<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1311 to 1325.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/observer-research-foundation-shashidhar-kj-and-kashish-parpiani-july-22-2019-easing-the-us-india-divergence-on-data-localisation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/e-governance-identity-privacy.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/e-gif-iraq-meeting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/e-commerce_submission_by_cis.pdf-2"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/e-commerce-submission"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/digital-review-asia-pacific-christine-apikul-e-dirap-google-hangout-open-government"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dsci-bpm-2013-conference-notes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/drawing-maps-for-change"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/draft-rules-and-manila-principles-1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/draft-roundtable-report-on-ai-and-banking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/draft-law-would-prohibit-showing-2018disputed-areas2019-on-maps-of-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/draft-digital-communications-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/reports/annual-report-2010-2011.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/dp-compendium"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/observer-research-foundation-shashidhar-kj-and-kashish-parpiani-july-22-2019-easing-the-us-india-divergence-on-data-localisation">
    <title>Easing the US-India divergence on data localisation</title>
    <link>https://cis-india.org/internet-governance/news/observer-research-foundation-shashidhar-kj-and-kashish-parpiani-july-22-2019-easing-the-us-india-divergence-on-data-localisation</link>
    <description>
        &lt;b&gt;Addition of data localisation to the basket of persisting trade issues warrants greater compartmentalisation and consultative approaches to US-India ties.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shashidhar KJ and Kashish Parpiani was &lt;a class="external-link" href="https://www.orfonline.org/expert-speak/easing-us-india-divergence-data-localisation-53256/"&gt;published by Observer Research Foundation&lt;/a&gt; on July 22, 2019.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Reserve Bank of India’s (RBI) finally &lt;a href="https://rbi.org.in/Scripts/FAQView.aspx?Id=130" rel="noopener" target="_blank"&gt;clarified &lt;/a&gt;its position eight months after it issued the controversial April 2018 circular mandating the storage of all payment data of Indians in the country and allowing the central bank “unfettered access”. The circular particularly aimed at US-based companies such as Mastercard, Visa, American Express, PayPal, Facebook and Google, as they scrambled to comply. The clarification was a welcome relief for companies seeking guidance on how to comply, what kind of data needs to be stored in India, and if the payment companies needed to move their processing infrastructure. Note, the RBI has yet to issue a formal directive with these clarifications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, media reports have indicated that Facebook-owned WhatsApp would &lt;a href="https://economictimes.indiatimes.com/tech/internet/local-data-storage-ready-whatsapp-to-open-payments-tap/articleshow/69966898.cms" rel="noopener" target="_blank"&gt;obey&lt;/a&gt; the RBI norm as it looks to kick off its payments business. This runs counter to what Facebook CEO Mark Zuckerberg had &lt;a href="https://www.nasdaq.com/aspx/call-transcript.aspx?StoryId=4256521&amp;amp;Title=facebook-s-fb-ceo-mark-zuckerberg-on-q1-2019-results-earnings-call-transcript" rel="noopener" target="_blank"&gt;told &lt;/a&gt;investors in April:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;em&gt;You should expect that we won’t store sensitive data in countries where it might be improperly accessed because of weak rule of law or governments that can forcibly get access to your data&lt;/em&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is still debating passing a Personal Data Protection legislation, and as such, India doesn’t have any legal safeguards protecting users’ data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This has revealed yet another faultline in the persisting trade issues between the US and India.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;India is still debating passing a Personal Data Protection legislation, and as such, India doesn’t have any legal safeguards protecting users’ data.&lt;/blockquote&gt;
&lt;h2 style="text-align: justify; "&gt;Indian data rights vs. American IPR protectionism&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;New Delhi has started to assert its right over its citizens’ data as India’s footprint on the Internet increases. Moreover, without clear guidance from Personal Data Protection legislation, there has been a glut of policy prescriptions from sector regulators. The Centre for Internet and Society &lt;a href="https://cis-india.org/internet-governance/resources/the-localisation-gambit.pdf" rel="noopener" target="_blank"&gt;published&lt;/a&gt; a paper in which it chronicles 10 policy measures for both ‘soft’ and ‘hard’ data localisation across health, telecommunications, e-commerce, insurance and others. These measures range from storing copies of specific data, local content production requirements, or imposing conditions on cross-border data transfers that act as a localisation mandate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This oversupply of policy prescriptions is leading to blurring of jurisdictions. Often, the policy measures given have many a slip between the cup and the lip. For example, one of the reasons for insisting on localisation is security, but even if companies localise data, there is no framework to access this data by the local security apparatus.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s policy thinking on the matter often begins with the idea: ‘data is the new oil.’ The thinking is that data generated by Indians should be viewed as a natural resource that must be protected by the state through localisation. This notion is &lt;a href="https://www.orfonline.org/expert-speak/indias-draft-e-commerce-policy-a-need-to-look-beyond-data-as-the-new-oil-49413/" rel="noopener" target="_blank"&gt;problematic&lt;/a&gt;. Data, unlike oil, which is found in limited quantities, has different properties. Newer ideas of regulation must be thought of and that’s where Indian policy makers have not been accommodative.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;Oversupply of policy prescriptions is leading to blurring of jurisdictions. Often, the policy measures given have many a slip between the cup and the lip.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;A gripe that US-based companies mention is that there is a distinctive domestic tilt and that company representatives have turned away from consultations as they do not serve the “national interests.” This was best exemplified in October 2018 when a closed-door discussion between the RBI and the US-India Strategic Partnership Forum (USISPF representing the interests of US companies) &lt;a href="https://economictimes.indiatimes.com/news/economy/policy/data-localisation-sparking-complaints-of-bias-us-companies-seek-12-months-time-from-rbi/articleshow/66210317.cms?from=mdr" rel="noopener" target="_blank"&gt;broke down&lt;/a&gt;and the latter accused the RBI of having a bias. During the discussions, the RBI placed a lot of emphasis on the inputs from iSPIRT (Indian Software Product Industry Roundtable), an Indian think tank which has been advocating for data protectionism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The aforementioned sentiment has been carried over to international summits. At the recently concluded G20 summit, India &lt;a href="https://www.livemint.com/news/world/india-boycotts-osaka-track-at-g20-summit-1561897592466.html" rel="noopener" target="_blank"&gt;boycotted &lt;/a&gt;the Osaka Track on the digital economy as it felt that it would undermine multilateral consensus-based decisions on trade and deny policy space for digital industrialisation. The Osaka Track pushed hard for the creation of laws which would allow data flows between countries and the removal of data localisation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s foreign secretary, Vijay Gokhale, &lt;a href="https://www.thehindu.com/news/national/on-5g-and-data-india-stands-with-developing-world-not-us-japan-at-g20/article28207169.ece" rel="noopener" target="_blank"&gt;mentioned &lt;/a&gt;that data is a new form of wealth and wanted latitude on domestic rule-making on data. And in the age of digital commerce, this may signify a broader trend of a developed-developing nations’ impasse. The tussle has now moved beyond the security angle with the United States &lt;a href="https://cis-india.org/internet-governance/blog/an-analysis-of-the-cloud-act-and-implications-for-india" rel="noopener" target="_blank"&gt;enacting &lt;/a&gt;the Clarifying Lawful Overseas Use of Data (CLOUD) Act for security agencies to procure data stored in servers regardless of whether in the US or foreign soil. With monetisation now at the core of the dispute, the discussed divergences on data localisation tie into the US’ broader, long-standing issues pertaining to US-India bilateral trade.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Divergence on data localisation issue crosses path with trade tensions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="https://ustr.gov/about-us/policy-offices/press-office/fact-sheets/2019/march/fact-sheet-2019-national-trade-estimate" rel="noopener" target="_blank"&gt;2019 National Trade Estimate&lt;/a&gt; (NTE) by the Office of the United States Trade Representative (USTR) focuses on reducing “barriers to digital trade.” Taking a tone of American stewardship on open liberal market economics, it notes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;em&gt;When governments impose unnecessary barriers to cross-border data flows or discriminate against foreign digital services, local firms are often hurt the most, as they cannot take advantage of cross-border digital services that facilitate global competitiveness&lt;/em&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At a time when the Trump administration has sought to re-calibrate America’s trade relationships via the adoption of punitive sanctions that run counter to the fundamentals of the liberal world order, the aforementioned American concern for the competitiveness of foreign nation’s local firms may seem like sardonic preaching.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;President Trump’s ‘America First’ worldview in many ways upended conventional tenets of US foreign policy. But on some fronts, it has presented opportunities for marginal establishment agendas. For instance, Trump’s heightened focus on ties with Israel and the US’ Sunni allies in the Middle East, complements the realisation of &lt;a href="https://www.google.com/search?q=neoconservatives+bolton+iran+trump&amp;amp;rlz=1C1GCEU_enIN821IN821&amp;amp;oq=neoconservatives+bolton+iran+trump&amp;amp;aqs=chrome..69i57j33.7943j0j7&amp;amp;sourceid=chrome&amp;amp;ie=UTF-8&amp;amp;safe=active" rel="noopener" target="_blank"&gt;neoconservatives’ penchant for regime change in Iran&lt;/a&gt;.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;At a time when the Trump administration has sought to re-calibrate America’s trade relationships via the adoption of punitive sanctions that run counter to the fundamentals of the liberal world order, the aforementioned American concern for the competitiveness of foreign nation’s local firms may seem like sardonic preaching.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;On Trump’s fixation with recalibrating US trade relationships on “&lt;a href="https://www.whitehouse.gov/briefings-statements/president-donald-j-trump-will-promote-worldwide-economic-growth-prosperity-g20-summit/" rel="noopener" target="_blank"&gt;fair and reciprocal&lt;/a&gt;” footing, the American trade establishment successfully addressed US’ belated concerns over absence of digital trade rules in case of the North American Free Trade Agreement (NAFTA) with Canada and Mexico. Similarly, the emerging divergences over data localisation with India are subsumed under the ongoing — albeit repeatedly stalled, US-India trade negotiations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, the NTE underscores India’s decision with regards to payment service suppliers to be part of trade barriers hampering digital commerce and US-India trade at-large.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Fixing the strained Carter &lt;em&gt;mantra&lt;/em&gt; via compartmentalisation and consultation&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India has &lt;a href="https://www.orfonline.org/expert-speak/us-recent-decisions-to-cloud-pompeos-visit-to-india-52012/" rel="noopener" target="_blank"&gt;approached&lt;/a&gt; trade talks from the standpoint of addressing the Trumpian aberration of the US pushing for reduction of its trade deficits with other countries. Whereas, USTR negotiators have approached negotiations with India with regards to, what they view as longstanding issues in bilateral trade, such as market access for dairy products and price caps on medical equipment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the past, those outstanding issues were downplayed in view of the promising long-term trajectory of US-India strategic ties. The same has come to be known as the understated dictum of the &lt;a href="https://www.cfr.org/content/publications/attachments/052416_Ayres_Testimony.pdf"&gt;Carter &lt;/a&gt;&lt;a href="https://www.cfr.org/content/publications/attachments/052416_Ayres_Testimony.pdf" rel="noopener" target="_blank"&gt;&lt;em&gt;mantra&lt;/em&gt;&lt;/a&gt; — named after former US Secretary of Defense Ashton Carter and architect of the &lt;a href="https://dod.defense.gov/Portals/1/Documents/pubs/US-IND-Fact-Sheet.pdf" rel="noopener" target="_blank"&gt;US-India Defense Technology and Trade Initiative&lt;/a&gt;. The approach encompassed the US to focus on harnessing strategic ties and not let differences on other fronts like trade to &lt;a href="https://www.orfonline.org/wp-content/uploads/2018/10/ORF_Issue_Brief_262_US_Legislature.pdf" rel="noopener" target="_blank"&gt;crowd out minimal-yet-positive developments&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In recent times, that dictum has come under strain as trade tensions have resurfaced. Cases in-point being, the Trump administration’s &lt;a href="https://indianexpress.com/article/explained/donald-trump-wilbur-ross-commerce-industry-india-us-trade-suresh-prabhu-5717901/" rel="noopener" target="_blank"&gt;recent revocation&lt;/a&gt; of India’s designation as a “beneficiary developing country” under its Generalised System of Preferences programme, and India’s &lt;a href="https://www.livemint.com/politics/policy/india-imposes-tariffs-on-28-us-goods-as-global-trade-war-heats-up-1560616982719.html" rel="noopener" target="_blank"&gt;imposition of retaliatory tariffs&lt;/a&gt; on 28 US products.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;The US-India dynamic is graduating from the erstwhile top-heavy approach based on the personal relations developed between head of states, to an institutionalised format of consultative platforms on varied bureaucratic, legislative, military, and even public-private partnership levels.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, ahead of Secretary of State Mike Pompeo’s visit to New Delhi last month, the Trump administration &lt;a href="https://thewire.in/diplomacy/us-india-h1b-visa-data-localisation" rel="noopener" target="_blank"&gt;reportedly&lt;/a&gt; mulled capping the issuance of H1B visas to about 15 percent for any country that “&lt;a href="https://thewire.in/diplomacy/us-india-h1b-visa-data-localisation" rel="noopener" target="_blank"&gt;does data localisation&lt;/a&gt;.” It bore ominous prospects for India’s &lt;a href="https://thewire.in/diplomacy/us-india-h1b-visa-data-localisation" rel="noopener" target="_blank"&gt;$150 billion IT sector&lt;/a&gt; as &lt;a href="https://thewire.in/diplomacy/us-india-h1b-visa-data-localisation" rel="noopener" target="_blank"&gt;70 percent of the 85,000 H1B visas&lt;/a&gt; issued every year go to Indians. With regards to the broader trajectory of US-India ties, the report came to be seen as another blow to the Carter &lt;em&gt;mantra&lt;/em&gt;’s prescription for compartmentalisation of issues from promising aspects of the bilateral relationship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both sides however, have attempted to temper tensions, and keep the Carter &lt;em&gt;mantra &lt;/em&gt;in place with the continued focus on evolving strategic ties — with continued impetus on US-India &lt;a href="https://timesofindia.indiatimes.com/india/india-lining-up-defence-deals-worth-10-billion-with-us-amid-trade-row/articleshow/69919916.cms" rel="noopener" target="_blank"&gt;defence trade&lt;/a&gt; and &lt;a href="https://www.hindustantimes.com/india-news/india-us-to-take-forward-talks-for-key-military-pact/story-bi2IfgMjKtKsfA2wjTqQzM.html" rel="noopener" target="_blank"&gt;force interoperability agreements&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More importantly, there seems to be an overt attempt to reinstitute a sense of compartmentalisation. For instance, Secretary Pompeo, during his visit to New Delhi &lt;a href="https://www.news18.com/news/india/mike-pompeo-in-india-live-india-us-relationship-has-made-strides-but-we-can-do-more-says-us-secy-of-state-2203957.html" rel="noopener" target="_blank"&gt;eased fears&lt;/a&gt; by denouncing reports about the US considering H1B visa caps. Whereas, India, too, has sought to institute a sense of compartmentalisation with Commerce Minister Piyush Goyal announcing that the contentious data protection issue will be &lt;a href="https://www.livemint.com/politics/policy/data-storage-rules-out-of-e-commerce-policy-1561488393145.html" rel="noopener" target="_blank"&gt;kept out of the e-commerce policy draft&lt;/a&gt;, and will be dealt with by the IT ministry instead.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lastly, the US-India dynamic is graduating from the erstwhile top-heavy approach based on the personal relations developed between head of states, to an institutionalised format of consultative platforms on varied bureaucratic, legislative, military, and even public-private partnership levels. Examples of which include, the &lt;a href="https://www.timesnownews.com/india/article/india-us-officials-to-meet-for-laying-groundwork-for-two-plus-two-dialogue-with-china-on-agenda/405609" rel="noopener" target="_blank"&gt;US-India 2+2&lt;/a&gt; consultative platform between foreign and defense portfolio chiefs, and the &lt;a href="https://www.livemint.com/industry/energy/india-us-discuss-crude-oil-price-volatility-1560179681174.html" rel="noopener" target="_blank"&gt;India-US Strategic Energy Partnership&lt;/a&gt; working groups between India’s Petroleum Minister and US Energy Secretary. The upcoming editions of these forums are set to be critical in addressing outstanding issues in the strategic realm, like India’s &lt;a href="https://www.orfonline.org/expert-speak/the-turkish-interjection-in-indo-us-relations-49800/" rel="noopener" target="_blank"&gt;purchase of the Russian S-400 systems inviting the prospect of American CAATSA sanctions&lt;/a&gt;, and India’s push for a &lt;a href="https://qz.com/india/1651932/mike-pompeos-india-visit-to-push-us-oil-and-gas-over-irans/" rel="noopener" target="_blank"&gt;gas-based economy in light of reduced oil purchases from Iran following recent tensions between Washington and Tehran&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, on easing the hardening American and Indian stances on data localisation, in addition to compartmentalisation, a consultative approach must be explored. Towards that end, the &lt;a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=188617" rel="noopener" target="_blank"&gt;India-US Commercial Dialogue and India-US CEO Forum&lt;/a&gt; could serve as appropriate starting points for a joint working group involving a diverse set of stakeholders from the public and private realm.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/observer-research-foundation-shashidhar-kj-and-kashish-parpiani-july-22-2019-easing-the-us-india-divergence-on-data-localisation'&gt;https://cis-india.org/internet-governance/news/observer-research-foundation-shashidhar-kj-and-kashish-parpiani-july-22-2019-easing-the-us-india-divergence-on-data-localisation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shashidhar KJ and Kashish Parpiani</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-07-30T01:40:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/e-governance-identity-privacy.pdf">
    <title>E-Governance, Identity &amp; Privacy</title>
    <link>https://cis-india.org/internet-governance/e-governance-identity-privacy.pdf</link>
    <description>
        &lt;b&gt;This chapter will look at different legislations, projects, and policies pertaining to e-governance and identity that India has put in place, and examine both the strengths and the weaknesses of these, through the lense of privacy.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/e-governance-identity-privacy.pdf'&gt;https://cis-india.org/internet-governance/e-governance-identity-privacy.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-09-26T06:17:03Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/e-gif-iraq-meeting">
    <title>E-Governance Interoperability Framework — Meeting in Iraq</title>
    <link>https://cis-india.org/openness/blog-old/e-gif-iraq-meeting</link>
    <description>
        &lt;b&gt;A meeting to create a plan of action for the development of e-Governance Interoperability Framework (e-GIF) in Iraq and include formulation of an e-GIF policy and technical document within the larger framework of public sector modernization, was held from 25 to 27 January 2011. Sunil Abraham was the main resource person for this meeting. &lt;/b&gt;
        
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&lt;span class="Apple-style-span"&gt;Mr. Abdul Kareem Al-Samaraii, Minister of Science and Technology and&amp;nbsp;Mr. Peter Bachelor, Deputy Country Director,&amp;nbsp;UNDP gave the opening remarks.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;span class="Apple-style-span"&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;
&lt;p style="text-align: left;"&gt;&lt;span class="Apple-style-span"&gt;&lt;span class="Apple-style-span"&gt;&lt;img src="https://cis-india.org/home-images/copy_of_egifiraqmeeting.jpg/image_preview" style="float: none;" title="EGif" class="image-inline image-inline" alt="EGif" /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&lt;span class="Apple-style-span"&gt;E-GIF Meeting Agenda,&amp;nbsp;ERBIL, 25-27 January 2011&lt;/span&gt;&lt;/h2&gt;
&lt;div&gt;
&lt;table style="text-align: center;" class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: center;"&gt;&amp;nbsp;&lt;strong&gt;Tuesday&lt;/strong&gt; 25/1/2011&amp;nbsp;&lt;/td&gt;
&lt;td style="text-align: center;"&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&lt;/td&gt;
&lt;td style="text-align: center;"&gt;
&lt;div style="text-align: left;"&gt;08:30 – 09:00&lt;/div&gt;
&lt;div style="text-align: left;"&gt;Opening Remarks&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;ul&gt;&lt;li&gt;H.E. &amp;nbsp;Mr Abdul Kareem Al-Samaraii,&amp;nbsp;Minister of Science and Technology&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Mr. Peter Bachelor/ Deputy Country Director, UNDP&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;09:00 – 10:00&lt;/div&gt;
&lt;div&gt;e-GIF overview &amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Introducing the GIF: Benefits of Interoperability for e-Governance&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;GIF Context&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;GIF Technical Content: Standard Categorisation &amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;How we can Develop Effective GIF Policy Document and GIF Action Plan: Presentation on GIF templates &amp;nbsp;(GIF text and action Plan) that required to be filled by the end of the workshop&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;10:00 – 10:30&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Coffee Break&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;10:30 – 12:00&lt;/div&gt;
&lt;div&gt;Survey and base-line for&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Map of existing and proposed e-governance and ICT4D projects.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;User Interface and accessibility&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;Storage and database schema&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;Multi-modal input and output&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Access control and security&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Network schema&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Document flow and work-flow&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Discussion on specific challenges and opportunities faced when attempting interoperability.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;12:00 – 13:30&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Discussion on the co-existence of the GIF with existing/proposed laws and policies&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;E-governance and ICT4D&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Copyright&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Patents (software only)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;FOSS/Open Standards/Open Content/Open Data&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Privacy and Data Protection&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Right to Information/Freedom of Information/Access to Information/Public Information&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;span class="Apple-style-span"&gt;13:30 – 14:30&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;Lunch Break&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;14:30 – 16:00&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Discussion on definition of “Open Standards”&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;Existing definitions of Open Standards&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;RAND, FRAND and Royalty Free&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;De Facto and De Jure Standards&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Standards Setting Organisations&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Governance of Standards&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Single Standard vs. Multiple Standards&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Relationship between FOSS and Open Standards&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Review of international best practice&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;European Union&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;US&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Brazil&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Russia&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;India&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Indonesia&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;China&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;span class="Apple-style-span"&gt;16:00 – 16:15&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;Coffee Break&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;16.15 - 17.45&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;&lt;li&gt;Discussion on degree of openness&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Hardware/Software/File Formats&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Maturity of the standard&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Adoption in Iraq&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Policy Objectives of the GIF&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Neutral playing-field / vendor independence&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Obsolescence&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Data convergence&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Cost-reduction&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Domestic ICT industry&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center;"&gt;&lt;strong&gt;Wednesday&lt;/strong&gt; 26/1/2011&amp;nbsp;&amp;nbsp;&lt;/td&gt;
&lt;td style="text-align: left;"&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center;"&gt;&amp;nbsp;&lt;/td&gt;
&lt;td style="text-align: left;"&gt;
&lt;span class="Apple-style-span"&gt;08:30 – 10:00&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Discussion on Organisational Architecture to Interoperability:&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Enterprise Architecture&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Service Oriented Architecture&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Example &amp;nbsp;on Germany’s Slandered and Architecture of E-Government Application (SAGA) that contain both the architecture and standard for interoperability / or any other relevant example&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;10.00 - 10.30&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Coffee Break&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;10.30 - 13.00&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;&lt;li&gt;Governance of the Government Interoperability Framework: Creating the GIF&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Organisational Structure: Authority/Agency/Ministerial Committee/Adjunct to the President/Prime Minister's office.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Light vs. Heavy regulation: Broad principles vs. Lists approach [Inclusion lists, exclusion lists, least common denominator approach]&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Exemptions and Limitation: Reactive vs. proactive. Formal vs. informal.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Versioning: Mechanism and time-frame for revising the GIF. Pre-determined&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Monitoring of Compliance: Agency responsible and protocol to be observed. Random vs. blanket approach. &amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Sanctions: Design of remedies and punitive measures to discourage non-compliance. &amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Incentives: Design of awards and prizes for those who comply first, most, at the least-cost, etc.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Documentation and Public Consultation: How will the process of developing, implementing and monitoring the GIF incorporate public consultation and be documented.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Capacity Building&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;span class="Apple-style-span"&gt;13.00 - 14.00&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Lunch Break&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;14.00 - 15.30&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;&lt;li&gt;Discussion on specific standards for the GIF &amp;nbsp;[categorization based on Indian GIF] with a focus on current problem areas&amp;nbsp;(G2G, G2B)&lt;/li&gt;&lt;/ul&gt;
&lt;ol&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Presentation And Archival Domain&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Data Integration Domain&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Data Interchange Domain&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;span class="Apple-style-span"&gt;15.30 - 15.45&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;&lt;li&gt;Coffee Break&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;15.45 - 17.15&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;&lt;li&gt;Discussion on specific standards for the GIF &amp;nbsp;[categorization based on Indian GIF] with a focus on (G2C) and local Governorates and emerging areas&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;
&lt;ol&gt;&lt;li&gt;Presentation And Archival Domain&amp;nbsp;&lt;/li&gt;&lt;li&gt;Data Integration Domain&amp;nbsp;&lt;/li&gt;&lt;li&gt;Data Interchange Domain&lt;/li&gt;&lt;/ol&gt;
&lt;/span&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center;"&gt;&lt;strong&gt;&amp;nbsp;Thursday&lt;/strong&gt; 27/1/2011&lt;/td&gt;
&lt;td style="text-align: left;"&gt;
&lt;span class="Apple-style-span"&gt;08.30 - 11.30&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;&amp;nbsp;Unplanned time for collaborative work on the text of the GIF&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Draft of E-GIF Action Plan &amp;nbsp;and Working Groups&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;11.30 - 12.00&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Coffee Break&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;12.00 - 14.00&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;&lt;li&gt;Review on e-governance plan of action&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Out of GIF scope&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;14.00 - 14.30&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;&lt;li&gt;Workshop Closing Session and Looking Forward&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center;"&gt;&amp;nbsp;&lt;/td&gt;
&lt;td style="text-align: center;"&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/e-gif-iraq-meeting'&gt;https://cis-india.org/openness/blog-old/e-gif-iraq-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2011-08-18T05:04:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/e-commerce_submission_by_cis.pdf-2">
    <title>E-commerce_submission_by_CIS.pdf</title>
    <link>https://cis-india.org/internet-governance/resources/e-commerce_submission_by_cis.pdf-2</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/e-commerce_submission_by_cis.pdf-2'&gt;https://cis-india.org/internet-governance/resources/e-commerce_submission_by_cis.pdf-2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>karan</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-04-10T11:34:32Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/e-commerce-submission">
    <title>E-Commerce Submission</title>
    <link>https://cis-india.org/internet-governance/resources/e-commerce-submission</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/e-commerce-submission'&gt;https://cis-india.org/internet-governance/resources/e-commerce-submission&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>karan</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-04-01T11:54:45Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/digital-review-asia-pacific-christine-apikul-e-dirap-google-hangout-open-government">
    <title>e - DIRAP Google+ Hangout: Open Government</title>
    <link>https://cis-india.org/openness/blog-old/digital-review-asia-pacific-christine-apikul-e-dirap-google-hangout-open-government</link>
    <description>
        &lt;b&gt;The e-DIRAP Hangout on Open Government was held on Thursday, 25 July 2013. It brought together nine professionals from Australia, India, Indonesia, Japan, Malaysia and the Philippines to discuss the wide spectrum of issues surrounding open government.
&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;See the original &lt;a class="external-link" href="http://digitalreview.asia/resources/e-dirap-google-hangout-on-open-government/e-dirap-google-hangout-3-open-government/"&gt;published in Digital Review Asia here&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The idea of open government has been around for hundreds of years but the contemporary use of the term is influenced by the rapid advancement of ICTs and by the open source movement. "Just as open source software allows users to change and contribute to the source code of their software, open government now means government where citizens not only have access to information, documents and proceedings, but can also become participants in a meaningful way."&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;There is now increasing pressure for governments to be more open with their digital documents and processes, and to interact with citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To assess whether your government is open, a good starting point is the Open Government Partnership minimum eligibility criteria that has four key areas:&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Fiscal transparency related to open budget system&lt;/li&gt;
&lt;li&gt;Access to information, e.g. an access to information law that guarantees the public’s right to information and access to government data.&lt;/li&gt;
&lt;li&gt;Disclosures related to elected or senior public officials, e.g. public disclosure of their income and assets.&lt;/li&gt;
&lt;li&gt;Citizen engagement.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The  panelists discussed open government initiatives in their respective   countries, the challenges they face, and open source tools for open   government.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;h3 style="text-align: justify; "&gt;Open Government Initiatives&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;India&lt;br /&gt;&lt;/b&gt;The Government of India has decided to use royalty free open standards for all e-government data. The government has also shortlisted a number of open standards. India’s data portal, data.gov.in was recently launched and the number of datasets has been increasing. In January 2013 there were 89 datasets and in half a year,this has increased to over 3,000 datasets. Forty-five government departments are involved in this initiative and six apps have been created. The Planning Commission recently had a hackathon participated by about 1,900 people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indonesia&lt;/b&gt;&lt;br /&gt;Indonesia is one of the founding governments of the Open Government Partnership.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; along with the Philippines and six other countries. The emphasis of open government in Indonesia is not only the "supply side" (i.e. government providing access to data and information). It is also looking at generating demand for open government by empowering citizens to access and analyse data and information, voice their concerns and advocate for openness in government. To empower citizens, the Government of Indonesia has a number of projects such as "Satu Layanan"&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; or "One Service", a web portal where citizens can find government information and services; “One Map”, to promote collaboration between different government ministries and agencies, and also civil society in integrating datasets; and "Lapor"&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; that allow citizens to report wrongdoings in public services using SMS, Twitter or through the website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to a research study conducted by the World Wide Web Foundation,&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; the Government of Indonesia is working on making public data available. Public data includes social - economic data, development data and census data held by the National Statistic Bureau, as well as information on how the data is obtained and measured.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The research report also found that that there is a low demand from civil society and citizens for open government and open data. Moreover, cooperation between civil society and government in the implementation of open government is not strong enough. Several donors in Indonesia have provided support to develop the capacity of civil society groups that are part of the Steering Committee of the Open Government Partnership. Hivos’ Southeast Asia Technology and Transparency Initiative&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; is working with both civil society and government in Indonesia and the Philippines to promote transparency and accountability in public institutions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Japan&lt;/b&gt;&lt;br /&gt;In Japan, the major focus is in the creation and launch of the open data portal this year. How much impact it will make and how it can be measured is a concern, and this is a worldwide challenge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Malaysia&lt;/b&gt;&lt;br /&gt;The Sinar Project&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; in Malaysia promotes transparency, governance and citizen involvement, and uses open source technology to make information accessible to Malaysian citizens. The project has learned that for countries with poor democracy like Malaysia, basic information about government is available but not easily accessible to the public. The government is not familiar with interacting with citizens especially online. Unlike places with advanced statistics and open data, open government in Malaysia is at a nascent stage and is about having information about government representatives online and what bills are being passed in parliament.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Philippines&lt;/b&gt;&lt;br /&gt;In the Philippines, President Aquino announced that the Freedom of Information Bill will be a priority bill for Congress this year, but citizens are cynical about the passing of this bill because it has been under consideration for three years. The Office of the President has received support from the World Bank last year for an Open Data Project using CKAN and the open data portal will be at http://data.gov.ph. The Philippine Government Interoperability Framework was convened last week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;PhilHealth or the Philippine Health Insurance Corporation&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; attempted to open up data, however even though there was political will to open up data, this was insufficient. A clear policy framework and change management (particularly, removing the fear of openness among employees) was needed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, PhilHealth did not have the capacity and competency to ensure that the health data released, that includes diagnosis and treatment procedures, will not be reverse engineered to identify people. Health data is particularly sensitive due to the social stigma of certain health disorders, for example, those with tuberculosis may be assumed to have HIV/AIDS. When data is opened up, there are security and privacy implications. Developing countries need help and it is important to work together to come up with policies, protocols and algorithms to protect the health privacy of citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Melbourne, Australia&lt;br /&gt;&lt;/b&gt;In Melbourne, Australia, local government efforts to engage with citizens more fully through online and offline platforms include experimenting with wiki-based policy development, smart cities initiatives and digital strategies. Through conversations with policymakers, some key themes were identified. First, openness is not the same as participation, and encouraging effective participation is a challenge. Public spaces need to be “programmed” to support participation, and opening up data is not sufficient. It is necessary to develop strategies for outreach to a diverse group and encourage substantive participation particularly from those who are not online and not as competent in data management.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secondly, because many telecommunications platforms that make data available are privately owned, there is a tension between commercial interest for secrecy and public demand to make data open. It is also a challenge for government to engage with citizens over an infrastructure that is privately owned, e.g. Facebook, Twitter and Google that place constraints on how citizens can be engaged.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Malaysia, Singapore and Thailand with high levels of digital broadband penetration and online users are not part of the Open Government Partnership despite the fact that most of the government departments and data are online. This is because these countries do not meet the minimum eligibility criteria for Open Government Partnership. For instance, they do not have freedom of the press and without it media and civil society cannot make use of the data for reporting for fear of prosecution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is also a lack of political will to disclose assets of public officials and procurement decisions.&lt;br /&gt;&lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;Challenges&lt;/span&gt;&lt;br /&gt;Open data is often associated with open government, but opening up data does not make a government open. Making data open has a set of challenges, but open government also has an important civil society component to create demand for open government and make meaningful use of the open data. There is also a private sector component that needs to be considered, particularly related to the mechanisms public participation over privately owned telecommunications infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Challenges are faced at both the supply and demand sides. From the government side, many countries do not have the capacity to interact effectively with citizens. From the citizens’ side, many countries face the low demand for open government. Yet, in the case of Malaysia, even if public demand for open government is high, the missing component is a strong and large enough civil society base that can handle and analyse data independently and question policy. Dealing with the demand when data is open is another challenge. The challenges of opening up data If the original data is not digitized, how do we ensure that it becomes part of open data as defined by the Open Knowledge Foundation.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; For countries such as Iraq that are simultaneously introducing e-government systems and open government, implementation is hampered by the lack of e-government data standards for specific domains such as human resources management or financial management.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Privacy is one of the biggest concerns that the open data and open government movements faces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Lack of exposure to privacy issues&lt;/b&gt;: Some open data activists are not aware that privacy should be an exception in disclosure requirement of government open data policies. If no public interest is served through disclosing personal information then there is no need to infringe upon the rights of individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy only for the individual&lt;/b&gt;: There is often a western notion of what constitutes privacy in which people worry about privacy infringement only at the level of the individual. But in India, if the open dataset showed HIV/AIDS prevalence at the village level that could result in stigma and discrimination of particular villages. The privacy problem exists not only at the individual level, but also at the level of family, community and geographical unit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Underestimating re-identification research&lt;/b&gt;: Today we deal with the privacy challenge by using techniques like anonymization and obfuscation, but the problem is that re-identification research is getting more sophisticated and the more datasets that people have access to and are able to overlay upon one another, the more likely it is to re-identify anonymous or obfuscated data. This is an issue that the open data movement should take seriously.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conflict with the transparency movement&lt;/b&gt;: The open data movement has not fully adopted principles from the transparency movement. This can be clearly seen in some countries where freedom of information activists are being killed or assaulted, but open data activists are usually safe because they are focused on analyzing the data that the governments have opened up. The provision of large quantities of data by government may be a distraction strategy that takes away what is important for civil society and democracy. Moreover, open data should not be the means to legitimize and increase the levels of surveillance occurring at the bottom of the pyramid. Instead, we need to encourage more eyes to watch the top of the pyramid because single actions there can have dramatic consequences for public interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For public participation in local government, FixMyStreet&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; is an open source software first developed by MySociety in the UK that allows the public to report on issues on a map. MySociety has also developed a number of other tools to help with government’s engagement with citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;OpenSpending&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; is used to visualize budget data and how tax money is being spent. This is a useful tool for transparency developed by the Open Knowledge Foundation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CKAN&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; is an open source data portal platform that many countries have used for their open data portal. This is also an Open Knowledge Foundation project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Sunlight Foundation&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; and Code for America&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; are organizations that develop a number of open source tools that can be re-used and adapted by countries in Asia and the Pacific.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A free de-identification software for automated location and removal of protected health information in free text from medical records has been developed by PhysioNet.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Strategic Alliance Against Impoverishment (SAPA) provides poverty  data on their website and maps the location of their projects.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Final Words for the Way Forward&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Make open government an election issue and elect officials that are open.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Demands for engagement may conflict with political goals of representatives in terms of the election cycle. Perhaps these open government issues need a third space to insulate them from political forces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For people interested in implementing technical solutions, it is important to also look into non-technical issues raised by the Open Government Partnership and the Declaration on Parliamentary Openness.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Make data available based on the needs of citizens and provide a platform for citizens’ feedback to inform the kinds of data to open up.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Open government should be relevant to citizens and result in improving the welfare of citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Improve citizens’ data literacy and use open data in decision-making.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Openness is only a means and in the end we need governments that are accountable, that protect the public interest, that protect the weakest members of society, and they are not automatically guaranteed through open government. We should not fetishize the means and forget the ends.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the top we need political leadership with strong inclination and will, and on the ground we need close coordination between civil society and government so that government does understand what is needed and sense what impact they can make by opening themselves up to their society or to their own operations. In the long term the key is how much the government can transform itself in terms of its own operations, and how much data they can produce in a reusable format and how much data they can use from other agencies to improve their operations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The core of open government is about partnership between government, civil society and the private sector, and this is not easy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Panelists&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Danny Butt, Research Fellow in Participatory Public Space, University of Melbourne, Australia&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sunil Abraham, Executive Director, Centre for Internet and Society, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Venkatesh Hariharan, Director, Knowledge Commons, India (previously, Head of Public Policy at Google India)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Maryati Abdullah, National Coordinator, Publish What You Pay, Indonesia (also Steering Committee Member of Open Government Partnership)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Yanuar Nugroho, Director and Expert Adviser to the Head of the President's Delivery Unit for Development Monitoring and Oversight (UKP4), Indonesia – to be confirmed&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Tomoaki Watanabe, Executive Research Fellow, Centre for Global Communications, International University of Japan (also Executive Director of Common Sphere - the host of Creative Commons Japan, and Co-founder of Open Knowledge Foundation Japan)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shita Laksmi, Program Manager, Southeast Asia Technology and Transparency Initiative, Hivos Regional Office Southeast Asia&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Alvin B. Marcelo, Co-chair, Asia eHealth Information Network &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Moderator: Khairil Yusof, Co-founder, Sinar Project, Malaysia (also e-DIRAP team member)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;e-DIRAP Hangout Coordinator: Christine Apikul&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. See 20 Basics of Open Government, http://basics.open4m.org/&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. http://www.opengovpartnership.org/eligibility&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. http://www.opengovpartnership.org&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. http://satulayanan.net&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. http://lapor.ukp.go.id; See also http://www.techinasia.com/lapor-deeper-indonesias-newest-anticorruption-weapon/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. “Even though the Law on Freedom of Information has been in place for five years and while some ministries and agencies have made data available online, it is often difficult to obtain and make use of the data due to bureaucratic procedures, charging requirements, copyright restrictions or a general reluctance to provide access to government data to external users.” World Wide Web Foundation, Open Government Data: Readiness Assessment Indonesia, 28 June 2013, http://www.webfoundation.org/2013/06/new-research-open-data-in-indonesia/&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. http://seatti.org&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. http://sinarproject.org&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. http://www.philhealth.gov.ph&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. http://okfn.org/opendata/&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. http://www.fixmystreet.com&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. http://openspending.org&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. http://ckan.org&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. http://sunlightfoundation.com/tools&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. http://codeforamerica.org/apps/&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. http://www.physionet.org/physiotools/deid/&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. http://www.sapa.or.id/&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. http://www.openingparliament.org/declaration&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/digital-review-asia-pacific-christine-apikul-e-dirap-google-hangout-open-government'&gt;https://cis-india.org/openness/blog-old/digital-review-asia-pacific-christine-apikul-e-dirap-google-hangout-open-government&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Christine Apikul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2013-09-18T10:43:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dsci-bpm-2013-conference-notes">
    <title>DSCI Best Practices Meet 2013</title>
    <link>https://cis-india.org/internet-governance/blog/dsci-bpm-2013-conference-notes</link>
    <description>
        &lt;b&gt;The DSCI Best Practices Meet 2013 was organized on July 12, 2013 at Hyatt Regency, Anna Salai in Chennai. Kovey Coles attended the meet and shares a summary of the happenings in this blog post.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last year’s annual Best Practices Meet, sponsored by the Data Security Council of India (DSCI), was held in here in Bangalore, and featured CIS associates as panelists for an agenda focused mostly around mobility in technology. This year, the event was continued in nearby Chennai, where many of India’s top stakeholders in Cyber Security came together at the Hyatt hotel to discuss the modern cyber security landscape. Several of the key points of the day emphasized how the industry realm needed to be especially keen on Cyber Security today. Early speakers explained how many Cyber-Attacks occur as opportunistic attacks on financial institutions, and that these breaches often take months to be discovered, with the discovery usually being made by a third-party. For those reasons, it was repeatedly mentioned throughout the day that modern entities must anticipate attacks as inevitable, and prepare themselves to be able to respond and successfully bounce-back.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several panelists of the event expanded upon the evolving challenges facing industries, and explained why service based industry continually grows more susceptible to Cyber-Attack. There were representatives from Microsoft, Flextronics, MyEasyDoc, and others, who explained how technological demands of modern consumers resulted inadvertently in weaker security. For example, with customers expecting real-time access to data rather than periodic data reports, i.e financial data reports, industries must now keep their data open, which weakens database security. Overall, the primary challenge faced by the industry was effectively summarized by Microsoft India CSO Ganapathi Subramaniam, stating that within web services, “Security and usability are inversely proportional.” Essentially, the more convenient a product, the less secure its infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite discussion of the difficulties facing modern producers and consumers, there were undoubtedly highlights of optimism at the conference. A presentation by event sponsor Juniper Networks shed light on practices which combat Cyber-Attackers, including rerouting perceived Distributed Denial of Service (DDoS) attacks and finger-printing suspected hackers through a series of characteristics rather than just IP addresses (these characteristics include browser version, fonts, Add-Ons, time zone, and more). Notably, there was a call for cooperation on all fronts in combatting Cyber-crime, for public-private partnerships (PPP), and many citizens stood and spoke on the behalf of civil society’s incorporation in the process as well. One speaker, Retired Brig. Abhimanyu Ghosh admirably tore down sector divisions in the face of Cyber-Security threats, saying “We all want to secure ourselves. It is not a question of industry versus government, government versus industry. Government needs industry, and industry needs government.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, a few speakers used their opportunity at the conference to highlight issues related to rights and responsibilities of both citizens and government in internet. Nikhil Moro, a scholar at the Hindu Center for Politics and Public Policy, spoke at length about the urgent condition of laws which undermine freedom of speech and freedom of expression in India, especially within while online. His talk, which occurred near the end of the event, stirred the crowd to discussion, and helped remind the attendees of the comprehensiveness of issues which demand attention in the realm of a growing internet presence.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dsci-bpm-2013-conference-notes'&gt;https://cis-india.org/internet-governance/blog/dsci-bpm-2013-conference-notes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>kovey</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-26T08:18:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/drawing-maps-for-change">
    <title>Drawing maps for change</title>
    <link>https://cis-india.org/news/drawing-maps-for-change</link>
    <description>
        &lt;b&gt;Digital maps can hold immense academic value – an article by Deepa Kurup, The Hindu, 3rd Jan, 2010.&lt;/b&gt;
        
&lt;p&gt;BANGALORE: The mash-up story is an old but compelling one, particularly when used for advocacy as in Tunisia where exile Sami Ben Gharbiais used a GoogleMaps mash-up to paint a different kind of landscape. &lt;br /&gt;So random net surfers were startled to find the Tunisian map dotted with a string of prisoner’s names, their biographies, and videos of their family members telling the story of the human rights situation in the country. &lt;br /&gt;Closer home, rights activist K. Ramnarayan is trying to do something similar. Using GPS and simple mapping technologies, Mr. Ramnarayan maps the location and extent of damage that will be created by proposed hydro-electric projects in Uttarakhand.&lt;/p&gt;
&lt;p&gt;“We knew that many projects were announced. But it was only when we began mapping, we found that the 550-odd projects were concentrated in three valleys, and could potentially ruin all the State’s rivers,” he says.&lt;/p&gt;
&lt;h3&gt;Detailed perspectives&lt;/h3&gt;
&lt;p&gt;Mr. Ramnarayan believes that mapping technology can provide detailed perspectives, enable analysis — GPS devices are easy to use and collated data can be simply added as layers to existing maps — and create better awareness by sharing data online. Using the more accurate GIS mapping can also hold immense academic value.&lt;/p&gt;
&lt;p&gt;It is this potential that “Maps for Change,” a collaborative project hosted by Bangalore-based Centre for Internet and Society (CIS) and Tactical Tech, endeavours to tap into. Anja Kovacs, a CIS fellow, believes maps are powerful, as they provide the larger picture. For instance, she says, news reports lead one to believe that protests against SEZs are isolated today. Now, put all those protests on a map, and you get the real picture! “Maps for Change” participants are involved in a slew of fascinating projects such as mapping land acquisition patterns in Bangalore, tribal displacement issues and dissident sexualities in Delhi.&lt;/p&gt;
&lt;h3&gt;Layer of information&lt;/h3&gt;
&lt;p&gt;So mapping is not a complex cartographer’s job anymore. With cheaper and more efficient GPS devices, in the market and on your cellphones, anybody can map. Pradeep B.V. of MapUnity.org, a site that lets you create your own map, says that ‘neogeographers’ are redefining online maps.&lt;/p&gt;
&lt;p&gt;Neogeographers use available online maps such as Google MyMaps or Open Street Maps to add layers of information to a typical mashup.&lt;/p&gt;
&lt;p&gt;GIS adds that critical layer of accuracy, and is essential in remote areas which are not mapped by these services. So you collect data (typically latitude, longitude and altitude information), mark your points of interest and upload this on a map, Mr. Pradeep explains.&lt;/p&gt;
&lt;p&gt;Using attributes these simple maps can be used, accurately, to tell a story and document several layers of information.&lt;/p&gt;
&lt;p&gt;Tracking changes &lt;br /&gt;Say you wish to record access to health facilities in a backward district. A GPS device helps you collate info and create a ‘schema’ of data that can be uploaded directly to any mashup. Open source tools such as JUMP or UDIG can help you work easily with GIS datasets. The map can be interactive, you can track changes and can be as dynamic as you want it to be — for instance, you upload videos of health care facilities or highlight patches of social exclusion.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.hindu.com/2010/01/03/stories/2010010360601200.htm"&gt;Link to the original article&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/drawing-maps-for-change'&gt;https://cis-india.org/news/drawing-maps-for-change&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>radha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T06:49:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/draft-rules-and-manila-principles-1">
    <title>Draft Rules and Manila Principles</title>
    <link>https://cis-india.org/internet-governance/files/draft-rules-and-manila-principles-1</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/draft-rules-and-manila-principles-1'&gt;https://cis-india.org/internet-governance/files/draft-rules-and-manila-principles-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Akriti Bopanna and Gayatri Puthran</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-10-13T05:45:08Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/draft-roundtable-report-on-ai-and-banking">
    <title>Draft Roundtable Report on AI and Banking</title>
    <link>https://cis-india.org/internet-governance/files/draft-roundtable-report-on-ai-and-banking</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/draft-roundtable-report-on-ai-and-banking'&gt;https://cis-india.org/internet-governance/files/draft-roundtable-report-on-ai-and-banking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-03-11T14:56:31Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/draft-law-would-prohibit-showing-2018disputed-areas2019-on-maps-of-india">
    <title>Draft Law Would Prohibit Showing ‘Disputed Areas’ on Maps of India   </title>
    <link>https://cis-india.org/a2k/blogs/draft-law-would-prohibit-showing-2018disputed-areas2019-on-maps-of-india</link>
    <description>
        &lt;b&gt;Maps that label geographic areas of conflict as “disputed” territories in India could put one behind bars for seven years with 1B Indian Rupees (US$15M) penalty if a recently proposed bill becomes law.&lt;/b&gt;
        &lt;p&gt;The article was published in &lt;a class="external-link" href="https://globalvoices.org/2016/05/11/draft-law-would-prohibit-showing-disputed-areas-on-maps-of-india/"&gt;Global Voices&lt;/a&gt; on May 11, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Kisabur_Ohara_Europe_and_Asia_Octopus_Map_1904_Cornell_CUL_PJM_1145_01.jpg/@@images/6df7e103-7bad-43bd-9e15-5ff50cfb63ca.jpeg" alt="Map" class="image-inline" title="Map" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The controversial bill, also known as &lt;a href="http://mha.nic.in/sites/upload_files/mha/files/GeospatialBill_05052016_eve.pdf" target="_blank"&gt;Geospatial Information Regulation Bill 2016&lt;/a&gt; would make it illegal to “depict, disseminate, publish or distribute any wrong or false topographic information of India including international boundaries through internet platforms or online services or in any electronic or physical form.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If approved, it could put large corporations like Google (with its Google map), free and open source projects like Wikipedia and Open Street Map, and several other organizations in trouble for showing areas of conflict as disputed. Pakistan-Occupied Kashmir (PoK) and Arunachal Pradesh near the China border are two well-known examples of such areas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Map.jpg/@@images/42979426-5f02-49c7-9ce4-ac439490abe0.jpeg" alt="Map" class="image-inline" title="Map" /&gt;&lt;/p&gt;
&lt;p&gt;The Indian government ruled by &lt;a href="https://en.wikipedia.org/wiki/Bharatiya_Janata_Party"&gt;Bharatiya Janata Part&lt;/a&gt;y (BJP) under the leadership of Prime Minister Narendra Modi has been quite &lt;a href="http://economictimes.indiatimes.com/news/politics-and-nation/7-year-jail-rs-100-crore-fine-soon-for-showing-pok-arunachal-as-disputed/articleshow/52117889.cms?utm_source=facebook.com&amp;amp;utm_medium=referral&amp;amp;utm_campaign=ETFBMain&amp;amp;fb_action_ids=10207845600891648&amp;amp;fb_action_types=og.shares" target="_blank"&gt;critical&lt;/a&gt; of the depiction of the PoK and China border in Arunachal Pradesh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If passed in the parliament as law, it could prevent Indians and foreigners, government employees and people traveling in ships and aircrafts that are registered in India, to acquire geospatial imagery or data. To acquire such data, one needs to obtain &lt;a href="http://forum.openstreetmap.org/viewtopic.php?id=54512" target="_blank"&gt;permissions&lt;/a&gt; from the security vetting authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In recent years, the Indian government has targeted numerous foreign publications including &lt;a href="http://www.bbc.com/news/world-asia-india-32408547" target="_blank"&gt;Al Jazeera&lt;/a&gt; for showing distorted maps of India that excluded parts of the state of Jammu and Kashmir and even another state Arunachal Pradesh. While the bill does not explicitly mention these efforts, it seems to fall in line with these previous attempts to control the free flow of geospatial information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A &lt;a href="http://www.medianama.com/2016/05/223-india-draft-mapping-bill/" target="_blank"&gt;news article&lt;/a&gt; about the proposed bill published on the portal &lt;em&gt;MediaNama&lt;/em&gt; explains how the potential law could affect map portals like Open Street Map and Google Maps, taxi, e-commerce and public safety sites and many other services that allow marking and sharing coordinates. “Most digital photographs contain location meta-data, and by sharing your photos online, you’re adding to a repository of data related to man-made phenomenon,” suggests the same article. Open data advocates also have published list of 25 different services, seven major news portals, and 14 nonprofits that would be &lt;a href="https://datameet.hackpad.com/The-Geospatial-Information-Regulation-Bill-2016-zJwgcQaIvBq" target="_blank"&gt;affected&lt;/a&gt; if the bill is approved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Open Data community of India also has come up with a campaign “&lt;a href="http://savethemap.in/" target="_blank"&gt;SaveTheMap&lt;/a&gt;” to draft a &lt;a href="https://datameet.hackpad.com/The-Geospatial-Information-Regulation-Bill-2016-zJwgcQaIvBq" target="_blank"&gt;request&lt;/a&gt; to the government to not pass the bill. The draft request states:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;span class="i author-p-203738"&gt;Request for comments / suggestions on draft “The Geospatial Information Regulation Bill, 2016” To regulate the acquisition, dissemination, publication and distribution of geospatial information of India which is likely to affect the security, sovereignty and integrity of India, a draft “The Geospatial Information Regulation Bill, 2016” has been prepared. Copy of the draft “The Geospatial Information Regulation Bill, 2016” is attached herewith for comments/suggestions. The comments/suggestions on the draft Bill may be forwarded to the Joint Secretary (Internal Security-I), Ministry of Home Affairs, North Block, New Delhi at email id: jsis@nic.in within 30 days.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;There has been a lot of discussion with hashtag &lt;a href="https://twitter.com/hashtag/GeoSpatialBill?src=hash" target="_blank"&gt;#GeoSpatialBill&lt;/a&gt; and humorous comments on social media:&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Tweet.png/@@images/19beaa80-8798-4cdd-bac1-57e3d3902f76.png" alt="Tweet" class="image-inline" title="Tweet" /&gt;&lt;/p&gt;
&lt;p&gt;Many have already started tweeting with the hashtag &lt;a href="https://twitter.com/hashtag/savethemap?src=hash" target="_blank"&gt;#savethemap&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_Tweet.png/@@images/fdffb87a-15c9-4509-a6fd-3c679d104f12.png" alt="Tweet" class="image-inline" title="Tweet" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_Tweet.png/@@images/e8ac7b4c-2cf1-4f99-a7a9-59340749e155.png" alt="Tweet" class="image-inline" title="Tweet" /&gt;&lt;/p&gt;
&lt;p&gt;Twitter user Prasanto Roy explained the implications of geospatial bill for various companies including Google, Uber and Open street maps:&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy4_of_Tweet.png" alt="Tweet" class="image-inline" title="Tweet" /&gt;&lt;/p&gt;
&lt;p&gt;Here's what other experts have to say:&lt;/p&gt;
&lt;p&gt;Arup. R writes in &lt;a href="http://geospatialworld.net/Professional/ViewBlog.aspx?id=477&amp;amp;utm_content=bufferfeba5&amp;amp;utm_medium=social&amp;amp;utm_source=twitter.com&amp;amp;utm_campaign=buffer" target="_blank"&gt;Geospatial World&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;Arup. R writes in &lt;a href="http://geospatialworld.net/Professional/ViewBlog.aspx?id=477&amp;amp;utm_content=bufferfeba5&amp;amp;utm_medium=social&amp;amp;utm_source=twitter.com&amp;amp;utm_campaign=buffer" target="_blank"&gt;Geospatial World&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p style="text-align: justify; "&gt;This Act needs to be dropped. In its attempt to cover all bases it has been made so broadband and all encompassing that it may actually impede the progress of work on Geospatial systems and therefore on key Government programmes and projects. The Act does not take into account the fact that with the advent of the Cloud, Data as a Service, Software as a Service and Platform as a Service there is no need for ‘persons’ to possess data. They can just access data, do their work and retain only the final results. This Act does not, in fact cannot, even begin to comprehend the paradigm shift in geospatial technologies which makes it a non-starter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India does need a Geospatial Information Act, but it has to be an enabling and encouraging Act that makes for faster and better implementation of programmes, not a regressive and punitive Act as the proposed one.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Devdutta Tengshe writes about the overreaching ambit of Geospatial bill on &lt;a href="https://medium.com/@devdattat/problems-with-the-geospatial-information-regulation-bill-a19fa810983c#.8ivc9a2j8" target="_blank"&gt;Medium&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p style="text-align: justify; "&gt;Worst of all, it (the bill) is trying to implement Security by Obscurity, which is expecting the country to become secure by hiding information from its citizens. This is dangerous, because the real mischief creators, be they terrorists, Foreign government agencies, or domestic criminals, will most likely have access to kind of data from foreign sources, and will not even think about getting permits and licenses from these Indian Authorities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Cyber law expert Pavan Duggal told &lt;em&gt;&lt;a href="http://thewire.in/2016/05/08/draft-geospatial-bill-criticised-by-cyber-law-experts-34616/" target="_blank"&gt;The Wire&lt;/a&gt;&lt;/em&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The draft legislation has the intrinsic problem that it has been given extra-territorial applicability in terms of jurisdiction. It is applicable to any person anywhere in the world. We have historically seen that such jurisdiction does not work well in practical terms. What if global players do not want to take your licence or subject themselves to your jurisdiction?&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Duggal further spoke about how the law could impact the growth of e-commerce and m-commerce in India.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Under this law, Google Maps will be illegal without a licence, which means that all mobile or e-commerce applications working on Google Maps will also become illegal. The licence will also only be applicable to the concerned person. So if I am a taxi aggregator like Ola or Uber, I will have to get a separate licence over and above what Google Map has.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="http://indianexpress.com/article/opinion/editorials/india-map-100-crore-fine-7-years-jail-2790822/" target="_blank"&gt;&lt;em&gt;Indian Express&lt;/em&gt; &lt;/a&gt;calls the Geospatial bill a death note for Cartography:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p style="text-align: justify; "&gt;The draft Geospatial Information Regulation Bill of 2016 is so perfectly ridiculous that one can only hope that it falls off the map before it can be tabled in the House. Publishers the world over have learned, to their bewildered amusement, that India censors maps of itself. Now, to strike fear into their anti-national gizzards, the government has invoked an official map censor, a babu-led organisation whose prior permission will be required to publish geospatial information, which is newspeak for maps. Failure to correctly depict the borders of India could attract a fine of up to Rs 100 crore, before the poor offending bozo is dragged away to the cooler for seven years. With this draft, the government has embarked on a journey without maps, which must rapidly become directionless.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Not the first time around?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, this clearly isn't the first time that services such as Google Maps have come under the federal scanner in India. In 2014, India's prime investigation agency Central Bureau of Investigation (CBI) had launched a probe into Google Maps’ irregularities in &lt;em&gt;Mapathon 2013&lt;/em&gt; and had accused the company of running the competition without procuring proper governmental permissions. But the agency had called off the case citing lack of ‘adequate evidence to corroborate the allegations’.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/draft-law-would-prohibit-showing-2018disputed-areas2019-on-maps-of-india'&gt;https://cis-india.org/a2k/blogs/draft-law-would-prohibit-showing-2018disputed-areas2019-on-maps-of-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-05-15T13:05:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights">
    <title>Draft International Principles on Communications Surveillance and Human Rights</title>
    <link>https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights</link>
    <description>
        &lt;b&gt;These principles were developed by Privacy International and the Electronic Frontier Foundation and seek to define an international standard for the surveillance of communications. The Centre for Internet and Society has been contributing feedback to the principles. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The principles are still in draft form. The most recent version can be accessed &lt;a class="external-link" href="http://necessaryandproportionate.net"&gt;here&lt;/a&gt;. &lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Our goal is that these principles will provide civil society groups, industry, and governments with a framework against which we can evaluate whether current or proposed surveillance laws and practices are consistent with human rights. We are concerned that governments are failing to develop legal frameworks to adhere to international human rights and adequately protect communications privacy, particularly in light of innovations in surveillance laws and techniques.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These principles are the outcome of a consultation with experts from civil society groups and industry across the world. It began with a meeting in Brussels in October 2012 to address shared concerns relating to the global expansion of government access to communications. Since the Brussels meeting we have conducted further consultations with international experts in communications surveillance law, policy and technology.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We are now launching a global consultation on these principles. Please send us comments and suggestions by January 3rd 2013, by emailing rights (at) eff (dot) org.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Preamble&lt;/b&gt;&lt;br /&gt;Privacy is a fundamental human right, and is central to the maintenance of democratic societies. It is essential to human dignity and it reinforces other rights, such as freedom of expression and association, and is recognised under international human rights law.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; Activities that infringe on the right to privacy, including the surveillance of personal communications by public authorities, can only be justified where they are necessary for a legitimate aim, strictly proportionate, and prescribed by law.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before public adoption of the Internet, well-established legal principles and logistical burdens inherent in monitoring communications generally limited access to personal communications by public authorities. In recent decades, those logistical barriers to mass surveillance have decreased significantly. The explosion of digital communications content and information about communications, or “communications metadata”, the falling cost of storing and mining large sets of data, and the commitment of personal content to third party service providers make surveillance possible at an unprecedented scale.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While it is universally accepted that access to communications content must only occur in exceptional situations, the frequency with which public authorities are seeking access to information about an individual’s communications or use of electronic devices is rising dramatically—without adequate scrutiny. &lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; When accessed and analysed, communications metadata may create a profile of an individual's private life, including medical conditions, political and religious viewpoints, interactions and interests, disclosing even greater detail than would be discernible from the content of a communication alone. &lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; Despite this, legislative and policy instruments often afford communications metadata a lower level of protection and do not place sufficient restrictions on how they can be subsequently used by agencies, including how they are data-mined, shared, and retained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is therefore necessary that governments, international organisations, civil society and private service providers articulate principles establishing the minimum necessary level of protection for digital communications and communications metadata (collectively "information") to match the goals articulated in international instruments on human rights— including a democratic society governed by the rule of law. The purpose of these principles is to:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Provide guidance for legislative changes and advancements related to communications and   communications metadata to ensure that pervasive use of modern  communications technology does not result in an erosion of privacy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Establish appropriate      safeguards to regulate access by public authorities (government agencies,      departments, intelligence services or law enforcement agencies) to      communications and communications metadata about an individual’s use of an      electronic service or communication media. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;We call on governments to establish stronger protections as required by their constitutions and human rights obligations, or as they recognize that technological changes or other factors require increased protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These principles focus primarily on rights to be asserted against state surveillance activities. We note that governments are required not only to respect human rights in their own conduct, but to protect and promote the human rights of individuals in general.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; Companies are required to follow data protection rules and yet are also compelled to respond to lawful requests. Like other initiatives,&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; we hope to provide some clarity by providing the below principles on how state surveillance laws must protect human rights.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;The Principles&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legality&lt;/b&gt;: Any limitation to the right to privacy must be prescribed by law. Neither the Executive nor the Judiciary may adopt or implement a measure that interferes with the right to privacy without a previous act by the Legislature that results from a comprehensive and participatory process. Given the rate of technological change, laws enabling limitations on the right to privacy should be subject to periodic review by means of a participatory legislative or regulatory process&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legitimate Purpose&lt;/b&gt;: Laws should only allow access to communications or communications metadata by authorised public authorities for investigative purposes and in pursuit of a legitimate purpose, consistent with a free and democratic society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Necessity&lt;/b&gt;: Laws allowing access to communications or communications metadata by authorised public authorities should limit such access to that which is strictly and demonstrably necessary, in the sense that an overwhelmingly positive justification exists, and justifiable in a democratic society in order for the authority to pursue its legitimate purposes, and which the authority would otherwise be unable to pursue. The onus of establishing this justification, in judicial as well as in legislative processes, is on the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Adequacy&lt;/b&gt;: Public authorities should restrain themselves from adopting or implementing any measure of intrusion allowing access to communications or communications metadata that is not appropriate for fulfillment of the legitimate purpose that justified establishing that measure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Competent Authority&lt;/b&gt;: Authorities capable of making determinations relating to communications or communications metadata must be competent and must act with independence and have adequate resources in exercising the functions assigned to them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Proportionality&lt;/b&gt;: Public authorities should only order the preservation and access to specifically identified, targeted communications or communications metadata on a case-by-case basis, under a specified legal basis. Competent authorities must ensure that all formal requirements are fulfilled and must determine the validity of each specific attempt to access or receive communications or communications metadata, and that each attempt is proportionate in relation to the specific purposes of the case at hand. Communications and communications metadata are inherently sensitive and their acquisition should be regarded as highly intrusive. As such, requests should &lt;b&gt;at a minimum&lt;/b&gt; establish a) that there is a very high degree of probability that a serious crime has been or will be committed; b) and that evidence of such a crime would be found by accessing the communications or communications metadata sought; c) other less invasive investigative techniques have been exhausted; and d) that a plan to ensure that the information collected will be only that information reasonably related to the crime and that any excess information collected will be promptly destroyed or returned. Neither the scope of information types, the number or type of persons whose information is sought, the amount of data sought, the retention of that data held by the authorities, nor the level of secrecy afforded to the request should go beyond what is demonstrably necessary to achieve a specific investigation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Due process&lt;/b&gt;: Due process requires that governments must respect and guarantee an individual’s human rights, that any interference with such rights must be authorised in law, and that the lawful procedure that governs how the government can interfere with those rights is properly enumerated and available to the general public.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;While criminal investigations and other considerations of public security and safety may warrant limited access to information by public authorities, the granting of such access must be subject to guarantees of procedural fairness. Every request for access should be subject to prior authorisation by a competent authority, except when there is imminent risk of danger to human life. &lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;User notification&lt;/b&gt;: Notwithstanding the notification and transparency requirements that governments should bear, service providers should notify a user that a public authority has requested his or her communications or communications metadata with enough time and information about the request so that a user may challenge the request. In specific cases where the public authority wishes to delay the notification of the affected user or in an emergency situation where sufficient time may not be reasonable, the authority should be obliged to demonstrate that such notification would jeopardize the course of investigation to the competent judicial authority reviewing the request. In such cases, it is the responsibility of the public authority to notify the individual affected and the service provider as soon as the risk is lifted or after the conclusion of the investigation, whichever is sooner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Transparency about use of government surveillance&lt;/b&gt;: The access capabilities of public authorities and the process for access should be prescribed by law and should be transparent to the public. The government and service providers should provide the maximum possible transparency about the access by public authorities without imperiling ongoing investigations, and with enough information so that individuals have sufficient knowledge to fully comprehend the scope and nature of the law, and when relevant, challenge it. Service providers must also publish the procedure they apply to deal with data requests from public authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Oversight&lt;/b&gt;: An independent oversight mechanism should be established to ensure transparency of lawful access requests. This mechanism should have the authority to access information about public authorities' actions, including, where appropriate, access to secret or classified information, to assess whether public authorities are making legitimate use of their lawful capabilities, and to publish regular reports and data relevant to lawful access. This is in addition to any oversight already provided through another branch of government such as parliament or a judicial authority. This mechanism must provide – at a minimum – aggregate information on the number of requests, the number of requests that were rejected, and a specification of the number of requests per service provider and per type of crime. &lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Integrity of communications and systems&lt;/b&gt;: It is the responsibility of service providers to transmit and store communications and communications metadata securely and to a degree that is minimally necessary for operation. It is essential that new communications technologies incorporate security and privacy in the design phases. In order, in part, to ensure the integrity of the service providers’ systems, and in recognition of the fact that compromising security for government purposes almost always compromises security more generally, governments shall not compel service providers to build surveillance or monitoring capability into their systems. Nor shall governments require that these systems be designed to collect or retain particular information purely for law enforcement or surveillance purposes. Moreover, &lt;i&gt;a priori&lt;/i&gt; data retention or collection should never be required of service providers and orders for communications and communications metadata preservation must be decided on a case-by-case basis. Finally, present capabilities should be subject to audit by an independent public oversight body.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguards for international cooperation&lt;/b&gt;: In response to changes in the flows of information and the technologies and services that are now used to communicate, governments may have to work across borders to fight crime. Mutual legal assistance treaties (MLATs) should ensure that, where the laws of more than one state could apply to communications and communications metadata, the higher/highest of the available standards should be applied to the data. Mutual legal assistance processes and how they are used should also be clearly documented and open to the public. The processes should distinguish between when law enforcement agencies can collaborate for purposes of intelligence as opposed to sharing actual evidence. Moreover, governments cannot use international cooperation as a means to surveil people in ways that would be unlawful under their own laws. States must verify that the data collected or supplied, and the mode of analysis under MLAT, is in fact limited to what is permitted. In the absence of an MLAT, service providers should not respond to requests of the government of a particular country requesting information of users if the requests do not include the same safeguards as providers would require from domestic authorities, and the safeguards do not match these principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguards against illegitimate access&lt;/b&gt;: To protect individuals against unwarranted attempts to access communications and communications metadata, governments should ensure that those authorities and organisations who initiate, or are complicit in, unnecessary, disproportionate or extra-legal interception or access are subject to sufficient and significant dissuasive penalties, including protection and rewards for whistleblowers, and that individuals affected by such activities are able to access avenues for redress. Any information obtained in a manner that is inconsistent with these principles is inadmissible as evidence in any proceeding, as is any evidence derivative of such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cost of surveillance&lt;/b&gt;: The financial cost of providing access to user data should be borne by the public authority undertaking the investigation. Financial constraints place an institutional check on the overuse of orders, but the payments should not exceed the service provider’s actual costs for reviewing and responding to orders, as such would provide a perverse financial incentive in opposition to user’s rights.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Signatories&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Organisations&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Article 19 (International)&lt;/li&gt;
&lt;li&gt;Bits of Freedom (Netherlands)&lt;/li&gt;
&lt;li&gt;Center for Internet &amp;amp;      Society India (CIS India)&lt;/li&gt;
&lt;li&gt;Derechos Digitales (Chile)&lt;/li&gt;
&lt;li&gt;Electronic Frontier Foundation      (International)&lt;/li&gt;
&lt;li&gt;Privacy International      (International)&lt;/li&gt;
&lt;li&gt;Samuelson-Glushko Canadian      Internet Policy and Public Interest Clinic (Canada)&lt;/li&gt;
&lt;li&gt;Statewatch (UK)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Individuals&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Renata Avila, human rights      lawyer (Guatemala)&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Footnotes&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]For more information about the      background to these principles and the process undertaken, see      https://www.privacyinternational.org/blog/towards-international-principles-on-communications-surveillance&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]Universal Declaration of Human      Rights Article 12, United Nations Convention on Migrant Workers Article      14, UN Convention of the Protection of the Child Article 16, International      Covenant on Civil and Political Rights, International Covenant on Civil      and Political Rights Article 17; regional conventions including Article 10      of the African Charter on the Rights and Welfare of the Child, Article 11      of the American Convention on Human Rights, Article 4 of the African Union      Principles on Freedom of Expression, Article 5 of the American Declaration      of the Rights and Duties of Man, Article 21 of the Arab Charter on Human      Rights, and Article 8 of the European Convention for the Protection of      Human Rights and Fundamental Freedoms; Johannesburg Principles on National      Security, Free Expression and Access to Information, Camden Principles on      Freedom of Expression and Equality.&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]Martin Scheinin, “Report of the      Special Rapporteur on the promotion and protection of human rights and      fundamental freedoms while countering terrorism,” p11, available at &lt;a href="http://www2.ohchr.org/english/issues/terrorism/rapporteur/docs/A_HRC_13_37_AEV.pdf"&gt;http://www2.ohchr.org/english/issues/terrorism/rapporteur/docs/A_HRC_13_37_AEV.pdf&lt;/a&gt;.      See also General Comments No. 27, Adopted by The Human Rights Committee      Under Article 40, Paragraph 4, Of The International Covenant On Civil And      Political Rights, CCPR/C/21/Rev.1/Add.9, November 2, 1999, available at &lt;a href="http://www.unhchr.ch/tbs/doc.nsf/0/6c76e1b8ee1710e380256824005a10a9?Opendocument"&gt;http://www.unhchr.ch/tbs/doc.nsf/0/6c76e1b8ee1710e380256824005a10a9?Opendocument&lt;/a&gt;.&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]Communications metadata may      include information about our identities (subscriber information, device      information), interests, including medical conditions, political and      religious viewpoints (websites visited, books and other materials read,      watched or listened to, searches conducted, resources used), interactions      (origins and destinations of communications, people interacted with,      friends, family, acquaintances), location (places and times, proximities      to others); in sum, logs of nearly every action in modern life, our mental      states, interests, intentions, and our innermost thoughts.&lt;br /&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]For example, in the United      Kingdom alone, there are now approximately 500,000 requests for      communications metadata every year, currently under a self-authorising      regime for law enforcement agencies, who are able to authorise their own      requests for access to information held by service providers. Meanwhile,      data provided by Google’s Transparency reports shows that requests for      user data from the U.S. alone rose from 8888 in 2010 to 12,271 in 2011.&lt;br /&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]See as examples, a review of      Sandy Petland’s work, ‘Reality Mining’, in MIT’s Technology Review, 2008,      available at &lt;a href="http://www2.technologyreview.com/article/409598/tr10-reality-mining/"&gt;http://www2.technologyreview.com/article/409598/tr10-reality-mining/&lt;/a&gt; and also see Alberto Escudero-Pascual and Gus Hosein, ‘Questioning lawful      access to traffic data’, Communications of the ACM, Volume 47 Issue 3,      March 2004, pages 77 - 82.&lt;br /&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]Report of the UN Special      Rapporteur on the promotion and protection of the right to freedom of      opinion and expression, Frank La Rue, May 16 2011, available at &lt;a href="http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/a.hrc.17.27_en.pdf"&gt;http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/a.hrc.17.27_en.pdf&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]The Global Network Initiative      establishes standards to help the ICT sector protect the privacy and free      expression of their users. See &lt;a href="http://www.globalnetworkinitiative.org/"&gt;http://www.globalnetworkinitiative.org/&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]As defined by international and      regional conventions mentioned above.&lt;br /&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]Where judicial review is waived      in such emergency cases, a warrant must be retroactively sought within 24      hours.&lt;br /&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]One example of such a report is      the US Wiretap report, published by the US Court service. Unfortunately      this applies only to interception of communications, and not to access to      communications metadata. See &lt;a href="http://www.uscourts.gov/Statistics/WiretapReports/WiretapReport2011.aspx"&gt;http://www.uscourts.gov/Statistics/WiretapReports/WiretapReport2011.aspx&lt;/a&gt;.      The UK Interception of Communications Commissioner publishes a report that      includes some aggregate data but it is does not provide sufficient data to      scrutinise the types of requests, the extent of each access request, the      purpose of the requests, and the scrutiny applied to them. See &lt;a href="http://www.intelligencecommissioners.com/sections.asp?sectionID=2&amp;amp;type=top"&gt;http://www.intelligencecommissioners.com/sections.asp?sectionID=2&amp;amp;type=top&lt;/a&gt;.&lt;/p&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights'&gt;https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T15:55:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/draft-digital-communications-policy">
    <title>Draft Digital Communications Policy</title>
    <link>https://cis-india.org/internet-governance/files/draft-digital-communications-policy</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/draft-digital-communications-policy'&gt;https://cis-india.org/internet-governance/files/draft-digital-communications-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Gurshabad Grover</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-06-07T02:02:29Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/reports/annual-report-2010-2011.pdf">
    <title>Draft Annual Report (2010-11)</title>
    <link>https://cis-india.org/about/reports/annual-report-2010-2011.pdf</link>
    <description>
        &lt;b&gt;This is the draft of the 2010-11 Annual Report.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/reports/annual-report-2010-2011.pdf'&gt;https://cis-india.org/about/reports/annual-report-2010-2011.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-10-21T23:55:55Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/dp-compendium">
    <title>DP Compendium</title>
    <link>https://cis-india.org/internet-governance/files/dp-compendium</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/dp-compendium'&gt;https://cis-india.org/internet-governance/files/dp-compendium&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-05-31T16:00:24Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
