<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 201 to 215.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/submission-to-un-high-level-panel-on-digital-cooperation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/jessica-corbett-common-dreams-february-5-2019-civil-liberties-groups-warn-proposed-eu-terrorist-content-rule-threat-democratic"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/zack-whittaker-natasha-lomas-february-15-2019-tech-crunch-even-years-later-twitter-doesnt-delete-your-direct-messages"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/data-infrastructures-inequities-reproductive-health-surveillance-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/Intermediary%20Liability%20Rules%202018.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/submission-to-un-high-level-panel-on-digital-co-operation.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/news/first-post-partha-p-chakrabartty-february-2-2019-dissent-on-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/marathi-wikipedia-workshop-1lib1ref-session-at-goa-university"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/january-19-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/news/wired-january-22-2019-google-wikipedia-machine-learning-glow-languages"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/response-to-gcsc-on-request-for-consultation-norm-package-singapore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/irc19-list-conference-programme"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/files/submission-to-un-high-level-panel-on-digital-cooperation">
    <title>Submission to UN High Level Panel on Digital Cooperation</title>
    <link>https://cis-india.org/internet-governance/files/submission-to-un-high-level-panel-on-digital-cooperation</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/submission-to-un-high-level-panel-on-digital-cooperation'&gt;https://cis-india.org/internet-governance/files/submission-to-un-high-level-panel-on-digital-cooperation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-02-19T00:55:04Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/jessica-corbett-common-dreams-february-5-2019-civil-liberties-groups-warn-proposed-eu-terrorist-content-rule-threat-democratic">
    <title>Civil Liberties Groups Warn Proposed EU 'Terrorist Content' Rule a Threat to Democratic Values</title>
    <link>https://cis-india.org/internet-governance/news/jessica-corbett-common-dreams-february-5-2019-civil-liberties-groups-warn-proposed-eu-terrorist-content-rule-threat-democratic</link>
    <description>
        &lt;b&gt;Requiring filtering tools would be "a gamble with European Internet users' rights to privacy and data protection, freedom of expression and information, and non-discrimination and equality before the law."&lt;/b&gt;
        &lt;p&gt;The blog post by Jessica Corbett was published by &lt;a class="external-link" href="https://www.commondreams.org/news/2019/02/05/civil-liberties-groups-warn-proposed-eu-terrorist-content-rule-threat-democratic"&gt;Common Dreams&lt;/a&gt; on February 5, 2019. Centre for Internet &amp;amp; Society was a signatory.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Dozens of human rights groups and academics have signed on to an &lt;a href="https://cdt.org/files/2019/02/Civil-Society-Letter-to-European-Parliament-on-Terrorism-Database.pdf"&gt;open letter&lt;/a&gt; (pdf) raising alarm about the European Union's proposed &lt;a href="https://edri.org/terrorist-content-regulation-document-pool/"&gt;Regulation on Preventing the Dissemination of Terrorist Content Online&lt;/a&gt;,  warning that its call for Internet hosts to employ "proactive measures"  to censor such content "will almost certainly lead platforms to adopt  poorly understood tools" at the expense of democratic values across the  globe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of those tools is the Hash Database developed by Facebook,  YouTube, Microsoft, and Twitter. The 13 companies that use the  database—which supposedly contains 80,000 images and videos—can  automatically filter out material deemed "extreme" terrorist content.  However, as the letter explains, "almost nothing is publicly known about  the specific content that platforms block using the database, or about  companies' internal processes or error rates, and there is insufficient  clarity around the participating companies' definitions of 'terrorist  content.'"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Countering terrorist violence is a shared priority, and our point is  not to question the good intentions of the database operators. But  lawmakers and the public have no meaningful information about how well  the database or any other existing filtering tool serves this goal, and  at what cost to democratic values and individual human rights," notes  the letter, whose signatories include the American Civil Liberties Union  (ACLU), the Brennan Center for Justice, the Electronic Frontier  Foundation (EFF), and the European Digital Rights (EDRi).&lt;/p&gt;
&lt;p&gt;As an EDRi &lt;a href="https://edri.org/open-letter-on-the-terrorism-database/"&gt;statement&lt;/a&gt; outlines, among the groups' main concerns are the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Lack of transparency of how the database works, and its  effectiveness, proportionality, and appropriateness to achieve the goals  the Terrorist Content Regulation aims to achieve;&lt;/li&gt;
&lt;li&gt;How filters are unable to understand the context and therefore they are error-prone; and&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Regardless of the possibility of filters to be accurate in the  future, the pervasive online monitoring on disadvantaged and  marginalized individuals.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Given the uncertainties over the effectiveness and societal  costs of such tools, the letter charges that "requiring all platforms to  use black-box tools like the database would be a gamble with European  Internet users' rights to privacy and data protection, freedom of  expression and information, and non-discrimination and equality before  the law."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With those fundamental rights under threat, the groups are calling on  members of the European Parliament "to reject proactive filtering  obligations; provide sound, peer-reviewed research data supporting  policy recommendations and legal mandates around counter-terrorism; and  refrain from enacting laws that will drive Internet platforms to adopt  untested and poorly understood technologies to restrict online  expression."&lt;/p&gt;
&lt;p&gt;Read the full letter:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;i&gt;Dear Members of the European Parliament,&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The undersigned organizations write to share our concerns about  the EU’s proposed Regulation on Preventing the Dissemination of  Terrorist Content Online, and in particular the Regulation’s call for  Internet hosts to use “proactive measures” to detect terrorist content.  We are concerned that if this Regulation is adopted, it will almost  certainly lead platforms to adopt poorly understood tools, such as the  Hash Database referenced in the Explanatory Memorandum to the Regulation  and currently overseen by the Global Internet Forum to Counter  Terrorism. Countering terrorist violence is a shared priority, and our  point is not to question the good intentions of the Database operators.  But lawmakers and the public have no meaningful information about how  well the Database or any other existing filtering tool serves this goal,  and at what cost to democratic values and individual human rights. We  urge you to reject proactive filtering obligations; provide sound,  peer-reviewed research data supporting policy recommendations and legal  mandates around counter-terrorism; and refrain from enacting laws that  will drive Internet platforms to adopt untested and poorly understood  technologies to restrict online expression.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The Database was initially developed by Facebook, YouTube,  Microsoft, and Twitter as a voluntary measure, and announced to the  public in 2016. It contains digital hash “fingerprints” of images  and4videos that platforms have identified as “extreme” terrorist  material, based not on the law but on their own Community Guidelines or  Terms of Service. The platforms can use automated filtering tools to  identify and remove duplicates of the hashed images or videos. As of  2018, the Database was said to contain hashes representing over 80,000  images or videos. At least thirteen companies now use the Database, and  some seventy companies have reportedly discussed adopting it.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Almost nothing is publicly known about the specific content that  platforms block using the Database, or about companies’ internal  processes or error rates, and there is insufficient clarity around the  participating companies’ definitions of “terrorist content.”  Furthermore, there are no reports about how many legal processes or  investigations were opened after the content was blocked. This data  would be crucial to understand to what extent the measures are effective  and necessary in a democratic society, which are some of the sine qua  non requisites for restrictions of fundamental rights. We do know,  however, of conspicuous problems that seemingly result from content  filtering gone awry. The Syrian Archive, a civil society organization  preserving evidence of human rights abuses in Syria, for example,  reports that YouTube deleted over 100,000 of its videos. Videos and  other content which may be used in one context to advocate terrorist  violence may be essential elsewhere for news reporting, combating  terrorist recruitment online, or scholarship. Technical filters are  blind to these contextual differences. As three United Nations special  rapporteurs noted in a December 2018 letter, this problem raises serious  concerns about free expression rights under the proposed Regulation. It  is far from clear whether major platforms like YouTube or Facebook  adequately correct for this through employees’ review of filtering  decisions—and it seems highly unlikely that smaller platforms could even  attempt to do so, if required to use the Database or other filtering  tools.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Failures of this sort seriously threaten Internet users’ rights  to seek and impart information. The pervasive monitoring that platforms  carry out in order to filter users’ communications also threatens  privacy and data protection rights. Moreover, these harms do not appear  to be equally distributed, but instead disproportionately disadvantage  individual Internet users based on their ethnic background, religion,  language, or location—in other words, harms fall on users who might  already be marginalized. More extensive use of the Database and other  automated filtering tools will amplify the risk of harms to users whose  messages and communications about matters of urgent public concern may  be wrongly removed by platforms. The United Nations Special Rapporteur  on the promotion and protection of human rights and fundamental freedoms  while countering terrorism has expressed concern about this lack of  clarity, and said that Facebook’s rules for classifying organizations as  terrorist are “at odds with international humanitarian law”.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Due to the opacity of the Database’s operations, it is impossible  to assess the consequences of its nearly two years of operation. The  European public is being asked to rely on claims by platforms or vendors  about the efficacy of the Database and similar tools—or else to assume  that any current problems will be solved by hypothetical future  technologies or untested, post-removal appeal mechanisms. Such  optimistic assumptions cannot be justified given the serious problems  researchers have found with the few filtering tools available for  independent review. Requiring all platforms to use black-box tools like  the Database would be a gamble with European Internet users’ rights to  privacy and data protection, freedom of expression and information, and  non-discrimination and equality before the law. That gamble is neither  necessary nor proportionate as an exercise of state power.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;EU institutions’ embrace of the database and other filtering  tools will also have serious consequences for Internet users all over  the world, including in countries where various of the undersigned  organizations work to protect human rights. For one thing, when  platforms filter a video or image in response to a European authority’s  request, it will likely disappear for users everywhere—even if it is  part of critical news reporting or political discourse in other parts of  the world. For another, encoding proactive measures to filter and  remove content in an EU regulation gives authoritarian and  authoritarian-leaning regimes the cover they need to justify their own  vaguely worded and arbitrarily applied anti-terrorism legislation.  Platforms that have already developed content filtering capabilities in  order to comply with EU laws will find it difficult to resist demands to  use them in other regions and under other laws, to the detriment of  vulnerable Internet users around the globe. Your decisions in this area  will have global consequences.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Signatories:&lt;/i&gt;&lt;br /&gt;&lt;i&gt; Access Now; Africa Freedom of  Information Centre; Agustina Del Campo, in an individual capacity  (Center for Studies on Freedom of Expression CELE); American Civil  Liberties Union (ACLU); ApTI Romania; Article 19; Bits of Freedom;  Brennan Center for Justice; Catalina Botero Marino, in an individual  capacity (Former Special Rapporteur of Freedom of Expression of the  Organization of American States; Center for Democracy &amp;amp; Technology  (CDT); Centre for Internet and Society; Chinmayi Arun, in an individual  capacity; Damian Loreti, in an individual capacity; Daphne Keller, in an  individual capacity (Stanford CIS); Derechos Digitales · América  Latina; Digital Rights Watch; Electronic Frontier Finland; Electronic  Frontier Foundation (EFF); Electronic Frontier Norway; Elena  Sherstoboeva, in an individual capacity (Higher School of Economics);  European Digital Rights (EDRi); Hermes Center; Hiperderecho; Homo  Digitalis; IT-Pol; Joan Barata, in an individual capacity (Stanford  CIS); Krisztina Rozgonyi, in an individual capacity (University of  Vienna); Open Rights Group; Open Technology Institute at New America;  Ossigeno; Pacific Islands News Association (PINA); People Over Politics;  Prostasia Foundation; R3D: Red en Defensa de los Derechos Digitales;  Sarah T. Roberts, Ph.D., in an individual capacity; Southeast Asian  Press Alliance; Social Media Exchange (SMEX), Lebanon; WITNESS; and  Xnet.&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/jessica-corbett-common-dreams-february-5-2019-civil-liberties-groups-warn-proposed-eu-terrorist-content-rule-threat-democratic'&gt;https://cis-india.org/internet-governance/news/jessica-corbett-common-dreams-february-5-2019-civil-liberties-groups-warn-proposed-eu-terrorist-content-rule-threat-democratic&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-19T00:49:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/zack-whittaker-natasha-lomas-february-15-2019-tech-crunch-even-years-later-twitter-doesnt-delete-your-direct-messages">
    <title>Even years later, Twitter doesn't delete your direct messages</title>
    <link>https://cis-india.org/internet-governance/news/zack-whittaker-natasha-lomas-february-15-2019-tech-crunch-even-years-later-twitter-doesnt-delete-your-direct-messages</link>
    <description>
        &lt;b&gt;When does “delete” really mean delete? Not always, or even at all, if you’re Twitter .&lt;/b&gt;
        &lt;p&gt;The blog post by Zack Whittaker and Natasha Lomas was published in &lt;a class="external-link" href="https://techcrunch.com/2019/02/15/twitter-direct-messages/"&gt;Tech Crunch&lt;/a&gt; on February 15, 2019. Karan Saini was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Twitter  retains direct messages for years, including messages you and others  have deleted, but also data sent to and from accounts that have been  deactivated and suspended, according to security researcher Karan Saini.&lt;/p&gt;
&lt;p&gt;Saini  found years-old messages in a file from an archive of his data obtained  through the website from accounts that were no longer on Twitter. He  also reported a similar bug, found a year earlier but not disclosed  until now, that allowed him to use a since-deprecated API to retrieve  direct messages even after a message was deleted from both the sender  and the recipient — though, the bug wasn’t able to retrieve messages  from suspended accounts.&lt;/p&gt;
&lt;p&gt;Saini told TechCrunch that he had “concerns” that the data was retained by Twitter for so long.&lt;/p&gt;
&lt;p&gt;Direct messages &lt;a href="https://www.cnet.com/how-to/how-to-unsend-twitter-direct-messages/"&gt;once let users “unsend” messages&lt;/a&gt; from someone else’s inbox, simply by deleting it from their own.  Twitter changed this years ago, and now only allows a user to delete  messages from their account. “Others in the conversation will still be  able to see direct messages or conversations that you have deleted,”  Twitter says in &lt;a href="https://help.twitter.com/en/using-twitter/direct-messages"&gt;a help page&lt;/a&gt;. Twitter also says in its &lt;a href="https://twitter.com/en/privacy"&gt;privacy policy&lt;/a&gt; that  anyone wanting to leave the service can have their account “deactivated  and then deleted.” After a 30-day grace period, the account disappears,  along with its data.&lt;/p&gt;
&lt;p&gt;But, in our tests, we could recover direct  messages from years ago — including old messages that had since been  lost to suspended or deleted accounts. By downloading &lt;a href="https://twitter.com/settings/your_twitter_data"&gt;your account’s data&lt;/a&gt;, it’s possible to download all of the data Twitter stores on you.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Twitter.png/@@images/40867bd2-2284-4c9c-b42f-fb7a500b1c92.png" alt="Twitter" class="image-inline" title="Twitter" /&gt;&lt;/p&gt;
&lt;p&gt;A conversation, dated March 2016, with a suspended Twitter account was still retrievable today (Image: TechCrunch)&lt;/p&gt;
&lt;p&gt;Saini says this is a “functional bug” rather than a security flaw,  but argued that the bug allows anyone a “clear bypass” of Twitter  mechanisms to prevent accessed to suspended or deactivated accounts.&lt;/p&gt;
&lt;p&gt;But  it’s also a privacy matter, and a reminder that “delete” doesn’t mean  delete — especially with your direct messages. That can open up users,  particularly high-risk accounts like journalist and activists, to  government data demands that call for data from years earlier.&lt;/p&gt;
&lt;p&gt;That’s despite &lt;a href="https://help.twitter.com/en/rules-and-policies/twitter-law-enforcement-support"&gt;Twitter’s claim&lt;/a&gt; that once an account has been deactivated, there is “a very brief  period in which we may be able to access account information, including  tweets,” to law enforcement.&lt;/p&gt;
&lt;p&gt;A Twitter spokesperson said the  company was “looking into this further to ensure we have considered the  entire scope of the issue.”&lt;/p&gt;
&lt;p&gt;Retaining direct messages for years  may put the company in a legal grey area ground amid Europe’s new data  protection laws, which allows users to demand that a company deletes  their data.&lt;/p&gt;
&lt;p&gt;Neil Brown, a telecoms, tech and internet lawyer at &lt;a href="https://decoded.legal/"&gt;U.K. law firm Decoded Legal&lt;/a&gt;,  said there’s “no formality at all” to how a user can ask for their data  to be deleted. Any request from a user to delete their data that’s  directly communicated to the company “is a valid exercise” of a user’s  rights, he said.&lt;/p&gt;
&lt;p&gt;Companies can be fined up to four percent of their annual turnover for violating GDPR rules.&lt;/p&gt;
&lt;p&gt;“A  delete button is perhaps a different matter, as it is not obvious that  ‘delete’ means the same as ‘exercise my right of erasure’,” said Brown.  Given that there’s no case law yet under the new General Data Protection  Regulation regime, it will be up to the courts to decide, he said.&lt;/p&gt;
&lt;p&gt;When asked if Twitter thinks that consent to retain direct messages is withdrawn when a message or account is deleted, Twitter’s spokesperson had “nothing further” to add.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/zack-whittaker-natasha-lomas-february-15-2019-tech-crunch-even-years-later-twitter-doesnt-delete-your-direct-messages'&gt;https://cis-india.org/internet-governance/news/zack-whittaker-natasha-lomas-february-15-2019-tech-crunch-even-years-later-twitter-doesnt-delete-your-direct-messages&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Zack Whittaker and Natasha Lomas</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-18T14:17:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/data-infrastructures-inequities-reproductive-health-surveillance-india">
    <title>Data Infrastructures and Inequities: Why Does Reproductive Health Surveillance in India Need Our Urgent Attention?</title>
    <link>https://cis-india.org/internet-governance/blog/data-infrastructures-inequities-reproductive-health-surveillance-india</link>
    <description>
        &lt;b&gt;In order to bring out certain conceptual and procedural problems with health monitoring in the Indian context, this article by Aayush Rathi and Ambika Tandon posits health monitoring as surveillance and not merely as a “data problem.” Casting a critical feminist lens, the historicity of surveillance practices unveils the gendered power differentials wedded into taken-for-granted “benign” monitoring processes. The unpacking of the Mother and Child Tracking System and the National Health Stack reveals the neo-liberal aspirations of the Indian state. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The article was first published by &lt;a href="https://www.epw.in/engage/article/data-infrastructures-inequities-why-does-reproductive-health-surveillance-india-need-urgent-attention" target="_blank"&gt;EPW Engage, Vol. 54, Issue No. 6&lt;/a&gt;, on 9 February 2019.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;Framing Reproductive Health as a Surveillance Question&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The approach of the postcolonial Indian state to healthcare has been Malthusian, with the prioritisation of family planning and birth control (Hodges 2004). Supported by the notion of socio-economic development arising out of a “modernisation” paradigm, the target-based approach to achieving reduced fertility rates has shaped India’s reproductive and child health (RCH) programme (Simon-Kumar 2006).&lt;/p&gt;
&lt;p&gt;This is also the context in which India’s abortion law, the Medical Termination of Pregnancy (MTP) Act, was framed in 1971, placing the decisional privacy of women seeking abortions in the hands of registered medical practitioners. The framing of the MTP act invisibilises females seeking abortions for non-medical reasons within the legal framework. The exclusionary provisions only exacerbated existing gaps in health provisioning, as access to safe and legal abortions had already been curtailed by severe geographic inequalities in funding, infrastructure, and human resources. The state has concomitantly been unable to meet contraceptive needs of married couples or reduce maternal and infant mortality rates in large parts of the country, mediating access along the lines of class, social status, education, and age (Sanneving et al 2013).&lt;/p&gt;
&lt;p&gt;While the official narrative around the RCH programme transitioned to focus on universal access to healthcare in the 1990s, the target-based approach continues to shape the reality on the ground. The provision of reproductive healthcare has been deeply unequal and, in some cases, in hospitals. These targets have been known to be met through the practice of forced, and often unsafe, sterilisation, in conditions of absence of adequate provisions or trained professionals, pre-sterilisation counselling, or alternative forms of contraception (Sama and PLD 2018). Further, patients have regularly been provided cash incentives, foreclosing the notion of free consent, especially given that the target population of these camps has been women from marginalised economic classes in rural India.&lt;/p&gt;
&lt;p&gt;Placing surveillance studies within a feminist praxis allows us to frame the reproductive health landscape as more than just an ill-conceived, benign monitoring structure. The critical lens becomes useful for highlighting that taken-for-granted structures of monitoring are wedded with power differentials: genetic screening in fertility clinics, identification documents such as birth certificates, and full-body screeners are just some of the manifestations of this (Adrejevic 2015). Emerging conversations around feminist surveillance studies highlight that these data systems are neither benign nor free of gendered implications (Andrejevic 2015). In continual remaking of the social, corporeal body as a data actor in society, such practices render some bodies normative and obfuscate others, based on categorisations put in place by the surveiller.&lt;/p&gt;
&lt;p&gt;In fact, the history of surveillance can be traced back to the colonial state where it took the form of systematic sexual and gendered violence enacted upon indigenous populations in order to render them compliant (Rifkin 2011; Morgensen 2011). Surveillance, then, manifests as a “scientific” rationalisation of complex social hieroglyphs (such as reproductive health) into formats enabling administrative interventions by the modern state. Lyon (2001) has also emphasised how the body emerged as the site of surveillance in order for the disciplining of the “irrational, sensual body”—essential to the functioning of the modern nation-state—to effectively happen.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Questioning the Information and Communications Technology for Development (ICT4D) and Big Data for Development (BD4D) Rhetoric&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Information and Communications Technology (ICT) and data-driven approaches to the development of a robust health information system, and by extension, welfare, have been offered as solutions to these inequities and exclusions in access to maternal and reproductive healthcare in the country.&lt;/p&gt;
&lt;p&gt;The move towards data-driven development in the country commenced with the introduction of the Health Management Information System in Andhra Pradesh in 2008, and the Mother and Child Tracking System (MCTS) nationally in 2011. These are reproductive health information systems (HIS) that collect granular data about each pregnancy from the antenatal to the post-natal period, at the level of each sub-centre as well as primary and community health centre. The introduction of HIS comprised cross-sectoral digitisation measures that were a part of the larger national push towards e-governance; along with health, thirty other distinct areas of governance, from land records to banking to employment, were identified for this move towards the digitalised provisioning of services (MeitY 2015).&lt;/p&gt;
&lt;p&gt;The HIS have been seen as playing a critical role in the ecosystem of health service provision globally. HIS-based interventions in reproductive health programming have been envisioned as a means of: (i) improving access to services in the context of a healthcare system ridden with inequalities; (ii) improving the quality of services provided, and (iii) producing better quality data to facilitate the objectives of India’s RCH programme, including family planning and population control. Accordingly, starting 2018, the MCTS is being replaced by the RCH portal in a phased manner. The RCH portal, in areas where the ANMOL (ANM Online) application has been introduced, captures data real-time through tablets provided to health workers (MoHFW 2015).&lt;/p&gt;
&lt;p&gt;A proposal to mandatorily link the Aadhaar with data on pregnancies and abortions through the MCTS/RCH has been made by the union minister for Women and Child Development as a deterrent to gender-biased sex selection (Tembhekar 2016). The proposal stems from the prohibition of gender-biased sex selection provided under the Pre-Conception and Pre-Natal Diagnostics Techniques (PCPNDT) Act, 1994. The approach taken so far under the PCPNDT Act, 2014 has been to regulate the use of technologies involved in sex determination. However, the steady decline in the national sex ratio since the passage of the PCPNDT Act provides a clear indication that the regulation of such technology has been largely ineffective. A national policy linking Aadhaar with abortions would be aimed at discouraging gender-biased sex selection through state surveillance, in direct violation of a female’s right to decisional privacy with regards to their own body.&lt;/p&gt;
&lt;p&gt;Linking Aadhaar would also be used as a mechanism to enable direct benefit transfer (DBT) to the beneficiaries of the national maternal benefits scheme. Linking reproductive health services to the Aadhaar ecosystem has been critiqued because it is exclusionary towards women with legitimate claims towards abortions and other reproductive services and benefits, and it heightens the risk of data breaches in a cultural fabric that already stigmatises abortions. The bodies on which this stigma is disproportionately placed, unmarried or disabled females, for instance, experience the harms of visibility through centralised surveillance mechanisms more acutely than others by being penalised for their deviance from cultural expectations.&amp;nbsp; This is in accordance with the theory of "data extremes,” wherein marginalised communities are seen as&amp;nbsp; living on the extremes of&amp;nbsp; data capture, leading to a data regime that either refuses to recognise them as legitimate entities or subjects them to overpolicing in order to discipline deviance (Arora 2016). In both developed and developing contexts, the broader purpose of identity management has largely been to demarcate legitimate and illegitimate actors within a population, either within the framework of security or welfare.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Potential Harms of the Data Model of Reproductive Health Provisioning&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Informational privacy and decisional privacy are critically shaped by data flows and security within the MCTS/RCH. No standards for data sharing and storage, or anonymisation and encryption of data have been implemented despite role-based authentication (NHSRC and Taurus Glocal 2011). The risks of this architectural design are further amplified in the context of the RCH/ANMOL where data is captured real-time. In the absence of adequate safeguards against data leaks, real-time data capture risks the publicising of reproductive health choices in an already stigmatised environment. This opens up avenues for further dilution of autonomy in making future reproductive health choices.&lt;/p&gt;
&lt;p&gt;Several core principles of informational privacy, such as limitations regarding data collection and usage, or informed consent, also need to be reworked within this context.&lt;sup&gt;[1]&lt;/sup&gt; For instance, the centrality of the requirement of “free, informed consent” by an individual would need to be replaced by other models, especially in the context of reproductive health of&amp;nbsp; rape survivors who are vulnerable and therefore unable to exercise full agency. The ability to make a free and informed choice, already dismantled in the context of contemporary data regimes, gets further precluded in such contexts. The constraints on privacy in decisions regarding the body are then replicated in the domain of reproductive data collection.&lt;/p&gt;
&lt;p&gt;What is uniform across these digitisation initiatives is their treatment of maternal and reproductive health as solely a medical event, framed as a data scarcity problem. In doing so, they tend to amplify the understanding of reproductive health through measurable indicators that ignore social determinants of health. For instance, several studies conducted in the rural Indian context have shown that the degree of women’s autonomy influences the degree of usage of pregnancy care, and that the uptake of pregnancy care was associated with village-level indicators such as economic development, provisioning of basic infrastructure and social cohesion. These contextual factors get overridden in pervasive surveillance systems that treat reproductive healthcare as comprising only of measurable indicators and behaviours, that are dependent on individual behaviour of practitioners and women themselves, rather than structural gaps within the system.&lt;/p&gt;
&lt;p&gt;While traditionally associated with state governance, the contemporary surveillance regime is experienced as distinct from its earlier forms due to its reliance on a nexus between surveillance by the state and private institutions and actors, with both legal frameworks and material apparatuses for data collection and sharing (Shepherd 2017). As with historical forms of surveillance, the harms of contemporary data regimes accrue disproportionately among already marginalised and dissenting communities and individuals. Data-driven surveillance has been critiqued for its excesses in multiple contexts globally, including in the domains of predictive policing, health management, and targeted advertising (Mason 2015). In the attempts to achieve these objectives, surveillance systems have been criticised for their reliance on replicating past patterns, reifying proximity to a hetero-patriarchal norm (Haggerty and Ericson 2000). Under data-driven surveillance systems, this proximity informs the preexisting boxes of identity for which algorithmic representations of the individual are formed. The boxes are defined contingent on the distinct objectives of the particular surveillance project, collating disparate pieces of data flows and resulting in the recasting of the singular offline self into various 'data doubles' (Haggerty and Ericson 2000). Refractive, rather than reflective, the data doubles have implications for the physical, embodied life of individual with an increasing number of service provisioning relying on the data doubles (Lyon 2001). Consider, for instance, apps on menstruation, fertility, and health, and wearables such as fitness trackers and pacers, that support corporate agendas around what a woman’s healthy body should look, be or behave like (Lupton 2014). Once viewed through the lens of power relations, the fetishised, apolitical notion of the data “revolution” gives way to what we may better understand as “dataveillance.”&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Towards a Networked State and a Neo-liberal Citizen&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Following in this tradition of ICT being treated as the solution to problems plaguing India’s public health information system, a larger, all-pervasive healthcare ecosystem is now being proposed by the Indian state (NITI Aayog 2018). Termed the National Health Stack, it seeks to create a centralised electronic repository of health records of Indian citizens with the aim of capturing every instance of healthcare service usage. Among other functions, it also envisions a platform for the provisioning of health and wellness-based services that may be dispensed by public or private actors in an attempt to achieve universal health coverage. By allowing private parties to utilise the data collected through pullable open application program interfaces (APIs), it also fits within the larger framework of the National Health Policy 2017 that envisions the private sector playing a significant role in the provision of healthcare in India. It also then fits within the state–private sector nexus that characterises dataveillance. This, in turn, follows broader trends towards market-driven solutions and private financing of health sector reform measures that have already had profound consequences on the political economy of healthcare worldwide (Joe et al 2018).&lt;/p&gt;
&lt;p&gt;These initiatives are, in many ways, emblematic of the growing adoption of network governance reform by the Indian state (Newman 2001). This is a stark shift from its traditional posturing as the hegemonic sovereign nation state. This shift entails the delayering from large, hierarchical and unitary government systems to horizontally arranged, more flexible, relatively dispersed systems.&lt;sup&gt;[2]&lt;/sup&gt; The former govern through the power of rules and law, while the latter take the shape of self-regulating networks such as public–private contractual arrangements (Snellen 2005). ICTs have been posited as an effective tool in enabling the transition to network governance by enhancing local governance and interactive policymaking enabling the co-production of knowledge (Ferlie et al 2011). The development of these capabilities is also critical to addressing “wicked problems” such as healthcare (Rittel and Webber 1973).&lt;sup&gt;[3]&lt;/sup&gt; The application of the techno-deterministic, data-driven model to reproductive healthcare provision, then, resembles a fetishised approach to technological change. The NHSRC describes this as the collection of data without an objective, leading to a disproportional burden on data collection over use (NHSRC and Taurus Glocal 2011).&lt;/p&gt;
&lt;p&gt;The blurring of the functions of state and private actors is reflective of the neo-liberal ethic, which produces new practices of governmentality. Within the neo-liberal framework of reproductive healthcare, the citizen is constructed as an individual actor, with agency over and responsibility for their own health and well-being (Maturo et al 2016).&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;“Quantified Self” of the Neo-liberal Citizen&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Nowhere can the manifestation of this neo-liberal citizen can be seen as clearly as in the “quantified self” movement. The quantified self movement refers to the emergence of a whole range of apps that enable the user to track bodily functions and record data to achieve wellness and health goals, including menstruation, fertility, pregnancies, and health indicators in the mother and baby. Lupton (2015) labels this as the emergence of the “digitised reproductive citizen,” who is expected to be attentive to her fertility and sexual behaviour to achieve better reproductive health goals. The practice of collecting data around reproductive health is not new to the individual or the state, as has been demonstrated by the discussion above. What is new in this regime of datafication under the self-tracking movement is the monetisation of reproductive health data by private actors, the labour for which is performed by the user. Focusing on embodiment draws attention to different kinds of exploitation engendered by reproductive health apps. Not only is data about the body collected and sold, the unpaid labour for collection is extracted from the user. The reproductive body can then be understood as a cyborg, or a woman-machine hybrid, systematically digitising its bodily functions for profit-making within the capitalist (re)production machine (Fotoloulou 2016). Accordingly, all major reproductive health tracking apps have a business model that relies on selling information about users for direct marketing of products around reproductive health and well-being (Felizi and Varon nd).&lt;/p&gt;
&lt;p&gt;As has been pointed out in the case of big data more broadly, reproductive health applications (apps) facilitate the visibility of the female reproductive body in the public domain. Supplying anonymised data sets to medical researchers and universities fills some of the historical gaps in research around the female body and reproductive health. Reproductive and sexual health tracking apps globally provide their users a platform to engage with biomedical information around sexual and reproductive health. Through group chats on the platform, they are also able to engage with experiential knowledge of sexual and reproductive health. This could also help form transnational networks of solidarity around the body and health&amp;nbsp; (Fotopoulou 2016).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This radical potential of network-building around reproductive and sexual health is, however, tempered to a large extent by the reconfiguration of gendered stereotypes through these apps. In a study on reproductive health apps on Google Play Store, Lupton (2014) finds that products targeted towards female users are marketed through the discourse of risk and vulnerability, while those targeted towards male users are framed within that of virility. Apart from reiterating gendered stereotypes around the male and female body, such a discourse assumes that the entire labour of family planning is performed by females. This same is the case with the MCTS/RCH.&lt;/p&gt;
&lt;p&gt;Technological interventions such as reproductive health apps as well as HIS are based on the assumption that females have perfect control over decisions regarding their own bodies and reproductive health, despite this being disproved in India. The Guttmacher Institute (2014) has found that 60% of women in India report not having control over decisions regarding their own healthcare. The failure to account for the husband or the family as stakeholder in decision-making around reproductive health has been a historical failure of the family planning programme in India, and is now being replicated in other modalities. This notion of an autonomous citizen who is able to take responsibility of their own reproductive health and well-being does not hold true in the Indian context. It can even be seen as marginalising females who have already been excluded from the reproductive health system, as they are held responsible for their own inability to access healthcare.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Concluding Remarks&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The interplay that emerges between reproductive health surveillance and data infrastructures is a complex one. It requires the careful positioning of the political nature of data collection and processing as well as its hetero-patriarchal and colonial legacies, within the need for effective utilisation of data for achieving developmental goals. Assessing this discourse through a feminist lens identifies the web of power relations in data regimes. This problematises narratives of technological solutions for welfare provision.&lt;/p&gt;
&lt;p&gt;The reproductive healthcare framework in India then offers up a useful case study to assess these concerns. The growing adoption of ICT-based surveillance tools to equalise access to healthcare needs to be understood in the socio-economic, legal, and cultural context where these tools are being implemented. Increased surveillance has historically been associated with causing the structural gendered violence that it is now being offered as a solution to. This is a function of normative standards being constructed for reproductive behaviour that necessarily leave out broader definitions of reproductive health and welfare when viewed through a feminist lens. Within the larger context of health policymaking in India, moves towards privatisation then demonstrate the peculiarity of dataveillance as it functions through an unaccountable and pervasive overlapping of state and private surveillance practises. It remains to be seen how these trends in ICT-driven health policies affect access to reproductive rights and decisional privacy for millions of females in India and other parts of the global South.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/data-infrastructures-inequities-reproductive-health-surveillance-india'&gt;https://cis-india.org/internet-governance/blog/data-infrastructures-inequities-reproductive-health-surveillance-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi and Ambika Tandon</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>BD4D</dc:subject>
    
    
        <dc:subject>Healthcare</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    

   <dc:date>2019-12-30T16:44:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/Intermediary%20Liability%20Rules%202018.pdf">
    <title>Intermediary Liability Rules 2018.pdf</title>
    <link>https://cis-india.org/internet-governance/resources/Intermediary%20Liability%20Rules%202018.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/Intermediary%20Liability%20Rules%202018.pdf'&gt;https://cis-india.org/internet-governance/resources/Intermediary%20Liability%20Rules%202018.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>karan</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-02-07T07:32:23Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/submission-to-un-high-level-panel-on-digital-co-operation.pdf">
    <title>Submission to UN High Level Panel on Digital Co-operation.pdf</title>
    <link>https://cis-india.org/internet-governance/submission-to-un-high-level-panel-on-digital-co-operation.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/submission-to-un-high-level-panel-on-digital-co-operation.pdf'&gt;https://cis-india.org/internet-governance/submission-to-un-high-level-panel-on-digital-co-operation.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>karan</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-02-07T07:18:44Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/news/first-post-partha-p-chakrabartty-february-2-2019-dissent-on-aadhaar">
    <title>Dissent on Aadhaar: New book highlights limitations of ID project, legal and tech opposition to it</title>
    <link>https://cis-india.org/a2k/news/first-post-partha-p-chakrabartty-february-2-2019-dissent-on-aadhaar</link>
    <description>
        &lt;b&gt;In 2010, a year after the UIDAI was constituted, three of its functionaries visited internationally-renowned developmental economist Professor Reetika Khera.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Partha P Chakrabartty was &lt;a class="external-link" href="https://www.firstpost.com/india/dissent-on-aadhaar-new-book-highlights-limitations-of-id-project-legal-and-tech-opposition-to-it-5986251.html"&gt;published in First Post&lt;/a&gt; on February 2, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;They were hoping to get her endorsement on how Aadhaar would prove  ‘transformational’ for reducing corruption in social schemes like PDS  and NREGA. Khera writes, ‘Upon reading their policy documents on PDS and  NREGA, I was aghast because they betrayed a complete lack of  understanding of the problem they were trying to address’. What had  begun as a PR exercise by the UIDAI ended up creating one of its most  acute critics. Professor Khera’s latest salvo, &lt;i&gt;Dissent on Aadhaar: Big Data Meets Big Brother&lt;/i&gt;, has just been published by &lt;a href="https://www.orientblackswan.com/BookDescription?isbn=978-93-5287-542-9&amp;amp;t=e" rel="nofollow" target="_blank"&gt;Orient BlackSwan&lt;/a&gt;, and is on shelves now.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Dissent on Aadhaar&lt;/i&gt;, edited by Professor Khera, brings  together in one volume an array of experts commenting on the universal  ID project. Given its many facets, she has included Anumeha Yadav, a  journalist, who has been tirelessly reporting on Aadhar from the field;  economists, including the celebrated Jean Drèze; lawyers, including  civil liberties expert Dr Usha Ramanathan; and technologists like Sunil  Abraham, of Mozilla Foundation and the Center for Internet and Society.  The book is rounded off by international experts comparing Aadhaar to  digital/universal ID projects in other countries. The picture they paint  is not rosy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;‘Dissent’ on Aadhaar might not seem new to us, the English-speaking population of India. We all remember the &lt;a href="https://timesofindia.indiatimes.com/social-humour-these-aadhar-card-jokes-are-ruling-twitter/liveblog/57768395.cms" rel="nofollow" target="_blank"&gt;storm of tweets and memes&lt;/a&gt; when Aadhaar was declared mandatory for everything from bank accounts to a mobile phone connection. We also &lt;a href="https://www.firstpost.com/news/buzz/you-dont-have-to-link-your-aadhaar-to-memes-anymore-twitter-is-very-confused-about-sc-verdict-on-aadhaar-1889661.html"&gt;saw through&lt;/a&gt; the September 2018 Supreme Court verdict, where Aadhaar was ruled  optional for opening a bank account, but secretly remained mandatory due  to its link with the PAN card. While some of the themes mentioned in  this book, like concerns over privacy, have filtered down to our  conversations, the book reveals that we haven’t even begun to scratch  the surface.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Khera debunks the prevailing popular wisdom around Aadhaar in the  opening chapters, sometimes even using the Government’s own data. Was  Aadhaar necessary to create because there were many Indians without a  legal ID? Aadhaar data says, only 0.03 percent of Aadhaar enrollments  were by people without existing IDs, using the ‘introducer’ system. Were  existing IDs compromised, necessitating an overhaul of our national ID  systems? If so, how is it that those very compromised IDs were used to  create the Aadhaar database? And what of the loopholes in the Aadhaar  system, like &lt;a href="https://qz.com/india/1402415/indias-uidai-has-issued-aadhaars-to-dogs-spies-and-gods/" rel="nofollow" target="_blank"&gt;cards for dogs and gods&lt;/a&gt;? These egregious pranks may have been caught, but what of less obvious aberrations?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Does Aadhaar prevent fraud? Here, Khera points out there are three  kinds of fraud: identity fraud, eligibility fraud, and quantity fraud;  Aadhaar only provides some measure of protection against the first.  Khera’s previous studies have shown that the most prominent kind of  fraud in India’s social schemes is quantity fraud. Even eligibility  fraud, where citizens claim benefits reserved for others, cannot be  checked by Aadhaar, as eligibility depends upon a separate set of  documents.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;Finally, does Aadhaar ease access to government schemes  and benefits for the poorest? Here, what has seemed farcical quickly  becomes tragic.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;In a country where basic infrastructure in terms of electricity and  mobile phone connections is poor, can a digital ID system like Aadhaar  really ease the process of disbursement? Anumeha Yadav provides the  on-ground reality — in Bhim Block, Rajsamand District, Rajasthan, 1,799  pensioners were declared dead because they failed to open Aadhaar-linked  bank accounts in time. A door-to-door campaign conducted by the Mazdoor  Kisan Shakti Sanghatan found that 1,308 of these were actually alive,  and had been denied their rightful pensions. Yadav quotes a &lt;i&gt;Dainik Bhaskar&lt;/i&gt; estimate that 1 lakh of Rajasthan’s 2.97 lakh pensioners had been inaccurately declared dead.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If these ideas are so far off the  mark, how did they come to take root in our minds? How come there was no  meaningful opposition to prevent this Himalayan blunder? Khera quotes  the father of Aadhaar himself, Nandan Nilekani, who outlined his  three-point strategy to overwhelm opposition: Do it quickly, do it  quietly, and build a coalition of powerful interests who will overpower  any opposition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nilekani’s strategy worked beautifully. A damning 2011 Parliamentary Standing Committee on Finance &lt;a href="https://www.firstpost.com/news/india/why-parliamentary-panel-rejected-the-uid-bill-428035.html"&gt;Report&lt;/a&gt;,  which deemed UIDAI categorically unacceptable, was mostly ignored. The  Rajya Sabha’s concerns and suggested amendments were circumvented by  passing off the Aadhaar bill as a Money bill (requiring passage only in  the Lok Sabha), even though its ambit was much wider than just allotment  of financial resources. The Supreme Court itself had a lone dissenter, &lt;a href="https://www.firstpost.com/india/justice-dy-chandrachuds-dissenting-opinion-in-aadhaar-judgment-raises-very-valid-points-about-parliamentary-process-5279921.html"&gt;Justice Chandrachud&lt;/a&gt;, who published a note to that effect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Opposition has not come just from  activist, legal and parliamentary sources. Sunil Abraham, a  technologist, speaks of the many alternatives UIDAI had to its present  system of a centralised biometric database, and its many  vulnerabilities, including the theft of data, and the difficulty of  correcting input errors. An alternative would have been to have smart  cards that stored encrypted biometric information on the card itself,  instead of in a centralised database; a conjunction of  card-and-fingerprint would make the system secure from identity fraud.  Abraham warns of high-resolution cameras that can be used by governments  and private interests to identify fingerprints even at a distance, for  instance of protestors in a marching crowd.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But what happened when Abraham’s Centre for Internet and Society  (CIS) published a report stating the Government had inadvertently leaked  millions of identification numbers? The Government sent them several  legal notices. A &lt;a href="https://www.reuters.com/article/us-india-aadhaar-breach/critics-of-indias-id-card-project-say-they-have-been-harassed-put-under-surveillance-idUSKBN1FX0H0" rel="nofollow" target="_blank"&gt;researcher from CIS&lt;/a&gt; also spoke of visits from officials from the Home Ministry and from the  police. One policeman even asked the researcher, ‘How was that trip to  Turkey?’, demonstrating the extent of their surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If Aadhaar was not created for all the things the UIDAI claimed, what was its true intent? We can guess from the way &lt;a href="https://www.outlookindia.com/website/story/in-a-case-of-conflict-of-interest-aadhaar-insiders-are-launching-private-user-au/302634" rel="nofollow" target="_blank"&gt;Aadhaar insiders&lt;/a&gt;,  like ex-Chief Product Manager Vivek Raghavan, who ‘volunteered’ for  Aadhaar between October 2010 and June 2013, went on to found Khosla  Labs, with its for-profit Aadhaar Bridge product. When the Supreme Court  struck down the sharing of Aadhaar data with private companies in its  September 2018 judgment, private interests dropped their masks and have  started campaigning for a reversal. Dr Usha Ramanathan covers this in  her chapter, making sense of the new, hybrid public-private entity that  UIDAI represented, and its consequences.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And what did the government get out of it? Considering how it used  its existing might to harass CIS, can you imagine what its expanded  capabilities with Aadhaar will achieve for anyone who critiques their  functioning? And how many critics who see something wrong in policy or  execution will hesitate before saying something for fear of persecution?  This ‘chilling effect’ is already spreading — just speak to anyone who  critiques the government, and how often they have been advised to stop  doing so.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many of the big battles when it comes to Aadhaar have already been  lost. 1.2 billion people have yielded up their biometric information;  Aadhaar, which had started off as voluntary, has become mandatory to  access basic rights of citizenship, and this has been upheld by the  Supreme Court; India has ignored best practices from other countries and  lessons from other such attempts, and has therefore squandered a  historic opportunity to do this digital ID right.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Far though this juggernaut has rolled, the experts in this book are  still offering warnings; while there has been substantial harm already,  especially to the rural poor and the elderly, the worst damage is yet to  occur. While the State has power to gain from defending UIDAI, and  private interests have millions in profits to reap, the scholars and  activists in this book have no millions to make, and are indeed staking  both their personal safety, and their professional reputations in  putting forward a narrative that goes so far against the dominant one. I  trust readers will give their thoroughly-researched essays a fair  hearing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The writer wishes to acknowledge the contribution of Prasun Chakrabartty in researching and clarifying this piece.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/news/first-post-partha-p-chakrabartty-february-2-2019-dissent-on-aadhaar'&gt;https://cis-india.org/a2k/news/first-post-partha-p-chakrabartty-february-2-2019-dissent-on-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-02-02T13:13:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/marathi-wikipedia-workshop-1lib1ref-session-at-goa-university">
    <title>Marathi Wikipedia Workshop &amp; 1lib1ref session at Goa University</title>
    <link>https://cis-india.org/a2k/blogs/marathi-wikipedia-workshop-1lib1ref-session-at-goa-university</link>
    <description>
        &lt;b&gt;Marathi language department of Goa University has initiated the process to document the culture of Goa on Marathi Wikipedia and Commons.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;As this was the first exposure to Wikimedia projects, a two day extensive training workshop was planned. In the same event, a three hour session in library as part of 1lib1ref session was also conducted. CIS-A2K has partnered Goa University for conducting the event which attracted a footfall of 36 participants.&lt;/p&gt;
&lt;h3&gt;Primary objectives&lt;/h3&gt;
&lt;p&gt;The following objectives were broadly covered in the sessions held at Goa University campus on 31 January and 1 February 2019:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Awareness about digital knowledge in Marathi, Open knowledge resources and Wikimedia projects.&lt;/li&gt;
&lt;li&gt;Explain participants the history of Wiki movement and the pillars of Wikipedia.&lt;/li&gt;
&lt;li&gt;Train the participants in basic editing skills in Wikipedia.&lt;/li&gt;
&lt;li&gt;Explore the ways to find reliable and verifiable references.&lt;/li&gt;
&lt;li&gt;Present the article structure, manual of style, and categorization.&lt;/li&gt;
&lt;li&gt;Explain copyright, Commons guidelines and uploading images on Wikipedia.&lt;/li&gt;
&lt;li&gt;Discuss follow-up plan and integration with academic activities.&lt;/li&gt;
&lt;li&gt;Add reliable references as part of 1lib1ref session in library.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;The Workshop&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The   practice of Marathi typing in Unicode was carried out through preparing   articles as Word document. The students selected the articles on  history  of Goa, writers and artists of Goa, tourism in Goa and villages  in Goa.  Participants learnt basic editing skills, adding references  and  uploading on Commons. They worked first in sandboxes on their new   articles. The content addition is in progress. The verified content   would be moved to main namespace under the guidance of experienced   editors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The   concept of 1lib1ref campaign was shared with Chief Librarian of Goa   University. The response was very positive. As a result, in the last two   sessions of the workshop on 1 February, the participants added   references to the articles. The session was conducted in the library.   The library staff and faculty facilitated the process.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Follow-up&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The editors are preparing the articles in sandboxes and offline also. It is proposed to conduct another iteration to verify and publish this content in main namespace. The students are also taking the images of issues related to Goan culture. The exclusive session on Commons is also proposed. The librarian has suggested making separate rack of reference books related to Goa culture and heritage for utility. This idea will be explored in the next 1lib1ref iteration in May-June 2019.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;For more info see the &lt;a class="external-link" href="https://meta.wikimedia.org/wiki/CIS-A2K/Events/Marathi_Wikipedia_Workshop_%26_1lib1ref_session_at_Goa_University"&gt;Meta report&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/marathi-wikipedia-workshop-1lib1ref-session-at-goa-university'&gt;https://cis-india.org/a2k/blogs/marathi-wikipedia-workshop-1lib1ref-session-at-goa-university&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subodh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Marathi Wikipedia</dc:subject>
    
    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2019-03-01T00:35:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers">
    <title>India’s largest bank SBI leaked account data on millions of customers</title>
    <link>https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers</link>
    <description>
        &lt;b&gt;India’s largest bank has secured an unprotected server that allowed anyone to access financial information on millions of its customers, like bank balances and recent transactions.&lt;/b&gt;
        &lt;p id="speakable-summary" style="text-align: justify; "&gt;The blog post by Zack Whittaker was &lt;a class="external-link" href="https://techcrunch.com/2019/01/30/state-bank-india-data-leak/"&gt;published Tech Crunch&lt;/a&gt; on January 30, 2019. Karan Saini was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The server, hosted in a regional Mumbai-based data  center, stored two months of data from SBI Quick, a text message and  call-based system used to request basic information about their bank  accounts by customers of &lt;a href="https://www.crunchbase.com/organization/state-bank-of-india#section-overview"&gt;the government-owned State Bank of India&lt;/a&gt; (SBI), the largest bank in the country and a highly ranked company in the Fortune 500.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But  the bank had not protected the server with a password, allowing anyone  who knew where to look to access the data on millions of customers’  information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s not known for how long the server was open, but  long enough for it to be discovered by a security researcher, who told  TechCrunch of the leak, but did not want to be named for the story.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;SBI  Quick allows SBI’s banking customers to text the bank, or make a missed  call, to retrieve information back by text message about their finances  and accounts. It’s ideal for millions of the banking giant’s customers  who don’t use smartphones or have limited data service. By using  predefined keywords, like “BAL” for a customer’s current balance, the  service recognizes the customer’s registered phone number and will send  back the current amount in that customer’s bank account. The system can  also be used to send back the last five transactions, block an ATM card  and make inquiries about home or car loans.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was the back-end text message system that was exposed, TechCrunch can confirm, storing millions of text messages each day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/SBI.png" alt="SBI" class="image-inline" title="SBI" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A redacted example of some of the banking and credit information found in the database (Image: TechCrunch)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The passwordless database allowed us to see all of the text messages  going to customers in real time, including their phone numbers, bank  balances and recent transactions. The database also contained the  customer’s partial bank account number. Some would say when a check had  been cashed, and many of the bank’s sent messages included a link to  download SBI’s YONO app for internet banking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bank sent out close to three million text messages on Monday alone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  database also had daily archives of millions of text messages each,  going back to December, allowing anyone with access a detailed view into  millions of customers’ finances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We verified the data by asking India-based security researcher &lt;a href="https://twitter.com/iasni"&gt;Karan Saini&lt;/a&gt; to send a text message to the system. Within seconds, we found his  phone number in the database, including the text message he received  back.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The data available could potentially be used to profile and  target individuals that are known to have high account balances,” said  Saini in a message to TechCrunch. Saini previously &lt;a href="https://www.zdnet.com/article/another-data-leak-hits-india-aadhaar-biometric-database/"&gt;found a data leak&lt;/a&gt; in India’s Aadhaar, the country’s national identity database, and &lt;a href="https://www.zdnet.com/article/uber-security-flaw-two-factor-login-bypass/"&gt;a two-factor bypass bug&lt;/a&gt; in Uber’s ridesharing app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saini  said that knowing a phone number “could be used to aid social  engineering attacks — which is one of the most common attack vectors in  the country with regard to financial fraud,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;SBI &lt;a href="https://www.sbichicago.com/about-us/about-sbi"&gt;claims more than&lt;/a&gt; 500 million customers across the glob,e with 740 million accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just  days earlier, SBI accused Aadhaar’s authority, UIDAI, of mishandling  citizen data that allowed fake Aadhaar identity cards to be created,  despite &lt;a href="https://www.tribuneindia.com/news/nation/uidai-says-tribune-story-misreporting--read-how-that-is-wrong/523478.html"&gt;numerous security lapses&lt;/a&gt; and misuse of the system. UIDAI denied the report, saying there was “no security breach” of its system. (UIDAI often uses &lt;a href="https://twitter.com/UIDAI/status/1023543590033608705"&gt;the term “fake news”&lt;/a&gt; to describe coverage it doesn’t like.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TechCrunch  reached out to SBI and India’s National Critical Information  Infrastructure Protection Centre, which receives vulnerability reports  for the banking sector. The database was secured overnight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite several emails, SBI did not comment prior to publication.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers'&gt;https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-02-01T15:13:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/january-19-newsletter">
    <title>January 2019 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/january-19-newsletter</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) welcomes you to the first issue of its e-Newsletter for 2019.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The CIS &lt;span class="highlightedSearchTerm"&gt;newsletter&lt;/span&gt; aims to  highlight developments in copyright and patent, free speech and  expression, privacy, cyber security, telecom, etc. as well as Industry  4.0, big data, additive manufacturing and so on which are  revolutionizing and moving the digital world forward. Through this &lt;span class="highlightedSearchTerm"&gt;newsletter&lt;/span&gt; we look to engage you with our research and build a strong bond by  bringing you insightful articles and blog posts which will be beneficial  for you and your business. Throughout the year we will send you stories  and insights from our board, staff and community leaders. We welcome  your feedback, suggestions or comments regarding our &lt;span class="highlightedSearchTerm"&gt;newsletter&lt;/span&gt; or any other aspect of our research.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Welcome to r@w blog!&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS researchers@work programme (RAW) is delighted to &lt;a class="external-link" href="https://medium.com/rawblog"&gt;announce the launch of its new blog hosted on Medium&lt;/a&gt;. The RAW blog will feature works by researchers and practitioners working in India and  elsewhere at the intersections of internet, digital media, and society. The blog will also feature highlights and materials from ongoing research and events at the researchers@work programme.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Highlights for January 2019&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Ambika Tandon and Aayush Rathi have produced &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/ambika-tandon-and-aayush-rathi-december-19-2018-a-gendered-future-of-work"&gt;a research paper that contextualises the narrative around Industry 4.0 and the future of work&lt;/a&gt; with reference to the female labour force in India. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Gurshabad Grover, Nikhil Srinath and Aayush Rathi (with inputs from Anubha Sinha and Sai Shakti) presented a response to the Telecom Regulatory Authority of India’s Consultation Paper on &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-ott-communication-services"&gt;Regulatory Framework for Over-The-Top (OTT) Communication Services&lt;/a&gt;. &lt;i&gt;CIS appreciates the continual efforts of TRAI to have consultations on the regulatory framework that should be applicable to OTT services and Telecom Service Providers (TSPs)&lt;/i&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Pranesh Prakash, Karan Saini and Elonnai Hickok &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/pranesh-prakash-elonnai-hickok-karan-saini-january-23-2019-leveraging-the-coordinated-vulnerability-disclosure-process-to-improve-the-state-of-information-security-in-india"&gt;authored a policy brief that recommends several changes&lt;/a&gt; pertaining to current legislation, policy and practice to the Government of India regarding coordinated vulnerability disclosure (“CVD”) for improving the overarching information and cyber security posture of the country. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Global Commission on the Stability of Cyberspace, a multi-stakeholder initiative comprised of eminent individuals across the globe opened a public comment procedure to solicit comments and obtain additional feedback. Arindrajit Basu, Gurshabad Grover and Elonnai Hickok &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation"&gt;responded to the public call-offering comments on all six norms and proposing two further norms&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;CIS and the News&lt;/h3&gt;
&lt;p&gt;The following news pieces were authored by CIS and published on its website in January:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy"&gt;How to make EVMs hack-proof, and elections more trustworthy&lt;/a&gt; (Pranesh Prakash; Times of India; December 9, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/business-standard-january-2-2019-registering-for-aadhaar-in-2019"&gt;Registering for Aadhaar in 2019&lt;/a&gt; (Sunil Abraham; Business Standard; January 2, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved"&gt;The DNA Bill has a sequence of problems that need to be resolved&lt;/a&gt; (Shweta Mohandas and Elonnai Hickok; Newslaundry; January 15, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content"&gt;India should reconsider its proposed regulation of online content&lt;/a&gt; (Gurshabad Grover; Hindustan Times; January 24, 2019). &lt;i&gt;Akriti Bopanna and Aayush Rathi provided feedback for the article&lt;/i&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/nishant-shah-indian-express-january-27-2019-indias-proposed-new-internet-bill-is-as-repressive-as-the-worst-of-chinese-laws"&gt;India’s proposed new internet bill is as repressive as the worst of Chinese laws&lt;/a&gt; (Nishant Shah; Indian Express; January 27, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;CIS in the News&lt;/h3&gt;
&lt;p&gt;CIS was quoted in these news articles published elsewhere:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/news-minute-sanyukta-dharmadhikari-january-10-2019-creeped-out-by-netflixs-you"&gt;Creeped out by Netflix's 'You'? Here's how you can avoid online stalkers, data thieves&lt;/a&gt; (Sanyukta Dharmadhikari; The News Minute; January 10, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/bangalore-mirror-january-13-2019-sowmya-rajaram-civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru"&gt;Civic activism over WhatsApp and stories of and from cab drivers are part of a new narrative in Bengaluru&lt;/a&gt; (Sowmya Rajaram; Bangalore Mirror; January 13, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/tini-sara-anien-deccan-herald-january-17-2019-they-know-where-you-are"&gt;They know where you are&lt;/a&gt; (Tini Sara Anien; Deccan Herald; January 17, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears"&gt;Oyo Hotels’ Real-Time Digital Record Database Sparks Privacy Fears&lt;/a&gt; (Nishant Sharma; Bloomberg Quint; January 16, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/scroll-in-january-18-2019-devarsi-ghosh-is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data"&gt;Is the viral #10YearChallenge just another sneaky way for tech firms to gather users’ personal data?&lt;/a&gt; (Devarsi Ghosh; Scroll.in; January 18, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/news/wired-january-22-2019-google-wikipedia-machine-learning-glow-languages"&gt;Google Gives Wikimedia Millions—Plus Machine Learning Tools&lt;/a&gt; (Wired; January 22, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy"&gt;New movies lose out due to piracy&lt;/a&gt; (Surupasree Sarmmah; Deccan Herald; January 23, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india"&gt;Submitted Your Biometrics for Aadhaar? Here’s How You Can Lock/Unlock That Data&lt;/a&gt; (Vidya Raja; Better India; January 24, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers"&gt;India’s largest bank SBI leaked account data on millions of customers&lt;/a&gt; (Zack Whittaker; Tech Crunch; January 30, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly"&gt;Open standards can disrupt Facebook’s messaging monopoly&lt;/a&gt; (Abhimanyu Ghoshal; The Next Web; January 30, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/economic-times-tushar-kaushik-january-30-2019-conmen-seed-fake-phone-numbers-in-google-to-trap-people-looking-for-customer-care-details"&gt;Conmen seed fake phone numbers in Google to trap people looking for customer care details &lt;/a&gt;(Tushar Kaushik; Economic Times; January 30, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india"&gt;Amazon and Walmart are about to take a big hit in India&lt;/a&gt; (Q13 Fox; January 31, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;div&gt;&lt;/div&gt;
&lt;h2&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Cyber Security&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation"&gt;Response to GCSC on Request for Consultation: Norm Package Singapore&lt;/a&gt; (Gurshabad Grover, Arindrajit Basu and Elonnai Hickok; January 22, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;&lt;b&gt;Policy Brief&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/pranesh-prakash-elonnai-hickok-karan-saini-january-23-2019-leveraging-the-coordinated-vulnerability-disclosure-process-to-improve-the-state-of-information-security-in-india"&gt;Leveraging the Coordinated Vulnerability Disclosure Process to Improve the State of Information Security in India&lt;/a&gt; (Pranesh Prakash; Karan Saini and Elonnai Hickok; January 23, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Privacy&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-co-operation"&gt;CIS Submission to UN High Level Panel on Digital Co-operation&lt;/a&gt; (Aayush Rathi, Ambika Tandon, Arindrajit Basu and Elonnai Hickok; January 30, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Gender&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Research Paper&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/ambika-tandon-and-aayush-rathi-december-19-2018-a-gendered-future-of-work"&gt;A Gendered Future of Work&lt;/a&gt; (Ambika Tandon and Aayush Rathi; December 19, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organized&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/rfcs-we-love-meetup"&gt;RFCs We Love meetup&lt;/a&gt; (Organized by CIS and India Internet Engineering Society; CIS, Bangalore; January 19, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Participated / Partnered In&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/webinar-on-the-draft-intermediary-guidelines-amendment-rules"&gt;Webinar on the draft Intermediary Guidelines Amendment Rules&lt;/a&gt; (Organized by CCAOI and the ISOC Delhi Chapter; New Delhi; January 10, 2019). Gurshabad Grover was a discussant in the panel.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/news/medianama-roundtables-on-intermediary-liability-rules"&gt;MediaNama roundtables on intermediary liability rules&lt;/a&gt; (St. Marks Hotel, Bangalore; January 25, 2019). CIS was a community partner. Gurshabad Grover participated in the meeting.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/dscis-bangalore-chapter-meet"&gt;DSCI's Bangalore chapter meet&lt;/a&gt; (Organized by Data Security Council of India; Bangalore; January 29, 2019). Karan Saini and Gurshabad Grover participated in the meet.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;h2&gt;&lt;a class="external-link" href="https://cis-india.org/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The  growth in telecommunications in India has been impressive. While the  potential for growth and returns exist, a range of issues need to be  addressed for this potential to be realized. One aspect is more  extensive rural coverage and the second aspect is a countrywide access  to broadband which is low at about eight million subscriptions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Submission&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt; &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-ott-communication-services"&gt;Response to TRAI Consultation Paper on Regulatory Framework for Over-The-Top (OTT) Communication Services&lt;/a&gt; (Gurshabad Grover, Nikhil Srinath and Aayush Rathi with inputs from Anubha Sinha and Sai Shakti; January 10, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;h2&gt;&lt;a class="external-link" href="https://cis-india.org/raw"&gt;Researchers at Work (RAW)&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Announcement&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/irc19-list"&gt;Internet Researchers' Conference 2019 (IRC19): #List, Jan 30 - Feb 1, Lamakaan&lt;/a&gt; (P.P. Sneha; January 9, 2019).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a class="external-link" href="http://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and  Society  (CIS) is a non-profit organisation that undertakes  interdisciplinary  research on internet and digital technologies from  policy and academic  perspectives. The areas of focus include digital  accessibility for  persons with disabilities, access to knowledge,  intellectual property  rights, openness (including open data, free and  open source software,  open standards, open access, open educational  resources, and open  video), internet governance, telecommunication  reform, digital privacy,  and cyber-security. The academic research at  CIS seeks to understand  the reconfigurations of social and cultural  processes and structures as  mediated through the internet and digital  media technologies.&lt;/p&gt;
&lt;p&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;► Support Us&lt;/p&gt;
&lt;div&gt;Please help us defend consumer and citizen rights on the Internet!   Write a cheque in favour of 'The Centre for Internet and Society' and   mail it to us at No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru -   5600 71.&lt;/div&gt;
&lt;p&gt;► Request for Collaboration&lt;/p&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners,  artists, and theoreticians,  both organisationally and as individuals,  to engage with us on topics  related internet and society, and improve  our collective understanding  of this field. To discuss such  possibilities, please write to Sunil  Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org  (for  academic research), with an indication of the form and the  content of  the collaboration you might be interested in. To discuss  collaborations  on Indic language Wikipedia projects, write to Tanveer  Hasan, Programme  Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its primary  donor the Kusuma Trust founded  by Anurag Dikshit and Soma Pujari,  philanthropists of Indian origin for  its core funding and support for  most of its projects. CIS is also  grateful to its other donors,  Wikimedia Foundation, Ford Foundation,  Privacy International, UK, Hans  Foundation, MacArthur Foundation, and  IDRC for funding its various  projects&lt;/i&gt;.&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/january-19-newsletter'&gt;https://cis-india.org/about/newsletters/january-19-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2019-03-03T16:34:21Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly">
    <title>Open standards can disrupt Facebook’s messaging monopoly</title>
    <link>https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly</link>
    <description>
        &lt;b&gt;Facebook made the news last week when The New York Times’ Mike Isaac reported that CEO Mark Zuckerberg intended to integrate the company’s three messaging platforms: WhatsApp, Messenger, and Instagram.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Abhimanyu Ghoshal was &lt;a class="external-link" href="https://thenextweb.com/facebook/2019/01/28/open-standards-can-help-disrupt-facebook-messaging-monopoly/"&gt;published in The Next Web&lt;/a&gt; on January 30, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;We don’t have all the details of exactly how this will work. The plan is still in its early stages, and there are plenty of moving parts – legal and technical – to take care of. What’s clear is this: with more than 2.6 billion users between the platforms, this is set to impact a lot of people if it goes through – and potentially many hundreds of millions more in the following years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the specifics of the move are yet to be revealed, a move like  this could help Facebook create more detailed profiles of its users.  Even if the company encrypts communications end-to-end as it seemed to  imply in its responses to NYT, it could still leverage communications  metadata to target ads more accurately than you might think.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here’s an example: without looking at your messages (because they’re  encrypted), Facebook could gather data on who you chat with most often  and for how long, later correlating that with the recipients’ interests  from Instagram. It could then show you ads for gifts that contact may  like, right around the time their birthday comes up.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Integrating these platforms could also bolster Facebook’s efforts to  keep users tied into its ecosystem. That’s problematic, when you  consider the larger your network of contacts is on the company’s  services, the harder it is for you to leave them and use an alternative  you’re more comfortable with.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Is there a way out? &lt;a href="https://www.linkedin.com/in/praneshprakash/" rel="nofollow noopener" target="_blank"&gt;Pranesh Prakash&lt;/a&gt; – a Fellow at the &lt;a href="https://cis-india.org/" rel="nofollow noopener" target="_blank"&gt;Center for Internet and Society&lt;/a&gt;, as well as a Fellow at the &lt;a href="https://www.newamerica.org/" rel="nofollow noopener" target="_blank"&gt;New America&lt;/a&gt; think tank – believes that the answer lies not in breaking up Facebook  over privacy laws, but in competition, and regulators at the government  level should demand Facebook use open standards for its messaging  platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash explained that standards like SMTP and IMAP, which are used  for facilitating email exchanges, allow for interoperability between  services run by different organizations. They also let users choose the  client apps they prefer for accessing their inboxes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook’s messaging services, meanwhile, run on closed standards and don’t play nice with platforms created by third parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This results in people becoming trapped in Facebook’s ecosystem: even  if you’re opposed to using the company’s products, you can’t  realistically ditch them all because your friends and family are all  using its platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case you’re worried about open-source protocols not being up to  the task of serving massive networks like the ones Facebook operates,  consider the fact that &lt;a href="https://mycodeplex.wordpress.com/2016/03/08/inside-of-whatsapp-part-1/" rel="nofollow noopener" target="_blank"&gt;WhatsApp runs on FunXMPP&lt;/a&gt;, a customized version of &lt;a href="https://xmpp.org/" rel="nofollow noopener" target="_blank"&gt;the open XMPP set of standards&lt;/a&gt; that anyone can use for their own projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If Facebook is doing the difficult legwork of unifying the underlying  technical infrastructure of its three apps, Prakash argues, &lt;a href="https://www.hindustantimes.com/analysis/privacy-laws-cannot-make-facebeook-and-google-accountable/story-Yne6DwUoGb0eO9mRxaDTaL.html" rel="nofollow noopener" target="_blank"&gt;it’d do well to make its new protocol public and open-source&lt;/a&gt;.  That way, anyone should be able to use the company’s services to reach  people just the same as when they choose to use a service created by a  separate entity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash said that the only way diminishing Facebook’s power in this  regard is to open up access to its network of users. In doing so, it  will see people stick with the company’s services because they like  using them, not because they can’t stay in touch with their contacts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Questions surrounding Facebook’s monopolistic domination of the  messaging space will inevitably crop up when the company implements  Zuckerberg’s plan, and this sounds like a healthy way to tackle those  issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Naturally, that seems like it’d hurt Facebook’s bottom line – but  it’s important to start thinking about realistic measures to comply with  antitrust law – or risk being booted from countries that don’t  appreciate the way the company does business.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly'&gt;https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-02T01:59:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/news/wired-january-22-2019-google-wikipedia-machine-learning-glow-languages">
    <title>Google Gives Wikimedia Millions—Plus Machine Learning Tools</title>
    <link>https://cis-india.org/a2k/news/wired-january-22-2019-google-wikipedia-machine-learning-glow-languages</link>
    <description>
        &lt;b&gt;Google is pouring an additional $3.1 million into Wikipedia, bringing its total contribution to the free encyclopedia over the past decade to more than $7.5 million, the company announced at the World Economic Forum Tuesday.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="https://www.wired.com/story/google-wikipedia-machine-learning-glow-languages/"&gt;published by WIRED&lt;/a&gt; on January 22, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A little over a third of those funds will go toward sustaining current  efforts at the Wikimedia Foundation, the nonprofit that runs Wikipedia,  and the remaining $2 million will focus on long-term viability through  the organization’s &lt;a href="https://wikimediaendowment.org/" target="_blank"&gt;endowment&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google will also begin allowing Wikipedia editors to use several of its  machine learning tools for free, the tech giant said. What's more,  Wikimedia and Google will soon broaden &lt;a href="https://meta.wikimedia.org/wiki/Supporting_Indian_Language_Wikipedias_Program" target="_blank"&gt;Project Tiger&lt;/a&gt;,  a joint initiative they launched in 2017 to increase the number of  Wikipedia articles written in underrepresented languages in India, and  to include 10 new languages in a handful of countries and regions. It  will now be called GLOW, Growing Local Language Content on Wikipedia.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s certainly positive that Google is investing more in Wikipedia, one of the &lt;a href="https://www.alexa.com/topsites" target="_blank"&gt;most popular&lt;/a&gt; and generally trustworthy online resources in the world. But the  decision isn’t altruistic: Supporting Wikipedia is also a shrewd  business decision that will likely benefit Google for years to come.  Like other tech companies, including Amazon, Apple, and Facebook, Google  already uses Wikipedia content in a number of its own products. When  you search Google for “Paris,” a “&lt;a href="https://www.wired.com/story/google-search-california-gop-nazism/"&gt;knowledge panel&lt;/a&gt;”  of information about the city will appear, some of which is sourced  from Wikipedia. The company also has used Wikipedia articles to train  machine learning algorithms, as well as &lt;a href="https://www.wired.com/story/youtube-will-link-directly-to-wikipedia-to-fight-conspiracies/"&gt;fight misinformation&lt;/a&gt; on YouTube.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even efforts like GLOW—which will now expand to Indonesia, Mexico, and  Nigeria, as well as the Middle East and North Africa—can help Google’s  own bottom line. When the initiative first launched in India, Google  provided Chromebooks and internet access to editors, while the &lt;a href="https://cis-india.org/" target="_blank"&gt;Centre for Internet and Society&lt;/a&gt; and the Wikimedia India Chapter organized a three-month article writing  competition that resulted in nearly 4,500 new Wikipedia articles in 12  different Indic languages. Smartphone penetration in India is &lt;a href="https://newzoo.com/insights/rankings/top-50-countries-by-smartphone-penetration-and-users/" target="_blank"&gt;only around&lt;/a&gt; 27 percent; as more people in the country start using Android  smartphones and Google Search, those articles will make the tech giant’s  products more useful. Wikipedia’s &lt;a href="https://wikimediafoundation.org/2019/01/22/google-and-wikimedia-foundation-partner-to-increase-knowledge-equity-online/" target="_blank"&gt;blog post&lt;/a&gt; announcing Google’s new investment makes this strategy fairly clear,  noting that the company also provided Project Tiger with “insights into  popular search topics on Google for which no or limited local language  content exists on Wikipedia.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google is also providing Wikipedia free access to its &lt;a href="https://developers.google.com/custom-search/" target="_blank"&gt;Custom Search API&lt;/a&gt; and its &lt;a href="https://cloud.google.com/vision/" target="_blank"&gt;Cloud Vision API&lt;/a&gt;,  which will help the encyclopedia’s volunteer editors more easily cite  the facts they use. Each time a Wikipedia editor adds a new piece of  information to an article, they need to &lt;a href="https://www.wired.com/story/wikipedia-most-cited-authors-no-idea/"&gt;cite the source&lt;/a&gt; where they learned it. The Search API will allow them quickly look up  sources on the web without having to leave Wikipedia, while the vision  tool will let editors automatically digitize books so they can be used  to support Wikipedia articles too. Earlier this month, Wikimedia also &lt;a href="https://wikimediafoundation.org/2019/01/09/you-can-now-use-google-translate-to-translate-articles-on-wikipedia/" target="_blank"&gt;announced&lt;/a&gt; Google Translate was coming to Wikipedia, allowing editors to convert  content into 15 additional languages, bringing the total available to  121.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These machine learning tools will absolutely make it easier for  Wikipedia to reach people who speak languages currently underrepresented  on the web. But the encyclopedia is also the reason many AI programs  exist in the first place. For example, Google-owned Jigsaw has used  Wikipedia, in part, to &lt;a href="https://www.wired.com/2017/02/googles-troll-fighting-ai-now-belongs-world/"&gt;train&lt;/a&gt; its open source troll-fighting AI. The encyclopedia is also used by hundreds of other AI platforms, particularly &lt;a href="https://motherboard.vice.com/en_us/article/59ydmx/copyright-law-artificial-intelligence-bias" target="_blank"&gt;because&lt;/a&gt; every Wikipedia article is under Creative Commons—meaning it can be  reproduced for free without copyright restrictions. Apple’s Siri and  Amazon’s Alexa smart assistants use information from Wikipedia to answer  questions, for instance. (Both &lt;a href="https://www.businessinsider.com/amazon-just-donated-1-million-to-wikipedia-2018-9" target="_blank"&gt;companies&lt;/a&gt; also have &lt;a href="https://annual.wikimedia.org/2017/donors.html" target="_blank"&gt;donated&lt;/a&gt; to the Wikimedia Foundation as well.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google’s new investments in Wikipedia, specifically in GLOW, will  address a genuine problem. The majority of Wikipedia’s tens of millions  of articles are in English or European languages like French, German,  and Russian. (There are also lots of articles in Swedish and two  versions of Filipino, but most of these pages &lt;a href="https://www.wsj.com/articles/for-this-author-10-000-wikipedia-articles-is-a-good-days-work-1405305001" target="_blank"&gt;were created&lt;/a&gt; by a &lt;a href="https://en.wikipedia.org/wiki/Lsjbot#cite_note-arts-5" target="_blank"&gt;prolific bot&lt;/a&gt;). As the &lt;a href="https://www.itu.int/dms_pub/itu-s/opb/pol/S-POL-BROADBAND.18-2017-PDF-E.pdf" target="_blank"&gt;estimated half&lt;/a&gt; of Earth’s population that still lacks an internet connection comes  online, it will be important that reliable information is available in  the native languages people speak. That doesn’t mean, though, that in  helping solve these issues companies like Google—&lt;a href="https://www.wired.com/story/what-happened-to-facebooks-grand-plan-to-wire-the-world/"&gt;or Facebook&lt;/a&gt;—don’t also have something to gain.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/news/wired-january-22-2019-google-wikipedia-machine-learning-glow-languages'&gt;https://cis-india.org/a2k/news/wired-january-22-2019-google-wikipedia-machine-learning-glow-languages&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2019-02-02T12:52:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/response-to-gcsc-on-request-for-consultation-norm-package-singapore">
    <title>GCSC_RFC-CIS.pdf</title>
    <link>https://cis-india.org/response-to-gcsc-on-request-for-consultation-norm-package-singapore</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/response-to-gcsc-on-request-for-consultation-norm-package-singapore'&gt;https://cis-india.org/response-to-gcsc-on-request-for-consultation-norm-package-singapore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu, Gurshabad Grover and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-01-22T08:12:38Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/irc19-list-conference-programme">
    <title>IRC19: #List - Conference Programme</title>
    <link>https://cis-india.org/raw/irc19-list-conference-programme</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/irc19-list-conference-programme'&gt;https://cis-india.org/raw/irc19-list-conference-programme&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-01-31T06:33:28Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved">
    <title>The DNA Bill has a sequence of problems that need to be resolved</title>
    <link>https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved</link>
    <description>
        &lt;b&gt;In its current form, it’s far from comprehensive and fails to adequately address privacy and security concerns.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The opinion piece was &lt;a class="external-link" href="https://www.newslaundry.com/2019/01/14/the-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved"&gt;published by Newslaundry&lt;/a&gt; on January 14, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;On January 9, Science and Technology  Minister Harsh Vardhan introduced the DNA Technology (Use and  Application) Regulation Bill, 2018, amidst opposition and questions  about the Bill’s potential threat to privacy and the lack of security  measures. The Bill aims to provide for the regulation of the use and  application of DNA technology for certain criminal and civil purposes,  such as identifying offenders, suspects, victims, undertrials, missing  persons and unknown deceased persons. The Schedule of the Bill also  lists civil matters where DNA profiling can be used. These include  parental disputes, issues relating to immigration and emigration, and  establishment of individual identity. The Bill does not cover the  commercial or private use of DNA samples, such as private companies  providing DNA testing services for &lt;a href="https://scroll.in/pulse/827169/more-indians-are-taking-home-dna-tests-but-do-they-understand-what-their-genes-are-telling-them" target="_blank"&gt;conducting genetic tests&lt;/a&gt; or for verifying &lt;a href="https://timesofindia.indiatimes.com/city/hyderabad/Doubting-parents-can-buy-peace-for-Rs-10K/articleshow/15921603.cms" target="_blank"&gt;paternity&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  Bill has seen several iterations and revisions from when it was first  introduced in 2007. However, after repeated expert consultations, the  Bill even at its current stage is far from a comprehensive legislation. &lt;a href="https://www.thehindu.com/sci-tech/science/scientific-ambitions-behind-dna-profiling-bill/article7544598.ece" target="_blank"&gt;Experts&lt;/a&gt; have articulated concerns that the version of the Bill that was  presented post the Puttaswamy judgement still fails to make provisions  that fully uphold the &lt;a href="https://www.bloombergquint.com/opinion/dna-evidence-only-opinion-not-science-and-definitely-not-proof-of-crime#gs.dfL5aOrP" target="_blank"&gt;privacy&lt;/a&gt; and &lt;a href="https://www.bloombergquint.com/opinion/the-dna-bill-another-invasive-imperfect-database#gs.0ZIZNiNR" target="_blank"&gt;dignity&lt;/a&gt; of the individual. The hurry to pass the Bill by pushing for it by &lt;a href="https://www.firstpost.com/politics/parliament-live-updates-lok-sabha-passes-constitutional-amendment-bill-with-323-ayes-3-noes-quota-bill-to-now-be-presented-in-rajya-sabha-5854221.html#live-blog-20190108130637" target="_blank"&gt;extending the winter session&lt;/a&gt; and before the Personal Data Protection Bill is brought before  Parliament is also worrying. The Bill was passed in the Lok Sabha with  only one amendment: which changed the year of the Bill from 2018 to  2019.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Need for a better-drafted legislation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although  the Schedule of the Bill includes certain civil matters under its  purview, some important provisions are silent on the procedure that is  to be followed for these civil matters. For example, the Bill  necessitates the consent of the individual for DNA profiling in criminal  investigation and for identifying missing persons. However, the Bill is  silent on the requirement for consent in all civil matters that have  been brought under the scope of the Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  omission of civil matters in the provisions of the Bill that are  crucial for privacy is just one of the ways the Bill fails to ensure  privacy safeguards.  The civil matters listed in the Bill are highly  sensitive (such as paternity/maternity, use of assisted reproductive  technology, organ transplants, etc.) and can have a far-reaching impact  on a number of sections of society. For example, the civil matters  listed in the Bill affect women not just in the case of paternity  disputes but in a number of matters concerning women including the  Domestic Violence Act and the Prenatal Diagnostic Techniques Act. Other  matters such as pedigree, immigration and emigration can  disproportionately impact vulnerable groups and communities, raising  raises concerns of discrimination and abuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy and security concerns&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although  the Bill makes provisions for written consent for the collection of  bodily substances and intimate bodily substances, the Bill allows  non-consensual collection for offences punishable by death or  imprisonment for a term exceeding seven years. Another issue with  respect to collection with consent is the absence of safeguards to  ensure that consent is given freely, especially when under police  custody. This issue was also &lt;a href="https://twitter.com/tame_wildcard/status/1082550737845006336" target="_blank"&gt;highlighted by MP NK Premachandran&lt;/a&gt; when he emphasised that the Bill be sent to a &lt;a href="https://thewire.in/the-sciences/lok-sabha-passes-dna-technology-bill-all-you-need-to-know" target="_blank"&gt;Parliamentary Standing Committee&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart  from the collection, the Bill fails to ensure the privacy and security  of the samples. One such example of this failure is Section 35(b), which  allows access to the information contained in the DNA Data Banks for  the purpose of training. The use of these highly sensitive data—that  carry the risk of contamination—for training poses risks to the privacy  of the people who have deposited their DNA both with and without  consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An earlier  version of the Bill included a provision for the creation of a  population statistics databank. Though this has been removed now, there  is no guarantee that this provision will not make its way through  regulation. This is a cause for concern as the Bill also covers certain  civil cases including those relating to immigration and emigration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  July 2018, the Justice Sri Krishna Committee released the draft  Personal Data Protection Bill. The Bill was open for public consultation  and is now likely to be &lt;a href="https://economictimes.indiatimes.com/tech/internet/personal-data-protection-bill-only-after-new-government-takes-over/articleshow/67374919.cms" target="_blank"&gt;introduced in Parliament in June&lt;/a&gt;.  The PDP Bill, while defining “sensitive personal data”, provides an  exhaustive list of data that can be considered sensitive, including  biometric data, genetic data and health data. Under the Bill, sensitive  personal data has heightened parameters for collection and processing,  including clear, informed, and specific consent. Ideally, the DNA Bill  should be passed after ensuring that it is in line with the PDP Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  DNA Bill, once it becomes a law, will allow for law enforcement  authorities to collect sensitive DNA data and database the same for  forensic purposes without a number of key safeguards in place with  respect to security and the rights of individuals. In &lt;a href="http://ncrb.gov.in/StatPublications/CII/CII2016/pdfs/NEWPDFs/9%20%20Snapshots%20All%20India%202016.pdf" target="_blank"&gt;2016 alone&lt;/a&gt;,  29,75,711 crimes under various provisions the Indian Penal Code were  reported. One can only guess the sheer number of DNA profiles and  related information that will be collected from both criminal and  specified civil cases. The Bill needs to be revised to reduce all  ambiguity with respect to the civil cases, and also to ensure that it is  in line with the data protection regime in India. A comprehensive  privacy legislation should be enacted prior to the passing of this Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are still studies  and cases that show that DNA testing can be fallible. The Indian  government needs to ensure that there is proper sensitisation and  training on the collection, storage and use of DNA profiles as well as  the recognition and awareness of the fact that the DNA tests are not  infallible amongst key stakeholders, including law enforcement and the  judiciary.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved'&gt;https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>DNA Profiling</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-01-15T02:36:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
