<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 51 to 65.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/cyber-security-policy-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-november-24-2017-komal-gupta-cyberattacks-a-significant-threat-to-democracy-modi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cy-fy-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/vipul-kharbanda-february-25-2019-comments-on-draft-second-protocol-to-convention-on-cybercrime-budapest-convention"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/national-cyber-defence-summit-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hakon-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cert-ins-proactive-mandate-a-report-on-indian-computer-emergency-response-teams-proactive-mandate-in-indian-cyber-security-ecosystem"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/call-for-comments-model-security-standards-for-the-indian-fintech-industry"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/events/cyber-security-policy-research">
    <title>Cyber Security Policy Research</title>
    <link>https://cis-india.org/internet-governance/events/cyber-security-policy-research</link>
    <description>
        &lt;b&gt;Tim Maurer will give a presentation on cybersecurity policy research at the Centre for Internet &amp; Society's New Delhi office on October 18, 2015, from 2 p.m. to 5 p.m. Geetha Hariharan and Sunil Abraham will participate in this event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Tim Maurer's talk will give an outline of the definitional issues involved, the various threats to the confidentiality, integrity, and availability of information and underlying infrastructure, the actors involved and international efforts to address cybersecurity. The talk will also provide an overview of existing and ongoing cyber security policy research.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Tim Maurer&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Tim.jpg/@@images/897b814d-5366-4da7-9270-b3c69b69020f.jpeg" alt="Tim" class="image-inline" title="Tim" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tim Maurer is an associate at the Carnegie Endowment for International Peace. His work focuses on cyberspace and international affairs, with a concentration on global cybersecurity norms, human rights online, Internet governance, and their interlinkages. He is writing a book on cybersecurity and proxy actors.&lt;br /&gt;&lt;br /&gt;Maurer serves as a member of the Research Advisory Network of the Global Commission on Internet Governance, the Freedom Online Coalition’s cybersecurity working group “An Internet Free and Secure,” and co-chaired the Civil Society Advisory Board of the Global Conference on CyberSpace. In 2014, he developed the Global Cyber Definitions Database for the chair of the OSCE to support the implementation of the OSCE’s cyber confidence-building measures. In 2013 and 2014, Maurer spoke about cybersecurity at the United Nations in New York and Geneva and co-authored “Tipping the Scale: An Analysis of Global Swing States in the Internet Governance Debate,” published by the Global Commission on Internet Governance. His work has also been published by Jane’s Intelligence Review, TIME, Foreign Policy, CNN, Slate, and other academic and media venues.&lt;br /&gt;&lt;br /&gt;Prior to joining Carnegie, Maurer was the director of the Global Cybersecurity Norms and Resilience Project at New America and head of research of New America’s Cybersecurity Initiative. He also gained experience with the United Nations in Rwanda, Geneva, and New York focusing on humanitarian assistance and the coordination of the UN system.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/cyber-security-policy-research'&gt;https://cis-india.org/internet-governance/events/cyber-security-policy-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-16T16:47:12Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc">
    <title>Global Commission on the Stability of Cyberspace (GCSC)</title>
    <link>https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc</link>
    <description>
        &lt;b&gt;The Global Commission on the Stability of Cyberspace organized a meeting on November 21, 2017 in New Delhi. The meeting took place at Taj Diplomatic Enclave Hotel on the sidelines of the 5th Global Conference on Cyberspace. Pranesh Prakash participated in the event.&lt;/b&gt;
        &lt;p&gt;GSC commissioners engaged in discussions with leading experts on cyber diplomacy, cyber norms and counter-proliferation. See the Draft Agenda &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cyber-security-hearings-gsc"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc'&gt;https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-23T14:38:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs">
    <title>Financial CERT to combat cyber threats, says MoS home affairs</title>
    <link>https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs</link>
    <description>
        &lt;b&gt;To tackle cyber threats to India’s financial institutions, the central government is mulling to establish a financial Computer Emergency Response Team (CERT).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published by &lt;a class="external-link" href="https://www.cisomag.com/financial-cert-combat-cyber-threats-says-mos-home-affairs/"&gt;CISO MAG&lt;/a&gt; on November 17, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Addressing the 15th Asia Pacific Computer Emergency Response Team (APCERT) Open Conference in New Delhi on November 15, 2017, IT Secretary Ajay Prakash Sawhney said, “right now, the one which is directly being worked on is the financial CERT. We are getting the framework in place and once that is there, we will look at other sectors. It will oversee the entire financial sector including banks and financial institutions.”&lt;br /&gt;&lt;br /&gt;In March this year, the power ministry had announced to create four sectoral CERTs for cybersecurity in power systems: CERT (Transmission), CERT (Thermal), CERT (Hydro), and CERT (Distribution).&lt;br /&gt;&lt;br /&gt;Udbhav Tiwari, program manager at the Centre for Internet and Society, a Bengaluru-based think tank, highlighted the responsibilities of the financial CERT in a conversation with Live Mint.  “The biggest task of sectoral CERT is to share information with the others in the industry. For example, if a bank undergoes an attack, normally the bank will perform all the necessary actions to limit the attack and to prevent it from happening in the future. But the obligation of sharing how the attack happened with all the other banks in India to make sure that they can protect their respective systems from such an attack, can be carried out by a financial CERT,” he said.&lt;br /&gt;&lt;br /&gt;Cybersecurity Chief Gulshan Rai, who was also present at the event, said “from April to October 2017, around 50,000 cyber security incidents have been handled by CERT-In; including phishing, malware attacks, attacks on digital payments and targeted attacks on some of the critical industries.”&lt;br /&gt;&lt;br /&gt;On August 1, 2017, MoS home affairs Hansraj Gangaram Ahir had said “as per the information by the Indian computer emergency response team (CERT-In), 50 incidents affecting 19 financial organizations have been reported during the period of November, 2016 to June, 2017.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs'&gt;https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-23T16:07:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-november-24-2017-komal-gupta-cyberattacks-a-significant-threat-to-democracy-modi">
    <title>Cyberattacks a significant threat to democracy: Modi</title>
    <link>https://cis-india.org/internet-governance/news/livemint-november-24-2017-komal-gupta-cyberattacks-a-significant-threat-to-democracy-modi</link>
    <description>
        &lt;b&gt;We have to ensure that cyberspace does not become a playground for dark horses of radicalism, says PM Narendra Modi at the fifth Global Conference on Cyber Space in Delhi.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Komal Gupta was published in &lt;a class="external-link" href="http://www.livemint.com/Industry/S0TsLMI3yEzlc6XSxdUmtK/Cyberattacks-a-significant-threat-to-democracy-Narendra-Mod.html"&gt;Livemint&lt;/a&gt; on November 24, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Prime Minister Narendra Modi on Thursday said creating a safe and  secure cyberspace is on the primary agenda of the government as  cyberattacks were a threat to democracy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modi’s assurance of  decisively dealing with cyberattacks comes at a time when policymakers  are making an unprecedented push to popularize digital transactions and  cut down use of cash in order to have a more transparent and accountable  economic environment. The government is at present working on a draft  policy for tackling ransomware, a malicious software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We have to  ensure that cyberspace does not become a playground for dark horses of  radicalism,” Modi said, while inaugurating the fifth Global Conference  on Cyber Space (GCCS) in the national capital.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A total of 50 incidents of cyberattacks affecting 19 financial organizations were reported from 2016 until June 2017, &lt;i&gt;PTI &lt;/i&gt;reported in August.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With  multiple cyberattacks affecting key infrastructure assets like ports  and major payment companies recently, the government has decided to come  out with a draft policy for tackling ransomware, a senior government  official told &lt;i&gt;Mint &lt;/i&gt;during the conference.  “CERT-In (The Indian  Computer Emergency Response Team) is working on a draft policy for  tackling ransomware which will be put up for consultation by various  stakeholders, including organized enterprise users of IT (Information  Technology), solution providers and internet service providers (ISPs),”  Ajay Kumar, additional secretary in the ministry of electronics and  information technology said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kumar said the draft policy  will focus on the proprietary steps the country will take in case of a  ransomware attack. This will include the steps for the sharing of  information to try and restrict the loss as much as possible. A centre  of excellence will be set up to find solutions to attacks or neutralise  the malware, he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The need to set up a safe and secure  cyberspace is one the major concerns of the government as it is moving  to create a ‘less-cash’ economy. Earlier this year, the government  announced the “DigiDhan Mission” to achieve a 25 billion digital  transactions target, outlined in the Union budget for this fiscal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modi  said empowerment through digital access is the aim of the government  and digital technology has saved around $10 billion so far by  eliminating middlemen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The MyGov platform is a prime example of  how technology strengthens offices. PRAGATI has resulted in faster  governance decisions through general consensus, he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;PRAGATI  (Pro-Active Governance And Timely Implementation) is an interactive  platform aimed at addressing the common man’s grievances and monitoring  and reviewing programmes and projects of the central and state  governments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Umang stands for Unified Mobile Application  for New-age Governance. It provides all pan India e-Gov services ranging  from central to local government bodies and other citizen-centric  services like Aadhaar and Digilocker on one single platform or mobile  app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modi said, “the app will provide over hundred citizen-centric  services. It will automatically add pressure among peers and result in a  better performance.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Law and IT minister Ravi Shankar Prasad,  speaking at the event, said privacy of individuals was of utmost  importance but “privacy cannot withhold innovation.” He further said the  citizens’ right of accessing the internet is “non-negotiable” and the  government will not allow any company to restrict people’s entry to the  worldwide web.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speaking on Facebook’s Free Basics programme,  Prasad said the government did not allow social networking giant’s  programme because it offered access to select internet services.  Facebook had introduced its Free Basics programme in India in 2015 to  offer free basic internet access to people in partnership with telecom  operators. Prasad said the idea behind Free Basics was that everything  will be free, namely eduction, health, entertainment and others, if one  enters the Net through one gate (Facebook’s).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I said India is a  democracy, we don’t believe in one gate. We believe in multiple gates.  Therefore, this gate locking for India will not be accepted and I did  not allow it. This stems (from) our commitment that internet must be  accessible to all,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sri Lankan Prime Minister Ranil  Wickremesinghe, who was present at the event, said there was no legal  framework on cyberspace and he hoped the conference would lead to a  consensus to finalize the terms of the framework. “Our government has a  lot more to do in net neutrality but we have taken progressive and  revolutionary step in this regard,” added Wickremesinghe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Wickremesinghe is on a four-day visit to India with the aim of boosting bilateral ties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the first day of the conference, India agreed to establish a joint working group with Iran to work in different IT areas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India  will provide technical advice to Mauritius for setting up the  digilocker infrastructure. An MoU has been signed with Denmark for  future cooperation in the IT sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While a policy on ransomware  is welcome, there is much more to be done. Implementation of the 2014  National Cybersecurity Policy has been very slow. Even the simplest  bits, such as a secure process for receiving vulnerability disclosure  has been lacking,” said Pranesh Prakash, policy director at the Centre  for Internet and Society, a Bengaluru-based think tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;PTI contributed to this story.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-november-24-2017-komal-gupta-cyberattacks-a-significant-threat-to-democracy-modi'&gt;https://cis-india.org/internet-governance/news/livemint-november-24-2017-komal-gupta-cyberattacks-a-significant-threat-to-democracy-modi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-24T13:29:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cy-fy-2017">
    <title>CyFy 2017</title>
    <link>https://cis-india.org/internet-governance/news/cy-fy-2017</link>
    <description>
        &lt;b&gt;CyFy is a conference on internet governance and cyber security organised by the Observer Research Foundation (ORF) in New Delhi between 2 and 4 October 2017. Sunil Abraham was a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sunil Abraham was a speaker on a panel titled "Security Through Identity?" on the 4 October  2017 and chaired an invite only session titled "Encryption: The End of  Surveillance?" on the 3rd of October, 2017. Saikat Dutta and Udbhav Tiwari also participated in the encryption session. Saikat was a speaker in a session titled "Digital Vulnerabilities: Capacity Building for Tackling Cyber Crime" on 3 October 2017. Udbhav Tiwari chaired a session titled "Dangerous Disclosures: Cyber Security Incident Reporting" on 4 October 2017.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Conference agenda &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cyfy-2017-agenda"&gt;here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cy-fy-2017'&gt;https://cis-india.org/internet-governance/news/cy-fy-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-26T09:36:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india">
    <title>Cyber Security of Smart Grids in India</title>
    <link>https://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india</link>
    <description>
        &lt;b&gt;An integral component of the ambitious flagship programme of the Indian Government- Digital India, which paves way for a digital data avalanche in the country, is a well-designed digital infrastructure ensuring high connectivity and integration of services, the potential areas being smart cities, smart homes, smart energy and smart grids, to list a few. Likewise, the 100 Smart Cities Mission envisions changing the face of urbanization in India, to manage the exponential growth of population in the cities by creating smart cities with ICT driven solutions, along with big data analytics. Smart grid technologies are key for both these schemes.&lt;/b&gt;
        &lt;p&gt;The article by Elonnai Hickok and Vanya Rakesh was published by &lt;a class="external-link" href="http://www.dqindia.com/cyber-security-of-smart-grids-in-india/"&gt;Dataquest&lt;/a&gt; on April 25, 2016&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Smart grid is a promising power delivery infrastructure integrated with communication and information technologies which enables monitoring, prediction and management of energy usages. Establishment of smart grids becomes highly important for the Indian economy, as the present grid losses are one of the highest in the world at upto 50% and costing India upto 1.5% of its GDP. India operates one of the largest synchronous grids in the world – covering an area of over 3 million sq km, 260 GW capacity and over 200 million customers with the estimated demand of India increasing 4 times by the year 2032.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the year 2013, the Ministry of Power (MoP), in consultation with India Smart Grid Forum and India Smart Grid Task Force released a smart grid vision and roadmap for India, a key policy document aligned to MoP’s overarching objectives of “Access, Availability and Affordability of Power for All”. It lays plans for a framework to address cyber security concerns in smart grids as well. To achieve goals envisaged in the roadmap, the Government of India established the National Smart Grid Mission in the year 2015 for planning, monitoring and implementation of policies and programs related to Smart Grid activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A number of smart grid projects have been introduced, and are currently underway. KEPCO in Kerala has established smart meter/intelligent power transmission and distribution equipment system in the year 2011 and the smart grid operations focus on peak reduction, load standardization, reduction in power transmission/distribution loss, response to new/renewable energy and reduction in black-out time. Gujarat was introduced to India’s first modernized electrical grid in the year 2014, to study consumer behaviour of electricity usage and propose a tariff structure based on usage and load on the power utility by installing new meters embedded with SIM card to monitor the data. The Bangalore Electricity Supply Company Ltd. (BESCOM) project in Bangalore envisaged the Smart Grid Pilot Project for integration of renewable and distributed energy resources into the grid, which is vital to meet growing electricity demands of the country, curb power losses, and enhance accessibility to quality power.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Cybersecurity challenges&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;At the same time, the introduction of a smart grid brings with it certain security risks and concerns, particularly to a nation’s cyber security. Increased interconnection and integration may render the grids vulnerable to cyber threats, putting stored data and computers at great risk.With sufficient cyber security measures, policies and framework in place, a Smart Grid can be made more efficient, reliable and secure as failure to address these problems will hinder the modernization of the existing power system. Smart Grids, comprising of numerous communication, intelligent, monitoring and electrical elements employed in power grid, have a greater exposure to cyber-attacks that can potentially disrupt power supply in a city.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;Cyber security and data privacy are some of the key challenges for smart grids in India, as establishment of digital electricity infrastructure entails the challenge of communication security and data management. Digital network and systems are highly prone to malicious attacks from hackers which can lead to misutilisation of consumers’ data, making cyber security the key issue to be addressed. Vulnerabilities allow an attacker to break a system, corrupt user privacy, acquire unauthorized access to control the software, and modify load conditions to destabilize the grid. Hackers or attackers, who compromise a smart meter can immediately alter their energy costs or change generated energy meter readings to monetize it by help of remote PCs. Also, inserting false information could mislead the electric utility into making incorrect decisions about the local usage and capacity.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;h3 style="text-align: justify; "&gt;Initiatives in India&lt;/h3&gt;
&lt;div style="text-align: justify; "&gt;As cybersecurity is critical for Digital India and the Smart City Concept note highlights a smart grid to be resilient to cyber attacks, a National Cyber Coordination Centre is being established by the Indian Government. Also, National Cyber Safety and Security Standards has been started with a vision to safeguard the nation from the current threats in the cyberspace, undertaking research to understand the nature of cyber threats and Cyber Crimes by facilitating a common platform where experts shall provide an effective solution for the complex and alarming problems in the society towards cyber security domain. Innovative strategies and compliance procedures are being developed to curb the increasing complexity of the Global Cyber Threats faced by countries at large.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The National Cyber Security Policy 2013 was released with an umbrella framework for providing guidance for actions related to security of cyberspace, by the Department of Electronics and Information Technology (DeitY). The Working Group on Information Technology established under the Planning Commission has also published a 12 year plan on IT development in India with a road map for cyber security, stating six key priority and focus areas for cyber security including:Enabling Legal Framework ; Security Policy, Compliance and Assurance; Security R&amp;amp;D; Security Incident – Early Warning and Response ; Security awareness, skill development and training, and Collaboration.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;In case of Bangalore, to ensure smooth implementation of BESCOM’s vision, the company realised the need to put a cyber-security system in place to protect the smart grid installations in Bangalore city. To ensure security, BESCOM has come out with a separate IT security policy and dedicated trained IT cadre to safeguard its data and servers, becoming one of the few Discoms in India to take such measures for safeguarding the servers and data network from cyber crimes and threats.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Way forward&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;An electric system like Smart grids has enormous and far-reaching economic and social benefits. However, increased interconnection and integration tends to introduce cyber-vulnerabilities into the grid. With the evolution of cyber threats/attacks over time, it can be said that there are a lot of challenges for implementing cyber security in Indian smart grid. Considering importance of secure smart grid networks for flagship projects in India, the existing regulatory framework does not seem to adequately take into consideration the cyber security implications.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;In light of this, the government must aim to develop and adopt high level cybersecurity policy to withstand cyber-attacks. Also, India must focus on skills development in this domain and have a capable workforce to achieve the targets set by Indian Government. The country must look up to develop an overall intelligence framework that brings together industry, governments and individuals with specific capabilities for this purpose.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The National Cyber Security Policy 2013, protecting public and private infrastructure from cyber attacks, along with all kinds of information, such as personal information of web users, banking and financial information,etc. is yet to be implemented by the Government properly. In the Indian Power sector, the cyber security regulations or mandates are absent in the National Electricity Policy (NEP) as well as the Electricity Act 2003 and its amendment in 2007, with no reference to cyber security concerns. These key legislations must be amended to take into account the growing challenges due to increased use of ICT in the power sector.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;As the concept of smart grids is still evolving in India, professional intervention from various domains has pushed for adoption and development of standard process and products. Many international standard setting organisations like IEC, IEEE, NIST, CENELEC are engaged in standardization activities of Smart Grids and in India, the Bureau of Indian Standards (BIS) has been rolling out several varieties of standards targeting various technologies. Therefore, BIS must develop standards taking into account the security challenges in the cyberspace as well.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Apart from policy and regulatory measure, the system on which the smart grids are built and networked must be made architecturally strong and secure.One of the areas where due attention is required is making the Supervisory Control and Data Acquisition (SCADA) secure, a system that operates with coded signals to provide control of remote equipment and is entirely based on computer systems and network. Numerous systems also employ the Public Key Infrastructure (PKI) to secure the Smart Grids and address the security challenges by enabling identification, verification, validation and authentication of connected meters for network access. This can be leveraged for securing data integrity, revenue streams and service continuity. The key vulnerable areas prone to cyber attacks on information transmission are network information, data integrity and privacy of information. The information transmission networks must be well-designed as the network unavailability may result in the loss of real-time monitoring of critical smart grid infrastructures and power system disasters.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Addressing these fast growing challenges and cyber security needs of the country by adopting suitable regulatory, policy and architectural steps would help achieve the objectives of Digital India and Smart Cities enabling “Access, Availability and Affordability for All”.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india'&gt;https://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok and Vanya Rakesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-04-28T15:34:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/vipul-kharbanda-february-25-2019-comments-on-draft-second-protocol-to-convention-on-cybercrime-budapest-convention">
    <title>Comments on the Draft Second Protocol to the Convention on Cybercrime (Budapest Convention) </title>
    <link>https://cis-india.org/internet-governance/blog/vipul-kharbanda-february-25-2019-comments-on-draft-second-protocol-to-convention-on-cybercrime-budapest-convention</link>
    <description>
        &lt;b&gt;Following consultations with data protection, civil society, industry and others, during the Cybercrime Convention Committee (T-CY) meeting from 29 November 2018 onwards, the Cybercrime Convention Committee has sought additional contributions regarding the provisional draft text for a Second Additional Protocol to the Budapest Convention on Cybercrime (“Budapest Convention”).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Centre for Internet and Society, (“CIS”), is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, and open access), internet governance, telecommunication reform, digital privacy, artificial intelligence, freedom of expression, and cyber-security. This submission is consistent with CIS’ commitment to safeguarding general public interest, and the rights of stakeholders. CIS is thankful to the Cybercrime Convention Committee for this opportunity to provide feedback to the Draft.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft text addresses three issues viz. language of requests, emergency multilateral cooperation and taking statements through video conferencing. Click to download the &lt;a href="https://cis-india.org/internet-governance/comments-on-the-draft-second-protocol-to-the-convention-on-cybercrime-budapest-convention" class="internal-link"&gt;entire submission here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/vipul-kharbanda-february-25-2019-comments-on-draft-second-protocol-to-convention-on-cybercrime-budapest-convention'&gt;https://cis-india.org/internet-governance/blog/vipul-kharbanda-february-25-2019-comments-on-draft-second-protocol-to-convention-on-cybercrime-budapest-convention&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-25T16:48:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/national-cyber-defence-summit-2016">
    <title>National Cyber Defence Summit 2016 </title>
    <link>https://cis-india.org/internet-governance/news/national-cyber-defence-summit-2016</link>
    <description>
        &lt;b&gt;National Cyber Defence Summit – 2016 was organized by the National Cyber Safety and Security Standards in association with State &amp; Central Governments, Ministry of Defence, Government of India, AICTE &amp; Anna University on 30 September and 1 October 2016 in Chennai. Vanya Rakesh attended the summit.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Summit focused on multiple issues linked with the current use of cyberspace by the various stake holders and creating awareness of the responsibility associated with the judicious use of this significant and powerful tool, without endangering the fragile security and social framework. The mission of the Summit is to establish a multi-stakeholder consortium that brings together Industry, Government, and Academic interests in an effort to improve the state of Cyber Security on both a domestic and international level. Primarily, the Summit focuses on multiple issues linked with the current use of cyberspace by the various stake holders and creating awareness of the responsibility associated with the judicious use of this significant and powerful tool, without endangering the fragile security and social framework.&lt;br /&gt;&lt;br /&gt;In fact this is the one and only High Level Summit which gathers the presence of Multi-Stakeholders from State/Central Governments, Defence, MNCs, PSUs, Academics, PSBs, Intelligence Agencies, Enforcement Agencies and etc. For more info see the website &lt;a class="external-link" href="http://ncdrc.res.in/summit/"&gt;here&lt;/a&gt;. Agenda can be &lt;a class="external-link" href="http://www.ncdrc.res.in/summit/docs/national-cyber-defence-summit-invitation.pdf"&gt;viewed here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/national-cyber-defence-summit-2016'&gt;https://cis-india.org/internet-governance/news/national-cyber-defence-summit-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-10-10T12:54:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hakon-2016">
    <title>Hakon 2016</title>
    <link>https://cis-india.org/internet-governance/news/hakon-2016</link>
    <description>
        &lt;b&gt; Udbhav Tiwari attended attended Hakon 2016, a conference held between September 30 and October 2, 2016 at Indore, Madhya Pradesh, India,on behalf of CIS under the Hewlett Cyber Security Project. &lt;/b&gt;
        &lt;p dir="ltr" style="text-align: justify; "&gt;Hakon 2016 was the third edition of the conference which  has been organised by Ninja Information Security Systems, an ISO  27001:2013 &amp;amp; 9001:2008 certified training organisation and the  primary sponsor of the conference from Indore. The conference was  efficiently organised, had about 150 to  200 people attending overall  and provided an unique window into the non-tech hub/big city ethical  hacker ecosystem and their place within the cyber security setup in  India. The agenda of this year's conference was the Underground Digital  Black Market &amp;amp; Digital Terrorism, with a fair mix of participants  from the industry, academia and the government. The conference website  can be looked up at &lt;a href="http://www.hakonindia.org/"&gt;http://www.hakonindia.org/&lt;/a&gt; for further details, including a look at past editions of the conference.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The technical workshops held during the first two days of the conference were well organised and networking with the teachers during and mostly at the end of the conference was very helpful in understanding a practitioners perspective on cutting edge aspects of cyber security. This was particularly true for &lt;a class="external-link" href="http://www.chuckeasttom.com/"&gt;Chuck Easttom Williams&lt;/a&gt;, an accomplished cyber security expert from the USA who regularly trains government agencies and in a fairly reputed industry veteran who has been an invited speaker at DEFCON and even has a couple of patents to his name.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hakon-2016'&gt;https://cis-india.org/internet-governance/news/hakon-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-10-15T10:04:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cert-ins-proactive-mandate-a-report-on-indian-computer-emergency-response-teams-proactive-mandate-in-indian-cyber-security-ecosystem">
    <title>CERT-In's Proactive Mandate - A Report on the Indian Computer Emergency Response Team’s Proactive Mandate in the Indian Cyber Security Ecosystem</title>
    <link>https://cis-india.org/internet-governance/blog/cert-ins-proactive-mandate-a-report-on-indian-computer-emergency-response-teams-proactive-mandate-in-indian-cyber-security-ecosystem</link>
    <description>
        &lt;b&gt;CERT-IN’s proactive mandate is defined in the IT Act, 2000 as well as in the Information Technology (The Indian Computer Emergency Response Team and Manner of Performing Function and Duties ) Rules, 2013 (CERT-In Rules, 2013) both of which postdate the existence of the organisation itself, which has been operational since 2004. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Regarding the proactive mandate, the IT Act and CERT-In Rules include the following areas where CERT-In is required to carry out proactive measures in the interests of cyber security:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Forecast and alert cyber security incidents (IT Act, 2000) &amp;amp; Predict and prevent cyber security incidents (CERT-In Rules, 2013)&lt;/li&gt;
&lt;li&gt;Issue guidelines, advisories and vulnerability notes etc. relating to information security practices, procedures, prevention, response and reporting (IT Act, 2000)&lt;/li&gt;
&lt;li&gt;Information Security Assurance (CERT-In Rules, 2013)&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This article will track and analyse the CERT-In’s operations in each of these areas over the past twelve years, by analysing the information available on CERT-In’s website as well as other media in the public domain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The analysis will be carried out using a mixed methodology. The basic quantitative analysis of the information available on the CERT-In’ website will be carried out in the form of simple comparatives of updates, bulletins and other forms of publicly available interaction and critical information dispersal on CERT-In’s website. The qualitative sections, on the other hand, will contain a comparative analysis of the content present in the technical documents of the CERT-In with the equivalent documentation (where present) of similar bodies in the USA and EU. Each section will then illustrate normative suggestions as to how CERT-In’s performance of that respective obligation can be improved to better serve its cyber security mandate.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cert-ins-proactive-mandate.pdf"&gt;Read the full article&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The image is published under Creative Commons License CC BY-SA. Anyone  can distribute, remix, tweak, and build upon this document, even for  commercial purposes, as long as they credit the creator of this document  and license their new creations under the terms identical to the  license governing this document&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cert-ins-proactive-mandate-a-report-on-indian-computer-emergency-response-teams-proactive-mandate-in-indian-cyber-security-ecosystem'&gt;https://cis-india.org/internet-governance/blog/cert-ins-proactive-mandate-a-report-on-indian-computer-emergency-response-teams-proactive-mandate-in-indian-cyber-security-ecosystem&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tiwari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-11-19T04:14:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls">
    <title>The trouble with trolls</title>
    <link>https://cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls</link>
    <description>
        &lt;b&gt;Social networking sites give trolls the ability to hide their real identity and cause grief to others. Here is what you need to do if you face an online attack.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Vishal Mathur was &lt;a class="external-link" href="http://www.livemint.com/Leisure/5biF5tW7enAmzp0jsYrRGK/The-trouble-with-trolls.html"&gt;published in Livemint&lt;/a&gt; on July 22, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Social networking sites give trolls the ability       to hide their real identity and cause grief to others. Here is       what you need to do if you face an online attack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though       social networks were not designed with the intention of letting       someone anonymously abuse another online, the reality is that       people utilize the ability to hide behind online identities to       threaten other users. These could be veiled attacks, direct abuse,       or even threats to “cause bodily harm”.       What can you do if you’re trolled and threatened on any social       network? Follow our five-step guide.       Avoid conversation if you can       The responses could come in relation to something you may have       just posted online. Or perhaps it could be just a random trolling       attempt, to get a response from you. It is important to understand       and identify such intentions. And as difficult as it may be, do       not respond. Getting into a direct interaction with a bully only       makes things worse.       Report to the social network       You should report any instance of cyber bullying or harassment to       the host social network—the website or forum on which the       interaction happened. There are various methods of getting in       touch with the moderators—customer support email, contact       submission forms or even via phone, in certain locations. Describe       the problem in detail, and persist till the offending account is       blocked from the platform.       “Most social networks have systems that allow you to report       abusive content and users. However, there is great variance in the       speed with which they respond across different platforms,       jurisdictions, etc.,” says Sunil Abraham, executive director at       the Bangalore-based non-profit research organization Centre for       Internet and Society. New Delhi-based Anja Kovacs, project       director, at civil society organization Internet Democracy       Project, adds: “Blocking and reporting an account can be two ways       to stop harassment on some social networks, but on other       platforms, such as Twitter, it is possible for the person to       immediately make a new account under a different username, meaning       that these measures do not necessarily stop the harassment.”       Ankhi Das, director, public policy, India and South Asia at social       network Facebook, says: “Every reported piece of content is       reviewed. Serial offenders are notified for non-compliance.”       Facebook’s Community Standards, that prevent harassment and       offensive posts, have an 11-point categorization for reported       content—violence and threats, hate speech, graphic content,       bullying and harassment, to name some.       Raheel Khursheed, head of news, politics and government at Twitter       India, did not respond to our mail about how Twitter handles       trolls at the time of going to press.       On blogs and forums, it may be a bit easier to deal with trolling       and abuse. If it is your own blog, you can delete comments and       block users. If it is a forum, the administrator can do it for       you. But, with social networks having millions of users, it is not       possible to have one administrator managing it all. And it is not       just Facebook and Twitter, all social networks have a method by       which you can register your complaint. LinkedIn, for example,       automatically blocks a user who gets multiple “I don’t know”       responses to invitations to connect. There is a strong monitoring       policy where any reported content (recommendations or direct       messages) is examined and immediate warnings are sent out to       offending parties.       Keep a copy of the offensive posts       Be it a post, or a series of posts, direct message or even an       offending photograph, always save it for future reference. Never       assume that the matter will end soon, and always prepare for the       worst.       Don’t ignore privacy settings       Most people start using Facebook, Twitter and other social       networks without paying much attention to the privacy       settings—what content people can see on your page, and who can       directly contact you. Be conservative in sharing information—the       less you share, the lower the chances of someone picking on you.       “Avoid friending or linking to people whom you don’t know in real       life unless you are certain of the chain of trust that exists       between you and the unknown person,” says Abraham. New Delhi-based       cyber lawyer Apar Gupta, adds: “The privacy settings on most       social networking platforms allow users to prevent (restrict) the       audience for their posts as well as strangers from contacting       them. This will prevent most cases of online harassment.”       Get help from the law       In case social networks are not able to effectively block a user,       or are in some way unwilling to do so, take help from the       law-enforcement authorities. File an FIR in the nearest police       station. Unfortunately, the progress may not be very smooth. The       reality is that not every law-enforcement officer may know about       social networking sites. “You could try and go to the police, but       without support from the social network platform, they are often       at a loss to do much themselves,” warns Kovacs.       The police may look for hints of threat to cause bodily harm or       worse still, to life. In such cases, they may recommend the case       to the Cyber Crime Cell of the Central Bureau of Investigation.       “Generally, while the substantive offences do exist under law, the       process for having them enforced is deficient. These are deeper       structural problems of delay, investigation and conviction which       are prevalent across criminal justice or civil litigation,”       clarifies Gupta. Officials at the Cyber Crime Cell say they take       up cases after reference from the local police, who file the       report first and do a preliminary level of investigation.       But it is important to realize that only the police and the       law-enforcement agencies have the right to demand further details       about the perpetrator from the social networks, starting with       profile       details and Internet Protocol (IP) addresses, which will help       track the person down. Das clarifies: “Facebook has a       point-of-contact system through which the law-enforcement agencies       tell us what the actual case is, depending on severity. The police       may ask us to take down particular content, or even ask for user       information like IP info, to prevent real crime.”       According to Facebook’s Government Requests Report for       July-December 2013, the network restricted access to 4,765 pieces       of content after requests from the Indian government and       law-enforcement agencies.&lt;/p&gt;
&lt;div style="text-align: left; "&gt;Read more at: &lt;a href="http://www.livemint.com/Leisure/5biF5tW7enAmzp0jsYrRGK/The-trouble-with-trolls.html?utm_source=ref_article"&gt;http://www.livemint.com/Leisure/5biF5tW7enAmzp0jsYrRGK/The-trouble-with-trolls.html?utm_source=copy&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Though social networks were not designed with       the intention of letting someone anonymously abuse another online,       the reality is that people utilize the ability to hide behind       online identities to threaten other users. These could be veiled       attacks, direct abuse, or even threats to “cause bodily harm”.       What can you do if you’re trolled and threatened on any social       network? Follow our five-step guide. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Avoid conversation if you can &lt;/b&gt;&lt;br /&gt; The responses could come in relation to something you may have       just posted online. Or perhaps it could be just a random trolling       attempt, to get a response from you. It is important to understand       and identify such intentions. And as difficult as it may be, do       not respond. Getting into a direct interaction with a bully only       makes things worse. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Report to the social network &lt;/b&gt;&lt;br /&gt; You should report any instance of cyber bullying or harassment to       the host social network—the website or forum on which the       interaction happened. There are various methods of getting in       touch with the moderators—customer support email, contact       submission forms or even via phone, in certain locations. Describe       the problem in detail, and persist till the offending account is       blocked from the platform. “Most social networks have systems that       allow you to report abusive content and users. However, there is       great variance in the speed with which they respond across       different platforms, jurisdictions, etc.,” says Sunil Abraham,       executive director at the Bangalore-based non-profit research       organization Centre for Internet and Society. New Delhi-based Anja       Kovacs, project director, at civil society organization Internet       Democracy Project, adds: “Blocking and reporting an account can be       two ways to stop harassment on some social networks, but on other       platforms, such as Twitter, it is possible for the person to       immediately make a new account under a different username, meaning       that these measures do not necessarily stop the harassment.” Ankhi       Das, director, public policy, India and South Asia at social       network Facebook, says: “Every reported piece of content is       reviewed. Serial offenders are notified for non-compliance.”       Facebook’s Community Standards, that prevent harassment and       offensive posts, have an 11-point categorization for reported       content—violence and threats, hate speech, graphic content,       bullying and harassment, to name some. Raheel Khursheed, head of       news, politics and government at Twitter India, did not respond to       our mail about how Twitter handles trolls at the time of going to       press. On blogs and forums, it may be a bit easier to deal with       trolling and abuse. If it is your own blog, you can delete       comments and block users. If it is a forum, the administrator can       do it for you. But, with social networks having millions of users,       it is not possible to have one administrator managing it all. And       it is not just Facebook and Twitter, all social networks have a       method by which you can register your complaint. LinkedIn, for       example, automatically blocks a user who gets multiple “I don’t       know” responses to invitations to connect. There is a strong       monitoring policy where any reported content (recommendations or       direct messages) is examined and immediate warnings are sent out       to offending parties. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Keep a copy of the offensive posts &lt;/b&gt;&lt;br /&gt; Be it a post, or a series of posts, direct message or even an       offending photograph, always save it for future reference. Never       assume that the matter will end soon, and always prepare for the       worst. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Don’t ignore privacy settings &lt;/b&gt;&lt;br /&gt; Most people start using Facebook, Twitter and other social       networks without paying much attention to the privacy       settings—what content people can see on your page, and who can       directly contact you. Be conservative in sharing information—the       less you share, the lower the chances of someone picking on you.       “Avoid friending or linking to people whom you don’t know in real       life unless you are certain of the chain of trust that exists       between you and the unknown person,” says Abraham. New Delhi-based       cyber lawyer Apar Gupta, adds: “The privacy settings on most       social networking platforms allow users to prevent (restrict) the       audience for their posts as well as strangers from contacting       them. This will prevent most cases of online harassment.” &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Get help from the law &lt;/b&gt;&lt;br /&gt; In case social networks are not able to effectively block a user,       or are in some way unwilling to do so, take help from the       law-enforcement authorities. File an FIR in the nearest police       station. Unfortunately, the progress may not be very smooth. The       reality is that not every law-enforcement officer may know about       social networking sites. “You could try and go to the police, but       without support from the social network platform, they are often       at a loss to do much themselves,” warns Kovacs. The police may       look for hints of threat to cause bodily harm or worse still, to       life. In such cases, they may recommend the case to the Cyber       Crime Cell of the Central Bureau of Investigation. “Generally,       while the substantive offences do exist under law, the process for       having them enforced is deficient. These are deeper structural       problems of delay, investigation and conviction which are       prevalent across criminal justice or civil litigation,” clarifies       Gupta. Officials at the Cyber Crime Cell say they take up cases       after reference from the local police, who file the report first       and do a preliminary level of investigation. But it is important       to realize that only the police and the law-enforcement agencies       have the right to demand further details about the perpetrator       from the social networks, starting with profile details and       Internet Protocol (IP) addresses, which will help track the person       down. Das clarifies: “Facebook has a point-of-contact system       through which the law-enforcement agencies tell us what the actual       case is, depending on severity. The police may ask us to take down       particular content, or even ask for user information like IP info,       to prevent real crime.” According to Facebook’s Government       Requests Report for July-December 2013, the network restricted       access to 4,765 pieces of content after requests from the Indian       government and law-enforcement agencies.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls'&gt;https://cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-28T05:42:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015">
    <title>Summary Report Internet Governance Forum 2015 </title>
    <link>https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015</link>
    <description>
        &lt;b&gt;Centre for Internet and Society (CIS), India participated in the Internet Governance Forum (IGF) held at Poeta Ronaldo Cunha Lima Conference Center, Joao Pessoa in Brazil from 10 November 2015 to 13 November 2015. The theme of IGF 2015 was ‘Evolution of Internet Governance: Empowering Sustainable Development’. Sunil Abraham, Pranesh Prakash &amp; Jyoti Panday from CIS actively engaged and made substantive contributions to several key issues affecting internet governance at the IGF 2015. The issue-wise detail of their engagement is set out below. &lt;/b&gt;
        
&lt;p align="center" style="text-align: left;"&gt;&lt;strong&gt;INTERNET
GOVERNANCE&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
I. The
Multi-stakeholder Advisory Group to the IGF organised a discussion on
&lt;em&gt;&lt;strong&gt;Sustainable
Development Goals (SDGs) and Internet Economy&lt;/strong&gt;&lt;/em&gt;&lt;em&gt;
&lt;/em&gt;at
the Main Meeting Hall from 9:00 am to 12:30 pm on 11 November, 2015.
The
discussions at this session focused on the importance of Internet
Economy enabling policies and eco-system for the fulfilment of
different SDGs. Several concerns relating to internet
entrepreneurship, effective ICT capacity building, protection of
intellectual property within and across borders were availability of
local applications and content were addressed. The panel also
discussed the need to identify SDGs where internet based technologies
could make the most effective contribution.  Sunil
Abraham contributed to the panel discussions by addressing the issue
of development and promotion of local content and applications. List
of speakers included:&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Lenni
	Montiel, Assistant-Secretary-General for Development, United Nations&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Helani
	Galpaya, CEO LIRNEasia&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sergio
	Quiroga da Cunha, Head of Latin America, Ericsson&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Raúl
	L. Katz, Adjunct Professor, Division of Finance and Economics,
	Columbia Institute of Tele-information&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Jimson
	Olufuye, Chairman, Africa ICT Alliance (AfICTA)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Lydia
	Brito, Director of the Office in Montevideo, UNESCO&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	H.E.
	Rudiantara, Minister of Communication &amp;amp; Information Technology,
	Indonesia&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Daniel
	Sepulveda, Deputy Assistant Secretary, U.S. Coordinator for
	International and Communications Policy at the U.S. Department of
	State &amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Deputy
	Minister Department of Telecommunications and Postal Services for
	the republic of South Africa&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sunil
	Abraham, Executive Director, Centre for Internet and Society, India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	H.E.
	Junaid Ahmed Palak, Information and Communication Technology
	Minister of Bangladesh&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Jari
	Arkko, Chairman, IETF&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Silvia
	Rabello, President, Rio Film Trade Association&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Gary
	Fowlie, Head of Member State Relations &amp;amp; Intergovernmental
	Organizations, ITU&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;http&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;://&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;www&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;intgovforum&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;org&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;cms&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;igf&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;2015-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;main&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;sessions&lt;/a&gt;&lt;u&gt;
&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;u&gt;&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2327-2015-11-11-internet-economy-and-sustainable-development-main-meeting-room"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2327-2015-11-11-internet-economy-and-sustainable-development-main-meeting-room&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video
link Internet
economy and Sustainable Development here
&lt;a href="https://www.youtube.com/watch?v=D6obkLehVE8"&gt;https://www.youtube.com/watch?v=D6obkLehVE8&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;II.
Public
Knowledge organised a workshop on &lt;em&gt;&lt;strong&gt;The
Benefits and Challenges of the Free Flow of Data &lt;/strong&gt;&lt;/em&gt;at
Workshop Room
5 from 11:00 am to 12:00 pm on 12 November, 2015. The discussions in
the workshop focused on the benefits and challenges of the free flow
of data and also the concerns relating to data flow restrictions
including ways to address
them. Sunil
Abraham contributed to the panel discussions by addressing the issue
of jurisdiction of data on the internet. The
panel for the workshop included the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Vint
	Cerf, Google&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Lawrence
	Strickling, U.S. Department of Commerce, NTIA&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Richard
	Leaning, European Cyber Crime Centre (EC3), Europol&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Marietje
	Schaake, European Parliament&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Nasser
	Kettani, Microsoft&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sunil
	Abraham, CIS
	India&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;http&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;://&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;www&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;intgovforum&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;org&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;cms&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;workshops&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;list&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;of&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;published&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;workshop&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;proposals&lt;/a&gt;&lt;u&gt;
&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2467-2015-11-12-ws65-the-benefits-and-challenges-of-the-free-flow-of-data-workshop-room-5"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2467-2015-11-12-ws65-the-benefits-and-challenges-of-the-free-flow-of-data-workshop-room-5&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video link https://www.youtube.com/watch?v=KtjnHkOn7EQ&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;III.
Article
19 and
Privacy International organised a workshop on &lt;em&gt;&lt;strong&gt;Encryption
and Anonymity: Rights and Risks&lt;/strong&gt;&lt;/em&gt;
at Workshop Room 1 from 11:00 am to 12:30 pm on 12 November, 2015.
The
workshop fostered a discussion about the latest challenges to
protection of anonymity and encryption and ways in which law
enforcement demands could be met while ensuring that individuals
still enjoyed strong encryption and unfettered access to anonymity
tools. Pranesh
Prakash contributed to the panel discussions by addressing concerns
about existing south Asian regulatory framework on encryption and
anonymity and emphasizing the need for pervasive encryption. The
panel for this workshop included the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	David
	Kaye, UN Special Rapporteur on Freedom of Expression&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Juan
	Diego Castañeda, Fundación Karisma, Colombia&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Edison
	Lanza, Organisation of American States Special Rapporteur&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Pranesh
	Prakash, CIS India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Ted
	Hardie, Google&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Elvana
	Thaci, Council of Europe&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Professor
	Chris Marsden, Oxford Internet Institute&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Alexandrine
	Pirlot de Corbion, Privacy International&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;&lt;a name="_Hlt435412531"&gt;&lt;/a&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;http&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;://&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;www&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;intgovforum&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;org&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;cms&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;worksh&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;o&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;ps&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;list&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;of&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;published&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;workshop&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;proposals&lt;/a&gt;&lt;u&gt;
&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2407-2015-11-12-ws-155-encryption-and-anonymity-rights-and-risks-workshop-room-1"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2407-2015-11-12-ws-155-encryption-and-anonymity-rights-and-risks-workshop-room-1&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video link available here https://www.youtube.com/watch?v=hUrBP4PsfJo&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;IV.
Chalmers
&amp;amp; Associates organised a session on &lt;em&gt;&lt;strong&gt;A
Dialogue on Zero Rating and Network Neutrality&lt;/strong&gt;&lt;/em&gt;
at the Main Meeting Hall from 2:00 pm to 4:00 pm on 12 November,
2015. The Dialogue provided access to expert insight on zero-rating
and a full spectrum of diverse
views on this issue. The Dialogue also explored alternative
approaches to zero rating such as use of community networks. Pranesh
Prakash provided
a
detailed explanation of harms and benefits related to different
approaches to zero-rating. The
panellists for this session were the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Jochai
	Ben-Avie, Senior Global Policy Manager, Mozilla, USA&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Igor
	Vilas Boas de Freitas, Commissioner, ANATEL, Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Dušan
	Caf, Chairman, Electronic Communications Council, Republic of
	Slovenia&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Silvia
	Elaluf-Calderwood, Research Fellow, London School of Economics,
	UK/Peru&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Belinda
	Exelby, Director, Institutional Relations, GSMA, UK&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Helani
	Galpaya, CEO, LIRNEasia, Sri Lanka&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Anka
	Kovacs, Director, Internet Democracy Project, India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Kevin
	Martin, VP, Mobile and Global Access Policy, Facebook, USA&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Pranesh
	Prakash, Policy Director, CIS India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Steve
	Song, Founder, Village Telco, South Africa/Canada&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Dhanaraj
	Thakur, Research Manager, Alliance for Affordable Internet, USA/West
	Indies&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Christopher
	Yoo, Professor of Law, Communication, and Computer &amp;amp; Information
	Science, University of Pennsylvania, USA&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;http://www.intgovforum.org/cms/igf2015-main-sessions&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2457-2015-11-12-a-dialogue-on-zero-rating-and-network-neutrality-main-meeting-hall-2"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2457-2015-11-12-a-dialogue-on-zero-rating-and-network-neutrality-main-meeting-hall-2&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;V.
The
Internet &amp;amp; Jurisdiction Project organised a workshop on
&lt;em&gt;&lt;strong&gt;Transnational
Due Process: A Case Study in MS Cooperation&lt;/strong&gt;&lt;/em&gt;
at Workshop Room
4 from 11:00 am to 12:00 pm on 13 November, 2015. The
workshop discussion focused on the challenges in developing an
enforcement framework for the internet that guarantees transnational
due process and legal interoperability. The discussion also focused
on innovative approaches to multi-stakeholder cooperation such as
issue-based networks, inter-sessional work methods and transnational
policy standards.  The panellists for this discussion were the
following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Anne
	Carblanc  Head of Division, Directorate for Science, Technology and
	Industry, OECD&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Eileen
	Donahoe Director Global Affairs, Human Rights Watch&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Byron
	Holland President and CEO, CIRA (Canadian ccTLD)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Christopher
	Painter Coordinator for Cyber Issues, US Department of State&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sunil
	Abraham Executive Director, CIS India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Alice
	Munyua Lead dotAfrica Initiative and GAC representative, African
	Union Commission&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Will
	Hudsen Senior Advisor for International Policy, Google&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Dunja
	Mijatovic Representative on Freedom of the Media, OSCE&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Thomas
	Fitschen Director for the United Nations, for International
	Cooperation against Terrorism and for Cyber Foreign Policy, German
	Federal Foreign Office&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Hartmut
	Glaser Executive Secretary, Brazilian Internet Steering Committee&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Matt
	Perault, Head of Policy Development Facebook&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals"&gt;http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2475-2015-11-13-ws-132-transnational-due-process-a-case-study-in-ms-cooperation-workshop-room-4"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2475-2015-11-13-ws-132-transnational-due-process-a-case-study-in-ms-cooperation-workshop-room-4&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video
link Transnational
Due Process: A Case Study in MS Cooperation available here&amp;nbsp;&lt;a href="https://www.youtube.com/watch?v=M9jVovhQhd0"&gt;https://www.youtube.com/watch?v=M9jVovhQhd0&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;VI.
The Internet Governance Project organised a meeting of the
&lt;em&gt;&lt;strong&gt;Dynamic
Coalition on Accountability of Internet Governance Venues&lt;/strong&gt;&lt;/em&gt;
at Workshop Room 2 from 14:00
– 15:30 on
12 November, 2015. The coalition
brought together panelists to highlight the
challenges in developing an accountability
framework
for internet governance
venues that include setting up standards and developing a set of
concrete criteria. Jyoti Panday provided the perspective of civil
society on why acountability is necessary in internet governance
processes and organizations. The panelists for this workshop included
the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p&gt;
	Robin
	Gross, IP Justice&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Jeanette
	Hofmann, Director
	&lt;a href="http://www.internetundgesellschaft.de/"&gt;Alexander
	von Humboldt Institute for Internet and Society&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	 Farzaneh
	Badiei, 
	Internet Governance Project&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Erika
	Mann,
	Managing
	Director Public PolicyPolicy Facebook and Board of Directors
	ICANN&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Paul
	Wilson, APNIC&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Izumi
	Okutani, Japan
	Network Information Center (JPNIC)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Keith
	Drazek , Verisign&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Jyoti
	Panday,
	CIS&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Jorge
	Cancio,
	GAC representative&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;
Detailed
description of the workshop is available here
&lt;a href="http://igf2015.sched.org/event/4c23/dynamic-coalition-on-accountability-of-internet-governance-venues?iframe=no&amp;amp;w=&amp;amp;sidebar=yes&amp;amp;bg=no"&gt;http://igf2015.sched.org/event/4c23/dynamic-coalition-on-accountability-of-internet-governance-venues?iframe=no&amp;amp;w=&amp;amp;sidebar=yes&amp;amp;bg=no&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
Video
link https://www.youtube.com/watch?v=UIxyGhnch7w&lt;/p&gt;
&lt;p&gt;&amp;nbsp;VII.
Digital
Infrastructure
Netherlands Foundation organized an open forum at
Workshop Room 3
from 11:00
– 12:00
on
10
November, 2015. The open
forum discussed the increase
in government engagement with “the internet” to protect their
citizens against crime and abuse and to protect economic interests
and critical infrastructures. It
brought
together panelists topresent
ideas about an agenda for the international protection of ‘the
public core of the internet’ and to collect and discuss ideas for
the formulation of norms and principles and for the identification of
practical steps towards that goal.
Pranesh Prakash participated in the e open forum. Other speakers
included&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p&gt;
	Bastiaan
	Goslings AMS-IX, NL&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Pranesh
	Prakash CIS, India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Marilia
	Maciel (FGV, Brasil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Dennis
	Broeders (NL Scientific Council for Government Policy)&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;
Detailed
description of the open
forum is available here
&lt;a href="http://schd.ws/hosted_files/igf2015/3d/DINL_IGF_Open%20Forum_The_public_core_of_the_internet.pdf"&gt;http://schd.ws/hosted_files/igf2015/3d/DINL_IGF_Open%20Forum_The_public_core_of_the_internet.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
Video
link available here &lt;a href="https://www.youtube.com/watch?v=joPQaMQasDQ"&gt;https://www.youtube.com/watch?v=joPQaMQasDQ&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
VIII.
UNESCO, Council of Europe, Oxford University, Office of the High
Commissioner on Human Rights, Google, Internet Society organised a
workshop  on hate speech and youth radicalisation at Room 9 on
Thursday, November 12. UNESCO shared the initial outcome from its
commissioned research on online hate speech including practical
recommendations on combating against online hate speech through
understanding the challenges, mobilizing civil society, lobbying
private sectors and intermediaries and educating individuals with
media and information literacy. The workshop also discussed how to
help empower youth to address online radicalization and extremism,
and realize their aspirations to contribute to a more peaceful and
sustainable world. Sunil Abraham provided his inputs. Other speakers
include&lt;/p&gt;
&lt;p&gt;
	1.
Chaired by Ms Lidia Brito, Director for UNESCO Office in Montevideo&lt;/p&gt;
&lt;p&gt;
	2.Frank
La Rue, Former Special Rapporteur on Freedom of Expression&lt;/p&gt;
&lt;p&gt;
	3.
Lillian Nalwoga, President ISOC Uganda and rep CIPESA, Technical
community&lt;/p&gt;
&lt;p&gt;
	4.
Bridget O’Loughlin, CoE, IGO&lt;/p&gt;
&lt;p&gt;
	5.
Gabrielle Guillemin, Article 19&lt;/p&gt;
&lt;p&gt;
	6.
Iyad Kallas, Radio Souriali&lt;/p&gt;
&lt;p&gt;
	7.
Sunil Abraham executive director of Center for Internet and Society,
Bangalore, India&lt;/p&gt;
&lt;p&gt;
	8.
Eve Salomon, global Chairman of the Regulatory Board of RICS&lt;/p&gt;
&lt;p&gt;
	9.
Javier Lesaca Esquiroz, University of Navarra&lt;/p&gt;
&lt;p&gt;
	10.
Representative GNI&lt;/p&gt;
&lt;p&gt;
	11.
Remote Moderator: Xianhong Hu, UNESCO&lt;/p&gt;
&lt;p&gt;
	12.
Rapporteur: Guilherme Canela De Souza Godoi, UNESCO&lt;/p&gt;
&lt;p&gt;
Detailed
description of the workshop
is available here
&lt;a href="http://igf2015.sched.org/event/4c1X/ws-128-mitigate-online-hate-speech-and-youth-radicalisation?iframe=no&amp;amp;w=&amp;amp;sidebar=yes&amp;amp;bg=no"&gt;http://igf2015.sched.org/event/4c1X/ws-128-mitigate-online-hate-speech-and-youth-radicalisation?iframe=no&amp;amp;w=&amp;amp;sidebar=yes&amp;amp;bg=no&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
Video
link to the panel is available here
&lt;a href="https://www.youtube.com/watch?v=eIO1z4EjRG0"&gt;https://www.youtube.com/watch?v=eIO1z4EjRG0&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;INTERMEDIARY
LIABILITY&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
IX.
Electronic
Frontier Foundation, Centre for Internet Society India, Open Net
Korea and Article 19 collaborated to organize
a workshop on the &lt;em&gt;&lt;strong&gt;Manila
Principles on Intermediary Liability&lt;/strong&gt;&lt;/em&gt;
at Workshop Room 9 from 11:00 am to 12:00 pm on 13 November 2015. The
workshop elaborated on the Manila
Principles, a high level principle framework of best practices and
safeguards for content restriction practices and addressing liability
for intermediaries for third party content. The
workshop
saw particpants engaged in over lapping projects considering
restriction practices coming togetehr to give feedback and highlight
recent developments across liability regimes. Jyoti
Panday laid down the key details of the Manila Principles framework
in this session. The panelists for this workshop included the
following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Kelly
	Kim Open Net Korea,&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Jyoti
	Panday, CIS India,&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Gabrielle
	Guillemin, Article 19,&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Rebecca
	McKinnon on behalf of UNESCO&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Giancarlo
	Frosio, Center for Internet and Society, Stanford Law School&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Nicolo
	Zingales, Tilburg University&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Will
	Hudson, Google&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2423-2015-11-13-ws-242-the-manila-principles-on-intermediary-liability-workshop-room-9"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2423-2015-11-13-ws-242-the-manila-principles-on-intermediary-liability-workshop-room-9&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video link available here &lt;a href="https://www.youtube.com/watch?v=kFLmzxXodjs"&gt;https://www.youtube.com/watch?v=kFLmzxXodjs&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;strong&gt;ACCESSIBILITY&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
X.
Dynamic
Coalition
on Accessibility and Disability and Global Initiative for Inclusive
ICTs organised a workshop on &lt;em&gt;&lt;strong&gt;Empowering
the Next Billion by Improving Accessibility&lt;/strong&gt;&lt;/em&gt;&lt;em&gt;
&lt;/em&gt;at
Workshop Room 6 from 9:00 am to 10:30 am on 13 November, 2015. The
discussion focused on
the need and ways to remove accessibility barriers which prevent over
one billion potential users to benefit from the Internet, including
for essential services. Sunil
Abraham specifically spoke about the lack of compliance of existing
ICT infrastructure with well established accessibility standards
specifically relating to accessibility barriers in the disaster
management process. He discussed the barriers faced by persons with
physical or psychosocial disabilities.  The
panelists for this discussion were the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Francesca
	Cesa Bianchi, G3ICT&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Cid
	Torquato, Government of Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Carlos
	Lauria, Microsoft Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sunil
	Abraham, CIS India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Derrick
	L. Cogburn, Institute on Disability and Public Policy (IDPP) for the
	ASEAN(Association of Southeast Asian Nations) Region&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Fernando
	H. F. Botelho, F123 Consulting&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Gunela
	Astbrink, GSA InfoComm&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;u&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;u&gt;&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2438-2015-11-13-ws-253-empowering-the-next-billion-by-improving-accessibility-workshop-room-3"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2438-2015-11-13-ws-253-empowering-the-next-billion-by-improving-accessibility-workshop-room-3&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video
Link Empowering
the next billion by improving accessibility&amp;nbsp;&lt;a href="https://www.youtube.com/watch?v=7RZlWvJAXxs"&gt;https://www.youtube.com/watch?v=7RZlWvJAXxs&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;strong&gt;OPENNESS&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
XI.
A
workshop on &lt;em&gt;&lt;strong&gt;FOSS
&amp;amp; a Free, Open Internet: Synergies for Development&lt;/strong&gt;&lt;/em&gt;
was organized at Workshop Room 7 from 2:00 pm to 3:30 pm on 13
November, 2015. The discussion was focused on the increasing risk to
openness of the internet and the ability of present &amp;amp; future
generations to use technology to improve their lives. The panel shred
different perspectives about the future co-development
of FOSS and a free, open Internet; the threats that are emerging; and
ways for communities to surmount these. Sunil
Abraham emphasised the importance of free software, open standards,
open access and access to knowledge and the lack of this mandate in
the draft outcome document for upcoming WSIS+10 review and called for
inclusion of the same. Pranesh Prakash further contributed to the
discussion by emphasizing the need for free open source software with
end‑to‑end encryption and traffic level encryption based
on open standards which are decentralized and work through federated
networks. The
panellists for this discussion were the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Satish
	Babu, Technical Community, Chair, ISOC-TRV, Kerala, India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Judy
	Okite, Civil Society, FOSS Foundation for Africa&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Mishi
	Choudhary, Private Sector, Software Freedom Law Centre, New York&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Fernando
	Botelho, Private Sector, heads F123 Systems, Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sunil
	Abraham, CIS
	India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Pranesh
	Prakash, CIS
	India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Nnenna
	Nwakanma- WWW.Foundation&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Yves
	MIEZAN EZO, Open Source strategy consultant&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Corinto
	Meffe, Advisor to the President and Directors, SERPRO, Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Frank
	Coelho de Alcantara, Professor, Universidade Positivo, Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Caroline
	Burle, Institutional and International Relations, W3C Brazil Office
	and Center of Studies on Web Technologies&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;u&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;u&gt;&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2468-2015-11-13-ws10-foss-and-a-free-open-internet-synergies-for-development-workshop-room-7" target="_top"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2468-2015-11-13-ws10-foss-and-a-free-open-internet-synergies-for-development-workshop-room-7&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video
link available here &lt;a href="https://www.youtube.com/watch?v=lwUq0LTLnDs"&gt;https://www.youtube.com/watch?v=lwUq0LTLnDs&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015'&gt;https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Encryption</dc:subject>
    
    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Anonymity</dc:subject>
    
    
        <dc:subject>Civil Society</dc:subject>
    
    
        <dc:subject>Blocking</dc:subject>
    

   <dc:date>2015-11-30T10:47:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/call-for-comments-model-security-standards-for-the-indian-fintech-industry">
    <title>Call for Comments: Model Security Standards for the Indian Fintech Industry</title>
    <link>https://cis-india.org/internet-governance/call-for-comments-model-security-standards-for-the-indian-fintech-industry</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;The Centre for Internet and Society is pleased to make available the Draft document of Model Security Standards for the Indian Fintech Industry, for feedback and comments from all stakeholders. The objective of this document which was first published in November 2019, is to ensure that the data of users is dealt with in a secure and safe manner by the Fintech Industry, and that smaller businesses in the Fintech industry have a specific standard to look at in order to limit their liabilities for any future breaches. &lt;br /&gt;&lt;br /&gt;We invite any parties interested in the field of technology policy, including but not limited to lawyers, policy researchers, and engineers, to send in your feedback/comments on the draft document by the 16th of January 2020. We intend to publish our final draft by the end of January 2020. We look forward to receiving your contributions to make this document more comprehensive and effective. Please find a copy of the draft document &lt;a href="https://cis-india.org/internet-governance/resources/security-standards-for-the-financial-technology-sector-in-india" class="internal-link" title="Security Standards for the Financial Technology Sector in India"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/call-for-comments-model-security-standards-for-the-indian-fintech-industry'&gt;https://cis-india.org/internet-governance/call-for-comments-model-security-standards-for-the-indian-fintech-industry&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Financial Technology</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    

   <dc:date>2019-12-16T13:16:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns">
    <title>Automated Facial Recognition Systems (AFRS): Responding to Related Privacy Concerns</title>
    <link>https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns</link>
    <description>
        &lt;b&gt;Arindrajit Basu and Siddharth Sonkar have co-written this blog as the second of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems? &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Supreme Court of India, in &lt;a href="https://indiankanoon.org/doc/91938676/"&gt;Puttaswamy I&lt;/a&gt;&lt;em&gt; &lt;/em&gt;recognized&lt;em&gt;&amp;nbsp;&lt;/em&gt;that
 the right to privacy is not surrendered merely because the individual 
is in a public place. Privacy is linked to the individual as it is an 
essential facet of human dignity. Justice Chelameswar further clarified 
that privacy is contextual. Even in a public setting, people trying to 
converse in whispers would signal a claim to the right to privacy. 
Speaking on a loudspeaker would naturally not signal the same claim.&lt;/p&gt;
&lt;p&gt;The Supreme Court of Canada has also affirmed the notion of 
contextual privacy. As recently as on 7 March, 2019, the Supreme Court 
of Canada &lt;a href="http://www.thecourt.ca/r-v-jarvis-carving-out-a-contextual-approach-to-privacy/" rel="noreferrer noopener" target="_blank"&gt;in a landmark decision&lt;/a&gt; defined privacy rights in public areas implicitly applying &lt;a href="https://crypto.stanford.edu/portia/papers/RevnissenbaumDTP31.pdf"&gt;Helena Nissenbaum’s theory of contextual integrity&lt;/a&gt;.
 Helena Nissenbaum explains that the extent to which the right to 
privacy is eroded in public spaces with the help of her theory of 
contextual integrity.&lt;/p&gt;
&lt;p&gt;Nissenbaum suggests that labelling information as exclusively public 
or private fails to take into account the context which rationalises the
 desire of the individual to exercise her privacy in public. To explain 
this with an illustration, there exists a reasonable expectation of 
privacy in the restroom of a restaurant, even though it is in a public 
space.&lt;/p&gt;
&lt;p&gt;In &lt;a href="http://www.thecourt.ca/r-v-jarvis-carving-out-a-contextual-approach-to-privacy/"&gt;&lt;em&gt;R v Jarvis&lt;/em&gt;&lt;/a&gt; (Jarvis), the Court overruled a Court of Appeal for Ontario &lt;a href="https://www.canlii.org/en/on/onca/doc/2017/2017onca778/2017onca778.pdf"&gt;decision&lt;/a&gt;
 to hold that people can have a reasonable expectation of privacy even 
in public spaces. In this case, Jarvis was charged with the offence of 
voyeurism for secretly recording his students. The primary issue that 
the&amp;nbsp; Supreme Court of Canada was concerned with was whether the students
 filmed by Mr. Jarvis enjoyed a reasonable expectation of privacy at 
their school.&lt;/p&gt;
&lt;p&gt;The Court in this case unanimously held that students did indeed have
 a reasonable expectation of privacy.&amp;nbsp; The Court concluded nine 
contextual factors relevant in determining whether a person has a 
reasonable expectation to privacy would arise. The listed factors were:&lt;/p&gt;
&lt;p&gt;“1. The location the person was in when he or she was observed or recorded,&lt;/p&gt;
&lt;p&gt;2. The nature of the impugned conduct (whether it consisted of observation or recording),&lt;/p&gt;
&lt;p&gt;3. Awareness of or consent to potential observation or recording,&lt;/p&gt;
&lt;p&gt;4. The manner in which the observation or recording was done,&lt;/p&gt;
&lt;p&gt;5. The subject matter or content of the observation or recording,&lt;/p&gt;
&lt;p&gt;6. Any rules, regulations or policies that governed the observation or recording in question,&lt;/p&gt;
&lt;p&gt;7. The relationship between the person who was observed or recorded and the person who did the observing or recording,&lt;/p&gt;
&lt;p&gt;8. The purpose for which the observation or recording was done, and&lt;/p&gt;
&lt;p&gt;9. The personal attributes of the person who was observed or recorded.” (paragraph 29 of the judgement).&lt;/p&gt;
&lt;p&gt;The Court emphasized that the factors are not an exhaustive list, but
 rather were meant to be a guiding tool in determining whether a 
reasonable expectation of privacy existed in a given context. It is not 
necessary that each of these factors is present in a given situation to 
give rise to an expectation of privacy.&lt;/p&gt;
&lt;p&gt;Compared to the above-mentioned factors in Jarvis, the Indian Supreme Court in &lt;a href="https://indiankanoon.org/doc/127517806/"&gt;Justice K.S Puttaswamy (Retd.) v. Union of India&lt;/a&gt;: Justice Sikri (Puttaswamy II) &lt;strong&gt;—&lt;/strong&gt;
 the case which upheld the constitutionality of the Aadhaar project 
relied on the following factors to determine a reasonable expectation of
 privacy in a given context:&lt;/p&gt;
&lt;p&gt;“(i) What is the context in which a privacy claim is set up?&lt;/p&gt;
&lt;p&gt;(ii) Does the claim relate to private or family life, or a confidential relationship?&lt;/p&gt;
&lt;p&gt;(iii) Is the claim a serious one or is it trivial?&lt;/p&gt;
&lt;p&gt;(iv) Is the disclosure likely to result in any serious or significant injury and the nature and extent of disclosure?&lt;/p&gt;
&lt;p&gt;(v) Is disclosure relates to personal and sensitive information of an identified person?&lt;/p&gt;
&lt;p&gt;(vi) Does disclosure relate to information already disclosed publicly? If so, its implication?”&lt;/p&gt;
&lt;p&gt;These factors (acknowledged in Puttaswamy II in paragraph 292) seem 
to be very similar to the ones laid down in Jarvis, i.e., there is a 
strong reliance on the context in both cases. While there is no explicit
 mention of individual attributes of the individual claiming a 
reasonable expectation, the holding that children should be given an opt
 out indicates that the Court implicitly takes into account personal 
attributes (e.g. age) as well.&lt;/p&gt;
&lt;p&gt;The Court in Jarvis further (in paragraph 39) took the example of a 
woman in a communal change room at a public pool. She may expect other 
users to incidentally observe her undress but she would continue to 
expect only other women in the change room to observe her and reserve 
her rights against the general public. She would also expect not to be 
video recorded or photographed while undressing, both from other users 
of the pool and by the general public.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;If it is later found out that the change room had a one-way glass 
which allowed the pool staff to view the users change — or if there was a
 concealed camera recording persons while they were changing, she could 
claim a breach of her reasonable expectation of privacy under such 
circumstances and it would constitute an invasion of privacy.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;So, in the context of an AFRS, an individual walking down a 
public road may still signal that they wish to avail of their right to 
privacy. In such contexts, a concerted surveillance mechanism may come 
up against constitutional&amp;nbsp; roadblocks.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is the nature of information being collected?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The second big question &lt;strong&gt;—&lt;/strong&gt; the nature of information 
which is being collected plays a role in determining the extent to which
 a person can exercise their reasonable expectation of privacy. 
Puttaswamy II laid down that collection of core biometric information 
such as fingerprints, iris scans in the context of the Aadhaar-Based 
Biometric Authentication (‘ABBA’) is constitutionally permissible. The 
basis of this conclusion is that the Aadhaar Act does not deal with the 
individual’s intimate or private sphere.&lt;/p&gt;
&lt;p&gt;The judgement of the Supreme Court in Puttaswamy II is in a very 
specific context (i.e. the ABBA). It does not explain or identify the 
contextual factors which determine the extent to which privacy may be 
reasonably expected over biometrics generally. In this judgment, the 
Court observed that demographic information and photographs do not raise
 a reasonable expectation of privacy under Article 21 unless there exist
 special circumstances such as the disclosure of juveniles in conflict 
of law or a rape victim’s identity.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Most importantly, the Court held that face photographs for 
the purpose of identification are not covered by a reasonable 
expectation of privacy. The Court distinguished face photographs from 
intimate photographs or those photographs which concern confidential 
situations. &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Face photographs, according to the Court, are shared by 
individuals in the ordinary course of conduct for the purpose of 
obtaining a driving &lt;/strong&gt;l&lt;strong&gt;icense, voter id, passport, 
examination admit cards, employment cards, and so on. Face photographs 
by themselves reveal no information.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Naturally, this&amp;nbsp;pronouncement of the Apex Court is a huge boost for the introduction of AFRS in India.&lt;/p&gt;
&lt;p&gt;Abroad, however, on 4 September 2019, in &lt;a href="https://www.judiciary.uk/wp-content/uploads/2019/09/bridges-swp-judgment-Final03-09-19-1.pdf"&gt;Edward Bridges v. Chief Constable of South Wales Police&lt;/a&gt;, a Division Bench of the High Court in England and Wales heard a challenge against an AFRS introduced by law enforcement (&lt;em&gt;see&lt;/em&gt;
 Endnote 1). The High Court rejected a claim for judicial review holding
 that the AFRS in question does not violate inter alia the right to 
privacy under Article 8 of the European Convention of Human Rights 
(‘ECHR’).&lt;/p&gt;
&lt;p&gt;According to the Court, the AFRS was used for specific and limited 
purposes, i.e., only when the image of the public matched a person on an
 existing watchlist. The use of the AFRS was therefore considered a 
lawful and fair restriction.&lt;/p&gt;
&lt;p&gt;The Court, however, acknowledged that extracting biometric data 
through AFRS is “well beyond the expected and unsurprising”. This seems 
to be a departure from the Indian Supreme Court’s observation in 
Puttaswamy II that there is no reasonable expectation of privacy over 
biometric data in the context of ABBA, and may be a wiser approach for 
the Indian courts to adopt.&lt;/p&gt;
&lt;h6&gt;&lt;strong&gt;Endnote &lt;/strong&gt;&lt;/h6&gt;
&lt;p&gt;1. The challenge was put forth by Edward Bridges, a civil liberties 
campaigner from Cardiff for being caught on camera in two particular 
deployments of the AFRS a) when he was at Queen Street, a busy shopping 
area in Cardiff and b) when he was at the Defence Procurement, Research,
 Technology and Exportability Exhibition held at the Motorpoint Arena.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This was published by &lt;a class="external-link" href="https://aipolicyexchange.org/2019/12/28/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns/"&gt;AI Policy Exchange&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns'&gt;https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu, Siddharth Sonkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-01-02T14:09:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward">
    <title>Automated Facial Recognition Systems and the Mosaic Theory of Privacy: The Way Forward</title>
    <link>https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward</link>
    <description>
        &lt;b&gt; Arindrajit Basu and Siddharth Sonkar have co-written this blog as the third of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems? &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Mosaic Theory of Privacy&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Whether the data collected by the AFRS should be treated similar to 
face photographs taken for the purposes of ABBA is not clear in the 
absence of judicial opinion. The AFRS would ordinarily collect 
significantly more data than facial photographs during authentication. 
This can be explained with the help of the &lt;em&gt;&lt;a href="https://www.lawfareblog.com/defense-mosaic-theory" rel="noreferrer noopener" target="_blank"&gt;mosaic theory of privacy&lt;/a&gt;&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;The mosaic theory of privacy suggests that data collected for long 
durations of an individual can be qualitatively different from single 
instances of observation. It argues that aggregating data from different
 instances can create a picture of an individual which affects her 
reasonable expectation of privacy. This is because a mere slice of 
information reveals a lot less if the same is contextualised in a broad 
pattern — a mosaic.&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/p&gt;
&lt;p&gt;The mosaic theory of privacy does not find explicit reference in 
Puttaswamy II. The petitioners had argued that seeding of Aadhaar data 
into existing databases would bridge information across silos so as to 
make real time surveillance possible. This is because information when 
integrated from different silos becomes more than the sum of its parts.&lt;/p&gt;
&lt;p&gt;The Court, however, dismissed this argument, accepting UIDAI’s 
submission that the data collected remains in different silos and 
merging is not permitted within the Aadhaar framework. Therefore, the 
Court did not examine whether it is constitutionally permissible to 
integrate data from different silos; it simply rejected the possibility 
of surveillance as a result of Aadhaar authentication.&lt;/p&gt;
&lt;p&gt;Jurisprudence in other jurisdictions is more advanced. In&amp;nbsp;&lt;em&gt;United States v. Jones&lt;/em&gt;,
 the United States Supreme Court&amp;nbsp;had observed that the insertion of a 
global positioning system into Antoine Jones’ Jeep in the absence of a 
warrant and without his consent invaded his privacy, entitling him to 
Fourth Amendment Protection. In this case, the movement of Jones’ 
vehicle was monitored for a period of twenty-eight days. Five concurring
 opinions in Jones acknowledges that aggregated and extensive 
surveillance is capable of violating the reasonable expectation of 
privacy irrespective of whether or not surveillance has taken place in 
public.&lt;/p&gt;
&lt;p&gt;The Court distinguished between prolonged surveillance and short term
 surveillance. Surveillance in the short run does not reveal what a 
person repeatedly does, as opposed to sustained surveillance which can 
reveal significantly more about a person. The Court takes the example of
 how a sequence of trips to a bar, a bookie, a gym or a church can tell a
 lot more about a person than the story of any single visit viewed in 
isolation.&lt;/p&gt;
&lt;p&gt;Most recently, in&lt;a href="https://www.supremecourt.gov/opinions/17pdf/16-402_h315.pdf" rel="noreferrer noopener" target="_blank"&gt; &lt;em&gt;Carpenter v. United States&lt;/em&gt;&lt;/a&gt;,
 the Supreme Court of the United States held that the collection of&amp;nbsp; 
historical cell data by the government&amp;nbsp; exposes the physical movements 
of an individual to potential surveillance, and an individual holds a 
reasonable expectation of privacy against such&amp;nbsp; collection. The Court 
admitted that historical-cell site information allows the government to 
go back in time in order to retract the exact whereabouts of a person.&lt;/p&gt;
&lt;p&gt;Judicial decisions have not addressed specifically whether facial 
recognition through law enforcement constitutes a search under the 
Fourth Amendment or a “mere visual observation”.&lt;/p&gt;
&lt;p&gt;The common thread linking CCTV footages and cellular data is the 
unique ability to track the movement of an individual from one place to 
another, enabling extreme forms of surveillance. It is perhaps this 
crucial link that would make ARFS-enabled CCTVs prejudicial to 
individual privacy.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;The mosaic theory as understood in &lt;em&gt;Carpenter&lt;/em&gt; helps one 
understand the extent to which an AFRS can augment the capacities of law
 enforcement in India. This in turn can help in understanding whether it
 is constitutionally permissible to install such systems&amp;nbsp;across the 
country.&lt;/p&gt;
&lt;p&gt;AFRS enabled-CCTV footages from different CCTVs. if viewed in 
conjunction could reveal a sequence of movements of an individual, 
enabling long-term surveillance of a nature that is qualitatively 
distinct from isolated observances observed across unrelated CCTV 
footages.&lt;/p&gt;
&lt;p&gt;Subsequent to &lt;em&gt;Carpenter&lt;/em&gt;, &lt;a href="https://www.lawfareblog.com/four-months-later-how-are-courts-interpreting-carpenter" rel="noreferrer noopener" target="_blank"&gt;federal district courts&lt;/a&gt;
 in the United States have declined to apply Carpenter to video 
surveillance cases since the judgement did not “call into question 
conventional surveillance techniques and tools, such as security 
cameras.”&lt;/p&gt;
&lt;p&gt;The extent of processing that an AFRS-enabled CCTV exposes an 
individual to would be significantly greater. This is because every time
 an individual is in the zone of a AFRS-enabled CCTV, the facial image 
will be compared to a common database. Snippets from different CCTVs 
capturing the individual’s physical presence in two different locations 
may not be meaningful per se. When observed together, the AFRS will make
 it possible to identify the individual’s movement from one place to 
another.&lt;/p&gt;
&lt;p&gt;For instance, the AFRS will be able to identify the person when they 
are on Street A at a particular time and when they are Street B in the 
immediately subsequent hour recorded by respective CCTV cameras, 
indicating the person’s physical movement from A to B. While a CCTV 
camera only records movement of an individual in video format, AFRS 
translates that digital information into individualised data with the 
help of a comparison of facial features with a pre-existing database.&lt;/p&gt;
&lt;p&gt;Through data aggregation, which appears to be the aim of the Indian 
government&amp;nbsp;in their tender that links three databases, it is apparent 
that the right to privacy is in danger. Yet,&amp;nbsp;at present, there does not 
exist any case law or legislation that can render such&amp;nbsp;efforts illegal 
at this juncture.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Conclusions and The Way Forward&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Despite a lack of judicial recognition of the potential 
unconstitutionality of deploying&amp;nbsp;AFRS, it is clear that the introduction
 of these systems pose a clear and present danger to civil rights and 
human dignity. Algorithmic surveillance alters a human being’s life in 
ways that even the subject of this surveillance cannot fully comprehend.
 As an individual’s data is manipulated and aggregated to derive&amp;nbsp;a 
pattern about that individual’s world, the individual or his data no 
longer exists for itself&lt;sup&gt; &lt;/sup&gt;but are massaged into various categories.&lt;/p&gt;
&lt;p&gt;Louis Amoore terms this a ‘&lt;a href="https://journals.sagepub.com/doi/abs/10.1177/0263276411417430?journalCode=tcsa" rel="noreferrer noopener" target="_blank"&gt;data-derivative&lt;/a&gt;’,
 which is an abstract conglomeration of data that continuously shapes 
our futures without us having a say in their framing. The branding of an
 individual as a criminal and then aggregating their data causes 
emotional distress as individuals move about in fear of the state gaze 
and their association with activities that are branded as potentially 
dangerous — thereby suppressing a right to dissent — as exemplified by 
their use reported use during the recent protests in Hong Kong.&lt;/p&gt;
&lt;p&gt;Case law both in India and abroad has clearly suggested that a right 
to privacy is contextual and is not surrendered merely because an 
individual is in a public place. However, the jurisprudence protecting 
public photography or videography under the umbrella of privacy remains 
less clear globally and non-existent in India.&lt;/p&gt;
&lt;p&gt;The mosaic theory of privacy is useful in this regard as it prevents 
mass ‘data-veillance’ of individual behaviour and accurately identifies 
the unique power that the volume, velocity and variety of Big Data 
provides to the state. Therefore, it is imperative that the judiciary 
recognise safeguards from data aggregation as an essential component of a
 reasonable expectation of privacy. At the same time, legislation could 
also provide the required safeguards.&lt;/p&gt;
&lt;p&gt;In the US, Senators Coons and Lee recently introduced a draft Bill titled ‘&lt;a href="https://www.coons.senate.gov/imo/media/doc/ALB19A70.pdf" rel="noreferrer noopener" target="_blank"&gt;The Facial Recognition Technology Warrant Act of 2019’&lt;/a&gt;.
 The Bill aims to impose reasonable restrictions on the use of facial 
recognition technology by law enforcement. The Bill creates safeguards 
against sustained tracking of physical movements of an individual in 
public spaces. The Bill terms such tracking ‘ongoing surveillance’ when 
it occurs for over a period of 72 hours in real time or through 
application of technology to historical records. The Bill requires that 
ongoing surveillance only be conducted for law enforcement purposes &lt;em&gt;and&lt;/em&gt; in pursuance of a Court Order (unless it is impractical to do so).&lt;/p&gt;
&lt;p&gt;While the Bill has its textual problems, it is definitely worth 
considering as a model going forward and ensure that AFR systems are 
deployed in line with a rights-respecting reading of a reasonable 
expectation of privacy.&amp;nbsp; &lt;a href="http://datagovernance.org/report/adoption-and-regulation-of-facial-recognition-technologies-in-india" rel="noreferrer noopener" target="_blank"&gt;Parsheera&lt;/a&gt;
 suggests that the legislation should narrow tailoring of the objects 
and purposes for deployment of AFRS, restrictions on the person whose 
images may be scanned from the databases, judicial approval for its use 
on a case by case basis and effective mechanisms of oversight, analysis 
and verification.&lt;/p&gt;
&lt;p&gt;Appropriate legal intervention is crucial. A failure to implement 
this effectively jeopardizes the expression of our true selves and the 
core tenets of our democracy.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward'&gt;https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu, Siddharth Sonkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-01-02T14:12:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
