<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 701 to 715.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/internet-monitor-2013.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/why-cyber-security-and-online-privacy-are-vital-for-success-of-democracy-and-freedom-of-expression"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hindu-january-3-2014-chinmayi-arun-big-brother-is-watching-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-january-1-2014-geeta-padmanabhan-inventions-that-will-make-a-difference"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/internet-monitor-2013-malavika-jayaram-indias-identity-crisis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/december-2013-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/freedom-continuum.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/3rd-global-congress-ip-and-public-interest-open-air-conference-innovation-and-ip-africa.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/nlsir-december-21-2013-nlsir-symposium"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/legal-issues-on-cloud-computing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/sub-tracks.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/technology-in-government-and-topics-in-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/cyberscholars-working-group-mit"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/whatever-happened-to-privacy"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/internet-monitor-2013.pdf">
    <title>Internet Monitor</title>
    <link>https://cis-india.org/internet-governance/blog/internet-monitor-2013.pdf</link>
    <description>
        &lt;b&gt;Malavika's piece on India's Identity Crisis is published in this report.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/internet-monitor-2013.pdf'&gt;https://cis-india.org/internet-governance/blog/internet-monitor-2013.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-01-09T07:33:02Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/why-cyber-security-and-online-privacy-are-vital-for-success-of-democracy-and-freedom-of-expression">
    <title>Digital Citizens: Why Cyber Security and Online Privacy are Vital to the Success of Democracy and Freedom of Expression</title>
    <link>https://cis-india.org/events/why-cyber-security-and-online-privacy-are-vital-for-success-of-democracy-and-freedom-of-expression</link>
    <description>
        &lt;b&gt;Michael Oghia will give a presentation which will show why cyber security and online privacy are vital for democracy and freedom of expression.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the time when Edward Snowden is fighting for both clemency and to be known as a brave whistle blower that exposed government wrongdoing, cyber security and online privacy have never been more important. As &lt;a class="external-link" href="https://www.youtube.com/watch?feature=player_embedded&amp;amp;v=H0I7wi3ZLG8&amp;amp;noredirect=1"&gt;Jacob Applebaum discussed in May last year&lt;/a&gt;, and CIS’ Maria Xynou &lt;a href="https://cis-india.org/internet-governance/events/big-democracy-big-surveillance-a-talk-by-maria-xynou" class="external-link"&gt;presented recently in December&lt;/a&gt;, surveillance throughout the world is increasing. With security apparatus’ likethe NSA and now India’s Central Monitoring System, coupled with corporate data centers around the world storing our e–mails, address books, preferences, and passwords, it is easy to see how our online privacy is increasingly being threatened and often, violated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, online privacy is inextricably linked to freedom of expression, and freedom of expression is a fundamental civil liberty imperative to democracy. Moreover, online security and privacy are essential to good, transparent, and accountable democratic governance. This is largely because surveillance, censorship, and monitoring ultimately create environments where self-censorship is the norm, as is the fear of the government instead of spaces that allow for freedom of expression and democratic dialogue and dissent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What I would like to accomplish my speaking at CIS is not to merely educate about the dangers posed to Internet security or to world democracy, but rather to:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Reiterate the importance of digital privacy and cyber security to the success of democracy and the continued protection of free expression.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Encourage citizens, technology specialists, Internet and privacy advocates, and others to see themselves as part of a larger system of democratic governance and civic participation. This means understanding how technical capabilities intersect with civil society, and then use them to advocate for a more open, accessible, and private cyberspace.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Reinforce that digital media literacy education is vital to ensuring a free, open, accessible, and democratic Internet.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Additionally, I want to present ideas and recommendations for what you can do to engage with these problems, and how we can collaborate together to address them.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;About the Public Intelligence Project&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Public Intelligence Project is an independent, non-partisan, not-for-profit think tank conducting research, education, and advocacy on the importance of diversity, critical thinking, dialogue, and freedom of expression. We seek to promote more robust systems of participatory democracy, civic engagement, and conflict prevention in order to create a culture of democracy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Michael Oghia&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Michael is responsible for a new project at Meta-Culture called the Public Intelligence Project, which focuses on expanding participatory democracy, civic engagement, and conflict prevention by conducting research, education, and advocacy on the intersections between diversity, dialogue, critical thinking, and freedom of expression. While new to the conflict resolution field, as a poet, musician, editor, writer, blogger, and activist, he is well-versed in the importance of freedom of expression and participating in the democratic process. He was born in Kentucky to Lebanese-Syrian parents, and after graduating with a BS in sociology from the University of Louisville, he moved to Lebanon to pursue an MA in sociology from the American University of Beirut. There, he had the opportunity to witness the Arab Revolutions first-hand while research about topics such as Internet ownership in the Middle East, social movements, Arab media, globalization, Arab youth and family, and his thesis subject, romantic love in the Arab world. Michael enjoys engaging Twitter conversations, and has an unnatural affinity for crunchy peanut butter.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Date: Tuesday, January 14, 2014&lt;br /&gt;Time: 6.30 p.m. to 8.00 p.m.&lt;br /&gt;Talk by: Michael Oghia&lt;br /&gt;Title: Research &amp;amp; Advocacy Consultant, and Project Manager&lt;br /&gt;Organisation: Meta-Culture / Public Intelligence Project&lt;br /&gt;Websites: &lt;a class="moz-txt-link-abbreviated" href="http://www.meta-culture.in"&gt;www.meta-culture.in&lt;/a&gt; &lt;a class="moz-txt-link-rfc2396E" href="http://www.meta-culture.in"&gt;&amp;lt;http://www.meta-culture.in&amp;gt;&lt;/a&gt; &amp;amp; &lt;a class="moz-txt-link-abbreviated" href="http://www.publicintelligenceproject.org"&gt;www.publicintelligenceproject.org&lt;/a&gt; &lt;a class="moz-txt-link-rfc2396E" href="http://www.publicintelligenceproject.org"&gt;&amp;lt;http://www.publicintelligenceproject.org&amp;gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/why-cyber-security-and-online-privacy-are-vital-for-success-of-democracy-and-freedom-of-expression'&gt;https://cis-india.org/events/why-cyber-security-and-online-privacy-are-vital-for-success-of-democracy-and-freedom-of-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2014-01-08T04:59:10Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hindu-january-3-2014-chinmayi-arun-big-brother-is-watching-you">
    <title>Big Brother is watching you</title>
    <link>https://cis-india.org/internet-governance/blog/the-hindu-january-3-2014-chinmayi-arun-big-brother-is-watching-you</link>
    <description>
        &lt;b&gt;India has no requirements of transparency whether in the form of disclosing the quantum of interception or in the form of notification to people whose communication was intercepted.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The article by Chinmayi Arun was &lt;a class="external-link" href="http://www.thehindu.com/opinion/op-ed/big-brother-is-watching-you/article5530857.ece"&gt;published in the Hindu&lt;/a&gt; on January 3, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Gujarat telephone tapping controversy is just one of  many kinds of abuse that surveillance systems enable. If a relatively  primitive surveillance system can be misused so flagrantly despite  safeguards that the government claims are adequate, imagine what is to  come with the Central Monitoring System (CMS) and Netra in place.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;News  reports indicate Netra — a “NEtwork TRaffic Analysis system” — will  intercept and examine communication over the Internet for keywords like  “attack,” “bomb,” “blast” or “kill.” While phone tapping and the CMS  monitor specific targets, Netra is vast and indiscriminate. It appears  to be the Indian government’s first attempt at mass surveillance rather  than surveillance of predetermined targets. It will scan tweets, status  updates, emails, chat transcripts and even voice traffic over the  Internet (including from platforms like Skype and Google Talk) in  addition to scanning blogs and more public parts of the Internet.  Whistle-blower Edward Snowden said of mass-surveillance dragnets that  “they were never about terrorism: they’re about economic spying, social  control, and diplomatic manipulation. They’re about power.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;So  far, our jurisprudence has dealt with only targeted surveillance; and  even that in a woefully inadequate manner. This article discusses the  slow evolution of the right to privacy in India, highlighting the  context and manner in which it is protected. It then discusses  international jurisprudence to demonstrate how the right to privacy  might be protected more effectively.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy and the Constitution&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A  proposal to include the right to privacy in the Constitution was  rejected by the Constituent Assembly with very little debate.  Separately, a proposal to give citizens an explicit fundamental right  against unreasonable governmental search and seizure was also put before  the Constituent Assembly. This proposal was supported by Dr. B.R.  Ambedkar. If accepted, it would have included within our Constitution  the principles from which the United States derives its protection  against state surveillance. However, the proposed amendment was rejected  by the Constituent Assembly.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Fortunately, the  Supreme Court has gradually been reading the right to privacy into the  fundamental rights explicitly listed in the Constitution. After its  initial reluctance to affirm the right to privacy in the 1954 case of &lt;i&gt;M.P. Sharma vs. Satish Chandra, &lt;/i&gt;the  court came around to the view that other rights and liberties  guaranteed in the Constitution would be seriously affected if the right  to privacy was not protected. In &lt;i&gt;Kharak Singh vs. The State of U.P., &lt;/i&gt;the  court recognised “the right of the people to be secure in their  persons, houses, papers, and effects” and declared that their right  against unreasonable searches and seizures was not to be violated. The  right to privacy here was conceived around the home, and unauthorised  intrusions into homes were seen as interference with the right to  personal liberty.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;If the &lt;i&gt;Kharak Singh &lt;/i&gt;judgment  was progressive in its recognition of the right to privacy, it was  conservative about the circumstances in which the right applies. The  majority of judges held that shadowing a person could not be seen to  interfere with that person’s liberty. Dissenting with the majority,  Justice Subba Rao maintained that broad surveillance powers put innocent  citizens at risk, and that the right to privacy is an integral part of  personal liberty. He recognised that when a person is shadowed, her  movements will be constricted, and will certainly not be free movements.  His dissenting judgment showed remarkable foresight and his reasoning  is consistent with what is now a universally acknowledged principle that  there is a “chilling effect” on expression and action when people think  that they are being watched.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The right to privacy as defined by the Supreme Court now extends beyond government intrusion into private homes. After &lt;i&gt;Govind vs. State of M.P.&lt;/i&gt;, and &lt;i&gt;Dist. Registrar and Collector of Hyderabad vs. Canara Bank&lt;/i&gt;,  this right is seen to protect persons and not places. Any inroads into  this right for surveillance of communication must be for permissible  reasons and according to just, fair and reasonable procedure. State  action in violation of this procedure is open to a constitutional  challenge.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Our meagre procedural safeguards against phone tapping were introduced in &lt;i&gt;PUCL vs. Union of India &lt;/i&gt;(1997)  after the Supreme Court was confronted with extensive, undocumented  phone tapping by the government. The apex court found itself compelled  to lay down what it saw as bare minimum safeguards, consisting mostly of  proper record-keeping and internal executive oversight by senior  officers such as the home secretary, the cabinet secretary, the law  secretary and the telecommunications secretary. These safeguards are of  little use since they are opaque and rely solely on members of the  executive to review surveillance requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Right and safeguards&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There  is a difference between targeted surveillance in which reasons have to  be given for surveillance of particular people, and the  mass-surveillance which Netra sets up. The question of mass surveillance  and its attendant safeguards has been considered by the European Court  of Human Rights in &lt;i&gt;Liberty and Others vs. the United Kingdom&lt;/i&gt;.  Drawing upon its own past jurisprudence, the European Court insisted on  reasonable procedural safeguards. It stated quite clearly that there are  significant risks of arbitrariness when executive power is exercised in  secret and that the law should be sufficiently clear to give citizens  an adequate indication of the circumstances in which interception might  take place. Additionally, the extent of discretion conferred and the  manner of its exercise must be clear enough to protect individuals from  arbitrary interference. The principles laid down by the European Court  in relation to phone-tapping also require that the nature of the  offences which may give rise to an interception order, the procedure to  be followed for examining, using and storing the data obtained, the  precautions to be taken when communicating the data to other parties,  and the circumstances in which recordings may or must be erased or the  tapes destroyed be made clear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;b&gt;Opaque and ineffective&lt;/b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Our  safeguards apply only to targeted surveillance, and require written  requests to be provided and reviewed before telephone tapping or  Internet interception is carried out. CMS makes the process of tapping  more prone to misuse by the state, by making it even more opaque: if the  state can intercept communication directly, without making requests to a  private telecommunication service provider, then it is one less layer  of scrutiny through which the abuse of power can reach the public. There  is no one to ask whether the requisite paperwork is in place or to  notice a dramatic increase in interception requests.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;India  has no requirements of transparency whether in the form of disclosing  the quantum of interception taking place each year, or in the form of  subsequent notification to people whose communication was intercepted.  It does not even have external oversight in the form of an independent  regulatory body or the judiciary to ensure that no abuse of surveillance  systems takes place. Given these structural flaws, the Amit Shah  controversy is just the beginning of what is to come. Unfettered mass  surveillance does not bode well for democracy.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;i&gt;(Chinmayi  Arun is research director, Centre for Communication Governance,  National Law University, Delhi, and fellow, Centre for Internet and  Society, Bangalore.)&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hindu-january-3-2014-chinmayi-arun-big-brother-is-watching-you'&gt;https://cis-india.org/internet-governance/blog/the-hindu-january-3-2014-chinmayi-arun-big-brother-is-watching-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-01-06T09:31:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-january-1-2014-geeta-padmanabhan-inventions-that-will-make-a-difference">
    <title>Inventions that will make a difference</title>
    <link>https://cis-india.org/news/the-hindu-january-1-2014-geeta-padmanabhan-inventions-that-will-make-a-difference</link>
    <description>
        &lt;b&gt;In an increasingly tech-driven world, what does 2014 have to offer? Geeta Padmanabhan turns the spotlight on some life-changing gadgets. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Geeta Padmanabhan's article &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/technology/inventions-that-will-make-a-difference/article5526055.ece"&gt;published in the Hindu&lt;/a&gt; on January 1, 2014 quotes Maria Xynou.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Digiterati, have you tried Snapchat, the service that makes messages/photos/captions you send disappear in a few seconds once opened? The app with its swelling popularity among the young demands a re-think about data: do you need it around forever? In a remarkable step forward, 2014 may see Forever Internet and Erasable Internet living side by side.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What else is in store? “Your mobile devices and PCs will get more intelligent and remember your different passwords,” said J. Prasanna, AVS labs. “Advanced biometrics will enable scanning (fingerprint/retina) without devices. Sharper attack simulation on the cyber-world will force corporates to improve defence. Industrial houses will opt for more mobile devices — computers like raspberry pi — for logistics/checking. “You may not see a workstation at all!” Maria Xynou, The Centre for Internet and Society, foresees surveillance technologies getting smarter with artificial intelligence software, and people fending them off with crypto-like privacy software. “This might trigger more intrusive technologies,” she said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Big data will grow bigger. Many of the products we depend on — Google's spell-checker, translation service, traffic maps, search-suggestions; Amazon.com's AMZN +0.13% media; Facebook’s News Feed, “friend” facilities — have come out of a huge cache of user data. But Kaspersky Lab expects cybercriminals to use refined mobile-phishing, banking-Trojans and mobile-botnets to hack and modify private information. VPN (virtual private network) services and Tor-anonymisers will become popular, demand for local encryption tools will spurt, it predicts.&lt;/p&gt;
&lt;h3&gt;Folding phones?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Now that curved display (G-Flex) is here, 2014 may bring in “roll-up or fold” smartphones/tablets to fit into our wallets. Also, with smarter tracking-tools and voice-recognition technology smartphones will become so intuitive and efficient that they may reflexively cater to our needs. “It will become a context engine — aware of where it is, where you are going, what you need,” said futurist Paul Saffo. Apple will launch the anticipated big-screen iPhones and iPads (12.9-inch or 13.3-inch), reports Digitimes. Upcoming iPhone models will have a 20mm chipset, and a choice between 4.7-inch and 6-inch display panel. But don't throw away your MacBook Air or MacPro yet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Prepare for a life-changing gadget,” says BBC, referring to Oculus Rift, a “consumer-focused virtual-reality headset”, to be launched by Kickstarter. You wear it and you'll see yourself running along a beach, flying in a spaceship, riding a roller-coaster, it says. Impatient for the “real” one? There are no tech hurdles to having a vehicle that is part-car, part-plane, part-drone parked outside your home, says Missy Cummings, Aeronautics/Astronautics Professor, MIT. The fly-by-wire Airbus is a drone, anyway. Automated systems with micro-second reactions will make transportation network — ground and air — safer. Your regular car will gain advanced tech features, from in-built sat-navs, parking assistance to voice-activated/touchscreen DVD players and radios.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Educator Sugata Mitra hopes to launch an entire school in the cloud — the tech-cloud. Retired teachers in remote areas will teach through Skype, classrooms will be beamed from all parts of the planet — “deep in the jungle, or high on a mountain.” Kids can just gather at one home for lessons, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Robots will take longer strides in 2014. Google's Japanese start-up robot won the Darpa rescue-challenge by carrying out all the eight rescue-themed tasks ahead of rivals. Its dexterous, independent “robot army” will carry packages, push strollers. LiveScience reports Knightscope's five-foot K5 robot-cop's on-board sensor that can see, hear, touch and smell its surroundings will combine its observations with public data and use the information to predict if, when and where a crime is likely to occur. Asutosh Saxena's team at Cornell University has created a robot (PR2) programmed to free shop-assistants from drudgery — it packs purchases at check-out counters. Forrester Research's Jeff Ernst believes ICANN’s gTLD (generic top-level domain) program is a game-changer. The introduction of .brand and .category will help you choose products with ease and marketers fight off cybersquatters.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The best gift&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To me the best gift of 2014 is the Copenhagen wheel. With an attached computer/sensor-aided device, this bicycle wheel monitors pedalling and activates an on-board electric-motor when you need support. Connecting wirelessly to the biker's smartphone, the device tracks distance travelled and elevation gained, shares with friends the number of calories burned, locks the wheel remotely as you walk away from the bike. An electric-hybrid bicycle!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mark Anderson, Strategic News Service anticipates Apple's Siri-like products to get an upgrade, visualisation tools to usher in “seeing data.” Software-defined networking and storage will cause a “stampede to virtualise everything.” Technical work to break down barriers between clouds will spawn software that can run anywhere. E-mapping will include MALT (Micromapping, Advertising, Location/ID, Transactions). Indoor maps and location information will place advertising targeted at you, leading to transaction in which “your phone will direct you to where things on your shopping-list are. You pick them up, the store knows who you are, how you pay, and you’ll just walk out.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Track these&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;2014 will see computers that can learn from their own mistakes.&lt;/li&gt;
&lt;li&gt;Spending on mobile, work-collaboration and video-conferencing apps will rise.&lt;/li&gt;
&lt;li&gt;Demand for “big data” analysts will soar.&lt;/li&gt;
&lt;li&gt;Small start-ups will raise money more through crowdfunding, less from venture capitalists.&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-january-1-2014-geeta-padmanabhan-inventions-that-will-make-a-difference'&gt;https://cis-india.org/news/the-hindu-january-1-2014-geeta-padmanabhan-inventions-that-will-make-a-difference&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-12T11:07:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india">
    <title>Internet Privacy in India</title>
    <link>https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india</link>
    <description>
        &lt;b&gt;Internet privacy encompasses a wide range of issues and topics. It can be understood as privacy rights that an individual has online with respect to their data, and violations of the same that take place online. Given the dynamic nature of the online sphere, privacy concerns and issues are rapidly changing. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;The Changing Nature of Information&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For example – the way in which the internet allows data to be produced, collected, combined, shared, stored, and analyzed is constantly changing and re-defining  personal data and what type of protections personal data deserves and can be given. For example, seemingly harmless data such IP address, key words used in searches, websites visited, can now be combined and analysed to identify individuals and learn personal information about an individual.  From information shared on social media sites, to cookies collecting user browser history, to individuals transacting online, to mobile phones registering location data – information about an individual is generated through each use of the internet. In some cases the individual is aware that they are generating information and that it is being collected, but in many cases, the individual is unaware of the information trail that they are leaving online, do not know who is accessing the information, and do not have control over how their information is being handled, and for what purposes it is being used. For example, law enforcement routinely troll social media sites for information that might be useful in an investigation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Blurry Line between the Public and Private Sphere&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The above example also highlights how the “sphere” of information on the internet is unclear i.e. is information posted on social media public information – free for use by any individual or entity including law enforcement, employees, data mining companies etc. or is information posted on social media – private, and thus requires authorization for further use. For example, in India, in 2013 the Mumbai police established a “social media lab” for the purposes of monitoring and tracking user behavior and activities.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Authorization is not required for the lab to monitor individuals and their behavior, and individuals are not made aware of the same, as the project claims to analyze only publicly available information. Similar dilemmas have been dealt with by other countries. For example, in the U.S, individuals have contested the use of their tweets without permission,&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; while courts in the US have ruled that tweets, private and public, can be obtained by law enforcement with only a subpoena, as technically the information has been shared with another entity, and is therefore no longer private.&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;Indian Courts have yet to deal directly with the question of social media content being public or private information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Complication of Jurisdiction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The borderless nature of information flows over the Internet complicates online privacy, as individual's data is subjected to different levels of protection depending on which jurisdiction it is residing in. Thus, for example an Indian using Gmail, will be subject to the laws of the United States. On one hand this could be seen as a positive, if one country has stronger privacy protections than another, but could also be damaging to privacy in the reverse situation – where one company has lower privacy standards and safeguards. In addition to the dilemma of different levels of protection being provided over data as it flows through different jurisdictions, access by law enforcement to data stored in a different jurisdiction, or data from one country accessible to law enforcement because it is being processed in their jurisdiction, are two other complications that arise.  These complications cannot be emphasized more than with the case of the NSA Leaks. Because Indian data was residing in US servers, the US government could access and use the data with no obligation to the individual.&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;In response to the NSA leaks, the government of India has stated that all facts need to be known before any action is taken, while citizens initially sought to hold the companies who disclosed the data to US security agencies such as Google, Facebook etc. accountable.&lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite this, because the companies were acting within the legal limits of the United States where they were incorporated, they could not be held liable. In response to the dilemma, many actors in India, including government and industry are asking for the establishment of 'domestic servers'. For example, Dr. Kamlesh Bajaj, CEO of Data Security Council of India was quoted in Forbes magazine promoting the establishment of India centric social media platforms.&lt;a href="#fn6" name="fr6"&gt;[6] &lt;/a&gt;Similarly, after the PRISM scandal became public, the National Security Advisor requested the Telecom Department to only route traffic data through Indian servers.&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In these contexts, the internet is a driving force behind a growing privacy debate and awareness in India.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Current  Policy for Internet Privacy in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Currently, India's most comprehensive legal provisions that speak to privacy on the internet can be found in the Information Technology Act (ITA) 2000.  The ITA contains a number of provisions that can, in some cases, safeguard online privacy, or in other cases, dilute online privacy. Provisions that clearly protect user privacy include: penalizing child pornography,&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;penalizing, hacking and fraud&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;and defining data protection standards for body corporate.&lt;a href="#fn10" name="fr10"&gt;[10] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provisions that serve to dilute user privacy speak to access by law enforcement to user's personal information stored by body corporate&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; collection and monitoring of internet traffic data&lt;a href="#fn12" name="fr12"&gt;[12] &lt;/a&gt;and real time monitoring, interception, and decryption of online communications.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; Additionally, legislative gaps in the ITA serve to weaken the privacy of online users. For example, the ITA does not address questions and circumstances like the evidentiary status of social media content in India, merging and sharing of data across databases, whether individuals can transmit images of their own “private areas” across the internet, if users have the right to be notified of the presence of cookies and do-not track options, the use of electronic personal identifiers across data bases, and if individuals have the right to request service providers to take down and delete their personal content.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Online Data Protection&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Since 2010, there has been an increasing recognition by both the government and the public that India needs privacy legislation, specifically one that addresses the collection, processing, and use of personal data. The push for adequate data protection standards in India has come both from industry and industrial bodies like DSCI – who regard strong data protection standards as an integral part of business, and from the public, who has voiced increasing concerns that governmental projects, such as the UID, involved with collecting, processing, and using personal data are presently not adequately regulated and are collecting and processing data in such a way that abuses individual privacy.  As mentioned above, India's most comprehensive data protection standards are found in the ITA and are known as  the Information Technology “Reasonable security practices and procedures and sensitive personal data or information” Rules 2011.&lt;a href="#fn14" name="fr14"&gt;[14] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Rules seek to provide rights to the individual with regards to their information and obligate body corporate to take steps towards protecting the privacy of consumer's information. Among other things, the Rules define “sensitive personal information' and require  that any corporate body must publish an online privacy policy, provide individuals with the right to access and correct their information, obtain consent before disclosing sensitive personal information ' except in the case of law enforcement, provide individuals the ability to withdraw consent, establish a grievance officer, require companies to ensure equivalent levels of protection when transferring information, and put in place reasonable security practices. Though the Rules are the strongest form of data protection in India, they have not been recognized by the European Union as meeting the EU standards of “data secure”&lt;a href="#fn15" name="fr15"&gt;[15] &lt;/a&gt;and many gaps still exist. For example, the Rules apply only to:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Body corporate and not to the government&lt;/li&gt;
&lt;li&gt;Electronically generated and transmitted information &lt;/li&gt;
&lt;li&gt;A limited scope of sensitive personal information.&lt;/li&gt;
&lt;li&gt;A body corporate when a contractual agreement is not already in place.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;These gaps leave a number of bodies unregulated and types of information unprotected, and limits the scope of the Rules.  It is also unclear to what extent companies are adhering to these Rules, and if they are applying the Rules only to the use of their website or if they are also applying the Rules to their core business practices.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Cyber Cafés&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2011 the Guidelines for Cyber Café Rules were notified under the Information Technology Act. These Rules, among other things, require Cyber Café’s to retain the following details for every user for a period of one year: details of identification, name, address, contact number, gender, date, computer terminal identification, log in time, and log out time. These details must be submitted to the same agency as directed, on a monthly basis.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; Cyber Cafes must also retain the history of websites accessed and logs of proxy servers installed at the cyber café for a period of one year.&lt;a href="#fn17" name="fr17"&gt;[17] &lt;/a&gt;Furthermore, Cyber Café’s must ensure that the partitions between cubicles do not exceed four and half feet in height from floor level.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; Lastly, the cyber café owner is required to provide every related document, register, and information to any officer authorized by the registration agency on demand.&lt;a href="#fn19" name="fr19"&gt;[19] &lt;/a&gt;In effect, the identification and retention requirements of these rules both impact privacy and freedom of expression, as cyber cafes users cannot use the facility anonymously and all their information, including browser history, is stored on an a-priori basis. The disclosure provisions in these rules also impact privacy and demonstrate a dilution of access standards for law enforcement to users internet communications as the provision does not define:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;An authorization process by which the registration agency follows to authorize individuals to conduct inspections.&lt;/li&gt;
&lt;li&gt;Circumstances on which inspection of a Cyber Café by an authorized officer is necessary and permissible.&lt;/li&gt;
&lt;li&gt;The process for which information can be requested, and instead vaguely requires cyber café owners to disclose information “on demand”.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Online Surveillance and Access&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The ITA also allows for the interference of user privacy online by defining broad standards of access to law enforcement and security agencies, and providing the government with the power to determine what tools individuals can use to protect their privacy. This is most clearly demonstrated by provisions that permit the interception, monitoring, and decryption of digital communications&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; provide for the collection and monitoring of traffic data&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; and allow the government to set the national encryption standard.&lt;a href="#fn22" name="fr22"&gt;[22] &lt;/a&gt;In particular, the structure of these provisions and the lack of safeguards incorporated, serve as a dilution to user privacy. For example, though these provisions create a framework for interception they are missing a number of internationally recognized safeguards and practices, such as notice to the individual, judicial oversight, and transparency requirements. Furthermore, the provisions place extensive security and technical obligations on the service provider – as they are required to extend all facilities necessary to security agencies for interception and decryption, and hold the service provider liable for imprisonment up to seven years for non-compliance. This creates an environment where it is unlikely that the service provider would challenge any request for access or interception from law enforcement. Interception is also regulated through provisions and rules under the Indian Telegraph Act 1885 and subsequent ISP and UAS licenses.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Scope of Surveillance and Access&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The extent to which the Government of India lawfully intercepts communications is not entirely clear, but in 2011 news items quoted that in the month of July  8,736 phones and e-mail accounts were under lawful surveillance.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though this number is representative of authorized interception, there have been a number of instances of unauthorized interceptions that have taken place as well. For example, in 2013 it was found that in Himachel Pradesh 1371 phones were tapped based on verbal approval, while the Home Ministry had only authorized interception of 170.&lt;a href="#fn24" name="fr24"&gt;[24] &lt;/a&gt;This demonstrates that there are instances of when existing safeguards for interception and surveillance are undermined and highlights the challenge of enforcement for even existing safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Demonstrating the tensions between right to privacy and governmental access to communications, and at the same time highlighting the issue of jurisdiction was the standoff between RIM/BlackBerry and the Indian Government. For several years, the Indian Government has requested that RIM provide access to the company’s communication traffic, both BIS and BES, as Indian security agencies have been unable to decrypt the data. Solutions that the Indian Government has proposed include: RIM providing the decryption keys to the government, RIM establishing a local server, local ISPs and telcos developing an indigenous monitoring solution. In 2012, RIM finally established a server in Mumbai and in 2013 provided a lawful interception solution that satisfied the Indian Government.&lt;a href="#fn25" name="fr25"&gt;[25]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The implementation of the Central Monitoring System by the Indian Government is another example of the Government seeking greater access to communications. The system will allow security agencies to bypass service providers and directly intercept communications. It is unclear if the system will provide for the interception of only telephonic communications or if it will also allow for the interception of digital communications and internet traffic. It is also unclear what checks and balances exist in the system. By removing the service provider from the equation the government is not only taking away a potential check, as service providers can resist unauthorized requests, but it is also taking away the possibility for companies to be transparent about the interception requests that they comply with.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Future frameworks for privacy in India: The Report of the Group of Experts on Privacy&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In October 2012 the Report of the Group of Experts on Privacy was published by a committee of experts chaired by Justice A.P. Shah.&lt;a href="#fn26" name="fr26"&gt;[26] &lt;/a&gt;The report creates a set of recommendations for a privacy framework and legislation in India. Most importantly, the Report recognizes privacy as a fundamental right and defines nine National Privacy Principles that would apply to all data controllers both in the private sector and the public sector. This would work to ensure that businesses and governments are held accountable to protecting privacy and that legislation and practices found across sectors, states/governments, organizations, and governmental bodies are harmonized. The privacy principles are in line with global standards including the EU, OECD, and APEC principles on privacy, and include: notice, choice &amp;amp; consent, collection limitation, purpose limitation, access and correction, accountability, openness, disclosure of information, security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Report also envisions a system of co-regulation, in which the National Privacy Principles will be binding for every data controller, but Self Regulatory Organizations at the industry level will have the option of developing principles for that specific sector. The principles developed by industry must be approved by the privacy commissioner and be in compliance with the National Privacy Principles. In addition to defining principles, the Report recommends the establishment of a privacy commissioner for overseeing the implementation of the right to privacy in India and specifies that aggrieved individuals can seek redress either through issuing a complaint the privacy commissioner or going before a court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The nine national privacy principles include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notice: Principle 1: Notice&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A data controller shall give simple to understand notice of its information practices to all  individuals, in clear and concise language, before any personal information is collected from them. Such notices should include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;During Collection &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What personal information is being collected; &lt;/li&gt;
&lt;li&gt;Purposes for which personal information is being collected; &lt;/li&gt;
&lt;li&gt;Uses of collected personal information; &lt;/li&gt;
&lt;li&gt;Whether or not personal information may be disclosed to third persons; &lt;/li&gt;
&lt;li&gt;Security safeguards established by the data controller in relation to the personal information; &lt;/li&gt;
&lt;li&gt;Processes available to data subjects to access and correct their own personal information; &lt;/li&gt;
&lt;li&gt;Contact details of the privacy officers and SRO ombudsmen for filing complaints. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Other Notices&lt;/b&gt;&lt;br /&gt;Data breaches must be notified to affected individuals and the commissioner when applicable. Individuals must be notified of any legal access to their personal information after the purposes of the access have been met. Service providers would have to explain how the information would be used and if it may be disclosed to third persons such as advertisers, processing  Individuals must be notified of changes in the data controller’s privacy policy. Any other information deemed necessary by the appropriate authority in the interest of the privacy of data subjects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: A telecom service provider must make available to individuals a privacy policy before any personal information is collected by the company. The notice must include all categories of information as identified in the principle of notice. For example, the service provider must identify the types of personal information that will be collected from the individual from the initial start of the service and during the course of the consumer using the service. For a telecom service provider this could range from name and address to location data.  The notice must identify if information will be disclosed to third parties such as advertisers, processers, or other telecom companies. If a data breach that was the responsibility of the company takes place, the company must notify all affected customers. If individuals have their personal data accessed or intercepted by Indian law enforcement or for other legal purposes, they have the right to be notified of the access after the case or other purpose for the data has been met.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 2: Choice and Consent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A data controller shall give individuals choices (opt-in/opt-out) with regard to providing their personal information, and take individual consent only after providing notice of its information practices. Only after consent has been taken will the data controller collect, process, use, or disclose such information to third parties, except in the case of authorized agencies. When provision of information is mandated by law, it should be in compliance with all other National Privacy Principles. Information collected on a mandatory basis should be anonymized within a reasonable timeframe if published in public databases. As long as the additional transactions are performed within the purpose limitation, fresh consent will not be required. The data subject shall, at any time while availing the services or otherwise, also have an option to withdraw his/her consent given earlier to the data controller. In such cases the data controller shall have the option not to provide goods or services for which the said information was sought if such information is necessary for providing the goods or services. In exceptional cases, where it is not possible to provide the service with choice and consent, then choice and consent should not be required.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of implementation&lt;/b&gt;: If an individual is signing up to a service, a company can only begin collecting, processing, using and disclosing their data after consent has been taken. If the provision of information is mandated by law, as is the case for the census, this information must be anonymized after a certain amount of time if it is published in public databases. If there is a case where consent is not possible, such as in a medical emergency, consent before processing information, does not need to be taken.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 3: Collection Limitation&lt;/h3&gt;
&lt;p&gt;A data controller shall only collect personal information from data subjects as is necessary for the purposes identified for such collection, regarding which notice has been provided and consent of the individual taken. Such collection shall be through lawful and fair means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: If a bank is collecting information to open an account for a potential customer, they must collect only that information which is absolutely necessary for the purpose of opening the account, after they have taken the consent of the individual.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 4: Purpose Limitation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Personal data collected and processed by data controllers should be adequate and relevant to the purposes for which they are processed. A data controller shall collect, process, disclose, make available, or otherwise use personal information only for the purposes as stated in the notice after taking consent of individuals. If there is a change of purpose, this must be notified to the individual. After personal information has been used in accordance with the identified purpose it should be destroyed as per the identified procedures. Data retention mandates by the government should be in compliance with the National Privacy Principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: If a bank is collecting information from a customer for opening a bank account, the bank can only use that information for the purpose of opening the account and any other reasons consented to. After a bank has used the information to open an account, it must be destroyed. If the information is retained by the bank, it must be done so with consent, for a specific purpose, with the ability of the individual to access and correct the stored information, and in a secure fashion.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 5: Access and Correction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Individuals shall have access to personal information about them held by a data controller; shall be able to seek correction, amendments, or deletion such information where it is inaccurate; be able to confirm that a data controller holds or is processing information about them; be able to obtain from the data controller a copy of the personal data. Access and correction to personal information may not be given by the data controller if it is not, despite best efforts, possible to do so without affecting the privacy rights of another person, unless that person has explicitly consented to disclosure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: An individual who has opened a bank account, has the right to access the information that was initially provided and subsequently generated. If there is a mistake, the individual has the right to correct the mistake. If the individual requests information related to him that is stored on a family member from the bank, the bank cannot disclose this information without explicit consent from the family member as it would impact the privacy of another.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 6: Disclosure of Information&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A data controller shall only disclose personal information to third parties after providing notice and seeking informed consent from the individual for such disclosure. Third parties are bound to adhere to relevant and applicable privacy principles. Disclosure for law enforcement purposes must be in accordance with the laws in force. Data controllers shall not publish or in any other way make public personal information, including personal sensitive information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: If a website, like a social media site, collects information about how a consumer uses its website, this information cannot be sold or shared with other websites or partners, unless notice of such sharing has been given to the individual and consent has been taken from the individual. If websites provide information to law enforcement, this must be done in accordance with laws in force, and cannot be done through informal means. The social media site would be prohibited from publishing, sharing, or making public the personal information in any way without obtaining informed consent.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 7: Security&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A data controller shall secure personal information that they have either collected or have in their custody, by reasonable security safeguards against loss, unauthorised access, destruction, use, processing, storage, modification, deanonymization, unauthorized disclosure [either accidental or incidental] or other reasonably foreseeable risks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: If a company is a telecommunication company, it must have security measures in place to protect customers communications data from loss, unauthorized access, destruction, use, processing, storage, modification, denanonmyization, unauthorized disclosure, or other forseeable risk. This could include encrypting communications data, having in place strong access controls, and establishing clear chain of custody for the handling and processing communications data.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 8: Openness&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A data controller shall take all necessary steps to implement practices, procedures, policies and systems in a manner proportional to the scale, scope, and sensitivity to the data they collect, in order to ensure compliance with the privacy principles, information regarding which shall be made in an intelligible form, using clear and plain language, available to all individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: If a hospital is collecting and processing personal information of, for example, 1,000 patients, their policies and practices must reflect and be applicable to the amount, sensitivity, and nature of information that they are collecting. The policies about the same must be made available to all individuals – this includes individuals of different intelligence, skill, and developmental levels.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 9: Accountability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The data controller shall be accountable for complying with measures which give effect to the privacy principles. Such measures should include mechanisms to implement privacy policies; including tools, training, and education; external and internal audits, and requiring organizations or overseeing bodies extend all necessary support to the Privacy Commissioner and comply with the specific and general orders of the Privacy Commissioner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: To ensure that a hospital is in compliance with the national privacy principles, it must undertake activities like running trainings and providing educational information to employees on how to handle patient related information, conducting audits, and establishing an officer or body for overseeing the implementation of privacy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Public Discourses on Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In India, there have been a number of important discourses related to privacy around various projects and topics. These discourses have been driving public awareness about privacy in India, and represent an important indication of public perception of privacy and privacy concerns.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Unique Identification Project&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;One of these discourses is a public dialogue and debate on the Unique Identification Project. Since 2009 the Government of India has been rolling out an identity scheme known as UID or Aadhaar.  The scheme is applicable to all residents in India, and seeks to provide individuals with an identity based on their fingerprints, iris scans, and photograph. The project has been heavily supported by some, and at the same time, heavily critiqued by others. Of those critiquing the project, which included a Parliamentary Standing Committee on Finance,&lt;a href="#fn27" name="fr27"&gt;[27] &lt;/a&gt;privacy has been a driving force behind the concerns about the project. Arguing that not only does the UID Bill not have sufficient privacy safeguards in its provisions&lt;a href="#fn28" name="fr28"&gt;[28] &lt;/a&gt;but the design of the project and the technology of the project places individual privacy at risk. For example,  the project relies on centralized storage of biometrics collected under the scheme; it does not account for or address how transaction data that is generated each time an individual identifies himself/herself with the UID will be stored, processed, and shared; and does not provide adequate security measures to protect sensitive information like biometrics.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Human DNA Profiling Bill&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2006 the Department of Biotechnology piloted a draft human DNA Profiling Bill with the objective of creating DNA databases at the national and regional levels, and enabling the creation and storage of DNA profiles for forensic purposes. Since 2006 there have been two more drafts of the bill released to the public, and an expert committee has been created to finalize the text of the bill. Individuals, including the Centre for Internet and Society, publicly raising concern about the bill, cite a lack of privacy safeguards in the provisions, and expansive circumstances and reasons that the bill permits the creation and storage of DNA profiles.&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Surveillance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For many years there has been running public discourse about the surveillance that the Indian government has been undertaking. This discourse is growing and is now being linked to privacy and the need for India to enact a privacy legislation. As discussed above, the current surveillance regime is lacking on many fronts, while at the same time the government continues to seek greater interception powers and more access to larger sets of information in more granularity. Projects like the Central Monitoring System, NATGRID, and Lawful Interception Solutions have caused individuals to question the government on the proportionality of State surveillance and ask for a comprehensive privacy legislation that also regulates surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The need for strong and enforceable surveillance provisions is not unique to India, and in 2013 the International Principles on the Application of Human Rights to the Surveillance of Communications were drafted. The principles lay out standards that ensure that surveillance is in compliance with international human rights law and serve as safeguards that countries can incorporate into their regimes to ensure the same. The principles include: legality, legitimate aim, necessity, adequacy, proportionality, competent judicial authority, due process, user notification, transparency, public oversight, integrity of communications and systems, safeguards for international cooperation, safeguards against illegitimate access. Along with defining safeguards, the principles highlight the challenge of rapidly changing technology and how it is constantly changing how information can be surveilled by governments and what information surveilled by governments, and how information can be combined and analysed to draw conclusions about individuals.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A Privacy Legislation for India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Since 2010, there has been a strong public discourse around the need for a privacy legislation in India. In November 2010, a “Privacy Approach” paper was released to the public which envisioned the creation of a data protection legislation. In 2011, the Department of Personnel and Training released a draft privacy bill that defined a privacy regime that encompassed data protection, surveillance, and mass marketing, and recognized privacy as a fundamental right.&lt;a href="#fn31" name="fr31"&gt;[31] &lt;/a&gt;In 2012 the Report of the Group of Experts on Privacy, as discussed above, was published.&lt;a href="#fn32" name="fr32"&gt;[32] &lt;/a&gt;Presently, the Department of Personnel and Training is drafting the text of the Governments Privacy Bill.  In 2013, the Centre for Internet and Society drafted the Citizen’s Privacy Protection Bill – a citizen’s version of a privacy legislation for India.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt; From April 2013 – October 2013, the Centre for Internet and Society, in collaboration with the Federation of Indian Chambers of Commerce and Industry and the Data Security Council of India, held a series of seven Privacy Roundtables across India.  The objective of the Roundtables was to gain public feedback to a privacy framework in India. Topics discussed during the meetings included, how to define sensitive personal information vs. Personal information, if co-regulation should be a model adopted as a regulatory framework, and what should be the legal exceptions to the right to privacy.&lt;a href="#fn34" name="fr34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Clearly, privacy is an emerging and increasingly important field in India’s internet society. As companies collect greater amounts of information from and about online users, and as the government continues to seek greater access and surveillance capabilities, it is critical that India prioritizes privacy and puts in place strong safeguards to protect the privacy of both Indians and foreigners whose data resides temporarily or permanently in India.  The first step towards this is the enactment of a comprehensive privacy legislation recognizing privacy as a fundamental right. The Report of the Group of Experts on Privacy and the government considering a draft privacy bill are all steps in the right direction.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. http://www.zdnet.com/in/india-sets-up-social-media-monitoring-lab-7000012758/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. http://www.techdirt.com/articles/20130203/18510621869/investigative-journalist-claims-her-public-tweets-arent-publishable-threatens-to-sue-blogger-who-does-exactly-that.shtml&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. http://www.bbc.co.uk/news/technology-24744695&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. http://www.thehindu.com/news/national/sc-to-hear-pil-on-us-surveillance-of-internet-data/article4829549.ece&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. http://forbesindia.com/article/checkin/indias-internet-privacy-woes/35971/1&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. http://www.thehindubusinessline.com/industry-and-economy/info-tech/route-domestic-net-traffic-via-india-servers-nsa-tells-operators/article5022791.ece&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. ITA section 67&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. ITA section 43, 66, and 66F&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Information Technology (Reasonable security practices and procedures and Sensitive personal data or information) Rules, 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Information Technology (Reasonable security practices and procedures and Sensitive personal data or information) Rules, 2011.  section 6(1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Information Technology (Procedure and Safeguards for monitoring and collection of Traffic Data or other information) Rules 2009&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn1"&gt;13&lt;/a&gt;]. Information Technology (Procedure and Safeguards for intercepting, monitoring, and decryption) Rules 2009&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Ibid footnote 6&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Business Standard. Data secure status for India is vital: Sharma on the FTA with EU. September 3rd 2013. Available at: http://www.business-standard.com/article/economy-policy/data-secure-status-for-india-is-vital-sharma-on-fta-with-eu-113090300889_1.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Guidelines for Cyber Cafe Rules 5(2) &amp;amp; 5(3). Available at: http://deity.gov.in/sites/upload_files/dit/files/GSR315E_10511(1).pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Guidelines for Cyber Cafe Rules 5(4)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Guidelines for Cyber Cafe Rules 5(6)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Guidelines for Cyber Café Rules 5(6)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Guidelines for Cyber Café Rules 7(1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Ibid footnote 9&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. Ibid footnote 8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. ITA section 84A&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. Jain, B. 8,736 phone and e-mail accounts tapped by different government agencies in July. September 17th 2011. Available at: http://articles.economictimes.indiatimes.com/2011-09-17/news/30169231_1_phone-tap-e-mail-accounts-indian-telegraph-act&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. The Economic Times. Action to be taken in ‘phone tapping’ during BJP rule: Virbhadra Singh. March 6th 2013. Available at: http://articles.economictimes.indiatimes.com/2013-03-06/news/37500338_1_illegal-phone-virbhadra-singh-previous-bjp-regime&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. Chaudhary, A. BlackBerry’s Tussle with Indian Govt. Finally Ends; BB Provides Interception System. http://www.medianama.com/2013/07/223-blackberrys-tussle-with-indian-govt-finally-ends-bb-provides-interception-system/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. Report of the Group of Experts on Privacy. Available at: http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. http://164.100.47.134/lsscommittee/Finance/42%20Report.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. http://www.indianexpress.com/news/uid-bill-skips-vital-privacy-issues/688614/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. http://www.epw.in/authors/elonnai-hickok&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. http://ccis.nic.in/WriteReadData/CircularPortal/D2/D02rti/aproach_paper.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. http://www.iltb.net/2011/06/analysis-of-the-privacy-bill-2011/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. http://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-updated-third-draft&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. http://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india'&gt;https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Access</dc:subject>
    

   <dc:date>2014-01-08T13:51:06Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/internet-monitor-2013-malavika-jayaram-indias-identity-crisis">
    <title>India's Identity Crisis</title>
    <link>https://cis-india.org/internet-governance/blog/internet-monitor-2013-malavika-jayaram-indias-identity-crisis</link>
    <description>
        &lt;b&gt;Malavika Jayaram's article was published in 2013 Internet Monitor Annual Report: Reflections on the Digital World, published by Harvard's Berkman Center for Internet and Society.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;India’s Unique Identity (UID) project is already the world’s largest biometrics identity program, and it is still growing. Almost 530 million people have been registered in the project database, which collects all ten fingerprints, iris scans of both eyes, a photograph, and demographic information for each registrant. Supporters of the project tout the UID as a societal game changer. The extensive biometric information collected, they argue, will establish the uniqueness of each individual, eliminate fraud, and provide the identity infrastructure needed to develop solutions for a range of problems. Despite these potential benefits, however, critical concerns remain about the UID’s legal and physical architecture as well as about unforeseen risks associated with the linking and analysis of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most basic concerns regarding the UID project stem from the fact that biometric technologies have never been tested on such a large population. As a result, well-founded concerns exist around scalability, false acceptance and rejection rates, and the project’s core premise that biometrics can uniquely and unambiguously identify people in a foolproof manner. Some of these concerns are based on technical issues—collecting fingerprints and iris scans “in the field,” for instance, can be complicated when a registrant’s fingerprints are eroded by manual labor or her irises are affected by malnutrition and cataracts. Other concerns relate to the project’s federated implementation architecture, which, by outsourcing collection to a massive group of private and public registrars and operators, increases the chance for data breaches, error, and fraud.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Perhaps even more vexing are concerns regarding how the UID, which promises financial inclusion (by reducing the identification barriers to opening bank accounts, for example), might in fact lead to new types of exclusion for already marginalized groups. Members of the LGBT community, for instance, question whether the inclusion of the transgender category within the UID scheme is a laudable attempt at inclusion, or a new means of listing and targeting members of their community for exclusion. More fundamentally, as more and more services and benefits are linked to the UID, the project threatens to exclude all those who cannot or will not participate in the scheme due to logistical failures or philosophical objections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is worth noting that the UID is not the only large data project in India. A slew of “Big Brother” projects exist: the Centralised Monitoring System (CMS), the Telephone Call Interception System (TCIS), the National Population Register (NPR), the Crime and Criminal Tracking Network and Systems (CCTNS), and the National Intelligence Grid (NATGRID), which is working to aggregate up to 21 different databases relating to tax, rail and air travel, credit card transactions, immigration, and other domains. The UID is intended to serve as a common identifier across these databases, creating a massive surveillance state. It also facilitates an ecosystem where access to goods and services, from government subsidies to drivers’ licenses to mobile phones to cooking gas, increasingly requires biometric authentication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UID project was originally vaunted as voluntary, but the inexorable slippery slope toward compulsory participation has triggered a series of lawsuits challenging the legality of forced enrollment and the constitutionality of the entire project. Most recently, in September 2013, India’s federal Supreme Court affirmed by way of an interim decision that the UID was not mandatory, that not possessing a UID should not disadvantage anybody, and that citizenship should be ascertained as a criteria for registering in order to ensure that UIDs are not issued to illegal immigrants. This last stipulation is particularly thorny given that the Unique Identification Authority of India (UIDAI, the body in charge of the UID project) has consistently distanced the UID from questions of citizenship under the justification that it is a matter beyond their remit (i.e., the UID is open to residents, and is not linked to citizenship). The government moved quickly to urge a modification of the order, but the Supreme Court declined to do so and will instead release its final decision after it reviews a batch of petitions from activists and others. The UIDAI approached the court, arguing that not making the UID mandatory has serious consequences for welfare schemes, but the court recently ordered the federal government, the Reserve Bank of India, and the Election Commission to delink the LPG cooking gas scheme from the UID. This is a considerable setback for the project, given that this was one of the most hyped linkages for the UID. It remains to be seen whether the court will similarly halt other attempts to make the UID mandatory.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the meantime, the UID project is effectively being implemented in a legal vacuum without support from the Supreme Court or Parliament. The Cabinet is seeking to rectify this and has cleared a bill that would finally provide legal backing for the UID program—its previous attempt was rejected by the Standing Committee on Finance in 2010. This bill is scheduled to come up for debate during the winter session of Parliament. The bill’s progress, along with the final decision of the Supreme Court, will have far reaching consequences for the UID project’s implementation and longevity, as well as for the relationship between India’s citizens and the state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If fully implemented, the UID system will fundamentally alter the way in which citizens interact with the government by creating a centrally controlled, technology-based standard that mediates access to social services and benefits, financial systems, telecommunications, and governance. It will undoubtedly also have implications for how citizens relate to private sector entities, on which the UID rests and which have their own vested interests in the data. The success or failure of the UID represents a critical moment for India. Whatever course the country takes, its decision to travel further toward or turn away from becoming a “database nation” will have implications for democracy, free speech, and economic justice within its own borders and also in the many neighboring countries that look to it as a technological standard bearer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government seems to envision “big data” as a panacea for fraud, corruption, and abuse, but it has given little attention to understanding and addressing the fraud, corruption, and abuse that massive databases can themselves engender. The government’s actions have yet to demonstrate an appreciation for the fact that the matrix of identity and surveillance schemes it has implemented can create a privacy-invading technology layer that is not only a barrier to online activity but also to social participation writ large.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The lack of identification documents for a large portion of the Indian population does need to be addressed. Whether the UID project is the best means to do this—whether it has the right architecture and design, whether it can succeed without an overhaul of several other failures of governmental institutions, and whether fixing the identity piece alone causes more harm than good—should be the subject of intense debate and scrutiny. Only through rigorous threat modeling and analysis of the risks arising out of this burgeoning “data industrial complex” can steps be taken to stem the potential repercussions of the project not just for identity management, fraud, corruption, distributive justice, and welfare generally, but also for autonomy, openness, and democracy.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/internet-monitor-2013.pdf" class="internal-link"&gt;Click to download the article published in the annual report of Berkman's Center for Internet and Society &lt;/a&gt;(PDF 7223 Kb)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/internet-monitor-2013-malavika-jayaram-indias-identity-crisis'&gt;https://cis-india.org/internet-governance/blog/internet-monitor-2013-malavika-jayaram-indias-identity-crisis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>malavika</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-01-09T07:56:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/december-2013-bulletin">
    <title>December 2013 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/december-2013-bulletin</link>
    <description>
        &lt;b&gt;Our newsletter for the month of December 2013 can be accessed below. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We at the Centre for Internet &amp;amp; Society (CIS) wish you all a  great year ahead and welcome you to the twelfth issue of its newsletter  (December) for the year 2013:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;-------------------------------&lt;br /&gt;Highlights&lt;br /&gt;-------------------------------&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The  National Resource Kit team has published a draft chapter highlighting  the state of laws, policies and programmes for persons with disabilities  in the state of Gujarat.&lt;/li&gt;
&lt;li&gt;Government  of India has passed the National Electronic Accessibility Policy. CIS  had worked with the Department of Electronics and Information Technology  to formulate this policy. We bring you a brief analysis of the policy  and provisions therein in a blog post.&lt;/li&gt;
&lt;li&gt;Nehaa  Chaudhari on behalf of CIS submitted comments on the Proposed WIPO  Treaty for the Protection of Broadcasting Organizations to the Ministry  of Human Resource Development.&lt;/li&gt;
&lt;li&gt;CIS-A2K  team has published a report highlighting the key accomplishments about  the work accomplished on Konkani Wikipedia from September to December  2013.&lt;/li&gt;
&lt;li&gt;Vipul  Kharbanda has provided an analysis of the laws and regulations that  apply to Bitcoin in India concluding that government can regulate  Bitcoin. &lt;/li&gt;
&lt;li&gt;We released the first documentary film (DesiSec) on cyber security in India in Bangalore on December 11.&lt;/li&gt;
&lt;li&gt;In  the module on Global Histories of the Internet (part of the Knowledge  Repository on Internet Access project) Nishant Shah analyses the  understanding of the internet, cyberspace and everyday life and why do  we need to know the history of the internet.&lt;/li&gt;
&lt;li&gt;The second "Institute on Internet and Society" will be held in Yashada, Pune from February 11 to 17, 2014.&lt;/li&gt;
&lt;li&gt;As  part of the Making Change project, Denisse Albornoz provides an  analysis of the benefits and limitations of increasing access to  information to enable citizenship and political participation.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-----------------------------------------------&lt;br /&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4615&amp;amp;qid=367159"&gt;Jobs&lt;/a&gt;&lt;br /&gt;-----------------------------------------------&lt;br /&gt;CIS is seeking applications for the posts of Program Officer (Access to Knowledge) and Program Officer (Internet Governance): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4616&amp;amp;qid=367159"&gt;http://bit.ly/1aA57K6&lt;/a&gt;.  There are two vacancies each for these posts and these are full-time  based in Delhi. To apply, please send your resume to Sunil Abraham (&lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt;) and Pranesh Prakash (&lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;)  with three writing samples of which at least one demonstrates your  analytic skills, and one that shows your ability to simplify complex  policy issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;----------------------------------------------&lt;br /&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4617&amp;amp;qid=367159"&gt;Accessibility and Inclusion&lt;/a&gt;&lt;br /&gt;----------------------------------------------&lt;br /&gt;As  part of our project (under a grant from the Hans Foundation) on  creating a national resource kit of state-wise laws, policies and  programmes on issues relating to persons with disabilities in India, we  bring you draft chapters for the states of Madhya Pradesh and Arunachal  Pradesh, and the union territory of Daman and Diu. With this we have  completed compilation of draft chapters for 27 states and 5 union  territories. Feedback and comments are invited from readers for the  following chapter:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► National Resource Kit Chapter&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Gujarat Chapter (by Anandhi Viswanathan, December 31, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4618&amp;amp;qid=367159"&gt;http://bit.ly/Kxbg3b&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Note: &lt;i&gt;All of the chapters published so far in this project are early drafts and will be reviewed and updated&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;►Other&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Media Coverage&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;An “Advocacy” Saga and the Inspiring Legacy of Rahul Cherian (by Shamnad Basheer, Spicy IP, December 16, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4619&amp;amp;qid=367159"&gt;http://bit.ly/1a5B7sU&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entry&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;National Policy on Universal Electronic Accessibility – An Analysis (by Anandhi Viswanathan, December 27, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4620&amp;amp;qid=367159"&gt;http://bit.ly/1dfCW3I&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-----------------------------------------------------------&lt;br /&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4621&amp;amp;qid=367159"&gt;Access to Knowledge&lt;/a&gt;&lt;br /&gt;-----------------------------------------------------------&lt;br /&gt;The  Access to Knowledge programme addresses the harms caused to consumers  and human rights, and critically examines Open Government Data, Open  Access to Scholarly Literature, and Open Access to Law, Open Content,  Open Standards, and Free/Libre/Open Source Software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Submission&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Comments  on Proposed WIPO Treaty for the Protection of Broadcasting  Organizations (by Nehaa Chaudhari, December 7, 2013). CIS submitted its  comments to the Ministry of Human Resource Development: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4622&amp;amp;qid=367159"&gt;http://bit.ly/1hpWeuu&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Events Participated In&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;3rd  Global Congress on IP and the Public Interest &amp;amp; Open A.I.R.  Conference on Innovation and IP in Africa (organized by University of  Cape Town, December 9-13, 2013). Sunil Abraham participated as a speaker  in the sessions on Bridging into the Global Congress: Global Issues,  Local Answers?, User Rights Track: What Medicines Can Teach Tech:  Exploring Patent Pooling and Compulsory Licensing in the Indian Mobile  Device Market (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4623&amp;amp;qid=367159"&gt;http://bit.ly/1f74yir&lt;/a&gt;),  User Rights Track: Reclaiming the World Trade Organisation: A Modest  Proposal for a WTO Agreement on the Supply of Global Public Goods (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4623&amp;amp;qid=367159"&gt;http://bit.ly/1f74yir&lt;/a&gt;), and was a keynote speaker on The Freedom Continuum (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4624&amp;amp;qid=367159"&gt;http://bit.ly/1dH1WEM&lt;/a&gt;). Nehaa Chaudhari also participated in this event: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4625&amp;amp;qid=367159"&gt;http://bit.ly/1bJArFJ&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;Twenty-Sixth  Session of the Standing Committee on Copyrights and Related Rights  (organized by WIPO, Geneva, December 16 – 20, 2013). CIS gave its  statement on Limitations and Exceptions for Libraries and Archives (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4626&amp;amp;qid=367159"&gt;http://bit.ly/JWnjq7&lt;/a&gt;) and on Limitations and Exceptions for Education, Teaching and Research Institutions and Persons with Other Disabilities (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4626&amp;amp;qid=367159"&gt;http://bit.ly/JWnjq7&lt;/a&gt;). Nehaa Chaudhari participated as a speaker. India and the United States introduced 6 proposals on the WIPO Broadcast Treaty: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4627&amp;amp;qid=367159"&gt;http://bit.ly/1edqvr3&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The following has been done under grant from the Wikimedia Foundation (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4628&amp;amp;qid=367159"&gt;http://bit.ly/SPqFOl&lt;/a&gt;). As part this project (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4629&amp;amp;qid=367159"&gt;http://bit.ly/X80ELd&lt;/a&gt;),  we held 3 workshops in the month of December, published a detailed  report of key accomplishments of the work done in Konkani Wikipedia, a  report on Train the Trainer Program held in the month of October and  published an article in DNA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Article&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Telugu Wikipedia completes 10 years (by Rahmanuddin Shaik, DNA, December 16, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4630&amp;amp;qid=367159"&gt;http://bit.ly/19OAvUV&lt;/a&gt;.  The article was edited by Rohini Lakshané. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Report&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;CIS-A2K: Work Accomplished on Konkani Wikipedia (by Nitika Tandon, December 31, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4631&amp;amp;qid=367159"&gt;http://bit.ly/1l6ttmp&lt;/a&gt;. The report throws some light on the work accomplished on Konkani Wikipedia from September to December 2013.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;First ever Train-the-Trainer Program in India (by Nitika Tandon, December 5, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4632&amp;amp;qid=367159"&gt;http://bit.ly/1euwSXt&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The  following are videos of participants from the Konkani Vishwakosh  Digitization project (jointly organised by CIS-A2K and Goa University)  speaking on their experiences with Wikimedia projects&lt;/i&gt;.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Priyadarshini Tadkodkar on Konkani language (by Subhashish Panigrahi, November 17, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4633&amp;amp;qid=367159"&gt;http://bit.ly/1hldNM8&lt;/a&gt;. &lt;i&gt;We are featuring this here as we didn’t carry this in the last newsletter&lt;/i&gt;. &lt;/li&gt;
&lt;li&gt;Varsha Kavlekar on Konkani Wikipedia Incubator (by Nitika Tandon, December 12, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4634&amp;amp;qid=367159"&gt;http://bit.ly/KmxyFo&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Darshan Kandolkar on Konkani Vishwakosh Digitization Process (by Nitika Tandon, December 13, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4635&amp;amp;qid=367159"&gt;http://bit.ly/1cqKyQ2&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Darshana Mandrekar speaks on Konkani Wikipedia (by Nitika Tandon, December 16, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4636&amp;amp;qid=367159"&gt;http://bit.ly/1keWyya&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Pooja Tople on Wikimedia Projects (by Nitika Tandon, December 17, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4637&amp;amp;qid=367159"&gt;http://bit.ly/1hlbubU&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Events Organised&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;You  Too Can Write on Wikipedia! — Training workshop (National Institute of  Tourism and Hotel Management, Gachibowli, Hyderabad, December 5, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4638&amp;amp;qid=367159"&gt;http://bit.ly/1edmx1z&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Telugu Wikipedia Training Workshop (KBN College, Vijaywada, December 16, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4639&amp;amp;qid=367159"&gt;http://bit.ly/1i8ScnL&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Kannada  Wikipedia Workshop at Alvas Vishva Nudisiri Virasat (Moodabidre,  December 19 – 22, 2013). Dr. U.B. Pavanaja gave a presentation about  Kannada Wikipedia and also conducted a workshop on Kannada Wikipedia as a  parallel track. The event was covered by Prajavani (December 22),  Hosadigantha (December 22), and Deccan Herald (December 22): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4640&amp;amp;qid=367159"&gt;http://bit.ly/1dGTBkw&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Events Co-organised&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Wikipedia Orientation Workshop (organised by CIS-A2K and Christ University, Bangalore, December 2, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4641&amp;amp;qid=367159"&gt;http://bit.ly/1lrkwEy&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;Wikipedia  Training Session @ Tiruvur (organised by CIS-A2K and Telugu Wikipedia  community, Srivahini College, Tiruvur, December 19, 2013). T. Vishnu  Vardhan and Rahmanuddin Shaik conducted the workshop: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4642&amp;amp;qid=367159"&gt;http://bit.ly/1e3oQX7&lt;/a&gt;. It was covered by Andhraprabha (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4643&amp;amp;qid=367159"&gt;http://bit.ly/1bU5VsQ&lt;/a&gt;), Eenadu (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4644&amp;amp;qid=367159"&gt;http://bit.ly/19fsttf&lt;/a&gt;), Sakshi (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4645&amp;amp;qid=367159"&gt;http://bit.ly/1e3pQdU&lt;/a&gt;), and Prajasakthi (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4646&amp;amp;qid=367159"&gt;http://bit.ly/JJs7ja&lt;/a&gt;) on December 19, 2013.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Event Participated In&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A  Wikipedia Workshop at IISC (organised by the Assamese Wikipedia  community, Bangalore, December 1, 2013). CIS-A2K team and Wikipedian  Shiju Alex supported this event: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4647&amp;amp;qid=367159"&gt;http://bit.ly/1dSutY2&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Media Coverage&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs for the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A Feature on Telugu Wikipedia (Namaste Telengana Newspaper, December 8, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4648&amp;amp;qid=367159"&gt;http://bit.ly/19Yjwj6&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Odisha: Odia Wikipedia reaching 5000 article mark! (Odisha Diary Bureau, December 17, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4649&amp;amp;qid=367159"&gt;http://bit.ly/1dGU2vc&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-----------------------------------------------&lt;br /&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4650&amp;amp;qid=367159"&gt;Internet Governance&lt;/a&gt;&lt;br /&gt;-----------------------------------------------&lt;br /&gt;CIS  is doing a project (under a grant from Privacy International and  International Development Research Centre (IDRC)) on conducting research  on surveillance and freedom of expression (SAFEGUARDS). So far we have  organised seven privacy round-tables and drafted the Privacy  (Protection) Bill. This month we bring you an analysis on whether  Bitcoin can be banned by the government and a blog post on misuse of  surveillance powers in India. As part of its project (funded by Citizen  Lab, Munk School of Global Affairs, University of Toronto and support  from the IDRC) on mapping cyber security actors in South Asia and South  East Asia a film DesiSec: Episode 1was screened. We also did an  interview with Pranesh Prakash on cyber security. With this we have  completed a total of 13 video interviews so far:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;#  Analysis&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Can Bitcoin Be Banned by the Indian Government? (by Vipul Kharbanda, December 24, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4651&amp;amp;qid=367159"&gt;http://bit.ly/1lJrnGF&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;#  Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Misuse of Surveillance Powers in India (Case 1) (by Pranesh Prakash, December 6, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4652&amp;amp;qid=367159"&gt;http://bit.ly/1donbaJ&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Brochures from Expos on Smart Cards, e-Security, RFID &amp;amp; Biometrics in India (by Maria Xynou, December 18, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4653&amp;amp;qid=367159"&gt;http://bit.ly/1f714fN&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;India’s  Identity Crisis (by Malavika Jayaram, December 31, 2013 Internet  Monitor Annual Report: Reflections on the Digital World, published by  Harvard's Berkman Center for Internet and Society): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4654&amp;amp;qid=367159"&gt;http://bit.ly/1lTRuuz&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;#  Upcoming Events&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Digital  Citizens: Why Cyber Security and Online Privacy are Vital to the  Success of Democracy and Freedom of Expression (CIS, Bangalore, January  14, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4655&amp;amp;qid=367159"&gt;http://bit.ly/KucEU5&lt;/a&gt;. Michael Oghia will give a talk. &lt;/li&gt;
&lt;li&gt;CPDP 2014 Reforming Data Protection: The Global Perspective (Brussels, January 22 – 24, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4656&amp;amp;qid=367159"&gt;http://bit.ly/KsgCws&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Nullcon  Goa Feb 2014 — International Security Conference (organised by Nullcon,  Bogmallo Beach Resort, Goa, February 12 – 15, 2014). CIS is one of the  sponsors for this event: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4657&amp;amp;qid=367159"&gt;http://bit.ly/1lrBu5I&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;#  Events Organised&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Big Democracy: Big Surveillance - A talk by Maria Xynou (CIS, Bangalore, December 3, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4658&amp;amp;qid=367159"&gt;http://bit.ly/19YnA31&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;DesiSec: Episode 1 - Film Release and Screening (CIS, December 11, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4659&amp;amp;qid=367159"&gt;http://bit.ly/1lJt2fm&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Legal Issues pertaining to Cloud Computing (NLSIU Campus, Bangalore, December 14-15, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4660&amp;amp;qid=367159"&gt;http://bit.ly/1cvcmGq&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Biometrics  or Bust? Implications of the UID for Participation and Inclusion (CIS,  Bangalore, January 10, 2014). Malavika Jayaram will give a talk: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4661&amp;amp;qid=367159"&gt;http://bit.ly/1lJZhuK&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;#  Events Participated In&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Convention  on Crisis of Capitalism and brazen onslaught on Democracy (organized by  INSAF, December 6, 2013). Snehashish Ghosh participated as a speaker: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4662&amp;amp;qid=367159"&gt;http://bit.ly/1gAxmNy&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;International  View of the State-of-the-Art of Cryptography and Security and its Use  in Practice (IV) (jointly organized by Microsoft Research India, Indian  Institute of Science, and Indian Institute of Technology Madras,  December 6, 2013). Sunil Abraham was a panellist: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4663&amp;amp;qid=367159"&gt;http://bit.ly/1eAXl5t&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Technology  in Government and Topics in Privacy (organized by Data Privacy Lab,  CGIS Cafe, Cambridge Street, Harvard University Campus, December 9,  2013). Malavika Jayaram participated as a speaker on Biometrics in Beta –  India's Identity Experiment: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4664&amp;amp;qid=367159"&gt;http://bit.ly/1bJDqht&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Cyberscholars  Working Group at MIT (organized by the Berkman Center for Internet  &amp;amp; Society, Harvard University, December 12, 2013): Malavika Jayaram  made a presentation on Biometrics or Bust - India’s Identity Crisis: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4665&amp;amp;qid=367159"&gt;http://bit.ly/1eIpHef&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Seventh  NLSIR Symposium on “Bridging the Security-Liberty Divide” (organised by  National Law School, Bangalore, December 21-22). Chinmayi Arun and  Bhairav Acharya were speakers at this event: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4666&amp;amp;qid=367159"&gt;http://bit.ly/1gjsxYe&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------&lt;br /&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4667&amp;amp;qid=367159"&gt;News &amp;amp; Media Coverage&lt;/a&gt;&lt;br /&gt;--------------------------------&lt;br /&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;MongoDB startup hired by Aadhaar got funds from CIA VC arm (by Lison Joseph, Economic Times, December 3, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4668&amp;amp;qid=367159"&gt;http://bit.ly/1f77bRg&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;A Three-Way Race Draws Delhi’s Young, and Everyone Else, Out to Vote (by Betwa Sharma, New York Times, December 4, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4669&amp;amp;qid=367159"&gt;http://bit.ly/1gAxoFf&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;India for UN body to resolve internet governance issues (by Kim Arora, The Times of India, December 5, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4670&amp;amp;qid=367159"&gt;http://bit.ly/JWESqe&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Card  transactions with Aadhaar validation need more time: experts (by Kirti  V. Rao and Moulishree Srivastava, Livemint, December 5, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4671&amp;amp;qid=367159"&gt;http://bit.ly/1hq35UL&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Indian government wakes up to risk of Hotmail, Gmail (originally published by AFP, December 7, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4672&amp;amp;qid=367159"&gt;http://bit.ly/19LrlOS&lt;/a&gt;. This was also mirrored in The Times of India (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4673&amp;amp;qid=367159"&gt;http://bit.ly/1hpYEJu&lt;/a&gt;), Reuters (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4674&amp;amp;qid=367159"&gt;http://bit.ly/1gaHhZk&lt;/a&gt;), Dawn (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4675&amp;amp;qid=367159"&gt;http://bit.ly/1azuV95&lt;/a&gt;), NDTV (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4676&amp;amp;qid=367159"&gt;http://bit.ly/19Ys7lS&lt;/a&gt;), Yahoo News (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4677&amp;amp;qid=367159"&gt;http://yhoo.it/JCSreE&lt;/a&gt;), The Malaysian Insider (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4678&amp;amp;qid=367159"&gt;http://bit.ly/1eAPAMW&lt;/a&gt;) and Asia One Digital (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4679&amp;amp;qid=367159"&gt;http://bit.ly/JWuw9R&lt;/a&gt;). A slightly modified version was published by Silicon India on December 11: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4680&amp;amp;qid=367159"&gt;http://bit.ly/1gAtzjd&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;#  Announcement&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Pranesh  Prakash has been elected as the Asia-Pacific representative to the  executive committee of the NonCommercial Users Constituency (NCUC) (part  of the Non-Commercial Stakeholders Group, which is in turn part of the  Generic Names Supporting Organization, which is in turn part of ICANN): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4681&amp;amp;qid=367159"&gt;http://bit.ly/KuIVeC&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------&lt;br /&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4682&amp;amp;qid=367159"&gt;Telecom&lt;/a&gt;&lt;br /&gt;-------------------------------&lt;br /&gt;Shyam  Ponappa, a Distinguished Fellow at CIS is a regular columnist with the  Business Standard. The articles published on his blog Organizing India  Blogspot is mirrored on our website:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Newspaper Column&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;For a Telecom Revival (by Shyam Ponappa, Business Standard, December 4, 2013 and Organizing India Blogspot, December 5, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4683&amp;amp;qid=367159"&gt;http://bit.ly/1avRDii&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------&lt;br /&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4684&amp;amp;qid=367159"&gt;Digital Humanities&lt;/a&gt;&lt;br /&gt;--------------------------------&lt;br /&gt;CIS  is building research clusters in the field of Digital Humanities. The  Digital will be used as a way of unpacking the debates in humanities and  social sciences and look at the new frameworks, concepts and ideas that  emerge in our engagement with the digital. The clusters aim to produce  and document new conversations and debates that shape the contours of  Digital Humanities in Asia:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;#  Blog Entry&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Conflict of Konigsberg (by Anirudh Sridhar, December 17, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4685&amp;amp;qid=367159"&gt;http://bit.ly/1cEXhhU&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4686&amp;amp;qid=367159"&gt;&lt;br /&gt;Digital Natives&lt;/a&gt;&lt;br /&gt;--------------------------------&lt;br /&gt;CIS  is doing a research project titled “Making Change”. The project will  explore new ways of defining, locating, and understanding change in  network societies. Having the thought piece 'Whose Change is it Anyway'  as an entry point for discussion and reflection, the project will  feature profiles, interviews and responses of change-makers to questions  around current mechanisms and practices of change in South Asia and  South East Asia:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Making Change Project&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Tactical Technology: Information is Power?  (by Denisse Albornoz, December 26, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4687&amp;amp;qid=367159"&gt;http://bit.ly/1cEUrcY&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Tactical Technology: Designing Activism (by Denisse Albornoz, December 27, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4688&amp;amp;qid=367159"&gt;http://bit.ly/1a9IuzH&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Other&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Newspaper Column&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Digital Native (by Nishant Shah, Indian Express, December 22, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4689&amp;amp;qid=367159"&gt;http://bit.ly/1f7mU2P&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;------------------------------------------------------------&lt;br /&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4690&amp;amp;qid=367159"&gt;Knowledge Repository on Internet Access&lt;/a&gt;&lt;br /&gt;------------------------------------------------------------&lt;br /&gt;CIS  in partnership with the Ford Foundation is executing a project to  create a knowledge repository on Internet and society. This repository  will comprise content targeted primarily at civil society with a view to  enabling their informed participation in the Indian Internet and ICT  policy space. The repository is available at the Internet Institute  website: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4691&amp;amp;qid=367159"&gt;http://bit.ly/1iQT2UB&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Upcoming Event&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Institute on Internet and Society (organised by Ford Foundation and CIS, Yashada, Pune, February 11-17, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4692&amp;amp;qid=367159"&gt;http://bit.ly/180mQi9&lt;/a&gt;. Registrations are closed for this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Modules&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;History of the Internet: Building Conceptual Frameworks (by Nishant Shah, December 31, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4693&amp;amp;qid=367159"&gt;http://bit.ly/19WRHLb&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Internet Privacy in India (by Elonnai Hickok, December 31, 2013): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4694&amp;amp;qid=367159"&gt;http://bit.ly/19SNk6v&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-----------------------------------------------------&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4695&amp;amp;qid=367159"&gt;&lt;br /&gt;About CIS&lt;/a&gt;&lt;br /&gt;-----------------------------------------------------&lt;br /&gt;The  Centre for Internet and Society is a non-profit research organization  that works on policy issues relating to freedom of expression, privacy,  accessibility for persons with disabilities, access to knowledge and IPR  reform, and openness (including open government, FOSS, open standards,  etc.), and engages in academic research on digital natives and digital  humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Twitter:&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4696&amp;amp;qid=367159"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook group: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4697&amp;amp;qid=367159"&gt;https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at:&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4698&amp;amp;qid=367159"&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please  help us defend consumer / citizen rights on the Internet! Write a  cheque in favour of ‘The Centre for Internet and Society’ and mail it to  us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration:&lt;br /&gt;We  invite researchers, practitioners, and theoreticians, both  organisationally and as individuals, to collaboratively engage with  Internet and society and improve our understanding of this new field. To  discuss the research collaborations, write to Sunil Abraham, Executive  Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;. To discuss collaborations on Indic language wikipedia, write to T. Vishnu Vardhan, Programme Director, A2K, at &lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS  is grateful to its donors, Wikimedia Foundation, Ford Foundation,  Privacy International, UK, Hans Foundation and the Kusuma Trust which  was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian  origin, for its core funding and support for most of its projects&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/december-2013-bulletin'&gt;https://cis-india.org/about/newsletters/december-2013-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2014-02-25T13:51:47Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/freedom-continuum.pdf">
    <title>Freedom Continuum</title>
    <link>https://cis-india.org/a2k/blogs/freedom-continuum.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/freedom-continuum.pdf'&gt;https://cis-india.org/a2k/blogs/freedom-continuum.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-12-27T11:16:35Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/3rd-global-congress-ip-and-public-interest-open-air-conference-innovation-and-ip-africa.pdf">
    <title>3rd Global Congress on IP and the Public Interest &amp; Open A.I.R. Conference on Innovation and IP in Africa </title>
    <link>https://cis-india.org/a2k/blogs/3rd-global-congress-ip-and-public-interest-open-air-conference-innovation-and-ip-africa.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/3rd-global-congress-ip-and-public-interest-open-air-conference-innovation-and-ip-africa.pdf'&gt;https://cis-india.org/a2k/blogs/3rd-global-congress-ip-and-public-interest-open-air-conference-innovation-and-ip-africa.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-12-26T05:46:20Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/nlsir-december-21-2013-nlsir-symposium">
    <title>VII NLSIR Symposium</title>
    <link>https://cis-india.org/news/nlsir-december-21-2013-nlsir-symposium</link>
    <description>
        &lt;b&gt;The National Law School of India Review (NLSIR) - the flagship journal of the National Law School of India University (NLSIU), Bangalore is pleased to announce the seventh NLSIR Symposium on “Bridging the Security-Liberty Divide” scheduled to be held on December 21 and December 22, 2013 at the National Assessment and Accreditation Council (NAAC, opposite NLSIU Campus, Nagarhavi) Conference Hall, Bangalore.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This was &lt;a class="external-link" href="http://nlsir.in/symposium.html"&gt;published by NLSIR&lt;/a&gt; on December 20, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The decade following September 11 has been dubbed “liberty’s lost decade”, not just for the United States of America but for the world at large, marked by increasing tension between State interests in national security and individual liberty. As we continue to grapple with the implications of this clash, one clear winner seems to be emerging, best observed by examining changes in legal systems throughout this decade. The recent upsurge of criticism against NSA activity globally, however, could be seen as indicative of a changing trend. The VIIth NLSIR Symposium seeks to trace this dialogue between competing notions of security and liberty, and hopes to assess and analyse similar developments in India Confirmed speakers for the symposium include renowned legal experts such as Hon’ble Justice Muralidhar, Menaka Guruswamy, Mrinal Satish, Bharat Karnad, Aparna Chandra, Chinmayi Arun, Shyam Diwan, Bhairav Acharya, Roshni, Yug Mohit Chaudhary and Saikat Datta.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This year, the discussions will be divided into four panels:&lt;br /&gt;&lt;br /&gt; &lt;b&gt;Session I: Securing Liberty from the State - Redefining Criminal Thresholds in Law &lt;/b&gt;&lt;br /&gt; (Forenoon, December 21, 2013, Saturday)&lt;br /&gt;&lt;br /&gt; &lt;b&gt;Session II: Intrusive Intelligence - Surveillance Programs and Privacy in India &lt;/b&gt;&lt;br /&gt; (Afternoon, December 21, 2013, Saturday)&lt;br /&gt;&lt;br /&gt; &lt;b&gt;Session III: Beyond Borders - Extradition, Asylum and Concerns of State Security &lt;/b&gt;&lt;br /&gt; (Forenoon, December 22, 2013, Sunday)&lt;br /&gt;&lt;br /&gt; &lt;b&gt;Session IV: Connecting the Dots &lt;/b&gt;&lt;br /&gt; (Afternoon, December 22, 2013, Sunday)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/nlsir-december-21-2013-nlsir-symposium'&gt;https://cis-india.org/news/nlsir-december-21-2013-nlsir-symposium&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-01-09T07:08:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/legal-issues-on-cloud-computing">
    <title>Legal Issues pertaining to Cloud Computing</title>
    <link>https://cis-india.org/events/legal-issues-on-cloud-computing</link>
    <description>
        &lt;b&gt;The Law and Technology Society of National Law School of India University, Bangalore is organizing the 6th edition of its flagship conference ‘Consilience’ on December 14 and 15, 2013 at NLSIU Campus, Bangalore. The Centre for Internet and Society is supporting this event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Conference will see some of the best lawyers, jurists and industry leaders in India speak on different issues surrounding the theme. The Conference is co- branded with ‘&lt;a class="external-link" href="https://www.salesforce.com/crm/what-is-crm/"&gt;Salesforce.com&lt;/a&gt;’, ‘International Technology Law Association’ and the Centre for Internet and Society &lt;span&gt; (&lt;a href="http://www.cis-india.org/"&gt;http://www.cis-india.org/&lt;/a&gt;). Apart  from making an effective contribution towards greater understanding of  the subject, the Conference will lead to a recommendatory policy paper  to the government of India.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Key speakers for the Conference include: &lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Senapathy (Kris)  Gopalakrishnan (Co-Founder and Executive Vice Chairman, Infosys &amp;amp; President, CII )&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Pavan Duggal (Advocate, Supreme Court)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Abhishek Malhotra (Founding Partner, TMT Law Practice)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Azmul Haque (Partner, Shook Lin &amp;amp; Bok, Singapore)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Chris Edwards (Senior Associate, DLA Piper, Singapore)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Prof. Rahul De (IIM Bangalore)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Pamela Kumar (Chair, Cloud Computing Innovation Council of India) &lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Suhaan Mukherji (Expert advisor, Office of Adviser to the Prime Minister of India on Public Information Infrastructure and Innovations)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Registrations for the Conference are open and fee for the same is as follows:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Students: Rs. 500/-&lt;/li&gt;
&lt;li&gt;Professionals: Rs. 750/-&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Please find attached the concept note, programme schedule and speakers’ profiles. &lt;span&gt;To register, visit &lt;a href="http://www.consilience.co.in/index.php/consilience-2013/register-for-the-conference"&gt;http://www.consilience.co.in/index.php/consilience-2013/register-for-the-conference&lt;/a&gt;. &lt;span&gt;For any other queries, please write to &lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;a href="mailto:ltech.nls@gmail.com"&gt;ltech.nls@gmail.com&lt;/a&gt; .&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;or contact&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Shivam Singla (Ph: +91-9916708701)&lt;/li&gt;
&lt;li&gt;Ayushi Sutaria (Ph: +91-8123925725)&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Conference Programme&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Saturday, December 14th, 2013&lt;/strong&gt;&lt;br /&gt;Venue: Conference Hall, Academic Block, NLSIU&lt;/p&gt;
&lt;table class="listing vertical"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;08.30&lt;br /&gt;09.30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Breakfast and Registration&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09.45&lt;br /&gt;10.00&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Inauguration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.00&lt;br /&gt;10.30&lt;/td&gt;
&lt;td&gt;Keynote Address&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.30&lt;br /&gt;12.30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESSION 1: INTRODUCTION TO CLOUD COMPUTING&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How does cloud computing work? - An overview of the basic technical features &lt;/li&gt;
&lt;li&gt;The current legal regime related to cloud computing in India- Main issues and challenges&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th colspan="2" style="text-align: justify; "&gt;Lunch&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.15&lt;br /&gt;15.15&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESSION 2: THE RELATION BETWEEN PARTIES TO CLOUD COMPUTING- USERS, INTERMEDIARIES &lt;br /&gt;AND GOVERNMENT BODIES&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Legal obligations of the intermediaries towards (i) the government and (ii) the users&lt;/li&gt;
&lt;li&gt;Cyber security concerns&lt;/li&gt;
&lt;li&gt;Standards of data protection&lt;/li&gt;
&lt;li&gt;Government's surveillance powers and privacy issues&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th colspan="2" style="text-align: justify; "&gt;Tea Break&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.30&lt;br /&gt;17.30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESSION 3: REGULATION AND MONITORING OF DATA CONTENT&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Current data control monitoring systems by intermediaries&lt;/li&gt;
&lt;li&gt;Data ownership and intellectual property issues- Possible threats and need for regulation&lt;/li&gt;
&lt;li&gt;Sensitive or critical data- Security concerns relating to their storage&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th colspan="2" style="text-align: justify; "&gt;High Tea/Networking Session&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;Sunday, December 15th, 2013&lt;/strong&gt;&lt;br /&gt;Venue: Conference Hall, Academic Block, NLSIU&lt;/p&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;09.00&lt;br /&gt;10.00&lt;/td&gt;
&lt;td&gt;Breakfast and Registration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.00&lt;br /&gt;12.00&lt;/td&gt;
&lt;td&gt;SESSION 4: THE INTERNATIONAL PERSPECTIVE ON CLOUD COMPUTING&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Jurisdiction and choice of law issues- how do we counter the confusion?&lt;/li&gt;
&lt;li&gt;International laws applicable to cloud computing&lt;/li&gt;
&lt;li&gt;Need for a comprehensive international framework to simplify the situation?&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th colspan="2" style="text-align: justify; "&gt;Tea Break&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.15&lt;br /&gt;14.15&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESSION 5: COMPARATIVE ANALYSIS WITH LEGAL FRAMEWORKS IN OTHER COUNTRIES&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Legal frameworks in UK and Singapore &lt;/li&gt;
&lt;li&gt;Beneficial features of these legal regimes and their suitability in the Indian context &lt;/li&gt;
&lt;li&gt;Lessons to be learnt for India&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th colspan="2" style="text-align: justify; "&gt;Lunch&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.00&lt;br /&gt;17.00&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESSION 6: THE WAY FORWARD – SUGGESTIONS AND RECOMMENDATIONS&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Overview of the important challenges and suggestions&lt;/li&gt;
&lt;li&gt;Possible Policy and Legislative steps to improve the Cloud Computing regime in India&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th colspan="2" style="text-align: justify; "&gt;High Tea/Networking Session&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ol&gt;
&lt;li&gt;Click to read the &lt;a href="https://cis-india.org/internet-governance/blog/sub-tracks.pdf" class="internal-link"&gt;sub tracks&lt;/a&gt; for discussion&lt;/li&gt;
&lt;li&gt;Access the &lt;a href="https://cis-india.org/internet-governance/blog/consilience-speakers-profiles.pdf" class="internal-link"&gt;speakers' profiles here&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/legal-issues-on-cloud-computing'&gt;https://cis-india.org/events/legal-issues-on-cloud-computing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2022-02-07T15:29:00Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/sub-tracks.pdf">
    <title>Sub Tracks</title>
    <link>https://cis-india.org/internet-governance/blog/sub-tracks.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/sub-tracks.pdf'&gt;https://cis-india.org/internet-governance/blog/sub-tracks.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-12-11T10:08:35Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/technology-in-government-and-topics-in-privacy">
    <title>Technology in Government and Topics in Privacy</title>
    <link>https://cis-india.org/news/technology-in-government-and-topics-in-privacy</link>
    <description>
        &lt;b&gt;Malavika Jayaram is a speaker at an event organized by Data Privacy Lab at CGIS Cafe, Cambridge Street, Harvard University Campus. She will speak on Biometrics in Beta – India's Identity Experiment on December 9, 2013.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Technology in Government (TIG) and Topics in Privacy (TIP) consist of weekly discussions and brainstorming sessions on all aspects of privacy (TIP) and uses of technology to assess and solve societal, political, and government problems (TIG). Discussions are often inspired by a real-world problems being faced by the lead discussant, who may be from industry, government, or academia. Practice talks and presentations on specific techniques and topics are also common.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Abstract of the Talk&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India's identity juggernaut - the Unique Identity (UID) project that has registered around 450 million people and is yet to be fully realized - is already the world's largest biometrics identity scheme. Based on the premise that centralized de-duplication and authentication will establish uniqueness and eliminate fraud, it is hailed as a game changer and a silver bullet that will solve myriad problems and improve welfare delivery, yet its conception and architecture raise significant concerns. In addition to the UID project, there is a slew of "Big Brother" systems that together form a matrix of identity and surveillance schemes: the UID is intended as a common identifier across this matrix as well as other public and private databases. Indian authorities frame Big Data as a panacea for fraud, corruption and abuse, without apprehending the further fraud, corruption and abuse that joined up databases can themselves engender. The creation of a privacy-invading technology layer not simply as a barrier to online participation but to social participation writ large is not fully appreciated by policy makers. Malavika will provide an overview of the identity landscape including the implications for privacy and free speech, and more broadly, democracy and openness.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Malavika Jayaram&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Malavika is a Fellow at the Berkman Center for Internet and Society at Harvard, focusing on privacy, identity and free expression, especially in the context of India's biometric ID project. A Fellow at the Centre for Internet and Society, Bangalore, she is the author of the India chapter for the Data Protection &amp;amp; Privacy volume in the Getting the Deal Done series. She is one of 10 Indian lawyers in The International Who's Who of Internet e-Commerce &amp;amp; Data Protection Lawyers directory. In August 2013, she was voted one of India's leading lawyers - one of only 8 women to be featured in the "40 under 45" survey conducted by Law Business Research, London. In a different life, she spent 8 years in London, practicing law with global law firm Allen &amp;amp; Overy in the Communications, Media &amp;amp; Technology group, and as VP and Technology Counsel at Citigroup. During 2012-2013, She was a Visiting Scholar at the Annenberg School for Communication, University of Pennsylvania.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click to read more on the event originally &lt;a class="external-link" href="http://dataprivacylab.org/TIP/index.html#talk10"&gt;published by Data Privacy Lab here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/technology-in-government-and-topics-in-privacy'&gt;https://cis-india.org/news/technology-in-government-and-topics-in-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-12-27T10:20:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/cyberscholars-working-group-mit">
    <title>Cyberscholars Working Group at MIT</title>
    <link>https://cis-india.org/news/cyberscholars-working-group-mit</link>
    <description>
        &lt;b&gt;Malavika Jayaram is giving a talk on Biometrics or Bust - India’s Identity Crisis at this event organised by Berkman Center for Internet &amp; Society on December 12 at 6.00 p.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Read the original &lt;a class="external-link" href="https://cyber.law.harvard.edu/events/cyberscholars/12/mit"&gt;published by Harvard University here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Cyberscholar Working Group is a forum for fellows and affiliates of MIT, Yale Law School Information Society Project, Columbia University, and the Berkman Center for Internet &amp;amp; Society at Harvard University to discuss their ongoing research. Each session is focused on the peer review and discussion of current projects submitted by a presenter. Meeting alternatively at Harvard, MIT, Yale, the working group aims to expand the shared knowledge of young scholars by bringing together these preeminent centers of thought on issues confronting the information age. Discussion sessions are designed to facilitate advancements in the individual research of presenters and in turn encourage exposure among the participants to the multi-disciplinary features of the issues addressed by their own work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This month's presentations include:&lt;br /&gt; &lt;b&gt;(1) "Lines of Control: Networks of Imperialism and Independence in India (1840-1947)"&lt;/b&gt;&lt;br /&gt;Abstract: This paper examines the history of communications networks in India and the relationship between communications and second-order networks. It draws attention to the wave of colonial network development that took place in India between 1840 and 1948. During these years, Britain constructed a series shipping, rail and telegraph networks to achieve a set of military and commercial goals. This paper studies how first- and second-order networks developed, and the intended and unintended effects of these networks on Indiaʼs economics, politics, and identity. The paper draws on economic and social studies of colonial communications networks in India, original reports by British officials and the Colonial Office, and the literature focusing on the role of technology in British imperialism. It shows how Indiaʼs colonial communication networks, built to augment and extend British control over the subcontinent, became conduits for Indian resistance and nationalism.&lt;br /&gt;Keywords: shipping, telegraph, railroads, imperialism, nationalism, network theory, India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Colin Agur &lt;/b&gt;is a PhD candidate at Columbia University and Visiting Fellow at Yale Law School's Information Society Project. His research examines India's telecommunications, focusing on mobile network formation and second-order effects of network growth. He spent the 2012-13 academic year in Delhi and Chennai, conducting document analysis, interviews with industry figures and participant observation related to mobile phone usage. He has published articles about Indian media and culture in Harvard's Nieman Lab, the Journal of Asian and African Studies and Journalism (forthcoming), and about telecommunications history in Information and Culture.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(2) Big Data Dramas in the 1960s and 1970s&lt;/b&gt;&lt;br /&gt;Abstract: The recent frenzy in discussing NSA activities and the collecting of Big Data show a widespread critical concern for the current practice of gathering and using personal data. These concerns have their history. In my presentation, I track the beginnings of a growing public awareness and sensitivity towards the societal handling of personal data. I argue that the early computerization phase during the 1960s and 1970s played a crucial role in discussing these issues. Media reports, popular books, scientific publications, and political hearings all of a sudden began – often in quite different ways – to address and question contemporary practices of collecting, sharing, and storing of personal data. Their authors explored and negotiated all kind of societal settings where personal data played a significant role at that time. There have been concerns about these issues with personal data before, but – as I will show in my presentation – not on this broad societal level and to this extent as in the late 1960s and early 1970s. I argue that during that time, the usage of personal data became a highly controversial matter not only of public, but also of private interest.My inquiry examines how the term “data“ and in particular the collection of personal data became loaded with cultural and emotional significance in scientific and media discussions in the 1960s and 1970s in the United States and in Germany. Furthermore, it explores how the early computerization affected our societal handling of data long before the personal computer entered our private lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Julia Fleischhack&lt;/b&gt; is a visiting postdoctoral research fellow in the program in Science, Technology, and Society at the Massachusetts Institute of Technology. She holds a PhD in anthropology from Zürich University. Her current research is on data centers from the private sector and funded by the Fritz Thyssen foundation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(3) Biometrics or Bust - India’s Identity Crisis&lt;/b&gt;&lt;br /&gt;Abstract: India's identity juggernaut - the Unique Identity (UID) project that has registered around 500 million people and is yet to be fully realized - is already the world's largest ever biometrics identity scheme. Grounded in the premise that centralized de-duplication and authentication will uniquely identify people and eliminate fraud, it is hailed as a game changer and a silver bullet that will solve myriad socio-economic problems, yet its conception and architecture raise significant concerns. Its implementation as a techno-utopian project in a legal vacuum, despite the potential for abuse and exclusion, give pause to the much-vaunted claims of transforming welfare delivery and galvanizing financial inclusion. I will provide an overview of the identity project and highlight some of the key implications for privacy and free speech, and more broadly, democracy and openness. I will also unpack some of the narratives being constructed, describe the current public discourse and legal developments, and locate the project within the broader surveillance state and database nation that India is morphing into.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Malavika Jayaram&lt;/b&gt; is a Fellow at the Berkman Center for Internet and Society at Harvard, focusing on privacy, identity and free expression. A Fellow at the Centre for Internet and Society, Bangalore, she is one of 10 Indian lawyers in The International Who's Who of Internet e-Commerce &amp;amp; Data Protection directory. In August 2013, she was voted one of India's leading lawyers - one of only 8 women to be featured in the "40 under 45" survey conducted by Law Business Research, London.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/cyberscholars-working-group-mit'&gt;https://cis-india.org/news/cyberscholars-working-group-mit&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-01-09T06:41:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/whatever-happened-to-privacy">
    <title>"Whatever happened to Privacy?" - International Activism Conference</title>
    <link>https://cis-india.org/news/whatever-happened-to-privacy</link>
    <description>
        &lt;b&gt;Maria Xynou gave a keynote speech and participated as a panelist on the "Suspect Societies" panel. The event was organized by Heinrich Boell Foundation in Berlin on December 5 and 6, 2013.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;"Whatever happened to privacy" brought together international activists on focal topics and combined bar camp style work sessions and political round tables with a classic public event, It focussed on an issue which has far reaching consequences for politically active people across the world - the issue of privacy and surveillance. The revelations around the NSA and GCHQ as well as other countries secret service digital surveillance activities have spurred political debate. This debate was intensified at "Whatever happened to Privacy?" formulating political demands, developing action strategies and debating questions such as:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;What cultural and political value does privacy have today?&lt;/li&gt;
&lt;li&gt;What are the societal implications of the wide spread "I have nothing to hide" attitude?&lt;/li&gt;
&lt;li&gt;What political actions are necessary to protect citizens from mass surveillance and what tools exist for people to secure their communications, movements and lives?&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;For video and more info, &lt;a class="external-link" href="http://www.boell.de/en/whatever-happened-privacy"&gt;click here&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/whatever-happened-to-privacy'&gt;https://cis-india.org/news/whatever-happened-to-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-03T05:56:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
