 13, 2015. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;According to AIB whose video on net neutrality has gone viral, more  than one lakh emails have been sent to the Telecom Regulatory Authority  of India (TRAI) through the website &lt;a href="http://www.savetheinternet.in/" target="_blank"&gt;savetheinternet.in.&lt;/a&gt; This is in response to the regulator's call for public consultation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;MK Stalin, DMK treasurer:&lt;/b&gt; The Internet is changing India. For  the first time there is a platform that gives equal opportunity for  everyone to gain knowledge and reap economic benefits. TRAI, the  government telecom regulatory body is proposing to change this by  allowing telecom companies to allow preferential access to websites. If  this is allowed, companies will be allowed to charge extra for commonly  used services like Whatsapp, YouTube, web based voice calling and many  more. This will also allow telcos to allow preferential treatment of  websites, allowing the big companies to destroy start-ups and internet  based small business by blocking or slowing them down. This goes against  the very concept of the Internet where every legal website or service  is considered equal. This attempt to increase the profits of the telecom  companies by surrendering social gains should be condemned. I request  the TRAI to dismiss this proposal and let the Internet continue to be a  neutral medium which serves our country and community instead of a  select few companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Tathagata Satpathy, Dhenkanal MP:&lt;/b&gt; My concern was that why  should TRAI get involved with private profit making companies and give  them the facility to become a profiteering company. While saying this we  must remember that Internet is not free anywhere in the world. That is  accepted. My issue is with TRAI which has not even bothered to reply to  my letter, I do not know why TRAI is getting involved and it has put  itself in a situation where its interntions are suspect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Nikhil Pahwa, Editor and publisher of Medianama:&lt;/b&gt; Startups  may have to get license to provide services in India. Another outcome is  communications firms will buy license. Third outcome is TRAI will allow  ISP's to make some sites slow.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash, cyber security expert:&lt;/b&gt; So what the TRAI  is proposing is something that should have every single Internet user  very worried. There is some truth at least to what companies like Airtel  etc. are saying which is that there is a difference in the regular  trade standard for the Internet services and the telecom operators. But  the correct solution for that is not to increase and sort a new license  raj for Internet services but rather to decrease those over onerous  burdens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Riteish Deshmukh, actor:&lt;/b&gt; Net neutrality is as important as Freedom of Speech. Our Basic Right&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Siddharth Malhotra, actor:&lt;/b&gt; Save The Internet push for net neutrality, Internet is a utility not a luxury.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Parineeti Chopra, actress:&lt;/b&gt; Save the Internet! Net neutrality is crucial! Proud of you boyses!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Shekhar Ravjiani, singer:&lt;/b&gt; Time to stand up and take a stand. Time to fight for what's right. Head to savetheinternet.in to make a difference.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Raghu Ram, Ex Roadies judge:&lt;/b&gt; PEOPLE!! Your internet and freedom are under attack in India! Listen to the AIB boys and join the fight.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ibn-live-april-13-2015-people-voice-their-support-for-net-neutrality-say-internet-a-utility-not-a-luxury'&gt;https://cis-india.org/internet-governance/news/ibn-live-april-13-2015-people-voice-their-support-for-net-neutrality-say-internet-a-utility-not-a-luxury&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-05-08T01:56:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/newzfirst-march-3-2013-people-should-resist-enforcement-of-uid-scheme-say-experts">
    <title>People should resist enforcement of UID scheme, say experts </title>
    <link>https://cis-india.org/news/newzfirst-march-3-2013-people-should-resist-enforcement-of-uid-scheme-say-experts</link>
    <description>
        &lt;b&gt;Internationally recognized expert on law and poverty Dr. Usha Ramanathan Saturday urged citizens of the country to question the enforcement of the UID scheme that has no legitimacy.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This was&lt;a class="external-link" href="http://www.newzfirst.com/web/guest/full-story/-/asset_publisher/Qd8l/content/people-should-resist-enforcement-of-uid-scheme-say-experts?redirect=/web/guest/home"&gt; published in newzfirst&lt;/a&gt; on March 3, 2013. CIS organized a workshop at the event.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Addressing the gathering of people from various sections of the society  at a workshop- The Unique Identity Number (UID), National Population  Register (NPR), and Governance - organized by the ‘Centre for Internet  and Society’ and the ‘Say No to UID Campaign’ Ramanathan said that the  enforcement of UID scheme is unconstitutional and a mere a experiment on  the population.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The scheme is full of ambiguity, confusions and suspicions; while  UIDAI says it as voluntary, other government agencies and enterprises  have made them mandatory. Neither the government nor the UIDAI officials  have the satisfactory answers for the concerns of citizens, she said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saying  that the ‘Data’ is one of the important properties today, she  elaborated that how the individual’s privacy and confidential data was  breached after sharing with many companies and agencies, despite the  assurances from the authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Emphasizing the  resistance against enforcement of UID scheme, another speaker Col.  Mathew Thomas of Citizen Action Forum Bangalore, said “If we don’t  resist this scheme now, we are putting pushing poor people of the  country into more vulnerable situation. We need to fight it by protests  and legal means.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The workshop also discussed the  National Population register (NPR), its impact on citizenship and the  governance, and how they are linked with national security.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/newzfirst-march-3-2013-people-should-resist-enforcement-of-uid-scheme-say-experts'&gt;https://cis-india.org/news/newzfirst-march-3-2013-people-should-resist-enforcement-of-uid-scheme-say-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-03-11T06:45:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-quint-july-16-2018-people-should-have-right-to-their-data-not-companies-says-trai">
    <title>People Should Have Right To Their Data, Not Companies, Says TRAI </title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-quint-july-16-2018-people-should-have-right-to-their-data-not-companies-says-trai</link>
    <description>
        &lt;b&gt;Rules for protection of personal data in the telecom space are not sufficient, regulator TRAI said today while suggesting that consumers be given the right to choice, consent and to be forgotten to safeguard their privacy.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published by &lt;a class="external-link" href="https://www.bloombergquint.com/law-and-policy/2018/07/16/people-should-have-right-to-their-data-not-companies-says-trai#gs.soR5VAU"&gt;Bloomberg Quint&lt;/a&gt; on July 16, 2018. Pranesh Prakash was interviewed.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Recommending  a series of measures of "privacy, security and ownership of data in  telecom networks", the Telecom Regulatory Authority of India held that  consumers are owners of their data and that entities controlling,  processing their information are "mere custodians and do not have  primary rights over this data".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The Right to Choice, Notice,  Consent, Data Portability, and Right to be Forgotten should be conferred  upon the telecommunication consumers," TRAI recommended to the  Department of Telecom. In order to ensure sufficient choices to the  users of digital services, granularities in the consent mechanism should  be built-in by the service providers, the regulator added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TRAI  has suggested that all entities in the digital ecosystem including  telecom operators should transparently disclose the information about  the privacy breaches on their websites along with the actions taken for  mitigation, and preventing such breaches in future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is the first time I’ve seen TRAI being bold enough to  venture into this area,” said Pranesh Prakash, a policy director at the  Centre for Internet Society. “There are many positives here in terms of  the data protection regime that they want to set up,” he told  BloombergQuint in an interview. “It talks about user choice, consent,  about notice being mandatory and simplified in language that people  understand rather than two hundred pages of legal forms.”&lt;/p&gt;
&lt;blockquote&gt;There are many things in it that law and technology  nerds will rejoice over, for example, the need for greater amounts of  encryption and asks DoT to revisit the limitations it has put on  encryption because those limitations actually harm national security and  user privacy.&lt;/blockquote&gt;
&lt;p&gt;Pranesh Prakash, Policy Director, Centre for Internet Society&lt;/p&gt;
&lt;p&gt;Here are the highlights from the TRAI’s recommendation:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All  entities in the digital ecosystem, which control or process the data,  should be restrained from using meta-data to identify the individual  users.&lt;/li&gt;
&lt;li&gt;A study should be undertaken to formulate the standards  for annonymisation/de-identification of personal data generated and  collected in the digital eco-system.&lt;/li&gt;
&lt;li&gt;Till such time a general  data protection law is notified by the government, the existing  rules/licence conditions applicable to TSPs for protection of users'  privacy be made applicable to all the entities in the digital ecosystem.&lt;/li&gt;
&lt;li&gt;The  Right to Choice, Notice, Consent, Data Portability, and Right to be  forgotten should be conferred upon the telecommunication consumers.&lt;/li&gt;
&lt;li&gt;Data  Controllers should be prohibited from using "preticked boxes" to gain  users consent. Clauses for data collection and purpose limitation should  be incorporated in the agreements.&lt;/li&gt;
&lt;li&gt;Sharing of information  concerning to data security breaches should be encouraged and  incentivised to prevent/mitigate such occurrences in future.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The recommendations from TRAI come at a time when there are  rising concerns around privacy and safety of user data, especially  through mobile apps and social media platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The regulator had  issued a consultation paper entitled Privacy, Security and Ownership of  Data in the Telecom Sector on Aug 9 last year and an open house  discussion was held on Feb. 2. The TRAI had also invited comments and  counter comments as part of the consultation.&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/G4XxJuY1ySI" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;(With inputs from PTI)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-quint-july-16-2018-people-should-have-right-to-their-data-not-companies-says-trai'&gt;https://cis-india.org/internet-governance/news/bloomberg-quint-july-16-2018-people-should-have-right-to-their-data-not-companies-says-trai&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-07-29T05:44:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/people-driven-and-tech-enabled-2013-how-ai-and-ml-are-changing-the-future-of-cyber-security-in-india">
    <title>People Driven and Tech Enabled – How AI and ML are Changing the Future of Cyber Security in India</title>
    <link>https://cis-india.org/internet-governance/blog/people-driven-and-tech-enabled-2013-how-ai-and-ml-are-changing-the-future-of-cyber-security-in-india</link>
    <description>
        &lt;b&gt;On the 27th of February, Peter Sparkes the Senior Director, Cyber Security Services, Symantec conducted a webinar on the ‘5 Essentials of Every Next-Gen SOC’.  In this webinar, he evaluated the problems that Security Operations Centers (SOCs) are currently facing, and explored possible solutions to these problems. The webinar also put emphasis on AI and ML as tools to improve cyber security. This blog draws key insights from the webinar, and explains how AI and ML can improve the cyber security process of Indian enterprises.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a study conducted by Cisco, it was found that in the past 12-18 months,     cyber attacks have caused Indian companies to incur financial damages     amounting to USD 500,000.     &lt;a name="fr1"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is a need to strengthen the nodal agencies in an enterprise that can     deal with these threats to prevent irreparable damage to enterprises and     their customers. An SOC within any organization is the team responsible for     detecting, monitoring, analyzing, communicating and remedying security     threats. The SOC technicians employ a combination of technologies and     processes to ensure that an enterprise’s security is not compromised. As     instances of cyber attacks increase both in number and sophistication, SOCs     need to use state of the art technologies to stay one step ahead of the     attackers. Presently, SOCs face a number of infrastructural problems such     as the low priority given to a cyber security budget, slower and passive     response to threats, dearth of skilled technicians, and the absence of a     global intelligence network for cyber-threats. This is where technologies     such as Artificial Intelligence and Machine learning are helping, by     monitoring the system to identify cyber attacks, and analyse the severity     of the threat, and in some cases by blocking such threats.     &lt;a name="fr2"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Evolution of Security Operations Centers&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the same study, Cisco looked at the evolution of cyber threats and how     companies were using technologies such as AI and ML to ameliorate those     threats. Another key insight the study brought out was that 53 and 51     percent of the subject companies were reliant on ML and AI respectively.     One of the reasons behind AI and ML’s effectiveness in cyber security is     their capacity not only to detect known threats but also to use their     learnings from data to detect unknown threats. In his webinar, Peter     Sparkes also stated that SOCs were evolving into a ‘people driven and tech     enabled’ system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;People Driven and Tech Enabled&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case of cyber security, which in itself is a relatively new field,     technologies such as AI and ML are helping companies to not only overcome     infrastructural barriers but also to respond proactively to threats. A     study conducted by the Enterprise Strategy Group, revealed that one-third     of the respondents believed that ML technology could detect new and unknown     malware.&lt;a name="fr3"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The study also stated that the use of machine learning to detect and     prevent threats from unknown malware reduced the number of cases the cyber     security team had to investigate.&lt;a name="fr4"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the tasks of monitoring and blocking which were earlier     conducted by entry level analysts were now done by systems, using machine     learning. Typically, the AI acts as the first monitoring system after which     the threat is examined by the company’s technicians who possess the     requisite skill set and experience. By delegating the time consuming task     of continuous monitoring to an ML system, the technicians now have time to     look at serious threats. In this way AI and humans are working together to     build a stronger and responsive security protocol.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Detecting the Unknown&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber criminals are becoming increasingly sophisticated, and in order to     prevent attacks the monitoring systems (both human and automated) need to     be able to detect them before the security is compromised. The detection of     threats through AI and ML is done in a similar way as it is done for the     identification of spam, where the system is trained on a large amount of     data which teaches the algorithm to identify right from wrong.&lt;a name="fr5"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There have been numerous cases of stealthy cyber attacks such as wannacry     and ransomware, that have evaded detection by conventional security     firewalls and caused crippling damage. There is also the need to use     deception technology which involves automatic detection and analysis of     attacks. This technology then tricks the attackers and defeats them to     bring back normalcy to the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The systems that can handle threats by themselves do so by following a     predetermined procedure, or playbook where the AI detects activities that     go against the procedure/playbook. This is more effective compared to the     earlier system where the technicians would analyse the attacks on a case by     case basis.&lt;a name="fr6"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;AI and ML can help in reducing the time required to detect threats enabling     technicians to act proactively and prevent damage. As AI and ML systems are     less prone to make mistakes compared to human beings, each threat is dealt     with in a prompt and accurate manner. AI systems also help by categorising     attacks based on their propensity for damage. These systems can use the     large volumes of data collected about previous attacks and adapt over time     to give enterprises a strong line of defence against attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Passive to Active Defense&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Threat to cyber security can emerge even in seemingly safe departments,     such as Human Resources. It is therefore important to proactively hunt for     threats across all departments uniformly.&lt;a name="fr7"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to detect an anomaly, the AI and ML system will require both large     volumes of data as well as a significant amount of processing power, which     is difficult for smaller companies to provide. A possible solution to     improve defense is to have a system of sharing SOC data between companies,     and thereby creating a global database of intelligence. A system of global     intelligence and threat data sharing could help smaller companies combat     cyber threats without having to compromise on core business development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Use of AI in Cyber Security in India&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2017, Indian enterprises were infected by two lethal cyber attacks     called Nyetya that crept through a trusted software - Ccleaner and infected     computers&lt;a name="fr8"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;. These attacks may just be the tip of the iceberg , since there may be     many other attacks that might have gone unreported, or worse, undetected.     Cisco reported that less than 55 per cent of the Indian enterprises were     reliant on AI or ML for combating cyber threats. Although the current     numbers seem bleak, there are a number of Indian enterprises that have     recently begun using AI and ML in cyber security.&lt;a name="fr9"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One such example is HDFC bank which is in the process of introducing an AI     based Cyber Security Operations Centre (CSOC).&lt;a name="fr10"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This CSOC is based on a four point approach to dealing with threats -     prevent, detect, respond and recover. The government of India has also     taken its first step towards the use of AI in cyber security through a     project that aims to provide cyber forensic services to the various     agencies of the government including law enforcement.&lt;a name="fr11"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian intelligence agencies have also entered into an agreement with tech     startup Innefu, which utilizes AI, to process data and decipher threats by     looking at the patterns of past threats.&lt;a name="fr12"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As India is increasingly becoming data dense both private and public     organizations need to consider cyber security with utmost seriousness and     protect the data from crippling attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Enterprises have become storehouses of user data and the SOCs have a     responsibility to protect this data. The companies’ SOCs have been plagued     with several problems such as lack of skilled technicians, delay in     response time and the inability to proactively respond to attacks. AI and     ML can help in a system of continuous monitoring as well as take over the     more repetitive and time consuming tasks, leaving the technicians with more     time to work on damage control. Although it must be kept in mind that AI is     not a silver bullet, since attackers will try their best to confuse the AI     systems through evasion techniques such as adversarial AI (where the     attackers design machine learning models that are intended to confuse the     AI model into making a mistake).&lt;a name="fr13"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, human intervention and monitoring of AI and ML systems in cyber     security is essential to maintain the defence and protection mechanisms of     enterprises.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few topics that Indian SOCs need to consider while using AI and ML    &lt;strong&gt;:&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. The companies need to understand that AI and ML need human expertise and     supervision to be effective and hence substituting people for AI is not     ideal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. The companies need to give equal if not more importance to data     security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. The companies need to constantly upgrade their systems and re-skill     their technicians to combat cyber security threats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. The AI and ML systems need to be regularly audited to ensure that they     are not compromised by cyber attacks and also to ensure that they are not     generating false positives.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn1"&gt;&lt;/a&gt;]. &lt;span&gt;Cisco, (2018, February). Annual Cybersecurity Report. Retrieved             March 8, 2018, from             https://www.cisco.com/c/dam/m/digital/elq-cmcglobal/witb/acr2018/acr2018final.pdf?dtid=odicdc000016&amp;amp;ccid=cc000160&amp;amp;oid=anrsc005679&amp;amp;ecid=8196&amp;amp;elqTrackId=686210143d34494fa27ff73da9690a5b&amp;amp;elqaid=9452&amp;amp;elqat=2&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn2"&gt;&lt;/a&gt;]. &lt;span&gt;Ibid.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn3"&gt;&lt;/a&gt;]. &lt;span&gt;Enterprise Strategy Group (2017, March ). Top-of-mind Threats and Their Impact on Endpoint Security Decisions. Retrieved March 8, 2018 from             https://www.cylance.com/content/dam/cylance/pdfs/reports/ESG-Research-Insights-Report-Summary-Cylance-Oct-2017.pdf&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn4"&gt;&lt;/a&gt;]. &lt;span&gt;Ibid.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;[&lt;/span&gt;&lt;a name="fn5" style="text-align: justify; "&gt;&lt;/a&gt;&lt;span style="text-align: justify; "&gt;]. &lt;/span&gt;&lt;span&gt;Vorobeychik,Y (2016). Adversarial AI. Retrieved March 8, 2018, from  https://www.ijcai.org/Proceedings/16/Papers/609.pdf&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;[&lt;/span&gt;&lt;a name="fn6" style="text-align: justify; "&gt;&lt;/a&gt;&lt;span style="text-align: justify; "&gt;]. &lt;/span&gt;&lt;span&gt;Quora. ( 2081, February 15). How Will Artificial Intelligence And             Machine Learning Impact Cyber Security? Retrieved March 8, 2018,             from             https://www.forbes.com/sites/quora/2018/02/15/how-will-artificial-intelligence-and-machine-learning-impact-cyber-security/#569454786147&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;[&lt;/span&gt;&lt;a name="fn7" style="text-align: justify; "&gt;&lt;/a&gt;&lt;span style="text-align: justify; "&gt;]. &lt;/span&gt;&lt;span&gt;Sparkes, P. (2018, February 27). The 5 Essentials of Every Next-Gen             SOC. Retrieved March 8, 2018, from             https://www.brighttalk.com/webcast/13389/303251/the-5-essentials-of-every-next-gen-soc&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;[&lt;/span&gt;&lt;a name="fn8" style="text-align: justify; "&gt;&lt;/a&gt;&lt;span style="text-align: justify; "&gt;]. &lt;/span&gt;&lt;span&gt;PTI. ( 2018, February 21).Indian companies lost $500,000 to             cyber.Retrieved March 8, 2018, from             https://economictimes.indiatimes.com/tech/internet/indian-companies-lost-500000-to-cyber-attacks-in-1-5-years-cisco/articleshow/63019927.cms&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;[&lt;/span&gt;&lt;a name="fn9" style="text-align: justify; "&gt;&lt;/a&gt;&lt;span style="text-align: justify; "&gt;]. &lt;/span&gt;&lt;span&gt;Cisco, (2018, February). Annual Cybersecurity Report. Retrieved March 8, 2018, from             https://www.cisco.com/c/dam/m/digital/elq-cmcglobal/witb/acr2018/acr2018final.pdf?dtid=odicdc000016&amp;amp;ccid=cc000160&amp;amp;oid=anrsc005679&amp;amp;ecid=8196&amp;amp;elqTrackId=686210143d34494fa27ff73da9690a5b&amp;amp;elqaid=9452&amp;amp;elqat=2&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;[&lt;/span&gt;&lt;a name="fn10" style="text-align: justify; "&gt;&lt;/a&gt;&lt;span style="text-align: justify; "&gt;]. &lt;/span&gt;&lt;span&gt;Raval, A. ( 2018,January 30). AI takes cyber security to a new             level for HDFC Bank.Retrieved March 8, 2018, from             http://computer.expressbpd.com/magazine/ai-takes-cyber-security-to-a-new-level-for-hdfc-bank/23580/&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;[&lt;/span&gt;&lt;a name="fn11" style="text-align: justify; "&gt;&lt;/a&gt;&lt;span style="text-align: justify; "&gt;]. &lt;/span&gt;&lt;span&gt;“The Centre for Development of Advanced Computing (C-DAC) under the             Ministry of Electronics and Information Technology (MeitY) is             working on a project to provide cyber forensic services to             law-enforcing and other government and non-government agencies.”             Ohri, R. (2018, February 15. Government readies AI-muscled cyber             security plan. Retrieved March 8, 2018, from             https://economictimes.indiatimes.com/news/politics-and-nation/government-readies-ai-muscled-cyber-security-plan/articleshow/62922403.cms             utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;[&lt;/span&gt;&lt;a name="fn12" style="text-align: justify; "&gt;&lt;/a&gt;&lt;span style="text-align: justify; "&gt;]. &lt;/span&gt;&lt;span&gt;Chowdhury, P.A. (2017, January 30). Cyber Warfare at large in             Southeast Asia, India leverages AI for the same cause Retrieved             March 8, 2018, from             https://analyticsindiamag.com/cyber-warfare-large-southeast-asia-india-leverages-ai-cause/&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;[&lt;/span&gt;&lt;a name="fn13" style="text-align: justify; "&gt;&lt;/a&gt;&lt;span style="text-align: justify; "&gt;]. &lt;/span&gt;&lt;span&gt;Open AI.(2017 February 24). Attacking Machine Learning with             Adversarial Examples. Retrieved March 8, 2018, from             https://blog.openai.com/adversarial-example-research/&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/people-driven-and-tech-enabled-2013-how-ai-and-ml-are-changing-the-future-of-cyber-security-in-india'&gt;https://cis-india.org/internet-governance/blog/people-driven-and-tech-enabled-2013-how-ai-and-ml-are-changing-the-future-of-cyber-security-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-03-11T15:30:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-prashant-k-nanda-and-komal-gupta-pension-wont-be-denied-for-want-of-aadhaar-epfo">
    <title>Pension won’t be denied for want of Aadhaar, says EPFO</title>
    <link>https://cis-india.org/internet-governance/news/livemint-prashant-k-nanda-and-komal-gupta-pension-wont-be-denied-for-want-of-aadhaar-epfo</link>
    <description>
        &lt;b&gt;The move is aimed at ensuring that no retired government employee is deprived of pension for want of Aadhaar or failure of fingerprint authentication.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Prashant K. Nanda and Komal Gupta published by &lt;a class="external-link" href="https://www.livemint.com/Politics/J0wTnWuLVVNsejAcJygdRO/Dont-delay-pension-disbursal-in-pretext-of-Aadhaar-linking.html"&gt;Livemint&lt;/a&gt; on April 11, 2018 quoted Pranesh Prakash.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Tens of thousands of pensioners under the employees pension scheme will not be denied their monthly pension if their Aadhaar authentication fails or they do not have the 12-digit unique ID, the Employees Provident Fund Organisation (EPFO) has indicated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The retirement fund manager has asked banks and post offices to facilitate pension disbursement without making senior citizens do the rounds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move comes after EPFO received several complaints of denial of pension by banks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;For paying pension to those whose fingerprint authentication fails, “banks may make provisions for iris scanner, along with the fingerprint scanner in bank branches. It has been observed that in many cases, iris authentication is successful even though fingerprint authentication may have failed. This is particularly true for many senior citizens. In such cases, digital life certificate may be generated on the basis of iris authentication and pension may be given,” the EPFO said in a circular on Monday.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And when both iris and fingerprint authentication are not feasible, “an entry should be made in the exception register with reasons and pension may be provided on the basis of paper life certificate and physical Aadhaar card or E-Aadhaar card of the pensioner after due verification as deemed fit by the bank,” the circular said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move is aimed at ensuring that no senior citizen is deprived of pension for want of Aadhaar or failure of fingerprint authentication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Banks have been advised to ensure that benefits of the pension scheme reach the citizens and a proper mechanism for “handling exceptions” is put in place.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Banks should make special arrangements for the bed-ridden, differently abled, or senior citizens who are unable to visit the Aadhaar enrolment centre,” the circular said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;EPFO has also instructed pension disbursing banks and post offices to make necessary arrangements for enrolling pensioners for Aadhaar and to carry out authentication through iris, especially for those who cannot be verified through fingerprints.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Unique Identification Authority of India (UIDAI) has been under the scanner over the past few months over allegations of access to pension being denied as the fingerprints of the elderly do not match biometrics in the Aadhaar database.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So far, pensioners had to furnish a life certificate and needed to authenticate it using biometrics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The fact that it is coming now means that the Unique Identification Authority of India’s claim in the Supreme Court about no person having been denied any benefit due to the lack of Aadhaar is simply untrue,” said Bengaluru-based Pranesh Prakash, an affiliated fellow with the Yale Law School’s Information Society Project that works on issues related to the intersection of law, technology and society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Prakash, however, welcomed EPFO’s move laying down “a procedure both for those who don’t have an Aadhaar number, as well as those whose biometrics fail for any reason”.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash further said that “as per the UIDAI’s own data, failure rates for iris authentication are higher (8.54%) than for fingerprints (6%). So the utility of pushing for iris authentication is unclear.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are more than 1.2 billion Aadhaar holders in the country.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-prashant-k-nanda-and-komal-gupta-pension-wont-be-denied-for-want-of-aadhaar-epfo'&gt;https://cis-india.org/internet-governance/news/livemint-prashant-k-nanda-and-komal-gupta-pension-wont-be-denied-for-want-of-aadhaar-epfo&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-10T22:33:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp">
    <title>Peering behind the veil of ICANN’s DIDP (I)</title>
    <link>https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp</link>
    <description>
        &lt;b&gt;One of the key elements of the process of enhancing democracy and furthering transparency in any institution which holds power is open access to information for all the stakeholders. This is critical to ensure that there is accountability for the actions of those in charge of a body which utilises public funds and carries out functions in the public interest. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;As the body which “&lt;i&gt;...coordinates the Internet Assigned Numbers Authority (IANA) functions, which are key technical services critical to the continued operations of the Internet's underlying address book, the Domain Name System (DNS)&lt;/i&gt;”&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, the centrality of ICANN in regulating the Internet (a public good if there ever was one) makes it vital that ICANN’s decision-making processes, financial flows, and operations are open to public scrutiny. ICANN itself echoes the same belief, and upholds “...&lt;i&gt;a proven commitment to accountability and transparency in all of its practices&lt;/i&gt;”&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, which is captured in their By-Laws and &lt;a href="https://www.icann.org/resources/pages/affirmation-of-commitments-2009-09-30-en"&gt;Affirmation of Commitments&lt;/a&gt;. In furtherance of this, ICANN has created its own &lt;a href="https://www.icann.org/resources/pages/didp-2012-02-25-en"&gt;Documentary Information Disclosure Policy&lt;/a&gt;, where it promises to “...&lt;i&gt;ensure that information contained in &lt;b&gt;documents concerning ICANN's operational activities&lt;/b&gt;, and within ICANN's possession, custody, or control, is &lt;b&gt;made available to the public &lt;/b&gt;unless there is a compelling reason for confidentiality.&lt;/i&gt;”&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN has a vast array of documents that are already in the public domain, listed &lt;a href="https://www.icann.org/resources/pages/didp-2012-02-25-en"&gt;here&lt;/a&gt;. These include annual reports, budgets, registry reports, speeches, operating plans, correspondence, etc. However, their Documentary Information Disclosure Policy falls short of meeting international standards for information disclosure. In this piece, I have focused on an examination of their defined conditions for non-disclosure of information, which seem to undercut the entire process of transparency that the DIDP process aims towards upholding. The obvious comparison that comes to mind is with the right to information laws that governments the world over have enacted in furtherance of democracy. While ICANN cannot be equated to a democratically elected government, it nonetheless does exercise sufficient regulatory power of the functioning of the Internet for it to owe a similar degree of information to all the stakeholders in the internet community. In this piece, I have made an examination of ICANN’s conditions for non-disclosure, and compared it to the analogous exclusions in India’s Right to Information Act, 2005&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;ICANN’ꜱ Defined Conditions for Non-Disclosure versus Exclusions in Indian Law :&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN, in its DIDP policy identifies a lengthy list of conditions as being sufficient grounds for non-disclosure of information. One of the most important indicators of a strong transparency law is said to be &lt;b&gt;&lt;i&gt;minimum exclusions&lt;/i&gt;&lt;/b&gt;.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, as seen from the table below, ICANN’s exclusions are extensive and vast, and this has been a barrier in the way of free flow of information. An analysis of their responses to various DIDP requests (available &lt;a href="https://www.icann.org/resources/pages/governance/transparency-en"&gt;here&lt;/a&gt;) shows that the conditions for non-disclosure have been invoked in over 50 of the 85 requests responded to (as of 11.09.2015); i.e., over two-thirds of the requests that ICANN receives are subjected to the non-disclosure policies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In contrast, an analysis of India’s Right to Information Act, considered to be among the better drafted transparency laws of the world, reveals a much narrower list of exclusions that come in the way of a citizen obtaining any kind of information sought. The table below compares the two lists:&lt;/p&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;No.&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;ICANN&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;India&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Analysis&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Information provided by or to a government or international organization&lt;/b&gt; which was to be kept confidential or would materially affect ICANN’s equation with the concerned body.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information, disclosure of which would prejudicially affect the &lt;b&gt;sovereignty and integrity of India&lt;/b&gt;, the security, "strategic, scientific or economic" interests of the State, relation with foreign State or lead to incitement of an offense&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;/ information &lt;b&gt;received in confidence from foreign government&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The threshold for both the bodies is fairly similar for this exclusion.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;2.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internal (staff/Board) information &lt;/b&gt;that, if disclosed, would or would be likely to compromise the integrity of ICANN's deliberative and decision-making process&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cabinet papers including records of deliberations&lt;/b&gt; of the Council of Ministers, Secretaries and other officers, provided that such decisions the reasons thereof, and the material on the basis of which the decisions were taken &lt;b&gt;shall be made public after the decision has been taken&lt;/b&gt;, and the matter is complete, or over (unless subject to these exemptions)&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The Indian law is far more transparent as it ultimately allows for the records of internal deliberation to be made public after the decision is taken.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;3.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information related to the &lt;b&gt;deliberative and decision-making process between ICANN, its constituents, and/or other entities with which ICANN cooperates &lt;/b&gt;that, if disclosed, would or would be likely to compromise the integrity of the deliberative and decision-making process&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;No similar provision in Indian Law.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This is an additional restriction that ICANN introduces in addition to the one above, which in itself is quite broad.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;4.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Records relating to an individual's personal information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information which relates to &lt;b&gt;personal information &lt;/b&gt;the disclosure of which has no relationship to any public activity or interest, or which would cause unwarranted invasion of the privacy of the individual (but it is also provided that the information which cannot be denied to the Parliament or a State Legislature shall not be denied by this exemption);&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Again, the Indian law contains a proviso for information with “&lt;i&gt;relationship to any public activity or interest&lt;/i&gt;”&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;5.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Proceedings of internal appeal mechanisms and investigations.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information which has been &lt;b&gt;expressly forbidden to be published by any court of law &lt;/b&gt;or tribunal or the disclosure of which may constitute contempt of court;&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;While ICANN prohibits the disclosure of all proceedings, in India, the exemption is only to the limited extent of information that the court prohibits from being made public.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;6.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information provided to ICANN by a party that, if disclosed, would or would be likely to &lt;b&gt;materially prejudice the commercial interests, financial interests, and/or competitive position &lt;/b&gt;of such party or was provided to ICANN pursuant to a nondisclosure agreement or nondisclosure provision within an agreement.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information including &lt;b&gt;commercial confidence, trade secrets &lt;/b&gt;or intellectual property, the &lt;b&gt;disclosure of which would harm the competitive position of a third party&lt;/b&gt;, unless the competent authority is satisfied that larger public interest warrants the disclosure of such information;&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This is fairly similar for both lists.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;7.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Confidential business information &lt;/b&gt;and/or internal policies and procedures.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;No similar provision in Indian Law. This is encapsulated in the abovementioned provision&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This is fairly similar in both lists.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;8.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information that, if disclosed, would or would be likely to &lt;b&gt;endanger the life, health, or safety &lt;/b&gt;of any individual or materially prejudice the administration of justice.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information, the disclosure of which would &lt;b&gt;endanger the life or physical safety of any person &lt;/b&gt;or identify the source of information or assistance given in confidence for law enforcement or security purposes;&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This is fairly similar for both lists.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Information subject to any kind of privilege&lt;/b&gt;, which might prejudice any investigation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information, the disclosure of which would cause a &lt;b&gt;breach of privilege of Parliament &lt;/b&gt;or the State Legislature&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;/Information which would &lt;b&gt;impede the process of investigation or apprehension or prosecution of offenders&lt;/b&gt;;&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This is fairly similar in both lists.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Drafts of all correspondence, reports, documents, agreements, contracts, emails, or any other forms of communication.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in Indian Law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This exclusion is not present in Indian law, and it is extremely broadly worded, coming in the way of full transparency.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information that relates in any way to the &lt;b&gt;security and stability of the Internet&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in Indian Law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This is perhaps necessary to ICANN’s role as the IANA Functions Operator. However, given the large public interest in this matter, there should be some proviso to make information in this regard available to the public as well.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;12.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Trade secrets and commercial and financial information &lt;/b&gt;not publicly disclosed by ICANN.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information including &lt;b&gt;commercial confidence, trade secrets &lt;/b&gt;or intellectual property, the disclosure of which would harm the competitive position of a third party, unless the competent authority is satisfied that larger public interest warrants the disclosure of such information;&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This is fairly similar in both cases.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information requests:&lt;/p&gt;
&lt;p&gt;● which are not reasonable;&lt;/p&gt;
&lt;p&gt;● which are excessive or overly burdensome&lt;/p&gt;
&lt;p&gt;● complying with which is not feasible&lt;/p&gt;
&lt;p&gt;● which are made with an abusive or vexatious purpose or by a vexatious or querulous individual.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in Indian Law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Of all the DIDP exclusions, this is the one which is most loosely worded. The terms in this clause are not clearly defined, and it can effectively be used to deflect any request sought from ICANN because of its extreme subjectivity. What amounts to ‘reasonable’? Whom is the process going to ‘burden’? What lens does ICANN use to define a ‘vexatious’ purpose? Where do we look for answers?&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;14.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in ICANN’s DIDP.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information available to a person in his &lt;b&gt;fiduciary relationship&lt;/b&gt;, unless the competent authority is satisfied that the larger public interest warrants the disclosure of such information;&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;15.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in ICANN’s DIDP.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information which providing access to would involve an &lt;b&gt;infringement of copyright subsisting in a person other than the State&lt;/b&gt;.&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Thus, the net cast by the DIDP exclusions policy is more vast than even than that of a democratic state’s transparency law. Clearly, the exclusions above have effectively allowed ICANN to dodge answers to most of the requests floating its way. One can only hope that ICANN realises that these exclusions come in the way of the transparency that they are so committed to, and does away with this unreasonably wide range on the road to the IANA Transition.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.icann.org/resources/pages/welcome-2012-02-25-en&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.icann.org/resources/accountability&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.icann.org/resources/pages/didp-2012-02-25-en&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Shekhar Singh, &lt;i&gt;India: Grassroot Initiatives&lt;/i&gt; in Tʜᴇ Rɪɢʜᴛ ᴛᴏ Kɴᴏᴡ 19, 44 (Ann Florin ed., 2007)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In a proviso, ICANN’s DIDP states that all these exemptions can be overridden if the larger public interest is higher. However, this has not yet been reflected in their responses to any DIDP requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(a), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(f), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(i), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(j), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(b), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section (1)(d), Right to Information Act, 2005&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(g), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(c), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(h), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section (1)(d), Right to Information Act, 2005&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(e), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 9, Right to Information Act, 2005.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp'&gt;https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Padmini Baruah</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-15T02:42:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icanns-didp-ii">
    <title>Peering behind the veil of ICANN's DIDP (II)</title>
    <link>https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icanns-didp-ii</link>
    <description>
        &lt;b&gt;In a previous blog post, I had introduced the concept of ICANN’s Documentary Information Disclosure Policy (“DIDP”) and their extremely vast grounds for non-disclosure. In this short post, I have made an analysis of every DIDP request that ICANN has ever responded to, to point out the flaws in their policy that need to be urgently remedied.&lt;/b&gt;
        &lt;p&gt;Read the previous blog post &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp"&gt;here&lt;/a&gt;. Every DIDP request that ICANN has ever responded to can be &lt;a class="external-link" href="https://www.icann.org/resources/pages/governance/transparency-en"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The table &lt;a href="https://docs.google.com/spreadsheets/d/1M1gWBpa7tlxGPMWyB6xJryddahyZzjVIarSz0RJswDM/edit?usp=sharing"&gt;here&lt;/a&gt; is a comprehensive breakdown of all the different DIDP requests that ICANN has responded to. This table is to be read with &lt;a href="https://docs.google.com/document/d/1x1vG23FdIAzo4ro80eEieaokBpAeNVtYXjds6mHt2DE/edit?usp=sharing"&gt;this document&lt;/a&gt;, which has a numbered list of the different non-disclosure exceptions &lt;a href="https://www.icann.org/resources/pages/didp-2012-02-25-en"&gt;outlined in ICANN’s policy&lt;/a&gt;. What I sought to scrutinize was the number of times ICANN has provided satisfactory information, the number of times it has denied information, and the grounds for the same. What we found was alarming:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Of a total of 91 requests (as of 13/10/2015), &lt;b&gt;ICANN has fully and positively responded to only 11.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;It has responded &lt;b&gt;partially&lt;/b&gt; &lt;b&gt;to 47 of 91 requests, &lt;/b&gt;with some amount of information (usually that which is available as public records).&lt;/li&gt;
&lt;li&gt;It has &lt;b&gt;not responded at all to 33 of 91 requests&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (1)&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;17 times.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (2)&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;39 times.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (3)&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;31 times.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (4)&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;5 times.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;T&lt;/b&gt;he Non-Disclosure Clause (5)&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;34 times.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (6)&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;35 times.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (7)&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;once.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (8)&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;22 times.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (9)&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;30 times.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (10)&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;10 times.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (11)&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;12 times.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (12)&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;18 times.&lt;/b&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This data is disturbing because it reveals that ICANN has in practice been able to deflect most requests for information. It regularly utilised its internal processes and discussions with stakeholders clauses, as well as clauses on protecting financial interests of third parties (over 50% of the total non-disclosure clauses ever invoked - see chart below) to do away with having to provide information on pertinent matters such as its compliance audits and reports of abuse to registrars. We believe that even if ICANN is a private entity legally, and not at the same level as a state, it nonetheless plays the role of regulating an enormous public good, namely the Internet. Therefore, there is a great onus on ICANN to be far more open about the information that they provide.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, it is extremely disturbing that they have extended full disclosure to only 12% of the requests that they receive. An astonishing 88% of the requests have been denied, partly or otherwise. Therefore, it is clear that there is a failure on part of ICANN to uphold the transparency it claims to stand for, and this needs to be remedied at the earliest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Pie1.png" title="Pie Chart 1" height="342" width="327" alt="Pie Chart 1" class="image-inline" /&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Pie1.png" alt="Pie Chart 2" class="image-inline" title="Pie Chart 2" /&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Information provided by or to a government or international organization, or any form of recitation of such information, in the expectation that the information will be kept confidential and/or would or likely would materially prejudice ICANN's relationship with that party&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Internal information that, if disclosed, would or would be likely to compromise the integrity of ICANN's deliberative and decision-making process by inhibiting the candid exchange of ideas and communications, including internal documents, memoranda, and other similar communications to or from ICANN Directors, ICANN Directors' Advisors, ICANN staff, ICANN consultants, ICANN contractors, and ICANN agents&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Information exchanged, prepared for, or derived from the deliberative and decision-making process between ICANN, its constituents, and/or other entities with which ICANN cooperates that, if disclosed, would or would be likely to compromise the integrity of the deliberative and decision-making process between and among ICANN, its constituents, and/or other entities with which ICANN cooperates by inhibiting the candid exchange of ideas and communications&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Personnel, medical, contractual, remuneration, and similar records relating to an individual's personal information, when the disclosure of such information would or likely would constitute an invasion of personal privacy, as well as proceedings of internal appeal mechanisms and investigations&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Information provided to ICANN by a party that, if disclosed, would or would be likely to materially prejudice the commercial interests, financial interests, and/or competitive position of such party or was provided to ICANN pursuant to a nondisclosure agreement or nondisclosure provision within an agreement&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Confidential business information and/or internal policies and procedures&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Information that, if disclosed, would or would be likely to endanger the life, health, or safety of any individual or materially prejudice the administration of justice&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Information subject to the attorney– client, attorney work product privilege, or any other applicable privilege, or disclosure of which might prejudice any internal, governmental, or legal investigation&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Drafts of all correspondence, reports, documents, agreements, contracts, emails, or any other forms of communication&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Information that relates in any way to the security and stability of the Internet, including the operation of the L Root or any changes, modifications, or additions to the root zone&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Trade secrets and commercial and financial information not publicly disclosed by ICANN&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Information requests: (i) which are not reasonable; (ii) which are excessive or overly burdensome; (iii) complying with which is not feasible; or (iv) are made with an abusive or vexatious purpose or by a vexatious or querulous individual&lt;/i&gt;”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icanns-didp-ii'&gt;https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icanns-didp-ii&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Padmini Baruah</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-15T03:14:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/peeping-toms-in-inbox">
    <title>Peeping Toms In Your Inbox</title>
    <link>https://cis-india.org/news/peeping-toms-in-inbox</link>
    <description>
        &lt;b&gt;Nothing’s safe any more—not your mobile number, nor your e-mail—as they’re put on offer for the benefit of telemarketers, writes Namrata Joshi and Neha Bhatt in an article published in the Outlook.&lt;/b&gt;
        
&lt;p&gt;It was Saturday morning and Sneha Gupta wanted to book a table for dinner at a Delhi restaurant called Rodeo. So she called up a telephone directory service and procured the restaurant’s phone number, firmly nixing the operator’s seemingly casual offer to also provide numbers of similar restaurants. But that wasn’t the end of the story. The next day, Sunday brunch with her extended family was interrupted by calls from sundry restaurants enquiring if she’d be interested in hosting parties and events—at a discount.&lt;/p&gt;
&lt;p&gt;“Instead of enjoying the food, the company and the conversation, I was busy ticking off these guys. Why were they assuming I wanted to organise a party? How did they get my mobile number to blatantly infringe on my private family time?” asks Sneha. She got no answers from them, but the sequence of events is clear: the telephone directory service sold Sneha’s contact details to marketers who broadly assumed, from her Rodeo outing, that she was a party animal, and decided to bombard her with similar offers.&lt;/p&gt;
&lt;p&gt;Something similar happened to media professional Raghav Agarwal. He paid off his bank loan for a car in two-and-a-half years instead of the stipulated five, happy to stop living off credit. But from the next day, he was inundated with calls offering him bigger and better credit for everything—from house to car to education. “It was awfully distracting to deal with this while trying to meet deadlines,” he recounts. The fact that he had paid back the loan ahead of time had, by hook or by crook, reached financial outfits who used the information to serenade what they saw as an attractive catch.&lt;/p&gt;
&lt;p&gt;For Kuhu Tanvir, these attentions come laced with a hint of menace. The film student was startled to find herself receiving unsolicited calls from unknown vendors offering to maintain the water purifier installed in the recesses of her kitchen. “It’s scary to think,” she says, “that there are people out there who even know which products you’ve bought for your house.” It was equally unnerving for film producer Gaurang Jalan to have his personal details passed on to data-miners by none other than a prominent Calcutta club (“strangers now call you on your birthday, offering schemes”). All those out there accosted by calls offering car insurance just at the time their policy is up for renewal will know exactly how they felt....&lt;/p&gt;
&lt;h3&gt;8 Ways In Which You’re Being Intruded Upon&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;Privacy is being redefined in India, with the lines between the public and the private blurring not just for celebrities but also for ordinary citizens...&lt;/li&gt;&lt;li&gt;Personal details like your phone number, date of birth, credit history, bank loans, insurance policies, white goods purchases, favourite restaurants and nightclubs are bought and sold among cellphone operators, banks, shops, telephone directory services, credit card companies, hospitals, hotels, elite clubs and even your locality’s residents’ welfare association.&lt;/li&gt;&lt;li&gt;Unsolicited telemarketing calls, spam SMSes and e-mails intrude incessantly on your private space, time&lt;/li&gt;&lt;li&gt;Your online purchases and searches, archived e-mails and documents are being tracked for marketing purposes. Social networking groups and search engines stand accused of sharing user information and contact details.&lt;/li&gt;&lt;li&gt;Personal pictures, information about relationships on social networking sites are being misused by online predators and molesters.&lt;/li&gt;&lt;li&gt;Identity theft is fast emerging as a threat.&lt;/li&gt;&lt;li&gt;Surveillance cameras and intrusive frisking have become a way of life, at airports, cinema halls, malls, hospitals, hotels, etc.&lt;/li&gt;&lt;li&gt;TV cameras and sting operations blur the line between individual privacy and public interest.&lt;/li&gt;&lt;li&gt;People encouraged and offered inducements to bare all about their lives on TV. Shows like Emotional Atyachar, Splitsvilla, Truth Love Cash play out individual dating rituals and infidelity games for the masses.&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;7 Steps You Can Take To Protect Yourself&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;Give out your mobile number cautiously, if at all; don’t print it on the visiting cards you hand out generously. Give only your landline number if you have to, to avoid being constantly disturbed.&lt;/li&gt;&lt;li&gt;Be wary of filling in random forms at retail stores and restaurants, or the gift voucher you’re offered in return for your friends’ names and phone numbers.&lt;/li&gt;&lt;li&gt;Be alert while shopping with your debit or credit card. The retailer may be also swiping the card on his computer to feed your contact information into it.&lt;/li&gt;&lt;li&gt;Even though the Do Not Call facility has not worked for a majority of users, you lose nothing by registering for it on www.donotcall.gov. You can’t complain about unsolicited calls unless you register.&lt;/li&gt;&lt;li&gt;Online, be cautious of the personal information you reveal, such as your date of birth and photographs, which make you especially vulnerable to identity theft. Use Google dashboard and the new Facebook privacy settings to protect yourself.&lt;/li&gt;&lt;li&gt;Get the latest browser that allows you to delete cookies-as-you-go, delete your browsing history regularly, learn to encrypt your e-mail.&lt;/li&gt;&lt;li&gt;Always read privacy clauses in bank and other forms, and on websites carefully, and remember to tick opt-out boxes if you don’t want to be besieged with new product information.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;For celebrities, the lines between the private and the public have always been blurred. But in a transforming India, ordinary people like Sneha, Raghav, Kuhu and Gaurang are finding themselves intruded upon in newer ways—from the trivial to the serious—and across varied platforms, from the mobile phone to the internet, TV to the surveillance camera. And, with citizens like them mostly dimly aware of how to safeguard, renegotiate or fight for their right to privacy—enshrined in the Constitution, but vaguely defined—in a changing world, and no effective laws to rein in those who violate it, the infringements and threats are set to increase.&lt;/p&gt;
&lt;p&gt;Take telemarketing, perhaps the most insistent manifestation today of this marauding culture. It started out as an irritant, became a nuisance and is now a virtually unchecked invasion. “In the West, telemarketing is an unobtrusive experience thanks to opt-in services by which users get calls only if they ask for them. Moreover, governments discourage telemarketers through strict regulations. In India, it’s a menace,” says Supreme Court advocate Harsh Pathak, who has litigated against telemarketing calls and the sale of personal data to companies.&lt;/p&gt;
&lt;p&gt;Indeed, you can chart an entire day in your life with these intrusions as markers. You get woken up with the SMS: “Hare Krishna. Today is Ekadashi. Fasting from grains and beens (sic). Chant Hare Krishna mahamantra 25 rounds (sic) and be happy. Hari bol.” Through the day, they keep coming, both SMSes and human voices, trying to sell you everything from houses and farmland to hotel deals, sauna belts, equity tips and public speaking skills. And, if you happen to be even an occasional club-hopper, your phone could carry on beeping till two or three am, with SMSes announcing the next gig in town.&lt;/p&gt;
&lt;p&gt;It’s clear from this virtually round-the-clock barrage that our personal lives are up for sale in an aggressive marketing-driven environment. Be it telecom companies, banks, shops, credit card firms, DVD rental libraries, insurance, auto dealers, clubs or hotels, they all profit from sharing personal information—phone numbers, credit history, spending patterns, shopping preferences and much else—about their customers. “The irony is that the corporate world has no accountability or transparency in India but the public has turned transparent for them,” says media analyst and columnist Sudheesh Pachauri.&lt;/p&gt;
&lt;p&gt;Those often identified as the prime offenders in this game are quick to shrug off blame, or not respond, as Outlook found. ICICI Bank could not “participate in this story”, Airtel declined comment while Vodafone did not respond at all. Rajat Mukarji, chief corporate officer, Idea Cellular, who did respond, said phone companies were unfairly blamed for unsolicited calls. “Such data is available everywhere now, you can buy it off the Net for Rs 150,” he argued. HDFC Bank’s chief information security officer Vishal Salvi also stoutly denies that databases are sold, and when asked why existing customers are deluged with new product and service offers, says: “It only happens on a need-to-know, need-to-do-basis.” That’s the theory, but in practice, many customers find that the “need” seems to be defined by the banks, not their clients.&lt;/p&gt;
&lt;p&gt;So where does that leave the consumer? Well, says Bangalore-based freelance writer and photographer Darshan Manakkal, “On a good day, I plead with the telemarketer to never call me again. With the more persistent ones, I try a different approach, like putting them on hold while I go for a bath. On really bad days, I just abuse them.” Others, like Chennai professional P.K. Pradeep, who shared with us pages upon pages of (extremely polite) e-mails to Airtel and Vodafone requesting them to halt unsolicited calls and SMSes, have been more persistent, but have achieved little beyond the robotic response, “We’re looking into it.”&lt;/p&gt;
&lt;p&gt;Signing up, along with some 66 million souls, at the National Do Not Call (NDNC) Registry set up in October 2007, provided no protection to Pradeep, nor did changing phone numbers. “I got a new number from Vodafone recently, and would you believe it, the very next day I was bombarded with promotional messages. They had clearly passed on my number,” he says. The NDNC of the Telecom Regulatory Authority of India (TRAI) is now widely acknowledged as a failure. There was a brief dip in calls, but they resumed with renewed gusto. You could get lost in the maze of explanations for why NDNC doesn’t work; what’s clear, though, is that it has no capacity to deal with telemarketers who fail to register with it—like all those unknown real estate companies who bombard you with SMSes—and little teeth to deal with those who do. Fines are laughably minuscule—ranging from Rs 500 to Rs 1,000—and the threat of disconnecting a telemarketer’s line is an empty one when it can quickly sign up and assault consumers from another connection. In view of its failure, a Do Call registry has been mooted, on the more consumer-friendly principle that those who want to be called should opt in rather than opt out. Consultations are on but its future shape is still unclear, with telecom companies (no surprise there) opposed to it. “We have gone far with dnc. To now backtrack and try something new doesn’t seem feasible,” says Mukarji.&lt;/p&gt;
&lt;p&gt;“The whole problem of unregistered telemarketers will continue and telecom companies will go on blaming them,” S. Saroja, legal coordinator for the Chennai-based Citizen Consumer and Civic Action Group, predicts pessimistically. The group has tried, to no avail, to get phone companies to trace bulk SMSes, which she maintains are easily traceable. “Telemarketing is a Rs 50,000-crore industry and growing at 20 per cent every year. Nobody wants to upset it as everybody is making money out of it, including the government,” says Supreme Court advocate Nivedita Sharma, who has fought her own battles against the sale of privacy.&lt;/p&gt;
&lt;p&gt;Meanwhile, an expanding online world is throwing up its own challenges. By 2013, according to some estimates, India will have the third-largest internet user base in the world. Already, with 50 million-plus users and growing, it is a magnet for marketers, who as we know—without perhaps fully internalising the fact—avidly follow the telltale digital pugmarks and trails we leave on the Net as we e-mail, search, shop and obsessively communicate with each other on platforms like Facebook and Twitter.&lt;/p&gt;
&lt;p&gt;These spaces on the Net, and their counterparts on other media, seem to be drawing us into an open, sharing, even confessional, culture, without our being fully aware of our vulnerability. We occasionally get intimations of it—like when our e-mail account is hacked into and bizarre mail sent out on our behalf; our Facebook pictures downloaded and their obscene versions floated on Orkut, as happened to two Delhi airhostesses recently; or vicious, revealing comments on our personal lives posted amid the banter on our favourite chat sites.&lt;/p&gt;
&lt;p&gt;However, as media analysts point out, there is little push in the Indian environment to do what Western users of Facebook did recently: forcing it to change privacy policies and settings by protesting against its inadequate privacy controls. Here too, as with telemarketing, the regulatory environment is missing.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“In India, there are no regulatory bodies related to online privacy concerns like in the US and Canada where there are privacy commissions which force corporations to make changes in their privacy policy in the interest of citizens,” says Sunil Abraham, executive director, the Centre for Internet and Society, Bangalore.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt; But individuals are to blame too. Saad Akhtar of naukri.com points out: “We don’t even read the fine print on privacy policies on websites, not realising that a lot of the data we upload even on Indian social networking websites becomes their property, which they can share with advertisers.”&lt;/p&gt;
&lt;p&gt;Indeed, Akhila Sivadas of the Centre for Advocacy and Research, says that privacy issues are creating a cultural crisis of sorts, with no understanding of them, leave alone resolution. “Privacy is something that has been negotiated in a personal, intimate, micro universe. We have drawn our individual lakshman rekhas. But we have not debated on privacy norms as a society in a public space, which is very significant in the wake of how the mass media and social networking media is exploding in our country,” she says. It’s leading to an uneasy blend of the very closed and guarded, and the extremely open and no-holds-barred in our society. “There is no robust normative system in place, and corporate entities are exploiting that void,” she says. “The market is primed to take advantage and exploit existing conditions for profit. We are allowing the market to overreach itself,” agrees adman and social commentator Santosh Desai.&lt;/p&gt;
&lt;p&gt;So what should be done? Obviously, the R-word—regulation—is critical, and hopefully, the cry for it from the ground will become stronger, as intrusions gather apace. But it would help for consumers to get smarter. Some of the questions to ask ourselves are: should I really be patronising a phone directory service, as Sneha did, that states that it shares information with third-party members and is not responsible for that information being misused by third parties? Should I hand out my visiting card, with my mobile number on it, to all and sundry? Should I reflexively press the “I agree to the terms &amp;amp; conditions” button while signing up for net services without reading the fine print? As Desai puts it, we need to be “mindful, suspicious and careful”. Without, of course, descending into paranoia. The irony, getting sharper and sharper in our lives, is that the very platforms that are used to invade our privacy also enrich our lives in manifold ways.&lt;/p&gt;
&lt;p&gt;Read the original article in &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?265792"&gt;Outlook&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/peeping-toms-in-inbox'&gt;https://cis-india.org/news/peeping-toms-in-inbox&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T11:42:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-komal-gupta-remya-nair-january-24-2018-paytm-payments-bank-woos-corporates-with-digital-incentives">
    <title>Paytm Payments Bank woos corporates with digital incentives</title>
    <link>https://cis-india.org/internet-governance/news/livemint-komal-gupta-remya-nair-january-24-2018-paytm-payments-bank-woos-corporates-with-digital-incentives</link>
    <description>
        &lt;b&gt;Offerings will be an incentive to companies already using Paytm e-wallet services to shift employees’ salary accounts to the bank, says Paytm Payments Bank CEO Renu Satti.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published by Komal Gupta and Remya Nair was &lt;a class="external-link" href="http://www.livemint.com/Industry/10K7o13Xrfk9xsXF5lGpIL/Paytm-Payments-Bank-woos-corporates-with-digital-incentives.html"&gt;published in Livemint&lt;/a&gt; on January 24, 2018&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Looking to tap the ready customer base of salary accounts, Paytm Payments Bank is trying to attract corporate entities with digital offerings such as food and gift wallets for their employees.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bank has set a target of reaching a customer base of 500 million over the next 2-3 years, managing director and chief executive Renu Satti said in an interview. The bank claims to have 170 million customers, including those using the Paytm e-wallet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Satti said the offerings will be an incentive to companies already using Paytm e-wallet services to shift employees’ salary accounts to the bank. Around 500 corporate entities are using e-wallet services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“These corporate offerings will ensure better accountability and convenience for both the employers and employees,” she said, giving the example of food wallets which are automatically debited when a customer buys food, due to the tagging of merchants done at the back-end by Paytm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We even offer customisation to the extent of restricting usage of food wallet to specific merchants like office cafeterias, basis requirement,” Satti said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Food vouchers and gift coupons have been typically issued in a physical form by corporate entities, earlier as paper coupons and now as prepaid cards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Paytm Payments Bank offers customers the convenience of using their food and gift wallets through the app across the merchant base of Paytm, Satti said. “It doesn’t require any card, which also does away with issues such as loss of card and expiry of coupons, plus avail the benefits of cashback running on any Paytm merchant,” she added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last week, Paytm Payments Bank launched physical debit cards for its customers to facilitate account holders to withdraw cash from ATMs and make offline payments. Hitherto, the bank had been issuing virtual debit cards which could only be used for online payments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bank also plans to set up around 100,000 banking outlets across the country in the next one year to cater largely to under-banked rural areas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The list of these outlets will be available on the bank’s website where the customer will be able to access a range of services including net banking, National Electronic Funds Transfer (NEFT), Immediate Payment Service (IMPS) and Unified Payments Interface (UPI). There will be monetary incentives for these correspondents for every transaction they perform for the customer. These outlets could be a local kirana store or a chemist shop, Satti said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;“We will follow a stringent process to shortlist merchants. There will be screening, quality check, physical check to ensure whether the place is actually authorized to run a business,” she said.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;/span&gt;&lt;span&gt;The bank plans to onboard some from the existing merchant networks using Paytm wallets while others will be from areas where there is no Paytm presence as of now.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More than 6 million merchants are already a part of the Paytm ecosystem, primarily using wallet services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Paytm Payments Bank was launched in November after receiving a payments bank license from RBI in January last year. Vijay Shekhar Sharma, founder of One97 Communications, holds the majority share in Paytm Payments Bank, with the rest being held by One97 Communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bank currently has no minimum balance requirements and offers 4% interest on savings deposits. India has three other operational payment banks—Airtel Payments Bank, India Post Payments Bank and Fino Payments Bank. “The traditional banks that offer customized corporate services to its customers having a high amount of deposits would face competition from payments banks. They will have no other option but to offer those services to customers with deposits at the Payments bank limits, to stay relevant in the market,” said Udbhav Tiwari, programme manager at the Centre for Internet and Society, a Bengaluru-based think tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Also, as a payment company, Paytm has data pertaining to the spending patterns of customers which help it be more competitive in the market,” he added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-komal-gupta-remya-nair-january-24-2018-paytm-payments-bank-woos-corporates-with-digital-incentives'&gt;https://cis-india.org/internet-governance/news/livemint-komal-gupta-remya-nair-january-24-2018-paytm-payments-bank-woos-corporates-with-digital-incentives&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Money</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-01-24T23:52:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-manavi-kapur-alnoor-peermohamed-may-31-2018-patanjali-s-kimbho-swiftly-retreats-over-security-scare-ripped-on-twitter">
    <title>Patanjali's Kimbho swiftly retreats over security scare, ripped on Twitter</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-manavi-kapur-alnoor-peermohamed-may-31-2018-patanjali-s-kimbho-swiftly-retreats-over-security-scare-ripped-on-twitter</link>
    <description>
        &lt;b&gt;Swadeshi" messaging app targeted at WhatsApp taken off from app stores hours after launch.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Alnoor Peermohamed and Manavi Kapur was published in the &lt;a class="external-link" href="https://www.business-standard.com/article/companies/patanjali-s-kimbho-swiftly-retreats-over-security-scare-ripped-on-twitter-118053101326_1.html"&gt;Business Standard&lt;/a&gt; on May 31, 2018. Gurshabad Grover was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The fate of Patanjali’s “swadeshi” instant messaging app Kimbho was sealed in the span of just a few hours, thanks to viral messages being shared on Facebook-owned WhatsApp, the app that the Baba Ramdev-promoted company was trying to combat.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=patanjali" target="_blank"&gt;Patanjali &lt;/a&gt;on Thursday launched Kimbho with the sole intent of checking the rise of messaging giant &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=whatsapp" target="_blank"&gt;WhatsApp &lt;/a&gt;in India. However, after Kimbho’s various data vulnerabilities were exposed by the security expert and whistleblower who goes by the pseudonym Elliot Alderson on Twitter, the app made a quiet exit from Google’s Play Store.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;iframe frameborder="0" height="1" marginheight="0" marginwidth="0" scrolling="no" title="3rd party ad content" width="1"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jokes surrounding the app’s quick retreat spread like wildfire on rival platform &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=whatsapp" target="_blank"&gt;WhatsApp.&lt;/a&gt; It was perhaps the quickest rise and fall in the popularity of a mobile application.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Alderson, who has exposed data breaches in the UIDAI’s website, took to Twitter to rip apart the &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=kimbho+app" target="_blank"&gt;Kimbho app.&lt;/a&gt; “This @KimbhoApp is a joke, next time before making press statements, hire competent developers... If it is not clear, for the moment don't install this app,” he wrote. His next tweet sent alarm bells ringing among users: “The #Kimbho #android #app is a security disaster. I can access the messages of all the users...”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kimbho, though, claims that every message on its platform is encrypted by the Advance Encryption Standard and that it saves “no data on our servers or cloud”. But Alderson pointed out that the one-time password security could be worked around. “It's possible to choose a security code between 0001 and 9999 and send it to the number of your choice,” he tweeted. Kimbho, explained as a Sanskrit greeting by S K Tijarawala, Ramdev’s spokerperson, on Twitter, is also a patched-up application over the existing Bolo messaging app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is most likely the reason the app was taken off the Google Play Store. “There were basic authentication and authorisation related vulnerabilities where an end user can see the data of other users. These flaws may be the reason the developers took down the app. Google flags such things,” said Anand Prakash, a Bengaluru-based ethical hacker.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=whatsapp" target="_blank"&gt;WhatsApp &lt;/a&gt;uses end-to-end encryption that essentially means even they can’t access the messages you send. But Kimbho, on the other hand, was not using end-to-end security and probably even saving every message as plain text on its server,” adds Gurshabad Grover, policy officer at the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google did not respond to queries about whether the developer took the app down or Google flagged it as unsecure. Kimbho declared on its Twitter handle that its app was removed from the Play Store because of heavy traffic, claiming that it was downloaded 150,000 times in a mere three hours since its launch.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Apple’s App Store, it was trending in the social networking category at the fourth position in India, just below WhatsApp, Facebook and Facebook’s Messenger, and above popular messaging apps such as Skype, LinkedIn and hike messenger.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tijarawala had announced Kimbho’s launch on Twitter, calling it an app developed by the “shishyas” (disciples) and “navdikshit sadhus” (newly ordained priests) of Ramdev and Acharya Balkrishna, managing director, &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=patanjali" target="_blank"&gt;Patanjali &lt;/a&gt;Ayurved and co-founder, &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=patanjali" target="_blank"&gt;Patanjali &lt;/a&gt;Yogpeeth in Haridwar. Tijarawala’s tweet also claimed that this app was built using “swadeshi” techniques, though what these are remains a mystery. Emails, text messages and calls to Tijarawala went unanswered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In keeping with an “Indian” aesthetic, the app’s logo has a “shankh” (conch shell), perhaps signifying a war cry against foreign-born WhatsApp, which has over 200 million active users in India. The conch shell also blends well with Kimbho’s tag line, “Ab Bharat Bolega” (now India will speak). But that is where its tenuous Indianness begins to crumble.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the app was registered as a product of &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=patanjali+ayurved" target="_blank"&gt;Patanjali Ayurved &lt;/a&gt;on the Play Store, the developer on Apple’s App Store is Appdios Inc, a San Francisco-based app development company. Aditi Kamal and Sumit Kumar are this company’s founders according to LinkedIn. The duo has worked with technology giants such as Google and Apple and hold masters degrees from University of Southern California in the US. A blonde man features on the screenshots that the app has featured on its landing page on the App Store.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Taking forward Bolo’s keyboard suggestions, cheekily called “Quickies”, Kimbho offers pre-typed messages such as “hugs and kisses”, “what the heck” and “parents are watching”. Whether these millennial-friendly features and Kimbho itself are an attempt to get young millennials in touch with their “swadeshi” roots remains to be seen.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-manavi-kapur-alnoor-peermohamed-may-31-2018-patanjali-s-kimbho-swiftly-retreats-over-security-scare-ripped-on-twitter'&gt;https://cis-india.org/internet-governance/news/business-standard-manavi-kapur-alnoor-peermohamed-may-31-2018-patanjali-s-kimbho-swiftly-retreats-over-security-scare-ripped-on-twitter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-06-01T14:15:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
