<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 361 to 375.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-april-10-2017-privacy-in-the-age-of-big-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/buzzfeednews-pranav-dixit-april-4-2017-indias-national-id-program-may-be-turning-the-country-into-a-surveillance-state"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindustan-times-pranesh-prakash-april-3-2017-aadhaar-marks-a-fundamental-shift-in-citizen-state-relations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/indian-express-nishant-shah-april-2-2017-digital-native-you-can-check-out-you-can-never-leave"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hindu-businessline-march-31-2017-sunil-abraham-its-the-technology-stupid"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/march-2017-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/files/talk-by-anubha-sinha-on-open-access-in-jnu"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/financial-times-march-27-2017-amy-kazmin-indias-biometric-id-scans-make-sci-fi-a-reality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/huffington-post-rimin-dutt-ivan-mehta-march-24-2017-why-we-should-all-worry-about-the-mandatory-imposition-of-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/evaluating-safety-buttons-on-mobile-devices-preview"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/benefits-harms-rights-and-regulation-a-survey-of-literature-on-big-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/indian-express-nishant-shah-february-19-2017-digital-native-who-will-watch-the-watchman"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-april-10-2017-privacy-in-the-age-of-big-data">
    <title>Privacy in the Age of Big Data</title>
    <link>https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-april-10-2017-privacy-in-the-age-of-big-data</link>
    <description>
        &lt;b&gt;Personal data is freely accessible, shared and even sold, and those to whom this information belongs have little control over its flow.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.asianage.com/india/all-india/100417/privacy-in-the-age-of-big-data.html"&gt;Asian Age&lt;/a&gt; on April 10, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;In 2011 it was estimated that the quantity of data produced globally surpassed 1.8 zettabyte. By 2013, it had increased to 4 zettabytes. This is a result of digital services which involve constant data trails left behind by human activity. This expansion in the volume, velocity, and variety of data available, together with the development of innovative forms of statistical analytics on the data collected, is generally referred to as “Big Data”. Despite significant (though largely unrealised) promises about Big Data, which range from improved decision-making, increased efficiency and productivity to greater personalisation of services, concerns remain about the impact of such datafication of all human activity on an individual’s privacy. Privacy has evolved into a sweeping concept, including within its scope matters pertaining to control over one’s body, physical space in one’s home, protection from surveillance, and from search and seizure, protection of one’s reputation as well as one’s thoughts. This generalised and vague conception of privacy not only comes with great judicial discretion, it also thwarts a fair understanding of the subject. Robert Post called privacy a concept so complex and “entangled in competing and contradictory dimensions, so engorged with various and distinct meanings”, that he sometimes “despairs whether it can be usefully addressed at all”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This also leaves the idea of privacy vulnerable to considerable suspicion and ridicule. However, while there is a lack of clarity over the exact contours of what constitutes privacy, there is general agreement over its fundamental importance to our ability to lead whole lives. In order to understand the impact of datafied societies on privacy, it is important to first delve into the manner in which we exercise our privacy. The ideas of privacy and data management that are prevalent can be traced to the Fair Information Practice Principles (FIPP). These principles are the forerunners of most privacy regimes internationally, such as the OECD Privacy Guidelines, APEC Framework, or the nine National Privacy Principles articulated by the Justice A.P. Shah Committee Report. All of these frameworks have rights to notice, consent and correction, and how the data may be used, as their fundamental principles. It makes the data subject to the decision-making agent about where and when her/his personal data may be used, by whom, and in what way. The individual needs to be notified and his consent obtained before his personal data is used. If the scope of usage extends beyond what he has agreed to, his consent will be required for the increased scope.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In theory, this system sounds fair. Privacy is a value tied to the personal liberty and dignity of an individual. It is only appropriate that the individual should be the one holding the reins and taking the large decisions about the use of his personal data. This makes the individual empowered and allows him to weigh his own interests in exercising his consent. The allure of this paradigm is that in one elegant stroke, it seeks to ensure that consent is informed and free and also to implement an acceptable trade-off between privacy and competing concerns. This approach worked well when the number of data collectors were less and the uses of data was narrower and more defined. Today’s infinitely complex and labyrinthine data ecosystem is beyond the comprehension of most ordinary users. Despite a growing willingness to share information online, most people have no understanding of what happens to their data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The quantity of data being generated is expanding at an exponential rate. From smartphones and televisions, trains and airplanes, sensor-equipped buildings and even the infrastructures of our cities, data now streams constantly from almost every sector and function of daily life, “creating countless new digital puddles, lakes, tributaries and oceans of information”. The inadequacy of the regulatory approaches and the absence of a comprehensive data protection regulation is exacerbated by the emergence of data-driven business models in the private sector and the adoption of data-driven governance approach by the government. The Aadhaar project, with over a billion registrants, is intended to act as a platform for a number of digital services, all of which produce enormous troves of data. The original press release by the Central Government reporting the approval by the Cabinet of Ministers of the Digital India programme, speaks of “cradle to grave” digital identity as one of its vision areas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the very idea of the government wanting to track its citizens’ lives from cradle to grave is creepy enough in itself, let us examine for a minute what this form of datafied surveillance will entail. A host of schemes under Digital India shall collect and store information through the life cycle of an individual. The result, as we can see, is building databases on individuals, which when combined, will provide a 360 degree view into the lives of individuals. Alongside the emergence of India Stack, a set of APIs built on top of the Aadhaar, conceptualised by iSPIRT, a consortium of select IT companies from India, to be deployed and managed by several agencies, including the National Payments Corporation of India, promises to provide a platform over which different private players can build their applications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The sum of these interconnected parts will lead to a complete loss of anonymity, greater surveillance and impact free speech and individual choice. The move towards a cashless economy — with sharp nudges from the government — could lead to lack of financial agencies in case of technological failures as has been the case in experiments with digital payments in Africa. Lack of regulation in emerging data driven sectors such as Fintech can enable predatory practices where right to remotely deny financial services can be granted to private sector companies. An architecture such as IndiaStack enables datafication of financial transactions in a way that enables linked and structured data that allows continued use of the transaction data collected. It is important to recognise that at the stage of giving consent, there are too many unknowns for us to make informed decisions about the future uses of our personal data. Despite blanket approvals allowing any kind of use granted contractually through terms of use and privacy policies, there should be legal obligations overriding this consent for certain kinds of uses that may require renewed consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Biometrics-based identification in UK: &lt;/b&gt;In  2005, researchers from London School of Economics and Political Science  came out with a detailed report on the UK Identity Cards Bill (‘UK  Bill’) — the proposed legislation for a national identification system  based on biometrics. The project also envisaged a centralised database  (like India) that would store personal information along with the entire  transaction history of every individual. The report pointed strongly  against the centralising storage of information and suggested other  alternatives such as a system based on smartcards (where biometrics are  stored on the card itself) or offline biometric-reader terminals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the report, the alternatives would also have been cheaper as neither required real-time online connectivity. In India, online authentication is a far greater challenge. According to Network Readiness Index, 2016, India ranks 91, whereas UK is placed eight. Poor Internet connectivity can raise a lot of problems in the future including paralysis of transactions. The UK identification project was subsequently discarded as a result of the privacy and cost considerations raised in this report.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Aadhaar: Privacy concerns&lt;/h3&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Once the data is collected through National Information Utilities, it will be privatised and controlled by private utilities.&lt;/li&gt;
&lt;li&gt;Once an individual’s data is entered in the system, it cannot be deleted. That individual will have no control over it.&lt;/li&gt;
&lt;li&gt;Aadhaar Data (Demographic details along with photographs) are shared/transferred with the private entities including telecom companies as per the Aadhaar (Targeted delivery of Financial and other subsidies, benefits and services) Act, 2016 with the consent of Aadhaar number holder to fulfil their e-KYC requirements. The data is shared in encrypted form through secured channel.&lt;/li&gt;
&lt;li&gt;Aadhaar Enabled Payment System (AEPS) on which 119 banks are live.&lt;/li&gt;
&lt;li&gt;More than 33.87 crore transactions have taken place through AEPS, which was only 46 lakhs in May 2014.&lt;/li&gt;
&lt;li&gt;As on 30-9-2016, 78 government schemes were linked to Aadhaar.&lt;/li&gt;
&lt;li&gt;The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016, provides that no core-biometric information (fingerprints, iris scan) shall be shared with anyone for any reason whatsoever (Sec 29) and that the biometric information shall not be used for any purpose other than generation of Aadhaar and authentication.&lt;/li&gt;
&lt;li&gt;Access to the data repository of UIDAI, called the Central Identities Data Repository(CIDR), is provided to third parties or private companies.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Central Monitoring System&lt;/b&gt; (CMS) is already live in  Delhi, New Delhi and Mumbai. Union minister Ravi Shankar Prasad revealed  this in one of his replies in the Lok Sabha last year. CMS has been set  up to automate the process of Lawful Interception &amp;amp; Monitoring of  telecommunications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Central Monitoring System&lt;/b&gt; (CMS) is already live in  Delhi, New Delhi and Mumbai. Union minister Ravi Shankar Prasad revealed  this in one of his replies in the Lok Sabha last year. CMS has been set  up to automate the process of Lawful Interception &amp;amp; Monitoring of  telecommunications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Lawful Intercept &lt;/b&gt;and Monitoring (LIM) systems are used  by the Indian Government to intercept records of voice, SMSes, GPRS  data, details of a subscriber’s application and recharge history and  call detail record (CDR) and monitor Internet traffic, emails,  web-browsing, Skype and any other Internet activity of Indian users.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-april-10-2017-privacy-in-the-age-of-big-data'&gt;https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-april-10-2017-privacy-in-the-age-of-big-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-11T14:43:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/buzzfeednews-pranav-dixit-april-4-2017-indias-national-id-program-may-be-turning-the-country-into-a-surveillance-state">
    <title>India’s National ID Program May Be Turning The Country Into A Surveillance State</title>
    <link>https://cis-india.org/internet-governance/news/buzzfeednews-pranav-dixit-april-4-2017-indias-national-id-program-may-be-turning-the-country-into-a-surveillance-state</link>
    <description>
        &lt;b&gt; For seven years, India’s government has been scanning the irises and fingerprints of its citizens into a massive database. The once voluntary program was intended to fix the country’s corrupt welfare schemes, but critics worry about its Orwellian overtones. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Pranav Dixit was &lt;a class="external-link" href="https://www.buzzfeed.com/pranavdixit/one-id-to-rule-them-all-controversy-plagues-indias-aadhaar?utm_term=.ksRqWv6w#.vdnR3bQx"&gt;published by BuzzFeedNews&lt;/a&gt; on April 4, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p&gt;&lt;i&gt;An abridged version of the blog post containing Sunil Abraham's quotes are reproduced below&lt;/i&gt;:&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;“You can’t change your fingerprints”&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham, the&lt;/b&gt; CIS director, calls himself a “technological critic” of the Aadhaar  platform. For years, he’s been warning of the security risks associated  with a centralized repository of the demographic and biometric details  of a billion or so people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Aadhaar is a sitting duck,” Abraham  told BuzzFeed News. That’s not an unreasonable assessment considering  that India’s track record for protecting people’s private data is &lt;a href="https://www.buzzfeed.com/pranavdixit/the-medical-reports-of-43000-people-including-hiv-patients-w"&gt;far from stellar&lt;/a&gt;.  Earlier this year, for example, a security researcher discovered a  website that was leaking the Aadhaar demographic data of more than  500,000 minors. The website was subsequently shut down, but the incident  raised questions about Aadhaar’s security protocols — particularly  those around data shared with third parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham’s concerns are not without global precedent. In 2012, Ecuadorian police jailed blogger Paul Moreno for breaking &lt;a href="https://www.wired.com/2012/12/security-post-lands-ecuadorian-blogger-in-jail/"&gt;into the country’s online national identity database&lt;/a&gt; and registering himself as Ecuadorian President Rafael Correa. In April 2016, &lt;a href="https://www.wired.com/2016/04/hack-brief-turkey-breach-spills-info-half-citizens/"&gt;hackers posted&lt;/a&gt; a database containing names, national IDs, addresses, and birth dates  of more than 50 million Turkish citizens, including Turkish President  Recep Tayyip Erdogan; later that month, Mexico’s entire voter database —   over 87 million national IDs, addresses, and more — &lt;a href="http://www.in.techspot.com/news/security/mexicos-voter-database-containing-the-records-of-over-80-million-citizens-leaked-online/articleshow/51979787.cms"&gt; was leaked&lt;/a&gt; onto Amazon’s cloud servers by as-yet-untraced sources; and in the  Philippines, more than 55 million voters had their private information  —   including fingerprints   — &lt;a href="http://www.wired.co.uk/article/philippines-data-breach-fingerprint-data"&gt;released on the Dark Web&lt;/a&gt;.&lt;/p&gt;
&lt;div class="buzz_superlist_item_left_small  longform_pullquote buzz-superlist-item buzz_superlist_item" id="superlist_4501688_10817551" style="text-align: justify; "&gt;
&lt;blockquote class="solid white_pullquote"&gt;
&lt;p&gt;“When  this database is hacked — and it will be — it will be because someone  breaches the computer security that protects the computers actually  using the data.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;“What is the price that we pay as a nation if our database of over a  billion people  —  complete with all 10 fingerprints and iris scans —   leaks?” Abraham asked. The consequences, he said, will be permanent.  Unlike a password, which you can reset at any time, your biometrics, if  compromised, are the ultimate privacy breach. “You can’t change your  fingerprints.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI &lt;a href="https://uidai.gov.in/images/aadhaar_question_and_answers.pdf"&gt;claims&lt;/a&gt; that the Aadhaar database is protected using the “highest available  public key cryptography encryption (PKI-2048 and AES-256)” and would  take “billions of years” to crack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Encryption like this doesn’t  typically get broken, it gets circumvented,” security researcher Troy  Hunt told BuzzFeed News. “For example, the web application that sits in  front of it is compromised and data is retrieved after decryption.” Or  alternatively, he said, the encryption key itself is compromised.  “Naturally, governments will offer all sorts of assurances on these  things, but the simple, immutable fact is that once large volumes are  centralized like this, there is a heightened risk of security incidents  and of the data consequently being lost or exposed,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cryptographer  and cybersecurity expert Bruce Schneier echoed Hunt’s assessment. “When  this database is hacked — and it will be — it will be because someone  breaches the computer security that protects the computers actually  using the data,” he said. “They will go around the encryption.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nilekani  — who did not respond to BuzzFeed News’ requests for comment — recently  dismissed concerns around the project’s privacy implications as  “hand-waving.” In an &lt;a href="http://cio.economictimes.indiatimes.com/news/corporate-news/show-me-even-one-example-of-data-theft-aadhaar-is-very-very-secure-nandan-nilekani/57982816"&gt;interview&lt;/a&gt; with the &lt;i&gt;Economic Times&lt;/i&gt;,  he repeatedly stressed how secure Aadhaar’s “advanced encryption  technology” was. “I can categorically say that it’s the most secure  system in India and among the most secure systems in the world,” he  said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham is unconvinced by such assurances. He believes  Aadhaar fundamentally changes the equation between a citizen and a  state. “There’s a big difference between you identifying yourself to the  government, and the government identifying who you are,” he said.&lt;/p&gt;
&lt;p&gt;Aadhaar’s opponents say the program’s implementation has left India’s  poorest people with no choice but to use it. “If you link people’s food  subsidies, wages, bank accounts, and other crucial things to Aadhaar,  you hit them where it hurts the most,” Ramanathan argued. “You leave  them with no choice but to sign up.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Can you imagine if the  United States passed a law that said that every person who wished to get  food stamps would need their fingerprints registered in a  government-owned database?” a journalist turned Aadhaar activist who did  not wished to be named told BuzzFeed News. “Imagine what a scandal that  would be.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For Nilekani, such criticism is just overstatement and  drama. “I think this so-called anti-Aadhaar lobby is really just a  small bunch of liberal elites who are in some echo chamber,” he said  during a recent &lt;a href="https://www.facebook.com/etnow/videos/1471268036248071/"&gt;interview&lt;/a&gt; with Indian business news channel &lt;i&gt;ET Now&lt;/i&gt;.  “The reality is that a billion people are using Aadhaar. A lot of the  accusations are just delusional. Aadhaar is not a system for  surveillance. [The critics] live in a bubble and are not connected to  reality.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham laughed off Nilekani’s comments. “The Unique  Identification Authority of India will become the monopoly provider of  identification and authentication services in India,” he said. “That  sounds like a centrally planned communist state to me. I don’t know  which left liberal elites he’s talking about.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/buzzfeednews-pranav-dixit-april-4-2017-indias-national-id-program-may-be-turning-the-country-into-a-surveillance-state'&gt;https://cis-india.org/internet-governance/news/buzzfeednews-pranav-dixit-april-4-2017-indias-national-id-program-may-be-turning-the-country-into-a-surveillance-state&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-07T12:49:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindustan-times-pranesh-prakash-april-3-2017-aadhaar-marks-a-fundamental-shift-in-citizen-state-relations">
    <title>Aadhaar marks a fundamental shift in citizen-state relations: From ‘We the People’ to ‘We the Government’</title>
    <link>https://cis-india.org/internet-governance/blog/hindustan-times-pranesh-prakash-april-3-2017-aadhaar-marks-a-fundamental-shift-in-citizen-state-relations</link>
    <description>
        &lt;b&gt;Your fingerprints, iris scans, details of where you shop. Compulsory Aadhaar means all this data is out there. And it’s still not clear who can view or use it.&lt;/b&gt;
        &lt;p&gt;The article was published in the &lt;a class="external-link" href="http://www.hindustantimes.com/india-news/what-s-really-happening-when-you-swipe-your-aadhaar-card-to-make-a-payment/story-2fLTO5oNPhq1wyvZrwgNgJ.html"&gt;Hindustan Times&lt;/a&gt; on April 3, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Aaadhaar.png" alt="Aadhaar" class="image-inline" title="Aadhaar" /&gt;&lt;br /&gt;Until recently, people were allowed to opt out of Aadhaar and withdraw consent to have their data stored. This is no longer going to be an option.&lt;br /&gt;(Siddhant Jumde / HT Illustration)&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Imagine you’re walking down the street and you point the camera on your phone at a crowd of people in front of you. An app superimposes on each person’s face a partially-redacted name, date of birth, address, whether she’s undergone police verification, and, of course, an obscured Aadhaar number.&lt;br /&gt;&lt;br /&gt;OnGrid, a company that bills itself as a “trust platform” and offers “to deliver verifications and background checks”, used that very imagery in an advertisement last month. Its website notes that “As per Government regulations, it is mandatory to take consent of the individual while using OnGrid”, but that is a legal requirement, not a technical one.&lt;br /&gt;&lt;br /&gt;Since every instance of use of Aadhaar for authentication or for financial transactions leaves behind logs in the Unique Identification Authority of India’s (UIDAI) databases, the government can potentially have very detailed information about everything from the your medical purchases to your use of video-chatting software. The space for digital identities as divorced from legal identities gets removed. Clearly, Aadhaar has immense potential for profiling and surveillance. Our only defence: law that is weak at best and non-existent at worst.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar Act and Rules don’t limit the information that can be gathered from you by the enrolling agency; it doesn’t limit how Aadhaar can be used by third parties (a process called ‘seeding’) if they haven’t gathered their data from UIDAI; it doesn’t require your consent before third parties use your Aadhaar number to collate records about you (eg, a drug manufacturer buying data from various pharmacies, and creating profiles using Aadhaar).&lt;br /&gt;&lt;br /&gt;It even allows your biometrics to be shared if it is “in the interest of national security”. The law offers provisions for UIDAI to file cases (eg, for multiple enrollments), but it doesn’t allow citizens to file a case against private parties or the government for misuse of Aadhaar or identity fraud, or data breach.&lt;br /&gt;&lt;br /&gt;It is also clear that the government opposes any privacy-related improvements to the law. After debating the Aadhaar Bill in March 2016, the Rajya Sabha passed an amendment by MP Jairam Ramesh that allowed people to opt out of Aadhaar, and withdraw their consent to UIDAI storing their data, if they had other means of proving their identity (thus allowing Aadhaar to remain an enabler).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But that amendment, as with all amendments passed in the Rajya Sabha, was rejected by the Lok Sabha, allowing the government to make Aadhaar mandatory, and depriving citizens of consent. While the Aadhaar Act requires a person’s consent before collecting or using Aadhaar-provided details, it doesn’t allow for the revocation of that consent.&lt;br /&gt;&lt;br /&gt;In other countries, data security laws require that a person be notified if her data has been breached. In response to an RTI application asking whether UIDAI systems had ever been breached, the Authority responded that the information could not be disclosed for reasons of “national security”.&lt;br /&gt;&lt;br /&gt;The citizen must be transparent to the state, while the state will become more opaque to the citizen.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;How Did Aadhaar Change?&lt;/h2&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;How did Aadhaar become the behemoth it is today, with it being mandatory for hundreds of government programmes, and even software like Skype enabling support for it?&lt;/p&gt;
&lt;p&gt;The first detailed look one had at the UID project was through an internal UIDAI document marked ‘Confidential’ that was leaked through WikiLeaks in November 2009. That 41-page dossier is markedly different from the 170-page ‘Technology and Architecture’ document that UIDAI has on its website now, but also similar in some ways.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img src="http://www.hindustantimes.com/rf/image_size_960x540/HT/p2/2017/04/01/Pictures/_36723476-16e4-11e7-85c6-0f0e633c038c.jpg" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;In neither of those is the need for Aadhaar properly established. Only  in November 2012 — after scholars like Reetika Khera pointed out UIDAI’s  fundamental misunderstanding of leakages in the welfare delivery system  — was the first cost-benefit analysis commissioned, by when UIDAI had  already spent ₹28 billion. That same month, Justice KS Puttaswamy, a  retired High Court judge, filed a PIL in the Supreme Court challenging  Aadhaar’s constitutionality, wherein the government has argued privacy  isn’t a fundamental right.&lt;/p&gt;
&lt;blockquote class="pullquote" style="text-align: justify; "&gt;Every time you use Aadhaar, you leave behind logs in the UIDAI databases. This means that the government can potentially have very detailed information about everything from the your medical purchases to your use of video-chatting software.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Even today, whether the ‘deduplication’ process — using biometrics to ensure the same person can’t register twice — works properly is a mystery, since UIDAI hasn’t published data on this since 2012. Instead of welcoming researchers to try to find flaws in the system, UIDAI recently filed an FIR against a journalist doing so.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At least in 2009, UIDAI stated it sought to prevent anyone from “[e]ngaging in or facilitating profiling of any nature for anyone or providing information for profiling of any nature for anyone”, whereas the 2014 document doesn’t. As OnGrid’s services show, the very profiling that the UIDAI said it would prohibit is now seen as a feature that all, including private companies, may exploit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UID has changed in other ways too. In 2009, it was as a system that never sent out any information other than ‘Yes’ or ‘No’, which it did in response to queries like ‘Is Pranesh Prakash the name attached to this UID number’ or ‘Is April 1, 1990 his date of birth’, or ‘Does this fingerprint match this UID number’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the addition of e-KYC (wherein UIDAI provides your demographic details to the requester) and Aadhaar-enabled payments to the plan in 2012, the fundamentals of Aadhaar changed. This has made Aadhaar less secure.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Security Concerns&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;With Aadhaar Pay, due to be launched on April 14, a merchant will ask you to enter your Aadhaar number into her device, and then for your biometrics — typically a fingerprint, which will serve as your ‘password’, resulting in money transfer from your Aadhaar-linked bank account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Basic information security theory requires that even if the identifier (username, Aadhaar number etc) is publicly known — millions of people names and Aadhaar numbers have been published on dozens of government portals — the password must be secret. That’s how most logins works, that’s how debit and credit cards work. How are you or UIDAI going to keep your biometrics secret?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2015, researchers in Carnegie Mellon captured the iris scans of a driver using car’s side-view mirror from distances of up to 40 feet. In 2013, German hackers fooled Apple iOS’s fingerprint sensors by replicating a fingerprint from a photo taken off a glass held by an individual. They even replicated the German Defence Minister’s fingerprints from photographs she herself had put online. Your biometrics can’t be kept secret.&lt;/p&gt;
&lt;blockquote class="pullquote" style="text-align: justify; "&gt;Typically, even if your username (in this case, Aadhaar number) is publicly known, your password must be secret. That’s how most logins works, that’s how debit and credit cards work. How are you or UIDAI going to keep your biometrics secret?&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;In the  US, in a security breach of 21.5 million government employees’ personnel  records in 2015, 5.2 million employees’ fingerprints were copied. If  that breach had happened in India, those fingerprints could be used in  conjunction with Aadhaar numbers not only for large-scale identity  fraud, but also to steal money from people’s bank accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All ‘passwords’ should be replaceable. If your credit card gets stolen, you can block it and get a new card. If your Aadhaar number and fingerprint are leaked, you can’t change it, you can’t block it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The answer for Aadhaar too is to choose not to use biometrics alone for authentication and authorisation, and to remove the centralised biometrics database. And this requires a fundamental overhaul of the UID project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar marks a fundamental shift in citizen-state relations: from ‘We the People’ to ‘We the Government’. If the rampant misuse of electronic surveillance powers and wilful ignorance of the law by the state is any precedent, the future looks bleak. The only way to protect against us devolving into a total surveillance state is to improve rule of law, to strengthen our democratic institutions, and to fundamentally alter Aadhaar. Sadly, the political currents are not only not favourable, but dragging us in the opposite direction.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindustan-times-pranesh-prakash-april-3-2017-aadhaar-marks-a-fundamental-shift-in-citizen-state-relations'&gt;https://cis-india.org/internet-governance/blog/hindustan-times-pranesh-prakash-april-3-2017-aadhaar-marks-a-fundamental-shift-in-citizen-state-relations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-04T16:10:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/indian-express-nishant-shah-april-2-2017-digital-native-you-can-check-out-you-can-never-leave">
    <title>Digital native: You can check out, you can never leave</title>
    <link>https://cis-india.org/raw/indian-express-nishant-shah-april-2-2017-digital-native-you-can-check-out-you-can-never-leave</link>
    <description>
        &lt;b&gt;Aadhaar is not something you define and opt into, it is something that defines you.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/social/digital-native-you-can-check-out-you-can-never-leave-4595503/"&gt;published in the Indian Express&lt;/a&gt; on April 2, 2017. Nishant Shah is a professor of new media and the co-founder of The Centre for Internet &amp;amp; Society, Bangalore.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Ok. I get it. You don’t want yet another piece on the horrors and perils of the surveillance state that has come to the forefront with Aadhaar numbers now being tied to our taxes. I know that you must have already made up your mind about whether this is a good thing or a bad thing. If you believe that the way to streamlining bureaucracy and making our systems more accountable is transparency, then you are ready to welcome the digital ecosystem of Aadhaar, as introducing checks and balances that might help to curb some of the excesses and wastes of our governance systems . If you are of the opinion, however, that the state cannot be trusted with our information, without the oversee of the Parliament and the judiciary, then you want to resist this mandatory implementation of the “voluntary” Aadhaar. And, for once, I am unable to take a side, favouring one set of arguments over the other. This ambiguity does not come from a lack of political conviction. I continue to fear about the future of our lives when these technologies of control and domination fall in the hands of governments which have an authoritarian bend of mind.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead, my lack of preference on the good, bad and ugly sides of Aadhaar stems from a completely different concern around network technologies of digital connectivity that has found very little attention in the almost zealous discourse about “yes Aadhaar, no Aadhaar”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is a concern about the relationship between technological  networks and the messy realities that we embody. There has been an easy  acceptance of a digital network as a description of our everyday life.  If you look at any network that you belong to — from public discussion  forums to private WhatsApp groups — you will realise that these networks  offer to visualise your connections and transactions with the people,  places and things in your circles. Thus, it is possible to say that &lt;a href="http://indianexpress.com/about/facebook/"&gt;Facebook&lt;/a&gt; describes your collection of friends and your social life. Or you could suggest that &lt;a href="http://indianexpress.com/about/linkedin/"&gt;LinkedIn&lt;/a&gt; is a visualisation of your professional landscape. And, in a similar  vein, we can also propose that Aadhaar is a representation of the  working of our government systems of identification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each one of these propositions, seemingly innocent, is blatantly wrong. Facebook, for example, didn’t just connect you with your friends. It has fundamentally changed the idea of what is a friend. For a generation of young people who grew up naturalised in social media, the notion of a friend has lost all its meaning and nuance. Every connection, acquaintance, friend of a friend, a random stranger who likes the same band as you do, is now a friend. And the increasing anxiety we have about people falling prey to predatory friendships is because Facebook has now normalised the idea that if somebody calls you their friend, you don’t have to worry about sharing personal and private information with them. Similarly , for anybody who has spent time on LinkedIn, we know that it is not just a portal that describes our work. It is the space where we stay connected with events and people far removed from us. It is the resource pool that we draw on while looking for new work. It is also the space that we keep an eye on just to see if a better job has opened up. It is a collection of events, links and connections that not only shows what you do but what you aspire for, who you connect with and what are the kinds of professional ambitions you see for yourself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just like Facebook and LinkedIn, which don’t just describe a reality but actually simulate, prescribe and shape it, Aadhaar is a digital network that is seeking to change the very foundational reality of our lives. Like most digital networks, it is not merely an explanation of how things are but the context within which who we are and what we do finds meaning and validation. Thus, Aadhaar might propose that it is merely trying to describe your identity but it is actually offering to shape a new one for you. The programme might suggest that it is trying to implement a system already in place, but it is, in reality, creating an entirely new system within which you and I have to now find space, function and identity. The latest announcements of mainstreaming Aadhaar merely betray this fact – that Aadhaar is not something you define and opt into, Aadhaar defines you. And opting out is going to have severe penalties and consequences.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Digital networks have long masqueraded as benign visualisations of the world. But they are, in principle, blueprints that transform the world as we know it. This, in itself, is not bad. However, hiding this transformation is. Because when a transformation happens, especially at systemic levels, it is always the people who are the most vulnerable that suffer the most from it. Think about the older friend who might not be the most tech savvy and how they struggle for inclusion on Facebook and WhatsApp messages. Pay some attention to people who did not understand the public nature of LinkedIn and ended up getting fired because they wrote about their current work conditions and the desire to change them. And, similarly, do think if the people who are being pushed into these digital ecosystems without adequate digital literacy, care and information about the consequences of their actions, are being made vulnerable in their access to resources of life and dignity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whether you and I like Aadhaar or not is not really the question. The question is not about the right to privacy either. What is at stake in this deployment of Aadhaar is a government that is pushing radical transformations of the life of its citizens without consulting with them and addressing their needs. In the past, when governments have done this, we have developed strong voices of protest and correction asking the state to be responsible towards those affected by the transformation. The reliance on the digital, however, allows these governments to escape this responsibility and, in the guise of description, are making prescriptions of reality which need to be resisted.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/indian-express-nishant-shah-april-2-2017-digital-native-you-can-check-out-you-can-never-leave'&gt;https://cis-india.org/raw/indian-express-nishant-shah-april-2-2017-digital-native-you-can-check-out-you-can-never-leave&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2017-05-05T01:31:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hindu-businessline-march-31-2017-sunil-abraham-its-the-technology-stupid">
    <title>It’s the technology, stupid</title>
    <link>https://cis-india.org/internet-governance/blog/the-hindu-businessline-march-31-2017-sunil-abraham-its-the-technology-stupid</link>
    <description>
        &lt;b&gt;Eleven reasons why the Aadhaar is not just non-smart but also insecure.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.thehindubusinessline.com/blink/cover/11-reasons-why-aadhaar-is-not-just-nonsmart-but-also-insecure/article9608225.ece"&gt;published in Hindu Businessline&lt;/a&gt; on March 31, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar is insecure because it is based on biometrics. Biometrics is surveillance technology, a necessity for any State. However, surveillance is much like salt in cooking: essential in tiny quantities, but counterproductive even if slightly in excess. Biometrics should be used for targeted surveillance, but this technology should not be used in e-governance for the following reasons:&lt;br /&gt;&lt;br /&gt;One, biometrics is becoming a remote technology. High-resolution cameras allow malicious actors to steal fingerprints and iris images from unsuspecting people. In a couple of years, governments will be able to identify citizens more accurately in a crowd with iris recognition than the current generation of facial recognition technology.&lt;br /&gt;&lt;br /&gt;Two, biometrics is covert technology. Thanks to sophisticated remote sensors, biometrics can be harvested without the knowledge of the citizen. This increases effectiveness from a surveillance perspective, but diminishes it from an e-governance perspective.&lt;br /&gt;&lt;br /&gt;Three, biometrics is non-consensual technology. There is a big difference between the State identifying citizens and citizens identifying themselves to the state. With biometrics, the State can identify citizens without seeking their consent. With a smart card, the citizen has to allow the State to identify them. Once you discard your smart card the State cannot easily identify you, but you cannot discard your biometrics.&lt;br /&gt;&lt;br /&gt;Four, biometrics is very similar to symmetric cryptography. Modern cryptography is asymmetric. Where there is both a public and a private key, the user always has the private key, which is never in transit and, therefore, intermediaries cannot intercept it. Biometrics, on the other hand, needs to be secured during transit. The UIDAI’s (Unique Identification Authority of India overseeing the rollout of Aadhaar) current fix for its erroneous choice of technology is the use of “registered devices”; but, unfortunately, the encryption is only at the software layer and cannot prevent hardware interception.&lt;br /&gt;&lt;br /&gt;Five, biometrics requires a centralised network; in contrast, cryptography for smart cards does not require a centralised store for all private keys. All centralised stores are honey pots — targeted by criminals, foreign States and terrorists.&lt;br /&gt;&lt;br /&gt;Six, biometrics is irrevocable. Once compromised, it cannot be secured again. Smart cards are based on asymmetric cryptography, which even the UIDAI uses to secure its servers from attacks. If cryptography is good for the State, then surely it is good for the citizen too.&lt;br /&gt;&lt;br /&gt;Seven, biometrics is based on probability. Cryptography in smart cards, on the other hand, allows for exact matching. Every biometric device comes with ratios for false positives and false negatives. These ratios are determined in near-perfect lab conditions. Going by press reports and even UIDAI’s claims, the field reality is unsurprisingly different from the lab. Imagine going to an ATM and not being sure if your debit card will match your bank’s records.&lt;br /&gt;&lt;br /&gt;Eight, biometric technology is proprietary and opaque. You cannot independently audit the proprietary technology used by the UIDAI for effectiveness and security. On the other hand, open smart card standards like SCOSTA (Smart Card Operating System for Transport Applications) are based on globally accepted cryptographic standards and allow researchers, scientists and mathematicians to independently confirm the claims of the government.&lt;br /&gt;&lt;br /&gt;Nine, biometrics is cheap and easy to defeat. Any Indian citizen, even children, can make gummy fingers at home using Fevicol and wax. You can buy fingerprint lifting kits from a toystore. To clone a smart card, on the other hand, you need a skimmer, a printer and knowledge of cryptography.&lt;br /&gt;&lt;br /&gt;Ten, biometrics undermines human dignity. In many media photographs — even on the @UIDAI’s Twitter stream — you can see the biometric device operator pressing the applicant’s fingers, especially in the case of underprivileged citizens, against the reader. Imagine service providers — say, a shopkeeper or a restaurant waiter — having to touch you every time you want to pay. Smart cards offer a more dignified user experience.&lt;br /&gt;&lt;br /&gt;Eleven, biometrics enables the shirking of responsibility, while cryptography requires a chain of trust.&lt;br /&gt;&lt;br /&gt;Each legitimate transaction has repudiable signatures of all parties responsible. With biometrics, the buck will be passed to an inscrutable black box every time things go wrong. The citizens or courts will have nobody to hold to account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The precursor to Aadhaar was called MNIC (Multipurpose National Identification Card). Initiated by the NDA government headed by Atal Bihari Vajpayee, it was based on the open SCOSTA standard. This was the correct technological choice.&lt;br /&gt;&lt;br /&gt;Unfortunately, the promoters of Aadhaar chose biometrics in their belief that newer, costlier and complex technology is superior to an older, cheaper and simpler alternative.&lt;br /&gt;&lt;br /&gt;This erroneous technological choice is not a glitch or teething problem that can be dealt with legislative fixes such as an improved Aadhaar Act or an omnibus Privacy Act. It can only be fixed by destroying the centralised biometric database, like the UK did, and shifting to smart cards.&lt;br /&gt;&lt;br /&gt;In other words, you cannot fix using the law what you have broken using technology.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hindu-businessline-march-31-2017-sunil-abraham-its-the-technology-stupid'&gt;https://cis-india.org/internet-governance/blog/the-hindu-businessline-march-31-2017-sunil-abraham-its-the-technology-stupid&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-07T12:53:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it">
    <title>How Aadhaar compromises privacy? And how to fix it?</title>
    <link>https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it</link>
    <description>
        &lt;b&gt;Aadhaar is mass surveillance technology. Unlike targeted surveillance which is a good thing, and essential for national security and public order – mass surveillance undermines security. And while biometrics is appropriate for targeted surveillance by the state – it is wholly inappropriate for everyday transactions between the state and law abiding citizens. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The op-ed was published in the &lt;a class="external-link" href="http://www.thehindu.com/opinion/op-ed/is-aadhaar-a-breach-of-privacy/article17745615.ece"&gt;Hindu&lt;/a&gt; on March 31, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;When assessing a technology, don't ask - “what use is it being put to today?”. Instead, ask “what use can it be put to tomorrow and by whom?”. The original noble intentions of the Aadhaar project will not constrain those in the future that want to take full advantage of its technological possibilities.  However, rather than frame the surveillance potential of Aadhaar in a negative tone as three problem statements - I will propose three modifications to the project that will reduce but not eliminate its surveillance potential.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Shift from biometrics to smart cards:&lt;/b&gt;&lt;span&gt; In January 2011, the Centre for Internet and Society had written to the parliamentary finance committee that was reviewing what was then called the “National Identification Authority of India Bill 2010”. We provided nine reasons for the government to stop using biometrics and instead use an open smart card standard. Biometrics allows for identification of citizens even when they don't want to be identified. Even unconscious and dead citizens can be identified using biometrics. Smart cards, on the other hand, require pins and thus citizens' conscious cooperation during the identification process. Once you flush your smart cards down the toilet nobody can use them to identify you. Consent is baked into the design of the technology. If the UIDAI adopts smart cards, we can destroy the centralized database of biometrics just like the UK government did in 2010 under Theresa May's tenure as Home Secretary. This would completely eliminate the risk of foreign governments, criminals and terrorists using the biometric database to remotely, covertly and non-consensually identify Indians.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Destroy the authentication transaction database:&lt;/b&gt;&lt;span&gt; The Aadhaar Authentication Regulations 2016 specifies that transaction data will be archived for five years after the date of the transaction. Even though the UIDAI claims that this is a zero knowledge database from the perspective of “reasons for authentication”, any big data expert will tell you that it is trivial to guess what is going on using the unique identifiers for the registered devices and time stamps that are used for authentication.  That is how they put Rajat Gupta and Raj Rajratnam in prison. There was nothing in the payload ie. voice recordings of the tapped telephone conversations – the conviction was based on meta-data. Smart cards based on open standards allow for decentralized authentication by multiple entities and therefore eliminate the need for a centralized transaction database.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Prohibit the use of Aadhaar number in other databases:&lt;/b&gt;&lt;span&gt; We must, as a nation, get over our obsession with Know Your Customer [KYC] requirements. For example, for SIM cards there is no KYC requirement is most developed countries. Our insistence on KYC has only resulted in retardation of Internet adoption, a black market for ID documents and unnecessary wastage of resources by telecom companies. It has not prevented criminals and terrorists from using phones. Where we must absolutely have KYC for the purposes of security, elimination of ghosts and regulatory compliance – we must use a token issued by UIDAI instead of the Aadhaar number itself. This would make it harder for unauthorized parties to combine databases while at the same time, enabling law enforcement agencies to combine databases using the appropriate authorizations and infrastructure like NATGRID. The NATGRID, unlike Aadhaar, is not a centralized database. It is a standard and platform for the express assembly of sub-sets of up to 20 databases which is then accessed by up to 12 law enforcement and intelligence agencies.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;To conclude, even as a surveillance project – Aadhaar is very poorly designed. The technology needs fixing today, the law can wait for tomorrow.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it'&gt;https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-01T07:00:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/march-2017-newsletter">
    <title>March 2017 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/march-2017-newsletter</link>
    <description>
        &lt;b&gt;Welcome to March 2017 newsletter of the Centre for Internet &amp; Society (CIS).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dear readers,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;CIS &lt;a class="external-link" href="http://cis-india.org/accessibility/blog/comments-on-the-draft-rights-of-persons-with-disabilities-rules"&gt;submitted comments on the draft Rights of Persons with Disabilities  Rules&lt;/a&gt; for the consideration of the Department of Empowerment of Persons  with Disabilities, Government of India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Anubha Sinha in a blog post has &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/intellectual-property-rights-and-mobile-apps"&gt;identified the various kinds of IP in an app&lt;/a&gt; and explained the protections available under Indian IPR law. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS-A2K is &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/wikisource-internship-project-at-new-law-college-pune"&gt;conducting a Wiki internship project&lt;/a&gt; for students of New Law College, Pune under the guidance of Prof.Dr.Mukund Sarda, Dean and Principal of New Law College. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In an &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it"&gt;Op-ed published in the Hindu&lt;/a&gt;, Sunil Abraham has stated that though biometrics may be appropriate for targeted surveillance by the state, it is wholly inappropriate for everyday transactions between state and law abiding citizens.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS has &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/benefits-harms-rights-and-regulation-survey-of-literature-on-big-data"&gt;published a survey&lt;/a&gt; that draws upon a range of literature including news articles, academic articles, and presentations and seeks to disaggregate the potential benefits and harms of big data, organising them into several broad categories that reflect the existing scholarly literature.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS submitted comments on the Information Technology (Security of Prepaid Payment Instruments) Rules, 2017. The &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017"&gt;comments were in response to the Information Technology (Security of Prepaid Payment Instruments) Rules 2017&lt;/a&gt;. The Ministry of Electronics and Information Technology issued a consultation paper which called for developing a framework for security of digital wallets operating in the country. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ritam Sengupta, Dr. Richard Heeks, Sumandro Chattapadhyay, and Dr. Christopher Foster &lt;a class="external-link" href="http://cis-india.org/raw/exploring-big-data-for-development-an-electricity-sector-case-study-from-india"&gt;have co-authored a paper&lt;/a&gt; that presents exploratory research into “data-intensive development” that seeks to inductively identify issues and conceptual frameworks of relevance to big data in developing countries.&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;CIS in the news:&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum"&gt;The 12-digit conundrum&lt;/a&gt; (Richa Mishra; Hindu Businessline; March 13, 2017)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-statesman-smriti-sharma-vasudeva-march-14-2017-evms-how-transparent-is-the-indian-election-process"&gt;EVMs: How transparent is the Indian election process?&lt;/a&gt; (Smriti Sharma Vasudeva; The Statesman; March 14, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/first-post-march-16-nimish-sawant-nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber"&gt;Nasscom chief saying full data protection isn’t possible should wake us from our digital slumber&lt;/a&gt; (First Post; March 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/one-world-indentity-kaelyn-lowmaster-march-17-2017-privacy-concerns-multiply-for-aadhaar-indias-national-biometric-identity-registry"&gt;Privacy concerns multiply for Aadhaar, India’s national biometric identity registry&lt;/a&gt; (One World Identity; March 17, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-guardian-march-21-2017-no-id-no-benefits"&gt;No ID, no benefits: thousands could lose lifeline under India’s biometric scheme&lt;/a&gt; (Guardian; March 21, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/huffington-post-rimin-dutt-ivan-mehta-march-24-2017-why-we-should-all-worry-about-the-mandatory-imposition-of-aadhaar"&gt;Why We Should All Worry About The Mandatory Imposition Of Aadhaar&lt;/a&gt; (Rimin Dutt and Ivan Mehta; Huffington Post; March 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/financial-times-march-27-2017-amy-kazmin-indias-biometric-id-scans-make-sci-fi-a-reality"&gt;India’s biometric ID scans make sci-fi a reality&lt;/a&gt; (Amy Kazmin; Financial Times; March 27, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/ndtv-march-27-2017-discussion-on-aadhaar"&gt;क्‍या आधार पर जल्दबाज़ी में है सरकार?&lt;/a&gt; (NDTV; March 27, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-march-27-2017-priya-nair-and-sanjay-kumar-singh-get-an-aadhaar-card-if-you-dont-have-one"&gt;Get an Aadhaar card if you don't have one&lt;/a&gt; (Priya Nair and Sanjay Kumar Singh; Business Standard; March 27, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things"&gt;The Aadhaar of all things&lt;/a&gt; (Shriya Mohan; Hindu Businessline; March 31, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;br /&gt;CIS members wrote the following articles&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/indian-express-nishant-shah-march-19-2017-digital-native-lie-me-a-river"&gt;Digital native: Lie Me a River&lt;/a&gt; (Nishant Shah; Indian Express; March 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-hindu-businessline-march-31-2017-sunil-abraham-its-the-technology-stupid"&gt;It’s the technology, stupid&lt;/a&gt; (Sunil Abraham; Hindu Businessline; March 31, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it"&gt;How Aadhaar compromises privacy? And how to fix it?&lt;/a&gt; (Sunil Abraham; Hindu; March 31, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-------------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility &amp;amp; Inclusion&lt;/a&gt; &lt;br /&gt; ------------------------------------- 	&lt;br /&gt; India has an estimated 70 million persons with disabilities who don't    have access to read printed materials due to some form of physical,    sensory, 	cognitive or other disability. As part of our endeavour to    make available accessible content for persons with disabilities, we are    developing a text-to-speech software in 15 languages with support from    the Hans Foundation. The progress made so far in the project can be    accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Submission&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/comments-on-the-draft-rights-of-persons-with-disabilities-rules"&gt;Comments on the draft Rights of Persons with Disabilities Rules&lt;/a&gt; (Nirmita Narasimhan; March 29, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt;Our    Access to Knowledge programme currently consists of two projects. The    Pervasive Technologies project, conducted under a grant from the    International Development Research Centre (IDRC), aims to conduct    research on the complex interplay between low-cost pervasive    technologies and intellectual property, in order to encourage the    proliferation and development of such technologies as a social good. The    Wikipedia project, which is under a 	grant from the Wikimedia    Foundation, is for the growth of Indic language communities and projects    by designing community collaborations and partnerships 	that recruit    and cultivate new editors and explore innovative approaches to  building   projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Pervasive Technologies&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/intellectual-property-rights-and-mobile-apps"&gt;Intellectual Property Rights and Mobile Apps&lt;/a&gt; (Anubha Sinha; March 6, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by    organizing more than 100 outreach events and catalysed the release of    encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0)    license in four Indian languages (21 books in Telugu, 13 in Odia, 4    volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book    on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/marathi-bhasha-gaurav-din-celebrations-in-maharashtra"&gt;"Marathi Bhasha Gaurav Din" celebrations in Maharashtra&lt;/a&gt; (Manasa Rao; March 7, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/women2019s-history-month-sambad-collaborates-with-odia-wikipedia-for-a-two-day-edit-a-thon"&gt;Women’s History Month: Sambad collaborates with Odia Wikipedia for a Two Day Edit-a-thon&lt;/a&gt; (Sailesh Patnaik; March 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/wikisource-internship-project-at-new-law-college-pune"&gt;Wikisource:Internship Project at New Law College, Pune&lt;/a&gt; (Subodh Kulkarni; March 28, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/womens-day-edit-a-thon-in-pune"&gt;Women's Day Edit-a-thon&lt;/a&gt; (Co-organized by Sterlite Tech Foundation, Jnana Prabhodhini, and CIS-A2K; Pune; March 10, 2017). Subodh Kulkarni was one of the trainers.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/marathi-wikipedia-edit-a-thon-on-environment-management"&gt;Marathi Wikipedia Edit-a-thon on Environment Management&lt;/a&gt; (Organized by CSIBER College and CIS-A2K; Kolhapur; March 30, 2017). Subodh Kulkarni was a trainer.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;►Openness&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;Our  work in the Openness programme   focuses on open data, especially open  government data, open access,  open  education resources, open knowledge  in Indic languages, open  media, and  open technologies and standards -  hardware and software. We  approach  openness as a cross-cutting  principle for knowledge  production and  distribution, and not as a  thing-in-itself.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/news/national-consultation-on-oer-for-higher-education"&gt;National Consultation on OER for Higher Education&lt;/a&gt; (Organized by Commonwealth Educational Media Centre for Asia; New Delhi; March 3, 2017). Anubha Sinha attended the event.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/news/idrc-open-development-book-authors-workshop"&gt;Open Development Book - Authors' Workshop&lt;/a&gt; (Organized by International Development Research Centre and Centre for Innovation in Learning and Teaching; University of Cape Town, South Africa; March 11 - 12, 2017). The workshop gathered the contributers to an upcoming book by IDRC on open development. Elonnai Hickok, Gus Hosein from Privacy International and Sumandro Chattapadhyay are writing a chapter for this book.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/news/indo-french-perspectives-on-digital-studies"&gt;Indo - French Perspectives on Digital Studies&lt;/a&gt; (Organized by Digital Studies Group; Jawaharlal Nehru University, New Delhi; March 15, 2017). Anubha Sinha was a speaker. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;b&gt; -----------------------------------&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As  part of its research on privacy and   free speech, CIS is engaged with  two different projects. The first  one  (under a grant from Privacy  International and IDRC) is on  surveillance  and freedom of expression  (SAFEGUARDS). The second one  (under a grant  from MacArthur Foundation)  is on restrictions that the  Indian government  has placed on freedom of  expression online.&lt;/p&gt;
&lt;p&gt;►Privacy&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017"&gt;Comments on Information Technology&lt;/a&gt; (Security of Prepaid Payment Instruments) Rules, 2017 (Udbhav Tiwari, Pranesh Prakash, Abhay Rana, Amber Sinha and Sunil Abraham; March 23, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;p&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/wiser-lecture-sumandro-chattapadhyay-on-deregulation-by-code"&gt;WISER Lecture : Sumandro Chattapadhyay on Deregulation by Code&lt;/a&gt; (Organized by the University of the Witwatersrand; Johannesburg; March 8, 2017). Sumandro Chattapadhyay gave a talk.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/conference-on-safety-against-online-child-sexual-abuse"&gt;Conference on Safety Against Online Child Sexual Abuse&lt;/a&gt; (Organized by CID, Telangana and the Department for Women Development and Child Welfare, Telangana; March 16 - 17, 2017). Japreet Grewal was a speaker.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/state-of-digital-rights-in-india-delhi-march-24"&gt;State of Digital Rights in India&lt;/a&gt; (Organized by Centre for Communication Governance at National Law University, Delhi and the Internet Freedom Foundation, in association with Access Now; India International Centre, New Delhi; March 24, 2017). Japreet Grewal and Sumandro Chattapadhyay took part in panel discussions.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/google-hangout-on-technology-and-jobs"&gt;Hangout on Technology and Jobs&lt;/a&gt; (Organized by Google; March 24, 2017). Vanya Rakesh was a speaker. &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt; 
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/analysis-of-key-provisions-of-aadhaar-act-regulations"&gt;Analysis of Key Provisions of the Aadhaar Act Regulations&lt;/a&gt; (Amber Sinha and edited by Elonnai Hickok; March 31, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;p&gt;►Cyber Security&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/events/firstfridayatcisindia-dr-madan-oberoi-digital-forensics-april-07"&gt;Digital Forensics and Cyber Investigations&lt;/a&gt; (CIS; New Delhi; April 7, 2017). IPS officer Dr. Madan M. Oberoi will give a talk. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;p&gt;►Big Data&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/benefits-harms-rights-and-regulation-survey-of-literature-on-big-data"&gt;Benefits, Harms, Rights and Regulation: A Survey of Literature on Big Data&lt;/a&gt; (Amber Sinha, Vanya Rakesh, Vidushi Marda and Geethanjali Jujjavarapu; edited by Sunil Abraham, Elonnai Hickok and Leilah Elmokadem; March 23, 2017). &lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-fintech-disruption-innovation-regulation-and-transformation"&gt;The Fintech Disruption - Innovation, Regulation, and Transformation&lt;/a&gt; (Organized by Carnegie India; March 28, 2017). Sumandro Chattapadhyay attended the event. &lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify; "&gt;►Freedom of Expression&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/events/essentials-of-building-internet-tools-for-inclusion"&gt;Essentials of building internet tools for inclusion &lt;/a&gt;(Valencia, Spain; March 6, 2017). A talk jointly proposed by Chinmayi SK and Rohini Lakshané was selected for the Internet Freedom Festival.&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/from-virtual-to-reliable-exploring-freedom-and-facts-in-the-world-of-www-world-wide-web"&gt;From Virtual to Reliable: Exploring Freedom and Facts in the World of WWW (World Wide Web)&lt;/a&gt; (Organized by Embassy of the Kingdom of Netherlands and Adaan Foundation; March 21, 2017). Saikat Datta and Amber Sinha were panelists.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/internet-freedom-festival-2017"&gt;Internet Freedom Festival 2017&lt;/a&gt; (Organized by IFF; Valencia, Spain; March 6 - 10, 2017). Vidushi Marda participated in the event. Vidushi also attended these sessions: &lt;a class="external-link" href="https://internetfreedomfestival.org/wiki/index.php/Data_Protection_law_and_is_different_manifestations"&gt;Data Protection Law and its Different Manifestations&lt;/a&gt;;&lt;a class="external-link" href="https://internetfreedomfestival.org/wiki/index.php/The_identity_we_can%27t_change:_a_new_wave_of_biometric_policies_around_the_world"&gt; Using the Ranking Digital Rights Corporate Accountability Index for Advocacy &amp;amp; Research; The identity we can't change: a new wave of biometric policies around the world&lt;/a&gt; and &lt;a class="external-link" href="https://internetfreedomfestival.org/wiki/index.php/Enabling_free_speech_online_by_legal_defence:_the_need_for_skilled_lawyers_to_secure_the_free_flow_of_information_online"&gt;Enabling free speech online by legal defence: the need for skilled lawyers to secure the free flow of information online&lt;/a&gt;: Vidushi channeled a discussion about Shreya Singhal v. Union of India as an important case study in understanding how legal defence has been used to secure rights online.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;&lt;b&gt;----------------------------------- 	&lt;br /&gt;&lt;/b&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt; &lt;/b&gt;CIS is involved in promoting access and accessibility to   telecommunications services and resources, and has provided inputs to   ongoing policy discussions 	and consultation papers published by TRAI.   It has prepared reports on unlicensed spectrum and accessibility of   mobile phones for persons with disabilities 	and also works with the   USOF to include funding projects for persons with disabilities in its   mandate:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Newspaper Column&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/telecom/blog/business-standard-march-1-2017-shyam-ponappa-organisational-hurdles-in-telecom"&gt;Organisational Hurdles in Telecom&lt;/a&gt; (Shyam Ponappa; Business Standard; March 1, 2017 and Organizing India Blogspot; March 2, 2017)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;-----------------------------------&lt;/b&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt; The Researchers at Work (RAW) programme is an interdisciplinary    research initiative driven by an emerging need to understand the    reconfigurations of 	social practices and structures through the    Internet and digital media technologies, and vice versa. It aims to    produce local and contextual 	accounts of interactions, negotiations,    and resolutions between the Internet, and socio-material and    geo-political processes:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Research Paper&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/exploring-big-data-for-development-an-electricity-sector-case-study-from-india"&gt;Exploring Big Data for Development: An Electricity Sector Case Study from India&lt;/a&gt; (Ritam Sengupta, Dr. Richard Heeks, Sumandro Chattapadhyay, and Dr. Christopher Foster; Global Development Institute, University of Manchester; March 29, 2017). &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/evaluating-safety-buttons-on-mobile-devices-preview"&gt;Evaluating Safety Buttons on Mobile Devices: Preview&lt;/a&gt; (Rohini Lakshané and Chinmayi S.K.; March 27, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation    that undertakes interdisciplinary research on internet and digital    technologies from 	policy and academic perspectives. The areas of focus    include digital accessibility for persons with disabilities,  access   to knowledge, intellectual 	property rights, openness (including  open   data, free and open source software, open standards, open access,  open   educational resources, and open video), 	internet governance,    telecommunication reform, digital privacy, and cyber-security. The    academic research at CIS seeks to understand the reconfigurations 	of    social and cultural processes and structures as mediated through the    internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div style="text-align: justify; "&gt;Please  help us defend consumer and   citizen rights on the Internet! Write a  cheque in favour of 'The Centre   for Internet and Society' and mail it  to us at No. 	194, 2nd 'C'  Cross,  Domlur, 2nd Stage, Bengaluru - 5600  71.&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;We  invite researchers, practitioners,   artists, and theoreticians, both  organisationally and as individuals,  to  engage with us on topics  related internet 	and society, and improve  our  collective understanding  of this field. To discuss such  possibilities,  please write to Sunil  Abraham, Executive Director, at 	  sunil@cis-india.org (for policy  research), or Sumandro Chattapadhyay,   Research Director, at  sumandro@cis-india.org (for academic research),   with an 	indication of  the form and the content of the collaboration  you  might be interested  in. To discuss collaborations on Indic  language  Wikipedia projects, 	 write to Tanveer Hasan, Programme  Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;i&gt;CIS  is grateful to its primary   donor the Kusuma Trust founded by Anurag  Dikshit and Soma Pujari,   philanthropists of Indian origin for its core  funding and 	support for   most of its projects. CIS is also grateful to  its other donors,   Wikimedia Foundation, Ford Foundation, Privacy  International, UK, Hans  	 Foundation, MacArthur Foundation, and IDRC for  funding its various   projects&lt;/i&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/march-2017-newsletter'&gt;https://cis-india.org/about/newsletters/march-2017-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2017-05-20T12:47:11Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/files/talk-by-anubha-sinha-on-open-access-in-jnu">
    <title>Talk by Anubha Sinha on Open Access in JNU</title>
    <link>https://cis-india.org/openness/files/talk-by-anubha-sinha-on-open-access-in-jnu</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/files/talk-by-anubha-sinha-on-open-access-in-jnu'&gt;https://cis-india.org/openness/files/talk-by-anubha-sinha-on-open-access-in-jnu&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-03-29T05:12:05Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/financial-times-march-27-2017-amy-kazmin-indias-biometric-id-scans-make-sci-fi-a-reality">
    <title>India’s biometric ID scans make sci-fi a reality</title>
    <link>https://cis-india.org/internet-governance/news/financial-times-march-27-2017-amy-kazmin-indias-biometric-id-scans-make-sci-fi-a-reality</link>
    <description>
        &lt;b&gt;I have been thinking about my fingerprints and the secrets that may lie within my eyes — and whether I want to share them with the Indian government. I may not however have a choice.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Amy Kazmin was published in the &lt;a class="external-link" href="https://www.ft.com/content/46dcb248-0fcb-11e7-a88c-50ba212dce4d"&gt;Financial Times&lt;/a&gt; on March 27, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;India has the world’s largest domestic biometric identification system, known as Aadhaar. Since 2010, the government has collected fingerprints and iris scans from more than 1bn residents, and each has been assigned a 12-digit &lt;a class="external-link" href="https://uidai.gov.in/"&gt;identification number&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The scheme is championed by Nandan Nilekani, the billionaire co-founder of IT company Infosys. It was initially conceived to ensure poor Indians received subsidised food entitlements and other welfare benefits that were previously siphoned off by unscrupulous intermediaries. It was also seen as offering poor Indians, many of whom lack birth certificates, with a portable ID that can be used anywhere in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Until now, obtaining an Aadhaar number was voluntary, though most Indians enrolled without hesitation as they see its potential benefits. But New Delhi is now enlisting Aadhaar, which means “foundation” or “base” in Hindi, in more than just welfare schemes. This would mean sharing one’s biometric details isn’t really optional any more despite a Supreme Court ruling that it should be “purely voluntary”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last week, the government issued a rule requiring an Aadhaar number for filing tax returns, ostensibly to improve tax compliance. It has also decided that all cell phone numbers must be linked to an Aadhaar number by 2018. Even Indian Railways has plans to demand Aadhaar from those booking train tickets online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What was once touted as an initiative to improve delivery of welfare suddenly now seems like the foundation of a surveillance state — and I admit the prospect of putting my own biometrics in the database leaves me uneasy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a US citizen, I’ve never had to give my biometric data to my government. Domestically, fingerprints are only taken from criminal suspects, or applicants for government jobs, though I know foreign citizens are fingerprinted on arrival.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To me, the idea of sharing eye scans evokes the dystopian Hollywood film, Minority Report, which depicts a near future in which optical-recognition cameras allow the authorities to identify anyone in any public place. The hero on the run, played by Tom Cruise, has an illegal eye transplant to avoid detection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In recent days, many Indian academics and activists have raised concerns about Aadhaar data security, the lack of privacy rules and the absence of any accountability structure if data are misused.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Biometrics is being weaponised," says Sunil Abraham, executive director of the Bangalore-based Centre for Internet and Society. "What you need to be worried about is that someone will clean out your bank account or frame you in a crime," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pratap Bhanu Mehta, director of the Centre for Policy Research, has written of the “conversion of Aadhaar from a tool of citizen empowerment to a tool of state surveillance and citizen vulnerability”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I call &lt;a class="external-link" href="https://www.ft.com/content/058c4b48-d43c-11e6-9341-7393bb2e1b51"&gt;Mr Nilekani&lt;/a&gt;, of whose honourable intentions I have no doubt. After leaving Infosys in 2009, he spent five years in government, working to get Aadhaar off the ground. He says he is “extremely offended” when his project is accused of being part of a surveillance society, a narrative he says is “completely misrepresenting” the project. “I can steal your fingerprint off your glass. I don’t need this fancy technology,” he says. “Surveillance is far better done by following my phone, or when I use a map to order a taxi: the map knows where I am. Our internet companies know where you are.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But in a society known for ingenious means of bypassing rules, such as having multiple taxpayer ID cards to aid evasion, Mr Nilekani says biometric authentication of individuals can bring discipline and reduce cheating. “It’s like you are creating a rule-based society,” he says, “it’s the transition that is going on right now.”  I hang up, hardly reassured. To me, it seems clear that in India, as in so many places these days, Big Brother is increasingly watching.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/financial-times-march-27-2017-amy-kazmin-indias-biometric-id-scans-make-sci-fi-a-reality'&gt;https://cis-india.org/internet-governance/news/financial-times-march-27-2017-amy-kazmin-indias-biometric-id-scans-make-sci-fi-a-reality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-28T02:45:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/huffington-post-rimin-dutt-ivan-mehta-march-24-2017-why-we-should-all-worry-about-the-mandatory-imposition-of-aadhaar">
    <title>Why We Should All Worry About The Mandatory Imposition Of Aadhaar</title>
    <link>https://cis-india.org/internet-governance/news/huffington-post-rimin-dutt-ivan-mehta-march-24-2017-why-we-should-all-worry-about-the-mandatory-imposition-of-aadhaar</link>
    <description>
        &lt;b&gt;It appears that with each passing day, the government is linking an increasing number of benefits and government services to the 12-digit biometric-based Aadhaar number for Indians, despite growing concerns around its data privacy and security.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Rimin Dutt and Ivan Mehta was published by &lt;a class="external-link" href="http://www.huffingtonpost.in/2017/03/24/why-we-should-all-worry-about-the-mandatory-imposition-of-aadhaa_a_22009826/"&gt;Huffington Post&lt;/a&gt; on March 24, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar, which collects among other information, citizens' iris scans and fingerprints and stores them into a centralised database for a prolonged time with only loose guidelines and no pre-existing laws to ensure the privacy of that data, is now linked to no less than 38 government schemes, including the government's latest directive –- that Aadhaar become mandatory for tax filing and securing PAN numbers -- introduced by Finance Minister Arun Jaitley earlier this week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jaitley openly admitted on Wednesday in the Parliament that the government, in effect, would be forcing people to get Aadhaar in an effort to increase tax compliance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar's use, by no means, is restricted to government agencies alone. A  growing number of private financial institutions are now fulfilling  their "Know Your Customer" or e-KYC formalities by making Aadhaar  compulsory. The government is also in the &lt;a href="http://economictimes.indiatimes.com/news/economy/policy/aadhaar-based-kyc-likely-across-financial-sector/articleshow/57800209.cms" target="_blank"&gt;process&lt;/a&gt; of making Aadhaar the basis of all financial transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the timing of the government's aggressive push of Aadhaar, in itself, is raising eyebrows among &lt;a href="https://scroll.in/article/832503/what-explains-the-desperation-to-make-aadhaar-mandatory-for-tax-returns-after-july-1-2017" target="_blank"&gt;political observers&lt;/a&gt;, there are some serious concerns about this unique experiment that deserve stronger scrutiny.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why disregard the Supreme Court?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In making Aadhaar mandatory for filing taxes and securing core  taxpayer identity, the government has openly gone against a Supreme  Court order from last year that explicitly stated that the Aadhaar Card  scheme is "purely voluntary" and cannot be made mandatory until the  court has decided on this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has defended its move, saying it is allowed to do so  under the Aadhaar (Targeted Delivery of Financial and Other Subsidies,  Benefits and Services) Act 2016.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, as Gopal Krishna, a member of the Citizens Forum for Civil Liberties, &lt;a target="_blank"&gt;writes&lt;/a&gt; in Business Today, the passage of the Act by the Parliament "does not  automatically imply that any agency can make UID/Aadhaar compulsory  disregarding the Supreme Court's orders."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Krishna, in doing so, the government is "clearly  stepping beyond" the mandate of the Aadhaar Act, and also acting in  contempt of the Parliament, according to him.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, if tax evasion was the driving factor behind the move,  it begs the question — wouldn't forcing people to get Aadhaar actually  do the opposite by adding another layer of hassle?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, tax experts have noted how this requirement may hinder tax  collection. Archit Gupta, Founder &amp;amp; CEO ClearTax.com, a tax service  provider &lt;a href="http://www.huffingtonpost.in/2017/03/22/budget-part-ii-here-are-the-highlights-of-the-sweeping-changes_a_21905740/" target="_blank"&gt;told &lt;/a&gt;&lt;i&gt;HuffPost India, "&lt;/i&gt;The  [Aadhaar] announcement is likely to be a dampener to tax filers,  specially first-timers ... FY 2016-17 filing is expected to see a large  number of first-time filers due to demonetisation efforts, and this move  may make them more guarded."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why not strengthen PAN?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The government already has an extensive mandate for the Permanent  Account Number (PAN) cards, which are required to validate several  important services or for undertaking transactions such as buying and  selling property or jewellery worth over ₹2 lakhs. Last year, the  government, in fact, said that the National Pension System (NPS) scheme  would accept PAN cards over Aadhaar cards to validate new customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Wednesday, however, Jaitley said PAN cards have been misused by  certain people to evade taxes, and there are reports that Aadhaar may  become the ultimate authenticating document. However, the continued and  growing use of PAN along with Aadhaar adds an extra layer of formalities  for citizens to access government services, which are their  constitutionally guaranteed rights.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How safe is Aadhaar anyway?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Depending on who you talk to, the safety concerns of Aadhaar come up  as a pressing issue, especially in the wake of a recent security  incident when the Unique Identification Authority of India initiated  police action against entities associated with Axis Bank including  Suvidhaa Infoserve and e-sign provider eMudhra, which had allegedly &lt;a href="http://www.livemint.com/Industry/IKgrYL5pg3eTgfaP253XKI/Aadhaar-data-breach-triggers-privacy-concerns.html" target="_blank"&gt;engaged &lt;/a&gt;in unauthorised authentication and impersonation by illegally storing Aadhaar biometrics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this month, in a separate incident, security researcher  Srinivas Kodali warned Indian authorities of a website that was leaking  Aadhaar demographic data of over five lakh minors, as well as the  existence several parallel databases that had key identification data  linked to Aadhaar, &lt;i&gt;Scroll &lt;/i&gt;&lt;a href="https://scroll.in/article/830589/under-the-right-to-information-law-aadhaar-data-breaches-will-remain-a-state-secret" target="_blank"&gt;reported.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the absence of any privacy laws in India, these security concerns have assumed even greater significance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI, the authority behind Aadhaar, has &lt;a href="https://uidai.gov.in/images/news/Press_Statement_06032017.pdf" target="_blank"&gt;maintained &lt;/a&gt;the  technology behind Aadhaar is robust and that it uses advanced  encryption to transmit and store data. It specifically denied that any  breach of centralised data took place in the Axis Bank incident, saying  the case was an isolated incident.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in a rather ironic twist in the Aadhaar Act, which itself  contains no provisions to address privacy concerns, any legal action  against any misuse or theft of Aadhaar data can only be initiated by  UIDAI, leaving citizens with no legal recourse should a breach occur.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That represents an obvious conflict of interest as it gives exclusive  power to the very authority that is responsible for the security and  confidentiality of identity information and authentication records, PRS  Legislative Research, has noted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, the controversial Aadhaar Act contains several other  inherent dangers such as the potential to profile citizens based on the  linking of other databases with Aadhaar by studying patterns of  behaviour.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Techniques such as running computer programmes across datasets for  pattern recognition can be used for various purposes such as detecting  potential illegal activities...However, these can also lead to  harassment of innocent individuals who get identified incorrectly as  potential threats," noted PRS Legislative.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are currently no safeguards to prevent inappropriate profiling,  instances of which could increase as more and more private  organisations link their data to Aadhaar, and potentially exploit data  for&lt;a href="https://scroll.in/article/824874/what-happens-to-privacy-when-companies-have-your-aadhaar-number" target="_blank"&gt; commercial purposes&lt;/a&gt; without the consent of citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The US, in comparison, has laws in place that require agencies that  collects data to submit an annual report to US Congress on all such data  mining activities.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Other unresolved concerns&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There are several other concerns related to the widespread use of  Aadhaar card and the power it is afforded under the Aadhar act. The act  allows UIDAI to collect biometric information beyond iris and  fingerprint scans, for example, to include other bio-data such as DNA,  noted PRS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The act also allows private agencies to use Aadhaar, which  contradicts an earlier stated objective of the scheme that sought to  restrict the use of Aadhaar for only government expenditures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It allows private persons to use Aadhaar as a proof of identity for  any purpose. This provision will enable private entities such as,  airline, telecom, insurance, real estate etc. companies, to require  Aadhaar as a proof of identity for availing their services," PRS has  noted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There's also the worrying prospect of Aadhaar being used as a  surveillance tool by the government, instead of an e-governance  technology, Sunil Abraham, executive director of research organisation,  Centre for Internet and Society, &lt;a href="http://www.thehindubusinessline.com/specials/india-file/aadhaar-the-12digit-conundrum/article9582271.ece" target="_blank"&gt;told &lt;/a&gt;the &lt;i&gt;The Hindu Business Line, &lt;/i&gt;adding&lt;i&gt; &lt;/i&gt;biometrics only make citizens transparent to the state and not the state transparent to citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We warned the government six years ago, but they ignored us," said Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Krishna has a more dire &lt;a href="http://www.businesstoday.in/current/economy-politics/will-aadhaar-cause-death-of-civil-rights/story/248331.html" target="_blank"&gt;warning:&lt;/a&gt; "The JAM Trinity -- Jan Dhan Yojana, Aadhaar and mobile numbers -- may  well be a fish bait to trap unsuspecting citizens into the world's  biggest transnational biometric database to turn them into subjects  under surveillance forever in the name of a set of welfare and  anti-poverty policies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What has been done to address the security concerns?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It is unclear what the government or UIDAI may have done in the wake  of the security incident to upgrade its systems. According to an expert &lt;i&gt;HuffPost Post India &lt;/i&gt;talked to, many third party apps that are using Aadhar data may not be screened or audited for security, which is a huge worry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kodali told HuffPost India that Aadhaar has potential design issues when it comes to information security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"By design it allows anyone store information of the Aadhaar holder  through [application programming interface]. This is creating many  parallel databases with Aadhaar as a key," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He notes that security is an afterthought for many institutions and companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"UIDAI and the architects of Aadhaar do not accept that data can be a  liability instead of an asset," he said. "The mandatory nature of  Aadhaar without the right infrastructure and skilled workforce is not  just a cyber security issue, but a national security issue."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;When will India get privacy laws?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;No one quite knows. But there's a growing call for a need for strict  privacy laws, given the move towards digital financial transactions and  growing e-commerce use. Most advanced economies including the US, the  UK, France, Australia and New Zealand have &lt;a href="http://www.pcquest.com/no-your-aadhaar-data-is-not-secure/" target="_blank"&gt;enacted privacy laws.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in India, the right to privacy still doesn't exist despite  it being recognised by even the UN charter of human rights. Article 12  of the Universal Declaration of Human Rights states, "No one shall be  subjected to arbitrary interference with his privacy, family, home or  correspondence, nor to attacks upon his honour and reputation. Everyone  has the right to the protection of the law against such interference or  attacks."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The potential for cyber criminals to misuse citizen data isn't lost on even prominent IT industry experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, the chief of IT industry body Nasscom R Chandrashekhar &lt;a href="http://tech.firstpost.com/news-analysis/nasscom-chief-saying-full-data-protection-isnt-possible-should-wake-us-from-our-digital-slumber-367183.html" target="_blank"&gt;told&lt;/a&gt; &lt;i&gt;PTI &lt;/i&gt;that  personal data of online consumers can never be fully secure,  emphasising the need for strict consumer protection laws. "More than 3  million credit card data details were misused recently. Let us face it,  these kind of security breaches will take place. There is nothing called  fully perfect security in IT," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To be sure, Aadhaar has been lauded by several prominent experts and  economists, and it is, undoubtedly, an ambitious project to potentially  aid financial inclusion for a large population that has historically  been outside of a formal financial services net. India also has one of  the lowest tax compliance rates, making tax collection a priority for  the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, Paul Romer, World Bank's chief economist &lt;a href="https://qz.com/933907/paul-romer-on-aadhaar-world-banks-top-economist-says-indias-controversial-id-program-should-be-a-model-for-other-nations/" target="_blank"&gt;told &lt;/a&gt;&lt;i&gt;Bloomberg, "&lt;/i&gt;The  system in India is the most sophisticated that I've seen ... It's the  basis for all kinds of connections that involve things like financial  transactions. It could be good for the world if this became widely  adopted."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But given the sensitivity of citizen biometrics data and potential  for misuse, the government ought to be held accountable for its proper  use and ensure enough safeguards are put in place before its imposition  on each citizen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;b&gt; &lt;/b&gt;&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/huffington-post-rimin-dutt-ivan-mehta-march-24-2017-why-we-should-all-worry-about-the-mandatory-imposition-of-aadhaar'&gt;https://cis-india.org/internet-governance/news/huffington-post-rimin-dutt-ivan-mehta-march-24-2017-why-we-should-all-worry-about-the-mandatory-imposition-of-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-27T15:02:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/evaluating-safety-buttons-on-mobile-devices-preview">
    <title>Evaluating Safety Buttons on Mobile Devices: Preview</title>
    <link>https://cis-india.org/raw/evaluating-safety-buttons-on-mobile-devices-preview</link>
    <description>
        &lt;b&gt;Much technological innovation for women is aimed at addressing violence against women. One such ubiquitous intervention is mobile device-based safety applications, also known as emergency applications. Several police departments in India, public transport services, and commercial services such as taxi-hailing apps deploy a mobile device-based “panic button” for the safety of citizens or customers, especially women. However, the proliferation of safety apps through both public and private players raises several concerns, which will be studied through this study by Rohini Lakshané of the CIS and Chinmayi S.K. of The Bachchao Project. Research assistance for this report was provided by CIS intern Harish R.S.K. Visualisations by Saumyaa Naidu.&lt;/b&gt;
        &lt;h4&gt;Download the preview document: &lt;a href="https://github.com/cis-india/website/raw/master/docs/CIS-TBP_SafetyButtonsMobileDevices_Preview_201703.pdf"&gt;PDF&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;There is currently a deluge of mobile safety apps in India: Apps run or supported by police departments, apps run by public transport services, apps endorsed by celebrities and politicians, an app developed by an entertainment television channel, and apps by NGOs and private developers. Through a public notification made in April 2016, the Ministry of Women and Child Development in India announced that every phone sold in the country from January 2017 should come equipped with a physical panic button and a GPS module 2. An international innovation award for USD 1 million was instituted in late 2016 for innovators to build an emergency alert app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Preliminary user-testing conducted by us shows that many of these apps lack in technical quality and are prone to failure of one kind or another. There are no defined policies of privacy or terms of use, which could lead to possible data and identity theft and egregious surveillance of users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This study will evaluate a total of 26 different apps operational in India, the permissions they use, the privacy policies and end user agreements on their websites, and will also undertake qualitative case studies of the use and deployment of some of these apps.&lt;/p&gt;
&lt;p&gt;The questions framing this evaluation are:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;What are the technical concerns (including those of accessibility and literacy) with user experience of these safety button applications being developed and deployed by both government and private agencies, especially at a moment of crisis?&lt;/li&gt;
&lt;li&gt;How well do the widely used safety button applications in India protect the data shared by the user and the user’s privacy?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;What technical and other solutions can be implemented to ensure more effective, accessible, secure, and responsible modes of communication in such a context?&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;img alt="Permissions used by safety applications for mobile devices." src="https://github.com/cis-india/website/raw/master/img/CIS-TBP_SafetyButtonsMobileDevices_Permissions.png" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;We are releasing one of the datasets that logs all the         different permissions sought by selected “safety applications”         available on the Google Play store in India. It was compiled in         November 2016.&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;b&gt;The dataset has been released under the CC-BY-NC-ND 4.0         International license. All uses of the accompanying data or         parts thereof must contain the following attribution: "Data         provided by Rohini Lakshané (Centre for Internet and Society)         and Chinmayi S K (2018)”. To request a waiver, email rohini [at]         cis-india [dot] org. Data are provided AS-IS, without warranty         as to accuracy or completeness.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Zenodo record: &lt;/b&gt;&lt;b&gt;&lt;a class="moz-txt-link-freetext" href="https://zenodo.org/record/3630585"&gt;https://zenodo.org/record/3630585&lt;/a&gt;&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Click to download:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/files/google-play-safety-app-permissions" class="external-link"&gt;List of permissions sought by safety applications on the Google Play Store&lt;/a&gt; (Excel File)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/files/google-play-safety-app-permissions.ods" class="external-link"&gt;List of permissions sought by safety applications on the Google Play Store&lt;/a&gt; (Open File)&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/evaluating-safety-buttons-on-mobile-devices-preview'&gt;https://cis-india.org/raw/evaluating-safety-buttons-on-mobile-devices-preview&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Rohini Lakshané and Chinmayi S.K.</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Safety Buttons</dc:subject>
    
    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Safety</dc:subject>
    
    
        <dc:subject>Safety Apps</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2023-03-18T04:40:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/benefits-harms-rights-and-regulation-a-survey-of-literature-on-big-data">
    <title>Benefits, Harms, Rights and Regulation: A Survey of Literature on Big Data</title>
    <link>https://cis-india.org/internet-governance/files/benefits-harms-rights-and-regulation-a-survey-of-literature-on-big-data</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/benefits-harms-rights-and-regulation-a-survey-of-literature-on-big-data'&gt;https://cis-india.org/internet-governance/files/benefits-harms-rights-and-regulation-a-survey-of-literature-on-big-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-03-23T02:03:07Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017">
    <title>Comments on Information Technology (Security of Prepaid Payment Instruments) Rules, 2017</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society submitted comments on the Information Technology (Security of Prepaid Payment Instruments) Rules, 2017. The comments were prepared by Udbhav Tiwari, Pranesh Prakash, Abhay Rana, Amber Sinha and Sunil Abraham. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;1. Preliminary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;1.1. This submission presents comments by the Centre for Internet and Society&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; in response to the Information Technology (Security of Prepaid Payment Instruments) Rules 2017 (“the Rules”).&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; The Ministry of Electronics and Information Technology (MEIT) issued a consultation paper (pdf) which calls for developing a framework for security of digital wallets operating in the country on March 08, 2017. This proposed rules have been drafted under provisions of Information Technology Act, 2000, and comments have been invited from the general public and stakeholders before the enactment of these rules.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;2. The Centre for Internet and Society&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;2.1. The Centre for Internet and Society, (“CIS”), is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, and open access), internet governance, telecommunication reform, digital privacy, and cyber-security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.2. This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved, especially the privacy and data security of citizens. CIS is thankful to the MEIT for this opportunity to provide feedback to the draft rules.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;3. Comments&lt;/h3&gt;
&lt;h4 style="text-align: justify; "&gt;3.1  General Comments&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Penalty&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no penalty for not complying with these rules.  Even the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 doesn’t have penalties.  Under section 43A of the Information Technology Act (under which the 2011 Rules have been promulgated), a wrongful gain or a wrongful loss needs to be demonstrated.  This should not be a requirement for financial sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Expansion to Contractual Parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A majority of these rules, in order to be effective and realistically protect consumer interest, should also be expanded to third parties, agents, contractual relationships and any other relevant relationship an e-PPI issuer may delegate as a part of their functioning.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.2  Rule 2: Definitions&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Certain key words relevant to the field of e-PPI based digital payments such as authorisation, metadata, etc. are not defined in the rules and should both be defined and accounted for in the rules to ensure modern developments such as big data and machine learning, digital surveillance, etc. do not violate human rights and consumer interest.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.2  Rule 7: Definition of personal information&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Rule 7 provides an exhaustive list of data that will be deemed to be personal information for the purposes of the Rules. While &lt;b&gt;information collected&lt;/b&gt; at the time of issuance of the pre-paid payment instrument and during its use is included within the scope of Rule 7, it makes no reference to metadata generated and collected by the e-PPI issuer.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.3 Rule 4: Inadequate privacy protections&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Rule 4(2) specifies the details that the privacy policies of each e-PPI issuer must contain. However, these specifications are highly inadequate and fall well below the recommendations under the National Privacy Principles in Report of the Group of Experts on Privacy chaired by Justice A P Shah.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestions: The Rules should include include clearly specified rights to access, correction and opt in/opt out, continuing obligations to seek consent in case of change in policy or purpose and deletion of data after purpose is achieved. Additionally, it must be required that a log of each version of past privacy policies be maintained along with the relevant period of applicability.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.4 Rule 10: Reasonable security practices&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Financial information (“such as bank account or credit card or debit card or other payment instrument details”) is already invoked in an inclusive manner in the definition of ‘personal information’ in Rule 7.  Given this there is no need to make the Reasonable Security Practices Rules applicable to financial data through this provisions: it already is, and it is best to avoid unnecessary redundancy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Solution: This entire rule should be removed.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.5  Rule 12: Traceability&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: There is a requirement created under this rule that payment-related interactions with customers or other service providers be “appropriately trace[able]”.  But it is unclear what that would practically mean: would IP logging suffice? would IMEI need to be captured for mobile transactions? what is “appropriately” traceable? — none of those questions are answered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestion: The NPCI’s practices and RBI regulations, for instance, seek to limit the amount of information that entities like e-PPI providers have.  These rules need to be brought in line with those practices and regulations.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.6 Rule 5: Risk Assessment&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Rule 5 requires e-PPI issuers to carry out risk assessments associated with the security of the payments systems at least once a year and after any major security incident. However, there are no transparency requirements such as publications of details of such review, a summary of the analysis, any security vulnerabilities discovered etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestion:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Broaden the scope of this provision to include not just risk assessments but also security audits.&lt;/li&gt;
&lt;li&gt;Mandate publication of risk assessment and security audit reports.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.7 Rule 11: End-to-End Encryption&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The rule concerning end-to-end encryption (E2E) needs significantly greater detailing to be effective in ensuring the the protection of information at both storage and transit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestions: Elements such as Secure Element or a Secured Server and Trusted User Interface, both concepts to enable secure payments, can be detailed in the rule and a timeline can be established to require hardware, e-PPI practices and security standards to realistically account for such best practices to ensure modern, secure and industry accepted implementation of the rule.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.8 Rule 13: Retention of Information&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Rule 13 leaves the question of retention entirely unanswered by deferring the future rulemaking to the Central Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestions: Rule 13 should be expanded to include the various categories of information that can be stored, guidelines for the short-term (fast access) and long-term storage of the information retained under the rule and other relevant details. The rule should also include the security standards that should be followed in the storage of such information, require access logs be maintained for whenever this information is accessed by individuals, detail secure destruction practices at the end of the retention period  and finally mandate that end users be notified by the e-PPI issuer of when such retained information is accessed in all situations bar exceptional circumstances such as national security, compromising an ongoing criminal investigations, etc.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.9 Rule 14: Reporting of Cyber Incidents&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Rule 14 is an excellent opportunity to uphold transparency, accountability and consumer rights by mandating time- and information-bound notification of cyber incidents to customers, including intrusions, database breaches and any other compromise of the integrity of the financial system. While the requirement of reporting such incidents to CERT-In is already present in the Rule 12 of the CERT Rules, the rule retains the optional nature of notifying customers. The rule should include an exhaustive list of categories or kinds of cyber incidents that should be reported to affected end users without compromising the investigation of such breaches by private organisations and public authorities. Further, the rule should also include penalties for non-compliance of this requirement (both to CERT-In and the consumer) to serve as an incentive for e-PPI issuers to uphold consumer public interest. The rule should be expanded to include a detailed mechanism for such reporting, including when e-PPI issuers and the CERT-In can withhold information from consumers as well as requiring the withheld information be disclosed when the investigation has been completed. Finally, the rule should also require that such disclosures be public in nature and consumers not be required to not disseminate such information to enable informed choice by the end user community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestion:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) In Rule 14(3) “may” should be substituted by “shall”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Penalties of up to 5 lakh rupees may be imposed for each day that the e-PPI issuer fails to report any severe vulnerability that could likely result in harm to customers.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.10 Rule 15: Customer Awareness and Education&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Rule 15 on Customer Awareness and Education by e-PPI issuers does not take into account the vast lingual diversity and varied socio-economic demographic that makes up the end users of e-PPI providers in India, by mandating the actions under the rule must account for these factors prior to be propagated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Solutions: The rule must ensure that e-PPI issuers track record in carrying out awareness is regularly held accountable by both the government and public disclosures on their websites. Further, the rule can be made more concrete and effective by including mobile operating systems in their scope (along with equipments), mandating awareness for best practices for inclusive technologies like USSD banking, specifying notifications to include SMS reports of financial transactions, etc.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.11 Rule 16: Grievance Redressal&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Rule 16 lays down the requirement of grievance redressal, without specifying appellate mechanisms (both within the organisation and at the regulatory level), accountability (via penalties) for non-compliance of the rule nor requiring a clear hierarchy of responsibility within the e-PPI organisation. These factors seriously compromise the efficacy of a grievance redressal framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Solutions: Similar rules for grievance redressal that have been enacted by the Insurance Regulatory and Development Authority for the insurance sector and the Telecom Regulatory Authority of India for the telecom sector can and should serve as a reference point for this rule. Their effectiveness and real world operation should also be monitored by the relevant authorities while ensuring sufficient flexibility exists in the rule to uphold consumer rights and the public interest. Proper appellate mechanisms at the regulatory level are essential along with penalties for non-compliance.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.12 Rule 17: Security Standards&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Rule 17 empowers the Central Government to mandate security standards to be followed by e-PPI issuers operating in India. While appreciable in its overall outlook on ensuring a minimum standard of security, the Rule needs be improved upon to make it more effective. This can be in done by specifying certain minimum security standards to ensure all e-PPI issuers have a minimal level of security, instead of leaving them open to being intimated at a later date.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Solutions: Standards that can either be made mandatory or be used as a reference point to create a new standard under Rule 17(2) are ISO/IEC 14443, IS 14202, ISO/IEC 7816, PCI DSS, etc. Further, the Rule should include penalties for non-compliance of these standards, to make them effectively enforceable by both the government and end users alike. Additional details like the maximum time period in which such security standards should be implemented post their notification, requiring regular third party audits to ensure continuing compliance and effectiveness and requiring updated standards be used upon their release will go a long way in ensuring e-PPI issuers fulfil their mandate under these Rules.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://meity.gov.in/sites/upload_files/dit/files/draft-rules-security%20of%20PPI-for%20public%20comments.pdf"&gt;http://meity.gov.in/sites/upload_files/dit/files/draft-rules-security%20of%20PPI-for%20public%20comments.pdf&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017'&gt;https://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2017-03-23T01:54:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum">
    <title>The 12-digit conundrum</title>
    <link>https://cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum</link>
    <description>
        &lt;b&gt;Even as the Centre plans to link as many as 500 schemes to Aadhaar, concerns over data safety are rising. Richa Mishra reports.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The article by Richa Mishra was published in the       &lt;a href="http://www.thehindubusinessline.com/specials/india-file/aadhaar-the-12digit-conundrum/article9582271.ece"&gt;Hindu         Businessline&lt;/a&gt; on March 13, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The developments of last few weeks       seem to have made real some of the worst fears about Aadhaar. In       February, UIDAI (Unique Identification Authority of India) filed a       police complaint alleging attempts of unauthorised authentication       and impersonation of data related to Aadhaar. Since then, each and       every machinery within the government has been trying to convince       otherwise, that Aadhaar database is safe and secure, and that the       data is protected both by the best available advanced technology       as well as by the stringent legal provisions in the Aadhaar Act.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Not everyone is convinced. Critics       say, biometrics only make the citizen transparent to the State, it       does not make the State transparent to citizens. “We warned the       government six years ago, but they ignored us,” said Sunil       Abraham, Executive Director of Bengaluru-based research       organisation, Centre for Internet and Society. According to him,       the legislation implementing Aadhaar has almost no data protection       guarantees for citizens. He also believes that by opting for       biometrics instead of smart cards the government is using       surveillance technology instead of e-governance technology.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Biometrics is remote, covert and       non-consensual identification technology. It is totally       inappropriate for authentication. This has only increased the       fragility of Indian cyber security,” he stresses.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;However, officials associated with       UIDAI dismiss these arguments. Collecting biometrics does not pose       any threat to the right to privacy because people have been giving       their thumb impression for ages, they say. “The biometrics are       encrypted at source and kept safe and secure. Unauthorised sharing       and leakage of the data does not happen. Fears related to       collection of biometrics are not justified,” an official at the       helm of affairs said. He requested anonymity.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“However, as and when we find that       some suspicious activity or misuse is happening, we will strike at       the very beginning itself. UIDAI has full authentication       regulation under the Aadhaar Act that has to be followed. It       specifies in what manner authorities can use Aadhaar,” the       official pointed out.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;On the ground&lt;/b&gt;&lt;/div&gt;
&lt;p class="body" style="text-align: justify; "&gt;Even as the debate over data       security rages, the &lt;i&gt;aam aadmi &lt;/i&gt; seem to be little       perturbed about the alleged risks involved. For Padmini, who works       as a domestic help in East Delhi and is the sole bread earner for       her family of four, the Aadhaar card meant access to all       government benefits.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“&lt;i&gt;Koi farak nahi padta, kaun         dekhta hai mera card. Mujhko &lt;/i&gt;LPG cylinder &lt;i&gt;ka paisa bank         mein mil jata hai,”&lt;/i&gt; (It doesn’t matter to me who sees my       card. The subsidy for LPG gets transferred to my account) she       says. “&lt;i&gt;Baccho ke school admission mein bhi zaroorat pada,&lt;/i&gt;”       (I needed it to get my children’s admission in school), she added.       Sukh, a cab driver also uses it to get the LPG subsidy.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;While everyone &lt;i&gt;BusinessLine &lt;/i&gt;talked       to were convinced that Aadhaar was not a citizenship card, the       more aware ones saw it as a door that gave access to government       schemes.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;While they had a point, government       officials are careful to make it clear that Aadhaar is not       mandatory. But the popular perception increasingly points to the       opposite view, especially after it emerged that Aadhaar might be       made mandatory for children to receive midday meals at schools.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Another senior government official       said, “Aadhaar is not mandatory under any welfare scheme of the       government and no one is being deprived of a service or benefit       for the want of Aadhaar…it’s required for availing a       service/subsidy/benefit that accrues through the Consolidated Fund       of India.” He added that those who do not have the 12-digit number       would be provided with the facility to enrol by the Requiring       Agency. “And till the time Aadhaar is assigned, alternative IDs       would be allowed,” he said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;If a school which has to get Aadhaar       enrolment done for its students puts the Aadhaar numbers of its       students on its site and the same is used by someone, you can’t       blame us, the official argues. Then, who is accountable?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Pushing for Aadhaar, the UIDAI       officials cite the example of Kerala’s Department of General       Education (DGE), which has integrated Aadhaar with the student       databases and has thereby optimised the teacher-student ratio and       identified the schools with excess teachers. In a single academic       year, 3,892 excess teacher posts were identified.&lt;/p&gt;
&lt;p class="_hoverrDone body" style="text-align: justify; "&gt;“Due to this exercise,       no new posts have been sanctioned for the last two years,       resulting in notional savings of ₹540 crore per annum,” said a       UIDAI official. After student enrolment in the state was linked to       Aadhaar since 2012-2013, the head count of pupils have fallen by 5       lakh. Similar trends have been reported in Haryana. Critics have       also pointed out the possible security risk in using AadhaarPay,       the Andriod-based app. Merchants can download the app in their       phone and install a fingerprint scanner linked to the phone.       Customers with Aadhaar numbers can use their fingerprints (like       the secret PIN in case of debit cards) to do a transaction. While       doubts have been raised about the safety of fingerprint data,       officials in the know blame the controversy on the “card lobbies.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Thirty crore Indians have no       mobiles. They find it difficult to handle password, pin or card,       this is where AadhaarPay will come handy,” the official added.       “They don’t need a smart phone or feature phone. They don’t need a       debit card.&lt;/p&gt;
&lt;p class="_hoverrDone body" style="text-align: justify; "&gt;“Today more than 112       crore people have the Aadhaar card. Approximately, 52.95 crore       people have linked their Aadhaar numbers to their bank accounts.       We already have a system of Aadhaar authentication in place,” the       official added.&lt;/p&gt;
&lt;p class="_hoverrDone body" style="text-align: justify; "&gt;Government officials are       at pain to point out the larger benefits of Aadhaar, including       savings of more than ₹49,000 crore by plugging leakages in       government schemes like PDS. Government plans to increase the       number of welfare schemes linked to Aadhaar from 36 to over 500.       While the intent is good, concerns remain.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum'&gt;https://cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-14T13:50:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/indian-express-nishant-shah-february-19-2017-digital-native-who-will-watch-the-watchman">
    <title>Digital native: Who will watch the watchman?</title>
    <link>https://cis-india.org/raw/indian-express-nishant-shah-february-19-2017-digital-native-who-will-watch-the-watchman</link>
    <description>
        &lt;b&gt;The state mining its citizens as data and suspending rights to privacy under the rhetoric of national security is alarming.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/tech-news-technology/digital-native-who-will-watch-the-watchman-4531548/"&gt;published in the Indian Express&lt;/a&gt; on February 19, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;I want you to start getting slightly uncomfortable right now. Because  even as you read this, your emails are being read without your  knowledge. Your social media network has been accessed by an unknown  agent. Somebody is getting hold of your financial transactions and your  credit card purchases, and creating a profile of your spending habits.  Somebody pretending to be you is checking the naked pictures you might  have backed up in your private cloud.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Somewhere, the profiles that you created for your dating apps are under scrutiny. Your &lt;a href="http://indianexpress.com/about/google/"&gt;Google&lt;/a&gt; search history is slowly being browsed by people who now know what you  searched for last Friday at 3.30 am when you just couldn’t find sleep.  Your WhatsApp texts, including that long sexting session with your ex,  is now being stored in some other memory.The false account that you had  created on Twitter to troll the world, is now linked to all your other  IDs. The &lt;a href="http://indianexpress.com/about/linkedin/"&gt;LinkedIn&lt;/a&gt; connections you sent to a rival company in search for a better job, are now available for others to find.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I wish that I was only presenting a hypothetical dystopia to warn us  about the future of privacy. But, I am not. Because, the future is  already here and it is slowly unfolding in front of you. We often think  of the Internet as a secure system, mumbling things about encryption and  passwords, imagining that if so many people are using it, then it must  surely be safe. And it is true, that largely most of our electronic  communication on the digital circuits is secure, or, at least, not  easily vulnerable to vicious attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Every time we hear about hackers intercepting sensitive information  in databases, we are assured that it was a one-time exceptional case,  and that forensic investigations are being conducted to keep our data  safe. The digital security industry is indeed working hard to make it  increasingly difficult for people with malicious intent to actually read  and manipulate our data that we secure with passwords, fingerprints,  and encryption keys that become more complex and robust.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the biggest concern around privacy, in the Internet of  Things, is not about these cat-and-mouse games of data breaches and  theft. Instead, perhaps, the biggest act of data theft and interception  is conducted in full public view, with our consent. This happens when we  download apps, use single user verification accounts and join free  public hotspots, allowing our data to be freely captured by unseen  actors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The corporate mining of human users is not the only scenario in this  landscape. In the recent reality TV edition of the US politics, they  have just announced that border control in the US can now demand anybody  to hand over their digital devices, passwords to email and social media  accounts, and access to all their digital information in order to gain  entry into the country. Or, in other words, you can be as secure as you  like, but if the government wants, they will get that information from  you as a price of entry into the country. You don’t need the NSA when  you can just walk to the person and ask them to hand over this  information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Closer home in Digital India, things are not better. The Aadhaar  project has failed to address data privacy questions. The data that we  have voluntarily given to Aadhaar can be used to create a massive  surveillance system that sells our data for profits and transactions to  private companies. Similarly, in the post-demonetisation move, as we all  went cashless, we increased our digital footprint in an ecosystem that  has almost no safeguards to protect you from people knowing about your  purchases at the chemist shop last weekend.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As we connect more online, and more devices are linked to our user  profiles, we continue to leak and bleed data which violates the very  core of what we consider our private selves. When we learned about the  market exploiting our private data, we thought that the state would be  the watchman. As the states start being run as markets, we now have a  new question: who shall watch the watchman?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The new interest of the state in mining its citizens as data and  suspending our rights to privacy under the rhetoric of national security  and interest is alarming. The state now thinks of our private data as  capital. We need mechanisms to protect ourselves from the predatory  impulses of the new information states, and while we might not have  remedies, we do need to start the conversation now to safeguard our  futures from the war against privacy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/indian-express-nishant-shah-february-19-2017-digital-native-who-will-watch-the-watchman'&gt;https://cis-india.org/raw/indian-express-nishant-shah-february-19-2017-digital-native-who-will-watch-the-watchman&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2017-03-03T16:18:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
