<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-ratantata/search_rss">
  <title>Should Ratan Tata be Afforded the Right to Privacy? </title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1090 to 1104.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/niti-aayog-discussion-paper-an-aspirational-step-towards-india2019s-ai-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/nipfp-seminar-on-exploring-policy-issues-in-the-digital-technology-arena"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/media-economics-workshop"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-business-line-oct-18-2012-nine-point-code-set-out-to-safeguard-personal-information"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/new-indian-express-october-25-2017-nibbling-away-into-your-bank-account-salami-attackers-cart-away-a-fortune"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/nha-data-sharing-guidelines"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/times-of-india-april-4-2017-ngos-individuals-urge-state-cms-to-curb-internet-shutdown"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/e-g-8-report-internet-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/ngo-questions-peoples-privacy-in-uid-scheme"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/new-trends-in-industry-self-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/new-standard-operating-procedures-for-lawful-interception-and-monitoring"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/new-rules-for-due-diligence"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-krupa-joseph-june-10-2021-new-rules-leave-social-media-users-vulnerable"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-june-2-2017-komal-gupta-new-rules-for-govt-agencies-to-ensure-security-of-personal-data"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/niti-aayog-discussion-paper-an-aspirational-step-towards-india2019s-ai-policy">
    <title>NITI Aayog Discussion Paper: An aspirational step towards India’s AI policy</title>
    <link>https://cis-india.org/internet-governance/blog/niti-aayog-discussion-paper-an-aspirational-step-towards-india2019s-ai-policy</link>
    <description>
        &lt;b&gt;The National Strategy for Artificial Intelligence — a discussion paper on India’s path forward in AI, is a welcome step towards a comprehensive document that reflects the government's AI ambitions. The 115-page discussion paper attempts to be an all encompassing document looking at a host of AI related issues including privacy, security, ethics, fairness, transparency and accountability.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/niti-aayog-discussion-paper"&gt;&lt;strong&gt;Download the Report&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The 115-page discussion paper attempts to be an all encompassing document looking at a host of AI related issues including privacy, security, ethics, fairness, transparency and accountability. The paper identifies five focus areas where AI could have a positive impact in India.&lt;/span&gt;&lt;span&gt; It also focuses on reskilling as a response to the potential problem of job loss due the future large-scale adoption of AI in the job market.&lt;/span&gt;&lt;span&gt; This blog is a follow up to the comments made by CIS on Twitter&lt;/span&gt;&lt;span&gt; on the paper and seeks to reflect on the National Strategy as a well researched AI roadmap for India. In doing so, it identifies areas that can be strengthened and built upon.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Identified Focus Areas for AI Intervention&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The paper identifies five focus areas—Healthcare, Agriculture, Education, Smart Cities and Infrastructure, Smart Mobility and Transportation, which Niti Aayog believes will benefit most from the use of AI in bringing about social welfare for the people of India.&lt;/span&gt;&lt;span&gt; Although these sectors are essential in the development of a nation, the failure to include manufacturing and services sectors is an oversight. Focussing on  manufacturing is fundamental not only in terms of economic development and user base, but also regarding questions of safety and the impact of AI on jobs and economic security. The same holds true for the service sector particularly since AI products are being made for the use of consumers, not just businesses. Use of AI in the services sector also raises critical questions about user privacy and ethics. Another sector the paper fails to include is defense, this is worrying since India is chairing the Group of Governmental Experts &lt;/span&gt;&lt;span&gt;on Lethal Autonomous Weapons Systems (LAWS) in 2018.&lt;/span&gt;&lt;span&gt; Across sectors, the report fails to look at how AI could be utilised to ensure accessibility and inclusion for the disabled. This is surprising, as  aid for the differently abled and accessibility technology was one of the 10 domains identified in the Task Force Report on AI published earlier this year. &lt;/span&gt;&lt;span&gt;This should have been a focus point in the paper as it  aims to identify applications with maximum social impact and inclusion.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In its vision for the use of AI in smart cities, the&lt;/span&gt;&lt;span&gt; paper suggests the adoption of a sophisticated surveillance system as well as the use of social media intelligence platforms to check and monitor people’s movement both online and offline to maintain public safety.&lt;/span&gt;&lt;span&gt; This is at variance with constitutional standards of due process and criminal law principles of reasonable ground and reasonable suspicion. Further, use of such methods will pose issues of judicial inscrutability. From a rights perspective, state surveillance can directly interfere with fundamental rights including privacy, freedom of expression, and freedom of assembly. Privacy organizations around the world have raised concerns regarding the increased public surveillance through the use of AI.&lt;/span&gt;&lt;span&gt; Though the paper recognized the impact on privacy that such uses would have, it failed to set a strong and forward looking position on the issue - such as advocating that such surveillance must be lawful and inline with international human rights norms.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;Harnessing the Power of AI and Accelerating Research&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;One of the ways suggested for the proliferation of AI in India was to increase research, both core and applied, to bring about innovation that can be commercialised.&lt;/span&gt;&lt;span&gt; In order to attain this goal the paper proposes a two-tier integrated approach: the establishment of  COREs (Centres of Research Excellence in Artificial Intelligence) and ICTAI (International Centre for Transformational Artificial Intelligence).&lt;/span&gt;&lt;span&gt; However the roadmap to increase research in AI fails to acknowledge the principles of public funded research such as free and open source software (FOSS), open standards and open data. The report also blames the current Indian  Intellectual Property regime for being “unattractive” and averse to incentivising research and adoption of AI.&lt;/span&gt;&lt;span&gt; Section 3(k) of Patents Act exempts algorithms from being patented, and the Computer Related Inventions (CRI) Guidelines have faced much controversy over the patentability of mere software without a novel hardware component.&lt;/span&gt;&lt;span&gt; The paper provides no concrete answers to the question of whether it should be permissible to patent algorithms, and if yes, to  to what extent. Furthermore, there needs to be a standard either in the CRI Guidelines or the Patent Act, that distinguishes between AI algorithms and non-AI algorithms. Additionally, given that there is no historical precedence on the requirement of patent rights to incentivise creation of AI,  innovative investment protection mechanisms that have lesser negative externalities, such as compensatory liability regimes&lt;/span&gt;&lt;span&gt; would be more desirable.  The report further failed to look at the issue holistically and recognize that facilitating rampant patenting can form a barrier to smaller companies from using or developing  AI. This is important to be cognizant of given the central role of startups to the AI ecosystem in India and because it can work against the larger goal of inclusion articulated by the report.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;Ethics, Privacy, Security and Safety&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In a positive step forward, the paper addresses a broader range of ethical issues concerning AI including transparency, fairness, privacy and security and safety in more detail when compared to the earlier report of the Task Force.&lt;/span&gt;&lt;span&gt; Yet despite a dedicated section covering these issues, a number of concerns still remain unanswered.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;Transparency&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The section on transparency and opening the Black Box has several lacunae.&lt;/span&gt;&lt;span&gt; First, AI that is used by the government, to an acceptable extent, must be available in the public domain for audit, if not under Free and Open Source Software (FOSS). This should hold true in particular for uses that impinge on fundamental rights. Second, if the AI is utilised in the private sector, there currently exists a right to reverse engineer within the Indian Copyright Act,&lt;/span&gt;&lt;span&gt; which is not accounted for in the paper. Furthermore, if the AI was involved both in the commission of a crime or the violation of human rights, or in the investigations of such transgressions, questions with regard to judicial scrutability of the AI remain. In addition to explainability, the source code must be made circumstantially available, since explainable AI&lt;/span&gt;&lt;span&gt; alone cannot solve all the problems of transparency. In addition to availability of source code and explainability, a greater discussion is needed about the tradeoff between a complex and potentially more accurate AI system (with more layers and nodes)  vs. an AI system which is potentially not as accurate but is able to provide a human readable explanation.&lt;/span&gt;&lt;span&gt; It is interesting to note that transparency within human-AI interaction is absent in the paper. Key questions on transparency, such as whether an AI should disclose its identity to a human have not been answered.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;Fairness&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;With regards to fairness, the paper mentions how AI can amplify bias in data and create unfair outcomes.&lt;/span&gt;&lt;span&gt; However, the paper neither suggests detailed or satisfactory solutions nor does it deal with biased historical data in an Indian context. More specifically, there seems to be no mention of regulatory tools to tackle the problem of fairness, such as:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Self-certification&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Certification by a self-regulatory body&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Discrimination impact assessments&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Investigations by the privacy regulator &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt;Such tools will proactively need to ensure&lt;/span&gt;&lt;span&gt; inclusion, diversity, and equity in composition and decisions.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Additionally, with reference to correcting bias in AI, it should be noted that the technocratic view that as an AI solution continues to be trained on larger amounts of data  , systems will self correct, does not fully recognize the importance of data quality and data curation, and is inconsistent with fundamental rights. Policy objectives of AI innovation must be technologically nuanced and cannot be at the cost of intermediary denial of rights and services.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Further, the paper does not deal with issues of multiple definitions and principles of fairness, and that building definitions into AI systems may often involve choosing one definition over the other. For instance, it can be argued that the set of AI ethical principles articulated by Google&lt;/span&gt;&lt;span&gt; are more consequentialist in nature involving a a cost-benefit analysis, whereas a human rights approach may be more deontological in nature. In this regard, there is a need for interdisciplinary research involving computer scientists, statisticians, ethicists and lawyers.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;Privacy&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Though the paper underscores the importance of privacy and the need for a privacy legislation in India - the paper limits the potential privacy concerns arising from AI to collection, inappropriate use of data, personal discrimination, unfair gain from insights derived from consumer data  (the solution being to explain to consumers about the value they as consumers gain from this), and unfair competitive advantage by collecting mass amounts of data (which is not directly related to privacy).&lt;/span&gt;&lt;span&gt; In this way the paper fails to discuss the full implications on privacy that AI might have and fails to address the data rights necessary to enable the right to privacy in a society where AI is pervasive. The paper fails to engage with emerging principles from data protection such as right to explanation and right to opt-out of automated processing, which directly relate to AI. Further, there is no discussion on the issues such as data minimisation and purpose limitation which some big data and AI proponents argue against. To that extent, there is a lack of appreciation of the difficult policy questions concerning privacy and AI. The paper is also completely silent on redress and remedy.  Further the paper endorses the seven data protection principles postulated by the Justice Srikrishna Committee.&lt;/span&gt;&lt;span&gt; However CIS has pointed out that these principles are generic and not specific to data protection.&lt;/span&gt;&lt;span&gt; Moreover, the law chapter of IEEE’s ‘&lt;/span&gt;&lt;em&gt;&lt;span&gt;Global Initiative on Ethics of Autonomous and Intelligent Systems’&lt;/span&gt;&lt;/em&gt;&lt;span&gt; has been ignored in favor of the chapter on ‘&lt;/span&gt;&lt;em&gt;&lt;span&gt;Personal Data and Individual Access Control in Ethically Aligned Design&lt;/span&gt;&lt;/em&gt;&lt;span&gt;’&lt;/span&gt;&lt;span&gt; as the recommended international standard.&lt;/span&gt;&lt;span&gt; Ideally, both chapters should be recommended for a holistic approach to the issue of ethics and privacy with respect to AI. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;AI Regulation and Sectoral Standards&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The discussion paper’s approach towards sectoral regulation advocates collaboration with industry to formulate regulatory frameworks for each sector.  However, the paper is silent on the possibility of reviewing existing sectoral regulation to understand if they require amending. We believe that this is an important solution to consider since amending existing regulation and standards often takes less time than formulating and implementing new regulatory frameworks.&lt;/span&gt;&lt;span&gt; Furthermore, although the emphasis on awareness in the paper is welcome, it must complement regulation and be driven by all stakeholders, especially given India’s limited regulatory budget. The over reliance on industry self-regulation, by itself, is not advisable, as there is an absence of robust industry governance bodies in India and self-regulation raises questions about the strength and enforceability of such practices. The privacy debate in India has recognized this and reports, like the Report of the Group of Experts on Privacy, recommend a co-regulatory framework with industry developing binding standards that are inline with the national privacy law and that are approved and enforced by the Privacy Commissioner.&lt;/span&gt;&lt;span&gt; That said, the UN Guiding Principles on Business and Human Rights and its “protect, respect, and remedy” framework should guide any self regulatory action.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;Security and Safety of AI Systems&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In terms of security and safety of AI systems the paper seeks to shift the discussion of accountability being primarily about liability, to that of one about the  explainability of AI.&lt;/span&gt;&lt;span&gt; Furthermore, there is no recommendation of immunities or incentives for whistleblowers or researchers to report on privacy breaches and vulnerabilities. The report also does not recognize certain uses of AI as being more critical than others because of their potential harm to the human. This would include uses in healthcare and autonomous transportation. A key component of accountability in these sectors will be the evolution of appropriate testing and quality assurance standards. Only then, should safe harbours be discussed as an extension of the negligence test for damages caused by AI software. Additionally, the paper fails to recommend kill switches, which should be mandatory for all kinetic AI systems.&lt;/span&gt;&lt;span&gt; Finally, there is no mention of mandatory human-in-the-loop in all systems where there are significant risks to safety and human rights. Autonomous AI is only viewed as an economic boost, but its potential risks have not been explored sufficiently. A welcome recommendation would be for all autonomous AI to go through human rights impact assessments.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;Research and Education&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Being a government think-tank, the NITI Aayog could have dealt in detail with the AI policies of the government and looked at how different arms of the government are aiming to leverage AI and tackle the problems arising out of the use of AI. Instead of tabulating the government’s role in each area and especially research, the report could have also listed out the various areas where each department could play a role in the AI ecosystem through regulation, education, funding research etc. In terms of the recommendations for introducing AI curriculums in schools, and colleges,&lt;/span&gt;&lt;span&gt; the government could also ensure that ethics and rights are  part of the curriculum - especially in technical institutions. A possible course of action could include corporations paying for a pan-Indian AI education campaign.This would also require the government to formulate the required academic curriculum that is updated to include rights and ethics. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;Data Standards and Data Sharing&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Based on the amount of data the Government of India collects through its numerous schemes, it has the potential to be the largest aggregator of data specific to India. However the paper does not consider the use of this data with enough gravity. For example, the paper recommends Corporate Data Sharing for “social good” and making government datasets from the social sector available publicly.&lt;/span&gt;&lt;span&gt; Yet  this section does not mention privacy enhancing technologies/standards such as pseudonymization, anonymization standards, differential privacy etc. Additionally there should be provisions that allow the government to prevent the formation of monopolies by regulating companies from hoarding user data. The open data standards could also be applicable to the private companies, so that they can also share their data in compliance with the privacy enhancing technologies mentioned above. The paper also acknowledges that AI Marketplaces require monitoring and maintenance of quality. It recognises the need for “continuous scrutiny of products, sellers and buyers”&lt;/span&gt;&lt;span&gt;, and proposes that the government enable these regulations in a manner that private players could set up the marketplace. This is a welcome suggestion, but the legal and ethical framework of the AI Marketplace requires further discussion and clarification.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;An AI Garage for Emerging Economies&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The discussion paper also qualifies India as an “ideal test-bed”&lt;/span&gt;&lt;span&gt; for trying out AI related solutions. This is problematic since questions of regulation in  India with respect to AI have yet to be legally clarified and defined and India does not have a comprehensive privacy law. Without a strong ethical and regulatory framework, the use of new and possibly untested technologies in India could lead to unintended and possibly harmful outcomes.The government's ambition to position India as a leader amongst developing countries on AI related issues should not be achieved by using Indians as test subjects for technologies whose effects are unknown.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In conclusion, NITI Aayog’s discussion paper represents a welcome step towards a comprehensive AI strategy for India. However, the trend of inconspicuously releasing reports (this and the AI Task Force) as well as the lack of a call for public comments, seems to be the wrong way to foster discussion on emerging technologies that will be as pervasive as AI. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The blanket recommendations were provided without looking at its viability in each sector.&lt;/span&gt;&lt;span&gt; Furthermore, the discussion paper does not sufficiently explore or, at times, completely omits key areas. It barely touched upon societal, cultural and sectoral challenges to the adoption of AI — research that CIS is currently in the process of undertaking.&lt;/span&gt;&lt;span&gt;Future reports on Indian AI strategy should pay more attention to the country’s unique legal context and to possible defense applications and take the opportunity to establish a forward looking, human rights respecting, and holistic position in global discourse and developments. Reports should also consider infrastructure investment as an important prerequisite for AI development and deployment. Digitised data and connectivity as well as more basic infrastructure, such as rural electricity and well-maintained roads, require more funding to more successfully leverage AI for inclusive economic growth. Although there are important concerns, the discussion paper is an aspirational step toward India’s AI strategy. &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/niti-aayog-discussion-paper-an-aspirational-step-towards-india2019s-ai-policy'&gt;https://cis-india.org/internet-governance/blog/niti-aayog-discussion-paper-an-aspirational-step-towards-india2019s-ai-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sunil Abraham, Elonnai Hickok, Amber Sinha, Swaraj Barooah, Shweta Mohandas, Pranav M Bidare, Swagam Dasgupta, Vishnu Ramachandran and Senthil Kumar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2018-06-13T13:08:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/nipfp-seminar-on-exploring-policy-issues-in-the-digital-technology-arena">
    <title>NIPFP Seminar on Exploring Policy Issues in the Digital Technology Arena</title>
    <link>https://cis-india.org/internet-governance/news/nipfp-seminar-on-exploring-policy-issues-in-the-digital-technology-arena</link>
    <description>
        &lt;b&gt;Anubha Sinha participated in this seminar as a discussant on the "Regulating emerging technologies" panel. The event was held at Indian Institute of Advanced Study, Shimla on October 10 - 11, 2019.

&lt;/b&gt;
        &lt;p&gt;Click to view the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/exploring-policy-issues-in-the-digital-technology-arena"&gt;agenda here&lt;/a&gt;. The session briefs can be &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/session-briefs"&gt;seen here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/nipfp-seminar-on-exploring-policy-issues-in-the-digital-technology-arena'&gt;https://cis-india.org/internet-governance/news/nipfp-seminar-on-exploring-policy-issues-in-the-digital-technology-arena&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Digital Knowledge</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Technologies</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    

   <dc:date>2019-10-20T07:40:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/media-economics-workshop">
    <title>Ninth Workshop on Media Economics</title>
    <link>https://cis-india.org/news/media-economics-workshop</link>
    <description>
        &lt;b&gt;The Higher School of Economics and the New Economic School have joined hands to organize the ninth workshop on media economics in Moscow on October 28 and 29, 2011. All events are scheduled to take place in Marriott Courtyard, a hotel in the centre of Moscow within 10-minute walking distance from the Kremlin, the Red Square, and the Bolshoi Theatre.&lt;/b&gt;
        
&lt;h2&gt;Workshop Program&lt;/h2&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;Friday, October 28, 2011&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;8:00 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Morning coffee&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;8:45 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Opening remarks&lt;/em&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;Media markets - 1: Newspapers, Mergers, and Diversity&lt;/h3&gt;
&lt;div&gt;9:00 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Michal MASIKA, University of Munich&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Free commuter newspapers and the market for paid-for daily newspapers&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Sergey V. Popov, Higher School of Economics&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;9:40 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Lapo FILISTRUCCHI, Tilburg University and University of Florence&lt;/div&gt;
&lt;div&gt;Tobias J. Klein, Tilburg University&lt;/div&gt;
&lt;div&gt;Thomas Michielsen, Tilburg University&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Merger Simulation in a Two-Sided Market: The Case of the Dutch Daily &amp;nbsp; Newspapers&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Lars Sørgard, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;10:20 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Lisa GEORGE, Hunter College, City University of New York&lt;/div&gt;
&lt;div&gt;Felix Oberholzer-Gee, Harvard Business School&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Diversity in Local Television News&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: François Keslair, Paris School of Economics&amp;nbsp;&lt;/div&gt;
&lt;div&gt;11:00 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Coffee break&amp;nbsp;&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;&lt;/span&gt;Media markets and Internet - 1: Advertising and Search Engines&lt;/h3&gt;
&lt;div&gt;11:30 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Alexandre de CORNIÈRE, Paris School of Economics&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Search advertising&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Simon Anderson, University of Virginia&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;12:10 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Alexander WHITE, Tsinghua University School of Economics and Management&lt;/div&gt;
&lt;div&gt;Kamal Jain, Microsoft Research&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;The Attention Economy of Search and Web Advertisement&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Sergei Izmalkov, New Economic School &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;12:50 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Lunch&lt;/em&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;&lt;span class="Apple-tab-span"&gt;&lt;/span&gt;Political Economy - 1: Media, Elites, and the Groups of Influence&amp;nbsp;&lt;/h3&gt;
&lt;div&gt;2:00 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Leopoldo FERGUSSON, Universidad de Los Andes&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Media Markets, Special Interests, and Voters&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Alexei V. Zakharov, Higher School of Economics &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;2:40 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;David STRÖMBERG, IIES at Stockholm University&lt;/div&gt;
&lt;div&gt;Ben Qin, IIES at Stockholm University&lt;/div&gt;
&lt;div&gt;Yanhui Wu, USC Marshall School of Business&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Determinants of Media Capture in China&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Maria Petrova, New Economic School&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;3:20 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Daniel STONE, Oregon State University&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Media and Gridlock&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Elena Panova, Academy of National Economy and Gaidar Institute&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;4:00 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Coffee break&amp;nbsp;&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Media markets and Internet - 2: Internet Effects and Offline Media Markets&lt;/h3&gt;
&lt;div&gt;4:30 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Joel WALDFOGEL, University of Minnesota&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Bye, Bye, Miss American Pie? The Supply of New Recorded Music since Napster&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Ruben Enikolopov, New Economic School&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;5:10 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Ignacio FRANCESCHELLI, Northwestern University&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;When the Ink is Gone: The Impact of Internet on News Coverage&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Ruben Durante, Sciences Po Paris &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;5:50 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Adjourn&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;7:00 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Dinner&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&amp;nbsp;&lt;/div&gt;
&lt;h2&gt;Saturday October 29th&lt;/h2&gt;
&lt;div&gt;8:00 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Morning Coffee&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Media markets - 2: Interactions in Traditional and Digital Media Industry&lt;/h3&gt;
&lt;div&gt;9:00 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Harald Nygård Bergh, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;Hans Jarle KIND, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;Bjørn-Atle Reme, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;Lars Sørgard, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Competition between Content Distributors in Two-Sided Markets&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Guido Friebel, Goethe University Frankfurt &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;9:40 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Larbi Alaoui, Universitat Pompeu Fabra&lt;/div&gt;
&lt;div&gt;Fabrizio GERMANO, Universitat Pompeu Fabra&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Time Scarcity and the Market for News&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Sergei Guriev, New Economic School &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;10:20 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Coffee break&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Political Economy - 2: Media Effects&lt;/h3&gt;
&lt;div&gt;10:50 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Francesco Drago, University of Naples&lt;/div&gt;
&lt;div&gt;Tommaso Nannicini, Bocconi University&lt;/div&gt;
&lt;div&gt;Francesco SOBBRIO, IMT Lucca&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Newspapers, Local News and Electoral Politics&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Ekaterina Zhuravskaya, Paris School of Economics &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;11:30 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Julia CAGÉ, Harvard University&lt;/div&gt;
&lt;div&gt;François Keslair, Paris School of Economics&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Trash Media and the Decline of Turnout: Theory and Evidence from Local Media Competition in France, 1944-2010&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Francesco Sobbrio, IMT Lucca &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;12:10 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Parallel events (choose your favorite):&lt;/div&gt;
&lt;div&gt;Lunch &amp;nbsp;- or -&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;Global New Media Policy&lt;/h3&gt;
&lt;div&gt;Roundtable (with refreshments, RSVP required, more details here)&lt;/div&gt;
&lt;div&gt;Pedro MIZUKAMI, FGV Center for Technology and Society, Rio de Janeiro, Brazil&lt;/div&gt;
&lt;div&gt;Sunil ABRAHAM, Centre for Internet and Society, Bangalore, India&lt;/div&gt;
&lt;div&gt;Bruce ETLING and Robert FARIS, Berkman Center for Internet and Society, Harvard University, United States&lt;/div&gt;
&lt;div&gt;Marina ZHUNICH, Google Russia&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Media markets - 3: Media Bias&lt;/h3&gt;
&lt;div&gt;2:00 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Stefano DELLAVIGNA, UC Berkeley&lt;/div&gt;
&lt;div&gt;Alec Kennedy, San Francisco Federal Reserve Bank&lt;/div&gt;
&lt;div&gt;“Does Media Concentration Lead to Biased Coverage? Evidence from Movie Reviews”&lt;/div&gt;
&lt;div&gt;Discussant: Joel Waldfogel, University of Minnesota &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;2:40 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Matthias HEINZ, Goethe University Frankfurt&lt;/div&gt;
&lt;div&gt;Guido Friebel, Goethe University Frankfurt&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Media bias against foreign owners: Downsizing&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Olga Kuzmina, New Economic School &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;3:20 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Break&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Future Directions of Research in Media Economics&lt;/h3&gt;
&lt;div&gt;3:30 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Roundtable&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;Simon ANDERSON, University of Virginia&lt;/div&gt;
&lt;div&gt;Stefano DELLAVIGNA, UC Berkeley&lt;/div&gt;
&lt;div&gt;Lisa GEORGE, Hunter College, City University of New York&lt;/div&gt;
&lt;div&gt;David STRÖMBERG, IIES at Stockholm University&lt;/div&gt;
&lt;div&gt;4:45 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Farewell reception&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;The above agenda was published in Higher School of Economics website, &lt;a class="external-link" href="http://www.hse.ru/mew/program"&gt;click here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/div&gt;
&lt;iframe src="http://www.youtube.com/embed/WUL21Zc8UnU" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/media-economics-workshop'&gt;https://cis-india.org/news/media-economics-workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-28T09:12:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-business-line-oct-18-2012-nine-point-code-set-out-to-safeguard-personal-information">
    <title>Nine-point code set out to safeguard personal information</title>
    <link>https://cis-india.org/news/the-hindu-business-line-oct-18-2012-nine-point-code-set-out-to-safeguard-personal-information</link>
    <description>
        &lt;b&gt;A. P. Shah panel lists exceptions; suggests privacy commissioners.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Published in &lt;a class="external-link" href="http://www.thehindubusinessline.com/industry-and-economy/ninepoint-code-set-out-to-safeguard-personal-information/article4009850.ece"&gt;Hindu Business Line&lt;/a&gt; on October 18, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Justice A. P. Shah panel has recommended an over-arching law to protect privacy and personal data in the private and public spheres.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report also suggested setting up privacy commissioners, both at the Central and State levels.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has spelt out nine national privacy principles that could be followed while framing the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report comes at a time when there is growing concern over unique identity numbers, DNA profiling, brain-mapping, etc, most of which will be implemented on the ICT platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report has listed certain exceptions in the right to privacy such as national security, public order, disclosure in public interest, prevention, detection, investigation and prosecution of criminal offences and protection of the individual or of the rights of freedom of others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In certain cases, historical or scientific research and journalistic purposes can also be considered as exceptions, says the report.&lt;/p&gt;
&lt;h3&gt;Networking sites&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Referring to social networking sites and search engines, which have their own privacy code, Justice Shah said these will either have to follow the model provided in the proposed Act or have a self-regulatory mechanism approved by the privacy commissioner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report suggests harmonising the proposed privacy Act with the RTI Act. Responding to privacy infringement concerns, as aired by the Prime Minister recently, Justice Shah said RTI was the only law that gave statutory protection to privacy, which could be over-ridden only in certain cases for individuals, not companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Minister of State for Planning Ashwani Kumar said a privacy Act was necessary as in a democracy one had to ensure that "no one right is so exercised so as to infringe upon the rights of individuals."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The high-level panel submitted its report to the Planning Commission on Thursday. It will now be forwarded to the Department of Personnel and Training, which is already looking into the privacy law.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Note: &lt;i&gt;The Centre for Internet &amp;amp; Society was a part of the expert committee even though it is not explicitly mentioned here&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-business-line-oct-18-2012-nine-point-code-set-out-to-safeguard-personal-information'&gt;https://cis-india.org/news/the-hindu-business-line-oct-18-2012-nine-point-code-set-out-to-safeguard-personal-information&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-10-22T06:42:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/new-indian-express-october-25-2017-nibbling-away-into-your-bank-account-salami-attackers-cart-away-a-fortune">
    <title>Nibbling away into your bank account, salami attackers cart away a fortune</title>
    <link>https://cis-india.org/internet-governance/news/new-indian-express-october-25-2017-nibbling-away-into-your-bank-account-salami-attackers-cart-away-a-fortune</link>
    <description>
        &lt;b&gt;A ‘salami’ might sound an innocuous term in the culinary sense. When it comes to cybercrime, a ‘salami’ is a dreaded attack which even the victims are hardly aware of. Like a salami slice, a hacker slices away small sums of money from multiple accounts on a daily basis. By the time the victims realise that they are being ‘sliced’, too little can be done or it’s already too late.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Kiran Parashar KM and Akram Mohammed was &lt;a class="external-link" href="http://www.newindianexpress.com/cities/bengaluru/2017/oct/25/nibbling-away-into-your-bank-account-salami-attackers-cart-away-a-fortune-1682273.html"&gt;published in New Indian Express&lt;/a&gt; on October 25, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;This is among the various strategies allegedly used by some bank  employees, working in cahoots with persons working in telecom companies  to defraud customers of their savings. Cyber crime police, who have  arrested several bank employees in the past in similar cases, warn that  throwing caution to the wind while banking online or responding to calls  claiming to be from banks could land you in serious financial trouble.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What’s shocking is law enforcement agencies have failed to nab the culprits in a majority of such crimes.&lt;br /&gt; Speaking to Express, Shubhamangala Sunil, head, Global Cyber Security  Response Team, said that of all the techniques used by bank insiders to  siphon off funds, ‘salami attack’ is probably the stealthiest. “Imagine  you have Rs 2,75,233 in to your account. If someone steals say `3 or 4  from your account every day, would you get an alert? If you did, would  you go and complain to the bank that such a small amount is being  stolen?” she questioned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Due to lack of awareness about such threats, a complaint to the bank  about such an issue is unlikely to bring any relief to the victim, she  said. With time, many new techniques will be discovered by fraudsters  and security might not be adequate to thwart all of them, she added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Policy Director at the Centre for Internet and  Society said the extent of fraud in the financial sector can be  decreased “by improving security of financial processes, auditing  software for vulnerabilities and fixing them and improving consumer  protection laws.” Processes used by banks, both offline and while  engaging with customers online and through systems such as Unified  Payments Interface, should be improved, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bad practices&lt;br /&gt; Prakash cited bad practices by different banks — such as preventing  right click in password boxes (which curb positive security practices  such as usage of password managers), limiting password lengths, and not  supporting software-based OTPs and stronger security like “Universal 2nd  Factor” — were also putting customers at risk. Stressing the need for  consumer awareness, he said that even if everything works fine at the  bank/financial institutions side customers commit mistakes, leaving them  vulnerable. Therefore, spreading awareness about security best  practices and hassle-free insurance to minimise harm to customers is  essential, he said. “Bank fraud or any other online fraud is inevitable.  We have to ensure that the harms from such fraud are as minimal as  possible,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Insider frauds&lt;br /&gt; While bank fraud cases — both online and offline — are increasing,  police are finding the involvement of insiders who exploit loopholes in  the banking systems. Sources in the CID-Cyber Crime Cell say there have  been multiple cases where there is involvement of at least one bank  employee. Digital banking has increased post demonetisation and yet the  security features are not enhanced. Two days after police caught two  employees of JP Morgan bank who had swindled `12 crore of a US-based  client, police express concern over the security and background checks  in the banking system as one of the accused had been working for four  years with fake documents and on a fake name.  An investigating official  said the insider shares details of debit/credit cards with the conmen  who clone cards for commission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Banking security&lt;br /&gt; Joint Commissioner of Police (Crime), Satish Kumar N said there is a  co-ordination committee of police and Reserve Bank of India. “We share  notes about cases of bank fraud and also recommend some security  features to be adopted in the banking sector. The meeting is held on a  regular basis,” he said. To a question on ‘salami attack’, he said that  police have not come across any such complaints yet. “We have been  vigilant about cyber related issues,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;WHODUNNIT?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Case 1: June 2017&lt;br /&gt; Vinod Kumar Pacchiyappan, manager of SBI Cards and Payment Services Pvt  Ltd, located in Embassy Heights on Magrath Road filed a complaint with  police that Know Your Customer (KYC) data of customers was compromised.  Apart from this, fake credit cards were created resulting in a loss of  `38.39 lakh. The investigating officials suspect the involvement of  insiders in the case.&lt;br /&gt; Status: No arrests yet&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Case 2: May 2016&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An US-couple living in Bengaluru was cheated of `6 lakh in just 2  hours.Cyber criminals, using their bank data credentials, had shopped  online.The police, almost a year-and-half after the incident, are yet to  know how their credit card details were extracted, but suspect that a  bank employee was involved in the case.Status: No arrests yet&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Case 3: January 2016&lt;br /&gt; Police lodged a complaint of hacking against unknown persons, who  cheated customers of several lakhs in Karnataka and Telangana. Police  learnt that the fraud was committed by hacking into Axis Bank’s mobile  wallet app LIME and SBI’s Buddy app. Bank account details of the  victims, mobile phone numbers, etc., were stolen by the accused.&lt;br /&gt; Status: Seven people, including G Gopalakrishna, deputy manager of Axis  Bank’s Peddapalli branch in Karimnagar district of Telangana, and others  involved in the crime were arrested.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/new-indian-express-october-25-2017-nibbling-away-into-your-bank-account-salami-attackers-cart-away-a-fortune'&gt;https://cis-india.org/internet-governance/news/new-indian-express-october-25-2017-nibbling-away-into-your-bank-account-salami-attackers-cart-away-a-fortune&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-27T15:35:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/nha-data-sharing-guidelines">
    <title>NHA Data Sharing Guidelines – Yet Another Policy in the Absence of a Data Protection Act</title>
    <link>https://cis-india.org/internet-governance/blog/nha-data-sharing-guidelines</link>
    <description>
        &lt;b&gt;In July this year, the National Health Authority (NHA) released the NHA Data Sharing Guidelines for the Pradhan Mantri Jan Aarogya Yojana (PM-JAY) just two months after publishing the draft Health Data Management Policy.&lt;/b&gt;
        &lt;p&gt;Reviewed and edited by Anubha Sinha&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Launched in 2018, PM-JAY is a public health insurance scheme set to cover 10 crore poor and vulnerable families across the country for secondary and tertiary care hospitalisation. Eligible candidates can use the scheme to avail of cashless benefits at any public/private hospital falling under this scheme. Considering the scale and sensitivity of the data, the creation of a well-thought-out data-sharing document is a much-needed step. However, the document – though only a draft – has certain portions that need to be reconsidered, including parts that are not aligned with other healthcare policy documents. In addition, the guidelines should be able to work in tandem with the Personal Data Protection Act whenever it comes into force. With no prior intimation of the publication of the guidelines, and the provision of a mere 10 days for consultation, there was very little scope for stakeholders to submit their comments and participate in the consultation. While the guidelines pertain to the PM-JAY scheme, it is an important document to understand the government’s concerns and stance on the sharing of health data, especially by insurance companies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Definitions: Ambiguous and incompatible with similar policy documents&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The draft guidelines add to the list of health data–related policies that have been published since the beginning of the pandemic. These include three draft health data management policies published within two years, which have already covered the sharing and management of health data. The draft guidelines repeat the pattern of earlier policies on health data, wherein there is no reference to the policies that predated it; in this case, the guidelines fail to refer to the draft National Digital Health Data Management Policy (published in April 2022). To add to this, the document – by placing the definitions at the end – is difficult to read and understand, especially when terms such as ‘beneficiary’, ‘data principal’, and ‘individual’ are used interchangeably. In the same vein, the document uses the terms ‘data principal’ and ‘data fiduciary’, and the definitions of health data and personal data, from the 2019 PDP Bill, while also referring to the IT Act SDPI Rules and its definition of ‘sensitive personal data’. While the guidelines state that the IT Act and Rules will be the legislation to refer to for these guidelines, it is to be noted that the IT Act under the SPDI Rules covers ‘body corporates’, which under Section 43A(1), is defined as “any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities;”. It is difficult to add responsibility and accountability to the organisations under the guidelines when they might not even be covered under this definition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With each new policy, civil society organisations have been pointing out the need to have a data protection act before introducing policies and guidelines that deal with the processing and sharing of the data of individuals. Ideally, these policies – even in draft form – should have been published after the Personal Data Protection Bill was enacted, to ensure consistency with the provisions of the law. For example, the guidelines introduce a new category of governance mechanisms under the data-sharing committee headed by a data-sharing officer (DSO). The responsibilities and powers of the DSO are similar to that of the data protection officer under the draft PDP Bill as well as the National Data Health Management Policy (NHDMP). This, in turn, raises the question of whether the DSO and the DPOs under both the PDP Bill and the draft NDMP will have the same responsibilities. Clarity in terms of which of the policies are in force and how they intersect is needed to ensure a smooth implementation. Ideally, having multiple sources of definitions should be addressed at the drafting stage itself.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Guiding Principles: Need to look beyond privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The guidelines enumerate certain principles to govern the use, collection, processing, and transmission of the personal or sensitive personal data of beneficiaries. These principles are accountability, privacy by design, choice and consent, openness/transparency, etc. While these provisions are much needed, their explanation at times misses the mark of why these principles were added. For example, in the case of accountability, the guidelines state that the ‘data fiduciary’ shall be accountable for complying with measures based on the guiding principles However, it does not specify who the fiduciaries would be accountable to and what the steps are to ensure accountability. Similarly, in the case of openness and transparency, the guidelines state that the policies and practices relating to the management of personal data will be available to all stakeholders. However, openness and transparency need to go beyond policies and practices and should consider other aspects of openness, including open data and the use of open-source software and open standards. This again will add to transparency, in that it would specify the rights of the data principal, as the current draft looks at the rights of the data principal merely from a privacy perspective. In the case of purpose limitation as well, the guidelines are tied to the privacy notice, which again puts the burden on the individual (in this case, beneficiary) when the onus should actually be on the data fiduciary. Lastly, under the empowerment of beneficiaries, the guidelines state that the “data principal shall be able to seek correction, amendments, or deletion of such data where it is inaccurate;”. The right to deletion should not be conditional on inaccuracy, especially when entering the scheme is optional and consent-based.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data sharing with third parties without adequate safeguards&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The guidelines outline certain cases where personal data can be collected, used, or disclosed without the consent of the individual. One of these cases is when the data is anonymised. However, the guidelines do not detail how this anonymisation would be achieved and ensured through the life cycle of the data, especially when the clause states that the data will also be collected without consent. The guidelines also state that the anonymised data could be used for public health management, clinical research, or academic research. The guidelines should have limited the scope of academic research or added certain criteria to gain access to the data; the use of vague terminology could lead to this data (sometimes collected without consent) being de-anonymised or used for studies that could cause harm to the data principal or even a particular community. The guidelines state that the data can be shared as ‘protected health information’ with a government agency for oversight activities authorised by law, epidemic control, or in response to court orders. With the sharing of data, care should be taken to ensure data minimisation and purpose limitations that go beyond the explanations added in the body of the guidelines. In addition, the guidelines also introduce the concept of a ‘clean room’, which is defined as “a secure sandboxed area with access controls, where aggregated and anonymised or de-identified data may be shared for the purposes of developing inference or training models”. The definition does not state who will be developing these training models; it could be a cause of worry if AI companies or even insurance companies have the potential to use this data to train models that could eventually make decisions based on the results. The term ‘sandbox’ is explained under the now revoked DP Bill 2021 as “such live testing of new products or services in a controlled or test regulatory environment for which the Authority may or may not permit certain regulatory relaxations for a&lt;br /&gt;specified period for the limited purpose of the testing”. Neither the 2019 Bill nor the IT Act/Rules defines ‘sandbox’; the guidelines should have ideally spent more time explaining how the sandbox system in the ‘Clean Room’ works.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The draft Data Sharing Guidelines are a welcome step in ensuring that the entities sharing and processing data have guidelines to adhere to, especially since the Data Protection Bill has not been passed yet. The mention of the best practices for data sharing in annexures, including practices for people who have access to the data, is a step in the right direction, which could be made better with regular training and sensitisation. While the guidelines are a good starting point, they still suffer from the issues that have been highlighted in similar health data policies, including not referring to older policies, adding new entities, and the reliance on digital and mobile technology. The guidelines could have added more nuance to the consent and privacy by design sections to ensure other forms of notice, e.g., notice in audio form in different Indian languages. While PM-JAY aims to reach 10 crore poor and vulnerable families, there is a need to look at how to ensure that consent is given according to the guidelines that are “free, informed, clear, and specific”.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/nha-data-sharing-guidelines'&gt;https://cis-india.org/internet-governance/blog/nha-data-sharing-guidelines&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas and Pallavi Bedi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2022-09-29T15:17:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/times-of-india-april-4-2017-ngos-individuals-urge-state-cms-to-curb-internet-shutdown">
    <title>NGOs, individuals urge state CMs to curb Internet shutdown</title>
    <link>https://cis-india.org/internet-governance/news/times-of-india-april-4-2017-ngos-individuals-urge-state-cms-to-curb-internet-shutdown</link>
    <description>
        &lt;b&gt;Amid rising instances of Internet curbs, a group of individuals and organisations have urged the chief ministers of 12 states to only restrict specific online content rather than resort to complete shutdown.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/business/india-business/ngos-individuals-urge-state-cms-to-curb-internet-shutdown/articleshow/58011598.cms"&gt;published in the Times of India&lt;/a&gt; on April 4, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;SFLC.in, a Delhi-based not-for-profit organisation, along with  various Internet-related firms have sent letters in this regard to the  chief ministers of these states impacted by Internet shutdowns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The letters have been written to the chief ministers of Uttar Pradesh, &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Nagaland"&gt;Nagaland&lt;/a&gt;, Manipur, Maharashtra, J&amp;amp;K, &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Jharkhand"&gt;Jharkhand&lt;/a&gt;, Rajasthan, Meghalaya, &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Arunachal-Pradesh"&gt;Arunachal Pradesh&lt;/a&gt;, &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Bihar"&gt;Bihar&lt;/a&gt;, &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Gujarat"&gt;Gujarat&lt;/a&gt; and Haryana.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The Internet shutdowns are imposed using state power under Section  144 by these specific states and not by the Union Government. The  central government is bound to follow the process under Section 69 IT  act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"These letters to the chief ministers of all 12 states, which have  been affected by Internet shutdowns till date, are an effort by us to  address the source of the problem," SFLC.in President and Legal Director  Mishi Choudhary told .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per Internet Shutdown tracker of SFLC, there have been 28  incidents of Internet closure in Jammu &amp;amp; Kashmir, 9 cases each in  Gujarat and Haryana, 8 in Rajasthan, 3 Nagaland, 2 cases each in Uttar  Pradesh, Bihar and Manipur and 1 incident each in Maharashtra,  Jharkhand, Meghalaya and Arunachal Pradesh since 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the tracker, far India has experienced a record number of 66  such incidents since 2012, with the number increasing more than  two-fold from 14 in 2015 to 31 in 2016.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The letters sent to the chief ministers urge them to "take  requisite action that would prohibit the issuance of orders that make  Internet services entirely inaccessible for a particular area, and  rather recommend that Section 69A and the procedure established by the  rules therein be applied to limit the restriction to certain specific  online content."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The signatories of the letters include the Centre for Internet and  Society, Digital Empowerment Foundation, Internet Democracy Project, IT  for Change and Society for Knowledge Commons, individuals like &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Anivar-Aravind"&gt;Anivar Aravind&lt;/a&gt; (Executive Director, Indic Project), IIT Bombay professor &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Kannan-Moudgalya"&gt;Kannan Moudgalya&lt;/a&gt; and others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We are hopeful that our efforts will make the government take in  account the enormous effects of Internet shutdowns on the  social-economic condition of our citizens and understand their plight,"  Choudhary said. PRS MKJ&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/times-of-india-april-4-2017-ngos-individuals-urge-state-cms-to-curb-internet-shutdown'&gt;https://cis-india.org/internet-governance/news/times-of-india-april-4-2017-ngos-individuals-urge-state-cms-to-curb-internet-shutdown&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Freedom</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2017-04-07T02:43:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/e-g-8-report-internet-rights">
    <title>NGOs say eG8 report must stress internet rights</title>
    <link>https://cis-india.org/news/e-g-8-report-internet-rights</link>
    <description>
        &lt;b&gt;More than 35 NGOs from around the world signed a joint declaration requesting that issues concerning freedom of speech be included in the report set to be presented to G8 heads of government by the organisers and participants of the eG8 Forum held in Paris. The news was published in TELECOMPAPER on May 26, 2011.&lt;/b&gt;
        
&lt;p&gt;Read the full story in&amp;nbsp;&lt;a class="external-link" href="http://www.telecompaper.com/news/ngos-say-eg8-report-must-stress-internet-rights"&gt;TELECOMPAPER&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/e-g-8-report-internet-rights'&gt;https://cis-india.org/news/e-g-8-report-internet-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-06-22T04:17:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/ngo-questions-peoples-privacy-in-uid-scheme">
    <title>NGO questions people's privacy in UID scheme</title>
    <link>https://cis-india.org/news/ngo-questions-peoples-privacy-in-uid-scheme</link>
    <description>
        &lt;b&gt;Taking a leaf out of the recommendations of the parliamentary standing committee on finance (SCF) that raised objections on the National Identification Authority of India Bill 2010, Delhi-based NGOs have called upon the Jharkhand government to stay the execution of UID projects in the state.  Jaideep Deogharia's article was published in the Times of India on 11 January 2012.&lt;/b&gt;
        
&lt;p&gt;Citing excerpts from the recommendations of the SCF, headed by BJP MP Yashwant Sinha, the NGO activists asserted that the MoU signed by the government on June 25, 2010, was without any legal and constitutional mandate.&lt;/p&gt;
&lt;p&gt;This claim, however, remains unfounded as the UIDAI is functioning under an executive order of the department of planning and has no links with the NIDAI Bill. The issue was recently clarified by the director general and mission director of UIDAI when he addressed the media in the capital during his three-day visit.&lt;br /&gt;&lt;br /&gt;Organizing a round table, report on SCF and its implications for Aadhaar project and National Population register for multipurpose National ID Card (MNIC),&lt;br /&gt;&lt;br /&gt;Citizens Forum for Civil Liberties member Gopal Krishna said given the fact that the Election Commission had shortlisted 15 documents as evidence of identity and citizenship, there was no need to have the 16th instrument (read UID).&lt;br /&gt;&lt;br /&gt;"It violates citizens' basic and constitutional right to privacy because collecting biometric information of an individual was limited to criminals," he said clarifying that even in case of prisoners, the fingerprint data is supposed to be deleted after acquittal under the Prisoner Identification Act.&lt;br /&gt;&lt;br /&gt;JT D'Souza, an expert in biometrics technology, Mumbai, gave a presentation on how biometric information was vulnerable to exploitation. Using a finger print reader, he demonstrated fake finger prints being read by the machine. He said a fingerprint on a semi solid wax slab can be filled up with adhesive and allowed to set for eight hours. "Once the adhesive block is removed, it takes up the exact marks of finger prints using which any finger print reader can be fooled," he said.&lt;/p&gt;
&lt;p&gt;Another participant, Sunil Abraham, director, Centre for Internet and Society, Bangalore, said there is no data protection or privacy law in place. "The UID project was allowed to march on without any protection being put in place," he said.&lt;br /&gt;&lt;br /&gt;"On one hand, the government wants its citizens to be transparent by giving all their biometric and demographic data, but on the other hand, people in higher authorities are making every bid to conceal facts and function in a non-transparent manner," he said.&lt;br /&gt;&lt;br /&gt;D' Souza also raised questions about the uniqueness of fingerprints as it has never been tested on a vast population. Citing examples from foreign countries where fingerprint studies have proved to be ineffectual in establishing non duplication, he said biometric data if hacked could be misused.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/ranchi/NGO-questions-peoples-privacy-in-UID-scheme/articleshow/11452679.cms"&gt;Read the original published in the Times of India&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ngo-questions-peoples-privacy-in-uid-scheme'&gt;https://cis-india.org/news/ngo-questions-peoples-privacy-in-uid-scheme&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-01-12T11:45:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts">
    <title>NGO invites public to peruse its accounts</title>
    <link>https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts</link>
    <description>
        &lt;b&gt;Domlur-based The Centre for Internet and Society opens its books for anyone to see and track every rupee of the Rs 13.13 crore it received from donors.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This article by Vandana Kamath was&lt;a class="external-link" href="http://www.bangaloremirror.com/index.aspx?page=article&amp;amp;sectid=10&amp;amp;contentid=201305182013051801054529377725430"&gt; published in the Bangalore Mirror&lt;/a&gt; on May 18, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In an unusual but ‘clean’ way of celebrating its fifth anniversary, a  city-based non-governmental organisation (NGO) has invited the general  public to inspect its books of accounts, check out its list of donors  and view contracts. At a time when several NGOs are under the scanner  for trying to shroud financial transactions in secrecy, The Centre for  Internet and Society (CIS), a non-profit research organisation that  defends consumer rights on the Internet, has upped its policy of  transparency a notch.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Located in Domlur and largely patronised by Bangalore’s tech  community, CIS’s books of accounts will be available for public scrutiny  during its fifth anniversary celebrations from May 20 to 23 and will  show how the NGO has spent the Rs 13.13 crore it has received from  donors since its launch.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speaking to Bangalore Mirror, CIS executive director Sunil Abraham  admitted that the move was to dispel any lingering doubts on the motives  of his organisation. “These days, many NGOs have been in the news for  misappropriation of donations,” Abraham said. “We want to keep our books  of accounts open to the public. Apart from details like salaries drawn  by each board member, many other details like contractual obligations  with entities, details of donors and official travel expenses by board  members can also be obtained. Anybody can walk into our office and ask  to see the accounts. A photocopy of all the details will also be given  to them at the earliest.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In fact, a recent debate in the Rajya Sabha centred on the lack of  transparency among NGOs receiving contributions from overseas after the  Foreign Contribution Regulation Act (FCRA) was passed in 2010. With 17  donors, a majority of who are from overseas, CIS ensures that every  rupee obtained is well spent and accounted for.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We have made public a list of donors and their share of  contributions to our society,” Abraham said. “This will give everybody a  clear picture of the funds we receive and where and how it is being  spent.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS is primarily funded by the Kusuma Trust, The Wikimedia  Foundation and The Hans Foundation among others. The society was founded  in 2008 and has 17 staff of whom four are based in Delhi and the rest  in Bangalore. The society also has seven distinguished fellows and five  fellows.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It conducts policy research programmes on topics like  accessibility, access to knowledge, openness, internet governance and  telecom. The society has churned out 641 research items in five years  that include essays, books and blog entries on the topics. It has also  conducted research on the accessibility of the e-governance system and  has suggested ways to make it more disabled-friendly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of its anniversary celebrations, the society will hold a  four-day event in its office starting May 20 that will include an  exhibition showcasing its activities so far. Various artists like Kiran  Subbaiah, Tara Kelton, Navin Thomas and Abhishekh Hazra are expected to  participate and give live demonstrations.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts'&gt;https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-05-21T14:38:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/new-trends-in-industry-self-governance">
    <title>New Trends in Industry Self-Governance </title>
    <link>https://cis-india.org/news/new-trends-in-industry-self-governance</link>
    <description>
        &lt;b&gt;Oxford Internet Institute, University of Oxford, UK and Media Change &amp; Innovation Division, IPMZ, University of Zurich, Switzerland and Nominet, UK is organising this workshop on November 7, 2012 at the seventh annual IGF meeting to be held in Baku, Azerbaijan. This workshop will be held in Conference Room 2, from 4.30 p.m. to 6.00 p.m. Sunil Abraham is one of the panelists at this workshop. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Concise description of the proposed workshop&lt;/b&gt;:&lt;br /&gt;Informal rule setting still plays a significant role in Internet governance. Non-governmental governance can occur at two levels: by shared rules negotiated through bodies like ICANN, and via private ordering by individual firms with significant market power. This panel will explore these two levels drawing on research into ICANN and two recent cases: the Google Books [non-] settlement, and several governments’ demands that service providers such as Research In Motion and Facebook give local law enforcement agencies access to user communications. &lt;br /&gt; &lt;br /&gt; Google’s project to digitize, index, and later to sell access to large numbers of out-of-print books is a leading example of an Internet-triggered shift from public to private regulation and the declining authority of copyright law. It triggered a major international controversy encompassing three class action lawsuits, a proposed and subsequently amended settlement by the litigating parties, more than 400 filings by class-members and "friends of the court" (including the French and German governments), two court hearings, various conferences, innumerous blog entries and articles. A New York federal district court ultimately rejected a proposed settlement between Google and representatives of book authors and publishers, stating that the issues would be “more appropriately decided by Congress than through an agreement among private, self-interested parties."&lt;br /&gt; &lt;br /&gt; While almost all states allow law enforcement agencies to intercept Internet communications, the growing use of encryption has restricted access to in-transit communications and social networking data. The governments of India and several Middle Eastern nations have all pressed Research In Motion to allow police access to BlackBerry encrypted messages, threatening otherwise to shut down services. RIM has installed local servers in several countries to meet these demands. The Indian government is reportedly now looking at encrypted services provided by Google and Skype. These and other online services, often hosted in the US, receive frequent requests from foreign law enforcement agencies for user data. Such requests have no statutory force, but may be voluntarily granted under US law – raising questions about user privacy and the oversight of this access.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These cases have much wider implications for other Internet services and users around the world. The proposed workshop will facilitate a multi-stakeholder exploration of these implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Four researchers will give precise, provocative five-minute opening statements on the key lessons for Internet rule setting from these cases. Each speaker will pose three specific questions on the accountability, viability and efficiency of these governance structures. These questions will kick-off roundtable discussion between the panelists from government, civil society, business and the technical community. The objective will be to draw out further lessons in how the public interest can best be protected in informal Internet governance processes, with contributions and questions from workshop and remote participants.representing official positions.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Background Paper&lt;/b&gt;:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Name of the organiser(s) of the workshop and their affiliation to various stakeholder groups:&lt;/b&gt;&lt;br /&gt;Ian Brown, Oxford Internet Institute, University of Oxford&lt;br /&gt; William Drake, University of Zurich Business, technical community, Civil Society, government co-sponsors in process (TBD)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Have you, or any of your co-organisers, organised an IGF workshop before?&lt;/b&gt;: Yes&lt;b&gt;&lt;br /&gt;Please provide link(s) to workshop(s) or report(s):&lt;/b&gt;&lt;a href="http://www.intgovforum.org/cms/index.php/component/chronocontact/?chronoformname=Workshopsreports2009View&amp;amp;curr=1&amp;amp;wr=84"&gt;&lt;br /&gt;http://www.intgovforum.org/cms/index.php/component/chronocontact/?chronoformname=Workshopsreports2009View&amp;amp;curr=1&amp;amp;wr=84&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Provide the names and affiliations of the panellists you are planning to invite:&lt;/b&gt;&lt;br /&gt;Sunil Abraham, Centre for Internet and Society, Bangalore&lt;br /&gt;Ian Brown, Oxford Internet Institute, University of Oxford (Moderator)&lt;br /&gt;William Drake, University of Zurich&lt;br /&gt;Jeanette Hoffman, Wissenschaftszentrum Berlin&lt;br /&gt;Emily Taylor, Independent Consultant, UK&lt;br /&gt;Rolf Weber, University of Zurich&lt;br /&gt;Google representative TBC&lt;br /&gt;Government representative TBC&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/new-trends-in-industry-self-governance'&gt;https://cis-india.org/news/new-trends-in-industry-self-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-10-04T11:37:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/new-standard-operating-procedures-for-lawful-interception-and-monitoring">
    <title>New Standard Operating Procedures for Lawful Interception and Monitoring</title>
    <link>https://cis-india.org/internet-governance/blog/new-standard-operating-procedures-for-lawful-interception-and-monitoring</link>
    <description>
        &lt;b&gt;Government issues new guidelines to TSP’s to assist Lawful Interception and Monitoring.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Even as the Central Government prepares the Central Monitoring System for the unrestricted monitoring of all personal communication, the Department of Telecom has issued new guidelines for Telecom Service Providers to assist in responding to requests for interception and monitoring of communications from security agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These guidelines do not appear to be publicly accessible, but according to news items, under the “Standard Operating Procedures for Lawful Interception and Monitoring of Telecom Service Providers”, the TSP’s must now provide for lawful interception and monitoring requests for voice calls, Short message Service (SMS), General Packet Radio Service (GPRS) and Value Added Service (VAS) including Multi Message Service (MMS), data and voice in 3G/4G/Long Term Evolution (LTE) including video call or Voice Over Internet protocol (VoIP). This move comes just days after the Home Ministry suggested that the Department of Telecom either change the rules under their Telecom Policies such as the Unified Access Service Licence (UASL) to include VoIP monitoring, or, drastically, block all VoIP services on the internet, which would include several communication applications including Skype and GTalk. (&lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2013-12-30/news/45711413_1_interception-solution-voip-indian-telegraph-act"&gt;See the article published by Economic Times&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The guidelines will supposedly also provide for some basic safeguards to ensure that non-authorized interception does not take place, such as ensuring that the interception is only to be provided by the Chief Nodal Officer of a TSP and only upon the issue of an order by the Home Secretary at the Central or State Government. Furthermore, these requests must only be in written, in untampered and sealed envelopes with no overwriting, etc. and bearing the order number issued by the concerned Secretary, with the date of the order. However, in exigent circumstances the order may be provided by email, provided that the physical copy is sent within two days of the order, else the interception order must be terminated. Inquiry processes are detailed under the new SOP’s which can verify whether the request was in original and addressed to the Nodal Officer and from which designated security agency it was issued, and can also verify the issue of an acknowledgment of compliance of the order by the TSP within two days of its receipt. The new guidelines also clarify the issue of interception of roaming subscribers by the State Government where the subscriber is registered. According to the guidelines, an order by the government of the state where such a caller has registered is sufficient and does not need vetting by the Home Secretary at the centre.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notwithstanding the additional “safeguards” against unlawful or unauthorized interception, the message to take away from these guidelines is the Government’s continued efforts to expand its surveillance regime to comprehensively monitor every action and every communication at its whim. These requests for monitoring, undertaken by “security agencies” which include taxation agencies and the SEBI, are flawed not merely because of the possibility of “unauthorized” interception, rather because the legal basis of the interception is vague, broad and widely susceptible to misuse, as the recent “snoopgate” allegations against the Gujarat government have shown. (&lt;a class="external-link" href="http://www.thehindu.com/news/national/other-states/parties-lock-horns-over-gujarat-wiretap-charges/article5358806.ece?ref=relatedNews"&gt;See the article published by the Hindu&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The current regime, based on a wide interpretation of Section 5(2) of the Indian Telegraph Act and the telecom policies of the Department of Telecom, do not have adequate safeguards for preventing misuse by those in power – such as the requirement of reasonable suspicion or a warrant. Without a sound legal basis for interception, which protects the privacy rights of individuals, any additional safeguards are more or less moot, since the real threat of intrusive surveillance and infringing of basic privacy exists regardless of whether it is done under the seal of the Home Secretary or not.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Resources&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/resources/rule-419-a-indian-telegraph-rules-1951" class="external-link"&gt;http://cis-india.org/internet-governance/resources/rule-419-a-indian-telegraph-rules-1951&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.thehindu.com/news/national/centre-issues-new-guidelines-for-phone-interception/article5559460.ece"&gt;http://www.thehindu.com/news/national/centre-issues-new-guidelines-for-phone-interception/article5559460.ece&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/new-standard-operating-procedures-for-lawful-interception-and-monitoring'&gt;https://cis-india.org/internet-governance/blog/new-standard-operating-procedures-for-lawful-interception-and-monitoring&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-20T05:13:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/new-rules-for-due-diligence">
    <title>New rules to ensure due diligence: IT dept</title>
    <link>https://cis-india.org/news/new-rules-for-due-diligence</link>
    <description>
        &lt;b&gt;Facing widespread criticism over new IT rules that put certain amount of liability on intermediaries like Google and Facebook for user-generated content, the government clarified that the rules are simply seeking "due diligence" on the part of websites and web hosts. This news was published in the Times of India on May 11, 2011.&lt;/b&gt;
        
&lt;p&gt;The new rules were notified on April 11. Activists and Internet companies say that the rules are archaic and loosely worded and may lead to harassment of web users and website owners. The Times of India was first to report on the issue on April 27.&lt;/p&gt;
&lt;p&gt;The ministry of information and technology said, "The terms specified in the rules are in accordance with the terms used by most of the intermediaries as part of their existing practices, policies and terms of service which they have published on their website."&lt;/p&gt;
&lt;p&gt;It also clarified the "department of telecommunication has reiterated that there is no intention of the government to acquire regulatory jurisdiction over content under these rules".&lt;/p&gt;
&lt;p&gt;The government has claimed that before it made the rules final, it had sought public comments over the draft. "None of the industry associations and other stakeholders objected to the formulation which is now being cited in some section of media," it claimed.&lt;/p&gt;
&lt;p&gt;However, sources told TOI that companies like Google had objected to loose wordings of the documents and asked government not to put any liability on intermediary for user-generated content on the web. "We too approached the government with our concerns. For our communication, we never received any acknowledgment," said Sunil Abraham, executive director at the Centre for Internet and Society (CIS).&lt;/p&gt;
&lt;p&gt;"Given the fact that final rules are more or less similar to the draft rules, I can say that nobody in the government took into account the objections raised by CIS and many other organizations," he added.&lt;/p&gt;
&lt;p&gt;Google had earlier told TOI that new rules would adversely affect businesses that depend upon online collaboration to prosper. "We believe that a free and open Internet is essential for the growth of digital economy and safeguarding freedom of expression.&lt;/p&gt;
&lt;p&gt;If Internet platforms are held liable for third party content, it would lead to self-censorship and reduce the free flow of information," a Google spokesperson said.&lt;/p&gt;
&lt;p&gt;Read the original published by the Times of India &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2011-05-11/internet/29531713_1_draft-rules-due-diligence-google-spokesperson"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/new-rules-for-due-diligence'&gt;https://cis-india.org/news/new-rules-for-due-diligence&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-05-23T06:12:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-krupa-joseph-june-10-2021-new-rules-leave-social-media-users-vulnerable">
    <title>New rules leave social media users vulnerable: Experts</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-krupa-joseph-june-10-2021-new-rules-leave-social-media-users-vulnerable</link>
    <description>
        &lt;b&gt;They analyse the implications of the government vs Twitter controversy on individual privacy&lt;/b&gt;
        &lt;p&gt;The article by Krupa Joseph was &lt;a class="external-link" href="https://www.deccanherald.com/metrolife/metrolife-your-bond-with-bengaluru/new-rules-leave-social-media-users-vulnerable-experts-993460.html"&gt;published in the Deccan Herald&lt;/a&gt; on 10 June 2021. Torsha Sarkar has been quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The government had notified the changes on February 25, and allowed social media companies three months to comply. Twitter and WhatsApp had then separately approached the Delhi High Court against the new regulations, fearing they could compromise user privacy.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;On Monday, the court gave Twitter three weeks to file a response to the government’s charge that it had not appointed a grievance officer as claimed.&lt;/p&gt;
&lt;p class="Default"&gt;&lt;strong&gt;Vague rules&lt;/strong&gt;&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;Karthik Srinivasan, communications consultant, who uses his blog Beast of Traal to comment on social media, says the new rules are “vague and open-ended”.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;“Coupled with the fact that we still do not have a data protection law, the rules could be severely misused both by government and private entities,” he says.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;Users are particularly vulnerable in a country where anything and everything offends a lot of people, he says.&lt;/p&gt;
&lt;p class="Default"&gt;&lt;strong&gt;Law overreach&lt;/strong&gt;&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;Torsha Sarkar, researcher with the Centre for Internet and Society, says the rules introduce additional obligations for social media platforms and classify intermediaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Intermediaries with over five million users would have obligations to introduce traceability, instal automated filtering, provide detailed grievance redressal mechanisms, and publish compliance &lt;span&gt; reports detailing action taken on takedown orders,” she says.&lt;/span&gt;&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;While some of these obligations are similar to those laid down internationally, some alterations are causing concern. The traceability requirement, for example, is highly contentious as it would erode user privacy.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;“It is also concerning that the user threshold, for a country like India, with such vast Internet usage, is set at a very low level. This means that even smaller social media platforms might becompelled to carry out economically crippling obligations,” she explains.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;The legislative overreach is seen in how the initial draft , which only covered entities like Twitter and Facebook, now seeks to cover digital news media and content curators like Netfl ixand Hulu, she says.&lt;/p&gt;
&lt;p class="Default"&gt;Stretching the scope of the legislation this way is undemocratic since it was not subject to any public consultation, she notes.&lt;/p&gt;
&lt;p class="Default"&gt;&lt;b&gt;Case in High Court&lt;/b&gt;&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;Mishi Choudhary, technology lawyer and founder of SFLC.in, a legal services organisation specialising in law, technology and policy, says the IT rules notified by the government are unconstitutional. “In the garb of addressing misinformation and regulating technology companies, the government has been exceeding the powers granted through subordinate legislation and using it for political purposes,” she says. It is on these grounds that the Free and Open Source Software community has challenged the new rules in the Kerala High Court. “Technology companies need regulation but not at the expense of user rights,” she says.&lt;/p&gt;
&lt;p class="Default"&gt;&lt;b&gt;Congress &lt;/b&gt;&lt;span&gt;‘&lt;/span&gt;&lt;b&gt;toolkit&lt;/b&gt;&lt;span&gt;’ &lt;/span&gt;&lt;b&gt;row&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few weeks after social media platforms were asked to take down posts critical of thegovernment’s management of India’s Covid-19 crisis, Twitter once again found itself at thereceiving end. Last week, Twitter labelled a tweet by BJP leader Sambit Patra, accusing theCongress of working with a ‘toolkit, as ‘manipulated media’. Twitter says it gives the label totweets that include media (videos, audio, and images) that are “deceptively altered orfabricated”. The Delhi police then sent a notice to Twitter in connection and asked the micro-blogging site to explain the reasons for assigning the tag. The police also conducted raids onTwitter offices in India. Things escalated when Twitter said the government was intimidating it. The government hit back saying law-making was its privileges, and Twitter, being a social media platform, should not dictate legal policy framework.&lt;/p&gt;
&lt;p class="Default"&gt;&lt;b&gt;New rules&lt;/b&gt;&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;Under the new IT rules, social media companies like Facebook, WhatsApp and Twitter will be responsible for identifying the originator of a flagged message within 36 hours. They also have to appoint a chief compliance officer, a nodal contact person and a resident grievance officer. Failing to comply with these rules would cause the platforms to lose their status as intermediaries, and make them liable for whatever is posted on their platforms.&lt;/p&gt;
&lt;p class="Default"&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-krupa-joseph-june-10-2021-new-rules-leave-social-media-users-vulnerable'&gt;https://cis-india.org/internet-governance/news/deccan-herald-krupa-joseph-june-10-2021-new-rules-leave-social-media-users-vulnerable&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Krupa Joseph</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2021-06-14T11:27:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-june-2-2017-komal-gupta-new-rules-for-govt-agencies-to-ensure-security-of-personal-data">
    <title>New rules for govt agencies to ensure security of personal data</title>
    <link>https://cis-india.org/internet-governance/news/livemint-june-2-2017-komal-gupta-new-rules-for-govt-agencies-to-ensure-security-of-personal-data</link>
    <description>
        &lt;b&gt;The new rules put the onus on government departments and agencies to safeguard personal data or information held by them.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Komal Gupta was &lt;a href="http://www.livemint.com/Politics/iTcwgoIUnkEnGSqOvekhUL/New-rules-for-govt-agencies-to-ensure-security-of-personal-d.html"&gt;published by Livemint&lt;/a&gt; on June 2, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Government departments handling personal data or information will have to ensure that end-users are made aware of the data usage and collection and their consent is taken either in writing or electronically, according to new guidelines issued by the government for security of personal data. Sensitive personal data such as passwords, financial information (bank account, credit card, debit card and other payment instrument details), medical records and history, sexual orientation, physical and mental health, and biometric information cannot be stored by agencies without encryption, say the guidelines issued by the ministry of electronics and information technology (IT) on 22 May.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rules put the onus on government departments and agencies to safeguard personal data or information held by them. To be sure, the Information Technology Act 2000 and Aadhaar Act 2016 have laid down most of these rules. The new guidelines seek answers to questions being asked on data protection under the Aadhaar Act. “If agency is storing Aadhaar number or sensitive personal information in database, data must be encrypted and stored. Encryption keys must be protected securely, preferably using Hardware Security Modules (HSMs). If simple spreadsheets are used, it must be password protected and securely stored,” according to the guidelines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In April, the IT Ministry issued a notification directing all government departments to remove any personal data published on their websites or through other avenues. The guidelines require regular audits to ensure effectiveness of data protection and also call for swift action on any breach of personal data. In cases where an Aadhaar number has to be printed, it should be truncated or masked. The guidelines say only the last four digits of the 12-digit unique identity number can be displayed or printed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to a research report issued by Bengaluru-based think tank Centre for Internet and Society on 1 May, four government portals could have made public around 130-135 million Aadhaar numbers and around 100 million bank account numbers.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-june-2-2017-komal-gupta-new-rules-for-govt-agencies-to-ensure-security-of-personal-data'&gt;https://cis-india.org/internet-governance/news/livemint-june-2-2017-komal-gupta-new-rules-for-govt-agencies-to-ensure-security-of-personal-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T13:51:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
