<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 996 to 1010.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/huffignton-post-december-13-2019-rachna-khaira-outrage-as-privileged-iit-ians-use-tech-to-spy-on-sweepers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/oursay-how-india2019s-technology-is-cutting-into-corruption"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/internet-law"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/other-than-women-exploring-harassment-and-difference-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/a-talk-by-marialaura-ghidni"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-april-12-2017-komal-gupta-opposition-questions-govt-move-to-make-aadhaar-must"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/open-workshop-on-digital-empire-s-perspectives-from-asia-and-africa"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-chronicle-november-21-2018-open-street-maps-help-tackle-disaster-experts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-october-27-2013-nishant-shah-open-secrets"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/open-letter-to-siam-on-rfid%20installation-in-vehicles"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/open-letter-members-european-parliament-civil-liberties-justice-home-affairs-committee"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/huffignton-post-december-13-2019-rachna-khaira-outrage-as-privileged-iit-ians-use-tech-to-spy-on-sweepers">
    <title>Outrage As Privileged IITians Use Tech To Spy On Sweepers </title>
    <link>https://cis-india.org/internet-governance/news/huffignton-post-december-13-2019-rachna-khaira-outrage-as-privileged-iit-ians-use-tech-to-spy-on-sweepers</link>
    <description>
        &lt;b&gt;Some members of the housekeeping staff at IIT Ropar were put under round the clock surveillance during working hours for many days in February this year without their consent. IIT Ropar Director Prof S K Das has ordered a probe into the incident.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Rachna Khaira was &lt;a class="external-link" href="https://www.huffingtonpost.in/entry/outrage-as-privileged-iitians-use-tech-to-spy-on-sweepers_in_5df1bbc8e4b06a50a2e9e659"&gt;published in Huffington Post&lt;/a&gt; on December 31, 2019. Aayush Rathi was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Indian Institute of Technology (IIT), Ropar is conducting a probe into the reported tagging and round the clock electronic surveillance of some housekeeping staff members as part of an experiment run by the Technology Business Incubation Foundation (TBIF) located at the IIT campus  in February this year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;HuffPost India &lt;/em&gt;has learnt that the TBIF, a tech incubator run within IIT Ropar, signed off on the “Sweepy” project in which housekeeping staff were given wristbands and brooms secretly embedded with tracking chips, without seeking the consent of the janitorial staff, or informing IIT Ropar management.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the housekeeping staff were told the wristbands would record their pulse and heart beat, and that they should wear it while cleaning the campus, the tracking chips were used to track to assess if they were sweeping out hard-to-reach corners of the institute.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prof. Sarit Kumar Das, Director IIT Ropar  told HuffPost India that a  three member committee comprising of Prof. Bijoy H Barua, Prof. Javed Agrewala and Prof. Deepak Kashyap has been set up to look into the matter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We at the IIT Ropar respect privacy and  condemn any such violation made by any of our student or staff member,” said Prof. Das. “Before conducting any experiment on human beings, an approval has to be sought from the human ethics team constituted  in  our institution and they present a case to me after seeking a written consent from the people who would undergo the experiment. Only, after getting my approval, such an experiment can be conducted at the campus.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Sweeping surveillance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;J K Sharma, the Chief Operating Officer of TBIF, told &lt;em&gt;HuffPost India&lt;/em&gt; that his tech incubator deliberately misled the housekeeping staff about the true purpose of the wristband as they felt the housekeeping staff wouldn’t agree to wear such a device.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While elaborating more on the ‘Sweepy’ project, Sharma said that the project was based on an idea that came to the hostellers who were upset over the housekeeping staff for not cleaning their rooms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The sweepers were not working properly and despite reporting the matter several times to the authorities, they were not taking any cognisance. Perturbed, the students developed this programme in which the location of the sweeper can be recorded and monitored in a control room by a gadget tied to the sweeper’s wrist,” said Sharma.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He further added that a beacon records the activity of the sensor pasted to the broom or mop held by the sweeper and can monitor the area  and the time in which it was used. The report was produced digitally on the screen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Was a consent sought from the sweepers before tagging them?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The testing was done in a secret manner as the housekeeping staff may not have given their consent for the trial. We tried it on three sweepers and while two of them were found working dedicatedly, one was found to have missed  cleaning from few areas assigned to him,” said Sharma.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The findings were shared with the housekeeping supervisor who later directed his staff to do their duty more diligently.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The team working on the project however told &lt;em&gt;HuffPost India&lt;/em&gt; that they secured the privacy of the housekeeping staff by removing the microphone from the gadgets tied to their wrists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This technology does not have video feature and only monitors location of a moving object and is quite cheap as compared to the radio-frequency identification (RFID) technology that uses electromagnetic fields to automatically identify and track tags attached to objects.&lt;/p&gt;
&lt;blockquote class="pull-quote content-list-component" style="text-align: justify; "&gt;The testing was done in a secret manner as the housekeeping staff may not have given their consent for the trial. We tried it on three sweepers and while two of them were found working dedicatedly, one was found to have missed  cleaning from few areas assigned to himJ K Sharma, Chief Executive Officer, Technology Business Incubation Foundation, IIT Ropar&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Calling this an increasingly commonplace trend of covert spying on domestic workers without their knowledge, Ayush Rathi, Programme Officer, Centre for Internet and Society, said that the housekeeping staff was made to wear the gadget under a false pretense is telling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is a classic example of how the access to privacy is stratified along the axes of class, caste and gender. And ties in closely with a key purpose of surveillance — that of exerting control over people’s bodies to conform to the surveiller’s ideas of right and wrong,” said Rathi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He further added that in many ways, this story captures the zeitgeist of the 21st century. The is the essence of so much of what qualifies as innovation today is that they seek to find technological solutions to problems that are structural in nature.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“So, in this instance it is very evident that the objective sought to be achieved was not to merely ‘fix’ the problem of the housekeeping staff performing its duties well, but to solely hold them guilty for failing to do so,” said Rathi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An alternate, albeit more tedious, approach would have been to speak with the workers and iron out the struggles they were facing at the workplace that were preventing them from performing their job well. Any solution could only have been prepared thereafter — he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per Prof. Das, a major problem with the engineering students is that unlike medical students, 90 percent of their experiments are based on machines and not human beings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There is  too much deficiency of  the understanding of human psychology amongst engineering students. To curb this, we at the IIT have started a mandatory course on human ethics which is being taught by some of the renowned human psychology experts. Still sometimes, the violations gets reported,” said Prof. Das.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/huffignton-post-december-13-2019-rachna-khaira-outrage-as-privileged-iit-ians-use-tech-to-spy-on-sweepers'&gt;https://cis-india.org/internet-governance/news/huffignton-post-december-13-2019-rachna-khaira-outrage-as-privileged-iit-ians-use-tech-to-spy-on-sweepers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Rachna Khaira</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-12-15T05:33:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom">
    <title>Out of the Bedroom</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom</link>
    <description>
        &lt;b&gt;We have shared it with our friends. We have watched it with our lovers. We have discussed it with our children and talked about it with our partners. It is in our bedrooms, hidden in sock drawers. It is in our laptops, in a folder marked "Miscellaneous". It is in our cellphones and tablets, protected under passwords. It is the biggest reason why people have learned to clean their browsing history and cookies from their browsers. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The &lt;a class="external-link" href="http://www.indianexpress.com/news/out-of-the-bedroom/1159657/0"&gt;article by Nishant Shah was published in the Indian Express&lt;/a&gt; on August 25, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Whether we go into surreptitious shops to buy unmarked CDs or trawl through Torrent and user-generated content sites in the quest of a video, there is no denying the fact that it has become a part of our multimedia life. Even in countries like India, where consumption and distribution of pornography are punished by law, we know that pornography is rampant. With the rise of the digital technologies of easy copy and sharing, and the internet which facilitates amateur production and anonymous distribution, pornography has escaped the industrial market and become one of the most intimate and commonplace practices of the online world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In fact, if Google trend results are to be believed, Indians are among the top 10 nationalities searching for pornography daily. Even a quick look at our internet history tells us that it has all been about porn. The morphed pictures of a naked Pooja Bhatt adorned the covers of Stardust in the late 1990s, warning us that the true potential of Photoshop had been realised. The extraordinary sensation of the Delhi Public School MMS case which captured two underage youngsters in a grainy sexcapade announced the arrival of user-generated porn in a big way. The demise of Savita Bhabhi — India's first pornographic graphic novel — is still recent enough for us to remember that the history of the internet in India is book-ended by porn and censorship.&lt;br /&gt;&lt;br /&gt;Recent discussions on pornography have been catalysed by a public interest litigation requesting for a ban on internet pornography filed in April by Kamlesh Vaswani. Whether Vaswani's observations on what porn can make us do stem from his own personal epiphany or his self-appointed role as our moral compass is a discussion that merits its own special space. Similarly, a debate on the role, function, and use of pornography in a society is complex, rich and not for today.&lt;br /&gt;&lt;br /&gt;Instead, I want to focus on the pre-Web imagination of porn that Vaswani and his endorsers are trying to impose upon the rest of us. There is a common misunderstanding that all porn is the same porn, no matter what the format, medium and aesthetics of representations. Or in other words, a homogenising presumption is that erotic fiction and fantasies, pictures of naked people in a magazine, adult films produced by entertainment houses, and user-generated videos on the internet are the same kind of porn. However, as historical legal debates and public discussions have shown us, what constitutes porn is specific to the technologies that produce it. There was a time when DH Lawrence's iconic novel now taught in undergraduate university courses — Lady Chatterley's Lover — was deemed pornographic and banned in India. In more recent times, the nation was in uproar at the Choli ke peeche song from Khalnayak which eventually won awards for its lyrics and choreography.&lt;br /&gt;&lt;br /&gt;In all the controversy, there has so far been a "broadcast imagination" of how pornography gets produced, consumed and distributed. There is a very distinct separation of us versus them when it comes to pornography. They produce porn. They distribute porn. They push porn down our throats (that was probably a poor choice of words) by spamming us and buying Google adwords to infect our search results. We consume porn. And all we need to do is go and regulate, like we do with Bollywood, the central management and distribution mechanism so that the flow of pornography can be curbed. This is what I call a broadcast way of thinking, where the roles of the performers, producers, consumers and distributors of pornography are all distinct and can be regulated.&lt;br /&gt;&lt;br /&gt;However, within the murky spaces of the World Wide Web, the scenario is quite different. Internet pornography is not the same as availability of pornography on the internet. True, the digital multimedia space of sharing and peer-2-peer distribution has made the internet the largest gateway to accessing pornographic objects which are produced through commercial production houses. However, the internet is not merely a way of getting access to existing older forms of porn. The internet also produces pornography that is new, strange, unprecedented and is an essential part of the everyday experience of being digitally connected and networked into sociality.&lt;br /&gt;&lt;br /&gt;The recent controversies about the former congressman from New York, Anthony Weiner, sexting — sending inappropriate sexual messages through his cellphone — gives us some idea of what internet porn looks like. It is not just something captured on a phone-cam but interactive and collaboratively produced. Or as our own Porngate, where two cabinet ministers of the Karnataka legislative assembly were caught surfing some good old porn on their mobile devices while the legislature was in session, indicated, porn is not something confined to the privacy of our rooms. Naked flashmobs, young people experimenting with sexual identities in public, and sometimes bizarre videos of a bus-ride where the camera merely captures the banal and the everyday through a "pornographic gaze" are also a part of the digital porn landscape. The world of virtual reality and multiple online role-playing games offer simulated sexual experiences that allow for human, humanoid, and non-human avatars to engage in sexual activities in digital spaces. Peer-2-peer video chat platforms like Chatroulette, offer random encounters of the naked kind, where nothing is recorded but almost everything can be seen.&lt;br /&gt;&lt;br /&gt;The list of pornography produced by the internet — as opposed to pornography made accessible through the internet — is huge. It doesn't just hide in subcultural practices but resides on popular video-sharing sites like YouTube or Tumblr blogs. It vibrates in our cellphones as we connect to people far away from us, and pulsates on the glowing screens of our tablets as we get glimpses of random strangers and their intimate bodies and moments. An attempt to ban and censor this porn is going to be futile because it does not necessarily take the shape of a full narrative text which can be examined by others to judge its moral content. Any petition that tries to censor such activities is going to fall flat on its face because it fails to recognise that sexual expression, engagement and experimentation is a part of being human — and the ubiquitous presence of digital technologies in our life is going to make the internet a fair playground for activities which might seem pornographic in nature. In fact, trying to restrict and censor them, will only make our task of identifying harmful pornography — porn that involves minors, or hate speech or extreme acts of violence — so much more difficult because it will be pushed into the underbelly of the internet which is much larger than the searched and indexed World Wide Web.&lt;br /&gt;&lt;br /&gt;Trying to suggest that internet pornography is an appendage which can be surgically removed from everyday cyberspace is to not understand the integral part that pornography and sexual interactions play in the development and the unfolding of the internet. The more fruitful efforts would be to try and perhaps create a guideline that helps promote healthy sexual interaction and alerts us to undesirable sexual expressions which reinforce misogyny, violence, hate speech and non-consensual invasions of bodies and privacy. This blanket ban on trying to sweep all internet porn under a carpet is not going to work — it will just show up as a big bump, in places we had not foreseen.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom'&gt;https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-09-06T08:32:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/oursay-how-india2019s-technology-is-cutting-into-corruption">
    <title>OurSay: how India’s technology is cutting into corruption</title>
    <link>https://cis-india.org/news/oursay-how-india2019s-technology-is-cutting-into-corruption</link>
    <description>
        &lt;b&gt;In the world’s largest democracy, corruption has long been part of the system of governance. However, transformative new technologies are playing an exciting and powerful role in citizen engagement, good governance and in the mobilisation of the masses for social action.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.crikey.com.au/2012/02/17/oursay-how-indias-technology-is-cutting-into-corruption/"&gt;The blog post by by Gautam Raju, co-founder and creative director, OurSay Australia was published in Crikey on 17 February 2012&lt;/a&gt;. Nishant Shah has been quoted in it.&lt;/p&gt;
&lt;p&gt;Since the beginnings of the Indian independence movement, technology has been a central element to citizen engagement. According to Nishant Shah, from the Centre of Internet and Society, print and cinema reflected the views of citizens and informed them of the visions and changes that the country was going through. Today, India has one of the largest young and connected populations in the world.&lt;/p&gt;
&lt;p&gt;Fifty per cent of the population is under the age of 25 and there are about 880 million mobile phone subscribers. New technologies are shifting the way that citizens interact with government and mobilise around issues they care about.&lt;/p&gt;
&lt;p&gt;Based in a cramped office in New Delhi, the group Gram Vaani community media are developing tools to make governments more accountable. This group of young people with impressive resumes and big dreams form part of the new generation of Indian social entrepreneurs calling for change.&lt;/p&gt;
&lt;p&gt;One of their most revolutionary products is a citizen news telephone hotline. The initiative is having a huge impact with recorded reports of government officials being fined for corruption, school teachers being paid overdue salaries and medical resources being sent to remote areas to fight malaria outbreaks. It allows callers to report incidents or problems from their regions, which are then transcribed and made available through a website for the media, government and general public.&lt;/p&gt;
&lt;p&gt;This technology is particularly effective in remote areas, where Gram Vaani partners with local NGOs who empower local communities to use the tool. The service, which is expanding across the Indian state of Jharkhand, clocked 40,000 calls during the first month. Roshan Nair, from Gram Vaani, said: “NGOs have taken up the entire responsibility of informing local residents about our hotline, verifying information, and training new users. We have supported them, but they continue to do good work at great personal risk.”&amp;nbsp; The technology is also currently deployed in Afghanistan with plans to expand to Pakistan and Iraq.&lt;/p&gt;
&lt;p&gt;During my most recent visit in January, 74-year-old anti-corruption campaigner Anna Hazare and the India Against Corruption (IAC) movement dominated the media. The movement has been fighting for the introduction of the Lokpal Bill, which would create an independent ombudsman with the power to investigate corruption allegations from citizens. The movement launched a successful social media campaign, which built an image of Hazare as the 21st century Gandhi.&lt;/p&gt;
&lt;p&gt;Social networking websites such as Facebook and Twitter were used as organising tools for protests and when Hazare was arrested, his team released YouTube videos of him in jail to rally supporters. Their campaign was incredibly successful, mobilising thousands to support passing of the legislation.&lt;/p&gt;
&lt;p&gt;According to a 2011 report released by Facebook, Anna Hazare and the Lokpal Bill were the most mentioned topics in Indian status updates, a sign that Indians are increasingly using the internet to share and debate political events.&lt;/p&gt;
&lt;p&gt;Online movements such as the IAC are spreading through Indian urban areas with online campaigns on issues of violence, the environment and the protection of women are gaining momentum and political leverage. Increasing tension from the government around internet censorship and with more organisations and citizens harnessing the power of the internet and mobile phones for social action creates a very interesting space to watch in 2012.&lt;/p&gt;
&lt;p&gt;Another powerful&amp;nbsp; governance project Ipaidabribe.com is the world’s largest crowd-sourced database on corruption, with more than 18,000 acts of corruption registered. Developed by NGO Janaagraha, the website aims to tackle corruption by allowing citizens to log corrupt acts that are then used to lobby for better governance systems, law enforcement and regulation. A reporting tool on the website allows the public to view detailed analytics on where bribes are made, to which government department and their total costs to the public.&lt;/p&gt;
&lt;p&gt;The Transport Department of Karnataka was frequently reported for bribes on the website, which led to the Public Transport Commissioner inviting Janaagraha to identify procedures that would help foster transparency and accountability in their bureaucratic processes. The Karnataka state government has since agreed to put posters promoting the website in all government offices. The technology is currently deployed in Kenya with Janaagraha stating that they are in talks with 15 countries.&lt;/p&gt;
&lt;p&gt;India is booming; changing at a rate the country has never seen before. Despite the increasing use of technology by organisations and social movements, India still has a huge challenge in bridging the digital divide. Despite the powerful examples provided, social action and citizen engagement movements largely remain concentrated in urban, metropolitan settings, and often only engage the middle class. According to Mr Shah, from the Centre of Internet and Society, “there are innovations which are allowing people with cell phones in rural and remote India to be better connected, but there is no substantial data that actually proves that it fosters citizen engagement”.&lt;/p&gt;
&lt;p&gt;As organisations such as Gram Vaani and Janaagraha begin to build more tools to foster citizen engagement and hold governments accountable, it is going to be incredibly fascinating to not only observe their future impact, but also see how technologies will be developed and spread to rural areas.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Gautam Raju travelled to India in January as part of an OurSay research trip&lt;/em&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/oursay-how-india2019s-technology-is-cutting-into-corruption'&gt;https://cis-india.org/news/oursay-how-india2019s-technology-is-cutting-into-corruption&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-02-17T02:40:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/internet-law">
    <title>Our Internet and the Law</title>
    <link>https://cis-india.org/internet-governance/internet-law</link>
    <description>
        &lt;b&gt;Nishant Shah was interviewed by the BBC Channel 5 (Radio) for its Outriders section. Jamillah Knowles reports this through this blog post published  by BBC Radio on 24 January 2012.&lt;/b&gt;
        
&lt;p&gt;Hello Outriders!&lt;/p&gt;
&lt;p&gt;This week on the &lt;a class="external-link" href="http://www.bbc.co.uk/podcasts/series/pods"&gt;podcast&lt;/a&gt; we look at some of the problems netizens are facing when it comes to access and sharing online. SOPA, the stop online piracy act and PIPA - protect IP bills have been making headlines from the United States, where the bills were designed and all over the web where protesters showed that they did not want this sort of legislation to be passed.&lt;/p&gt;
&lt;p&gt;It's a tricky topic as there are many protesters raising their voices against the laws and there are plenty of people who support these ideas too.&lt;/p&gt;
&lt;h3&gt;Indian internet&lt;/h3&gt;
&lt;p&gt;Along with these headlines about legislation in America, there are many other places around the world that are debating how best to manage a population that has an increasing presence on the internet.&lt;/p&gt;
&lt;p&gt;In India, a court case is continuing that may affect how social networking websites work. Not in relation to copyright material, but as a reaction to offensive content being spread and shared.&lt;br /&gt;&lt;br /&gt;So, what do they mean by offensive content and who are the big names in this case?&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_copy2_of_copy_of_nishant.jpg/image_preview" alt="nishant" class="image-inline image-inline" title="nishant" /&gt;&lt;/td&gt;
&lt;td&gt;Friend of Outriders, Nishant Shah, is the Co-Founder and director of research at the Bangalore based Centre for Internet and Society, he explained the case and more about the effects of a possible outcome. &lt;br /&gt;&lt;br /&gt;Friend of Outriders, Nishant Shah, is the Co-Founder and director of research at the Bangalore based Centre for Internet and Society, he explained the case and more about the effects of a possible outcome. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Last week also saw a huge story of the web as content sharing website Megaupload was taken down and the site's owners were&lt;a class="external-link" href="http://www.bbc.co.uk/news/technology-16642369"&gt; charged with copyright violation&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As a response, the loose network of hackers and activists known as Anonymous activated their own &lt;a class="external-link" href="http://www.bbc.co.uk/news/technology-16646023"&gt;take down campaign&lt;/a&gt;, targeting the Department of Justice, the FBI and the Motion Picture Association of America.&lt;/p&gt;
&lt;h3&gt;Upload down&lt;/h3&gt;
&lt;p&gt;Many users of the MegaUpload site watched countless hours of video posted by other people with accounts on the site, copyright or otherwise, but the shut down does not just mean that people are no longer able to watch videos, it also means that people who had put files on that site, are currently unable to access them.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/jay66.jpg/image_preview" alt="jay" class="image-inline image-inline" title="jay" /&gt;&lt;/td&gt;
&lt;td&gt;One such customer is Jay Springett, who is a technology consultant, photographer and musician. I asked him how he came to use the site and if he had heard anything about getting his files back.&lt;br /&gt;&lt;br /&gt;Well, we hope that Jay does get his raw files back and I grateful to him for talking to us about his experience - it's good to have a reminder about our information and files online. Take care of what you own and think twice about the reliability of the cloud. Though you may never be in this situation - and we hope this is the case, it's always a very good idea to keep copies of your own files, you never know what might be ahead as the internet changes.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Well, thanks to our guests as ever and of course you too can share your internet adventures or experiments with electrical things. Drop me a line at outriders at bbc dot co dot uk, tweet at me on Twitter where we are &lt;a class="external-link" href="https://twitter.com/#!/BBC_Outriders"&gt;@BBC_Outriders&lt;/a&gt; or search for &lt;a class="external-link" href="https://www.facebook.com/pages/Outriders/130648036946411"&gt;Outriders on Facebook&lt;/a&gt; and &lt;a class="external-link" href="https://plus.google.com/u/0/103404503902029130105/up/start/"&gt;Google+&lt;/a&gt; to add us to your feed.&lt;/p&gt;
&lt;p&gt;Until next week!&lt;br /&gt;~ Jamillah&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/podcast-bbc" class="internal-link" title="Podcast of Nishant Shah's Interview by the BBC"&gt;Listen the Podcast here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.bbc.co.uk/blogs/outriders/2012/01/our_internet_and_the_law.shtml"&gt;The original blog post was published by BBC Radio&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/internet-law'&gt;https://cis-india.org/internet-governance/internet-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-26T09:28:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/other-than-women-exploring-harassment-and-difference-online">
    <title>Other Than Women: Exploring Harassment and Difference Online</title>
    <link>https://cis-india.org/internet-governance/news/other-than-women-exploring-harassment-and-difference-online</link>
    <description>
        &lt;b&gt;A satellite session at RightsCon in Brussels is being organized by the Tactical Technology Collective on March 28, 2017. Rohini Lakshané is a speaker at this event.  &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Tactical Tech is interested in the problem of online harassment as a  barrier to political participation in quantified societies, and in terms  of the harm it causes those targeted. We have been working to customise  tactics of resistance and support to communities/individuals who are  working online and are exposed to, or are at risk of, harassment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This  Satellite Session at Rightscon is fashioned as an intervention into  ongoing advocacy, research, and practical support efforts, and seeks to  interrogate a wide range of possible framings of (as well as responses  to) online harassment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For more info, &lt;a class="external-link" href="https://tacticaltech.org/projects/other-women-exploring-harassment-and-difference-online"&gt;click here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/other-than-women-exploring-harassment-and-difference-online'&gt;https://cis-india.org/internet-governance/news/other-than-women-exploring-harassment-and-difference-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-03-27T16:11:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/a-talk-by-marialaura-ghidni">
    <title>Or-bits.com — A Talk by Marialaura Ghidini</title>
    <link>https://cis-india.org/internet-governance/events/a-talk-by-marialaura-ghidni</link>
    <description>
        &lt;b&gt;On Friday, April 19, 2013, at the Centre for Internet and Society,  Marialaura Ghidini will give a talk about the creation and activities of or-bits.com, a web-based curatorial platform that she founded in 2009.

 &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Or-bits.com is devoted to supporting and developing practices, critical dialogues and audience engagement around artistic production, display and distribution online. Through presenting online group exhibitions and critical writing on its blog, the development of offsite gallery projects, print publishing and workshops, or-bits.com aims to instigate an exploration of the phenomena related to the spread and simplification of web-based technology across disciplines. It aims to propagate a model of artistic work that uses and reflects on the web as a language and a medium of production, display and distribution of contemporary art, both online and offline.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Marialaura's talk will then open up to present some issues related to  curatorial/artistic work online and its relationship with offline  activities of production, display and distribution in order to trigger  further discussion in the form of a Q&amp;amp;A session.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/CISImageTalk.png" alt="Orbit.com" class="image-inline" title="Orbit.com" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;Marialaura Ghidni&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Marialaura Ghidini is a curator, writer and researcher based in the UK. She is founder director of &lt;a class="external-link" href="http://www.or-bits.com/"&gt;or-bits.com&lt;/a&gt; and an AHRC-funded PhD researcher with &lt;a href="http://www.crumbweb.org/"&gt;CRUMB&lt;/a&gt; at the University of Sunderland, where she explores the field of online curation with a specific interest in the theory and practice of artists and curators operating through web-based platforms and in-between online and offline dimensions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She has been in India since January as an International Research Fellow at SARAI/CSDS in Delhi and now as a curatorial resident with T.A.J. Residency &amp;amp; SKE Projects in Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also see &lt;a class="external-link" href="http://marialaura-ghidini.hotglue.me"&gt;http://marialaura-ghidini.hotglue.me&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/a-talk-by-marialaura-ghidni'&gt;https://cis-india.org/internet-governance/events/a-talk-by-marialaura-ghidni&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-16T14:34:36Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-april-12-2017-komal-gupta-opposition-questions-govt-move-to-make-aadhaar-must">
    <title>Opposition questions govt move to make Aadhaar must</title>
    <link>https://cis-india.org/internet-governance/news/livemint-april-12-2017-komal-gupta-opposition-questions-govt-move-to-make-aadhaar-must</link>
    <description>
        &lt;b&gt;Congress leader Jairam Ramesh claimed that the Aadhaar system was becoming an instrument of social exclusion rather than one of identity. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Komal Gupta was &lt;a class="external-link" href="http://www.livemint.com/Politics/nwqpFParHM0Ym8F4Dwt3yL/Rajya-Sabha-debates-Aadhaar-Opposition-points-to-flaws.html"&gt;published in Livemint&lt;/a&gt; on April 11, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Rajya Sabha on Monday witnessed a lively debate on Aadhaar, with the opposition questioning the government’s move to make the 12-digit unique identification number mandatory for a host of welfare benefits.&lt;br /&gt;&lt;br /&gt;Congress leader Jairam Ramesh claimed that the Aadhaar system was becoming an instrument of social exclusion rather than one of identity.&lt;br /&gt;&lt;br /&gt;“My major concern is implementation, how Aadhaar is being used to exclude people to avail benefits of the schemes which have been designed for them…If you need to apply to avail benefits, it’s as good as mandatory,” said Ramesh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The former cabinet minister argued that over 25% of the population will stand excluded.&lt;br /&gt;&lt;br /&gt;“The Rs50,000 crore savings due to Aadhaar linkage as given by the government is highly questionable,” he said, adding that according to Comptroller and Auditor General (CAG) reports, 92% of the savings on domestic gas subsidies is not on account of Aadhaar implementation or direct benefit transfer. “Instead, it is because of the fall in international oil prices,” Ramesh argued.&lt;br /&gt;&lt;br /&gt;Trinamool Congress member Derek O’Brien said that for manual labourers, biometric identification does not always match and that can deprive them of welfare.&lt;br /&gt;&lt;br /&gt;He gave the example of Andhra Pradesh, where almost half the 85,000 ration card holders in 2014 were unable to get subsidized foodgrains due to faulty point of sale machines and biometrics not matching.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;K.T.S Tulsi, member of Parliament and senior Supreme Court advocate, said, “Not in my whole career have I come across a greater mutilation of a statutory provision than what has taken place in the case of Aadhaar.” He said Section 29 of the Aadhaar Act doesn’t permit data stored with the Unique Identification Authority of India (UIDAI) to be shared with anyone but a provision was later made for voluntary agreement to allow the sharing of data.&lt;br /&gt;&lt;br /&gt;IT and law minister Ravi Shankar Prasad said, “No religion, income, medical history, ethnicity or education is asked in Aadhaar. Even email ID and phone number is optional.”&lt;br /&gt;&lt;br /&gt;“The right of privacy of individuals must be respected. The privacy of the data cannot be breached by us except in the case of national security,” Prasad added.&lt;br /&gt;&lt;br /&gt;He claimed that the government has been blacklisting operators that share data from the Aadhaar system. It has blacklisted 34,000 operators, and has taken action against 1,000 of them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prasad also said that UIDAI will be accountable to the Parliament.&lt;br /&gt;&lt;br /&gt;Expressing concern on mandating the use of Aadhaar for different services, Pranesh Prakash, Policy director of the Centre for Internet and Society, said, “As an enabler, people would want to have Aadhaar. But when it is made mandatory, it becomes more of a disenabler instead of an enabler.”&lt;br /&gt;&lt;br /&gt;“With the move towards a digital economy, setting up of a data protection authority as recommended by the Shah committee is important along with mass surveillance and greater accountability from the government,” he added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-april-12-2017-komal-gupta-opposition-questions-govt-move-to-make-aadhaar-must'&gt;https://cis-india.org/internet-governance/news/livemint-april-12-2017-komal-gupta-opposition-questions-govt-move-to-make-aadhaar-must&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-12T14:19:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now">
    <title>OPINION | Data is New Oil and Human Mind the New Battlefield. India Must Wake Up Now</title>
    <link>https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now</link>
    <description>
        &lt;b&gt;In information warfare, the battlespace is the human mind. This is where the privacy of an individual intersects with national security. Fighting this battle will require a new paradigm in thought and action.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Lt. General (Retd.) D. S. Hooda was published by &lt;a class="external-link" href="http://www.news18.com/news/india/opinion-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now-1573747.html"&gt;News18.com&lt;/a&gt; on November 11, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;A few days ago, the Army Headquarters took out a public advisory  warning about a “deliberate misinformation campaign being launched by  vested interests some of which is being initiated from countries  bordering our nation.” This is an acknowledgment of the use of social  media for what is today considered the most dominant form of warfare —  ‘information warfare’. It has been extensively used by our adversaries  in Jammu and Kashmir to show the government and security forces in poor  light.&lt;br /&gt; &lt;br /&gt; Deception, propaganda and misinformation have always been a part of  warfare but what is different today is that the tools of information  warfare have acquired a new dimension. An integration of massive amounts  of data with Artificial Intelligence (AI) has given a significant  weapon in the hands of information warriors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The cost of saving data has been plummeting, with the cost being halved  about every 15 months. Now more and more data about individuals is being  saved, both by corporations and governments. In his book, &lt;i&gt;Data and Goliath&lt;/i&gt;,  Bruce Schneier writes that worldwide, Google has the capacity to store  15 exabytes of data. To put it in context, one exabyte is 500 billion  pages of text. Bruce also quotes the case of Max Schrems, an Austrian  law student, who in 2011 demanded all his personal data from Facebook.  After a two year legal battle, Facebook gave him a CD with 1200 pages of  PDF. This is how much Facebook knows about you, and it does not forget  because it is all saved.&lt;br /&gt; &lt;br /&gt; All this big data would be useless unless it can be utilised for  decision making and this is where advances in AI have provided the  breakthrough. Smart machines mine the data and detect trends, patterns,  habits, ideology and desires. These personal characteristics of  individuals are being used by corporations to send targeted  advertisements to influence commercial decisions.&lt;br /&gt; &lt;br /&gt; The same technique is used in information warfare. On November 1, the US  House Intelligence Committee released Facebook advertisements bought by  Russian operatives to influence the 2016 elections. Washington Post  wrote, “The ads made visceral appeals to voters concerned about illegal  immigration...African American political activism, rising prominence of  Muslims” among other issues. Senator Angus King said, “The strategy is  to take a crack in our society and turn it into a chasm.”&lt;br /&gt; &lt;br /&gt; Data is the new oil and that is exactly how it is being traded and sold.  In the absence of any legal provisions, companies and ‘data brokers’  are sharing and selling personal data. Can this personal data find its  way to a hostile government? Last month, the US Army brought out that  their troops in the Baltic had reported instances of cell phone hacking.  However, more worrisome was the fact the hackers knew personal details  of the soldiers. Direct threats against family members of the military  can have a negative psychological impact during conflict.&lt;br /&gt; &lt;br /&gt; India has its share of political, social and ethnic differences, just as  in many societies. In recent times these differences have been  magnified as nationalism has taken centre stage. It is difficult to  imagine why these fault lines will not be exploited by inimical forces  as India enters the election mode in 2018. Looking at examples from the  US and French elections, Brexit and the cyber battle during the  Catalonia referendum, I think we have no option but to be prepared.&lt;br /&gt; &lt;br /&gt; The preparation for this war (and I do not use this word lightly) lies in three spheres — concepts, practices and structures.&lt;br /&gt; &lt;br /&gt; Conceptually, our current shortcoming is that we are viewing this issue  through a technical prism rather than the broader spectrum of  information warfare. CERT and NTRO can technically protect our critical  infrastructure but they do not have an equal understanding of the human  dimension, which is more strategic than scientific. The Americans, world  leaders in information technology, have not been able to prevent a  perceived subversion of their democratic process.&lt;br /&gt; &lt;br /&gt; Our practices need to improve. The security of personal data is a major  concern. The Supreme Court has declared privacy as a fundamental right,  but there are no privacy laws to back it up. Even data stored in India  is not safe as the owners of our data are the giant technology  companies, mostly based in the US and not under our legal control. In  September 2017, it was reported that Google has quietly stopped  challenging most search warrants from US judges in which the data  requested is stored on overseas servers.&lt;br /&gt; &lt;br /&gt; A May 2017, report by the Centre for Internet and Society estimated that  135 million Aadhaar numbers could have been leaked from official  portals. This was not due to a security breach but due to poor privacy  practices.&lt;br /&gt; &lt;br /&gt; Our continued reliance on foreign hardware and software is extremely  worrisome. There was clear evidence that Cisco systems had been  back-doored by the American National Security Agency but the Indian  military continues to procure hardware from Cisco. There is a similar  story with Chinese equipment in our telecommunication and power sectors.  An attempt to introduce an Indian operating system to replace Windows  in the Army has been mired in controversy.&lt;br /&gt; &lt;br /&gt; In case of a targeted cyber attack on India, there is little we can do  except issue advisories. The solutions will have to come from foreign  manufactures or developers whose equipment we are using. There is an  urgent need to give a fillip to developing indigenous solutions for our  critical infrastructure.&lt;br /&gt; &lt;br /&gt; And finally, structures. An organisation to execute information warfare  would have to be led by the Ministry of Defence, because the threat is  mainly from external players. It would be a combination of military  planners, specialists from the field of intelligence, government  agencies, media and cyber warfare experts. Such an organisation does not  currently exist, though the raising of the Cyber Command could fill  this gap.&lt;br /&gt; &lt;br /&gt; In information warfare, the battlespace is the human mind. This is where  the privacy of an individual intersects with national security.  Fighting this battle will require a new paradigm in thought and action.&lt;br /&gt; &lt;br /&gt; &lt;i&gt;&lt;b&gt;(The author is former Northern Commander, Indian Army, under  whose leadership India carried out surgical strikes against Pakistan in  2016. Views are personal.)&lt;/b&gt;&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now'&gt;https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-26T03:28:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/open-workshop-on-digital-empire-s-perspectives-from-asia-and-africa">
    <title>Open Workshop on 'Digital Empire(s): Perspectives from Asia and Africa</title>
    <link>https://cis-india.org/internet-governance/news/open-workshop-on-digital-empire-s-perspectives-from-asia-and-africa</link>
    <description>
        &lt;b&gt;Monish will be a part of a collaborative network which is organising an open workshop on 'Digital Empire(s): Perspectives from Asia and Africa', on December 4, 2019 at Centre de Sciences Humaines (CSH) Delhi.&lt;/b&gt;
        &lt;p&gt;Click to view the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/digital-empires.pdf"&gt;agenda&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/open-workshop-on-digital-empire-s-perspectives-from-asia-and-africa'&gt;https://cis-india.org/internet-governance/news/open-workshop-on-digital-empire-s-perspectives-from-asia-and-africa&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digitisation</dc:subject>
    

   <dc:date>2019-11-13T14:36:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-chronicle-november-21-2018-open-street-maps-help-tackle-disaster-experts">
    <title>Open Street Maps help tackle disasters: Experts</title>
    <link>https://cis-india.org/internet-governance/news/deccan-chronicle-november-21-2018-open-street-maps-help-tackle-disaster-experts</link>
    <description>
        &lt;b&gt;Speakers showed how participatory maps were used to bring to light lapses in delivery of civic services.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published by &lt;a class="external-link" href="https://www.deccanchronicle.com/nation/current-affairs/211118/open-street-maps-help-tackle-disasters-experts.html"&gt;Deccan Chronicle&lt;/a&gt; on November 21, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Maps come in handy when you have lost your way, but they can also be great tools during natural disasters, like the recent, unprecedented floods in Kerala. During the disaster, 2,200 mapping volunteers from around the world added 4,00,000 data points to the Open Street Map, helping the government reach relief fast to the affected, said Manoj Karingamadathil.&lt;br /&gt;&lt;br /&gt;On Tuesday, over 300 mappers from 12 countries got together in the city to discuss and present innovative solutions to mobilise, sustain and grow more inclusive open mapping communities. The event, hosted at the Indian Institute of Management-Bangalore, deliberated on how mapping is being used for disaster management in Asia, the role of local languages in tagging places, methods to sustain the community and others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speakers showed how participatory maps were used to bring to light lapses in delivery of civic services. The maps, used both in rural and urban areas, brought out issues at the neighbourhood, city, state and national levels. &lt;br /&gt;&lt;br /&gt;For instance, Anindita Nayak explored safety in public spaces in Bengaluru by mapping lack of streetlights. Ankit Bhargava presented how Open Street Maps led to a participatory design process to create a very detailed and informative public map of Cubbon Park. Jaisen Nedumpala, a panchayat officer from Koorachundu in Kerala, used open source tools and community participation to fix land record boundaries for the village. Harry Mahardhika Machmud shared his experience on how citizen-led surveys in Indonesian cities helped the government prepare disaster response maps.&lt;br /&gt;&lt;br /&gt;Dr Anita Patil-Deshmukh, the first keynote speaker, said that official maps did not account for the majority of under-served communities in Mumbai. These people felt empowered through community-based mapping and it helped them engage better with stakeholders for effective delivery of services. &lt;br /&gt;&lt;br /&gt;Other speakers supported Dr Patil-Deshmukh's call to create more capacity within grassroots communities. Airin Akter stressed on the importance of maps in local languages for effective dissemination of public information in Bangladesh. &lt;br /&gt;&lt;br /&gt;Pradip Khatiwada spoke about the need to create innovative training and internship programmes, digital activism, and demonstrated how maps have been used successfully in Nepal. Siddharth Hande, the closing keynote speaker, affirmed the need to empower communities through data-driven initiatives in his engagement with cyclical waste management economies.&lt;br /&gt;&lt;br /&gt;Jointly organised by the Centre for Public Policy and the Centre for Software and IT Management (CSITM) of IIMB, Open Street Map (OSM) India, and Centre for Internet and Society, the inauguration of the event itself added meaning to the purpose as Prof. Abhoy K. Ojha, Dean of Academic Programmes at IIMB, contributed to the OSM project by adding the name of the building where the conference was hosted.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-chronicle-november-21-2018-open-street-maps-help-tackle-disaster-experts'&gt;https://cis-india.org/internet-governance/news/deccan-chronicle-november-21-2018-open-street-maps-help-tackle-disaster-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-11-28T01:58:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly">
    <title>Open standards can disrupt Facebook’s messaging monopoly</title>
    <link>https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly</link>
    <description>
        &lt;b&gt;Facebook made the news last week when The New York Times’ Mike Isaac reported that CEO Mark Zuckerberg intended to integrate the company’s three messaging platforms: WhatsApp, Messenger, and Instagram.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Abhimanyu Ghoshal was &lt;a class="external-link" href="https://thenextweb.com/facebook/2019/01/28/open-standards-can-help-disrupt-facebook-messaging-monopoly/"&gt;published in The Next Web&lt;/a&gt; on January 30, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;We don’t have all the details of exactly how this will work. The plan is still in its early stages, and there are plenty of moving parts – legal and technical – to take care of. What’s clear is this: with more than 2.6 billion users between the platforms, this is set to impact a lot of people if it goes through – and potentially many hundreds of millions more in the following years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the specifics of the move are yet to be revealed, a move like  this could help Facebook create more detailed profiles of its users.  Even if the company encrypts communications end-to-end as it seemed to  imply in its responses to NYT, it could still leverage communications  metadata to target ads more accurately than you might think.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here’s an example: without looking at your messages (because they’re  encrypted), Facebook could gather data on who you chat with most often  and for how long, later correlating that with the recipients’ interests  from Instagram. It could then show you ads for gifts that contact may  like, right around the time their birthday comes up.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Integrating these platforms could also bolster Facebook’s efforts to  keep users tied into its ecosystem. That’s problematic, when you  consider the larger your network of contacts is on the company’s  services, the harder it is for you to leave them and use an alternative  you’re more comfortable with.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Is there a way out? &lt;a href="https://www.linkedin.com/in/praneshprakash/" rel="nofollow noopener" target="_blank"&gt;Pranesh Prakash&lt;/a&gt; – a Fellow at the &lt;a href="https://cis-india.org/" rel="nofollow noopener" target="_blank"&gt;Center for Internet and Society&lt;/a&gt;, as well as a Fellow at the &lt;a href="https://www.newamerica.org/" rel="nofollow noopener" target="_blank"&gt;New America&lt;/a&gt; think tank – believes that the answer lies not in breaking up Facebook  over privacy laws, but in competition, and regulators at the government  level should demand Facebook use open standards for its messaging  platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash explained that standards like SMTP and IMAP, which are used  for facilitating email exchanges, allow for interoperability between  services run by different organizations. They also let users choose the  client apps they prefer for accessing their inboxes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook’s messaging services, meanwhile, run on closed standards and don’t play nice with platforms created by third parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This results in people becoming trapped in Facebook’s ecosystem: even  if you’re opposed to using the company’s products, you can’t  realistically ditch them all because your friends and family are all  using its platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case you’re worried about open-source protocols not being up to  the task of serving massive networks like the ones Facebook operates,  consider the fact that &lt;a href="https://mycodeplex.wordpress.com/2016/03/08/inside-of-whatsapp-part-1/" rel="nofollow noopener" target="_blank"&gt;WhatsApp runs on FunXMPP&lt;/a&gt;, a customized version of &lt;a href="https://xmpp.org/" rel="nofollow noopener" target="_blank"&gt;the open XMPP set of standards&lt;/a&gt; that anyone can use for their own projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If Facebook is doing the difficult legwork of unifying the underlying  technical infrastructure of its three apps, Prakash argues, &lt;a href="https://www.hindustantimes.com/analysis/privacy-laws-cannot-make-facebeook-and-google-accountable/story-Yne6DwUoGb0eO9mRxaDTaL.html" rel="nofollow noopener" target="_blank"&gt;it’d do well to make its new protocol public and open-source&lt;/a&gt;.  That way, anyone should be able to use the company’s services to reach  people just the same as when they choose to use a service created by a  separate entity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash said that the only way diminishing Facebook’s power in this  regard is to open up access to its network of users. In doing so, it  will see people stick with the company’s services because they like  using them, not because they can’t stay in touch with their contacts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Questions surrounding Facebook’s monopolistic domination of the  messaging space will inevitably crop up when the company implements  Zuckerberg’s plan, and this sounds like a healthy way to tackle those  issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Naturally, that seems like it’d hurt Facebook’s bottom line – but  it’s important to start thinking about realistic measures to comply with  antitrust law – or risk being booted from countries that don’t  appreciate the way the company does business.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly'&gt;https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-02T01:59:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame">
    <title>Open sesame</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame</link>
    <description>
        &lt;b&gt;The government’s email is shockingly vulnerable.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.thehindubusinessline.com/opinion/open-sesame/article7678142.ece"&gt;Hindu&lt;/a&gt; on September 22, 2015. CIS research on private email accounts is mentioned.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;As the Centre moves towards smart cities and a Digital  India, some critics have cited the country’s increased vulnerability to  cyber attacks. To be sure, cyber threat groups could disrupt our  infrastructure by taking control of many systems. Such attacks could be  quite damaging. Yes, they are rare today, but are much more likely to  arise in conjunction with traditional armed conflicts. Cyber criminal  groups target Indian organisations on a daily basis.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Almost  two years ago, the IT minister’s office triggered national outrage when  it used a public email service for official communication. There was  much hand-wringing about security practices in a ministry responsible  for setting the technology direction (secure email policy) for the  country. Then in December 2013, the Centre for Internet and Society  revealed that up to 90 per cent of Indian government officials used  private email accounts for professional purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A big deal&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Between  then and now, we’ve read about a new email policy and revelations of  several cyber attacks on government officials. And FireEye revealed a  decade-long cyber espionage operation by a group we call ‘APT30’, which  is likely to be sponsored by China. How did they break in? By sending  targeted ‘spear-phish’ emails with malware attached.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Email  doesn’t sound like a big deal. Most of us have been using it for over a  decade, and think we know how to use it right. But when you’re in a  position of authority with access to sensitive information, you  shouldn’t leave it to chance.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Today, state-sponsored  attackers craft these spear-phishing emails after considerable  research. APT30 carefully researched their targets and crafted mails  which would appear extremely relevant, with interesting content. The  moment a victim would open an attachment, an exploit would secretly  install a backdoor. Through that backdoor, groups can compromise the  employee’s entire network and extricate sensitive data. Groups bent on  destruction can deploy malware to destroy the data. They could also take  control of systems managing infrastructure or industrial processes and  create havoc.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Spear-phishing has an open rate of 70  per cent, while regular mass emails had an open rate of just 3 per cent.  Email is the front- door for today’s threat groups. That’s why  governments around the world are improving the security of their email  systems to fend off these spear-phishing threats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Public concerns&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;When  government employees use webmail for official business, they trade away  their security for convenience. The emails they receive are no longer  screened by cyber security solutions, which detect advanced targeted  email attacks before they reach the inbox. In addition, because people  typically retrieve their webmail in a browser, attackers have a larger  attack surface to exploit when carrying out their attacks. For example,  attackers can coax victims to click on a link to a website, which  delivers an exploit via Adobe Flash.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Webmail opens  the door to threats that would otherwise have been intercepted. When our  government employees use webmail for official business, they leave the  front door wide open to threats. One of the best steps we can take  towards improving our government’s cyber security defences is abandoning  public email services.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;i&gt;The writer is a software architect at the cyber security firm FireEye&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame'&gt;https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-25T01:31:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-october-27-2013-nishant-shah-open-secrets">
    <title> Open Secrets</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-october-27-2013-nishant-shah-open-secrets</link>
    <description>
        &lt;b&gt;We need to think of privacy in different ways — not only as something that happens between people, but between you and corporations.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dr. Nishant Shah's article was originally &lt;a class="external-link" href="http://www.indianexpress.com/news/open-secrets/1187814/0"&gt;published in the Indian Express&lt;/a&gt; on October 27.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;If you are a part of any social networking site, then you know that privacy is something to be concerned about. We put out an incredible amount of personal data on our social networks. Pictures with family and friends, intimate details about our ongoing drama with the people around us, medical histories, and our spur-of-the-moment thoughts of what inspires, peeves or aggravates us. In all this, the more savvy use filters and group settings which give them some semblance of control about who has access to this information and what can be done with it.&lt;br /&gt;&lt;br /&gt;But it is now a given that in the world of the worldwide web, privacy is more or less a thing of the past. Data transmits. Information flows. What you share with one person immediately gets shared with thousands. Even though you might make your stuff accessible to a handful of people, the social networks work through a "friend-of-a-friend effect", where others in your networks use, like, share and spread your information around so that there is an almost unimaginable audience to the private drama of our lives. Which is why there is a need for a growing conversation about what being private in the world of big data means.&lt;br /&gt;&lt;br /&gt;Privacy is about having control over the data and some ownership about who can use it and for what purpose. Interface designs and filters that allow limited access help this process. The legal structures are catching up with regulations that control what individuals, entities, governments and corporations can do with the data we provide. However, most people think of privacy as a private matter. Just look at last month's conversations around Facebook's new privacy policies, which no longer allow you to hide. If you are on Facebook, people can find you using all kinds of parameters — meta data — other than just your name. They might find you through hobbies, pages you like, schools you have studied in, etc. This can be scary because it means that based on particular activities, people can profile and follow you. Especially for people in precarious communities — the young adults, queer people who might not be ready to be out of the closet, women who already face increased misogyny and hostility online. This means they are officially entering a stalkers' paradise.&lt;br /&gt;&lt;br /&gt;While those concerns need to be addressed, there is something that seems to be missing from the debate. Almost all of these privacy alarms are about what people can do to people. That we need to protect ourselves from people, when we are in public — digital or otherwise. We are reminded that the world is filled with predators, crackers and scamsters, who can prey on our personal data and create physical, emotional, social and financial havoc. But this is the world we already know. We live in a universe filled with perils and we have learned and coped with the fact that we navigate through dangerous spaces, times and people all the time. The digital is no different than the physical when it comes to the possible perils that we live in, though digital might facilitate some kinds of behaviour and make data-stalking easier.&lt;br /&gt;&lt;br /&gt;What is different with the individualised, just-for-you crafted world of the social web is that there are things which are not human, which are interacting with you in unprecedented ways. Make a list of the top five people you interact with on Facebook. And you will be wrong. Because the thing that you interact with the most on Facebook, is Facebook. Look at the amount of chatter it creates — How are you feeling today?; Your friend has updated their status; Somebody liked your comment… the list goes on. In fact, much as we would like to imagine a world that revolves around us, we know that there are a very few people who have the energy and resources to keep track of everything we do. However, no matter how boring your status message or how pedestrian your activity, deep down in a server somewhere, an artificial algorithm is keeping track of everything that you do. Facebook is always listening, and watching, and creating a profile of you. People might forget, skip, miss or move on, but Facebook will listen, and remember long after you have forgotten.&lt;br /&gt;&lt;br /&gt;If this is indeed the case, we need to think of privacy in different ways — not only as something that happens between people, but between people and other entities like corporations. The next time there is a change in the policy that makes us more accessible to others, we should pay attention. But what we need to be more concerned about are the private corporations, data miners and information gatherers, who make themselves invisible and collect our personal data as we get into the habit of talking to platforms, gadgets and technologies.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-october-27-2013-nishant-shah-open-secrets'&gt;https://cis-india.org/internet-governance/blog/indian-express-october-27-2013-nishant-shah-open-secrets&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-30T08:21:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/open-letter-to-siam-on-rfid%20installation-in-vehicles">
    <title>Open Letter to Prevent the Installation of RFID tags in Vehicles</title>
    <link>https://cis-india.org/internet-governance/blog/open-letter-to-siam-on-rfid%20installation-in-vehicles</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) has sent this open letter to the Society of Indian Automobile Manufacturers (SIAM) to urge them not to intall RFID tags in vehicles in India. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;

&lt;p class="western" style="text-align: justify; "&gt;This letter is with regards to the installation of Radio Frequency Identification Tags (RFID) in vehicles in India.&lt;/p&gt;
&lt;p class="western" style="text-align: justify; "&gt;On behalf of the Centre for Internet and Society, we urge you to prevent the installation of RFID tags in vehicles in India, as the legality, necessity and utility of RFID tags have not been adequately proven. Such technologies raise major ethical concerns, since India lacks privacy legislation which could safeguard individuals' data.&lt;/p&gt;
&lt;p class="western" style="text-align: justify; "&gt;The proposed rule 138A of the Central Motor Vehicle Rules, 1989, mandates that RFID tags are installed in all light motor vehicles in India. However, section 110 of the Motor Vehicles Act (MV Act), 1988, does not bestow on the Central Government a specific empowerment to create rules in respect to RFID tags. Thus, the legality of the proposed rule 138A is questioned, and we urge you to not proceed with an illegal installation of RFID tags in vehicles until the Supreme Court has clarified this issue.&lt;/p&gt;
&lt;p class="western" style="text-align: justify; "&gt;The installation of RFID tags in vehicles is not only currently illegal, but it also raises majors privacy concerns.  RFID tags yield locational information, and thus reveal information as to an individual’s whereabouts. This could lead to a serious invasion of the right to privacy, which is at the core of personal liberty, and constitutionally protected in India. Moreover, the installation of RFID tags in vehicles is not in compliance with the privacy principles of the Report of the Group of Experts on Privacy, as, among other things, the architecture of RFID tags does not allow for consent to be taken from individuals for the collection, use, disclosure, and storage of information generated by the technology.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p class="western" style="text-align: justify; "&gt;The Centre for Internet and Society recently drafted the Privacy (Protection) Bill 2013 – a citizen's version of a possible privacy legislation for India.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;sup&gt; &lt;/sup&gt;The Bill defines and establishes the right to privacy and regulates the interception of communications and surveillance, and would include the regulation of technologies like RFID tags. As this Bill has not been enacted into law and India lacks a privacy legislation which could safeguard individuals' data, we strongly urge you to not require the mandatory installation of RFID tags in vehicles, as this could potentially violate individuals' right to privacy and other human rights.&lt;/p&gt;
&lt;p class="western" style="text-align: justify; "&gt;As the proposed rule 138A, which mandates the installation of RFID tags in vehicles, is currently illegal and India lacks privacy legislation which would regulate the collection, use, sharing of, disclosure and retention of data, we strongly urge you to ensure that RFID tags are not installed in vehicles in India and to play a decisive role in protecting individuals' right to privacy and other human rights.&lt;/p&gt;
&lt;p class="western" style="text-align: justify; "&gt;Thank you for your time and for considering our request.&lt;/p&gt;
&lt;p class="western" style="text-align: justify; "&gt;Sincerely,&lt;/p&gt;
&lt;p class="western" style="text-align: justify; "&gt;Centre for Internet and Society (CIS)&lt;/p&gt;
  
&lt;p&gt; &lt;/p&gt;
&lt;p id="sdfootnote1"&gt; &lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Report of the Group of Experts on Privacy: http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].Draft Privacy (Protection) Bill 2013: http://cis-india.org/internet-governance/blog/privacy-protection-bill-2013.pdf&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/open-letter-to-siam-on-rfid%20installation-in-vehicles'&gt;https://cis-india.org/internet-governance/blog/open-letter-to-siam-on-rfid%20installation-in-vehicles&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T10:59:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/open-letter-members-european-parliament-civil-liberties-justice-home-affairs-committee">
    <title>Open Letter to Members of the European Parliament of the Civil Liberties, Justice and Home Affairs Committee  </title>
    <link>https://cis-india.org/internet-governance/blog/open-letter-members-european-parliament-civil-liberties-justice-home-affairs-committee</link>
    <description>
        &lt;b&gt;An open letter was sent to the Members of the European Parliament of the Civil Liberties, Justice and Home Affairs Committee on the proposed EU Regulation. The letter was apart of an initiative that Privacy International and a number of other NGO's are undertaking.&lt;/b&gt;
        &lt;p&gt;&lt;b&gt;Dear Members of the European Parliament of the Civil Liberties, Justice and Home Affairs Committee&lt;/b&gt;,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On behalf of The Centre for Internet and Society, Bangalore, India,  we are writing to express our support of the European Commission’s proposed General Data Protection Regulation (COM (2012) 11).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The legal framework established under the 1995 Data Protection Directive (95/46/EC) in Europe has positively influenced many existing privacy regimes worldwide, serving as a model legal framework in jurisdictions that are in the process of developing privacy regimes, including India. The positive impact of the Data Protection Directive shows the potential of the Regulation to become a global model for the protection of personal data. The Regulation seeks to address new scenarios that have arisen in the context of rapidly changing technologies and practices, increasing its potential for positively influencing privacy rights for individuals globally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is currently in the process of considering the enactment of privacy legislation, in part with the aim of ensuring adequate safeguards to enable and enhance information flows into India from countries around the world, including Europe. At the same time, India is seeking  Data Secure Status from the EU, on the basis of its current regime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear that the EU framework for data protection has a major influence on the current and emerging privacy regime in India. India is only one country of many that are in the beginning stages of developing a comprehensive privacy regime. Thus, we ask that you keep in mind how the Regulation will impact the rights of individual in countries outside of Europe, particularly in countries that are in the process of developing privacy regimes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We ask that you take into consideration the four following points that we believe need to be addressed in the Regulation to help ensure adequate protection of the rights of individuals in the European Union and around the world.&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Strengthen the principle of purpose limitation: &lt;/b&gt;The Regulation should incorporate a strong purpose limitation principle that strictly limits present and future uses of personal data to the purposes for which it was originally collected. Currently, Article 6(4) allows for the further processing of data when the processing is &lt;i&gt;“not compatible with the one for which the personal data have been collected”. &lt;/i&gt;Though the provision establishes legal requirements, one of which must be before information can be used for a further purpose, this is has proven insufficient in the existing Directive. The current provision in the Regulation dilutes the principle of purpose limitation as well as weakening an individual’s ability to make informed decisions about their personal data.&lt;b&gt; &lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Define principles for interpretation of broad terms: &lt;/b&gt;The Regulation should create principles for interpreting broad terms such as “legitimate interest” and “public interest”. These vague terms are used throughout the Regulation, and create the potential for loopholes or abuse. Because these terms can be interpreted in many different ways, it is important to create a set of principles to guide their interpretation  by data protection authorities and courts to avoid inconsistent application and enforcement of the Regulation.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Clarify the scope of the Regulation:&lt;/b&gt; The Regulation should clearly describe the jurisdictional scope and reach of its provisions. Currently Article 3(1) states that the Regulation will apply to the processing of data “in the context of the activities of an establishment of a controller or a processor in the Union”.  The flow of information on the online environment coupled with trends such as cloud computing, outsourcing, and cross border business creates a scenario where defining what constitutes “context of the activities of an establishment”, is difficult and could lead to situations where personal data is not protected, as the collection, use, or storage of it does not necessarily fall within the “context of the activities”. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Address access by foreign alliance bodies&lt;/b&gt;: In light of growing demands by law enforcement for access, use, and transfer of personal information for investigative purposes across jurisdictions– the Regulation should define the circumstances in which personal data protected by its provisions can be accessed and used by foreign intelligence bodies, and the procedure by which to do so. The Regulation should address challenges such as access by foreign intelligence bodies to data stored on the cloud and data that has passed through/is stored on foreign networks/servers. &lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/open-letter-members-european-parliament-civil-liberties-justice-home-affairs-committee'&gt;https://cis-india.org/internet-governance/blog/open-letter-members-european-parliament-civil-liberties-justice-home-affairs-committee&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-23T05:00:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
