<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1 to 15.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/after-the-lockdown"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-niti-aayog-working-document-towards-responsible-aiforall"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/fundamental-right-to-privacy-three-years-of-the-puttaswamy-judgment"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-to-national-digital-health-mission-health-data-management-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/governing-id-india2019s-unique-identity-programme"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/governing-id-use-of-digital-id-in-the-healthcare-sector"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/compilation-of-research-on-data-protection"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/rbi-ban-on-cryptocurrencies-not-backed-by-any-data-or-statistics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/future-of-work-in-india-it-it-es-sector"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/igf-workshop-an-evidence-based-intermediary-liability-policy-framework"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/towards-algorithmic-transparency"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/mapping-web-censorship-net-neutrality-violations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/icann-begins-its-sojourn-into-open-data"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/after-the-lockdown">
    <title>After the Lockdown</title>
    <link>https://cis-india.org/internet-governance/blog/after-the-lockdown</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;div&gt;
&lt;p&gt;This post was first published in the &lt;a class="external-link" href="https://www.business-standard.com/article/opinion/after-the-lockdown-120040200010_1.html"&gt;Business Standard&lt;/a&gt;, on April 2, 2020.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
This is a time when, as 
the authorities deal with a lockdown, there needs to be an equal 
emphasis on providing for large numbers of people without the money for 
food and necessities, while the rest of us wait it out. Hard as it is, 
an MIT scholar writes that after the Spanish flu in 1918, cities that 
restricted public gatherings sooner and longer had fewer fatalities, and
 emerged with stronger economic growth.&lt;a href="https://www.reuters.com/article/us-health-coronavirus-usa-reopen-analysi/the-u-s-weighs-the-grim-math-of-death-vs-the-economy-idUSKBN21H1B4" target="_blank"&gt;&lt;strong&gt;1&lt;/strong&gt;&lt;/a&gt;&amp;nbsp;It
 is likely that costs and benefits vary with economic and social 
capacity, and we may have a harder time with it here. Going forward, 
government action to help provide relief, rehabilitate people and deal 
with loss needs to be well planned, including targeting aid to the urban
 and displaced poor.&lt;strong&gt;&lt;a href="https://www.financialexpress.com/opinion/the-coronavirus-lockdown-and-indias-urban-vulnerables/1915316/" target="_blank"&gt;2&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
As important now as to 
ensure the&amp;nbsp;lockdown continues is to plan on how to revive productive 
activity and the economy, and restore public confidence. A systematic 
approach will likely yield better results.&lt;/div&gt;
&lt;div&gt;
A major element of the 
recovery plan is steps such as liberal credit and amortisation terms, 
perhaps much more than the three-month extension the&amp;nbsp;Reserve Bank of 
India (RBI) has announced. A primary purpose is the re-initiation of 
large-scale activities such as construction, of which there are 
reportedly about 200,000 large projects around the country. These have 
to be nursed back to being going concerns. The RBI may need to consider 
doing more, including lowering rates.&lt;/div&gt;
&lt;div&gt;
An ominous development 
that has grown as the economy slowed is financial stress that could 
swell non-performing assets (NPAs). At the half-year ending September 
2019, about half of non-financial large corporations in India, excluding
 telecom, showed financial stress (&lt;em&gt;see table&lt;/em&gt;).&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;a style="text-align: center;" href="https://1.bp.blogspot.com/-LUGInMPm0qA/XoX9HV4-HBI/AAAAAAAAHio/bpAUXcOxJ2AZ3mHTisIdMGLnbon7r5YpQCLcBGAsYHQ/s1600/Indebted%2BFirms-Likely%2BFinancial%2BHeadwinds-Krishna%2BKant-BS.jpg"&gt;&lt;img src="https://1.bp.blogspot.com/-LUGInMPm0qA/XoX9HV4-HBI/AAAAAAAAHio/bpAUXcOxJ2AZ3mHTisIdMGLnbon7r5YpQCLcBGAsYHQ/s320/Indebted%2BFirms-Likely%2BFinancial%2BHeadwinds-Krishna%2BKant-BS.jpg" alt="null" height="320" width="205" /&gt;&lt;/a&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Source: Krishna Kant:&amp;nbsp;"Coronavirus shutdown puts Rs 15-trillion debt at risk, to impact finances", BS, March 30, 2020:&lt;/p&gt;
&lt;div&gt;&lt;a href="https://www.business-standard.com/article/markets/coronavirus-shutdown-puts-rs-15-trillion-debt-at-risk-to-impact-finances-120032901036_1.html"&gt;https://www.business-standard.com/article/markets/coronavirus-shutdown-puts-rs-15-trillion-debt-at-risk-to-impact-finances-120032901036_1.html&lt;/a&gt;&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div&gt;
These include some of 
India’s largest companies, producing power, steel, and chemicals. The 
201 companies have total debt of nearly Rs 15 trillion, more than half 
of all borrowings. There is also the debt overhang of the National 
Highways Authority of India, and of the telecom companies. Ironically, 
the telecom companies are our lifeline now, despite having nearly 
collapsed under debt because of ill-advised policies in the past, which 
have still not changed. Perhaps our obvious dependence telecom services 
now will spark well conceived,&amp;nbsp;convergent policies for this sector, so that we can function effectively.&amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
A start with immediate 
changes in administrative rules for 60GHz, 70-80GHz, and 500-700MHz 
wireless use, modelled on the US FCC regulations as was done for the 
5GHz Wi-Fi in October 2018, could change the game. It will provide the 
opportunity in India for the innovation of devices, their production, 
and use, possibly unleashing this sector. This can help offset our 
reliance on imported technology and equipment. However, such changes in 
policies and purchasing support have eluded us thus far. Now, the only 
way our high-technology manufacturers can thrive is to succeed 
internationally, in order to be able to sell to the domestic market. 
Imagine how hard that might be, and you begin to get an inkling of why 
we have few domestic product champions, struggling against odds in areas
 such as optical switches, networking equipment, and wireless devices. 
For order-of-magnitude change, however, structural changes need to be 
worked out in consultation with operators in the organisation of 
services through shared infrastructure.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;For the longer term, a&amp;nbsp;fundamental
 reconsideration for allocating resources is needed through coherent, 
orchestrated policy planning and support. What the government can do as a
 primary responsibility, besides ensuring law and order and security, is
 to develop our inadequate and unreliable infrastructure, including 
facilities and services that enable efficient production clusters, their
 integrated functioning, and skilling. For instance, Apple’s recent 
decision against moving iPhone production
 from China to India was reportedly because similar large facilities 
(factories of 250,000) are not feasible here, and second, our logistics 
are inadequate. Such considerations should be factored into our 
planning, although Apple may well have to revisit the very 
sustainability of the concept of outsize facilities that require the 
sort of repressive conditions prevailing in China. However, we need not 
aim for building unsustainable mega-factories. Instead, a more practical
 approach may be to plan for building agglomerations of smaller, 
sustainable units, that can aggregate their activity and output 
effectively and efficiently. Such developments could form the basis of 
numerous viable clusters, and where possible, capitalise on existing 
incipient clusters of activities. Such infrastructure needs to be 
extended to the countryside for agriculture and allied activities as 
well, so that productivity increases with a change from rain-fed, 
extensive cultivation to intensive practices, with more controlled 
conditions.&lt;/p&gt;
&lt;p&gt;The automotive industry,
 the largest employer in manufacturing, provides an example for other 
sectors. It was a success story like telecom until recently, but is now 
floundering, partly because of inappropriate policies, despite its 
systematic efforts at incorporating collaborative planning and working 
with the government. It has achieved the remarkable transformation of 
moving from BS-IV to BS-VI emission regulations in just three years, 
upgrading by two levels with an investment of Rs 70,000 crore, whereas 
European companies have taken five to six years to upgrade by one level.
 This has meant that there was no time for local sourcing, and therefore
 heavy reliance on global suppliers, including China. While the 
collaborative planning model adopted by the industry provides a model 
for other sectors, the question here is, what now. In a sense, it was 
not just the radical change in market demand with the advent of 
ridesharing and e-vehicles, but also the government’s approach to 
policies and taxation that aggravated its difficulties.&lt;/p&gt;
&lt;div&gt;
Going forward, policies 
that are more congruent in terms of societal goals, including employment
 that support the development of large manufacturing opportunities, need
 to be thought through from a perspective of aligning and integrating 
objectives (in this case, transportation). Areas such as automotive and 
other industries for the manufacture of road and rail transport vehicles
 need to be considered from the perspective of reconfiguring the 
purpose, flow, and value-added, to achieve both low-cost, accessible 
mass transport, and vehicles for private use that complement 
transportation objectives as also employment and welfare.&lt;/div&gt;
&lt;div&gt;
Systematic and convergent planning and implementation across sectors could help achieve a better revival.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
Shyam (no space) Ponappa at gmail dot com&lt;/div&gt;
&lt;div&gt;
&lt;em&gt;1: &lt;a href="https://www.reuters.com/article/us-health-coronavirus-usa-reopen-analysi/the-u-s-weighs-the-grim-math-of-death-vs-the-economy-idUSKBN21H1B4"&gt;https://www.reuters.com/article/us-health-coronavirus-usa-reopen-analysi/the-u-s-weighs-the-grim-math-of-death-vs-the-economy-idUSKBN21H1B4&lt;/a&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;
&lt;em&gt;2: &lt;a href="https://www.financialexpress.com/opinion/the-coronavirus-lockdown-and-indias-urban-vulnerables/1915316/"&gt;https://www.financialexpress.com/opinion/the-coronavirus-lockdown-and-indias-urban-vulnerables/1915316/&lt;/a&gt;&lt;/em&gt;&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div class="column-right-outer"&gt;
&lt;div class="column-right-inner"&gt;
&lt;table class="section-columns columns-2"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td class="first columns-cell"&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td class="columns-cell"&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/after-the-lockdown'&gt;https://cis-india.org/internet-governance/blog/after-the-lockdown&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shyam Ponappa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-04-09T10:05:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-niti-aayog-working-document-towards-responsible-aiforall">
    <title> Comments on NITI AAYOG Working Document: Towards Responsible #AIforAll</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-niti-aayog-working-document-towards-responsible-aiforall</link>
    <description>
        &lt;b&gt;The NITI Aayog Working Document on Responsible AI for All released on 21st July 2020 serves as a significant statement of intent from NITI Aayog, acknowledging the need to ensure that any conception of “Responsible AI” must fulfill constitutional responsibilities, incorporated through workable principles. However, as it is a draft document for discussion, it is important to highlight next steps for research and policy levers to build upon this report.&lt;/b&gt;
        
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Read our comments in their entirety &lt;a href="https://cis-india.org/internet-governance/comments-to-aiforall-pdf" class="internal-link" title="Comments to AIForAll pdf"&gt;here&lt;/a&gt;.&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-niti-aayog-working-document-towards-responsible-aiforall'&gt;https://cis-india.org/internet-governance/blog/comments-on-niti-aayog-working-document-towards-responsible-aiforall&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas, Arindrajit Basu and Ambika Tandon</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2020-08-18T06:25:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/fundamental-right-to-privacy-three-years-of-the-puttaswamy-judgment">
    <title>Fundamental Right to Privacy — Three Years of the Puttaswamy Judgment</title>
    <link>https://cis-india.org/internet-governance/blog/fundamental-right-to-privacy-three-years-of-the-puttaswamy-judgment</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p id="docs-internal-guid-bf702073-7fff-fb00-21f6-28515e6faf55" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Today marks three years since the Supreme Court of India recognised the fundamental right to privacy, but the ideals laid down in the Puttaswamy Judgment are far from being completely realized. Through our research, we invite you to better understand the judgment and its implications, and take stock of recent issues pertaining to privacy.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Amber Sinha dissects the Puttaswamy Judgment through an analysis of the sources, scope and structure of the right, and its possible limitations. [&lt;a href="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis"&gt;link&lt;/a&gt;]&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;ol start="2"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Through a visual guide to the fundamental right to privacy, Amber Sinha and Pooja Saxena trace how courts in India have viewed the right to privacy since Independence, explain how key legal questions were resolved in the Puttaswamy Judgement, and provide an account of the four dimensions of privacy — space, body, information and choice — recognized by the Supreme Court. [&lt;a href="https://cis-india.org/internet-governance/files/amber-sinha-and-pooja-saxena-the-fundamental-right-to-privacy-a-visual-guide/view"&gt;link&lt;/a&gt;]&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;ol start="3"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Based on publicly available submissions, press statements, and other media reports, Arindrajit Basu and Amber Sinha track the political evolution of the data protection ecosystem in India, on EPW Engage. They discuss how this has, and will continue to impact legislative and policy developments. [&lt;a href="https://www.epw.in/engage/article/politics-indias-data-protection-ecosystem"&gt;link&lt;/a&gt;]&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;ol start="4"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;For the AI Policy Exchange, Arindrajit Basu and Siddharth Sonkar examine the&amp;nbsp; Automated Facial Recognition Systems (AFRS), and define the key legal and policy questions related to privacy concerns around the adoption of AFRS by governments around the world. [&lt;a href="https://aipolicyexchange.org/2019/12/26/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns/"&gt;link&lt;/a&gt;]&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;ol start="5"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Over the past decade, reproductive health programmes in India have been digitising extensive data about pregnant women. In partnership with Privacy International, we studied the Mother and Child Tracking system (MCTS), and Ambika Tandon presents the impact on the privacy of mothers and children in the country. [&lt;a href="https://cis-india.org/internet-governance/blog/privacy-international-ambika-tandon-october-17-2019-mother-and-child-tracking-system-understanding-data-trail-indian-healthcare"&gt;link&lt;/a&gt;]&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;ol start="6"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;While the right to privacy can be used to protect oneself from state surveillance, Mira Swaminathan and Shubhika Saluja write about the equally crucial problem of lateral surveillance — surveillance that happens between individuals, and within neighbourhoods, and communities — with a focus on this issue during the COVID-19 crisis. [&lt;a href="https://cis-india.org/internet-governance/blog/essay-watching-corona-or-neighbours-introducing-2018lateral-surveillance2019-during-covid201919"&gt;link&lt;/a&gt;]&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;ol start="7"&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Finally, take a dive into the archives of the Centre for Internet and Society to read our work, which was cited in the Puttaswamy judgment — essays by Ashna Ashesh, Vidushi Marda and Bhairav Acharya that displaced the notion that privacy is inherently a Western concept, by attempting to locate the constructs of privacy in Classical Hindu [&lt;a href="https://cis-india.org/internet-governance/blog/loading-constructs-of-privacy-within-classical-hindu-law"&gt;link&lt;/a&gt;], and Islamic Laws [&lt;a href="https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law"&gt;link&lt;/a&gt;]; and Acharya’s article in the Economic and Political Weekly, which highlighted the need for privacy jurisprudence to reflect theoretical clarity, and be sensitive to unique Indian contexts [&lt;a href="https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india"&gt;link&lt;/a&gt;].&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/fundamental-right-to-privacy-three-years-of-the-puttaswamy-judgment'&gt;https://cis-india.org/internet-governance/blog/fundamental-right-to-privacy-three-years-of-the-puttaswamy-judgment&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2020-08-24T07:46:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-to-national-digital-health-mission-health-data-management-policy">
    <title>Comments to National Digital Health Mission: Health Data Management Policy </title>
    <link>https://cis-india.org/internet-governance/blog/comments-to-national-digital-health-mission-health-data-management-policy</link>
    <description>
        &lt;b&gt;CIS has submitted comments to the National Health Data Management Policy. We welcome the opportunity provided to our comments on the Policy and we hope that the final Policy will consider the interests of all the stakeholders to ensure that it protects the privacy of the individual while encouraging a digital health ecosystem.
&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Read the full set of comments &lt;a href="https://cis-india.org/internet-governance/comments-to-national-digital-health-mission-health-data-management-policy-pdf" class="internal-link" title="Comments to National Digital Health Mission: Health Data Management Policy pdf"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-to-national-digital-health-mission-health-data-management-policy'&gt;https://cis-india.org/internet-governance/blog/comments-to-national-digital-health-mission-health-data-management-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas, Pallavi Bedi, Shweta Reddy, and Saumyaa Naidu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Healthcare</dc:subject>
    

   <dc:date>2020-10-05T15:56:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns">
    <title>Decrypting Automated Facial Recognition Systems (AFRS) and Delineating Related Privacy Concerns</title>
    <link>https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns</link>
    <description>
        &lt;b&gt;Arindrajit Basu and Siddharth Sonkar have co-written this blog as the first of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems?&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The use of aggregated Big Data by governments has the potential to 
exacerbate power asymmetries and erode civil liberties like few 
technologies of the past. In order to guard against the aggressive&amp;nbsp; 
aggregation&amp;nbsp;and manipulation of&amp;nbsp;the data generated by individuals&amp;nbsp;who 
are branded&amp;nbsp;as suspect, it is critical that our firmly established 
constitutional rights protect human dignity in the face of this 
potential erosion.&lt;/p&gt;
&lt;p&gt;The increasing ubiquity of Automated Facial Recognition Systems 
(AFRS) serve as a prime example of the rising desire of governments to 
push fundamental rights to the brink. With AFRS, the core fundamental 
right in question is privacy, although questions have been posed 
regarding the potential violation of&amp;nbsp;other related rights, such as the 
Right to Equality and the Right to Free Speech and Expression, as well.&lt;/p&gt;
&lt;p&gt;There is a rich corpus of literature, (see &lt;a href="https://indianexpress.com/article/opinion/columns/digital-identification-facial-recognition-system-ncrb-5859072/" rel="noreferrer noopener" target="_blank"&gt;here&lt;/a&gt;, &lt;a href="http://www.unswlawjournal.unsw.edu.au/wp-content/uploads/2017/09/40-1-11.pdf" rel="noreferrer noopener" target="_blank"&gt;here&lt;/a&gt; and an excellent recent paper by Smriti Parsheera &lt;a href="http://datagovernance.org/report/adoption-and-regulation-of-facial-recognition-technologies-in-india" rel="noreferrer noopener" target="_blank"&gt;here)&lt;/a&gt;
 from a diverse coterie of scholars that call out the challenges posed 
by AFRS, particularly with respect to its proportionality as a 
restriction over the right to privacy. Our contribution to this 
discourse focuses on a very specific question around a ‘reasonable 
expectation of privacy’ — the standard identified for the protection of 
privacy in public spaces across jurisdictions, including in India. This 
is because at this juncture, the precise nature of the AFRS which will 
eventually be used and the regulations it will be subject to are not 
clear.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In &lt;a href="https://indiankanoon.org/doc/91938676/'"&gt;Retd. K.S &lt;/a&gt;&lt;a href="https://indiankanoon.org/doc/91938676/" rel="noreferrer noopener" target="_blank"&gt;Puttaswamy (Retd.) v. Union of India&lt;/a&gt;:
 Justice Chandrachud (Puttaswamy I), the Indian Supreme Court was 
concerned with the question whether there exists a fundamental right to 
privacy under the Indian Constitution. A nine-judge bench of the Court 
recognized that the right to privacy is a fundamental right implicit 
inter alia in the right to life within Article 21 of the Constitution.&lt;/p&gt;
&lt;p&gt;The right to privacy protects people and not places. Every person is 
entitled, however, to a reasonable expectation of privacy. The 
expectation of privacy must be twofold. First, the person must prove 
that the alleged act could inflict some harm. Such harm must be real and
 not be speculative or imaginary. Second, society must recognize this 
expectation as reasonable. The test of reasonable expectations is 
contextual, i.e., the extent to which it safeguards privacy depends on 
the place at which the individual is.&lt;/p&gt;
&lt;p&gt;In order to pass any constitutional test, therefore, AFRS must 
satisfy the ‘reasonable expectation’ test articulated in Puttaswamy. 
However, in this context, the test itself has multiple contours. Do we 
have a right to privacy in a public place? Is AFRS collecting any data 
that specifically violates a right to privacy? Is the aggregation of 
that data a potential violation?&lt;/p&gt;
&lt;p&gt;After providing a brief introduction to the use cases of AFRS in 
India and across the world, we embark upon answering all these 
questions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Primer on Automated Facial Recognition Systems (AFRS)&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Facial recognition is a biometric technology that utilises cameras to
 match stored or live footage of individuals (including both stills and 
moving footage) with images or video&amp;nbsp;from an existing database. Some 
systems might also be used to analyze broader demographic trends or 
conduct sentiment analysis through crowd scanning.&lt;/p&gt;
&lt;p&gt;While the use of photographs and video footage have been core 
components of police investigation, the use of algorithms to process 
vast tracts of Big Data (characterized by ‘Volume, Velocity, and 
Variety), and compare disparate and discrete data points allows for the 
derivation of hitherto unfeasible insights on the subjects of Big Data.&lt;/p&gt;
&lt;p&gt;The utilisation of AFRS for law enforcement is rapidly spreading around the world. &lt;a href="https://carnegieendowment.org/2019/09/17/global-expansion-of-ai-surveillance-pub-79847" rel="noreferrer noopener" target="_blank"&gt;A Global AI Surveillance Index&lt;/a&gt;
 compiled by the Carnegie Endowment for International Peace found that 
at least sixty-four countries are incorporating facial recognition 
systems into their AI surveillance programs.&lt;/p&gt;
&lt;p&gt;Chinese technology company Yitu has entered into a partnership with 
security forces in Malaysia to equip police officers with facial 
recognition body cameras that, powered by enabling technologies, would 
allow a comparison of images caught by the live body cameras with images
 from several central databases.&lt;/p&gt;
&lt;p&gt;In &lt;a href="https://news.sky.com/story/met-polices-facial-recognition-tech-has-81-error-rate-independent-report-says-11755941" rel="noreferrer noopener" target="_blank"&gt;England and Wales&lt;/a&gt;,
 London Metropolitan Police, South Wales Police, and Leicestershire 
Police are all in the process of developing technologies that allow for 
the identification and comparison of live images with those stored in a 
database.&lt;/p&gt;
&lt;p&gt;The technology is being developed by Japanese firm NEC and the police
 force has limited ability to oversee or modify the software, given its 
proprietary nature. The Deputy Chief of South Wales Police stated that 
“the tech is given to [them] as a sealed box… [and the police force 
themselves] have no input – whatever it does, it does what it does.”&lt;/p&gt;
&lt;p&gt;In the US, &lt;a href="https://www.americanbar.org/groups/criminal_justice/publications/criminal-justice-magazine/2019/spring/facial-recognition-technology/" rel="noreferrer noopener" target="_blank"&gt;Baltimore’s police&lt;/a&gt;
 set up facial recognition cameras to track and arrest protestors — a 
system that reached its zenith during the 2018 riots in the city.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It is suspected that authorities in &lt;a href="https://www.japantimes.co.jp/news/2019/10/23/asia-pacific/hong-kong-protests-ai-facial-recognition-tech/#.Xf1Fs_zhVPY" rel="noreferrer noopener" target="_blank"&gt;Hong Kong&lt;/a&gt; are also using AFRS to clamp down on the ongoing pro-democracy protests.&lt;/p&gt;
&lt;p&gt;In India, the Ministry of Home Affairs, through the National Crime Records Bureau put out a &lt;a href="http://ncrb.gov.in/TENDERS/AFRS/RFP_NAFRS.pdf" rel="noreferrer noopener" target="_blank"&gt;tender for a new AFRS&lt;/a&gt;,
 whose stated objective is to “act as a foundation for national level 
searchable platform of facial images.” The AFRS will pull facial image 
data from CCTV feeds and compare these with existing records across 
databases including the Crime and Criminal Tracking Networks and Systems
 (CCTNS), Inter-operable Criminal Justice System (or ICJS), Immigration 
Visa Foreigner Registration Tracking (IVFRT), Passport, Prisons and 
state police records.&lt;/p&gt;
&lt;p&gt;Plans are also afoot to integrate this with the yet to be deployed 
National Automated Fingerprint Identification System (NAFIS), thereby 
creating a multi-faceted surveillance system.&lt;/p&gt;
&lt;p&gt;Despite raising eyeballs due to its potential all-pervasive scope, 
this tender is not the first instance of AFRS being used by Indian 
authorities. Punjab Police, &lt;a href="https://www.livemint.com/AI/DIh6fmR6croUJps6x7JW5K/Meet-Staqu-a-startup-helping-Indian-law-enforcement-agencie.html" rel="noreferrer noopener" target="_blank"&gt;in partnership with Gurugram-based start-up Staqu&lt;/a&gt;
 has launched and commenced implementation of&amp;nbsp; the Punjab Artificial 
Intelligence System (PAIS) which uses digitised criminal records and 
automated facial recognition to retrieve information on a suspected 
criminal and essentially tracks their public whereabouts, which poses 
potential constitutional questions.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This was published by &lt;a class="external-link" href="https://aipolicyexchange.org/2019/12/26/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns/"&gt;AI Policy Exchange&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns'&gt;https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu, Siddharth Sonkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-01-02T14:01:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework">
    <title>Governing ID: Introducing our Evaluation Framework</title>
    <link>https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;div class="content"&gt;
&lt;p&gt;With the rise of national digital identity systems (Digital ID) across the world, there is a growing need to examine their impact on human rights. In several instances, national Digital ID programmes started with a specific scope of use, but have since been deployed for different applications, and in different sectors. This raises the question of how to determine appropriate and inappropriate uses of Digital ID. In April 2019, our research began with this question, but it quickly became clear that a determination of the legitimacy of uses hinged on the fundamental attributes and governing structure of the Digital ID system itself. Our evaluation framework is intended as a series of questions against which Digital ID may be tested. We hope that these questions will inform the trade-offs that must be made while building and assessing identity programmes, to ensure that human rights are adequately protected.&lt;/p&gt;
&lt;h4&gt;Rule of Law Tests&lt;/h4&gt;
&lt;p&gt;Foundational Digital ID must only be implemented along with a 
legitimate regulatory framework that governs all aspects of Digital ID, 
including its aims and purposes, the actors who have access to it, etc. 
In the absence of this framework, there is nothing that precludes 
Digital IDs from being leveraged by public and private actors for 
purposes outside the intended scope of the programme. Our rule of law 
principles mandate that the governing law should be enacted by the 
legislature, be devoid of excessive delegation, be clear and accessible 
to the public, and be precise and limiting in its scope for discretion. 
These principles are substantiated by the criticism that the Kenyan 
Digital ID, the Huduma Namba, was met with when it was legalized through
 a Miscellaneous Amendment Act, meant only for small or negligible 
amendments and typically passed without any deliberation. These set of 
tests respond to the haste with which Digital ID has been implemented, 
often in the absence of an enabling law which adequately addresses its 
potential harms.&lt;/p&gt;
&lt;h4&gt;Rights based Tests&lt;/h4&gt;
&lt;p&gt;Digital ID, because of its collection of personal data and 
determination of eligibility and rights of users, intrinsically involves
 restrictions on certain fundamental rights. The use of Digital ID for 
essential functions of the State, including delivery of benefits and 
welfare, and maintenance of civil and sectoral records, enhance the 
impact of these restrictions. Accordingly, the entire identity 
framework, including its architecture, uses, actors, and regulators, 
must be evaluated at every stage against the rights it is potentially 
violating. Only then will we be able to determine if such violation is 
necessary and proportionate to the benefits it offers. In Jamaica, the 
National Identification and Registration Act, which mandated citizens’ 
biometric enrolment at the risk of criminal sanctions, was held to be a 
disproportionate violation of privacy, and therefore unconstitutional.&lt;/p&gt;
&lt;h4&gt;Risk based Tests&lt;/h4&gt;
&lt;p&gt;Even with a valid rule of law framework that seeks to protect 
rights, the design and use of Digital ID must be based on an analysis of
 the risks that the system introduces. This could take the form of 
choosing between a centralized and federated data-storage framework, 
based on the effects of potential failure or breach, or of restricting 
the uses of the Digital ID to limit the actors that will benefit from 
breaching it. Aside from the design of the system, the regulatory 
framework that governs it should also be tailored to the potential risks
 of its use. The primary rationale behind a risk assessment for an 
identity framework is that it should be tested not merely against 
universal metrics of legality and proportionality, but also against an 
examination of the risks and harms it poses. Implicit in a risk based 
assessment is also the requirement of implementing a responsive 
mitigation strategy to the risks identified, both while creating and 
governing the identity programme.&lt;/p&gt;
&lt;p&gt;Digital ID programmes create an inherent power imbalance 
between the State and its residents because of the personal data they 
collect and the consequent determination of significant rights, 
potentially creating risks of surveillance, exclusion, and 
discrimination. The accountability and efficiency gains they promise 
must not lead to hasty or inadequate implementation.&lt;/p&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework'&gt;https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shruti Trikanad</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2020-03-02T08:03:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/governing-id-india2019s-unique-identity-programme">
    <title>Governing ID: India’s Unique Identity Programme</title>
    <link>https://cis-india.org/internet-governance/governing-id-india2019s-unique-identity-programme</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;div class="content"&gt;
&lt;p&gt;In our second case-study, we use our Evaluation Framework for Digital ID to assess India’s Unique Identity Programme.&lt;/p&gt;
&lt;p&gt;Read the &lt;a class="external-link" href="https://digitalid.design/evaluation-framework-case-studies/india.html"&gt;case-study&lt;/a&gt; or download as &lt;a href="https://cis-india.org/internet-governance/digital-id-india-case-study" class="internal-link" title="Digital ID India Case Study"&gt;PDF&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/governing-id-india2019s-unique-identity-programme'&gt;https://cis-india.org/internet-governance/governing-id-india2019s-unique-identity-programme&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vrinda Bhandari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2020-03-02T11:38:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/governing-id-use-of-digital-id-in-the-healthcare-sector">
    <title>Governing ID: Use of Digital ID in the Healthcare Sector</title>
    <link>https://cis-india.org/internet-governance/blog/governing-id-use-of-digital-id-in-the-healthcare-sector</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;In our third case-study, we use our Evaluation Framework for Digital ID to examine the use of Digital ID in the healthcare sector.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/internet-governance/image-digital-id-healthcare-case-study/" alt="null" width="100%" /&gt;&lt;/p&gt;
&lt;p&gt;Read the &lt;a class="external-link" href="https://digitalid.design/evaluation-framework-case-studies/healthcare.html"&gt;case-study&lt;/a&gt; or download as &lt;a href="https://cis-india.org/internet-governance/digital-id-healthcare-case-study" class="internal-link" title="Digital ID Healthcare Case Study"&gt;PDF&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/governing-id-use-of-digital-id-in-the-healthcare-sector'&gt;https://cis-india.org/internet-governance/blog/governing-id-use-of-digital-id-in-the-healthcare-sector&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shruti Trikanad</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2020-03-02T13:21:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/compilation-of-research-on-data-protection">
    <title>A Compilation of Research on the PDP Bill</title>
    <link>https://cis-india.org/internet-governance/blog/compilation-of-research-on-data-protection</link>
    <description>
        &lt;b&gt;The most recent step in India’s initiative to create an effective and comprehensive Data Protection regime was the call for comments to the Personal Data Protection Bill, 2019, which closed last month. Leading up to the comments, CIS has published numerous research pieces with the goal of providing a comprehensive overview of how this legislation would place India within the global scheme, and how the local situation has developed, as well as analysing its impacts on citizens’ rights.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In addition to general and clause-by-clause comments and recommendations, we
 have compiled an annotated version of the Personal Data Protection 
Bill, which lays out our &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019"&gt;commentary&lt;/a&gt; in an easy-to-follow format.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/internet-governance/pdp-bill-compilation-post-image/" alt="null" width="100%" /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Below, you can find our other recent research on Data Protection:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Pallavi Bedi has put together a &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/divergence-between-the-general-data-protection-regulation-and-the-personal-data-protection-bill-2019"&gt;note&lt;/a&gt; on the Divergence between EU’s General Data Protection Regulation (GDPR) and the Personal Data Protection Bill.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;In addition, Pallavi has also &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/comparison-of-the-personal-data-protection-bill-with-the-general-data-protection-regulation-and-the-california-consumer-protection-act-2"&gt;contrasted&lt;/a&gt; the Personal Data Protection Bill with the GDPR and California Consumer Protection Act, in the contexts of jurisdiction and scope, rights of the data principal, obligations of data fiduciaries, exemptions, data protection authority, and breach of personal data. &lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;On IAPP’s blog &lt;em&gt;Privacy Perspectives&lt;/em&gt;, D. Shweta Reddy has &lt;a class="external-link" href="https://iapp.org/news/a/grade-sheet-for-indias-adequacy-status/"&gt;assessed&lt;/a&gt; whether the Personal Data Protection Bill 2019 is sufficient for India to receive adequacy status from the EU.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;Along with Justin Sherman, Arindrajit Basu has &lt;a class="external-link" href="https://www.lawfareblog.com/key-global-takeaways-indias-revised-personal-data-protection-bill"&gt;outlined&lt;/a&gt; the key global takeaways from the Personal Data Protection Bill 2019 on &lt;em&gt;Lawfare&lt;/em&gt;.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;On &lt;em&gt;The Diplomat&lt;/em&gt;, Arindrajit has also &lt;a class="external-link" href="https://thediplomat.com/2020/01/the-retreat-of-the-data-localization-brigade-india-indonesia-and-vietnam/"&gt;traced&lt;/a&gt; the narrowing localization provisions in India, as well as Vietnam and Indonesia, and studied the actors and geopolitical tussle that has shaped these provisions.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;Through a string of publicly available submissions, press statements, and other media reports, Arindrajit and Amber Sinha have &lt;a class="external-link" href="https://www.epw.in/engage/article/politics-indias-data-protection-ecosystem"&gt;tracked&lt;/a&gt; the political evolution of the data protection ecosystem in India, and how this has, and will continue to impact legislative and policy developments on &lt;em&gt;EPW Engage&lt;/em&gt;.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;Gurshabad Grover and Tanaya Rajwade have &lt;a class="external-link" href="https://thewire.in/tech/indias-privacy-bill-regulates-social-media-platforms"&gt;written&lt;/a&gt; on &lt;em&gt;The Wire&lt;/em&gt; about how the Personal Data Protection Bill regulates social media.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;Amber was also a guest on &lt;em&gt;Suno India’s &lt;a class="external-link" href="https://www.sunoindia.in/cyber-democracy/personal-data-protection-bill-what-does-it-mean-for-your-right-to-privacy/"&gt;Cyber Democracy podcast&lt;/a&gt;&lt;/em&gt;, with Srinivas Kodali, to discuss how the latest version of the Personal Data Protection Bill will impact the right to privacy.
&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/compilation-of-research-on-data-protection'&gt;https://cis-india.org/internet-governance/blog/compilation-of-research-on-data-protection&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2020-03-05T08:04:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/rbi-ban-on-cryptocurrencies-not-backed-by-any-data-or-statistics">
    <title>RBI Ban on Cryptocurrencies not backed by any data or statistics</title>
    <link>https://cis-india.org/internet-governance/blog/rbi-ban-on-cryptocurrencies-not-backed-by-any-data-or-statistics</link>
    <description>
        &lt;b&gt;In March 2020, the Supreme Court of India quashed the RBI order passed in 2018 that banned financial services firms from trading in virtual currency or cryptocurrency.
Keeping this policy window in mind, the Centre for Internet &amp; Society will be releasing a series of blog posts and policy briefs on cryptocurrency regulation in India
&lt;/b&gt;
        
&lt;p id="docs-internal-guid-9ddef591-7fff-b8f5-3c20-c4a78d53d066" style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;On April 6, 2018 &lt;a href="https://www.rbi.org.in/Scripts/NotificationUser.aspx?Id=11243&amp;amp;Mode=0"&gt;the RBI issued a circular&lt;/a&gt; preventing all Commercial and Co-operative Banks, Payments Banks, Small Finance Banks, NBFCs, and Payment System Providers not only from dealing in virtual currencies themselves but also directing them to stop providing services to all entities which deal with virtual currencies. The RBI had issued a Press Release cautioning the public against dealing in virtual currencies including Bitcoin in 2013. However, the growing popularity of cryptocurrencies and its adoption by large numbers of Indian users, may have been the reason which forced the RBI to issue another Press Release in February 2017 reiterating its earlier concerns regarding cryptocurrencies raised in its earlier circular of 2013. In December 2017 both the RBI as well as the Ministry of Finance issued Press Releases cautioning the general public about the dangers and risks associated with cryptocurrencies, finally culminating in the circular dated April 6, 2018 banning financial institutions from dealing with cryptocurrency traders. As a result of this circular the operations of cryptocurrency exchanges took a severe hit and the number of transactions on these exchanges reduced substantially. The cryptocurrency market in India all but disappeared with only a few extremely determined enthusiasts still dealing in cryptocurrencies, at the risk of potentially depriving themselves of banking services altogether.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The RBI circular was challenged in the Supreme Court by the Internet and Mobile Association of India; final arguments in the case were concluded only in the last week of January, 2020 with the judgment of the Supreme Court being awaited. Generally speaking, whenever such policy decisions of the executive branch are challenged in the courts, a well accepted defense for the executive authorities, specifically in highly complicated fields such as finance, etc. is that the decision was taken by an expert body using its expertise in the field. The basic rationale underlying this argument is that the authority has relied on verifiable data and used its expertise to analyse the same in order to arrive at its decision.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;However, it appears from the response by the RBI to an RTI query by Centre for Internet and Society, that requested the RBI for a copy of all reports, papers, opinions and advice that was relied upon for issuing the April 6, 2018 circular, that the RBI has not relied upon any such data to come to a conclusion that banking services should be denied to all those entities dealing in cryptocurrencies. It appears from the response to the RTI query that it was the RBI’s own previous circulars and press releases which formed the basis for the April 6, 2018 circular. This response completely undermines the argument that the decision by the RBI was taken after an analysis of all the facts and statistics concerned with cryptocurrency trading.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Not only does the RTI response weaken the commonly accepted defense of an expert body making a well-reasoned decision, but it also strengthens another legal ground for challenging the decision of the RBI, viz. arbitrariness. One of the grounds on which executive decisions can be challenged is that the decision was made without taking into account relevant material and without the application of mind. The admission by the RBI in its RTI response that there is no material relied upon by the RBI, except its own previous Press Releases, only strengthens the argument that the decision was made in an arbitrary manner.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Such an admission by the RBI regarding the process followed before issuing the April 6, 2018 circular reduces the credibility of the decision itself. However it remains to be seen whether the Supreme Court of India agrees with the arguments of the petitioners challenging the April 6, 2018 circular, even though the petitioners may not have been able to produce this RTI response from the RBI to further bolster their case.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/rbi-ban-on-cryptocurrencies-not-backed-by-any-data-or-statistics'&gt;https://cis-india.org/internet-governance/blog/rbi-ban-on-cryptocurrencies-not-backed-by-any-data-or-statistics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Bitcoin</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cryptocurrencies</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    

   <dc:date>2020-03-05T18:35:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/future-of-work-in-india-it-it-es-sector">
    <title>‘Future of Work’ in India’s IT/IT-es Sector</title>
    <link>https://cis-india.org/internet-governance/blog/future-of-work-in-india-it-it-es-sector</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has recently undertaken research into the impact of Industry 4.0 on work in India. Industry 4.0, for the purposes of the research, is conceptualised as the technical integration of cyber physical systems (CPS) into production and logistics and the use of the ‘internet of things’ (connection between everyday objects) and services in (industrial) processes. By undertaking this research, CIS seeks to complement and contribute to the discourse and debates in India around the impact of Industry 4.0. In furtherance of the same, this report seeks to explore several key themes underpinning the impact of Industry 4.0 specifically in the IT/IT-es sector and broadly on the nature of work itself.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Read the complete case-study here: &lt;a href="https://cis-india.org/internet-governance/2018future-of-work2019-in-india2019s-it-it-es-sector-pdf" class="internal-link" title="‘Future of Work’ in India’s IT/IT-eS Sector pdf"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Scholarship on 'Industry 4.0' that has emerged globally has sought to address the challenges of technological forecasting as it relates to work in varied forms. For instance, the Frey-Osborne methods examine characteristic tasks of each occupation and suggest that almost half of all jobs in the United States and other advanced countries are at risk of being substituted by computers or algorithms within the next 10 to 20 years. [1] On the other hand, scholars such as Autor and Handel as well as research produced by OECD on this subject argue that occupations as a whole are unlikely to be automated as there is great variability in the tasks within each occupation. [2] Existing literature on the impact on jobs in the IT sector in India too have arrived at mixed conclusions. Reports have raised concerns about job loss in the sector as a result of automation [3] whilst it has also been reported that employment from the IT sector reached 3.86 million in 2016-17 and an addition of around 105,000 was witnessed in FY18 itself. [4]&lt;/p&gt;
&lt;p&gt;In this context, it is crucial to start by developing an understanding of which technologies are at the forefront of bringing in Industry 4.0. Such an understanding will further help understand which jobs, and more specifically, job functions are at the greatest risk of being replaced by automation technologies. To further contextualise the impact, it is imperative to develop a comprehensive understanding of how job functions are organised within the sector itself. This becomes especially relevant with the emphasis Industry 4.0 places on the horizontal and vertical integration of the various technologies constituting Industry 4.0. [5]&lt;/p&gt;
&lt;p&gt;It is anticipated that to stay ahead of the curve of ‘technological unemployment’ there will be significant skilling and re-skilling challenges to enable new talent addition around emerging job roles. [6] The skilling challenge gains enhanced importance in the broader context of nurturing an inclusive digital economy. [7] This is particularly relevant in the context of female labour force participation, since it has been predicted that job creation will be concentrated in sectors where females are underrepresented and difficult to retain, while sectors with higher female participation, such as secretarial work, will undergo job loss. [8]&lt;/p&gt;
&lt;p&gt;However, it is not clear how these trends will play out in the future, particularly because other structural changes are taking place simultaneously (such as globalisation and protectionism, demographic change, policy making, technological adoption etc.).&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Objective and Scope&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;This research seeks to contribute to existing studies and dialogue on the impact and effect of industry 4.0 on work in the Information Technology services (IT) sector in India. Though the research focuses on the impact of technologies that comprise Industry 4.0, such technologies are frequently interchanged with the words ‘automation’ and ‘digitisation’. Thus, the desk research also examines the impact of  ‘automation’ and ‘digitisation’ on the IT sector in India. The case study looks atthe IT sector broadly and where applicable, calls out information specific to sub-sectors such as IT enabled services (IT-eS) or Business Process Management (IT-BPM). The IT sector in India is uniquely placed; it is producing the technologies that are disrupting work in other industries as well as implementing them internally. This report focuses on the latter, but brings into context the former when relevant to work in the sector.&lt;/p&gt;
&lt;p&gt;By drawing out trends and providing an analysis of contextual, quantitative and qualitative data on changes to work and labour markets in India as a result of technological uptake, it is anticipated that comparative research can be enabled by creating a framework that can be replicated in other, particularly developing, contexts.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;[1] Carl Benedikt Frey and Michael A. Osborne, 2013. The future of employment: How susceptible are jobs to computerisation?, Oxford Martin School, September.&lt;/p&gt;
&lt;p&gt;[2] See David H. Autor &amp;amp; Michael J. Handel, 2013. “Putting Tasks to the Test: Human Capital, Job Tasks, and Wages,” Journal of Labor Economics, University of Chicago Press, Vol. 31(S1), pages S59 -S96. See also: Future of Work and Skills, The Organisation for Economic Co-operation and Development, February 2017.&lt;/p&gt;
&lt;p&gt;[3] Business Today, AI, automation will cost 7 lakh IT jobs by 2022, says report. (November 7, 2017) Retrieved &lt;a href="https://www.businesstoday.in/sectors/it/ai-and-automation-to-cost-7-lakh-it-jobs-by-2022-says-report/story/259880.html"&gt;https://www.businesstoday.in/sectors/it/ai-and-automation-to-cost-7-lakh-it-jobs-by-2022-says-report/story/259880.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[4] Advantage India, India Brand Equity Foundation. Retrieved &lt;a href="https://www.ibef.org/download/IT-ITeS-Report-Apr-2018.pdf"&gt;https://www.ibef.org/download/IT-ITeS-Report-Apr-2018.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[5] Embracing Industry 4.0 -and Rediscovering Growth, Boston Consulting Group. Retrieved &lt;a href="https://www.bcg.com/capabilities/operations/embracing-industry-4.0-rediscovering-growth.aspx"&gt;https://www.bcg.com/capabilities/operations/embracing-industry-4.0-rediscovering-growth.aspx&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[6] India’s Readiness for Industry 4.0 -A Focus on Automotive Sector, Grant Thorton and Confederation of Indian Industry. Retrieved &lt;a href="http://www.nasscom.in/sites/default/files/NASSCOM_Annual_Guidance_Final_22062017.pdf"&gt;http://www.nasscom.in/sites/default/files/NASSCOM_Annual_Guidance_Final_22062017.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[7] G20 Insights, Bridging the digital divide: Skills for the new age., Retrieved &lt;a href="http://www.g20-insights.org/policy_briefs/bridging-digital-divide-skills-new-age/"&gt;http://www.g20-insights.org/policy_briefs/bridging-digital-divide-skills-new-age/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[8] World Economic Forum, The Future of Jobs -Employment, Skills and Workforce Strategy for the Fourth Industrial Revolution, (January 2016).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/future-of-work-in-india-it-it-es-sector'&gt;https://cis-india.org/internet-governance/blog/future-of-work-in-india-it-it-es-sector&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Future of Work</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-04-28T09:52:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/igf-workshop-an-evidence-based-intermediary-liability-policy-framework">
    <title>An Evidence based Intermediary Liability Policy Framework: Workshop  at IGF </title>
    <link>https://cis-india.org/internet-governance/blog/igf-workshop-an-evidence-based-intermediary-liability-policy-framework</link>
    <description>
        &lt;b&gt;CIS is organising a workshop at the Internet Governance Forum 2014. The workshop will be an opportunity to present and discuss ongoing research on the changing definition of intermediaries and their responsibilities across jurisdictions and technologies and contribute to a comprehensible framework for liability that is consistent with the capacity of the intermediary and with international human-rights standards.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Centre for Internet and Society, India and Centre for Internet and Society, Stanford Law School, USA, will be organising a workshop to analyse the role of intermediary platforms in relation to freedom of expression, freedom of information and freedom of association at the Internet Governance Forum 2014. &lt;span&gt;The aim of the workshop is to highlight the increasing importance of digital rights and broad legal protections of stakeholders in an increasingly knowledge-based economy. The workshop will discuss public policy issues associated with Internet intermediaries, in particular their roles, legal responsibilities and related liability limitations in context of the evolving nature and role of intermediaries in the Internet ecosystem. distinct&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Online Intermediaries: Setting the context&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Internet has facilitated unprecedented access to information and amplified avenues for expression and engagement by removing the limits of geographic boundaries and enabling diverse sources of information and online communities to coexist. Against the backdrop of a broadening base of users, the role of intermediaries that enable economic, social and political interactions between users in a global networked communication is ubiquitous. Intermediaries are essential to the functioning of the Internet as many producers  and consumers of content on the internet rely on the action of some third party–the so called intermediary. Such intermediation ranges from the mere provision of connectivity, to more advanced services such as providing online storage spaces for data, acting as platforms for storage and sharing of user generated content (UGC), or platforms that provides links to other internet content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Online intermediaries enhance economic activity by reducing costs, inducing competition by lowering the barriers for participation in the knowledge economy and fuelling innovation through their contribution to the wider ICT sector as well as through their key role in operating and maintaining Internet infrastructure to meet the network capacity demands of new applications and of an expanding base of users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Intermediary platforms also provide social benefits, by empowering users and improving  choice through social and participative networks, or web services that enable creativity and collaboration amongst individuals. By enabling platforms for self-expression and cooperation, intermediaries also play a critical role in establishing digital trust, protection of human rights such as freedom of speech and expression, privacy and upholding fundamental values such as freedom and democracy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the economic and social benefits of online intermediaries are conditional to a framework for protection of intermediaries against legal liability for the communication and distribution of content which they enable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Intermediary Liability&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the last decade, right holders, service providers and Internet users have been locked in a  debate on the potential liability of online intermediaries. The debate has raised global concerns on issues such as, the extent to which Internet intermediaries should be held responsible for content produced by third parties using their Internet infrastructure and how the resultant liability would affect online innovation and the free flow of knowledge in the information economy?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the impact of their services on communications, intermediaries find themselves as either directly liable for their actions, or indirectly (or “secondarily”) liable for the actions of their users. Requiring intermediaries to monitor the legality of the online content poses an insurmountable task. Even if monitoring the legality of content by intermediaries against all applicable legislations were possible, the costs of doing so would be prohibitively high. Therefore, placing liability on intermediaries can deter their willingness and ability to provide services, hindering the development of the internet itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Economics of intermediaries are dependent on scale and evaluating the legality of an individual post exceeds the profit from hosting the speech, and in the absence of judicial oversight can lead to a private censorship regime. Intermediaries that are liable for content or face legal exposure, have powerful incentives, to police content and limit user activity to protect themselves.  The result is curtailing of legitimate expression especially where obligations related to and definition of illegal content is vague. Content policing mandates impose significant compliance costs limiting the innovation and competiveness of such platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More importantly, placing liability on intermediaries has a chilling effect on freedom of expression online. Gate keeping obligations by service providers threaten democratic participation and expression of views online, limiting the potential of individuals and restricting freedoms. Imposing liability can also indirectly lead to the death of anonymity and pseudonymity, pervasive surveillance of users' activities, extensive collection of users' data and ultimately would undermine the digital trust between stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus effectively, imposing liability for intermediaries creates a chilling effect on Internet activity and speech, create new barriers to innovation and stifles the Internet's potential to promote broader economic and social gains.  To avoid these issues, legislators have defined 'safe harbours', limiting the liability of intermediaries under specific circumstances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Online intermediaries do not have direct control of what information is or information are exchanged via their platform and might not be aware of illegal content per se. A key framework for online intermediaries, such limited liability regimes provide exceptions for third party intermediaries from liability rules to address this asymmetry of information that exists between content producers and intermediaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, it is important to note, that significant differences exist concerning the subjects of these limitations, their scope of provisions and procedures and modes of operation. The 'notice and takedown' procedures are at the heart of the safe harbour model and can be subdivided into two approaches:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Vertical approach where liability regime applies to specific types of content exemplified in the US Digital Copyright Millennium Act&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. Horizontal approach based on the E-Commerce Directive (ECD) where different levels of immunity are granted depending on the type of activity at issue&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Current framework &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Globally, three broad but distinct models of liability for intermediaries have emerged within the Internet ecosystem:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Strict liability model under which intermediaries are liable for third party content used in countries such as China and Thailand&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Safe harbour model granting intermediaries immunity, provided their compliance on certain requirements&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Broad immunity model that grants intermediaries broad or conditional immunity from liability for third party content and exempts them from any general requirement to monitor content. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the models described above can provide useful guidance for the drafting or the improvement of the current legislation, they are limited in their scope and application as they fail to account for the different roles and functions of intermediaries. Legislators and courts are facing increasing difficulties, in interpreting these regulations and adapting them to a new economic and technical landscape that involves unprecedented levels user generated content and new kinds of and online intermediaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The nature and role of intermediaries change considerably across jurisdictions, and in relation to the social, economic and technical contexts. In addition to the dynamic nature of intermediaries the different categories of Internet intermediaries‘ are frequently not clear-cut, with actors often playing more than one intermediation role. Several of these intermediaries offer a variety of products and services and may have number of roles, and conversely,  several of these intermediaries perform the same function. For example , blogs, video services and social media platforms are considered to be 'hosts'. Search engine providers have been treated as 'hosts' and 'technical providers'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This limitations of existing models in recognising that different types of intermediaries perform different functions or roles  and therefore should have different liability, poses an interesting area for research and global deliberation. Establishing classification of intermediaries, will also help analyse existing patterns of influence in relation to content for example when the removal of content by upstream intermediaries results in undue over-blocking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Distinguishing intermediaries on the basis of their roles and functions in the Internet ecosystem is  critical to ensuring a balanced system of liability and addressing concerns for freedom of expression. Rather than the highly abstracted view of intermediaries as providing a single unified service of connecting third parties, the definition of intermediaries must expand to include the specific role and function they have in relation  to users'  rights.  A successful intermediary liability regime must balance the needs of producers, consumers, affected parties and law enforcement, address the risk of abuses for political or commercial purposes, safeguard human rights and contribute to the evolution of uniform principles and safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Towards an evidence based intermediary liability policy framework&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This workshop aims to bring together leading representatives from a broad spectrum of stakeholder groups to discuss liability related issues and ways to enhance Internet users’ trust.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Questions to address at the panel include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. What are the varying definitions of intermediaries across jurisdictions?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. What are the specific roles and functions that allow for classification of intermediaries?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. How can we ensure the legal framework keeps pace with technological advances and the changing roles of intermediaries?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. What are the gaps in existing models in balancing innovation, economic growth and human rights?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. What could be the respective role of law and industry self-regulation in enhancing trust?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. How can we enhance multi-stakeholder cooperation in this space?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Confirmed Panel:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technical Community: Malcolm Hutty: Internet Service Providers Association (ISPA)&lt;br /&gt;Civil Society: Gabrielle Guillemin: Article19&lt;br /&gt;Academic: Nicolo Zingales: Assistant Professor of Law at Tilburg University&lt;br /&gt;Intergovernmental: Rebecca Mackinnon: Consent of the Networked, UNESCO project&lt;br /&gt;Civil Society: Anriette Esterhuysen: Association for Progressive Communication (APC)&lt;br /&gt;Civil Society: Francisco Vera: Advocacy Director: Derechos Digitale&lt;br /&gt;Private Sector: Titi Akinsanmi: Policy and Government Relations Manager, Google Sub-Saharan Africa&lt;br /&gt;Legal: Martin Husovec: MaxPlanck Institute&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Moderator(s): &lt;/span&gt;&lt;span&gt;Giancarlo Frosio, Centre for Internet and Society (CIS) and &lt;/span&gt;&lt;span&gt;Jeremy Malcolm, Electronic Frontier Foundation &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Remote Moderator: &lt;/span&gt;&lt;span&gt;Anubha Sinha, New Delhi&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/igf-workshop-an-evidence-based-intermediary-liability-policy-framework'&gt;https://cis-india.org/internet-governance/blog/igf-workshop-an-evidence-based-intermediary-liability-policy-framework&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>human rights</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Human Rights Online</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Multi-stakeholder</dc:subject>
    

   <dc:date>2014-07-04T06:41:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/towards-algorithmic-transparency">
    <title>Towards Algorithmic Transparency</title>
    <link>https://cis-india.org/internet-governance/blog/towards-algorithmic-transparency</link>
    <description>
        &lt;b&gt;This policy brief examines the issue of transparency as a key ethical component in the development, deployment, and use of Artificial Intelligence.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This brief proposes a framework that seeks to overcome the challenges in preserving transparency when dealing with machine learning algorithms, and suggests solutions such as the incorporation of audits, and ex ante approaches to building interpretable models right from the design stage. Read the full report &lt;a href="https://cis-india.org/internet-governance/algorithmic-transparency-pdf" class="internal-link" title="Algorithmic Transparency PDF"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Regulatory Practices Lab at CIS aims to produce regulatory policy 
suggestions focused on India, but with global application, in an agile 
and targeted manner and to promote transparency around practices 
affecting digital rights. &lt;br /&gt;The Regulatory Practices Lab is supported by Google and Facebook.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/towards-algorithmic-transparency'&gt;https://cis-india.org/internet-governance/blog/towards-algorithmic-transparency&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Radhika Radhakrishnan, and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Regulatory Practices Lab</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Algorithms</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Transparency</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2020-07-15T13:16:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/mapping-web-censorship-net-neutrality-violations">
    <title>Mapping Web Censorship &amp; Net Neutrality Violations</title>
    <link>https://cis-india.org/internet-governance/blog/mapping-web-censorship-net-neutrality-violations</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For over a year, researchers at the Centre 
for Internet and Society have been studying website blocking by internet
 service providers (ISPs) in India. We have learned that major ISPs 
don’t always block the same websites, and also use different blocking 
techniques. &lt;strong&gt;To take this study further, and map net neutrality violations by ISPs, we need your help.&lt;/strong&gt;
 We have developed CensorWatch, a research tool to collect empirical 
evidence about what websites are blocked by Indian ISPs, and which 
blocking methods are being used to do so. Read more about this project (&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/qxKoDnnG4cR8mPZaiOr8immlHKFilRoRSYOvX_26BcZRtiN_hoo5VrFfQHbDqaES1OV6jUM0RbWCZs1ODSHr_Pf9yeJFesRxxQvyUrZm4Tlcvdjmh232QQV3fOkmrj9wiVh5LQiW1LQAprvYWmHp_s-TW5ZdNXZY07QvlFR01dKzIxnv7TorEfkyazo" target="_blank"&gt;link&lt;/a&gt;), &lt;strong&gt;download CensorWatch&lt;/strong&gt; (&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/F9Wsq5zbx6VJKZxrsjYFy3Q5-jSkk0-3nr5hBfuyQiDUEKyEm_fLY6kh4W9MB7GOLoPZbowqsXDT17DEmFgMoFY4IIOEjxq0rNCtFeEc7b-0GSnRPeLDi9VmYX5WE1vGlwMvM7BPtyfmXD6lNdIWzAdjq_MpSqWRACk3JJNPhzqieJXoEoOnY8WH1rxR4HnJwDjyJHSkHgMTmWcm0POB_kDOtt2fk_GnXkkjv5LK7MxRZe8f" target="_blank"&gt;link&lt;/a&gt;), and help determine if ISPs are complying with India’s net neutrality regulations.&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="https://play.google.com/store/apps/details?id=com.censorwatch.netprobesapp"&gt;&lt;img src="https://cis-india.org/internet-governance/censorwatch/" alt="null" width="75%" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;Learn more about website blocking in India, through our recent work on the issue —&lt;/div&gt;
&lt;ol&gt;&lt;li&gt;Using information from court orders, 
user reports, and government orders, and running network tests from six 
ISPs, Kushagra Singh, Gurshabad Grover and Varun Bansal presented the &lt;strong&gt;largest study of web blocking&lt;/strong&gt;
 in India. Through their work, they demonstrated that major ISPs in 
India use different techniques to block websites, and that they don’t 
block the same websites (&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/mgmW9wuVo0QjRGqm9DnDQiVT4lYy3lgY5maOgjAk05baH_NWtRSfznWooMtcTgQ2a059mWk91p_lMZqJAqaRHXZOLSEQQOAMeM5RowiyfY3giKQm3aDJoYnWw7VhAHeBjdkObBFF0PYWjoC1NJi21fSZyifOWm_CvlC3gq7nxbHtejEy" target="_blank"&gt;link&lt;/a&gt;).&lt;/li&gt;&lt;li&gt;Gurshabad Grover and Kushagra Singh 
collaborated with Simone Basso of the Open Observatory of Network 
Interference (OONI) to study &lt;strong&gt;HTTPS traffic blocking in India&lt;/strong&gt; by running experiments on the networks of three popular Indian ISPs: ACT Fibernet, Bharti Airtel, and Reliance Jio (&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/oP_eOysGeBOsgRW-5k8V-ReWU_DMUhykR2wN9ZAqndgHev3bxY1c8kSSviR3jjOMqzOJhP05AfK2CtHAH8-Zv21mU7uAW2ainkl5tmS-uZx3LG15MjZXbRQyE71871AouDuXY0hLTVEVG3ovaEvb8BSFOhJz7NpnTZdsY5vIOeBqSsaB31HJdMT8bNELQJ8VjhUoNw" target="_blank"&gt;link&lt;/a&gt;).&lt;/li&gt;&lt;li&gt;For &lt;em&gt;The Leaflet&lt;/em&gt;, Torsha Sarkar and Gurshabad Grover wrote about the &lt;strong&gt;legal framework of blocking in India&lt;/strong&gt;
 — Section 69A of the IT Act and its rules. They considered commentator 
opinions questioning the constitutionality of the regime, whether 
originators of content are entitled to a hearing, and whether Rule 16, 
which mandates confidentiality of content takedown requests received by 
intermediaries from the Government, continues to be operative (&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/WggQUDysA9mWPEzvGTRc43aPpKNmNjDcdEzj1ALhrbXgQWqnZRY9L9J45XXbJ3yCnX9-XIuYyRTQ588cBiYNQIs2KsfB0Dydz2QY4Z5VdMTdJ-RMr2M5uDqJ8Amr5gT3APy01bg8gNTyoEvdIcKryjrWnUFlTdxFAtohQ_AwVRjTbzC5FcAFhO9DdHOQV0Xp9X65At3tR17epGvo" target="_blank"&gt;link&lt;/a&gt;).&lt;/li&gt;&lt;li&gt;In the &lt;em&gt;Hindustan Times&lt;/em&gt;, Gurshabad Grover critically analysed &lt;strong&gt;the confidentiality requirement embedded within Section 69A of the IT Act&lt;/strong&gt; and argued how this leads to internet users in India experiencing arbitrary censorship (&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/j75HVdd7j4huKQd0kP9lusNpz1ZL0CxXMEWeySOhsQZbcKECrEKfaq52LlB-QjnT1TIB1mjqhB0TyweA7rLCq41Rd_6uyBUo8-Uc4iHiHSXYxC06rhW7o7ZFtCt7bKdNldDWkoMhSD7x0daAhzcSdLSPbNBRSy1HkGEGZ7Z_11tovlleodez9gm60zyvkGNM1YMQSLZ4NZ0k8RD2zncGPoWXjsytI4YwnQyy_QZNSKOSdY2_X6GoVSugRZhmyWwWCpHpk-yDM7XJ0OF4GZlTUSgfhcfftJEGBlQlkQ" target="_blank"&gt;link&lt;/a&gt;).&lt;/li&gt;&lt;li&gt;Torsha Sarkar, along with Sarvjeet Singh of the Centre for Communication Governance (CCG), spoke to &lt;em&gt;Medianama&lt;/em&gt; delineating the &lt;strong&gt;procedural aspects of section 69A of the IT Act &lt;/strong&gt;(&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/QAWrguo8Vx6X1PsmbTvCTYQ6U6nycGdSRg9gfDYFTRxUAa82nB6gYpuPyEE3VztSJzG2888ua224upBlg-k9Tu29TZdhl3ET71WwsKUfKxdyUPkLiY1A4jSD1p59sH0KXlQBqU10H38gDFHZ5WVsMCwZXLTISv9SvXIRx7Vu59U4HBV-hhB3BSpe_SApQnHQgPN0BIl0g852jSINvTI6Bh5HGNTWZ3nQWRn5H1vShoG4Q3VcZBWfewbc" target="_blank"&gt;link&lt;/a&gt;).&lt;/li&gt;&lt;li&gt;Arindrajit Basu spoke to the &lt;em&gt;Times of India&lt;/em&gt; about the &lt;strong&gt;geopolitical and regulatory implications&lt;/strong&gt; of the Indian government’s move to ban fifty-nine Chinese applications from India (&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/lICwdbQnezwqQKZHQ_Xso6Qp7735jleiJJJI88DgKZx348ewlSRWU1uFyEbtMwZOoJRS5MjHbX9KgklFrlc-jKTXKL2S4K5aCXEU2isCuFhwORAz_DnnBai7nr2pyiK0HmM0Eb3AD_JyTUwWtg9O6c0jV0Nf8cbTuT3FD7WypVO_NWUJ_GZVo7er10LMUXE_1EP_d2nh2uziuXXmM1JV-9NN6klSATsLa_tprf0bDNbNa_U4DHMm6oQvXFfVHj74jRhq3nKDkCzQeQZ_SRMxNNqIUIN5aMLGbQfBAziZ_E3hIYp-ptOQ7Y2cqF_4eiYdY20tBm5ltySmFBQQi5_nFQ" target="_blank"&gt;link&lt;/a&gt;).&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/mapping-web-censorship-net-neutrality-violations'&gt;https://cis-india.org/internet-governance/blog/mapping-web-censorship-net-neutrality-violations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2020-10-05T07:59:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/icann-begins-its-sojourn-into-open-data">
    <title>ICANN Begins its Sojourn into Open Data</title>
    <link>https://cis-india.org/internet-governance/icann-begins-its-sojourn-into-open-data</link>
    <description>
        &lt;b&gt;The Internet Corporation for Assigned Names and Numbers (ICANN) recently announced that it will now set up a pilot project in order to introduce an Open Data initiative for all data that it generates. We would like to extend our congratulations to ICANN on the development of this commendable new initiative, and would be honoured to support the creation of this living document to be prepared before ICANN 58.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;To quote the ICANN blog directly, the aim of this project is to “&lt;em&gt;bring selected data sets into the open, available through web pages and programming APIs, for the purposes of external party review and analysis&lt;/em&gt;” &lt;a href="#ftn1"&gt;[1]&lt;/a&gt;. This will play out through the setting up of three components:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Development of a catalogue of existing data sets which will be appropriate for publication&lt;/li&gt;
&lt;li&gt;Selection of the technology necessary for managing the publication of these data sets.&lt;/li&gt;
&lt;li&gt;Creation of a process to prioritise the order in which the data sets are made available &lt;a href="#ftn2"&gt;[2]&lt;/a&gt;.&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;&lt;strong&gt;Principles in Question&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Centre for Internet and Society firmly believes in the value of accessible, inclusive open data standards as a tool for enhancing transparency in any system. Greater transparency goes a long way towards bringing a regulatory authority closer to those who are governed under it – be it a state or a body such as ICANN. It is, in fact, an indispensable component of a multistakeholder model of governance to facilitate informed participation by all parties concerned in the decision making process.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The right to information that a regulatory authority owes those it regulates has two kinds of components. The first may be described as reactive disclosure – “&lt;em&gt;when individual members of the public file requests for and receive information&lt;/em&gt;” &lt;a href="#ftn#3"&gt;[3]&lt;/a&gt;. The second is disclosure that is more proactive in nature – “&lt;em&gt;when information is made public at the initiative of the public body, without a request being filed&lt;/em&gt;” &lt;a href="#ftn4"&gt;[4]&lt;/a&gt;. The former is epitomized by initiatives such as the Freedom of
Information Act &lt;a href="#ftn5"&gt;[5]&lt;/a&gt; in the United States, the Right to Information Act in India &lt;a href="#ftn6"&gt;[6]&lt;/a&gt;, or ICANN’s very own Documentary Information Disclosure Policy &lt;a href="#ftn7"&gt;[7]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Proactive disclosure policies, on the other hand, operate out of the principle that the provision of information by those in positions of regulatory authority will ensure free and timely flow of information to the public, and the information so provided will be equally accessible to everyone, without the need for individual requests being filed &lt;a href="#ftn8"&gt;[8]&lt;/a&gt;. Proactive disclosure also goes a long way towards preventing officials from denying or manipulating information subsequent to publication &lt;a href="#ftn9"&gt;[9]&lt;/a&gt;. Scholars have touted proactive disclosure as the “&lt;em&gt;future of the right to know&lt;/em&gt;” &lt;a href="#ftn10"&gt;[10]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;At the Centre for Internet and Society, much of our research has pointed towards the direction of creating better open data standards for governments (Please see “&lt;a href="http://cis-india.org/openness/blog-old/open-government-data-study"&gt;Open Data Government Study: India&lt;/a&gt;”). We are one of the Lead Stewards of the International Open Data Charter &lt;a href="#ftn11"&gt;[11]&lt;/a&gt; and have maintained that it is crucial for governments to maintain open data standards in the interest of transparency and accountability. We firmly believe that the same principles extend also to ICANN – a body which, as per its own by-laws commits towards operating “…&lt;em&gt;to the maximum extent feasible in an open and transparent manner and consistent with procedures designed to ensure fairness&lt;/em&gt;”&lt;a href="#ftn12"&gt;[12]&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Suggestions&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;While this policy is in its nascent stage, we would like to put forward certain principles which we believe ought to be kept in mind before it gets chalked out, in the best interest of the ICANN community:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;To determine what data sets should be made publicly accessible, it would be useful to carry out an analysis of existing DIDP requests to understand trends in the kind of information that the ICANN community is interested in accessing, which can then be proactively disclosed. It would be redundant on ICANN’s part to disclose, under this Open Data Policy, data which is already publicly available.&lt;/li&gt;
&lt;li&gt;ICANN should first develop a catalog of all existing data sets with ICANN, apply the principles for deciding appropriateness for publication, then make publicly available both the full catalog, and the actual data sets identified for publication. ICANN should make clear the kind of information it is not going to make accessible
under this open data standards, and justify the principles on the basis of which it is choosing to do so (analogous to the exceptions clauses under the DIDP).&lt;/li&gt;
&lt;li&gt;With respect to technology to be selected for managing the publication of data sets, free and open source software (such as CKAN) ought to be used, and open standards should be adopted for the use and licensing of such data.&lt;/li&gt;
&lt;li&gt;Such data ought to be downloadable in bulk in CSV/JSON/XML formats.&lt;/li&gt;
&lt;li&gt;DIDP responses and the open data work flows ought to be integrated so that all the responses to DIDP requests are automatically published in a machine-readable format as open data.&lt;/li&gt;
&lt;li&gt;Qualitative (text of speeches, slides from presentations, recordings of sessions, etc.) and quantitative data should both be included under this new policy.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;In conclusion, we would like to extend our congratulations to ICANN on the development of this commendable new initiative, and would be honoured to support the creation of this living document before ICANN 58.&lt;/p&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;h3&gt;&lt;strong&gt;Endnotes&lt;/strong&gt;&lt;/h3&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;[1] Internet Corporation for Assigned Names and Numbers, &lt;em&gt;ICANN Kicks off Open Data Initiative Pilot&lt;/em&gt;, (November 6, 2016), available at &lt;a href="https://www.icann.org/news/blog/icann-kicks-off-open-data-initiative-pilot"&gt;https://www.icann.org/news/blog/icann-kicks-off-open-data-initiative-pilot&lt;/a&gt; (Last visited on November 9, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;[2] Id.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;[3] Naniette Coleman, &lt;em&gt;Proactive vs. Reactive Transparency&lt;/em&gt;, (February 8, 2010), available at: &lt;a href="http://blogs.worldbank.org/publicsphere/proactive-vs-reactive-transparency"&gt;http://blogs.worldbank.org/publicsphere/proactive-vs-reactive-transparency&lt;/a&gt; (Last visited on November 9, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;[4] Id.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;[5] Freedom of Information Act, 1966, 5 U.S.C. § 552.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;[6] Right to Information Act, 2005 &lt;em&gt;available at&lt;/em&gt; http://righttoinformation.gov.in/rti-act.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;[7] ICANN, &lt;em&gt;Documentary Information Disclosure Policy&lt;/em&gt;, available at &lt;a href="https://www.icann.org/resources/pages/didp-2012-02-25-en"&gt;https://www.icann.org/resources/pages/didp-2012-02-25-en&lt;/a&gt; (Last visited on November 9, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;[8] Helen Darbishire, &lt;em&gt;Proactive Transparency: The future of the right to information?&lt;/em&gt; Working paper. N.p.: World Bank, (2009).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;[9] Id.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;[10] Darbishire, &lt;em&gt;supra&lt;/em&gt; note 8.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;[11] Open Data Charter, &lt;em&gt;Who We Are&lt;/em&gt;, available at &lt;a href="http://opendatacharter.net/who-we-are/"&gt;http://opendatacharter.net/who-we-are/&lt;/a&gt; (Last visited on November 10, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;[12] Article III(1), Bylaws For Internet Corporation For Assigned Names And Numbers&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/icann-begins-its-sojourn-into-open-data'&gt;https://cis-india.org/internet-governance/icann-begins-its-sojourn-into-open-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Padmini Baruah and Sumandro Chattapadhyay</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    

   <dc:date>2016-11-12T01:17:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
