<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 11 to 25.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/future-of-work-in-india-it-it-es-sector"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/igf-workshop-an-evidence-based-intermediary-liability-policy-framework"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/towards-algorithmic-transparency"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/mapping-web-censorship-net-neutrality-violations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/icann-begins-its-sojourn-into-open-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/call-for-comments-model-security-standards-for-the-indian-fintech-industry"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/how-to-shutdown-internet-shutdowns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/governing-id-2028use-of-digital-id-for-verification"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/governing-id-kenya2019s-huduma-namba-programme"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cryptocurrency-regulation-in-india-2013-a-brief-history"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/an-analysis-of-the-covid-vaccine-intelligence-network-co-win-platform"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/a-comment-on-the-2009-igf-draft-programme-paper"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/future-of-work-in-india-it-it-es-sector">
    <title>‘Future of Work’ in India’s IT/IT-es Sector</title>
    <link>https://cis-india.org/internet-governance/blog/future-of-work-in-india-it-it-es-sector</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has recently undertaken research into the impact of Industry 4.0 on work in India. Industry 4.0, for the purposes of the research, is conceptualised as the technical integration of cyber physical systems (CPS) into production and logistics and the use of the ‘internet of things’ (connection between everyday objects) and services in (industrial) processes. By undertaking this research, CIS seeks to complement and contribute to the discourse and debates in India around the impact of Industry 4.0. In furtherance of the same, this report seeks to explore several key themes underpinning the impact of Industry 4.0 specifically in the IT/IT-es sector and broadly on the nature of work itself.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Read the complete case-study here: &lt;a href="https://cis-india.org/internet-governance/2018future-of-work2019-in-india2019s-it-it-es-sector-pdf" class="internal-link" title="‘Future of Work’ in India’s IT/IT-eS Sector pdf"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Scholarship on 'Industry 4.0' that has emerged globally has sought to address the challenges of technological forecasting as it relates to work in varied forms. For instance, the Frey-Osborne methods examine characteristic tasks of each occupation and suggest that almost half of all jobs in the United States and other advanced countries are at risk of being substituted by computers or algorithms within the next 10 to 20 years. [1] On the other hand, scholars such as Autor and Handel as well as research produced by OECD on this subject argue that occupations as a whole are unlikely to be automated as there is great variability in the tasks within each occupation. [2] Existing literature on the impact on jobs in the IT sector in India too have arrived at mixed conclusions. Reports have raised concerns about job loss in the sector as a result of automation [3] whilst it has also been reported that employment from the IT sector reached 3.86 million in 2016-17 and an addition of around 105,000 was witnessed in FY18 itself. [4]&lt;/p&gt;
&lt;p&gt;In this context, it is crucial to start by developing an understanding of which technologies are at the forefront of bringing in Industry 4.0. Such an understanding will further help understand which jobs, and more specifically, job functions are at the greatest risk of being replaced by automation technologies. To further contextualise the impact, it is imperative to develop a comprehensive understanding of how job functions are organised within the sector itself. This becomes especially relevant with the emphasis Industry 4.0 places on the horizontal and vertical integration of the various technologies constituting Industry 4.0. [5]&lt;/p&gt;
&lt;p&gt;It is anticipated that to stay ahead of the curve of ‘technological unemployment’ there will be significant skilling and re-skilling challenges to enable new talent addition around emerging job roles. [6] The skilling challenge gains enhanced importance in the broader context of nurturing an inclusive digital economy. [7] This is particularly relevant in the context of female labour force participation, since it has been predicted that job creation will be concentrated in sectors where females are underrepresented and difficult to retain, while sectors with higher female participation, such as secretarial work, will undergo job loss. [8]&lt;/p&gt;
&lt;p&gt;However, it is not clear how these trends will play out in the future, particularly because other structural changes are taking place simultaneously (such as globalisation and protectionism, demographic change, policy making, technological adoption etc.).&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Objective and Scope&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;This research seeks to contribute to existing studies and dialogue on the impact and effect of industry 4.0 on work in the Information Technology services (IT) sector in India. Though the research focuses on the impact of technologies that comprise Industry 4.0, such technologies are frequently interchanged with the words ‘automation’ and ‘digitisation’. Thus, the desk research also examines the impact of  ‘automation’ and ‘digitisation’ on the IT sector in India. The case study looks atthe IT sector broadly and where applicable, calls out information specific to sub-sectors such as IT enabled services (IT-eS) or Business Process Management (IT-BPM). The IT sector in India is uniquely placed; it is producing the technologies that are disrupting work in other industries as well as implementing them internally. This report focuses on the latter, but brings into context the former when relevant to work in the sector.&lt;/p&gt;
&lt;p&gt;By drawing out trends and providing an analysis of contextual, quantitative and qualitative data on changes to work and labour markets in India as a result of technological uptake, it is anticipated that comparative research can be enabled by creating a framework that can be replicated in other, particularly developing, contexts.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;[1] Carl Benedikt Frey and Michael A. Osborne, 2013. The future of employment: How susceptible are jobs to computerisation?, Oxford Martin School, September.&lt;/p&gt;
&lt;p&gt;[2] See David H. Autor &amp;amp; Michael J. Handel, 2013. “Putting Tasks to the Test: Human Capital, Job Tasks, and Wages,” Journal of Labor Economics, University of Chicago Press, Vol. 31(S1), pages S59 -S96. See also: Future of Work and Skills, The Organisation for Economic Co-operation and Development, February 2017.&lt;/p&gt;
&lt;p&gt;[3] Business Today, AI, automation will cost 7 lakh IT jobs by 2022, says report. (November 7, 2017) Retrieved &lt;a href="https://www.businesstoday.in/sectors/it/ai-and-automation-to-cost-7-lakh-it-jobs-by-2022-says-report/story/259880.html"&gt;https://www.businesstoday.in/sectors/it/ai-and-automation-to-cost-7-lakh-it-jobs-by-2022-says-report/story/259880.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[4] Advantage India, India Brand Equity Foundation. Retrieved &lt;a href="https://www.ibef.org/download/IT-ITeS-Report-Apr-2018.pdf"&gt;https://www.ibef.org/download/IT-ITeS-Report-Apr-2018.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[5] Embracing Industry 4.0 -and Rediscovering Growth, Boston Consulting Group. Retrieved &lt;a href="https://www.bcg.com/capabilities/operations/embracing-industry-4.0-rediscovering-growth.aspx"&gt;https://www.bcg.com/capabilities/operations/embracing-industry-4.0-rediscovering-growth.aspx&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[6] India’s Readiness for Industry 4.0 -A Focus on Automotive Sector, Grant Thorton and Confederation of Indian Industry. Retrieved &lt;a href="http://www.nasscom.in/sites/default/files/NASSCOM_Annual_Guidance_Final_22062017.pdf"&gt;http://www.nasscom.in/sites/default/files/NASSCOM_Annual_Guidance_Final_22062017.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[7] G20 Insights, Bridging the digital divide: Skills for the new age., Retrieved &lt;a href="http://www.g20-insights.org/policy_briefs/bridging-digital-divide-skills-new-age/"&gt;http://www.g20-insights.org/policy_briefs/bridging-digital-divide-skills-new-age/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[8] World Economic Forum, The Future of Jobs -Employment, Skills and Workforce Strategy for the Fourth Industrial Revolution, (January 2016).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/future-of-work-in-india-it-it-es-sector'&gt;https://cis-india.org/internet-governance/blog/future-of-work-in-india-it-it-es-sector&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Future of Work</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-04-28T09:52:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/igf-workshop-an-evidence-based-intermediary-liability-policy-framework">
    <title>An Evidence based Intermediary Liability Policy Framework: Workshop  at IGF </title>
    <link>https://cis-india.org/internet-governance/blog/igf-workshop-an-evidence-based-intermediary-liability-policy-framework</link>
    <description>
        &lt;b&gt;CIS is organising a workshop at the Internet Governance Forum 2014. The workshop will be an opportunity to present and discuss ongoing research on the changing definition of intermediaries and their responsibilities across jurisdictions and technologies and contribute to a comprehensible framework for liability that is consistent with the capacity of the intermediary and with international human-rights standards.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Centre for Internet and Society, India and Centre for Internet and Society, Stanford Law School, USA, will be organising a workshop to analyse the role of intermediary platforms in relation to freedom of expression, freedom of information and freedom of association at the Internet Governance Forum 2014. &lt;span&gt;The aim of the workshop is to highlight the increasing importance of digital rights and broad legal protections of stakeholders in an increasingly knowledge-based economy. The workshop will discuss public policy issues associated with Internet intermediaries, in particular their roles, legal responsibilities and related liability limitations in context of the evolving nature and role of intermediaries in the Internet ecosystem. distinct&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Online Intermediaries: Setting the context&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Internet has facilitated unprecedented access to information and amplified avenues for expression and engagement by removing the limits of geographic boundaries and enabling diverse sources of information and online communities to coexist. Against the backdrop of a broadening base of users, the role of intermediaries that enable economic, social and political interactions between users in a global networked communication is ubiquitous. Intermediaries are essential to the functioning of the Internet as many producers  and consumers of content on the internet rely on the action of some third party–the so called intermediary. Such intermediation ranges from the mere provision of connectivity, to more advanced services such as providing online storage spaces for data, acting as platforms for storage and sharing of user generated content (UGC), or platforms that provides links to other internet content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Online intermediaries enhance economic activity by reducing costs, inducing competition by lowering the barriers for participation in the knowledge economy and fuelling innovation through their contribution to the wider ICT sector as well as through their key role in operating and maintaining Internet infrastructure to meet the network capacity demands of new applications and of an expanding base of users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Intermediary platforms also provide social benefits, by empowering users and improving  choice through social and participative networks, or web services that enable creativity and collaboration amongst individuals. By enabling platforms for self-expression and cooperation, intermediaries also play a critical role in establishing digital trust, protection of human rights such as freedom of speech and expression, privacy and upholding fundamental values such as freedom and democracy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the economic and social benefits of online intermediaries are conditional to a framework for protection of intermediaries against legal liability for the communication and distribution of content which they enable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Intermediary Liability&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the last decade, right holders, service providers and Internet users have been locked in a  debate on the potential liability of online intermediaries. The debate has raised global concerns on issues such as, the extent to which Internet intermediaries should be held responsible for content produced by third parties using their Internet infrastructure and how the resultant liability would affect online innovation and the free flow of knowledge in the information economy?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the impact of their services on communications, intermediaries find themselves as either directly liable for their actions, or indirectly (or “secondarily”) liable for the actions of their users. Requiring intermediaries to monitor the legality of the online content poses an insurmountable task. Even if monitoring the legality of content by intermediaries against all applicable legislations were possible, the costs of doing so would be prohibitively high. Therefore, placing liability on intermediaries can deter their willingness and ability to provide services, hindering the development of the internet itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Economics of intermediaries are dependent on scale and evaluating the legality of an individual post exceeds the profit from hosting the speech, and in the absence of judicial oversight can lead to a private censorship regime. Intermediaries that are liable for content or face legal exposure, have powerful incentives, to police content and limit user activity to protect themselves.  The result is curtailing of legitimate expression especially where obligations related to and definition of illegal content is vague. Content policing mandates impose significant compliance costs limiting the innovation and competiveness of such platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More importantly, placing liability on intermediaries has a chilling effect on freedom of expression online. Gate keeping obligations by service providers threaten democratic participation and expression of views online, limiting the potential of individuals and restricting freedoms. Imposing liability can also indirectly lead to the death of anonymity and pseudonymity, pervasive surveillance of users' activities, extensive collection of users' data and ultimately would undermine the digital trust between stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus effectively, imposing liability for intermediaries creates a chilling effect on Internet activity and speech, create new barriers to innovation and stifles the Internet's potential to promote broader economic and social gains.  To avoid these issues, legislators have defined 'safe harbours', limiting the liability of intermediaries under specific circumstances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Online intermediaries do not have direct control of what information is or information are exchanged via their platform and might not be aware of illegal content per se. A key framework for online intermediaries, such limited liability regimes provide exceptions for third party intermediaries from liability rules to address this asymmetry of information that exists between content producers and intermediaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, it is important to note, that significant differences exist concerning the subjects of these limitations, their scope of provisions and procedures and modes of operation. The 'notice and takedown' procedures are at the heart of the safe harbour model and can be subdivided into two approaches:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Vertical approach where liability regime applies to specific types of content exemplified in the US Digital Copyright Millennium Act&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. Horizontal approach based on the E-Commerce Directive (ECD) where different levels of immunity are granted depending on the type of activity at issue&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Current framework &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Globally, three broad but distinct models of liability for intermediaries have emerged within the Internet ecosystem:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Strict liability model under which intermediaries are liable for third party content used in countries such as China and Thailand&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Safe harbour model granting intermediaries immunity, provided their compliance on certain requirements&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Broad immunity model that grants intermediaries broad or conditional immunity from liability for third party content and exempts them from any general requirement to monitor content. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the models described above can provide useful guidance for the drafting or the improvement of the current legislation, they are limited in their scope and application as they fail to account for the different roles and functions of intermediaries. Legislators and courts are facing increasing difficulties, in interpreting these regulations and adapting them to a new economic and technical landscape that involves unprecedented levels user generated content and new kinds of and online intermediaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The nature and role of intermediaries change considerably across jurisdictions, and in relation to the social, economic and technical contexts. In addition to the dynamic nature of intermediaries the different categories of Internet intermediaries‘ are frequently not clear-cut, with actors often playing more than one intermediation role. Several of these intermediaries offer a variety of products and services and may have number of roles, and conversely,  several of these intermediaries perform the same function. For example , blogs, video services and social media platforms are considered to be 'hosts'. Search engine providers have been treated as 'hosts' and 'technical providers'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This limitations of existing models in recognising that different types of intermediaries perform different functions or roles  and therefore should have different liability, poses an interesting area for research and global deliberation. Establishing classification of intermediaries, will also help analyse existing patterns of influence in relation to content for example when the removal of content by upstream intermediaries results in undue over-blocking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Distinguishing intermediaries on the basis of their roles and functions in the Internet ecosystem is  critical to ensuring a balanced system of liability and addressing concerns for freedom of expression. Rather than the highly abstracted view of intermediaries as providing a single unified service of connecting third parties, the definition of intermediaries must expand to include the specific role and function they have in relation  to users'  rights.  A successful intermediary liability regime must balance the needs of producers, consumers, affected parties and law enforcement, address the risk of abuses for political or commercial purposes, safeguard human rights and contribute to the evolution of uniform principles and safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Towards an evidence based intermediary liability policy framework&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This workshop aims to bring together leading representatives from a broad spectrum of stakeholder groups to discuss liability related issues and ways to enhance Internet users’ trust.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Questions to address at the panel include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. What are the varying definitions of intermediaries across jurisdictions?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. What are the specific roles and functions that allow for classification of intermediaries?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. How can we ensure the legal framework keeps pace with technological advances and the changing roles of intermediaries?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. What are the gaps in existing models in balancing innovation, economic growth and human rights?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. What could be the respective role of law and industry self-regulation in enhancing trust?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. How can we enhance multi-stakeholder cooperation in this space?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Confirmed Panel:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technical Community: Malcolm Hutty: Internet Service Providers Association (ISPA)&lt;br /&gt;Civil Society: Gabrielle Guillemin: Article19&lt;br /&gt;Academic: Nicolo Zingales: Assistant Professor of Law at Tilburg University&lt;br /&gt;Intergovernmental: Rebecca Mackinnon: Consent of the Networked, UNESCO project&lt;br /&gt;Civil Society: Anriette Esterhuysen: Association for Progressive Communication (APC)&lt;br /&gt;Civil Society: Francisco Vera: Advocacy Director: Derechos Digitale&lt;br /&gt;Private Sector: Titi Akinsanmi: Policy and Government Relations Manager, Google Sub-Saharan Africa&lt;br /&gt;Legal: Martin Husovec: MaxPlanck Institute&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Moderator(s): &lt;/span&gt;&lt;span&gt;Giancarlo Frosio, Centre for Internet and Society (CIS) and &lt;/span&gt;&lt;span&gt;Jeremy Malcolm, Electronic Frontier Foundation &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Remote Moderator: &lt;/span&gt;&lt;span&gt;Anubha Sinha, New Delhi&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/igf-workshop-an-evidence-based-intermediary-liability-policy-framework'&gt;https://cis-india.org/internet-governance/blog/igf-workshop-an-evidence-based-intermediary-liability-policy-framework&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>human rights</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Human Rights Online</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Multi-stakeholder</dc:subject>
    

   <dc:date>2014-07-04T06:41:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/towards-algorithmic-transparency">
    <title>Towards Algorithmic Transparency</title>
    <link>https://cis-india.org/internet-governance/blog/towards-algorithmic-transparency</link>
    <description>
        &lt;b&gt;This policy brief examines the issue of transparency as a key ethical component in the development, deployment, and use of Artificial Intelligence.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This brief proposes a framework that seeks to overcome the challenges in preserving transparency when dealing with machine learning algorithms, and suggests solutions such as the incorporation of audits, and ex ante approaches to building interpretable models right from the design stage. Read the full report &lt;a href="https://cis-india.org/internet-governance/algorithmic-transparency-pdf" class="internal-link" title="Algorithmic Transparency PDF"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Regulatory Practices Lab at CIS aims to produce regulatory policy 
suggestions focused on India, but with global application, in an agile 
and targeted manner and to promote transparency around practices 
affecting digital rights. &lt;br /&gt;The Regulatory Practices Lab is supported by Google and Facebook.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/towards-algorithmic-transparency'&gt;https://cis-india.org/internet-governance/blog/towards-algorithmic-transparency&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Radhika Radhakrishnan, and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Regulatory Practices Lab</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Algorithms</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Transparency</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2020-07-15T13:16:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/mapping-web-censorship-net-neutrality-violations">
    <title>Mapping Web Censorship &amp; Net Neutrality Violations</title>
    <link>https://cis-india.org/internet-governance/blog/mapping-web-censorship-net-neutrality-violations</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For over a year, researchers at the Centre 
for Internet and Society have been studying website blocking by internet
 service providers (ISPs) in India. We have learned that major ISPs 
don’t always block the same websites, and also use different blocking 
techniques. &lt;strong&gt;To take this study further, and map net neutrality violations by ISPs, we need your help.&lt;/strong&gt;
 We have developed CensorWatch, a research tool to collect empirical 
evidence about what websites are blocked by Indian ISPs, and which 
blocking methods are being used to do so. Read more about this project (&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/qxKoDnnG4cR8mPZaiOr8immlHKFilRoRSYOvX_26BcZRtiN_hoo5VrFfQHbDqaES1OV6jUM0RbWCZs1ODSHr_Pf9yeJFesRxxQvyUrZm4Tlcvdjmh232QQV3fOkmrj9wiVh5LQiW1LQAprvYWmHp_s-TW5ZdNXZY07QvlFR01dKzIxnv7TorEfkyazo" target="_blank"&gt;link&lt;/a&gt;), &lt;strong&gt;download CensorWatch&lt;/strong&gt; (&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/F9Wsq5zbx6VJKZxrsjYFy3Q5-jSkk0-3nr5hBfuyQiDUEKyEm_fLY6kh4W9MB7GOLoPZbowqsXDT17DEmFgMoFY4IIOEjxq0rNCtFeEc7b-0GSnRPeLDi9VmYX5WE1vGlwMvM7BPtyfmXD6lNdIWzAdjq_MpSqWRACk3JJNPhzqieJXoEoOnY8WH1rxR4HnJwDjyJHSkHgMTmWcm0POB_kDOtt2fk_GnXkkjv5LK7MxRZe8f" target="_blank"&gt;link&lt;/a&gt;), and help determine if ISPs are complying with India’s net neutrality regulations.&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="https://play.google.com/store/apps/details?id=com.censorwatch.netprobesapp"&gt;&lt;img src="https://cis-india.org/internet-governance/censorwatch/" alt="null" width="75%" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;Learn more about website blocking in India, through our recent work on the issue —&lt;/div&gt;
&lt;ol&gt;&lt;li&gt;Using information from court orders, 
user reports, and government orders, and running network tests from six 
ISPs, Kushagra Singh, Gurshabad Grover and Varun Bansal presented the &lt;strong&gt;largest study of web blocking&lt;/strong&gt;
 in India. Through their work, they demonstrated that major ISPs in 
India use different techniques to block websites, and that they don’t 
block the same websites (&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/mgmW9wuVo0QjRGqm9DnDQiVT4lYy3lgY5maOgjAk05baH_NWtRSfznWooMtcTgQ2a059mWk91p_lMZqJAqaRHXZOLSEQQOAMeM5RowiyfY3giKQm3aDJoYnWw7VhAHeBjdkObBFF0PYWjoC1NJi21fSZyifOWm_CvlC3gq7nxbHtejEy" target="_blank"&gt;link&lt;/a&gt;).&lt;/li&gt;&lt;li&gt;Gurshabad Grover and Kushagra Singh 
collaborated with Simone Basso of the Open Observatory of Network 
Interference (OONI) to study &lt;strong&gt;HTTPS traffic blocking in India&lt;/strong&gt; by running experiments on the networks of three popular Indian ISPs: ACT Fibernet, Bharti Airtel, and Reliance Jio (&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/oP_eOysGeBOsgRW-5k8V-ReWU_DMUhykR2wN9ZAqndgHev3bxY1c8kSSviR3jjOMqzOJhP05AfK2CtHAH8-Zv21mU7uAW2ainkl5tmS-uZx3LG15MjZXbRQyE71871AouDuXY0hLTVEVG3ovaEvb8BSFOhJz7NpnTZdsY5vIOeBqSsaB31HJdMT8bNELQJ8VjhUoNw" target="_blank"&gt;link&lt;/a&gt;).&lt;/li&gt;&lt;li&gt;For &lt;em&gt;The Leaflet&lt;/em&gt;, Torsha Sarkar and Gurshabad Grover wrote about the &lt;strong&gt;legal framework of blocking in India&lt;/strong&gt;
 — Section 69A of the IT Act and its rules. They considered commentator 
opinions questioning the constitutionality of the regime, whether 
originators of content are entitled to a hearing, and whether Rule 16, 
which mandates confidentiality of content takedown requests received by 
intermediaries from the Government, continues to be operative (&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/WggQUDysA9mWPEzvGTRc43aPpKNmNjDcdEzj1ALhrbXgQWqnZRY9L9J45XXbJ3yCnX9-XIuYyRTQ588cBiYNQIs2KsfB0Dydz2QY4Z5VdMTdJ-RMr2M5uDqJ8Amr5gT3APy01bg8gNTyoEvdIcKryjrWnUFlTdxFAtohQ_AwVRjTbzC5FcAFhO9DdHOQV0Xp9X65At3tR17epGvo" target="_blank"&gt;link&lt;/a&gt;).&lt;/li&gt;&lt;li&gt;In the &lt;em&gt;Hindustan Times&lt;/em&gt;, Gurshabad Grover critically analysed &lt;strong&gt;the confidentiality requirement embedded within Section 69A of the IT Act&lt;/strong&gt; and argued how this leads to internet users in India experiencing arbitrary censorship (&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/j75HVdd7j4huKQd0kP9lusNpz1ZL0CxXMEWeySOhsQZbcKECrEKfaq52LlB-QjnT1TIB1mjqhB0TyweA7rLCq41Rd_6uyBUo8-Uc4iHiHSXYxC06rhW7o7ZFtCt7bKdNldDWkoMhSD7x0daAhzcSdLSPbNBRSy1HkGEGZ7Z_11tovlleodez9gm60zyvkGNM1YMQSLZ4NZ0k8RD2zncGPoWXjsytI4YwnQyy_QZNSKOSdY2_X6GoVSugRZhmyWwWCpHpk-yDM7XJ0OF4GZlTUSgfhcfftJEGBlQlkQ" target="_blank"&gt;link&lt;/a&gt;).&lt;/li&gt;&lt;li&gt;Torsha Sarkar, along with Sarvjeet Singh of the Centre for Communication Governance (CCG), spoke to &lt;em&gt;Medianama&lt;/em&gt; delineating the &lt;strong&gt;procedural aspects of section 69A of the IT Act &lt;/strong&gt;(&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/QAWrguo8Vx6X1PsmbTvCTYQ6U6nycGdSRg9gfDYFTRxUAa82nB6gYpuPyEE3VztSJzG2888ua224upBlg-k9Tu29TZdhl3ET71WwsKUfKxdyUPkLiY1A4jSD1p59sH0KXlQBqU10H38gDFHZ5WVsMCwZXLTISv9SvXIRx7Vu59U4HBV-hhB3BSpe_SApQnHQgPN0BIl0g852jSINvTI6Bh5HGNTWZ3nQWRn5H1vShoG4Q3VcZBWfewbc" target="_blank"&gt;link&lt;/a&gt;).&lt;/li&gt;&lt;li&gt;Arindrajit Basu spoke to the &lt;em&gt;Times of India&lt;/em&gt; about the &lt;strong&gt;geopolitical and regulatory implications&lt;/strong&gt; of the Indian government’s move to ban fifty-nine Chinese applications from India (&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/lICwdbQnezwqQKZHQ_Xso6Qp7735jleiJJJI88DgKZx348ewlSRWU1uFyEbtMwZOoJRS5MjHbX9KgklFrlc-jKTXKL2S4K5aCXEU2isCuFhwORAz_DnnBai7nr2pyiK0HmM0Eb3AD_JyTUwWtg9O6c0jV0Nf8cbTuT3FD7WypVO_NWUJ_GZVo7er10LMUXE_1EP_d2nh2uziuXXmM1JV-9NN6klSATsLa_tprf0bDNbNa_U4DHMm6oQvXFfVHj74jRhq3nKDkCzQeQZ_SRMxNNqIUIN5aMLGbQfBAziZ_E3hIYp-ptOQ7Y2cqF_4eiYdY20tBm5ltySmFBQQi5_nFQ" target="_blank"&gt;link&lt;/a&gt;).&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/mapping-web-censorship-net-neutrality-violations'&gt;https://cis-india.org/internet-governance/blog/mapping-web-censorship-net-neutrality-violations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2020-10-05T07:59:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/icann-begins-its-sojourn-into-open-data">
    <title>ICANN Begins its Sojourn into Open Data</title>
    <link>https://cis-india.org/internet-governance/icann-begins-its-sojourn-into-open-data</link>
    <description>
        &lt;b&gt;The Internet Corporation for Assigned Names and Numbers (ICANN) recently announced that it will now set up a pilot project in order to introduce an Open Data initiative for all data that it generates. We would like to extend our congratulations to ICANN on the development of this commendable new initiative, and would be honoured to support the creation of this living document to be prepared before ICANN 58.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;To quote the ICANN blog directly, the aim of this project is to “&lt;em&gt;bring selected data sets into the open, available through web pages and programming APIs, for the purposes of external party review and analysis&lt;/em&gt;” &lt;a href="#ftn1"&gt;[1]&lt;/a&gt;. This will play out through the setting up of three components:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Development of a catalogue of existing data sets which will be appropriate for publication&lt;/li&gt;
&lt;li&gt;Selection of the technology necessary for managing the publication of these data sets.&lt;/li&gt;
&lt;li&gt;Creation of a process to prioritise the order in which the data sets are made available &lt;a href="#ftn2"&gt;[2]&lt;/a&gt;.&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;&lt;strong&gt;Principles in Question&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Centre for Internet and Society firmly believes in the value of accessible, inclusive open data standards as a tool for enhancing transparency in any system. Greater transparency goes a long way towards bringing a regulatory authority closer to those who are governed under it – be it a state or a body such as ICANN. It is, in fact, an indispensable component of a multistakeholder model of governance to facilitate informed participation by all parties concerned in the decision making process.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The right to information that a regulatory authority owes those it regulates has two kinds of components. The first may be described as reactive disclosure – “&lt;em&gt;when individual members of the public file requests for and receive information&lt;/em&gt;” &lt;a href="#ftn#3"&gt;[3]&lt;/a&gt;. The second is disclosure that is more proactive in nature – “&lt;em&gt;when information is made public at the initiative of the public body, without a request being filed&lt;/em&gt;” &lt;a href="#ftn4"&gt;[4]&lt;/a&gt;. The former is epitomized by initiatives such as the Freedom of
Information Act &lt;a href="#ftn5"&gt;[5]&lt;/a&gt; in the United States, the Right to Information Act in India &lt;a href="#ftn6"&gt;[6]&lt;/a&gt;, or ICANN’s very own Documentary Information Disclosure Policy &lt;a href="#ftn7"&gt;[7]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Proactive disclosure policies, on the other hand, operate out of the principle that the provision of information by those in positions of regulatory authority will ensure free and timely flow of information to the public, and the information so provided will be equally accessible to everyone, without the need for individual requests being filed &lt;a href="#ftn8"&gt;[8]&lt;/a&gt;. Proactive disclosure also goes a long way towards preventing officials from denying or manipulating information subsequent to publication &lt;a href="#ftn9"&gt;[9]&lt;/a&gt;. Scholars have touted proactive disclosure as the “&lt;em&gt;future of the right to know&lt;/em&gt;” &lt;a href="#ftn10"&gt;[10]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;At the Centre for Internet and Society, much of our research has pointed towards the direction of creating better open data standards for governments (Please see “&lt;a href="http://cis-india.org/openness/blog-old/open-government-data-study"&gt;Open Data Government Study: India&lt;/a&gt;”). We are one of the Lead Stewards of the International Open Data Charter &lt;a href="#ftn11"&gt;[11]&lt;/a&gt; and have maintained that it is crucial for governments to maintain open data standards in the interest of transparency and accountability. We firmly believe that the same principles extend also to ICANN – a body which, as per its own by-laws commits towards operating “…&lt;em&gt;to the maximum extent feasible in an open and transparent manner and consistent with procedures designed to ensure fairness&lt;/em&gt;”&lt;a href="#ftn12"&gt;[12]&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Suggestions&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;While this policy is in its nascent stage, we would like to put forward certain principles which we believe ought to be kept in mind before it gets chalked out, in the best interest of the ICANN community:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;To determine what data sets should be made publicly accessible, it would be useful to carry out an analysis of existing DIDP requests to understand trends in the kind of information that the ICANN community is interested in accessing, which can then be proactively disclosed. It would be redundant on ICANN’s part to disclose, under this Open Data Policy, data which is already publicly available.&lt;/li&gt;
&lt;li&gt;ICANN should first develop a catalog of all existing data sets with ICANN, apply the principles for deciding appropriateness for publication, then make publicly available both the full catalog, and the actual data sets identified for publication. ICANN should make clear the kind of information it is not going to make accessible
under this open data standards, and justify the principles on the basis of which it is choosing to do so (analogous to the exceptions clauses under the DIDP).&lt;/li&gt;
&lt;li&gt;With respect to technology to be selected for managing the publication of data sets, free and open source software (such as CKAN) ought to be used, and open standards should be adopted for the use and licensing of such data.&lt;/li&gt;
&lt;li&gt;Such data ought to be downloadable in bulk in CSV/JSON/XML formats.&lt;/li&gt;
&lt;li&gt;DIDP responses and the open data work flows ought to be integrated so that all the responses to DIDP requests are automatically published in a machine-readable format as open data.&lt;/li&gt;
&lt;li&gt;Qualitative (text of speeches, slides from presentations, recordings of sessions, etc.) and quantitative data should both be included under this new policy.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;In conclusion, we would like to extend our congratulations to ICANN on the development of this commendable new initiative, and would be honoured to support the creation of this living document before ICANN 58.&lt;/p&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;h3&gt;&lt;strong&gt;Endnotes&lt;/strong&gt;&lt;/h3&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;[1] Internet Corporation for Assigned Names and Numbers, &lt;em&gt;ICANN Kicks off Open Data Initiative Pilot&lt;/em&gt;, (November 6, 2016), available at &lt;a href="https://www.icann.org/news/blog/icann-kicks-off-open-data-initiative-pilot"&gt;https://www.icann.org/news/blog/icann-kicks-off-open-data-initiative-pilot&lt;/a&gt; (Last visited on November 9, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;[2] Id.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;[3] Naniette Coleman, &lt;em&gt;Proactive vs. Reactive Transparency&lt;/em&gt;, (February 8, 2010), available at: &lt;a href="http://blogs.worldbank.org/publicsphere/proactive-vs-reactive-transparency"&gt;http://blogs.worldbank.org/publicsphere/proactive-vs-reactive-transparency&lt;/a&gt; (Last visited on November 9, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;[4] Id.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;[5] Freedom of Information Act, 1966, 5 U.S.C. § 552.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;[6] Right to Information Act, 2005 &lt;em&gt;available at&lt;/em&gt; http://righttoinformation.gov.in/rti-act.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;[7] ICANN, &lt;em&gt;Documentary Information Disclosure Policy&lt;/em&gt;, available at &lt;a href="https://www.icann.org/resources/pages/didp-2012-02-25-en"&gt;https://www.icann.org/resources/pages/didp-2012-02-25-en&lt;/a&gt; (Last visited on November 9, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;[8] Helen Darbishire, &lt;em&gt;Proactive Transparency: The future of the right to information?&lt;/em&gt; Working paper. N.p.: World Bank, (2009).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;[9] Id.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;[10] Darbishire, &lt;em&gt;supra&lt;/em&gt; note 8.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;[11] Open Data Charter, &lt;em&gt;Who We Are&lt;/em&gt;, available at &lt;a href="http://opendatacharter.net/who-we-are/"&gt;http://opendatacharter.net/who-we-are/&lt;/a&gt; (Last visited on November 10, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;[12] Article III(1), Bylaws For Internet Corporation For Assigned Names And Numbers&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/icann-begins-its-sojourn-into-open-data'&gt;https://cis-india.org/internet-governance/icann-begins-its-sojourn-into-open-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Padmini Baruah and Sumandro Chattapadhyay</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    

   <dc:date>2016-11-12T01:17:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/call-for-comments-model-security-standards-for-the-indian-fintech-industry">
    <title>Call for Comments: Model Security Standards for the Indian Fintech Industry</title>
    <link>https://cis-india.org/internet-governance/call-for-comments-model-security-standards-for-the-indian-fintech-industry</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;The Centre for Internet and Society is pleased to make available the Draft document of Model Security Standards for the Indian Fintech Industry, for feedback and comments from all stakeholders. The objective of this document which was first published in November 2019, is to ensure that the data of users is dealt with in a secure and safe manner by the Fintech Industry, and that smaller businesses in the Fintech industry have a specific standard to look at in order to limit their liabilities for any future breaches. &lt;br /&gt;&lt;br /&gt;We invite any parties interested in the field of technology policy, including but not limited to lawyers, policy researchers, and engineers, to send in your feedback/comments on the draft document by the 16th of January 2020. We intend to publish our final draft by the end of January 2020. We look forward to receiving your contributions to make this document more comprehensive and effective. Please find a copy of the draft document &lt;a href="https://cis-india.org/internet-governance/resources/security-standards-for-the-financial-technology-sector-in-india" class="internal-link" title="Security Standards for the Financial Technology Sector in India"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/call-for-comments-model-security-standards-for-the-indian-fintech-industry'&gt;https://cis-india.org/internet-governance/call-for-comments-model-security-standards-for-the-indian-fintech-industry&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Financial Technology</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    

   <dc:date>2019-12-16T13:16:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns">
    <title>Automated Facial Recognition Systems (AFRS): Responding to Related Privacy Concerns</title>
    <link>https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns</link>
    <description>
        &lt;b&gt;Arindrajit Basu and Siddharth Sonkar have co-written this blog as the second of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems? &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Supreme Court of India, in &lt;a href="https://indiankanoon.org/doc/91938676/"&gt;Puttaswamy I&lt;/a&gt;&lt;em&gt; &lt;/em&gt;recognized&lt;em&gt;&amp;nbsp;&lt;/em&gt;that
 the right to privacy is not surrendered merely because the individual 
is in a public place. Privacy is linked to the individual as it is an 
essential facet of human dignity. Justice Chelameswar further clarified 
that privacy is contextual. Even in a public setting, people trying to 
converse in whispers would signal a claim to the right to privacy. 
Speaking on a loudspeaker would naturally not signal the same claim.&lt;/p&gt;
&lt;p&gt;The Supreme Court of Canada has also affirmed the notion of 
contextual privacy. As recently as on 7 March, 2019, the Supreme Court 
of Canada &lt;a href="http://www.thecourt.ca/r-v-jarvis-carving-out-a-contextual-approach-to-privacy/" rel="noreferrer noopener" target="_blank"&gt;in a landmark decision&lt;/a&gt; defined privacy rights in public areas implicitly applying &lt;a href="https://crypto.stanford.edu/portia/papers/RevnissenbaumDTP31.pdf"&gt;Helena Nissenbaum’s theory of contextual integrity&lt;/a&gt;.
 Helena Nissenbaum explains that the extent to which the right to 
privacy is eroded in public spaces with the help of her theory of 
contextual integrity.&lt;/p&gt;
&lt;p&gt;Nissenbaum suggests that labelling information as exclusively public 
or private fails to take into account the context which rationalises the
 desire of the individual to exercise her privacy in public. To explain 
this with an illustration, there exists a reasonable expectation of 
privacy in the restroom of a restaurant, even though it is in a public 
space.&lt;/p&gt;
&lt;p&gt;In &lt;a href="http://www.thecourt.ca/r-v-jarvis-carving-out-a-contextual-approach-to-privacy/"&gt;&lt;em&gt;R v Jarvis&lt;/em&gt;&lt;/a&gt; (Jarvis), the Court overruled a Court of Appeal for Ontario &lt;a href="https://www.canlii.org/en/on/onca/doc/2017/2017onca778/2017onca778.pdf"&gt;decision&lt;/a&gt;
 to hold that people can have a reasonable expectation of privacy even 
in public spaces. In this case, Jarvis was charged with the offence of 
voyeurism for secretly recording his students. The primary issue that 
the&amp;nbsp; Supreme Court of Canada was concerned with was whether the students
 filmed by Mr. Jarvis enjoyed a reasonable expectation of privacy at 
their school.&lt;/p&gt;
&lt;p&gt;The Court in this case unanimously held that students did indeed have
 a reasonable expectation of privacy.&amp;nbsp; The Court concluded nine 
contextual factors relevant in determining whether a person has a 
reasonable expectation to privacy would arise. The listed factors were:&lt;/p&gt;
&lt;p&gt;“1. The location the person was in when he or she was observed or recorded,&lt;/p&gt;
&lt;p&gt;2. The nature of the impugned conduct (whether it consisted of observation or recording),&lt;/p&gt;
&lt;p&gt;3. Awareness of or consent to potential observation or recording,&lt;/p&gt;
&lt;p&gt;4. The manner in which the observation or recording was done,&lt;/p&gt;
&lt;p&gt;5. The subject matter or content of the observation or recording,&lt;/p&gt;
&lt;p&gt;6. Any rules, regulations or policies that governed the observation or recording in question,&lt;/p&gt;
&lt;p&gt;7. The relationship between the person who was observed or recorded and the person who did the observing or recording,&lt;/p&gt;
&lt;p&gt;8. The purpose for which the observation or recording was done, and&lt;/p&gt;
&lt;p&gt;9. The personal attributes of the person who was observed or recorded.” (paragraph 29 of the judgement).&lt;/p&gt;
&lt;p&gt;The Court emphasized that the factors are not an exhaustive list, but
 rather were meant to be a guiding tool in determining whether a 
reasonable expectation of privacy existed in a given context. It is not 
necessary that each of these factors is present in a given situation to 
give rise to an expectation of privacy.&lt;/p&gt;
&lt;p&gt;Compared to the above-mentioned factors in Jarvis, the Indian Supreme Court in &lt;a href="https://indiankanoon.org/doc/127517806/"&gt;Justice K.S Puttaswamy (Retd.) v. Union of India&lt;/a&gt;: Justice Sikri (Puttaswamy II) &lt;strong&gt;—&lt;/strong&gt;
 the case which upheld the constitutionality of the Aadhaar project 
relied on the following factors to determine a reasonable expectation of
 privacy in a given context:&lt;/p&gt;
&lt;p&gt;“(i) What is the context in which a privacy claim is set up?&lt;/p&gt;
&lt;p&gt;(ii) Does the claim relate to private or family life, or a confidential relationship?&lt;/p&gt;
&lt;p&gt;(iii) Is the claim a serious one or is it trivial?&lt;/p&gt;
&lt;p&gt;(iv) Is the disclosure likely to result in any serious or significant injury and the nature and extent of disclosure?&lt;/p&gt;
&lt;p&gt;(v) Is disclosure relates to personal and sensitive information of an identified person?&lt;/p&gt;
&lt;p&gt;(vi) Does disclosure relate to information already disclosed publicly? If so, its implication?”&lt;/p&gt;
&lt;p&gt;These factors (acknowledged in Puttaswamy II in paragraph 292) seem 
to be very similar to the ones laid down in Jarvis, i.e., there is a 
strong reliance on the context in both cases. While there is no explicit
 mention of individual attributes of the individual claiming a 
reasonable expectation, the holding that children should be given an opt
 out indicates that the Court implicitly takes into account personal 
attributes (e.g. age) as well.&lt;/p&gt;
&lt;p&gt;The Court in Jarvis further (in paragraph 39) took the example of a 
woman in a communal change room at a public pool. She may expect other 
users to incidentally observe her undress but she would continue to 
expect only other women in the change room to observe her and reserve 
her rights against the general public. She would also expect not to be 
video recorded or photographed while undressing, both from other users 
of the pool and by the general public.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;If it is later found out that the change room had a one-way glass 
which allowed the pool staff to view the users change — or if there was a
 concealed camera recording persons while they were changing, she could 
claim a breach of her reasonable expectation of privacy under such 
circumstances and it would constitute an invasion of privacy.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;So, in the context of an AFRS, an individual walking down a 
public road may still signal that they wish to avail of their right to 
privacy. In such contexts, a concerted surveillance mechanism may come 
up against constitutional&amp;nbsp; roadblocks.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is the nature of information being collected?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The second big question &lt;strong&gt;—&lt;/strong&gt; the nature of information 
which is being collected plays a role in determining the extent to which
 a person can exercise their reasonable expectation of privacy. 
Puttaswamy II laid down that collection of core biometric information 
such as fingerprints, iris scans in the context of the Aadhaar-Based 
Biometric Authentication (‘ABBA’) is constitutionally permissible. The 
basis of this conclusion is that the Aadhaar Act does not deal with the 
individual’s intimate or private sphere.&lt;/p&gt;
&lt;p&gt;The judgement of the Supreme Court in Puttaswamy II is in a very 
specific context (i.e. the ABBA). It does not explain or identify the 
contextual factors which determine the extent to which privacy may be 
reasonably expected over biometrics generally. In this judgment, the 
Court observed that demographic information and photographs do not raise
 a reasonable expectation of privacy under Article 21 unless there exist
 special circumstances such as the disclosure of juveniles in conflict 
of law or a rape victim’s identity.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Most importantly, the Court held that face photographs for 
the purpose of identification are not covered by a reasonable 
expectation of privacy. The Court distinguished face photographs from 
intimate photographs or those photographs which concern confidential 
situations. &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Face photographs, according to the Court, are shared by 
individuals in the ordinary course of conduct for the purpose of 
obtaining a driving &lt;/strong&gt;l&lt;strong&gt;icense, voter id, passport, 
examination admit cards, employment cards, and so on. Face photographs 
by themselves reveal no information.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Naturally, this&amp;nbsp;pronouncement of the Apex Court is a huge boost for the introduction of AFRS in India.&lt;/p&gt;
&lt;p&gt;Abroad, however, on 4 September 2019, in &lt;a href="https://www.judiciary.uk/wp-content/uploads/2019/09/bridges-swp-judgment-Final03-09-19-1.pdf"&gt;Edward Bridges v. Chief Constable of South Wales Police&lt;/a&gt;, a Division Bench of the High Court in England and Wales heard a challenge against an AFRS introduced by law enforcement (&lt;em&gt;see&lt;/em&gt;
 Endnote 1). The High Court rejected a claim for judicial review holding
 that the AFRS in question does not violate inter alia the right to 
privacy under Article 8 of the European Convention of Human Rights 
(‘ECHR’).&lt;/p&gt;
&lt;p&gt;According to the Court, the AFRS was used for specific and limited 
purposes, i.e., only when the image of the public matched a person on an
 existing watchlist. The use of the AFRS was therefore considered a 
lawful and fair restriction.&lt;/p&gt;
&lt;p&gt;The Court, however, acknowledged that extracting biometric data 
through AFRS is “well beyond the expected and unsurprising”. This seems 
to be a departure from the Indian Supreme Court’s observation in 
Puttaswamy II that there is no reasonable expectation of privacy over 
biometric data in the context of ABBA, and may be a wiser approach for 
the Indian courts to adopt.&lt;/p&gt;
&lt;h6&gt;&lt;strong&gt;Endnote &lt;/strong&gt;&lt;/h6&gt;
&lt;p&gt;1. The challenge was put forth by Edward Bridges, a civil liberties 
campaigner from Cardiff for being caught on camera in two particular 
deployments of the AFRS a) when he was at Queen Street, a busy shopping 
area in Cardiff and b) when he was at the Defence Procurement, Research,
 Technology and Exportability Exhibition held at the Motorpoint Arena.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This was published by &lt;a class="external-link" href="https://aipolicyexchange.org/2019/12/28/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns/"&gt;AI Policy Exchange&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns'&gt;https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu, Siddharth Sonkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-01-02T14:09:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward">
    <title>Automated Facial Recognition Systems and the Mosaic Theory of Privacy: The Way Forward</title>
    <link>https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward</link>
    <description>
        &lt;b&gt; Arindrajit Basu and Siddharth Sonkar have co-written this blog as the third of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems? &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Mosaic Theory of Privacy&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Whether the data collected by the AFRS should be treated similar to 
face photographs taken for the purposes of ABBA is not clear in the 
absence of judicial opinion. The AFRS would ordinarily collect 
significantly more data than facial photographs during authentication. 
This can be explained with the help of the &lt;em&gt;&lt;a href="https://www.lawfareblog.com/defense-mosaic-theory" rel="noreferrer noopener" target="_blank"&gt;mosaic theory of privacy&lt;/a&gt;&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;The mosaic theory of privacy suggests that data collected for long 
durations of an individual can be qualitatively different from single 
instances of observation. It argues that aggregating data from different
 instances can create a picture of an individual which affects her 
reasonable expectation of privacy. This is because a mere slice of 
information reveals a lot less if the same is contextualised in a broad 
pattern — a mosaic.&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/p&gt;
&lt;p&gt;The mosaic theory of privacy does not find explicit reference in 
Puttaswamy II. The petitioners had argued that seeding of Aadhaar data 
into existing databases would bridge information across silos so as to 
make real time surveillance possible. This is because information when 
integrated from different silos becomes more than the sum of its parts.&lt;/p&gt;
&lt;p&gt;The Court, however, dismissed this argument, accepting UIDAI’s 
submission that the data collected remains in different silos and 
merging is not permitted within the Aadhaar framework. Therefore, the 
Court did not examine whether it is constitutionally permissible to 
integrate data from different silos; it simply rejected the possibility 
of surveillance as a result of Aadhaar authentication.&lt;/p&gt;
&lt;p&gt;Jurisprudence in other jurisdictions is more advanced. In&amp;nbsp;&lt;em&gt;United States v. Jones&lt;/em&gt;,
 the United States Supreme Court&amp;nbsp;had observed that the insertion of a 
global positioning system into Antoine Jones’ Jeep in the absence of a 
warrant and without his consent invaded his privacy, entitling him to 
Fourth Amendment Protection. In this case, the movement of Jones’ 
vehicle was monitored for a period of twenty-eight days. Five concurring
 opinions in Jones acknowledges that aggregated and extensive 
surveillance is capable of violating the reasonable expectation of 
privacy irrespective of whether or not surveillance has taken place in 
public.&lt;/p&gt;
&lt;p&gt;The Court distinguished between prolonged surveillance and short term
 surveillance. Surveillance in the short run does not reveal what a 
person repeatedly does, as opposed to sustained surveillance which can 
reveal significantly more about a person. The Court takes the example of
 how a sequence of trips to a bar, a bookie, a gym or a church can tell a
 lot more about a person than the story of any single visit viewed in 
isolation.&lt;/p&gt;
&lt;p&gt;Most recently, in&lt;a href="https://www.supremecourt.gov/opinions/17pdf/16-402_h315.pdf" rel="noreferrer noopener" target="_blank"&gt; &lt;em&gt;Carpenter v. United States&lt;/em&gt;&lt;/a&gt;,
 the Supreme Court of the United States held that the collection of&amp;nbsp; 
historical cell data by the government&amp;nbsp; exposes the physical movements 
of an individual to potential surveillance, and an individual holds a 
reasonable expectation of privacy against such&amp;nbsp; collection. The Court 
admitted that historical-cell site information allows the government to 
go back in time in order to retract the exact whereabouts of a person.&lt;/p&gt;
&lt;p&gt;Judicial decisions have not addressed specifically whether facial 
recognition through law enforcement constitutes a search under the 
Fourth Amendment or a “mere visual observation”.&lt;/p&gt;
&lt;p&gt;The common thread linking CCTV footages and cellular data is the 
unique ability to track the movement of an individual from one place to 
another, enabling extreme forms of surveillance. It is perhaps this 
crucial link that would make ARFS-enabled CCTVs prejudicial to 
individual privacy.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;The mosaic theory as understood in &lt;em&gt;Carpenter&lt;/em&gt; helps one 
understand the extent to which an AFRS can augment the capacities of law
 enforcement in India. This in turn can help in understanding whether it
 is constitutionally permissible to install such systems&amp;nbsp;across the 
country.&lt;/p&gt;
&lt;p&gt;AFRS enabled-CCTV footages from different CCTVs. if viewed in 
conjunction could reveal a sequence of movements of an individual, 
enabling long-term surveillance of a nature that is qualitatively 
distinct from isolated observances observed across unrelated CCTV 
footages.&lt;/p&gt;
&lt;p&gt;Subsequent to &lt;em&gt;Carpenter&lt;/em&gt;, &lt;a href="https://www.lawfareblog.com/four-months-later-how-are-courts-interpreting-carpenter" rel="noreferrer noopener" target="_blank"&gt;federal district courts&lt;/a&gt;
 in the United States have declined to apply Carpenter to video 
surveillance cases since the judgement did not “call into question 
conventional surveillance techniques and tools, such as security 
cameras.”&lt;/p&gt;
&lt;p&gt;The extent of processing that an AFRS-enabled CCTV exposes an 
individual to would be significantly greater. This is because every time
 an individual is in the zone of a AFRS-enabled CCTV, the facial image 
will be compared to a common database. Snippets from different CCTVs 
capturing the individual’s physical presence in two different locations 
may not be meaningful per se. When observed together, the AFRS will make
 it possible to identify the individual’s movement from one place to 
another.&lt;/p&gt;
&lt;p&gt;For instance, the AFRS will be able to identify the person when they 
are on Street A at a particular time and when they are Street B in the 
immediately subsequent hour recorded by respective CCTV cameras, 
indicating the person’s physical movement from A to B. While a CCTV 
camera only records movement of an individual in video format, AFRS 
translates that digital information into individualised data with the 
help of a comparison of facial features with a pre-existing database.&lt;/p&gt;
&lt;p&gt;Through data aggregation, which appears to be the aim of the Indian 
government&amp;nbsp;in their tender that links three databases, it is apparent 
that the right to privacy is in danger. Yet,&amp;nbsp;at present, there does not 
exist any case law or legislation that can render such&amp;nbsp;efforts illegal 
at this juncture.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Conclusions and The Way Forward&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Despite a lack of judicial recognition of the potential 
unconstitutionality of deploying&amp;nbsp;AFRS, it is clear that the introduction
 of these systems pose a clear and present danger to civil rights and 
human dignity. Algorithmic surveillance alters a human being’s life in 
ways that even the subject of this surveillance cannot fully comprehend.
 As an individual’s data is manipulated and aggregated to derive&amp;nbsp;a 
pattern about that individual’s world, the individual or his data no 
longer exists for itself&lt;sup&gt; &lt;/sup&gt;but are massaged into various categories.&lt;/p&gt;
&lt;p&gt;Louis Amoore terms this a ‘&lt;a href="https://journals.sagepub.com/doi/abs/10.1177/0263276411417430?journalCode=tcsa" rel="noreferrer noopener" target="_blank"&gt;data-derivative&lt;/a&gt;’,
 which is an abstract conglomeration of data that continuously shapes 
our futures without us having a say in their framing. The branding of an
 individual as a criminal and then aggregating their data causes 
emotional distress as individuals move about in fear of the state gaze 
and their association with activities that are branded as potentially 
dangerous — thereby suppressing a right to dissent — as exemplified by 
their use reported use during the recent protests in Hong Kong.&lt;/p&gt;
&lt;p&gt;Case law both in India and abroad has clearly suggested that a right 
to privacy is contextual and is not surrendered merely because an 
individual is in a public place. However, the jurisprudence protecting 
public photography or videography under the umbrella of privacy remains 
less clear globally and non-existent in India.&lt;/p&gt;
&lt;p&gt;The mosaic theory of privacy is useful in this regard as it prevents 
mass ‘data-veillance’ of individual behaviour and accurately identifies 
the unique power that the volume, velocity and variety of Big Data 
provides to the state. Therefore, it is imperative that the judiciary 
recognise safeguards from data aggregation as an essential component of a
 reasonable expectation of privacy. At the same time, legislation could 
also provide the required safeguards.&lt;/p&gt;
&lt;p&gt;In the US, Senators Coons and Lee recently introduced a draft Bill titled ‘&lt;a href="https://www.coons.senate.gov/imo/media/doc/ALB19A70.pdf" rel="noreferrer noopener" target="_blank"&gt;The Facial Recognition Technology Warrant Act of 2019’&lt;/a&gt;.
 The Bill aims to impose reasonable restrictions on the use of facial 
recognition technology by law enforcement. The Bill creates safeguards 
against sustained tracking of physical movements of an individual in 
public spaces. The Bill terms such tracking ‘ongoing surveillance’ when 
it occurs for over a period of 72 hours in real time or through 
application of technology to historical records. The Bill requires that 
ongoing surveillance only be conducted for law enforcement purposes &lt;em&gt;and&lt;/em&gt; in pursuance of a Court Order (unless it is impractical to do so).&lt;/p&gt;
&lt;p&gt;While the Bill has its textual problems, it is definitely worth 
considering as a model going forward and ensure that AFR systems are 
deployed in line with a rights-respecting reading of a reasonable 
expectation of privacy.&amp;nbsp; &lt;a href="http://datagovernance.org/report/adoption-and-regulation-of-facial-recognition-technologies-in-india" rel="noreferrer noopener" target="_blank"&gt;Parsheera&lt;/a&gt;
 suggests that the legislation should narrow tailoring of the objects 
and purposes for deployment of AFRS, restrictions on the person whose 
images may be scanned from the databases, judicial approval for its use 
on a case by case basis and effective mechanisms of oversight, analysis 
and verification.&lt;/p&gt;
&lt;p&gt;Appropriate legal intervention is crucial. A failure to implement 
this effectively jeopardizes the expression of our true selves and the 
core tenets of our democracy.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward'&gt;https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu, Siddharth Sonkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-01-02T14:12:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/how-to-shutdown-internet-shutdowns">
    <title>How to Shut Down Internet Shutdowns</title>
    <link>https://cis-india.org/internet-governance/events/how-to-shutdown-internet-shutdowns</link>
    <description>
        &lt;b&gt;This talk will focus on the challenges and opportunities for research on internet shutdowns after the judgement of the Supreme Court in Anuradha Bhasin v. Union of India. Stepping beyond the judgement, there will be a wider discussion on the practice of whitelists, blocking powers of the central government.
&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/How-to-Shut-Down-Internet-Shutdowns-Details/" alt="null" width="100%" /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;About the Speaker&lt;/strong&gt;&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;Apar Gupta is the Executive Director of the Internet Freedom Foundation.&lt;/p&gt;
&lt;p&gt;Apar has been fighting the good fight for digital rights. While in law school almost 20 years ago, he wrote a legal commentary on the IT Act that is now in its third edition. As a lawyer in the Supreme Court, he worked on landmark cases such as on Section 66A, Intermediary Liability, Internet Shutdowns, the Right to Privacy and Privacy.&lt;/p&gt;
&lt;p&gt;He also helped create public campaigns to advance net neutrality, reform defamation laws, fight Internet shutdowns and create a privacy statute. Apar previously ran his own successful law firm, was profiled in Outlook Magazine and listed in Forbes India's list of 30 under 30. He has also worked as a commercial litigator and partner in top law firms, written papers cited widely in local and international publications and taught courses at NLS and NLU.&lt;/p&gt;
&lt;p&gt;RSVP &lt;a class="external-link" href="https://forms.gle/CGei6wNUbR4t92549"&gt;here&lt;/a&gt;, or by sending an email Torsha (torsha@cis-india.org).&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/how-to-shutdown-internet-shutdowns'&gt;https://cis-india.org/internet-governance/events/how-to-shutdown-internet-shutdowns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-02-03T11:13:12Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity">
    <title>Governing ID: A Framework for Evaluation of Digital Identity</title>
    <link>https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;As governments across the globe implement new and foundational 
digital identification systems (Digital ID), or modernize existing ID 
programs, there is an urgent need for more research and discussion about
 appropriate uses of Digital ID systems. This significant momentum for 
creating Digital ID has been accompanied with concerns about privacy, 
surveillance and exclusion harms of state-issued Digital IDs in several 
parts of the world, resulting in campaigns and litigations in countries,
 such as UK, India, Kenya, and Jamaica. Given the sweeping range of 
considerations required to evaluate Digital ID projects, it is necessary
 to formulate evaluation frameworks that can be used for this purpose.&lt;/p&gt;
&lt;p&gt;This work began with the question of what the appropriate uses
 of Digital ID can be, but through the research process, it became clear
 that the question of use cannot be divorced from the fundamental 
attributes of Digital ID systems and their governance structures. This 
framework provides tests, which can be used to evaluate the governance 
of Digital ID across jurisdictions, as well as determine whether a 
particular use of Digital ID is legitimate. Through three kinds of 
checks — Rule of Law tests, Rights based tests, and Risks based tests — 
this scheme is a ready guide for evaluation of Digital ID.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/internet-governance/image-governing-id-principles-for-evalution/" alt="null" width="100%" /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;View the &lt;a class="external-link" href="https://digitalid.design/evaluation-framework-02.html"&gt;framework&lt;/a&gt; or download as&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/governing-id-principles-for-evalution" class="internal-link" title="Governing ID: Principles for Evalution"&gt;PDF&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity'&gt;https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vrinda Bhandari, Shruti Trikanad, and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2020-03-02T13:22:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/governing-id-2028use-of-digital-id-for-verification">
    <title>Governing ID:  Use of Digital ID for Verification</title>
    <link>https://cis-india.org/internet-governance/blog/governing-id-2028use-of-digital-id-for-verification</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;This is the first in a series of case studies, using our recently-published &lt;a href="https://digitalid.design/evaluation-framework-02.html"&gt;Evaluation Framework for Digital ID&lt;/a&gt;. It looks at the use of digital identity programmes for the purpose of verification, often using the process of deduplication.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/internet-governance/image-governing-id-use-of-digital-id-for-verification/" alt="null" width="100%" /&gt;&lt;/p&gt;
Read the &lt;a class="external-link" href="https://digitalid.design/evaluation-framework-case-studies/verification.html"&gt;case-study&lt;/a&gt; or download as &lt;a href="https://cis-india.org/internet-governance/use-of-digital-id-for-verification" class="internal-link" title="Use of Digital ID for Verification"&gt;PDF.&lt;/a&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/governing-id-2028use-of-digital-id-for-verification'&gt;https://cis-india.org/internet-governance/blog/governing-id-2028use-of-digital-id-for-verification&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shruti Trikanad</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2020-03-02T11:16:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/governing-id-kenya2019s-huduma-namba-programme">
    <title>Governing ID: Kenya’s Huduma Namba Programme</title>
    <link>https://cis-india.org/internet-governance/blog/governing-id-kenya2019s-huduma-namba-programme</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;In our fourth case-study, we use our Evaluation Framework for Digital ID to examine the use of Digital ID in Kenya.&lt;/p&gt;
&lt;p&gt;Read the &lt;a class="external-link" href="https://digitalid.design/evaluation-framework-case-studies/kenya.html"&gt;case-study&lt;/a&gt; or download as &lt;a href="https://cis-india.org/internet-governance/digital-id-kenya-case-study" class="internal-link" title="Digital ID Kenya Case Study"&gt;PDF&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/governing-id-kenya2019s-huduma-namba-programme'&gt;https://cis-india.org/internet-governance/blog/governing-id-kenya2019s-huduma-namba-programme&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2020-03-02T13:19:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cryptocurrency-regulation-in-india-2013-a-brief-history">
    <title>Cryptocurrency Regulation in India – A brief history</title>
    <link>https://cis-india.org/internet-governance/blog/cryptocurrency-regulation-in-india-2013-a-brief-history</link>
    <description>
        &lt;b&gt;In March 2020, the Supreme Court of India quashed the RBI order passed in 2018 that banned financial services firms from trading in virtual currency or cryptocurrency.
Keeping this policy window in mind, the Centre for Internet &amp; Society will be releasing a series of blog posts and policy briefs on cryptocurrency regulation in India
&lt;/b&gt;
        
&lt;p id="docs-internal-guid-18286fb9-7fff-c656-6a5b-a01a2e2b3682" style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The story of cryptocurrencies 
started in 2008 when a paper titled “Bitcoin: A Peer to Peer Electronic 
Cash System” was published by a single or group of pseudonymous 
developer(s) by the name of Satoshi Nakamoto. The actual network took 
some time to start with the first transactions taking place only in 
January 2009. The first actual sale of an item using Bitcoin took place a
 year later with a user swapping 10,000 Bitcoin for two pizzas in 2010, 
which attached a cash value to the cryptocurrency for the first time. By
 2011 other cryptocurrencies began to emerge, with Litecoin, Namecoin 
and Swiftcoin all making their debut. Meanwhile, Bitcoin the 
cryptocurrency that started it all started getting criticised after 
claims emerged that it was being used on the so-called “dark web”, 
particularly on sites such as Silk Road as a means of payment for 
illegal transactions. Over the next five years cryptocurrencies steadily
 gained traction with increased number of transactions and the price of 
Bitcoin, the most popular cryptocurrency shot up from around 5 Dollars 
in the beginning of 2012 to almost 1000 Dollars at the end of 2017.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Riding on the back of this 
wave of popularity, a number of cryptocurrency exchanges started 
operating in India between 2012 and 2017 providing much needed depth and
 volume to the Indian cryptocurrency market. These included popular 
exchanges such as Zebpay, Coinsecure, Unocoin, Koinex, Pocket Bits and 
Bitxoxo. With the price of cryptocurrencies shooting up and because of 
its increased popularity and adoption by users outside of its 
traditional cult following, regulators worldwide began to take notice of
 this new technology; in India the RBI issued a Press Release cautioning
 the public against dealing in virtual currencies including Bitcoin way 
back in 2013. However, the transaction volumes and adoption of 
cryptocurrencies in India really picked up in earnest only after the 
demonetisation of high value currency notes in November of 2016, with 
the government’s emphasis on digital payments leading to alternatives to
 traditional online banking such as cryptocurrencies forcing their way 
into the public consciousness. Indian cryptocurrency exchanges started 
acquiring users at a much higher pace which drove up volume for 
cryptocurrency transactions on all Indian exchanges. The growing 
popularity of cryptocurrencies and its adoption by large numbers of 
Indian users forced the RBI to issue another Press Release in February 
2017 reiterating its concerns regarding cryptocurrencies raised in its 
earlier Press Release of 2013.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In October and November, 2017 
two Public Interest Petitions were filed in the Supreme Court of India, 
one by Siddharth Dalmia and another by Dwaipayan Bhowmick, the former 
asking the Supreme Court to restrict the sale and purchase of 
cryptocurrencies in India, and the latter asking for cryptocurrencies in
 India to be regulated. Both the petitions are currently pending in the 
Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In November, 2017 the 
Government of India constituted a high level Inter-ministerial Committee
 under the chairmanship of Shri Subhash Chandra Garg, Secretary, 
Department of Economic Affairs, Ministry of Finance and comprising of 
Shri Ajay Prakash Sawhney (Secretary, Ministry of Electronics and 
Information Technology), Shri Ajay Tyagi (Chairman, Securities and 
Exchange Board of India) and Shri B.P. Kanungo (Deputy Governor, Reserve
 Bank of India). The mandate of the Committee was to study various 
issues pertaining to Virtual Currencies and to propose specific actions 
that may be taken in relation thereto. This Committee submitted its 
report in July of 2019 recommending a ban on private cryptocurrencies in
 India.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In December 2017 both the RBI 
as well as the Ministry of Finance issued Press releases cautioning the 
general public about the dangers and risks associated with 
cryptocurrencies, with the Ministry of Finance Press Release saying that
 cryptocurrencies are like ponzi schemes and also declaring that they 
are not currencies or coins. It should be mentioned here that till the 
end of March 2018, the RBI and the Finance Ministry had issued various 
Press Releases on cryptocurrencies cautioning people against their 
risks, however none of them ever took any legal action or gave any 
enforceable directions against cryptocurrencies. All of this changed 
with the RBI circular dated April 6, 2018 whereby the RBI prevented 
Commercial and Co-operative Banks, Payments Banks, Small Finance Banks, 
NBFCs, and Payment System Providers not only from dealing in virtual 
currencies themselves but also directing them to stop providing services
 to all entities which deal with virtual currencies.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The effect of the circular was
 that cryptocurrency exchanges, which relied on normal banking channels 
for sending and receiving money to and from their users, could not 
access any banking services within India. This essentially crippled 
their business operations since converting cash to cryptocurrencies and 
vice versa was an essential part of their operations. Even pure 
cryptocurrency exchanges which did not deal in fiat currency, were 
unable to carry out their regular operations such as paying for office 
space, staff salaries, server space, vendor payments, etc. without 
access to banking services.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As a the operations of cryptocurrency exchanges took a severe hit and
 the number of transactions on these exchanges reduced substantially. 
People who had bought cryptocurrencies on these exchanges as an 
investment were forced to sell their crypto assets and cash out before 
they lost access to banking facilities. The cryptocurrency exchanges 
themselves found it hard to sustain operations in the face of the dual 
hit of reduced transaction volumes and loss of access banking services. 
Faced with such an existential threat, a number of exchanges who were 
members of the Internet and Mobile Association of India (IMAI), filed a 
writ petition in the Supreme Court on May 15, 2018 titled Internet and 
Mobile Association of India v. Reserve Bank of India, the final 
arguments in which were heard by the Supreme Court of India in January, 
2020 and the judgment is awaited. If the Supreme Court agrees with the 
arguments of the petitioners, then cryptocurrency exchanges would be 
able to restart operations in India; as a result the cryptocurrency 
ecosystem in India may be revived and cryptocurrencies may become a 
viable investment alternative again.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cryptocurrency-regulation-in-india-2013-a-brief-history'&gt;https://cis-india.org/internet-governance/blog/cryptocurrency-regulation-in-india-2013-a-brief-history&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Bitcoin</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cryptocurrencies</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    

   <dc:date>2020-03-05T18:36:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/an-analysis-of-the-covid-vaccine-intelligence-network-co-win-platform">
    <title>Recommendations for the Covid Vaccine Intelligence Network (Co-Win) platform</title>
    <link>https://cis-india.org/internet-governance/blog/an-analysis-of-the-covid-vaccine-intelligence-network-co-win-platform</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The first confirmed case of Covid-19 was recorded in India on January 30, 2020, and India’s vaccination drive started 12 months later on January 16, 2021; with the anxiety and hope that this signals the end of the pandemic. The first phase of the vaccination drive identified healthcare professionals and other frontline workers as beneficiaries. The second phase, which has been rolled out from March 1, covers specified sections of the general population; those above 60 years and those between 45 years and 60 with specific comorbid conditions. The first phase also saw the deployment of the Covid Vaccine Intelligence Network (Co-Win) platform to roll out and streamline the Covid 19 vaccination process. For the purpose of this blog post, the term CoWIn platform has been used to refer to the CoWin App and the CoWin webportal.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;During the first phase, &lt;a href="https://www.livemint.com/news/india/covid-vaccination-in-india-health-min-says-registering-with-cowin-is-mandatory-11610678273260.html"&gt;it was mandatory &lt;/a&gt;for the identified beneficiaries to be registered on the Co-Win App prior to receiving the vaccine. The Central Government had earlier indicated that it would be mandatory for all the future beneficiaries to register on the Co-Win app; however, the Health Ministry hours before the roll out of the second phase &lt;a href="https://www.livemint.com/news/india/cowin-app-not-for-vaccine-registration-visit-its-portal-instead-ministry-of-health-11614581076188.html"&gt;tweeted t&lt;/a&gt;hat beneficiaries should use the Co-Win web portal (not the Co-Win app) to register themselves for the vaccine. The App which is currently available on the play store is only for administrators; it will not be available for the general public. Beneficiaries can now access the vaccination by; (i) registering on the CoWin website; or (ii) Certain vaccination (sites) have a walk-in-facility: On-site registration, appointment, verification, and vaccination will all be on-site the same day; or&amp;nbsp; (iii) register and get an appointment for the vaccination through the Aarogya Setu app.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The scale and extent of the global pandemic and&amp;nbsp; the Covid-19 vaccination programme differs significantly from the vaccination/immunisation programmes conducted by India previously, and therefore, the means adopted for conducting the vaccination programme will have to be modified accordingly. However, as&lt;a href="https://www.firstpost.com/india/glitches-in-cowin-2-0-hold-up-vaccination-centre-must-upgrade-app-capacity-to-meet-demand-say-experts-9361051.html"&gt; several newspaper reports&lt;/a&gt; have indicated the roll out of the CoWin platform has not been smooth. There are&lt;a href="https://www.indiatoday.in/cities/mumbai/story/technical-glitches-in-cowin-app-again-affects-vaccination-drive-at-vaccination-centres-1769410-2021-02-15"&gt; several glitch&lt;/a&gt;es; from the user data being incorrectly registered, to beneficiaries not receiving the one time password required to schedule the appointment.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;An entirely offline or online method (internet penetration is at 40% ) to register for the vaccine is not feasible and a hybrid model (offline registration and online registration) should be considered. However, the specified platform should take into account the concerns which are currently emanating from the use of Co-Win and make the required modifications.&amp;nbsp;&lt;br /&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Privacy Concerns&amp;nbsp;&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;When the beneficiary uses the Co-Win website to register, she is required to provide certain demographic details such as name, gender, date of birth, photo identity and mobile number. Though Aadhar has been identified as one of the documents that can be uploaded as a photo identity, the Health Ministry in a response to a RTI filed by the Internet Freedom Foundation (IFF) clarified that Aadhaar is nor mandatory for registration either through the Co-Win website or through Aarogya Setu. While, the Government has clarified that the App cannot be used by the general public to register for the vaccination, it still leaves open the question of the status of the personal data of the beneficiaries identified in the first phase of the process, who were registered on the App, and whose personal details were pre-populated on the App. In fact in certain instances,&lt;a href="https://www.thenewsminute.com/article/teething-troubles-privacy-concerns-look-co-win-india-s-vaccine-portal-142015"&gt; Aadhar details&lt;/a&gt; were uploaded on the app as the identity proof, without the knowledge of the beneficiary.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;These concerns are exacerbated in the absence of a robust data protection law and with the knowledge that the Co-Win platform (App and the website) does not have a dedicated independent privacy policy. While the Co-Win web portal does not provide any privacy policy, the &lt;a href="https://play.google.com/store/apps/details?id=com.cowinapp.app"&gt;privacy policy&lt;/a&gt; hyperlinked on the App directs the user to the Health Data Policy of the &lt;a href="https://ndhm.gov.in/health_management_policy"&gt;National Health Data Management Policy, 2020.&lt;/a&gt; The Central Government approved the Health Data Management Policy on December 14, 2020. It is an umbrella document for all entities operating under the digital health ecosystem.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;An analysis of the Health Policy against the key internationally recognised privacy principles which are represented in most data protection frameworks in the world, including the Personal Data Protection Bill, 2019, highlights that the Health Policy does not provide any information on data retention, data sharing and the grievance redressal mechanism. It is important to note that the Health policy has also been framed in the absence of a robust data protection law; the Personal Data Protection Bill is still pending before Parliament.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The Co-WIn website does not provide any separate information on how long the data will be retained, whether the data will be shared and how many ministries/departments have access to the data.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A National Health Policy cannot and should not be used as a substitute for specific independent privacy policies of different apps that may be designed by the Government to collect and process the health data of users. Health Data is recognised as sensitive personal data under the proposed personal data protection bill and should be accorded the highest level of protection. This was also reiterated by the Karnataka High Court in its&lt;a href="https://www.livelaw.in/news-updates/karnataka-high-court-privacy-article-21-constitution-aarogya-setu-app-168950"&gt; recent interim order&lt;/a&gt; on Aarogya Setu. It held that medical information or data is a category of data to which there is a reasonable expectation of privacy, and “the sharing of health data of a citizen without his/her consent will necessarily infringe his/her fundamental right of privacy under Article 21 of the Constitution of India.”&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Link with Aarogya Setu&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;A beneficiary registered on the Co-Win platform can use the Aarogya Setu App to download their vaccination certificate. Beneficiaries have now also been provided an option to register for vaccination through Aarogya Setu. However, the rationale for linking the two separate platforms is not clear, especially as Aaroya Setu has primarily been deployed as a contact tracing application.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;There is no information on whether the data (and to what extent) that is stored in the Co-Win platform will be shared with Aarogya Setu. It is also not clear whether the consent of the beneficiary registered on the Co-Win platform will be obtained again prior to sharing the data or whether registration on the Co-Win platform will be regarded as general consent for sharing the data with Aarogya Setu. This is contrary to the principle of informed consent (i.e the consent has to be unambiguous, specific, informed and voluntary), which a data fiduciary has to comply with prior to obtaining personal data from the data principal. The privacy policy of Aarogya Setu has also not been amended to reflect this change in the purpose of the App.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Co-Win registration as an entry to develop health IDs?&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;One of the objectives of the Health Data Management Policy is to develop a digital unique health ID for all the citizens. The National Health Data Management Policy states that participation in the National Health Data Ecosystem is voluntary; and the participants will, at any time, have the right to exit from the ecosystem. Currently, the policy has been rolled out on a pilot basis in 6 union territories, namely; Chandigarh, Dadra &amp;amp; Nagar Haveli, Daman &amp;amp; Diu, Puducherry, Ladakh and Lakshadweep. As Health is a state subject under the Indian Constitution, &lt;a href="https://scroll.in/latest/972361/new-health-data-policy-may-be-misused-for-surveillance-chhattisgarh-minister-writes-to-vardhan"&gt;Chhattisgarh&lt;/a&gt; has raised concerns about the viability and necessity of the policy, especially in the absence of a robust data protection legislation.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;Mr. R.S. Sharma, the Chairperson of the ‘Empowered Group on Technology and Data Management to combat Covid-19’ had in an &lt;a href="https://www.indiatoday.in/coronavirus-outbreak/vaccine-updates/story/exclusive-besides-co-win-aarogya-setu-self-register-indi-vaccine-drive-1760833-2021-01-20"&gt;interview to India Today&lt;/a&gt; stated “ “Not just for vaccinations, but the platform will be instrumental in becoming a digital health database for India”. This indicates that this is an initial step towards generating health ID for all the beneficiaries. It would also violate the&lt;a href="https://www.accessnow.org/india-cowin-app/"&gt; principle of purpose limitatio&lt;/a&gt;n, that data collected for one purpose (for the vaccine) cannot be reused for another (for the creation of the Digital Health ID system) without an individual’s explicit consent and the option to opt-out.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;a href="https://www.thehindu.com/opinion/editorial/injecting-confidence-the-hindu-editorial-on-indias-covid-19-vaccination-drive/article33595220.ece"&gt;Given India’s experience and reasonable success with childhood immunisation&lt;/a&gt;, there is reasonable confidence that the country has the ability to scale up vaccination. However, the vaccination drive should not be used as a means to set aside the legitimate concerns of the citizens with regard to the mechanism deployed to get pet people to register for the vaccination drive. As a first step it is essential that Co-Win has a separate dedicated privacy policy which conforms to the internationally accepted privacy principles and enumerated in the Personal Data Protection Bill. It is also essential that Co-Win or any other app/digital platform should not be used as a backdoor entry for the government to create unique digital health IDs for the citizens, especially without their consent and in the absence of a robust data protection law.&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/an-analysis-of-the-covid-vaccine-intelligence-network-co-win-platform'&gt;https://cis-india.org/internet-governance/blog/an-analysis-of-the-covid-vaccine-intelligence-network-co-win-platform&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pallavi Bedi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aarogya Setu</dc:subject>
    
    
        <dc:subject>Health Tech</dc:subject>
    
    
        <dc:subject>Piracy</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Healthcare</dc:subject>
    
    
        <dc:subject>e-Governance</dc:subject>
    

   <dc:date>2021-03-25T13:14:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/a-comment-on-the-2009-igf-draft-programme-paper">
    <title>A Comment on the 2009 IGF Draft Programme Paper</title>
    <link>https://cis-india.org/internet-governance/blog/a-comment-on-the-2009-igf-draft-programme-paper</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society is part of a broad group of civil society actors that submitted a comment on the Draft Programme Paper of the fourth Internet Governance Forum (IGF), taking place in Sharm El Sheikh, Egypt, in November 2009.  The IGF is a forum for multistakeholder policy dialogue on Internet governance issues.  The comment decries the complete absence of attention for Internet Rights and Principles in the agenda as it stands as of today, and this despite repeated requests from a wide range of stakeholders to make this theme a central one.  All stakeholder groups were invited to submit their comments on the Draft Programme Paper of the 2009 IGF to the IGF Secretariat by 15 August.
&lt;/b&gt;
        
&lt;p align="justify"&gt;The comment submitted
reads as follows:&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;Re:
IGF Draft Programme Paper, August 2009&lt;/strong&gt;&lt;/p&gt;
&lt;p align="left"&gt;We,
the undersigned would like to express our surprise and disappointment
that Internet Rights and Principles was not retained as an item on
the agenda of the 2009 IGF in any way. Although this topic was
suggested as a theme for this year's IGF or for a main session by a
range of actors during and in the run-up to May's Open Consultations,
this widespread support is not reflected in the Draft Programme
Paper, which does not include Internet Rights and Principles even as
a sub-topic of any of the main sessions. The WSIS Declaration of
Principles, 2003, and the Tunis Agenda, 2005, explicitly reaffirmed
the centrality of the Universal Declaration of Human Rights to an
inclusive information society. To make these commitments meaningful,
it is of great importance that a beginning is made to explicitly
building understanding and consensus around the meaning of Internet
Rights and Principles at the earliest. We recommend that the Agenda
of the 2009 IGF provide the space to do so.&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;Signatories:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Centre
for Internet and Society, Bangalore&lt;/p&gt;
&lt;p&gt;Association
for Progressive Communications &lt;/p&gt;
&lt;p&gt;IP
Justice &lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Bytesforall, Pakistan&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Instituto
Nupef, Rio de Janeiro, Brazil&lt;/p&gt;
&lt;p&gt;Jacques
Berleur&lt;/p&gt;
&lt;p&gt;Ginger
Paque&lt;/p&gt;
&lt;p&gt;Fouad
Bajwa&lt;/p&gt;
&lt;p&gt;Milton
L Mueller&lt;/p&gt;
&lt;p&gt;Willie
Currie&lt;/p&gt;
&lt;p&gt;Michael
Gurstein&lt;/p&gt;
&lt;p&gt;Jeanette
Hofmann&lt;/p&gt;
&lt;p&gt;Eric
Dierker&lt;/p&gt;
&lt;p&gt;Jeffrey
A Williams&lt;/p&gt;
&lt;p&gt;Charity
Gamboa, chairperson Internet Governance Working Group, ISOC
Philippines &lt;/p&gt;
&lt;p&gt;Ian
Peter&lt;/p&gt;
&lt;p&gt;Tracy
F. Hackshaw&lt;/p&gt;
&lt;p&gt;Shaila
Rao Mistry, Internet Rights and Principles&lt;/p&gt;
&lt;p&gt;Lee
W McKnight&lt;/p&gt;
&lt;p&gt;Jeremy
Malcolm&lt;/p&gt;
&lt;p&gt;Tapani
Tarvainen&lt;/p&gt;
&lt;p&gt;Shahzad Ahmad, ICT Policy Monitors Network&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Carlos
Afonso&lt;/p&gt;
&lt;p&gt;Dina Hovakmian&lt;/p&gt;
&lt;p&gt;Rui
Correia&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Lisa Horner&lt;/p&gt;
&lt;p&gt;Deirdre Williams&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Jaco
Aizenman&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Nyangkwe Agien Aaron&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Siranush Vardanyan, Armenia&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Kwasi
Boakye-Akyeampong&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Linda D. Misek-Falkoff&lt;/p&gt;
&lt;p&gt;Baudouin
Schombe&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Stefano Trumpy&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/a-comment-on-the-2009-igf-draft-programme-paper'&gt;https://cis-india.org/internet-governance/blog/a-comment-on-the-2009-igf-draft-programme-paper&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>anja</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    

   <dc:date>2011-08-02T07:15:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
