<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 11 to 25.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-june-14-2013-nishant-shah-world-wide-rule"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/world-trends-in-freedom-of-expression-and-media-development"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/workshop-on-cybersecurity-illustrations.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/workshop-on-cyber-security-illustrations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/workshop-on-urban-data-inequality-and-justice-in-the-global-south"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/privacy-after-big-data-delhi-nov-12-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-data-in-global-south-international-workshop-agenda.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/gender-it-rohini-lakshane-may-19-2016-womens-safety-there-is-an-app-for-that"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/women-in-future-of-work.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/wipo-broadcast-treaty-and-webcasting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/new-indian-express-march-14-2016-will-only-legal-backing-for-aadhaar-suffice"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-quint-march-31-2016-nehaa-chaudhari-will-aadhaar-act-address-indias-dire-need-for-a-privacy-law"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-june-14-2013-nishant-shah-world-wide-rule">
    <title>World Wide Rule</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-june-14-2013-nishant-shah-world-wide-rule</link>
    <description>
        &lt;b&gt;Nishant Shah's review of  Schmidt and Cohen's book was published in the Indian Express on June 14, 2013.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/world-wide-rule/1129208/0"&gt;Click to read the original published in the Indian Express here&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Book: The New Digital Age&lt;/b&gt;&lt;b&gt;&lt;br /&gt;Author: Eric Schmidt &amp;amp; Jared Cohen&lt;br /&gt;&lt;/b&gt;&lt;b&gt;Publisher: Hachette&lt;/b&gt;&lt;b&gt;&lt;br /&gt;Price: Rs 650&lt;br /&gt;Pages: 315&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;When I first heard that Eric Schmidt the chairman of Google and Jared  Cohen, the director of the techno-political think-tank Google Ideas,  are co-authoring a book about our future and how it is going to be  re-shaped with the emergence of digital technologies, I must confess I  was sceptical. When people who do things that you like start writing  about those things, it is not always a pretty picture. Or an easy read.  However, like all sceptics, I am only a romantic waiting to be  validated. So, when I picked up The New Digital Age I was hoping to be  entertained, informed and shaken out of my socks as the gurus of the  interwebz spin science fiction futures for our times. Sadly, I have been  taught my lesson and have slid back into hardened scepticism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here is the short version of the book: Technology is good.  Technology is going to be exciting. There are loads of people who  haven't had it yet. There are not enough people who have figured out how  things work. Everybody needs to go online because no matter what,  technologies are here to stay and they are going to be the biggest  corpus of power. They write, "There is a canyon dividing people who  understand technology and people charged with addressing the world's  toughest geopolitical issues, and no one has built a bridge…As global  connectivity continues its unprecedented advance, many old institutions  and hierarchies will have to adapt or risk becoming obsolete, irrelevant  to modern society." So the handful who hold the reigns of the digital  (states, corporates, artificial intelligence clusters) are either going  to rule the world, or, well, write books about it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The long version is slightly more nuanced, even though it fails  to give us what we have grown to expect of all things Google — the  bleeding edge of back and beyond. For a lay person, observations that  Schmidt and Cohen make about the future of the digital age might be  mildly interesting in the way title credits to your favourite movie can  be. Once they have convinced us, many, many times, that the internet is  fast and fluid and that it makes things fast and fluid and hence the  future we imagine is going to be fast and fluid, the authors tell us  that the internet is spawning a new "caste system" of haves, have-nots,  and wants-but-does-not-haves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Citing the internet as "the largest experiment involving anarchy  in history" they look at the new negotiations of power around the  digital. Virulent viruses from the "Middle East" make their appearance.  Predictably wars of censorship and free information in China get due  attention. Telcos get a big hand for building the infrastructure which  can sell Google phones to people in Somalia. The book offers a  straightforward (read military) reading of drones and less-than-expected  biased views on cyberterrorism, which at least escapes the jingoism  that the USA has been passing off in the service of a surveillance  state. And more than anything else, the book shows politicos and  governments around the world, that the future is messy, anarchy is at  hand, but as long as they put their trust in Big Internet Brothers, the  world will be a manageable place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So while you can clearly see where my review for the book is heading, I must give it its due credit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are three things about this book that make it interesting.  The first is how Schmidt and Cohen seem to be in a seesaw dialogue with  themselves. They realise that five billion people are going to get  connected online. They gush a little about what this net-universality is  going to mean. And then immediately, they also realise that we have to  prepare ourselves for a "Brave New World," which is going to be  infinitely more messy and scary. They recognise that the days of  anonymity on the Web are gone, with real life identities becoming our  primary digital avatars. However, they also hint at a potential future  of pseudonymity that propels free speech in countries with authoritarian  regimes. This oscillation between the good, the bad, the plain and the  incredible, keeps their writing grounded without erring too much either  on the side of techno-euphoria or dystopic visions of the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, and perhaps justly so, the book doles out a lot of useful  information not just for the techno-neophytes but also the amateur  savant. There are stories about "Currygate" in Singapore, or of what  Vodaphone did in Egypt after the Arab Spring, or of the "Human Flesh  Search Engine" in China, which offer a comprehensive, if not critical,  view of the way things are. Schmidt and Cohen have been everywhere on  the ether and they have cyberjockeyed for decades to tell us stories  that might be familiar but are still worth the effort of writing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Third, it is a readable book. It doesn't require you to Telnet  your way into obscure meaning sets in the history of computing. It is  written for people who are still mystified not only about the past of  the Net but also its future, and treads a surprisingly balanced ground  in both directions. It is a book you can give to your grandmother, and  she might be inspired to get herself a Facebook (or maybe a Google +)  account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But all said and done, I expected more. It is almost as if  Schmidt and Cohen are sitting on a minefield of ideas which they want to  hint at but don't yet want to share because they might be able to turn  it into a new app for the Nexus instead. It is a book that could have  been. It wasn't. It is ironic how silent the book is about the role that  big corporations play in shaping our techno-futures, and the fact that  it is printed on dead-tree books with closed licensing so I couldn't get  a free copy online. For people claiming to build new and political  futures, the fact that this wisdom could not come out in more accessible  forms and formats, speaks a lot about how seriously we can take their  views of the future.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-june-14-2013-nishant-shah-world-wide-rule'&gt;https://cis-india.org/internet-governance/blog/indian-express-june-14-2013-nishant-shah-world-wide-rule&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-07-01T10:26:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/world-trends-in-freedom-of-expression-and-media-development">
    <title>World Trends in Freedom of Expression and Media Development</title>
    <link>https://cis-india.org/internet-governance/blog/world-trends-in-freedom-of-expression-and-media-development</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/world-trends-in-freedom-of-expression-and-media-development'&gt;https://cis-india.org/internet-governance/blog/world-trends-in-freedom-of-expression-and-media-development&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-02-17T16:41:28Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016">
    <title>Workshop Report - UIDAI and Welfare Services: Exclusion and Countermeasures</title>
    <link>https://cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016</link>
    <description>
        &lt;b&gt;This report presents summarised notes from a workshop organised by the Centre for Internet and Society (CIS) on Saturday, August 27, 2016, to discuss, raise awareness of, and devise countermeasures to exclusion due to implementation of UID-based verification for and distribution of welfare services.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The Centre for Internet and Society  organised a workshop on "UIDAI and Welfare Services: Exclusion and Countermeasures" at the Institution of Agricultural on  Technologists on August 27 in Bangalore to discuss, raise awareness of, and devise countermeasures to exclusion due to implementation of UID-based verification for and distribution of welfare services &lt;strong&gt;[1]&lt;/strong&gt;. This was a follow-up to the workshop held in Delhi on “Understanding Aadhaar and its New Challenges” at the Centre for Studies in Science Policy, JNU on May 26th and 27th 2016 &lt;strong&gt;[2]&lt;/strong&gt;. In this report we summarise the key concerns raised and the case studies presented by the participants at the workshop held on August 27, 2016.&lt;/p&gt;
&lt;h2&gt;Implementation of the UID Project&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Question of Consent:&lt;/strong&gt; The Aadhaar Act &lt;strong&gt;[3]&lt;/strong&gt; states that the consent of the individual must be taken at the time of enrollment and authentication  and it must be informed to him/her the purpose for which the data would be used. However, the Act does not provide for an opt-out mechanism  and  an individual is compelled to give consent to continue with the enrollment process or to complete an authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Lack of Adherence to Court Orders:&lt;/strong&gt; Despite of several orders by Supreme Court stating that use of Aadhaar cannot be made mandatory for the purpose of availing benefits and services, multiple state governments and departments have made it mandatory for a wide range of purposes like booking railway tickets &lt;strong&gt;[4]&lt;/strong&gt;, linking below the poverty line ration cards with Aadhaar &lt;strong&gt;[5]&lt;/strong&gt;, school examinations &lt;strong&gt;[6]&lt;/strong&gt;, food security, pension and scholarship &lt;strong&gt;[7]&lt;/strong&gt;, to name a few.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Misleading Advertisements:&lt;/strong&gt; A concern was raised that individuals are being mislead in the necessity and purpose for enrollment into the project.  For example, people have been asked to enrol by telling them that they might get excluded from the system and cannot get services like passports,  banks, NREGA, salaries for government employees, denial of vaccinations, etc. Furthermore,  the Supreme Court has ordered Aadhaar not be mandatory, yet people are being told that documentation or record keeping cannot be done without UID number.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Hybrid Governance:&lt;/strong&gt; The participants pointed out that with the Aadhaar (Targeted delivery of financial and other subsidies, benefits and services) Act, 2016 (hereinafter referred to as Aadhaar Act, 2016 ) being partially enforced,  multiple examples of exclusion as reported in the news are demonstrating  how the Aadhaar project is creating a case of hybrid governance i.e private corporations playing a significant role in Governance. This can be seen in case of Aadhaar where we see many entities from private sector being involved in its implementation, as well as many software and hardware companies.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Lack of Transparency around Sharing of Biometric Data:&lt;/strong&gt; The fact how and why the Government is relying on biometrics for welfare schemes is unclear and not known. Also, there is no information on how biometric data that is collected through the project is being used and its ability as an authenticating device. Along with that, there is very little information on companies that have been enlisted to hold and manage data and perform authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Possibility of Surveillance:&lt;/strong&gt; Multiple petitions and ongoing cases have raised concerns regarding  the possibility of surveillance, tracking, profiling, convergence of data, and the opaque involvement of private companies involved in the project.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Denial of Information:&lt;/strong&gt; In an RTI filed by one of the participant requesting to share the key contract for the project, it was refused on the grounds under section 8(1) (d) of the RTI Act, 2005. However, it was claimed that the provision would not be applicable since the contract was already awarded and any information disclosed to the Parliament should be disclosed to the citizens. The Central Information Commission issued a letter stating that the contractual obligation is over and a copy of the said agreement can be duly shared. However, it was discovered by the said participant that certain pages of the same were missing , which contained confidential information. When this issue went before appeal before the Information Commissioner, the IC gave an order to the IC in Delhi to comply with the previous order. However, it was communicated that limited financial information may be given, but not missing pages. Also, it was revealed that the UIDAI was supposed to share biometric data with NPR (by way of a MoU), but it has refused to give information since the intention was to discontinue NPR and wanted  only UIDAI to collect data.&lt;/p&gt;
&lt;h2&gt;Concerns Arising from the Report of the Comptroller and Auditor General of India (CAG) on Implementation of PAHAL (DBTL) Scheme&lt;/h2&gt;
&lt;p&gt;A presentation on the CAG compliance audit report of PAHAL on LPG &lt;strong&gt;[8]&lt;/strong&gt; revealed how the society was made to believe that UID will help deal with the issue of duplication and collection as well as use of biometric data will help. The report also revealed that multiple LPG connections have the same Aadhaar number or same bank account number in the consumer database maintained by the OMCs, the bank account number of consumers were also not accurately recorded,  scrutiny of the database revealed improper capture of Aadhaar numbers, and there was incorrect seeding of IFSC codes in consumer database. The participants felt that this was an example of how  schemes that are being introduced for social welfare  do not necessarily benefit the society, and on the contrary, has led to exclusion by design. For example, in the year 2011, by was of the The Liquefied Petroleum Gas (Regulation of Supply and Distribution) Amendment Order, 2011 &lt;strong&gt;[9]&lt;/strong&gt;, the Ministry of Petroleum and Natural Gas made the Unique Identification Number (UID) under the Aadhaar project a must for availing LPG refills. This received a lot of public pushback, which led to non-implementation of the order. In October 2012, despite the UIDAI stating that the number was voluntary, a number of services began requiring the provision of an Aadhaar number for accessing benefits. In September 2013, when the first order on Aadhaar was passed by court &lt;strong&gt;[10]&lt;/strong&gt;, oil marketing companies and UIDAI  approached the Supreme Court to change the same and allow them to make it mandatory, which was refused by the Court. Later in the year 2014, use of Aadhaar for subsidies was made mandatory.  The participants further criticised the  CAG report for revealing the manner in which linking Aadhaar with welfare schemes has allowed duplication and led to ghost beneficiaries where there is no information about who these people are who are receiving the benefits of the subsidies. For example, in Rajasthan, people are being denied their pension as they are being declared dead due to absence of information from the Aadhaar database.&lt;/p&gt;
&lt;p&gt;It was said that the statistics of duplication  mentioned in the report show how UIDAI (as it claims to ensure de-duplication of beneficiaries) is not required for this purpose and can be done without Aadhaar as well. Also, due to incorrect seeding of Aadhaar number many are being denied subsidy where there is no information regarding the number of people who have been denied the subsidy because of this.  Considering these important facts from the audit report, the discussants concluded how the statistics reflect inflated claims by UIDAI and how the problems which are said to be addressed by using Aadhaar can be dealt without it. In this context, it is important to understand how the data in the aadhaar database maybe wrong and in case of e-governance the citizens suffer. Also, the fact that loss of subsidy-not in cash, but in use of LPG cylinder - only for cooking, is ignored. In addition to that, there is no data or way to check if the cylinder is being used for commercial purposes or not as RTI from oil companies says that no ghost identities have been detected.&lt;/p&gt;
&lt;h2&gt;UID-linked Welfare Delivery in Rajasthan&lt;/h2&gt;
&lt;p&gt;One speaker presented findings on people's experiences with UID-linked welfare services in Rajasthan, collected through a 100 days trip organised to speak to people across the state on problems related to welfare governance. This visit revealed that people who need the benefits and access to subsidies most are often excluded from actual services. It was highlighted that the paperless system is proving to be highly dangerous. Some of the cases discussed included that of a disabled labourer, who was asked to get an aadhaar card, but during enrollment asked the person standing next to him to put all his  5 fingers for biometric data collection.  Due to this incorrect data, he is devoid of all subsidies since the authentication fails every time he goes to avail it. He stopped receiving his entitlements.  Though problems were anticipated, the misery of the people revealed the extent of the problems arising from the project. In another case, an  elderly woman living alone, since she could not go for Aadhaar authentication, had not been receiving the ration she is entitled to receive for the past 8 months. When the ration shop was approached to represent her case, the dealers said that they cannot provide her ration since they would require her thumb print for authentication. Later, they found out that on persuading the dealer to provide her with ration since Aadhaar is not mandatory, they found out that in their records they had actually mentioned that she was being given the ration, which was not the case. So the lack of awareness and the fact that people are entitled to receive the benefits irrespective of Aadhaar is something that is being misused by dealers. This shows how this system has become a barrier for the people, where they are also unaware about the grievance redressal mechanism.&lt;/p&gt;
&lt;h2&gt;Aadhaar and e-KYC&lt;/h2&gt;
&lt;p&gt;In this session, the use of Aadhaar for e-KYC verification was discussed The UID strategy document describes how the idea is to link UIDAI with money enabled Direct Benefit Transfer (DBT) to the beneficiaries without any reason or justification for the same. It was highlighted by one of the participants how the Reserve Bank of India (RBI) believed that making Aadhaar compulsory for e-KYC and several other banking services was a violation of the Money Laundering Act as well as its own rules and standards, however, later relaxed the rules to link Aadhaar with bank accounts and accepted its for e-KyC with great reluctance as the Department of Revenue thought otherwise. It was mentioned how allowing opening of bank accounts remotely using Aadhaar, without physically being present, was touted as a dangerous idea. However, the restrictions placed by RBI were suddenly done away with and opening bank accounts remotely was enabled via e-KYC.&lt;/p&gt;
&lt;p&gt;A speaker emphasised that with emerging FinTech services in India being tied with Aadhaar via India Stack, the following concerns are becoming critical:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;With RBI enabling creation of bank accounts remotely, it becomes difficult to to track who did e-KYC and which bank did it and hold the same accountable.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;The Aadhaar Act 2016 states that UIDAI will not track the queries made and will only keep a record of Yes/No for authentication. For example, the e-KYC to open a bank account can now be done with the help of an Aadhaar number and biometric authentication. However, this request does not get recorded and at the time of authentication, an individual is simply told whether the request has been matched or not by way of a Yes/No &lt;strong&gt;[11]&lt;/strong&gt;. Though UIDAI will maintain the authentication record, this may act as an obstacle since in case the information from the aadhaar database does not match, the person would not be able to open a bank account and would only receive a yes/no as a response to the request.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Further, there is a concern that the Aadhaar Enabled Payment System being implemented by the National Payment Corporation of India (NCPI) would allow effectively hiding of source and destination of money flow, leading to money laundering and cases of bribery. This possible as NCPI maintains a mapper where each bank account is linked (only the latest one). However, Aadhaar number can be linked with multiple bank accounts of an individual. So when a transaction is made, the mapper records the transaction only from that 1 account. But if another transaction takes place with another bank account, that record is not maintained by the mapper at NCPI since it records only transactions of the latest account seeded in that. This makes money laundering easy as the money moves from aadhaar number to aadhaar number now rather than bank account to bank account.&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27"&gt;http://cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges"&gt;http://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="https://uidai.gov.in/beta/images/the_aadhaar_act_2016.pdf"&gt;https://uidai.gov.in/beta/images/the_aadhaar_act_2016.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://scroll.in/latest/816343/aadhaar-numbers-may-soon-be-compulsory-to-book-railway-tickets"&gt;http://scroll.in/latest/816343/aadhaar-numbers-may-soon-be-compulsory-to-book-railway-tickets&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; See: &lt;a href="http://www.thehindu.com/news/national/karnataka/linking-bpl-ration-card-with-aadhaar-made-mandatory/article9094935.ece"&gt;http://www.thehindu.com/news/national/karnataka/linking-bpl-ration-card-with-aadhaar-made-mandatory/article9094935.ece&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See: &lt;a href="http://timesofindia.indiatimes.com/india/After-scam-Bihar-to-link-exams-to-Aadhaar/articleshow/54000108.cms"&gt;http://timesofindia.indiatimes.com/india/After-scam-Bihar-to-link-exams-to-Aadhaar/articleshow/54000108.cms&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a href="http://www.dailypioneer.com/state-editions/cs-calls-for-early-steps-to-link-aadhaar-to-ac.html"&gt;http://www.dailypioneer.com/state-editions/cs-calls-for-early-steps-to-link-aadhaar-to-ac.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a href="http://www.cag.gov.in/sites/default/files/audit_report_files/Union_Commercial_Compliance_Full_Report_25_2016_English.pdf"&gt;http://www.cag.gov.in/sites/default/files/audit_report_files/Union_Commercial_Compliance_Full_Report_25_2016_English.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See: &lt;a href="http://petroleum.nic.in/docs/lpg/LPG%20Control%20Order%20GSR%20718%20dated%2026.09.2011.pdf"&gt;http://petroleum.nic.in/docs/lpg/LPG%20Control%20Order%20GSR%20718%20dated%2026.09.2011.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; See: &lt;a href="http://judis.nic.in/temp/494201232392013p.txt"&gt;http://judis.nic.in/temp/494201232392013p.txt&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; Section 8(4) of the Aadhaar Act, 2016 states that "The Authority shall respond to an authentication query with a positive, negative or any other appropriate response sharing such identity information excluding any core biometric information."&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016'&gt;https://cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Welfare Governance</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    

   <dc:date>2019-03-16T04:34:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/workshop-on-cybersecurity-illustrations.pdf">
    <title>Workshop on Cybersecurity Illustrations</title>
    <link>https://cis-india.org/internet-governance/files/workshop-on-cybersecurity-illustrations.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/workshop-on-cybersecurity-illustrations.pdf'&gt;https://cis-india.org/internet-governance/files/workshop-on-cybersecurity-illustrations.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-11-13T14:34:17Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/workshop-on-cyber-security-illustrations">
    <title>Workshop on Cyber Security Illustrations</title>
    <link>https://cis-india.org/internet-governance/workshop-on-cyber-security-illustrations</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/workshop-on-cyber-security-illustrations'&gt;https://cis-india.org/internet-governance/workshop-on-cyber-security-illustrations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-12-10T06:08:59Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/workshop-on-urban-data-inequality-and-justice-in-the-global-south">
    <title>Workshop on 'Urban Data, Inequality and Justice in the Global South'</title>
    <link>https://cis-india.org/internet-governance/news/workshop-on-urban-data-inequality-and-justice-in-the-global-south</link>
    <description>
        &lt;b&gt;Aayush Rathi and Ambika Tandon presented our research on video-based surveillance in New Delhi at a workshop on urban data, inequality, and justice in the global South at the University of Manchester on 14 June 2019.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The agenda for the workshop and the presentations made by CIS can be &lt;a class="external-link" href="https://cis-india.org/raw/unpacking-video-based-surveillance-in-new-delhi-urban-data-justice"&gt;accessed here&lt;/a&gt;. &lt;span&gt;The research was conducted as part of a grant from the University, as part of a project on justice in data systems within cities. It will bepublished as a working paper by the university in July-August.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/workshop-on-urban-data-inequality-and-justice-in-the-global-south'&gt;https://cis-india.org/internet-governance/news/workshop-on-urban-data-inequality-and-justice-in-the-global-south&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-07-06T01:30:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/privacy-after-big-data-delhi-nov-12-2016">
    <title>Workshop on 'Privacy after Big Data' (Delhi, November 12)</title>
    <link>https://cis-india.org/internet-governance/events/privacy-after-big-data-delhi-nov-12-2016</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) and the Sarai programme, CSDS, invite you to a workshop on 'Privacy after Big Data: What Changes? What should Change?' on Saturday, November 12. This workshop aims to build a dialogue around some of the key government-led big data initiatives in India and elsewhere that are contributing significant new challenges and concerns to the ongoing debates on the right to privacy. It is an open event. Please register to participate.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Invitation note and agenda: &lt;a href="https://github.com/cis-india/website/raw/master/docs/CIS-Sarai_PrivacyAfterBigData_ConceptAgenda.pdf"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;Venue and RSVP&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Venue:&lt;/strong&gt; Centre for the Study of Developing Societies 29, Rajpur Road, Civil Lines, Delhi 110054.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Location on Google Maps:&lt;/strong&gt; &lt;a href="https://www.google.com/maps/place/CSDS/@28.677775,77.2162523,17z/"&gt;https://www.google.com/maps/place/CSDS/@28.677775,77.2162523,17z/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Registration:&lt;/strong&gt; &lt;a href="https://goo.gl/forms/py0Q0u8rMppu4smE3"&gt;Complete this form&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;Concept Note&lt;/h3&gt;
&lt;p&gt;In this age of big data, discussions about privacy are intertwined with the use of technology and the data deluge. Though big data possesses enormous value for driving innovation and contributing to productivity and efficiency, privacy concerns have gained significance in the dialogue around regulated use of data and the means by which individual privacy might be compromised through means such as surveillance, or protected. The tremendous opportunities big data creates in varied sectors ranges from financial technology, governance, education, health, welfare schemes, smart cities to name a few.&lt;/p&gt;
&lt;p&gt;With the UID (“Aadhaar”) project re-animating the Right to Privacy debate in India, and the financial technology ecosystem growing rapidly, striking a balance between benefits of big data and privacy concerns is a critical policy question that demands public dialogue and research to inform an evidence based decision.&lt;/p&gt;
&lt;p&gt;Also, with the  advent of potential big data initiatives like the ambitious Smart Cities Mission under the Digital India Scheme, which would rely on harvesting large data sets and the use of analytics in city subsystems to make public utilities and services efficient, the tasks of ensuring data security on one hand and protecting individual privacy on the other become harder.&lt;/p&gt;
&lt;p&gt;As key privacy principles are at loggerheads with big data activities, it is important to consider privacy as an embedded component in the processes, systems and projects, rather than being considered as an afterthought. These examples highlight the current state of discourse around data protection and privacy in India and the shapes they are likely to take in near future.&lt;/p&gt;
&lt;p&gt;This workshop aims to build a dialogue around some of the key government-led big data initiatives in India and elsewhere that are contributing significant new challenges and concerns to the ongoing debates on the right to privacy.&lt;/p&gt;
&lt;h3&gt;Agenda&lt;/h3&gt;
&lt;h4&gt;09:00-09:30 Tea and Coffee&lt;/h4&gt;
&lt;h4&gt;09:30-10:00 Introduction&lt;/h4&gt;
&lt;p&gt;&lt;a href="#amber"&gt;Mr. Amber Sinha&lt;/a&gt; and &lt;a href="#sandeep"&gt;Mr. Sandeep Mertia&lt;/a&gt;&lt;br /&gt;
&lt;em&gt;This session will introduce the topic of the workshop in the context of the ongoing works at CIS and Sarai.&lt;/em&gt;&lt;/p&gt;
&lt;h4&gt;10:00-11:00 From Privacy Bill(s) to ‘Habeas Data’&lt;/h4&gt;
&lt;p&gt;&lt;a href="#usha"&gt;Dr. Usha Ramanathan&lt;/a&gt; and &lt;a href="#vipul"&gt;Mr. Vipul Kharbanda&lt;/a&gt;&lt;br /&gt;
&lt;em&gt;This session will present a brief history of the privacy bill(s) in India and end with reflections on ‘habeas data’ as a lens for thinking and actualising privacy after big data.&lt;/em&gt;&lt;/p&gt;
&lt;h4&gt;11:00-11:30 Tea and Coffee&lt;/h4&gt;
&lt;h4&gt;11:30-12:30 Digital ID, Data Protection, and Exclusion&lt;/h4&gt;
&lt;p&gt;&lt;a href="#amelia"&gt;Ms. Amelia Andersdotter&lt;/a&gt; and &lt;a href="#srikanth"&gt;Mr. Srikanth Lakshmanan&lt;/a&gt;&lt;br /&gt;
&lt;em&gt;This session will discuss national centralised digital ID systems, often operating at a cross-functional scale, and highlight its implications for discussions on data protection, welfare governance, and exclusion from public and private services.&lt;/em&gt;&lt;/p&gt;
&lt;h4&gt;12:30-13:30 Digital Money and Financial Inclusion&lt;/h4&gt;
&lt;p&gt;&lt;a href="#anupam"&gt;Dr. Anupam Saraph&lt;/a&gt; and &lt;a href="#astha"&gt;Ms. Astha Kapoor&lt;/a&gt;&lt;br /&gt;
&lt;em&gt;This session will focus on the rise of digital banking and online payments as core instruments of financial inclusion in India, especially in the context of the Jan Dhan Yojana and UPI, and reflect on the concerns around privacy and financial data.&lt;/em&gt;&lt;/p&gt;
&lt;h4&gt;13:30-14:30 Lunch&lt;/h4&gt;
&lt;h4&gt;14:30-15:30 Big Data and Mass Surveillance&lt;/h4&gt;
&lt;p&gt;&lt;a href="#anja"&gt;Dr. Anja Kovacs&lt;/a&gt; and &lt;a href="#matthew"&gt;Mr. Matthew Rice&lt;/a&gt;&lt;br /&gt;
&lt;em&gt;This session will reflect on the rise of mass communication surveillance across the world, and the evolving challenges of regulating il/legal surveillance by government agencies.&lt;/em&gt;&lt;/p&gt;
&lt;h4&gt;15:30-16:15 Privacy is (a) Right&lt;/h4&gt;
&lt;p&gt;&lt;a href="#apar"&gt;Mr. Apar Gupta&lt;/a&gt; and &lt;a href="#kritika"&gt;Ms. Kritika Bhardwaj&lt;/a&gt;&lt;br /&gt;
&lt;em&gt;This brief session is to share initial ideas and strategies for articulating and actualising a constitutional right to privacy in India.&lt;/em&gt;&lt;/p&gt;
&lt;h4&gt;16:15-16:30	Tea and Coffee&lt;/h4&gt;
&lt;h4&gt;16:30-17:30 Round Table&lt;/h4&gt;
&lt;p&gt;&lt;em&gt;An open discussion session to conclude the workshop.&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;Speakers&lt;/h3&gt;
&lt;h4 id="amber"&gt;Mr. Amber Sinha&lt;/h4&gt;
&lt;p&gt;Amber works on issues surrounding privacy, big data, and cyber security. He is interested in the impact of emerging technologies like artificial intelligence and learning algorithms on existing legal frameworks, and how they need to evolve in response. Amber studied humanities and law at National Law School of India University, Bangalore.&lt;/p&gt;
&lt;p&gt;E-mail: amber at cis-india dot org.&lt;/p&gt;
&lt;p&gt;Twitter: &lt;a href="https://twitter.com/ambersinha07"&gt;@ambersinha07&lt;/a&gt;.&lt;/p&gt;
&lt;h4 id="amelia"&gt;Ms. Amelia Andersdotter&lt;/h4&gt;
&lt;p&gt;Amelia Andersdotter has been a Member of the European Parliament. She works on practical implications of data protection laws and consumer information security in Sweden, and digital rights in the Europe in general. Presently she is residing in Bangalore, where she is a visiting scholar with Centre for Internet and Society. She holds a BSc in Mathematics.&lt;/p&gt;
&lt;p&gt;URL: &lt;a href="https://dataskydd.net"&gt;https://dataskydd.net&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Twitter: &lt;a href="https://twitter.com/teirdes"&gt;@teirdes&lt;/a&gt;.&lt;/p&gt;
&lt;h4 id="anja"&gt;Dr. Anja Kovacs&lt;/h4&gt;
&lt;p&gt;Dr. Anja Kovacs directs the Internet Democracy Project in Delhi, India, which works for an Internet that supports free speech, democracy and social justice in India and beyond. Anja’s research and advocacy focuses especially on questions regarding freedom of expression, cybersecurity and the architecture of Internet governance. She has been a member of the of the Investment Committee of the Digital Defenders Partnership and of the Steering Committee of Best Bits, a global network of civil society members. She has also worked as an international consultant on Internet issues, including for the Independent Commission on Multilateralism, the United Nations Development Programme Asia Pacific and the UN Special Rapporteur on Freedom of Expression, Mr. Frank La Rue, as well as having been a Fellow at the Centre for Internet and Society in Bangalore, India.&lt;/p&gt;
&lt;p&gt;Internet Democracy Project: &lt;a href="https://internetdemocracy.in/"&gt;https://internetdemocracy.in&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Twitter: &lt;a href="https://twitter.com/anjakovacs"&gt;@anjakovacs&lt;/a&gt;.&lt;/p&gt;
&lt;h4 id="anupam"&gt;Dr. Anupam Saraph&lt;/h4&gt;
&lt;p&gt;Anupam Saraph has extensively researched India's UID number that has been widely regarded as the game changer in development programs. It has come to be linked with both public and private databases and become the requirement for access to entitlements, benefits, services and rights. Dr. Saraph, who has the design of at least two identification programs to his credit has researched the UID’s functional creep since its inception.&lt;/p&gt;
&lt;p&gt;He has been dissecting the myths of what the UID is or is not. He has also tracked the consequences of its linkages on databases that protect national security, sovereignty, democratic status and the entire banking and money system in India. He has also highlighted the implications of its use for targeted delivery of cash subsidies from the Consolidated Fund of India. He has written and lectured widely about the devastating impact of the UID number on development programs, national security and the governability of India.&lt;/p&gt;
&lt;p&gt;As a Professor of Systems, Governance and Decision Sciences, Environmental Systems and Business he mentors students and teaches systems, information systems, environmental systems and sustainable development at universities in Europe, Asia and the Americas. He has worked with the Rensselaer Polytechnic Institute, Rijksuniversitiet Groningen, RIVM, University of Edinburgh, Resource Use Institute, Systems Research Institute among others. Dr. Saraph has had the unique distinction of being India’s only person who has held the only office of a City CIO in India, in a PPP arrangement with government, industry and himself. He has also been the first  e-governance Advisor to a State government. Dr. Saraph has held CxO and ministerial level positions and serves as an independent director on the boards of Public and Private Sector companies and NGOs. He is also the President of the Nagrik Chetna Manch, an NGO charged with the mission to bring accountability in governance.&lt;/p&gt;
&lt;p&gt;Dr. Saraph is also actively engaged in civil society where he participates in several environmental, resource and nature conservation initiatives, has authored draft legislations for river and natural resource conservation, right to good governance and has contributed to governance, election and democratic reforms. Dr. Saraph is a regular columnist in newspapers and writes on issues of governance, future design, technology and education from a systems perspective.&lt;/p&gt;
&lt;p&gt;Dr. Saraph is also actively engaged in civil society where he participates in several environmental, resource and nature conservation initiatives, has authored draft legislations for river and natural resource conservation, right to good governance and has contributed to governance, election and democratic reforms. Dr. Saraph is a regular columnist in newspapers and writes on issues of governance, future design, technology and education from a systems perspective.&lt;/p&gt;
&lt;p&gt;Dr. Saraph is also actively engaged in civil society where he participates in several environmental, resource and nature conservation initiatives, has authored draft legislations for river and natural resource conservation, right to good governance and has contributed to governance, election and democratic reforms. Dr. Saraph is a regular columnist in newspapers and writes on issues of governance, future design, technology and education from a systems perspective.&lt;/p&gt;
&lt;p&gt;As a future designer and recognized as a global expert on complex systems he helps individuals and organisations understand and design the future of their worlds. Together they address the toughest challenges, accomplish missions and achieve business goals. He also supports building capacity to address the challenges of today as well as to build future designs through teams and effective leadership. Since the eighties Dr. Saraph has modeled complex systems of cities, countries, regions and even the planet. His models have been awarded internationally and even placed in 10-year permanent exhibitions.&lt;/p&gt;
&lt;p&gt;Dr Saraph works with business and government executives, civil society leaders, politicians, generals, civil servants, police, trade unionists, community activists, United Nations and ASEAN officials, judges, writers, media, architects, designers, technologists, scientists, entrepreneurs, board members and business leaders of small, mid and large single and trans-national companies, religious leaders and artists across a dozen countries and various industry sectors to help them and their organisations succeed in their missions. He advises the World Economic Forum through its Global Agenda Council for Complex Systems and the Club of Rome, Indian National Association as a founder life member.&lt;/p&gt;
&lt;p&gt;Dr Saraph holds a PhD in designing sustainable systems from the faculty of Mathematics and Natural Sciences of the Rijksuniversiteit Groningen, the Netherlands.&lt;/p&gt;
&lt;p&gt;Website: &lt;a href="http://anupam.saraph.in/"&gt;http://anupam.saraph.in&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Twitter: &lt;a href="https://twitter.com/anupamsaraph"&gt;@anupamsaraph&lt;/a&gt;.&lt;/p&gt;
&lt;h4 id="apar"&gt;Mr. Apar Gupta&lt;/h4&gt;
&lt;p&gt;Apar Gupta practices law in Delhi. He is also one of the co-founders of the Internet Freedom Foundation. His work and writing on public interest issues can be accessed at his personal website &lt;a href="http://www.apargupta.com/"&gt;www.apargupta.com&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Twitter: &lt;a href="https://twitter.com/aparatbar"&gt;@aparatbar&lt;/a&gt;.&lt;/p&gt;
&lt;h4 id="astha"&gt;Ms. Astha Kapoor&lt;/h4&gt;
&lt;p&gt;Astha Kapoor is a public policy strategy consultant working on financial inclusion and digital payments. Currently, she is working with MicroSave. Her tasks involve a focus on government to people (G2P) payments - and her work spans strategy, advisory and evaluation with the DBT Mission, Office of the Chief Economic Advisor, NITI Aayog and ministries pertaining to food, fuel and fertilizer. She recently designed a pilot to digitize uptake of fertilizers in Krishna district, and evaluated the newly introduced coupon system in the Public Distribution System in Bengaluru.&lt;/p&gt;
&lt;p&gt;Twitter: &lt;a href="https://twitter.com/kapoorastha"&gt;@kapoorastha&lt;/a&gt;.&lt;/p&gt;
&lt;h4 id="kritika"&gt;Ms. Kritika Bhardwaj&lt;/h4&gt;
&lt;p&gt;Kritika Bhardwaj works as a Programme Officer at the Centre for Communication Governance (CCG), National Law University, Delhi. Her main areas of research are privacy and data protection. At CCG, she has written about the privacy implications of several contemporary issues such as Aadhaar (India's unique identification project), cloud computing and the right to be forgotten. A lawyer by training, Kritika has a keen interest in information law and human rights law.&lt;/p&gt;
&lt;p&gt;Centre for Communication Governance, NLU Delhi: &lt;a href="http://ccgdelhi.org/"&gt;http://ccgdelhi.org&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Twitter: &lt;a href="https://twitter.com/Kritika12"&gt;@Kritika12&lt;/a&gt;.&lt;/p&gt;
&lt;h4 id="matthew"&gt;Mr. Matthew Rice&lt;/h4&gt;
&lt;p&gt;Matthew Rice is an Advocacy Officer at Privacy International working across the organisation engaging with international partners and strengthening their capacity on communications surveillance issues. He has previously worked at Privacy International as a consultant building the Surveillance Industry Index, the largest publicly available database on the private surveillance sector ever assembled. Matthew graduated from University of Aberdeen with an LLB (Hons.) and also has an MA in Human Rights from University College London.&lt;/p&gt;
&lt;p&gt;Privacy International: &lt;a href="https://privacyinternational.org/"&gt;https://privacyinternational.org&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Twitter: &lt;a href="https://twitter.com/mattr3"&gt;@mattr3&lt;/a&gt;.&lt;/p&gt;
&lt;h4 id="sandeep"&gt;Mr. Sandeep Mertia&lt;/h4&gt;
&lt;p&gt;Sandeep Mertia is a Research Associate at The Sarai Programme, Centre for the Study of Developing Societies, Delhi. He is an ICT engineer by training with research interests in Science &amp;amp; Technology Studies, Software Studies
and Anthropology. He is conducting an ethnographic study of emerging modes of data-driven knowledge production in the social sector.&lt;/p&gt;
&lt;p&gt;Sarai: &lt;a href="http://sarai.net/"&gt;http://sarai.net&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Twitter: &lt;a href="https://twitter.com/SandeepMertia"&gt;@SandeepMertia&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Academia: &lt;a href="https://daiict.academia.edu/SandeepMertia"&gt;https://daiict.academia.edu/SandeepMertia&lt;/a&gt;.&lt;/p&gt;
&lt;h4 id="srikanth"&gt;Mr. Srikanth Lakshmanan&lt;/h4&gt;
&lt;p&gt;Srikanth is a software professional with interests in Internet, follower of Internet policy discussions, volunteers for multiple online campaigns related to Internet. He is also fascinated by FOSS, opendata, localization,
Wikipedia, maps, public transit, civic tech and occasionally contributes to them.&lt;/p&gt;
&lt;p&gt;Site: &lt;a href="http://www.srik.me/"&gt;http://www.srik.me&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Twitter: &lt;a href="https://twitter.com/logic"&gt;@logic&lt;/a&gt;.&lt;/p&gt;
&lt;h4 id="vipul"&gt;Mr. Vipul Kharbanda&lt;/h4&gt;
&lt;p&gt;Vipul Kharbanda is a consultant with the Center for Internet and Society, Bangalore. After finishing his BA.LLB.(Hons.) from National Law School of India University in Bangalore, he worked for India’s largest corporate law firm for two and a half years in their Mumbai office for two years working primarily on the financing of various infrastructure projects such as Power Plants, Roads, Airports, etc. Since quitting his corporate law job, Vipul has been working as the Associate Editor in a legal publishing house which has been publishing legal books and journals for the last 90 years in India. He has also been involved with the Center for Internet and Society as a Consultant working primarily on issues related to privacy and surveillance.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/privacy-after-big-data-delhi-nov-12-2016'&gt;https://cis-india.org/internet-governance/events/privacy-after-big-data-delhi-nov-12-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Data Revolution</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    
    
        <dc:subject>Digital Rights</dc:subject>
    

   <dc:date>2016-11-12T10:14:52Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-data-in-global-south-international-workshop-agenda.pdf">
    <title>Workshop Details of Big Data in the Global South International Workshop </title>
    <link>https://cis-india.org/internet-governance/blog/big-data-in-global-south-international-workshop-agenda.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-data-in-global-south-international-workshop-agenda.pdf'&gt;https://cis-india.org/internet-governance/blog/big-data-in-global-south-international-workshop-agenda.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-11-06T02:03:31Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/gender-it-rohini-lakshane-may-19-2016-womens-safety-there-is-an-app-for-that">
    <title>Women's Safety? There is an App for That</title>
    <link>https://cis-india.org/internet-governance/blog/gender-it-rohini-lakshane-may-19-2016-womens-safety-there-is-an-app-for-that</link>
    <description>
        &lt;b&gt;“After locking ourselves in a room for more than 6 days, this is what we came out [sic] with. Join us in helping make WOMEN feel SAFE,” read a gloating press release about a smartphone app for women to notify their near ones that they were in distress. It was one among many such PRs frequently landing in my mailbox after the rape and murder of a young student on board a private bus in Delhi in 2012. 
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Rohini Lakshané was &lt;a class="external-link" href="http://www.genderit.org/node/4744/"&gt;published in Gender IT.org&lt;/a&gt; on May 19, 2016. This was also mirrored by &lt;a class="external-link" href="http://feminisminindia.com/2017/01/09/womens-safety-mobile-apps/"&gt;Feminism in India&lt;/a&gt; on January 9, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The incident had spurred protests across the country and made international headlines. Along with all this came a slew of new “women’s safety” apps. Existing ones, many of which had fizzled out, were conveniently relaunched. My own experience of user-testing such apps in India back then was that they were unreliable at best and dangerously counterproductive at worst. Some of them were endorsed by governments and celebrities and ended up being glorified despite their flaws, their technical and systemic handicaps never acknowledged at all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are myriad mobile phone apps meant to be deployed for personal safety, but their basic functioning is more or less the same: the user activates the app (by pressing a button, shaking the device or similar cue), which sends a distress message containing the users’ location to pre-defined contacts. Some apps include additional artefacts such as a short audio or video recording of the situation. Some others augment this mechanism by alerting the police and other agencies best placed to respond to the emergency. For example, the Companion app for students living on campus notifies the university along with police. The &lt;a href="https://newsroom.uber.com/india/introducing-an-integrated-sos-alert-solution-for-law-enforcement/"&gt;&lt;span style="text-decoration: underline;"&gt;SOS buttons in taxi-hailing apps such as Uber&lt;/span&gt;&lt;/a&gt; enable the user’s contacts to follow the cab’s GPS trail and notify them and the cab company’s “incident response team” of emergencies. Apps such as Kitestring would treat the lack of the user’s response within a time-window as the trigger for a distress message. All their technical wizardry perhaps makes it easy to lose sight of the fact that technology is not a saviour but a tool or an enabler, that technology alone cannot be the panacea of a problem that is deeply complex and, in reality, rooted in society and governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government announced last month that every phone sold in the country from January 2017 should be equipped with a &lt;a href="http://www.bbc.com/news/technology-36139985"&gt;&lt;span style="text-decoration: underline;"&gt;panic button that sends distress flares to the police and a trusted set of contacts&lt;/span&gt;&lt;/a&gt;. Nearly half the phones sold in India &lt;a href="http://www.idc.com/getdoc.jsp?containerId=prSG25827215"&gt;&lt;span style="text-decoration: underline;"&gt;cost USD 100 or less&lt;/span&gt;&lt;/a&gt;. Prices are kept so low by sacrificing features and the quality of the hardware; there are a lot of phones with substandard GPS modules, poor touchscreens, slow processors, bad cameras, tiny memory, and dismal battery life. They run on different versions of different operating systems, some of them outdated. All of these factors would determine if someone is able to use the app at all and how quickly they and their phone would be able to respond to an emergency. Additionally, mobile phone signals become thin or shaky in areas with a high number of users and buildings located cheek-by-jowl. Even when the mobile hardware is good and the mobile signal usable, GPS accuracy can be spotty and constant location tracking would hog battery. These issues would affect the efficacy of any app. Besides, there is too much uncertainty for an app developer to factor in. (Two years ago, I learnt about an app called Pukar, then operational in collaboration with police departments in four cities in India. Pukar solved the problem of potential inaccuracy of the GPS location by getting the user’s contacts to tell the police where the person in distress might be.) Designing a one-size-fits-all safety app is almost impossible. The app that rings a loud alarm when triggered may save someone’s life or spoil the chances of someone who is trying to get help while hiding. Different people may be vulnerable to different kinds of distress situations and an app can at best be optimised for some target user groups.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;An app that does not work in tandem with existing machinery for law enforcement and public safety is a bad idea.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;In the end, the “technical” problems may actually be problems of economic disparity. Making it mandatory for people to own phones equipped with certain hardware or requiring them to upgrade to more reliable devices would drive the phones out of the financial reach of many. Indian manufacturers have expressed concerns that the proposed &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/Panic-button-GPS-feasible-within-the-deadline-but-will-raise-costs/articleshow/51998103.cms"&gt;&lt;span style="text-decoration: underline;"&gt;panic button would raise costs for them as well the end buyers&lt;/span&gt;&lt;/a&gt;. Popularising a downloadable app and informing its target users how to install and work it correctly needs a marketing blitzkrieg, which is something only the state or well-funded developers can afford. The New Delhi police department runs a dedicated control room for reports arriving from its safety app, Himmat (the word for courage in many Indian languages). It’s an expensive affair.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An app that does not work in tandem with existing machinery for law enforcement and public safety is a bad idea. It puts the onus of “keeping women safe” on members of their social circles or on intermediaries and private parties such as cab companies, while absolving law enforcement agencies of their failing to provide security. It opens doors to victim blaming in case someone is unable to use the app at the right time in the right way, or if the app fails.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the contrary, an app that does loop in the police raises concerns about surveillance and protection of data available to the police, which is especially problematic in places such as India where there is no law for privacy or data protection. Alwar, one of the cities where Pukar was implemented, is super-populated with a large geographical area and a high crime rate. Police departments in such places tend to be overworked and understaffed. Without significant policing reforms, it is questionable whether they will be able to respond in time. A sting operation done by two media outlets on 30 senior officials of the New Delhi police department in 2012 showed the &lt;a href="http://www.ndtv.com/india-news/in-and-around-delhi-cops-blame-rapes-on-women-tehelka-investigation-with-ndtv-475442"&gt;&lt;span style="text-decoration: underline;"&gt;cops blaming victims of sexual violence with gay abandon&lt;/span&gt;&lt;/a&gt;. “If girls don't stay within their boundaries, if they don't wear appropriate clothes, then naturally there is attraction. This attraction makes men aggressive, prompting them to just do it [sexual assault]," reads one of their nuggets. “It's never easy for the victim [to complain to the police]. Everyone is scared of humiliation. Everyone's wary of media and society. In reality, the ones who complain are only those who have turned rape into a business," goes another. An app that lets known people monitor someone’s location also poses the risk of abuse, coercion and surveillance by intimate partners or members of the family.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, there is no app for reforming a morass in law enforcement or dismantling patriarchy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/gender-it-rohini-lakshane-may-19-2016-womens-safety-there-is-an-app-for-that'&gt;https://cis-india.org/internet-governance/blog/gender-it-rohini-lakshane-may-19-2016-womens-safety-there-is-an-app-for-that&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rohini</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-01-10T02:48:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/women-in-future-of-work.pdf">
    <title>Women in the Future of Work</title>
    <link>https://cis-india.org/internet-governance/women-in-future-of-work.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/women-in-future-of-work.pdf'&gt;https://cis-india.org/internet-governance/women-in-future-of-work.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Ambika Tandon and Aayush Rathi</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-02-22T01:41:32Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/wipo-broadcast-treaty-and-webcasting">
    <title>WIPO Broadcast Treaty and Webcasting</title>
    <link>https://cis-india.org/a2k/blogs/wipo-broadcast-treaty-and-webcasting</link>
    <description>
        &lt;b&gt;On Friday, 8 May 2009, at Shastri Bhavan, New Delhi, the Ministry of Information and Broadcasting held a stakeholders' briefing meeting on the Broadcast Treaty that has been on the table at the World Intellectual Property Organisation (WIPO).  The purpose of that meeting was to inform the relevant stakeholders of the developments in Geneva, as well as to garner input from them regarding the stance to be adopted by India at the WIPO.  Pranesh Prakash from the Centre for Internet and Society participated and made a presentation on webcasting, highlighting the differences between webcasting and broadcasting, and arguing that webcasting should not be part of the WIPO Broadcast Treaty.&lt;/b&gt;
        
&lt;p&gt;First, we wish to applaud the Ministry of Information and Broadcasting for holding this stakeholders' meeting, which is a definite step towards greater transparency, and are grateful for having been invited to provide our input.&amp;nbsp; The meeting was attended by representatives from various government offices and ministries, including the Ministry of Human Resource Development (which administers the Indian Copyright Act), broadcasters, broadcast associations, law firms, and civil society organisations.&amp;nbsp; The Secretary of the Ministry of Information and Broadcasting inaugurated the session by talking of how the Broadcast Treaty involved the assessment and balancing of various interests while keeping 'public interest' foremost.&amp;nbsp; This was followed by Mr. N. P. Nawani, Secretary General of the &lt;a class="external-link" href="http://www.ibf-india.com/about_home.htm"&gt;Indian Broadcasting Foundation&lt;/a&gt; (IBF), presenting on the concerns of the broadcasting industry. After this Prof. N. S. Gopalakrishnan, head of the School of Law, Cochin University of Science and Technology, spoke.&lt;br /&gt;&lt;br /&gt;Prof. Gopalakrishnan covered many areas of relevance: the concept of broadcasting and the legal rights involved; the scheme of legal protection over broadcast signals and over the content of the signals, and the difference between the two; gaps in the international law covering broadcasting; details of the proposed broadcast treaty; the implications of the broadcast treaty and concerns of the Indian government; and unresolved issues.&lt;br /&gt;&lt;br /&gt;Amongst the unresolved issues mentioned by Prof. Gopalakrishnan was that of webcasting and the problems related to that.&amp;nbsp; The discussion below aims to shed some light on some of the problems created by the inclusion of webcasting in the broadcast treaty.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h2&gt;Legal regimes for broadcasting&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;At the national level, the law governing broadcasting is the Indian Copyright Act, 1957.&amp;nbsp; Broadcasting is covered by many sections of the Indian Copyright Act, including: ss. 2(dd) (definition of "broadcast"), 2(ff) (definition of "communication to the public"), 37 (the section granting a special "broadcast reproduction right"), and 39A (containing exceptions to s.37).&amp;nbsp; At the international level, broadcasting is covered by the Rome Convention, 1960 (which India has signed, but hasn't ratified); the Brussels Convention, 1974 (only pre-broadcast satellite signals); the TRIPS Agreement, 1994 per Article 14 (which doesn't mandate that broadcasting rights be granted directly to the broadcasters); the WIPO Performances and Phonograms Treaty, 1996 (WPPT) in Articles 2(f) and 15; and the proposed WIPO Treaty on the Protection of Broadcasting Organizations ("Broadcast Treaty").&amp;nbsp; In May 2006, provisions for webcasting were brought back into the Broadcast Treaty as part of the non-mandatory Appendix after having been excised in 2004 owing to protests by many countries on their inclusion.&amp;nbsp; The current draft (SCCR/15/2 rev.) was prepared in September 2006 as an attempt to put together an all-inclusive document (with alternative versions of proposed provisions present in the document), and a diplomatic conference was planned to push the treaty through.&amp;nbsp; In August 2007, WIPO released a 'non-paper' (SCCR/S2/Paper1) and dropped plans for the diplomatic conference, as there was still significant disagreement about the treaty.&amp;nbsp; In November 2008, the WIPO chair released an informal paper (SCCR/17/INF/1), which advocated technological neutrality, and hence, presumably, that webcasting to be covered by the treaty.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h2&gt;Meaning of broadcasting and netcasting&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Broadcasting is generally taken to be a point-to-multipoint transmission of audio-visual content.&amp;nbsp; Hence, cable transmissions and Internet/Web transmissions (which are point-to-point) are usually not included when one uses the term "broadcasting".&amp;nbsp; But there is no one common definition of "broadcasting". As things stand in the WIPO Broadcast Treaty, the definition of broadcasting (Art. 5(a)) does not cover cablecasting, which is separately defined in Art. 5(b), neither does it cover webcasting.&amp;nbsp; However, the definition of "retransmission" as provided in the draft treaty is broad enough to cover Internet-based transmission, and hence could provide a backdoor via which webcasting is included.&amp;nbsp; The rights covered by the all-inclusive draft WIPO Broadcast Treaty include the rights of and over: retransmission; communication to the public; fixation; reproduction; distribution; transmission following fixation; making available of fixed broadcasts; and pre-broadcast signals.&amp;nbsp; The treaty also mandates legislative protection to systems of digital rights management (DRM) and technological protection measures (TPMs).&amp;nbsp; This, coupled with post-fixation rights, grants broadcasters the rights to dictate what one can and cannot do with a broadcast, thus negating all fair dealing rights and possibly restricting the public domain as well.&amp;nbsp; It may be noted that even content creators are not provided such rights in the vast majority of the world, and that fair dealing rights are much better safeguarded by copyright law.&amp;nbsp; The latest proposal by the U.S. on the term "netcasting" is to be found in an &lt;a class="external-link" href="http://www.wipo.int/edocs/mdocs/copyright/en/sccr_15/sccr_15_inf_2.doc"&gt;informal paper presented at SCCR 15&lt;/a&gt; [MS Word document], and has been &lt;a class="external-link" href="http://www.cptech.org/blogs/wipocastingtreaty/2006/09/how-restrictive-is-usptoloc-proposed.html"&gt;criticised as overly expansive&lt;/a&gt; by civil society organisations such as Consumer Project on Technology (now Knowledge Ecology International).&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h2&gt;Non-justifications for webcasting's inclusion&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Webcasting is sought to be included within the Broadcast Treaty for a number of reasons, all of which are problematic.&amp;nbsp; Firstly, there is the argument of technology neutrality, which advocates say is to ensure that the treaty is relevant into the future as well.&amp;nbsp; However, adopting technology neutrality as the basis for doing so amounts to wilful blindness to technological advancements, and the benefits that such advancement provides, including lowered costs of infrastructure.&amp;nbsp; Secondly, advocates argue that thanks to media convergence, the same content (which is usually digital) can be delivered through various communication networks.&amp;nbsp; This disregards the need to establish the requirement for a new right to be created, and simply assumes that just because the function that the two (broadcasters and webcasters) perform are similar means that they operate in similar economic and social environments.&amp;nbsp; In fact, webcasters work in a very different environment from broadcasters.&amp;nbsp; &lt;br /&gt;&lt;br /&gt;This is an environment where intense innovation and competition already exist, and don't need to be artificially created by means of a new property right in an international treaty.&amp;nbsp; Furthermore, the United States, a country with extremely large and hugely profitable broadcasting networks, does not have a specific statute to protect broadcasters’ rights.&amp;nbsp; Even it only has laws protecting the conditional-access regime.&amp;nbsp; Second, much less investment is required to reach a set number of people through webcasting than through broadcasting -- and these people can be spread throughout the globe.&amp;nbsp; Typically, a computer with a fast internet connection is all that is required.&amp;nbsp; Given this, anyone can become a 'broadcasting organisation'.&amp;nbsp; Additionally, IP addresses (in IPv6) are not limited, unless one considers 340 undecillion addresses to be 'limited'. This is a big difference from terrestrial broadcasting, where Hertzian frequencies are limited, and hence one has to pay a premium for them.&amp;nbsp; Lastly, signal appropriation does not happen for sake of the signal, but for the content.&amp;nbsp; Protection, thus has to be given to the content (and already is given, in the form of copyright law).&amp;nbsp; Copyright owners who object to such appropriation, and who are often large multinational corporations, have proven more than willing to pursue those who appropriate their works – broadcasters are not necessarily in a better position to do so.&amp;nbsp; This situation is aggravated with webcasting.&amp;nbsp; Indeed, on the Web, something akin signal appropriation is not only not frowned upon, but often encouraged: embedding of audio and video from other servers on your own website is prevalent.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h2&gt;Problems if webcasting is included&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Apart from the lack of justifications for going ahead with the treaty, especially when it seeks to create a separate property right over signals instead of merely providing for signal protection and includes webcasting (at least upon 'retransmission'), there are many problems that the treaty creates.&amp;nbsp; Firstly, transaction costs will increase vastly, leading to a tragedy of the anticommons where no one ends up using the content because clearing all the surrounding rights is too difficult.&amp;nbsp; On top of clearing and making payment for rights from the copyright holders, a person wishing to use parts of any content that has been broadcast/webcast would have to get the rights cleared from the first broadcaster/webcaster as well.&amp;nbsp; This is inevitable if property-like rights are bestowed upon the act of distributing signal in the form of a broadcast or hosting audio and visual content for webcasting.&lt;br /&gt;&lt;br /&gt;Secondly, materials in the public domain and openly-licensed content will become more difficult to gain access to, and the exercise of fair dealings with copyrighted content will be hampered.&amp;nbsp; Since rights over signal are independent of rights over content, a copy of the public-domain work will have to be procured from an archive, which negates the very purpose of broadcasting and webcasting, which is to make content more easily accessible to a large number of people located over great distances.&amp;nbsp; Additionally, limitations and exceptions are extremely difficult to negotiate and are of the 'ceiling' kind, limiting the limitations and exceptions that national legislatures can prescribe.&amp;nbsp; Thus, the fair dealing rights over the signal will probably end up being more limited than the fair dealing rights over content.&amp;nbsp; This makes the situation akin to anti-circumvention measures, which (in countries where they are legally recognised) have fewer limitations and exceptions than the content they protect.&lt;br /&gt;&lt;br /&gt;Thirdly, public benefit and access will seriously be harmed.&amp;nbsp; It is conceivable that this treaty might hamper the Indian legislature's ability to pass statutes such as the Sports Broadcasting Signals (Mandatory Sharing with Prasar Bharati) Act, 2007, which mandate sharing of certain kinds of signals.&amp;nbsp; Lawyers will claim that such statutes go against India's international obligations.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h2&gt;Differences between webcasting and broadcasting&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;To sum up, there are a large number of differences between broadcasting and webcasting.&lt;br /&gt;&lt;strong&gt;Infrastructure&lt;/strong&gt;: The expenditure required to establish the infrastructure for a webcasting unit is much less than that required for an equivalent (in terms of reach in terms of listeners).&amp;nbsp; Even traditional broadcasting is not that expensive: fixed-frequency radio transmission kits have been known to cost as little as Rs. 50 (&amp;lt;http://news.bbc.co.uk/2/hi/south_asia/4735642.stm&amp;gt;.&amp;nbsp; Thus, one of the biggest arguments for protection ('to recover investment') is taken away.&amp;nbsp; The content producers' 'investment' is protected by copyright law.&lt;br /&gt;&lt;strong&gt;Competition&lt;/strong&gt;: Providing incentives to increase competition and hence public benefit is often a reason cited as a reason for introduction of a new property-like right.&amp;nbsp; However, such incentives seem utterly redundant in the online market where becoming a webcasting organisation is trivial, and immense competition already exists.&lt;br /&gt;&lt;strong&gt;Broadcasting vs. Uni- and Multicasting&lt;/strong&gt;: The notion of 'broadcasting' does not exist in IPv6.&amp;nbsp; The closest that a webcaster can come to broadcasting is 'multicasting' to a specific range of IP addresses.&amp;nbsp; What one sees on the Web today is "unicasting", which is initiated by a request from the recipient and not by the webcaster.&lt;br /&gt;&lt;strong&gt;Temporal limitations&lt;/strong&gt;: Unlike traditional broadcasting (which does not include cable), content on demand is possible over the Web.&amp;nbsp; By this, the temporal limitations faced by traditional broadcasting, which is ephemeral, are overcome.&amp;nbsp; This opens up many possibilities that should not be hampered by creating an excessive legal regime (and that too a property regime) over webcasting.&lt;br /&gt;&lt;strong&gt;Geographic limitations&lt;/strong&gt;: While terrestrial broadcasting is limited in geographic scope (which satellite and cable-casting are less susceptible to), webcasting knows no geographic limitations.&amp;nbsp; As long as an Internet connection is present, the content can be viewed anywhere.&amp;nbsp; Additionally, granting a separate webcasting right will open up a jurisdicational can of worms.&lt;br /&gt;&lt;strong&gt;Marginal costs of subscribers&lt;/strong&gt;: While in terrestrial broadcasting, adding an additional receiver does not cost the broadcaster anything, in satellite television (direct-to-home), cable television and webcasting, each additional receiver means either additional infrastructure (cables and set-top boxes) or additional server load.&amp;nbsp; In the case of webcasting, this marginal cost is small enough to ignore, especially given all the other reasons mentioned previously.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;There are still a number of uncertainties surrounding the inclusion of webcasting in the Broadcast Treaty.&amp;nbsp; Michael Nelson of the Internet Society points out that questions such as who the broadcaster is in a download grid, in distributed gaming, for webcasts of surveillance videos, etc., are unanswered.&amp;nbsp; As the example of the download grid (a situation where the 'casting' is multipoint-to-point) shows, many Internet-specific scenarios have not been contemplated by the treaty negotiators.&amp;nbsp; Situations which might soon be reality, such as peer-to-peer relaying of webcasts are also not contemplated, and the treaty would become a policy document preventing such technological innovations.&amp;nbsp; Whether IPTV would be included within webcasting is also unclear. The WIPO chair in his informal paper noted, 'Finally, if after consideration of the options above (A/B) and possible other options, it will not in the present situation be possible to decide on the establishment of a new treaty, the SCCR should end these discussions through an express decision in order to avoid further spending of time, energy and resources to no avail. Such a decision could include a timetable for later revisiting and reconsidering the matter.' (SCCR/15/2 rev)&amp;nbsp; SCCR should end these discussions which have gone on for more than a decade without any progress.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/wipo-broadcast-treaty-and-webcasting'&gt;https://cis-india.org/a2k/blogs/wipo-broadcast-treaty-and-webcasting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Broadcasting</dc:subject>
    
    
        <dc:subject>WIPO</dc:subject>
    

   <dc:date>2011-08-04T04:42:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection">
    <title>Winter School on Privacy, Surveillance and Data Protection </title>
    <link>https://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection</link>
    <description>
        &lt;b&gt;The   Centre   for   Communication   Governance   (CCG)   in   collaboration   with   the  UNESCO  Chair  on  Freedom  of  Communication  and  Information at  the  University  of  Hamburg  and  the  Hans   Bredow   conducted a week-long winter school on 'Privacy, Surveillance and Data Protection at National Law University, Delhi, from January 19 to 23, 2015.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The winter school focused on the law governing privacy in the EU and in India and covered issues ranging from surveillance to data protection. German and Indian members of faculty used interactive methods of teaching and group activities in each session, to help students from Germany, India and Israel contribute to the classroom and learn from each other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhairav Acharya was a speaker at the event. He spoke on 'privacy theory'. More &lt;a class="external-link" href="http://www.nludelhi.ac.in/wp-content/uploads/CCG-at-NLUD-Call-for-Delhi-Winter-School.pdf"&gt;information here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection'&gt;https://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-02-07T00:37:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture">
    <title>Will You be Paid to Post a Picture?</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture</link>
    <description>
        &lt;b&gt;The wave of free information production on the web is on the wane.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/india/india-others/will-you-be-paid-to-post-a-picture/99/"&gt;published in the Indian Express&lt;/a&gt; on February 18, 2014&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The age of volunteerism is officially over. The last decade of the mass adoption of the internet has been fuelled by endless human hours being spent in producing information which is the new currency of our times. The big transition to Web 2.0 began when the individual “user” became more than either an individual or the user. The individual found herself as a part of a collective, finding a voice and a community of others to belong to. Simultaneously, instead of being a passive consumer of the web, the user started producing data — blogs, videos, tweets, content management systems, online discussion boards, massively multiple online role-playing platforms, social network transactions — all of which became a part of the new Web’s widespread popularity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Almost everything that we understand as the social web today is contingent upon people producing data in their interactions with the world around them. From knowledge producing websites like Wikipedia to entertainment platforms like YouTube, visualisation and data gathering spaces like Pinterest to photographs of self, food and cute animals on Instagram, political and social commentaries on Tumblr to Listicles and memes on Buzzfeed, the internet is a veritable smorgasbord of new information forms, formats and functions that are generated by the users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What is possibly the most exciting about this burgeoning information universe has been the amount of free labour that goes into it, and often remains invisible. As digital labour scholar Trebor Schulz points out, the internet has become both a factory and a playground, where our leisure time is capitalised into producing work that sustains the new attention and information economies. For instance, the world’s largest social networking site, Facebook, does not produce any of its contents. It is, in fact, a system of information mining and sorting, which works as long as a growing user base continues to produce information on it. Tomorrow, if all of us stop producing Facebook, and only lurk on it, the platform will collapse. Which is why, Facebook continues to acquire new platforms and applications to be integrated into its universe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the real effort that goes into the sustenance of sites like Wikipedia, which has become the de facto reference for global knowledge systems, is carried out by unsung and invisible editors who patiently, meticulously, and without almost any expectation, continue to add, verify, strengthen and curate reliable information that we can use. When the non-profit organisation WikiMedia Foundation prides itself in running one of the least expensive websites in the top 10 most visited sites in the world, it is signalling its deep appreciation for the countless human hours that have made Wikipedia possible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, in recent years, there is noticeable stagnation in the wave of free information production on the Web. Oh, don’t get me wrong. We are producing an unprecedented amount of data — we are constantly being watched by surveillance technologies that detect biometric and genetic make-up of all our transactions, or we are inviting people to watch us on social network sites where we reveal some of our deepest secrets and desires, or we are watching ourselves, quantifying everything from things we ate to the number of hours we sleep. And yet, as we live in a world of Big Data, there is a definite decrease in people contributing to production of free information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the digital natives move from the web to mobile phones, traditional websites are already facing a crisis. News and media agencies that have celebrated the global citizen media networks have started realising that the individual user is more interested in local networks and information ecologies which are independent of mainstream conglomerates. And people are realising that their time and effort is worth money. They can be easily compensated for their online activities and gain reputation and importance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The tension only becomes more palpable when people start realising that there are others who are being paid to work on the platforms that they are contributing to. We all knew that this model of depending on free information was not a sustainable one. But it seems the day has arrived, especially with the recent drives on Wikipedia to build specialised knowledge editors. In the last few months, we have seen people in the FemTechNet project — an academic activist feminist project that seeks to remind us of the intersections of feminism and technology in network societies — carry out “Wikistorming”, where students are adding pages of women’s contribution to technologies on Wikipedia. More recently, medicine students at University of Chicago have taken to correcting and adding accurate information to Wikipedia, which is often a source of health information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both of these are fantastic efforts to add to the platform that was the underdog that overthrew the mammoth encyclopaedia like The Encyclopaedia Britannica. We hope more specialised users in different locations, fields, disciplines and languages continue to edit and contribute to Wikipedia. However, it is also a signal that the generalist information producer is on the decline. We are transitioning into a new age, where people are going to need rewards, incentives and benefits for performing information transactions on the web. The user is no longer going to be available for free labour, and it is time we started thinking of “paid usership”.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture'&gt;https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-03-06T11:58:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/new-indian-express-march-14-2016-will-only-legal-backing-for-aadhaar-suffice">
    <title>Will Only Legal Backing For Aadhaar Suffice? </title>
    <link>https://cis-india.org/internet-governance/new-indian-express-march-14-2016-will-only-legal-backing-for-aadhaar-suffice</link>
    <description>
        &lt;b&gt;Aadhaar is set to become mandatory, but the opponents of the scheme are not amused. Concerns about privacy of the Aadhaar number and the authenticity of the biometric data being collected have been expressed by people right from the beginning. But the government has not done much to address these issues.&lt;/b&gt;
        &lt;p&gt;The article was published in &lt;a class="external-link" href="http://www.newindianexpress.com/nation/Will-Only-Legal-Backing-For-Aadhaar-Suffice/2016/03/14/article3326144.ece"&gt;New Indian Express &lt;/a&gt;on March 14, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“It does not matter what legislative backing they give it, it is still a surveillance programme. How can you have a privacy Bill for a surveillance programme? Legislative backing would be band-aid. I do not agree with it,” says Sunil Abraham, Executive Director of The Centre for Internet and Society. The society is a Bengaluru-based organisation looking at multi-disciplinary research and advocacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham says that ever since the Aadhaar scheme was implemented, there was a massive degradation of civil liberties. “It is an opaque technology. Why should the government have such a database?” he asks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Aadhaar1.jpg" alt="Aadhaar" class="image-inline" title="Aadhaar" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham says that the keys to the data should not have rested with the government where it is vulnerable. Instead, the government should have explored the concept of introducing smart cards issued to the citizen with the data stored on it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Access to this data could not be had without the permission of the citizen, he says. At present, if something goes wrong or if the data is compromised, the government can always blame a lapse in technology, Abraham adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He questions the government’s logic where it assumes that only the poor section of society can misuse the benefits and says that it is well known that the problem exists in the supply chain and that the government has done nothing to address this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mathew Thomas of The Fifth Estate, an NGO, wonders what advantage the BJP suddenly found that they decided to pursue Aadhaar rather than send it to the trash bin as they had promised before the general elections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thomas says Aadhaar is flawed and is a fraud on the Constitution and the government has taken the money bill route simply to avoid a debate on it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Just passing a Bill is meaningless. This is radically wrong and we all know that protection of privacy is nonsense. How do they plan to plug the leakages? Have they even conducted a study, because there is no evidence of it. The correct beneficiary can get an LPG cylinder, but what is stopping the person from using it for an auto or for his car? That the government can lie to its own people is terrible,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A five-judge bench of the Supreme Court, which is hearing the matter on privacy concerns about Aadhaar, is expected to have a hearing by the end of this month.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/new-indian-express-march-14-2016-will-only-legal-backing-for-aadhaar-suffice'&gt;https://cis-india.org/internet-governance/new-indian-express-march-14-2016-will-only-legal-backing-for-aadhaar-suffice&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-16T02:31:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-quint-march-31-2016-nehaa-chaudhari-will-aadhaar-act-address-indias-dire-need-for-a-privacy-law">
    <title>Will Aadhaar Act Address India’s Dire Need For a Privacy Law?</title>
    <link>https://cis-india.org/internet-governance/blog/the-quint-march-31-2016-nehaa-chaudhari-will-aadhaar-act-address-indias-dire-need-for-a-privacy-law</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p&gt;The article was published by &lt;a class="external-link" href="http://www.thequint.com/opinion/2016/03/30/will-aadhaar-act-address-indias-dire-need-for-a-privacy-law"&gt;Quint &lt;/a&gt;on March 31, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Snapshot.jpg" alt="Snapshot" class="image-inline" title="Snapshot" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The passage of the &lt;i&gt;Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016&lt;/i&gt; (will hereby be referred to as “the Act”) has led to flak for the government from &lt;a href="http://cis-india.org/internet-governance/blog/aadhaar-bill-fails-to-incorporate-suggestions-by-the-standing-committee" rel="external"&gt;&lt;span&gt;privacy advocates&lt;/span&gt;&lt;/a&gt;, academia and &lt;a href="http://cis-india.org/internet-governance/blog/list-of-recommendations-on-the-aadhaar-bill-2016" rel="external"&gt;&lt;span&gt;civil society&lt;/span&gt;&lt;/a&gt;, to name a few.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To my mind, the opposition deserves its fair share of criticism (lacking so far), for its absolute failure to engage with and act as a check on the government in the passage of the Act, and the events leading up to it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government’s introduction of the Act as a ‘money bill’ under Article 110 of the &lt;a href="http://indiacode.nic.in/coiweb/welcome.html" rel="external"&gt;&lt;span&gt;Constitution of India&lt;/span&gt;&lt;/a&gt; (“this/the Article”) is a mockery of the constitutional process. It renders redundant, the role of the Rajya Sabha as a check on the functioning of the Lower House.&lt;/p&gt;
&lt;blockquote class="quoted"&gt;Article 110 limits a ‘money bill’ only to six specific instances: covering tax, the government’s financial obligations and, receipts and payments to and from the Consolidated Fund of India, and, connected matters.&lt;/blockquote&gt;
&lt;p&gt;The Act lies well outside the confines of the Article; the government’s action may attract the attention of the courts.&lt;/p&gt;
&lt;h2&gt;Political One-Upmanship&lt;/h2&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Arun.jpg/@@images/93b5fc12-dc62-419d-8ef1-e0b188a12db9.jpeg" alt="Arun Jaitely" class="image-inline" title="Arun Jaitely" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Finance Minister Arun Jaitley (left) listens to Reserve Bank of India (RBI) Governor Raghuram Rajan. (Photo: Reuters)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;In the past, the Supreme Court (“the Court”) has stepped into the domain of the Parliament or the Executive when there was a complete and utter disregard for India’s constitutional scheme. In recent constitutional history, this is perhaps most noticeable in the anti-defection cases, (beginning with Kihoto Hollohan in 1992); and, in the SR Bommai case in 1994, on the imposition of the President’s rule in states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In hindsight, although India has benefited from the Court’s action in the &lt;i&gt;Bommai &lt;/i&gt;and &lt;i&gt;Hollohan &lt;/i&gt;cases, it is unlikely that the passage of the Aadhaar Act as a ‘money bill’, reprehensible as it is, meets the threshold required for the Court’s intervention in Parliamentary procedure.&lt;/p&gt;
&lt;p&gt;Besides, the manner of its passage, the Act warrants&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Censure for its &lt;a href="http://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process" rel="external"&gt;&lt;span&gt;process&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Its (in)&lt;a href="http://www.thehindu.com/opinion/lead/lead-article-on-aadhaar-bill-by-chinmayi-arun-privacy-is-a-fundamental-right/article8366413.ece" rel="external"&gt;&lt;span&gt;compatibility with fundamental rights&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The&lt;a href="http://thewire.in/2016/03/10/aadhaar-bill-fails-to-incorporate-standing-committees-suggestions-24433/" rel="external"&gt;&lt;span&gt; failure to incorporate the suggestions&lt;/span&gt;&lt;/a&gt; of the Yashwant Sinha-led Standing Committee to UPA’s NIDAI Bill&lt;/li&gt;
&lt;li&gt;The &lt;a href="http://economictimes.indiatimes.com/news/politics-and-nation/aadhaar-more-intrusive-than-us-surveillance-exposed-by-snowden-say-privacy-advocates/articleshow/51425678.cms" rel="external"&gt;&lt;span&gt;possibility of surveillance&lt;/span&gt;&lt;/a&gt; that it presents&lt;/li&gt;
&lt;li&gt;The lack of measures to protect personal information&lt;/li&gt;
&lt;li&gt;Its inadequate privacy safeguards&lt;/li&gt;
&lt;li&gt;The  &lt;a href="http://www.business-standard.com/article/economy-policy/aadhaar-linked-lpg-govt-says-rs-15-000-cr-saved-survey-says-only-rs-14-cr-in-fy15-116031800039_1.html" rel="external"&gt;&lt;span&gt;questions&lt;/span&gt;&lt;/a&gt; around the realisation of its &lt;a href="http://www.business-standard.com/article/economy-policy/aadhaar-enabled-e-kyc-can-save-rs-10-000-cr-over-next-5-yrs-survey-116031800760_1.html" rel="external"&gt;&lt;span&gt;stated purpose&lt;/span&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Instead, a part of the Aadhaar debate has involved political one-upmanship between the Congress and the BJP, &lt;a href="http://www.businesstoday.in/current/policy/nda-aadhaar-is-a-far-cry-from-what-upa-proposed/story/230403.html" rel="external"&gt;&lt;span&gt;pitting the former’s NIDAI Bill against the latter’s Aadhaar Act&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;While an academic &lt;a href="http://cis-india.org/internet-governance/blog/a-comparison-of-the-2016-aadhaar-bill-and-the-2010-nidai-bill" rel="external"&gt;&lt;span&gt;comparison &lt;/span&gt;&lt;/a&gt;between the two is welcome, its use as a tool for political supremacy would be laughable, were it not deeply problematic, given the many serious concerns highlighted above.&lt;/p&gt;
&lt;h2&gt;Better Than UPA Bill?&lt;/h2&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_PrivacyLaw.jpg/@@images/ce543cf9-a4aa-4bcd-8483-98e0c3a58148.jpeg" alt="Privacy" class="image-inline" title="Privacy" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center; "&gt;The Act may have more privacy safeguards than the earlier UPA Bill. (Photo: iStockphoto)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;div&gt;
&lt;p&gt;And while the Act may have more privacy safeguards than the earlier UPA Bill, &lt;a href="http://economictimes.indiatimes.com/news/politics-and-nation/aadhaar-more-intrusive-than-us-surveillance-exposed-by-snowden-say-privacy-advocates/articleshow/51425678.cms" rel="external"&gt;&lt;span&gt;critics have argued&lt;/span&gt;&lt;/a&gt; that they not up to the international standard, and instead, that they are plagued by opacity.&lt;/p&gt;
&lt;p&gt;Additionally, despite claims that the Act is a &lt;a href="http://scroll.in/article/805348/corex-correction-the-real-problem-with-the-recent-ban-of-344-drugs-in-india" rel="external"&gt;&lt;span&gt;significant improvement over the UPA Bill&lt;/span&gt;&lt;/a&gt;, it fails to address concerns, including around the centralised storage of information, that were&lt;a href="http://www.livemint.com/Politics/l0H1RQZEM8EmPlRFwRc26H/Govt-narrative-on-Aadhaar-has-not-changed-in-the-last-six-ye.html" rel="external"&gt;&lt;span&gt; raised by civil society members&lt;/span&gt;&lt;/a&gt; and others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Perhaps most problematically, however, the Act takes away an individual’s control of her own information. Subsidies, government benefits and services are linked to the mandatory possession of an Aadhar number (Section 7 of the Act), effectively &lt;a href="http://www.firstpost.com/india/no-aadhaar-for-invading-privacy-uid-is-mandatory-even-though-govt-wants-you-to-believe-its-not-2681214.html" rel="external"&gt;&lt;span&gt;negating the ‘freedom’ &lt;/span&gt;&lt;/a&gt;of voluntary enrollment (Section 3 of the Act). This directly contradicts the recommendations of the Justice AP Shah Committee, before whom the Unique Identification Authority of India &lt;a href="http://scroll.in/article/804922/seven-reasons-why-parliament-should-debate-the-aadhaar-bill-and-not-pass-it-in-a-rush" rel="external"&gt;&lt;span&gt;had earlier stated that &lt;/span&gt;&lt;/a&gt;enrollment in Aadhaar was voluntary.&lt;/p&gt;
&lt;p&gt;To make matters worse, the individual does not have the authority to correct, modify or alter her information; this lies, instead, with the UIDAI alone (Section 31 of the Act). And the sharing of such personal information does not require a court order in all cases.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Students.jpg/@@images/af2356b9-df1f-45b9-8a7b-8fb3321769f7.jpeg" alt="Students" class="image-inline" title="Students" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center; "&gt;Kanhaiya Kumar speaking in JNU on 3 March 2016. (Photo: PTI)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;p&gt; &lt;/p&gt;
&lt;div&gt;It may be authorised by Executive authorities under the vague, ill-understood concept of ‘national security’, (Section 33(2) of the Act) which the Act does not define. We would do well to learn the dangers of leaving ‘national security’ open to interpretation, in the aftermath of the recent events at JNU.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;These recent events around Aadhaar have only underscored the dire urgency for comprehensive privacy legislation in India and, the need to overhaul our data protection laws to meet our constitutional commitments along with international standards.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;Meanwhile, constitutional challenges to the Aadhaar scheme are currently pending in the Supreme Court. The Court’s verdict may well decide the future of the Aadhaar Act, with the stage already set for a constitutional challenge to the legislation. The BJP’s victory in this case may be short-lived.&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-quint-march-31-2016-nehaa-chaudhari-will-aadhaar-act-address-indias-dire-need-for-a-privacy-law'&gt;https://cis-india.org/internet-governance/blog/the-quint-march-31-2016-nehaa-chaudhari-will-aadhaar-act-address-indias-dire-need-for-a-privacy-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nehaa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-04-05T16:01:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
