<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 301 to 315.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/masking-personal-data-to-protect-privacy-crucial-for-india-say-experts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/factor-daily-sriram-sharma-december-12-2017-paranoid-about-state-surveillance-here-s-the-fd-guide-to-living-in-the-age-of-snoops"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/artificial-intelligence-literature-review"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/state-led-interference-in-encrypted-systems-a-public-debate-on-different-policy-approaches"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/indian-express-nishant-shah-december-3-2017-digital-native-memory-card-is-full"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/november-2017-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/cyfy-2017-agenda"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/news/cima-sarah-oh-november-15-2017-openness-nine-ways-civil-society-groups-have-mobilized-to-defend-internet-freedom"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/breach-notifications.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/india-uk-legal-regulatory-approaches.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/files/submission-to-trai-november-6-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/october-2017-newsletter"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts">
    <title>Checks and balances needed for mass surveillance of citizens, say experts</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts</link>
    <description>
        &lt;b&gt;A number of measures are required to protect law-abiding citizens from mass surveillance and misuse of their personal data, according to top technology and legal experts. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Peerzada Abrar was &lt;a class="external-link" href="http://www.thehindu.com/business/Industry/checks-and-balances-needed-for-mass-surveillance-of-citizens-say-experts/article21381478.ece"&gt;published in the Hindu&lt;/a&gt; on December 9, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The measures include issuing of tokens by the Unique Identification  Authority of India (UIDAI) instead of Aadhaar numbers and having an  official in the judiciary give permission to vigilance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  experts were participating in a panel discussion on ‘Navigating Big Data  Challenges’ at Carnegie India’s Global Technology Summit here. They  also said there was a need to implement ‘de-identification of data’ or  preventing a person’s identity from being connected with information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  moderator of the discussion was Justice B.N. Srikrishna, a former  Supreme Court judge, who was also heading a government-appointed  committee of experts to identify “key &lt;a href="http://www.thehindu.com/tag/1401-1400-1349/data-protection/?utm=bodytag"&gt;&lt;b&gt;data protection &lt;/b&gt;&lt;/a&gt;issues”  and recommend methods to address them. Justice Srikrishna told the  panellists that Aadhaar or the unique identification number had  empowered the people. But in situations where the State wants all the  information about citizens from different service providers because of  its suspicions related to terrorism or criminal activity, he asked, what  is the method to create a balance?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Surveillance is like salt in  cooking which is essential in tiny quantities, but counterproductive  even if slightly in excess,” responded Sunil Abraham, executive director  of Bengaluru-based think tank, Centre for Internet and Society. He said  there was a need to make a surveillance system which had privacy by  design built into it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Abraham said that his organisation had  proposed to the UIDAI that it used ‘tokenisation,’ which meant that  whenever there was a ‘know your customer’ requirement, the Aadhaar  number was not accessed by organisations like telecom firms or the  banks. Instead, when the citizens used various services via smart cards  or pins, a token got generated, which was controlled by the UIDAI.  Organisations like banks and telecom firms can store those token numbers  in their database. He said this would make it harder for unauthorised  parties to combine databases. But at the same time would enable law  enforcement agencies to combine database using the appropriate  authorizations and infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“UIDAI is considering this,  they call it the dummy Aadhaar numbers. We need technical as well as  institutional checks and balances,” said Mr. Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Countries  like the U.S also have processes like Foreign Intelligence Surveillance  Court (FISA court) which entertains applications made by the U.S  Government for approval of electronic surveillance, physical search, and  certain other forms of investigative actions for foreign intelligence  purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“My concern is that in the current system, surveillance  can be done by the State machinery. I don’t necessarily suggest FISA  court.... but some kind of mechanism where (one can’t) be held at the  mercy of incestuous State machinery,” said Rahul Matthan, a partner at  law firm Trilegal. “But have some second person who is outside the  influence of this system (and) who actually says ‘yes this is a  terrorist which requires us to do mass surveillance,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Artificial Intelligence&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A  large amount of information or Big data ranging from financial, health  to political insights of people is being collected by different  organisations and service providers which is sitting in different silos.  All of this is likely going to be linked through Aadhaar. Mr.  Srikrishna asked what if a situation arises where all of this data is  aggregated and using artificial intelligence and machine learning, one  is able to analyse it and profile individuals. He said “would that be  not a terrifying scenario” where the State can act super-monitor for  citizens. He asked how can citizens be guarded against it?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr.Srikrishna  was referring to the ‘Social Credit System’ proposed by the Chinese  government for creating a national reputation system to rate the  trustworthiness of its citizens including their economic and social  status. It works as a mass surveillance tool and uses big data analysis  technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is a possibility. What stands in the way of it  becoming a reality (in India) is a robust law,” said Mr.Matthan.  “Technology is so powerful that it could equally be used for good as  well as bad.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts'&gt;https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-12-16T14:32:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/masking-personal-data-to-protect-privacy-crucial-for-india-say-experts">
    <title>Masking personal data to protect privacy crucial for India, say experts</title>
    <link>https://cis-india.org/internet-governance/news/masking-personal-data-to-protect-privacy-crucial-for-india-say-experts</link>
    <description>
        &lt;b&gt;Finding a way to protect privacy is critical, with the Supreme Court hearing petitions challenging the mandatory linking of Aadhaar to avail various social and welfare benefits.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Deepti Govind was published in &lt;a class="external-link" href="http://www.livemint.com/Technology/CTcE0FEunaE0aouBIYoqMJ/Masking-personal-data-to-protect-privacy-crucial-for-India.html"&gt;Livemint&lt;/a&gt; on December 11, 2017&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Using  the concept of de-identification to protect an individual’s right to  privacy and creating laws that constantly re-evaluates the difference  between harmful and good use of data is crucial for India, according to  an expert panel on data privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That could mean developing a  token system that lets the Unique Identification Authority of India  (UIDAI) hold a master-list of data through Aadhaar, while generating  token numbers for all other Know Your Customer (KYC) requirements,  suggested the panel at the Global Technology Summit hosted by think-tank  Carnegie India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If we can implement de-identification principles  in government collection and storage of data, even if that data is  displayed on the website it cannot be correlated to an individual. And  if it can’t be correlated to an individual then immediately that data is  not as dangerous as it could be,” said Rahul Matthan, partner at  Trilegal and a &lt;i&gt;Mint&lt;/i&gt; columnist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In theory, de-identification  could include anything from deleting or masking personal identifiers,  like names, to generalizing or suppressing others, like an individual’s  pin code.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finding a way to protect privacy is critical for India,  with the Supreme Court hearing petitions challenging the mandatory  linking of Aadhaar to avail various social and welfare benefits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One  of the grounds for challenge is that the use of biometric information  of an individual encroaches upon the individual’s privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  Centre for Internet and Society, a Bengaluru-based research  organisation, proposed that the UIDAI use tokens for KYC requirements.  Under this method an individual can use a smart card and a personal  identification number (PIN), rather than biometrics, at a  UIDAI-controlled booth and generate a token number. That token number  can be submitted to a telephone operator or a bank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“UIDAI is  currently considering this. They call it the dummy or virtual Aadhaar  numbers. Under this a single agency cannot pull off the surveillance  completely by themselves. So there is both a technical and institutional  check,” said Sunil Abraham, executive director of the Centre for  Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another method could be shifting the emphasis to revoking consent rather than grant of consent to collect and store data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This could be done using the same method that currently exists to  filter unwanted calls and messages on phones via the do-not-disturb  registry. But over and above these, creating the right regulatory  framework is important.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It has become absolutely necessary  to have in place a law which governs the usage of misuse of data,” said  former Supreme Court justice B.N. Srikrishna.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Srikrishna used to  head a 10-member committee of experts constituted by the government to  study various issues related to data protection, make specific  suggestions on the principles to be considered and suggest a draft data  protection bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The data protection law must balance the  interests of all three stakeholders—the common citizens, data collectors  and the state—and not focus on just one or two, Srikrishna said on  Friday. There should also be methods in place to penalize or impose  fines on companies or agencies in case of data breaches or misuses, he  added. But imposing fines is not the ideal solution, according to  experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It’s really critical that we think about building in  incentives to do better. If every violation results in a huge penalty,  for instance, then the posture of companies will be a secretive,  protective, legal defence posture rather than one that strives to  constantly improve practices and technologies,” said Facebook Inc.’s  global deputy chief privacy officer, Stephen Deadman.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/masking-personal-data-to-protect-privacy-crucial-for-india-say-experts'&gt;https://cis-india.org/internet-governance/news/masking-personal-data-to-protect-privacy-crucial-for-india-say-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-12-16T14:27:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/factor-daily-sriram-sharma-december-12-2017-paranoid-about-state-surveillance-here-s-the-fd-guide-to-living-in-the-age-of-snoops">
    <title>Paranoid about state surveillance? Here’s the FD Guide to living in the age of snoops</title>
    <link>https://cis-india.org/internet-governance/news/factor-daily-sriram-sharma-december-12-2017-paranoid-about-state-surveillance-here-s-the-fd-guide-to-living-in-the-age-of-snoops</link>
    <description>
        &lt;b&gt;The US does it, so does China. Ever since Edward Snowden’s revelations back in 2013, which exposed the extent of the US’s global surveillance apparatus, the public has been fairly clued into the extent of mass surveillance.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Sriram Sharma was published in Factor Daily on December 12, 2017&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It doesn’t take a conspiracy theorist to worry that India does it (or  wants to), too, especially with the high decibel campaigns by banks,  telecom service providers and others to have Indians link Aadhaar, the  unique citizen ID, to multiple services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If you want a dystopian picture of the future of surveillance, look  no further than China, considered the world’s worst abuser of internet  freedom for the third year in a row, according to the new Freedom House,  a US-based NGO that conducts research and analysis on the internet.  With a &lt;a href="https://freedomhouse.org/report/freedom-net/2017/china" rel="noopener nofollow external noreferrer" target="_blank"&gt;score of 87/100&lt;/a&gt; (higher is worse), the Chinese state is renowned for its Great  Firewall, which filters access to the wider internet. “Digital activism  has declined amid growing legal and technical restrictions as well as  heavy prison sentences against prominent civil society figures,” the  latest Freedom House report notes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-12235" height="396" src="https://i0.wp.com/factordaily.com/wp-content/uploads/2017/12/freedom-of-net-india-2017.jpg?resize=660%2C416&amp;amp;ssl=1" width="629" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is rated “Partly Free” with a score of 41/100 (lower is better) in Freedom House’s 2017 report on internet freedom&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While it’s a long way away from China, India scores &lt;a href="https://freedomhouse.org/report/freedom-net/2017/india" rel="noopener nofollow external noreferrer" target="_blank"&gt;41/100&lt;/a&gt; on Internet Freedom in 2017 but is still considered only ‘partly free’  owing to blocking of internet and telecom service providers in Kashmir  and detainment of citizens for expressing their views online. The India  report from Freedom House highlights Aadhaar’s mandatory linking for a  wide range of schemes and records concerns regarding its privacy and  security implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this guide, we take a look at the why, what and how of India’s  surveillance apparatus, the legal provisions in the Indian constitution  that enables them, ask domain experts to provide us with tips on living  in an age of state surveillance. We also take a look at a variety of  widely used tools and apps that help you countering state surveillance  or tracking of any kind.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Know your Big Brother: India’s State Surveillance Programs &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Right to privacy organisation Privacy International has a detailed dossier on the &lt;a href="https://www.privacyinternational.org/node/975#toc-4" rel="noopener nofollow external noreferrer" target="_blank"&gt;state of privacy in India&lt;/a&gt;,  which examines India’s surveillance schemes, laws around interception  and access, and central intelligence agencies that carry out  surveillance. Apart from the state police and the army, surveillance is  carried out at least 16 different intelligence agencies, it notes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society (CIS) and Software Freedom Law  Centre (SFLC) have done extensive research in the past on India’s  surveillance apparatus. Earlier &lt;a href="https://cis-india.org/internet-governance/blog/the-design-technology-behind-india2019s-surveillance-programmes" rel="noopener nofollow external noreferrer" target="_blank"&gt;this year&lt;/a&gt;,  CIS reported on the various programs and tech infrastructure behind  India’s surveillance state: these include Central Monitoring System  (CMS), National Intelligence Grid (NATGRID), Network Traffic Analysis  System (NETRA), etc. An earlier &lt;a href="https://cis-india.org/internet-governance/blog/surveillance-industry-india.pdf" rel="noopener nofollow external noreferrer" target="_blank"&gt;CIS report&lt;/a&gt; highlights a boom in surveillance tech in India following the 26/11 terror attacks in Mumbai.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Based on an RTI (Right to Information) filing, SFLC’s &lt;a href="https://www.sflc.in/indias-surveillance-state-our-report-on-communications-surveillance-in-india" rel="noopener nofollow external noreferrer" target="_blank"&gt;2014 report&lt;/a&gt; on India’s Surveillance State reveals that around 7,500 to 9,000  telephone interception orders are issued by the central government alone  each month. State surveillance of citizens’ private communications is  authorised by laws that let them monitor phone calls, texts, e-mails and  Internet activity on a number of broadly worded grounds such as such as  ‘security of the state’, ‘defence of India’, and ‘public safety’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Government of India is also known to said to work with private  third parties, some of which go so far as to infect target devices using  malicious software to extract information on the subject. A 2013  Citizen Lab report titled ‘&lt;a href="https://citizenlab.ca/storage/finfisher/final/fortheireyesonly.pdf" rel="noopener nofollow external noreferrer" target="_blank"&gt;The Commercialisation of Digital Spying&lt;/a&gt;’  found command and control servers (used to control the host system) for  FinFisher (a remote computer monitoring software suite) in India. A  Wikileaks &lt;a href="https://gadgets.ndtv.com/internet/news/upa-was-client-of-controversial-italian-spyware-firm-claim-leaked-mails-713879" rel="noopener nofollow external noreferrer" target="_blank"&gt;expose in 2015&lt;/a&gt; dumped over a million emails belonging to Italian surveillance malware  vendor HackingTeam. The emails revealed how India’s top intelligence  agencies and the government expressed interest in buying Hacking Team’s  malware interception tools.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Fears of an Aadhaar Surveillance State&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Thejesh G N, an infoactivist wrote in &lt;i&gt;FactorDaily&lt;/i&gt; about &lt;a href="https://factordaily.com/hyderabad-police-surveillance-integrated-information-hub/"&gt;Hyderabad’s surveillance hub&lt;/a&gt;,  which wants to collect all manner of details. Aadhaar is one of the  primary keys to matching profiles with external data sources, he notes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-12230" height="457" src="https://i2.wp.com/factordaily.com/wp-content/uploads/2017/12/Aadhaar_Surveillance_infographic.jpg?resize=660%2C480&amp;amp;ssl=1" width="629" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;figure class="aligncenter wp-caption" id="attachment_12230"&gt;A look at data points gathered by Hyderabad’s Integrated Information Hub&lt;/figure&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The end product shows on a map where you live, what you consume, did  you take PDS, move to some other place, your mobile number, gender…  there’s a lot of data in the hands of the very lowest level of  government, which doesn’t have any protection as by a parliamentary  committee or anything like that. It’s run by bureaucrats, so that has  huge implications,” he says. “If you see Citizen Four (a 2014  documentary about Edward Snowden), it shows a similar system, where you  enter one’s SSN, and it shows everything you have done, and are planning  to do. We are building the same system…Governments change, today we  might have a good government, tomorrow we might have the worst possible  government on the planet.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Policy Director of CIS says he doesn’t regard Aadhaar as a surveillance project. “I see Aadhaar as something that can facilitate surveillance, but by and of itself, it isn’t surveillance,” he says, adding that it does so in a non-consensual manner. “By having Aadhaar numbers across multiple databases, you make surveillance easier. But you need to tie it up to a surveillance system. For instance, Aadhaar without NATGRID isn’t surveillance, but Aadhaar with NATGRID can be helpful for surveillance.” NATGRID (National Intelligence Grid) was first proposed in late 2009 following 26/11 attacks by the Union Home Minister, to enhance India’s counter-terror capabilities. It links 21 citizen databases for access to intelligence/enforcement agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-12236" height="354" src="https://i1.wp.com/factordaily.com/wp-content/uploads/2017/12/screenshot.jpg?resize=660%2C371&amp;amp;ssl=1" width="629" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ongrid’s website earlier had this visualisation depicting its  verification service, which made privacy advocates cringe.  Source:  Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We discussed some worst-case scenarios around the commercial use of  Aadhaar and India Stack companies with Thejesh. “Let’s say there’s a  screening company and they have your Aadhaar ID. They will send it to  Airtel, or Vodafone, and ask for a list of all the websites you have  viewed. Maybe you’ve watched porn or something, at some point in your  life, and that could hurt your employment,” he says.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Curbing your data exhaust&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The EFF (Electronic Frontier Foundation) has published a number of&lt;a href="https://www.eff.org/deeplinks/2013/10/ten-steps-against-surveillance" rel="noopener nofollow external noreferrer" target="_blank"&gt; useful articles&lt;/a&gt; and&lt;a href="https://ssd.eff.org/en" rel="nofollow external noopener noreferrer"&gt; resources&lt;/a&gt; for countering internet surveillance. Recommendations include using  end-to-end encryption through tools such as  OTR (a messaging protocol  available on Adium),&lt;a href="https://ssd.eff.org/en/module/how-use-pgp-mac-os-x" rel="noopener nofollow external noreferrer" target="_blank"&gt; PGP&lt;/a&gt; (to exchange secure emails), and Signal (messenger).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other useful tips:&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Use VPNs &lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;VPNs (virtual private networks) use encryption protocols and secure  tunneling techniques to keep your internet activity impervious to  snooping. With a VPN, you can bypass ISP restrictions on blocked  websites or access services (Spotify) not available in your country,  making it appear that you are browsing from another part of the world.  Keep in mind that you can still be outed by your VPN provider, so it’s  important to choose one that respects your privacy. There are hundreds  of VPN service providers to choose from, &lt;a href="https://thatoneprivacysite.net/vpn-comparison-chart/" rel="noopener nofollow external noreferrer" target="_blank"&gt;That One Privacy Guy&lt;/a&gt; maintains a detailed comparison chart of over a hundred VPN providers,  with details on jurisdiction, price, ethics, logging policies, VPN  protocols supported, and more. Out of these, the country that the VPN  provider is based in is a key filter: you don’t want to choose a VPN  service based out of the ‘&lt;a href="https://restoreprivacy.com/5-eyes-9-eyes-14-eyes/" rel="noopener nofollow external noreferrer" target="_blank"&gt;14 eyes&lt;/a&gt;‘, as they are known to do mass surveillance.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Use TOR&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Tor, an acronym for ‘The Onion Router’, is a free app that lets you  anonymise your online communication by directing a web browser’s traffic  through a volunteer-run network of thousands of servers. It is funded  by the US-based National Science Foundation, Mozilla, and Open  Technology Fund, among others. Tor is &lt;a href="https://www.torproject.org/download/download-easy.html.en" rel="noopener nofollow external noreferrer" target="_blank"&gt;available for download&lt;/a&gt; on Windows, Mac, Linux, and Android.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="wp-image-12257 size-full" height="579" src="https://i0.wp.com/factordaily.com/wp-content/uploads/2017/12/tor-web-browser.jpg?resize=660%2C607&amp;amp;ssl=1" width="629" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;figure class="aligncenter wp-caption" id="attachment_12257"&gt;Browsing on Tor can be far slower than a regular web browser, but it keeps you anonymous.&lt;/figure&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Encrypt your storage&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It’s now a default feature on your phone, or computer, so there’s no  reason why you shouldn’t make use of it. To check if it is turned on in  Windows 10, Go to Settings &amp;gt; System &amp;gt; About, and look for a  “Device encryption” setting at the bottom of the About tab. Keep in mind  that you need to sign into Windows with a Microsoft account &lt;a href="http://www.independent.co.uk/news/edward-snowden-claims-microsoft-collaborated-with-nsa-and-fbi-to-allow-access-to-user-data-8705755.html" rel="noopener nofollow external noreferrer" target="_blank"&gt;to enable this setting&lt;/a&gt;, so it’s likely that the NSA or FBI might be able to bypass it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On a Mac, you turn on full-disk encryption through FileVault, accessible in &amp;gt; System Preferences &amp;gt; Security &amp;amp; Privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On an iPhone, data protection is enabled once you set up a passcode on your device.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Android 5.0 and above devices support full-disk encryption. If it  isn’t turned on by default on your device, you can turn on encryption  under the Security menu.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sensitive documents can also be encrypted using &lt;a href="http://truecrypt.sourceforge.net" rel="noopener nofollow external noreferrer" target="_blank"&gt;TrueCrypt&lt;/a&gt;. Though you must keep in mind that key disclosure laws apply in India, under the Section 69 of the &lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20(amendment).pdf" rel="noopener nofollow external noreferrer" target="_blank"&gt;Information Technology Act&lt;/a&gt;,  which states that there’s a seven-year prison sentence for failing to  assist the central and state governments in decrypting information on a  computer resource.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Use an air-gapped PC&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;An air-gapped PC is one that is not connected to the internet or to  any computers that are connected to the internet. Air-gapped PCs are  typically used when handling critical infrastructure, and this is an  extreme measure one can take when working with sensitive data that you  don’t want to be leaked.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Use&lt;/b&gt;&lt;a href="https://www.eff.org/https-everywhere" rel="noopener nofollow external noreferrer" target="_blank"&gt; &lt;b&gt;HTTPS everywhere&lt;/b&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;HTTPS Everywhere offers plugins for Firefox, Chrome, and Opera, and  turns every link you open or key in, to a secure version of the HTTP  protocol, which is encrypted by Transport Layer Security (TLS). The tool  protects you from eavesdropping or tampering with the site you are  visiting, but only works on sites that support HTTPS. Keep in mind that  this tool won’t conceal the sites you have accessed from eavesdroppers  but it won’t reveal the specific URL that you visited.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Turn on Advanced Protection in Gmail&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;If you trust Gmail with your data, take the relationship to the next level with &lt;a href="https://landing.google.com/advancedprotection/" rel="noopener nofollow external noreferrer" target="_blank"&gt;Advanced Protection&lt;/a&gt;,  which safeguards your account against phishing attacks, limits access  to trusted apps, and adds extra verification features to block  fraudulent account access. You will need a &lt;a href="https://myaccount.google.com/advanced-protection/enroll/details?pli=1" rel="noopener nofollow external noreferrer" target="_blank"&gt;Bluetooth key and a USB key&lt;/a&gt; to turn this feature on.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Some other don’ts&lt;/b&gt;&lt;/h2&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Don’t leave any cameras open. Tape them up if you are a potential surveillance target.&lt;/li&gt;
&lt;li&gt;Don’t use freemium apps, which trade in your privacy. A recent example of a&lt;a href="http://www.zdnet.com/article/popular-virtual-keyboard-leaks-31-million-user-data/" rel="noopener nofollow external noreferrer" target="_blank"&gt; worst-case scenario&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Don’t send any data via free email services that you would like to keep private.&lt;/li&gt;
&lt;li&gt;Don’t use Google or Facebook, as Snowden says, if you value your privacy. Don’t take our &lt;a href="https://techcrunch.com/2014/10/11/edward-snowden-new-yorker-festival/" rel="noopener nofollow external noreferrer" target="_blank"&gt;word for it&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;As for Aadhaar, Thejesh says that there isn’t much one can do as it  is forcibly linked to many essential services. He recommends using  different email ids for official work and unofficial work. “Use one  email ID for Aadhaar and mobile related accounts, and use the other one  for regular communication. It separates the accounts from surveillance  and adds a layer of security,” he says. “Don’t use Aadhaar until is  necessary. If you use Aadhaar and you are not in a mood to resist  everything, then don’t use it where it is not required. Don’t use it  like a regular address proof,” he adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If you are already an Aadhaar holder, it makes sense to use the biometric locking system provided by UIDAI on &lt;a href="https://resident.uidai.gov.in/biometric-lock" rel="noopener nofollow external noreferrer" target="_blank"&gt;its website&lt;/a&gt; to protect against identity theft and unauthorised access. The  biometric locking feature sends an OTP code to your registered mobile  number to unlock or disable the locking system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If someone is concerned about surveillance, CIS’s Prakash recommends  not having a cell phone. “The cellphone is the single largest means of  data gathering about you,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance can take many forms: it can be physical or off-the-air  surveillance (an interception technique used to snoop on phone calls),  he points out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;figure class="aligncenter wp-caption" id="attachment_12232"&gt;&lt;img class="size-full wp-image-12232" height="415" src="https://i2.wp.com/factordaily.com/wp-content/uploads/2017/12/surveillance-cctv.jpg?resize=660%2C436&amp;amp;ssl=1" width="629" /&gt;A CCTV camera fitted on top of a Hyderabad Police vehicle&lt;/figure&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance is not always bad: medical surveillance, for instance,  an entire field around the spread of diseases, is necessary, Prakash  clarifies. “Even state surveillance for national security purposes is  absolutely necessary. A nation-state can’t survive without surveillance  so I am quite clear that those who oppose all forms of surveillance are  opposing all kinds of rights – because you can’t have rights without  security. And indeed, individual security is a human right guaranteed  under the Universal Declaration of Human Rights and guaranteed in  Article 21 of the Indian Constitution. Without security of the person,  you can’t have the right to freedom of speech, you can’t enjoy the right  to privacy… If you’re in a state of war or in a state of terror, then  you can’t enjoy rights – so clearly for me, surveillance is necessary,”  he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That said, surveillance in India is highly problematic as the laws  and the democratic framework for surveillance is very weak, and  enforcement of that framework is even worse, Prakash adds. “One of the  best ways of countering surveillance, I would suggest, is to actually  demand a democratic framework for surveillance in India. Demand that  your MLA and MP take up this issue at the state and central level… and  that we have a democratic framework for both our intelligence agencies  and for all the surveillance that is conducted by the state in India,”  he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He calls everything else – “the technological stuff, using  anonymising networks, end-to-end encryption” – a second order issue. “It  can help you as an individual, but it doesn’t help us as a society.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/factor-daily-sriram-sharma-december-12-2017-paranoid-about-state-surveillance-here-s-the-fd-guide-to-living-in-the-age-of-snoops'&gt;https://cis-india.org/internet-governance/news/factor-daily-sriram-sharma-december-12-2017-paranoid-about-state-surveillance-here-s-the-fd-guide-to-living-in-the-age-of-snoops&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2017-12-16T13:38:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/artificial-intelligence-literature-review">
    <title>Artificial Intelligence Literature Review</title>
    <link>https://cis-india.org/internet-governance/files/artificial-intelligence-literature-review</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/artificial-intelligence-literature-review'&gt;https://cis-india.org/internet-governance/files/artificial-intelligence-literature-review&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-12-16T10:43:42Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/state-led-interference-in-encrypted-systems-a-public-debate-on-different-policy-approaches">
    <title>State-led interference in encrypted systems: A public debate on different policy approaches</title>
    <link>https://cis-india.org/internet-governance/news/state-led-interference-in-encrypted-systems-a-public-debate-on-different-policy-approaches</link>
    <description>
        &lt;b&gt;State-led interference in encrypted systems. Sunil Abraham is a speaker for this event.
&lt;/b&gt;
        &lt;ul&gt;
&lt;li&gt;Proposer's Name: Mr. Carlos Alberto Afonso&lt;/li&gt;
&lt;li&gt;Proposer's Organization: Instituto Nupef&lt;/li&gt;
&lt;li&gt;Co-Proposer's Name: Mr. Hartmut Glaser&lt;/li&gt;
&lt;li&gt;Co-Proposer's Organization: CGI.br&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Co-Organizers:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mr., Carlos, AFONSO,Civil Society, Instituto Nupef&lt;/li&gt;
&lt;li&gt;Mr. Hartmut, GLASER, Technical Community, CGI.br&lt;/li&gt;
&lt;li&gt;Ms. Jamila, VENTURINI,Technical Community, NIC.br&lt;/li&gt;
&lt;li&gt;Mr. Diego, CANABARRO, Technical Community, NIC.br&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Session Format: Other - 90 Min&lt;br /&gt;Format description: The session is designed to host a dialectic debate segment followed by a traditional round-table segment structured around a Q&amp;amp;A format.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Proposer:&lt;br /&gt;Country: Brazil&lt;br /&gt;Stakeholder Group: Civil Society&lt;br /&gt;&lt;br /&gt;Co-Proposer:&lt;br /&gt;Country: Brazil&lt;br /&gt;Stakeholder Group: Technical Community&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speakers&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Christoph Steck (Telefonica, Spain)&lt;/li&gt;
&lt;li&gt;Riana Pfefferkorn (Stanford CIS, EUA)&lt;/li&gt;
&lt;li&gt;Cristine Hoepers (CERT.br, Brazil)&lt;/li&gt;
&lt;li&gt;Carlos A. Afonso (Nupef Institute, Brazil)&lt;/li&gt;
&lt;li&gt;Neide Oliveira (Federal Prosecution Service, Brazil)&lt;/li&gt;
&lt;li&gt;Sunil Abraham (CIS India)&lt;/li&gt;
&lt;li&gt;Monica Guise Rosina (Facebook Brazil)&lt;/li&gt;
&lt;li&gt;Jonah F. Hill (NTIA, EUA)&lt;/li&gt;
&lt;li&gt;Nina Leemhuis Janssen (Govt of The Netherlands)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Content of the Session&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The workshop is built around a policy question that approaches some historical controversies inherent to the widespread use and availability of encryption in the Internet, with a special focus on the tension between the increasing use of cryptography after Snowden and the supposed challenges it poses to public and national security in a digital era. The session promotes a space for multistakeholder debate on: the state of the art in the development and employment of cryptography; different attitudes towards the freedom to use encryption in different jurisdictions; modes of state-led interference in/with encrypted systems; and the limits posed by national and international law to such interference, as well as the impacts it might have to the protection and promotion fundamental human rights and shared values, to permission-less innovation on the Internet and the open architecture of the network. The session will host two segments: one will consist of two presentations made by government officials from the UK and the Netherlands that will detail different policy approaches for dealing with the use of encryption. The second comprises a multistakeholder round-table that gathers comments and questions about the previous presentations. In the end, moderators will summarize discussions and an overarching and documented report of the session will be made available for the session. The unorthodox format chosen for this session allows public scrutiny over some very practical policy-oriented approaches. The bulk of discussions registered during the workshop can provide dialogued feedback into policy development processes elsewhere.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Relevance of the Session&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The development and use of encryption to protect information and communication dates back to ancient times. Encryption has been mainly employed over the centuries to protect personal data, business information, governmental classified information, etc. Attempts to break encryption in general as well as the notion of inserting vulnerabilities (such as backdoors) in systems that rely on encryption have been a parallel phenomenon to (and also an integral part of) the longstanding efforts of cryptography. One might even say that those two processes function as the two different sides of the same coin.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The advent and the great pace of development of computing and networking technologies boosted the science behind cryptography to unprecedented levels of relevance for society in general. More recently, after the Snowden affairs, cryptography has been perceived as a necessary condition (not a sufficient one though) for Internet users to curb the abuses entailed by massive digital surveillance and espionage by an ever growing number of countries. In parallel, together with other measures, the deployment of encryption to commercial applications seems to have become a, somehow, sine qua non condition for some Internet companies to regain consumer trust and retain competitive advantages in relation to other players in the market.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The widespread use and availability of encryption tools however refueled tensions and entailed policy responses in a myriad of countries (e.g.: the Apple vs FBI case in the context of the San Bernadino Shooting; the announcement made by some European countries of their willingness to outlaw some uses of encryption as well as the public commitment of the Netherlands government to support encryption and oppose the development of backdoors; and the successive orders by Brazilian courts that aimed at blocking Whatsapp in the country due to the company’s denial to delivery communication records from some of its users). Those tensions generally revolve around the fact that as general-purpose technology, encryption can be also employed to conceal irregular and/or illicit activities, which would justify the creation of some narrow but allegedly needed exceptions to the constitutional limits built over the last century in several countries to impose limits to criminal investigation in order to uphold privacy and personal data protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The cases mentioned above gave rise to fierce discussions on whether or not the use of encryption increases by itself the likelihood of and facilitate the occurrence of crime and other illicit activities (most notably organized crime of all sorts and terrorism). Some law enforcement agencies and security forces have argued that encryption impairs crime investigation and the prosecution of criminals, and therefore the development of technology with embedded backdoors might be needed. Other actors, including representatives from the technical community, however, argue that such interference might disrupt regularly protected flows of information and communication as well as compromise privacy and the protection of other fundamental human rights. At this point, we are in a stage in which the trade-off between those two perspectives have to be settled through democratic means and public participation and that is why this workshop was submitted for the IGF 2017.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides dealing with several different topics that comprise the overarching agenda of Internet governance (human rights, cybersecurity, openness and permission-less innovation, economic development, infrastructure governance, etc), the topic of this workshop is directly connected to two different goals comprised in the UN SDGs: sound institutions and innovation. Discussions on the contours of sound political institutions and on challenges and incentives for innovation are integral components of any sort of political agenda that aims at reflecting upon the “digital future”, which is the case of the 2017 IGF and highlight the importance of adding this proposal to the overall agenda of the event.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/state-led-interference-in-encrypted-systems-a-public-debate-on-different-policy-approaches'&gt;https://cis-india.org/internet-governance/news/state-led-interference-in-encrypted-systems-a-public-debate-on-different-policy-approaches&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-12-05T14:03:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/indian-express-nishant-shah-december-3-2017-digital-native-memory-card-is-full">
    <title>Digital native: Memory card is full</title>
    <link>https://cis-india.org/raw/indian-express-nishant-shah-december-3-2017-digital-native-memory-card-is-full</link>
    <description>
        &lt;b&gt;We train ourselves to forget as our devices store everything. How do we remember things that matter?
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/tech-news-technology/digital-native-memory-card-is-full-4964383/"&gt;published in Indian Express&lt;/a&gt; on December 3, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;#metoo #himtoo #privacy #bigdata #artificialintelligence #machinerights #Aadhaarprivacy #ItHappensToEverybody #chillingeffects #cyberbullying #Anonymity #checkyourprivilege #botlogic #bluewhale #kidsonline #alonetogether #digitalfreedom #freespeech #righttolove #righttobeforgotten #digitalIndia #mobility #digitalcare #emojis #freeexpression #Internetblackouts #DigitallyDisconnected #attentioneconomies #Digitalcurrencies #algorithmicfriendships #MakeInIndia #AadhaarLeaks #freepress #wisdomofmobs #snapchatgate #digitalivesmatter #ClosedWebs #dataconsent #rightobeforgotten #surveillance #digitalcitizens #fakenews #righttoprivacy #alternativefacts #neveragain #alwaysremember #Nogoingback #Notallmen #yesallmen #dalitlivesmatter&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;As you stare at the mass of hashtags, I want you to play a little game with me. These are all hashtags associated with social movements, political protests, cultural phenomena and individual impulses that have marked 2017. Over this year, I have written about these. Most of these events were discussed a lot and they must have come to your attention in our viral webs. I want you to look at each of these hashtags and try to remember what events and circumstances, concerns and questions, alarms and crises were associated with them.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;I must confess that I only have faint memories of some of these events and a complete blank spot on the specificities of a few. At the time of writing, these were questions that were urgent, critical, and all-consuming. And yet, in the brief span of a few months, they have receded from my memory. The only reason I was able to list all these topics was not because I remembered them, but because they were stored and archived in the digital web, and I was able to pull them out through a search query.&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p&gt;This relationship between memory and storage is both intriguing and alarming. One of the joys of being human is to be able to forget. One of our strongest coping mechanisms is our capacity to make things fade in memories, so that we can live without being trapped in our pasts. The ability to forget also allows us to forgive and to move on, focusing on corrections rather than mistakes.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p&gt;However, when it comes to the digital, memory and storage are the same thing. Human memory falters. But digital storage, outside of a system crash or a black-out is always there, and ready to be converted into memory at the click of a search button. This infinite storage produces a new crisis for us in our digitally mediated lives. It means that even when we forget and depend on our social networks forgetting, the algorithmic databases of storage will not forget our actions and reactions.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p&gt;Now, we also train ourselves to forget because we are assured that these new artificial memories will retain the information longer. As we rely on algorithmic prompts to remind us of things from our past, we lose our capacity to remain engaged and committed to different questions and ideas that are important to us. This reliance on digital storage rather than human memory enables a culture of fragmented and multitasking politics, where we pay momentary attention to the hashtag of the day and forget it quickly as new things grab our attention.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;It poses crucial questions to our ways of thinking about social collectives: Who are we when our machines remember what we have forgotten? What happens when somebody animates forgotten memories through querying digital storage? How do we ensure that the prompts for the new do not draw us away from remembering things that are critical? Human civilisations have depended on cultures of memory making. All our cultural products — even the pictures of dancing babies and cute cats — are indeed ways by which we create collective memories of who we are and who we want to be. However, we are increasingly living in times where our capacity to forget is superseded by our machines of storage. We need to find new ways of figuring out how we can remember things that need longer memory, and how we can be forgotten from actions which need to be un-stored.&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/indian-express-nishant-shah-december-3-2017-digital-native-memory-card-is-full'&gt;https://cis-india.org/raw/indian-express-nishant-shah-december-3-2017-digital-native-memory-card-is-full&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2018-01-10T02:08:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/november-2017-newsletter">
    <title>November 2017 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/november-2017-newsletter</link>
    <description>
        &lt;b&gt;November 2017 Newsletter&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;Dear readers,&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Anubha Sinha took part in the 35th Session of the World Intellectual Property Organization (“WIPO”) Standing Committee on Copyright and Related Rights (“SCCR”) at Geneva from 13 November, 2017 to 18 November, 2017. &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/35th-sccr-cis-question-to-dr-rostama-on-her-study-on-the-impact-of-the-digital-environment-on-copyright-legislation"&gt;She posed a question on the agenda&lt;/a&gt; 'Other Matters' on behalf of CIS on Day 5, 17 November, 2017. CIS also gave statements on &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/35th-sccr-cis-statement-on-limitations-and-exceptions-for-libraries-and-archives"&gt;Limitations and Exceptions for Libraries and Archives&lt;/a&gt; and &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/35th-sccr-cis-statement-on-grulac-proposal-for-analysis-of-copyright-in-the-digital-environment"&gt;GRULAC Proposal for Analysis of Copyright in the Digital Environment&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/cis-a2k-signs-mou-with-telangana-government"&gt;CIS-A2K signed a Memorandum of Understanding&lt;/a&gt; with the Telangana Government’s IT, Electronics &amp;amp; Communications Department with to catalyse the development of the Wikimedia movement in Telangana and improve the state of free-licensed digital content in Telugu and Urdu.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Ministry of Electronics &amp;amp; Information Technology, Government of India has published the Guidelines for Indian Government Websites (GIGW). Nirmita Narasimhan on behalf of the Centre for Internet &amp;amp; Society &lt;a class="external-link" href="https://cis-india.org/accessibility/blog/comments-on-guidelines-for-indian-government-websites"&gt;gave comments on GIGW&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The government has already set up a Nudge unit; now, it should apply the Nobel laureate's insights on auctions relating to essential infrastructure wrote Shyam Ponappa in &lt;a class="external-link" href="https://cis-india.org/telecom/blog/business-standard-november-1-2017-nobel-laureate-richard-thaler-views-on-auctions"&gt;an article in the Business Standard&lt;/a&gt; on November 1, 2017.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;DataMeet and CIS have &lt;a class="external-link" href="https://cis-india.org/openness/steps-towards-integrated-open-water-data"&gt;collaborated on identifying and addressing the challenges to open up and integrate data and information&lt;/a&gt; in the water sector.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/counter-comments-on-trais-consultation-paper-on-privacy-security-and-ownership-of-data-in-telecom-sector"&gt;commented on the Consultation Paper on Privacy, Security and Ownership of Data in Telecom Sector&lt;/a&gt; published by the Telecom Regulatory Authority of India on August 9, 2017.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/a-comparison-of-legal-and-regulatory-approaches-to-cyber-security-in-india-and-the-united-kingdom"&gt;published a report that compares laws and regulations in the United Kingdom and India&lt;/a&gt; to see the similarities and disjunctions in cyber security policy between them.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS &lt;a class="external-link" href="https://cis-india.org/telecom/blog/cis-comments-on-promoting-local-telecom-equipment-manufacturing"&gt;sent comments on TRAI consultation paper on promoting local telecom equipment manufacturing&lt;/a&gt;. The submission drew on research primarily done in the Pervasive Technologies project.&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;CIS in the News:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/telangana-today-november-8-2017-alekhya-hanumanthu-big-data-for-governance"&gt;Big Data for governance&lt;/a&gt; (Alekhya Hanumanthu; Telangana Today; November 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/accessibility/news/the-times-of-india-shalini-umachandrani-november-7-2017-how-tech-is-making-life-easier-for-differently-abled"&gt;How tech is making life easier for differently-abled&lt;/a&gt; (Shalini Umachandrani; November 7, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar"&gt;India Today Conclave Next 2017: Aadhaar was rushed, says MP Rajeev Chandrashekhar&lt;/a&gt; (Priya Pathak; India Today; November 8, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar"&gt;What You Need To Worry About Before Linking Your Mobile Number With Aadhaar &lt;/a&gt;(Roopa Raju and Shekhar Rai; Youth Ki Awaaz; November 8, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now"&gt;OPINION | Data is New Oil and Human Mind the New Battlefield. India Must Wake Up Now&lt;/a&gt; (Lt. General (Retd.) D. S. Hooda; News18.com; November 11, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns"&gt;Aadhaar seeding: benefits and concerns&lt;/a&gt; (Shaikh Zoaib Saleem; Livemint; November 14, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/livemint-november-23-2017-ronald-abraham-privacy-issues-exist-even-without-aadhaar"&gt;Privacy issues exist even without Aadhaar&lt;/a&gt; (Ronald Abraham; November 15, 2017).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/accessibility/news/cima-sarah-oh-november-15-2017-openness-nine-ways-civil-society-groups-have-mobilized-to-defend-internet-freedom"&gt;Advocating for Openness: Nine Ways Civil Society Groups Have Mobilized to Defend Internet Freedom&lt;/a&gt; (Centre for International Media Assistance; November 15, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/livemint-november-16-2017-komal-gupta-govt-working-to-set-up-financial-cert-to-tackle-cyber-threats"&gt;Govt working to set up financial CERT to tackle cyber threats&lt;/a&gt; (Komal Gupta; Livemint; November 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/ciso-mag-financial-cert-to-combat-cyber-threats-says-mos-home-affairs"&gt;Financial CERT to combat cyber threats, says MoS home affairs&lt;/a&gt; (CISO MAG; November 17, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/financial-express-november-20-2017-government-websites-made-aadhaar-details-public"&gt;UIDAI admits 210 government websites made Aadhaar details public&lt;/a&gt; (Financial Express; November 20, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/sunny-sen-livemint-november-23-2017-indias-internet-missionaries"&gt;India’s internet missionaries: The women Google is relying on to spread its Next Billion message&lt;/a&gt; (Sunny Sen; Livemint; November 21, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-november-23-2017-fcc-plan-to-repeal-net-neutrality-may-not-impact-india"&gt;FCC’s plan to repeal net neutrality may not impact India&lt;/a&gt; (Surabhi Agarwal; Economic Times; November 23, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/hindustan-times-kul-bhushan-november-23-2017-indian-activists-slam-fcc-decision-to-ditch-net-neutrality"&gt;Indian activists slam FCC decision to ditch net neutrality&lt;/a&gt; (Kul Bhushan; Hindustan Times; November 23, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-november-23-2017-fcc-plan-to-repeal-net-neutrality-may-not-impact-india"&gt;FCC’s plan to repeal net neutrality may not impact India&lt;/a&gt; (Surabhi Agarwal; Economic Times; November 23, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/digit-subhrojit-mallick-november-24-2017-why-should-you-keep-a-close-eye-on-net-neutrality-debate-in-us"&gt;Why should you keep a close eye on the net neutrality debate in the US&lt;/a&gt; (Subhrojit Mallick; Digit; November 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/livemint-november-24-2017-komal-gupta-cyberattacks-a-significant-threat-to-democracy-modi"&gt;Cyberattacks a significant threat to democracy: Modi&lt;/a&gt; (Komal Gupta; Livemint; November 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations"&gt;Aadhaar verification at airports raises need for stricter data privacy regulations&lt;/a&gt; (Aman Sethi; Hindustan Times, November 27, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/accessibility/news/idap-interview-series-interview-x-with-nirmita-narasimhan"&gt;IDAP Interview Series: Interview with Nirmita Narasimhan&lt;/a&gt; (IDIA Law; November 27, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework"&gt;Govt releases white paper on data protection framework&lt;/a&gt; (Komal Gupta; Livemint; November 28, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/accessibility/news/deccan-herald-november-30-2017-bengalureans-to-receive-helen-keller-award"&gt;Bengalureans to receive Helen Keller award&lt;/a&gt; (Deccan Herald; November 30, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-------------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility &amp;amp; Inclusion&lt;/a&gt; &lt;br /&gt;------------------------------------- &lt;br /&gt;India has an estimated 70 million persons with disabilities who don't have access to read printed materials due to some form of physical, sensory, cognitive or other disability. As part of our endeavour to make available accessible content for persons with disabilities, we are developing a text-to-speech software in 15 languages with support from the Hans Foundation. The progress made so far in the project can be accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;Submission&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/accessibility/blog/comments-on-guidelines-for-indian-government-websites"&gt;Comments on Guidelines for Indian Government Websites&lt;/a&gt; (Nirmita Narasimhan; November 26, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;Our Access to Knowledge programme currently consists of two projects. The Pervasive Technologies project, conducted under a grant from the International Development Research Centre (IDRC), aims to conduct research on the complex interplay between low-cost pervasive technologies and intellectual property, in order to encourage the proliferation and development of such technologies as a social good. The Wikipedia project, which is under a grant from the Wikimedia Foundation, is for the growth of Indic language communities and projects by designing community collaborations and partnerships that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;►&lt;/span&gt;Copyright &amp;amp; Patent&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div id="_mcePaste"&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/35th-sccr-cis-statement-on-limitations-and-exceptions-for-libraries-and-archives"&gt;35th SCCR: CIS Statement on Limitations and Exceptions for Libraries and Archives&lt;/a&gt; (Anubha Sinha; November 15, 2017).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste"&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/35th-sccr-cis-statement-on-grulac-proposal-for-analysis-of-copyright-in-the-digital-environment"&gt;35th SCCR: CIS Statement on Limitations and Exceptions for Libraries and Archives&lt;/a&gt; (Anubha Sinha; November 17, 2017).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/35th-sccr-cis-question-to-dr-rostama-on-her-study-on-the-impact-of-the-digital-environment-on-copyright-legislation"&gt;35th SCCR: CIS' Question to Dr. Rostama on her Study on the Impact of the Digital Environment on Copyright Legislation&lt;/a&gt; (Anubha Sinha; November 19, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Blog Entry&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/cis-a2k-signs-mou-with-telangana-government"&gt;CIS-A2K signs MoU with Telangana Government &lt;/a&gt;(Manasa Rao; November 8, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;►Openness&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;Our work in the Openness programme focuses on open data, especially open government data, open access, open education resources, open knowledge in Indic languages, open media, and open technologies and standards - hardware and software. We approach openness as a cross-cutting principle for knowledge production and distribution, and not as a thing-in-itself.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;span style="text-align: justify; "&gt; &lt;/span&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;►Privacy&lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/a-comparison-of-legal-and-regulatory-approaches-to-cyber-security-in-india-and-the-united-kingdom"&gt;A Comparison of Legal and Regulatory Approaches to Cyber Security in India and the United Kingdom&lt;/a&gt; (Divij Joshi; edited by Elonnai Hickok; November 12, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/counter-comments-on-trais-consultation-paper-on-privacy-security-and-ownership-of-data-in-telecom-sector"&gt;Counter Comments on TRAI's Consultation Paper on Privacy, Security and Ownership of Data in Telecom Sector&lt;/a&gt; (Amber Sinha; November 23, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/bis-international-seminar-on-internet-of-things"&gt;BIS International Seminar on Internet of Things&lt;/a&gt; (Organized by BIS; November 15, 2017; India Habitat Centre, New Delhi). Amber Sinha attended the event.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/internet-universality-indicators-for-a-safe-secure-and-inclusive-cyberspace-for-sustainable-development"&gt;Internet Universality Indicators for a Safe, Secure and Inclusive Cyberspace for Sustainable Development&lt;/a&gt; (Organized by UNESCO in collaboration with the Ministry of Electronics and IT, Government of India; UNESCO Conference Room, Chanakyapuri, New Delhi; November 17, 2017). Amber Sinha attended the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/roundtable-on-data-integrity-and-privacy"&gt;Roundtable on Data Integrity and Privacy&lt;/a&gt; (Organized by Observer Research Foundation; November 18, 2017). The round table discussion was chaired by Shri Baijayant Panda, Hon'ble Member of Parliament.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;span style="text-align: justify; "&gt;►&lt;/span&gt;Cyber Security&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Blog Entry&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/breach-notifications-a-step-towards-cyber-security-for-consumers-and-citizens"&gt;Breach Notifications: A Step towards Cyber Security for Consumers and Citizens&lt;/a&gt; (Amelia Andersdotter; November 14, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Event Organized&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/events/roundtable-on-enhancing-indian-cyber-security-through-multi-stakeholder-cooperation"&gt;Roundtable on Enhancing Indian Cyber Security through Multi-Stakeholder Cooperation&lt;/a&gt; (Indian Islamic Centre; Lodhi Road; New Delhi; November 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/events/open-house-on-security-practices-in-fintech"&gt;Open House on Security Practices in FinTech&lt;/a&gt; (Organized by CIS and Has Geek; November 17, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/multinational-cyber-security-forum-at-university-of-haifa"&gt;Multinational Cyber Security Forum at University of Haifa&lt;/a&gt; (Organized by Center for Cyber, Law and Policy and University of Haifa in collaboration with the Hewlett Foundation Cyber Initiative; November 5 - 7, 2017). Sunil Abraham participated in the meeting held in Israel.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc"&gt;Global Commission on the Stability of Cyberspace&lt;/a&gt; (GCSC) (Organized by GCSC; November 21, 2017; New Delhi). Pranesh Prakash participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;&lt;strong&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;-----------------------------------&lt;br /&gt;&lt;/span&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;br /&gt;&lt;/a&gt;&lt;span&gt;----------------------------------- &lt;/span&gt;&lt;/p&gt;
&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;span style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;CIS is involved in promoting access and accessibility to telecommunications services and resources, and has provided inputs to ongoing policy discussions and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Article &lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/telecom/blog/business-standard-november-1-2017-nobel-laureate-richard-thaler-views-on-auctions"&gt;Nobel Laureate Richard Thaler's Views On Auctions&lt;/a&gt; (Shyam Ponappa; Business Standard; November 1, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;Submission&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/telecom/blog/cis-comments-on-promoting-local-telecom-equipment-manufacturing"&gt;Comments on TRAI Consultation Paper on Promoting Local Telecom Equipment Manufacturing&lt;/a&gt; (Anubha Sinha; November 26, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;&lt;span style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;&lt;span&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Articles&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-november-5-2017-digital-native-rebellion-by-google-doc"&gt;Digital native: Rebellion by Google Doc &lt;/a&gt;(Nishant Shah; Indian Express; November 4, 2017)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-november-19-2017-nishant-shah-digital-native-let-there-be-life"&gt;Digital native: Let there be life&lt;/a&gt; (Nishant Shah; Indian Express; November 19, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="keyResearch"&gt;
&lt;div id="parent-fieldname-text-8a5942eb6f4249c5b6113fdd372e636c"&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with disabilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;p&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;► Support Us&lt;/p&gt;
&lt;div&gt;Please help us defend consumer and citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/div&gt;
&lt;p&gt;► Request for Collaboration&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, write to Tanveer Hasan, Programme Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div&gt;&lt;em&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects&lt;/em&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="viewlet-below-content-body"&gt;
&lt;div class="visualClear"&gt;&lt;/div&gt;
&lt;div class="documentActions"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/november-2017-newsletter'&gt;https://cis-india.org/about/newsletters/november-2017-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2018-01-10T01:57:29Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework">
    <title>Govt releases white paper on data protection framework</title>
    <link>https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework</link>
    <description>
        &lt;b&gt;Public comments are welcome till 31 December on the data protection white paper, which is aimed at securing digital transactions and addressing privacy issues.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Komal Gupta was published in &lt;a class="external-link" href="http://www.livemint.com/Politics/LIKM3FxX3KEcA52uGMlcJP/Govt-releases-white-paper-on-data-protection-framework.html"&gt;Livemint&lt;/a&gt; on November 28, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;A  nuanced approach towards data protection will have to be followed in  India, keeping in mind the fact that individual privacy is a fundamental  right limited by reasonable restrictions, according to a white paper  issued by the government on a data protection framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  government has sought public comments till 31 December on the white  paper, which is aimed at securing digital transactions and addressing  customer and privacy protection issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The white paper, drafted  by the committee of experts on data protection framework, was released  by the ministry of electronics and information technology on Monday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On  31 July, the government constituted a 10-member committee of experts  headed by former Supreme Court justice B.N. Srikrishna to study various  issues relating to data protection and make specific suggestions on the  principles to be considered for data protection as well as suggest a  draft Data Protection bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other members of the committee include  telecom secretary Aruna Sundararajan,  Unique Identification Authority  of India chief executive Ajay Bhushan Pandey, and additional secretary  in the information technology ministry Ajay Kumar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  committee seeks to put the onus on stakeholders and the public through a  questionnaire on issues such as collection of personal data, consent of  consumers, penalties and compensation, code of conduct and an  enforcement model that should be set up.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The sensitivity of the  data could also develop based on its combination with other types of  information. For example, an email address taken in isolation, is not  sensitive. However, if it is combined with a password, then it could  become sensitive as it opens access to many other websites and systems,  which may expose the individual to harm such as cyberattacks and  phishing frauds,” the white paper said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is also possible that  personal or even non-personal data, when processed using big data  analytics, could be transformed into sensitive personal data. Therefore,  there may be a need to create safeguards which will prevent misuse of  personal information in these contexts of use, it added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The white  paper also seeks “to designate certain lawful grounds under which data  can be processed, even in the absence of consent.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In some  situations, seeking consent prior to a data processing activity would  not be possible, or it may defeat the purpose of the processing. For  instance, where law enforcement officials need to apprehend a criminal,  seeking the consent of the criminal prior to processing would defeat the  purpose of the investigation, it said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It seems to be an  eminently reasonable white paper which raises the right questions.  However, it lacks analysis of data protection vis-a-vis Aadhaar,” said  Pranesh Prakash, policy director at the Centre for Internet and Society,  a Bengaluru-based think tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Safeguarding privacy rights needs  much more than a data protection law; it needs a larger consultation  that includes issues like surveillance as well, added Prakash.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework'&gt;https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-28T14:34:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/cyfy-2017-agenda">
    <title>CyFy 2017 Agenda</title>
    <link>https://cis-india.org/internet-governance/files/cyfy-2017-agenda</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/cyfy-2017-agenda'&gt;https://cis-india.org/internet-governance/files/cyfy-2017-agenda&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-11-26T09:11:29Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/news/cima-sarah-oh-november-15-2017-openness-nine-ways-civil-society-groups-have-mobilized-to-defend-internet-freedom">
    <title>Advocating for Openness: Nine Ways Civil Society Groups Have Mobilized to Defend Internet Freedom</title>
    <link>https://cis-india.org/accessibility/news/cima-sarah-oh-november-15-2017-openness-nine-ways-civil-society-groups-have-mobilized-to-defend-internet-freedom</link>
    <description>
        &lt;b&gt;The debate over whether the Internet is a better tool for democratic empowerment or authoritarian control misconstrues the nature of the democratic challenges of the digital age. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Sarah Oh was published by the &lt;a class="external-link" href="https://www.cima.ned.org/publication/advocating-openness-nine-ways-civil-society-groups-mobilized-defend-internet-freedom/"&gt;Center for International Media Assistance&lt;/a&gt; on November 15, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h3 style="text-align: justify; "&gt;Key Findings&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Civil society groups from the Global South are leading the charge to advocate for an Internet that remains open, pluralistic, and democratic. The nine case studies highlighted in this report demonstrate various ways groups in different countries have successfully fought for policies and norms that strengthen Internet freedom and digital rights. These strategies include awareness-raising, nonviolent direct action, regional and international coalition-building, and strategic litigation.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Media freedom advocates have been at the forefront of many Internet freedom efforts.&lt;/li&gt;
&lt;li&gt;Threats to independent media online and freedom of expression continue to mount as authoritarian regimes become more technologically savvy.&lt;/li&gt;
&lt;li&gt;Building broad civil society coalitions around Internet rights increases the chances of long-term success.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The debate over whether the Internet is a better tool for democratic empowerment or authoritarian control misconstrues the nature of the democratic challenges of the digital age. The Internet is not a tool, but a complex domain of “competing forces and constraints.”1 These forces are comprised of powerful businesses, states, politicians, criminal enterprises, advocacy groups: in short, all of the elements present in any democracy. But in this cyber-democracy, forces compete in part on the shifting ground of the technological and physical infrastructure of the Internet, where some players wield more power than others with an ability to mold the terrain in their favor. Authoritarian states aware of what is at stake in the evolution of the Internet are beginning to engage in long-term and well-resourced efforts to undermine the democratic rights of citizens in this more fundamental way.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a reference to the distributed denial-of-service (DDoS) attacks  that take down a specific website, these broader efforts represent what  some have called a &lt;a href="https://www.demworks.org/distributed-denial-democracy"&gt;“distributed denial-of-democracy” (DDoD)&lt;/a&gt; attack aimed at reducing the utility of the Internet for genuine  democratic discourse. These efforts, which are coordinated and well  resourced, are often more insidious, harder to detect, and have the  overall effect of undermining civic engagement and overall trust in the  media ecosystem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And while the diffuse and fast-changing nature of Internet can at  times make it difficult for authoritarian regimes to exert their  control, the complex interplay between technology, laws, infrastructure,  and socio-political factors shaping the Internet make it equally  difficult for democratic actors to counteract these DDoD strategies. As  an additional obstacle, the values that underpin Internet freedom can be  sidelined in the forums and governing bodies that set Internet  standards by the dominance in those spaces of private tech companies  concerned primarily with generating profits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Formidable though they may be, these challenges are not  insurmountable. Civil society groups from the Global South are leading  the charge to advocate for an Internet that remains open, pluralistic,  and democratic. The nine case studies highlighted in this report  demonstrate various ways groups in different countries have successfully  fought for policies and norms that strengthen Internet freedom and  digital rights. These strategies include awareness-raising, nonviolent  direct action, regional and international coalition-building, and  strategic litigation.&lt;/p&gt;
&lt;p class="BodyA" style="text-align: justify; "&gt;Each of the following case studies corresponds to one of the nine guiding principles of a &lt;a href="https://openinternet.global/comment-draft-principles"&gt;Democratic Framework to Interpret Open Internet Principles&lt;/a&gt;.  This framework was collaboratively developed by a network of civil  society groups worldwide to illuminate the ways that an open Internet is  essential for the functioning of democratic societies. It was inspired  by the norms and standards developed by the &lt;a href="http://internetrightsandprinciples.org/site/"&gt;Internet Rights and Principles Dynamic Coalition (IRPC)&lt;/a&gt; of the United Nations &lt;a href="https://www.intgovforum.org/"&gt;Internet Governance Forum&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The framework is an important starting point for more effective,  coordinated effort to ensure that the Internet remains a welcoming place  for democratic life. Its aim is to create a consensus around the values  that should shape the future development of the Internet. But moreover,  it also provides an avenue for understanding and sharing knowledge on  the concrete strategies that can be put into practice in different  contexts to make sure that the Internet remains a level playing field.  The following nine examples demonstrate how citizen groups can mobilize  to enshrine such democratic principles in cyberspace.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;“The debate over whether the Internet is a better tool for  democratic empowerment or authoritarian control misconstrues the nature  of the democratic challenges of the digital age.”&lt;/h3&gt;
&lt;div class="tsd-simple_content tsd-cima-module" style="text-align: justify; "&gt;
&lt;h2&gt;1. Freedom of Expression&lt;/h2&gt;
&lt;br /&gt;
&lt;p&gt;In the &lt;i&gt;Philippines&lt;/i&gt;, a cybercrime law introduced in 2012  proposed increasing penalties for libel and giving authorities unchecked  power to track information online. Internet freedom activists worried  several provisions of the law would infringe on freedom of expression by  preventing Filipinos from freely posting content on websites, and  participating in online forums and discussions without fear of being  blocked or facing serious penalties. In response, pro-democracy  organizations from across the political spectrum joined together to  challenge the constitutionality of the law. Through protests,  roundtables, and capacity building activities, they raised awareness and  encouraged advocacy efforts around the dangers the law posted to  freedom of expression and privacy. &lt;a href="http://fma.ph/"&gt;The &lt;/a&gt;&lt;a href="http://fma.ph/"&gt;Foundation for Media Alternatives (FMA&lt;/a&gt;&lt;a href="http://fma.ph/"&gt;)&lt;/a&gt;, a digital rights organization founded after the fall of the Marcos dictatorship and the &lt;a href="https://www.facebook.com/pg/PIFA.ph/about/?ref=page_internal"&gt;Philippine Internet Freedom Alliance (PIFA)&lt;/a&gt;,  a broad nationwide coalition of pro-democracy and Internet freedom  advocates, were among the organizations in the front lines on the  struggle. PIFA was even one of the 20 organizations to file 15 petitions  to the Supreme Court about the constitutionality of the law.&lt;/p&gt;
&lt;p&gt;Public efforts in the courts and actions in the streets contributed  to the takedown of three contested provisions of the law, including  provision that would allow government to block or restrict access to  computer data. The Supreme Court declared these provisions  unconstitutional and delayed implementation of the law. Despite public  concerns about the surviving provisions, the national campaign against  the cybercrime law led to a turning point for Filipino activists; it  showed the power of people coming together and fighting for the  importance of digital rights in the Philippines. Initially fragmented,  the campaign led to a larger movement unified under the goal of  protecting human rights and freedom of expression online. Thus, it took  the introduction of a flawed law and active public campaigns to initiate  a broader dialogue about privacy, surveillance, and digital security.  Digital rights &lt;a href="http://www.rstreet.org/2015/09/10/the-business-case-for-cambodian-Internet-freedom/"&gt;communities across Southeast Asia&lt;/a&gt; have been inspired by Filipino advocacy efforts, which they have  understood to be an example of how to communicate the balance required  between anti-cybercrime measures with fundamental rights to a public  audience.&lt;/p&gt;
&lt;/div&gt;
&lt;div class="tsd-simple_content tsd-cima-module" style="text-align: justify; "&gt;
&lt;h2&gt;2. Freedom of Assembly and Association&lt;/h2&gt;
&lt;br /&gt;
&lt;p&gt;Social media is an important organizing tool for journalists and advocacy groups in &lt;i&gt;Uganda&lt;/i&gt;. Facebook, WhatsApp, and other messaging applications &lt;a href="https://books.google.com/books?id=2dmeBQAAQBAJ&amp;amp;pg=PA367&amp;amp;lpg=PA367&amp;amp;dq=using+facebook+for+organizing+uganda+-facebook.com&amp;amp;source=bl&amp;amp;ots=Agd54hNXbj&amp;amp;sig=KRs9Ndl7BJfVfBnW9LXHJgpyEv4&amp;amp;hl=en&amp;amp;sa=X&amp;amp;ved=0ahUKEwjjv6fKsdLWAhUK7mMKHVkmB5kQ6AEISzAI#v=onepage&amp;amp;q=using%2520facebook%2520for%2520organizing%2520uganda%2520-facebook.com&amp;amp;f=false"&gt;have been used to share&lt;/a&gt; political knowledge, connect leaders with supporters, and organize  events — even share information about government abuses. During national  ‘&lt;a href="https://en.wikipedia.org/wiki/Walk_to_work_protest"&gt;Walk to Work&lt;/a&gt;’  protests in 2011, organized to protest living costs after presidential  elections, Facebook and Twitter provided a steady stream of updates from  protestors, bystanders, and journalists.&lt;/p&gt;
&lt;p&gt;Using social media, however, can have dangerous consequences for  marginalized groups such as the LGBT community. The government of Uganda  has been known to collect user information and prosecute individuals  based on information shared on social media. Uganda is one of 76  countries where homosexuality is currently criminalized, and LGBT  activists fear that their online conversations will be monitored and  used against them. By posting information taken from photos and content  posted on Facebook, a local tabloid exposed the identity of numerous  members of the LGBT community in 2011 and again in 2014. The tabloid  stories in 2011 are believed to have contributed to the &lt;a href="https://www.theguardian.com/world/2016/jan/26/uganda-lgbt-groups-david-kato-murder-5-years-on"&gt;killing of David Kato&lt;/a&gt;, a prominent gay rights activist.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.cima.ned.org/wp-content/uploads/2017/04/Illustration_p11_Network-graphic.jpg"&gt;&lt;img class="alignright wp-image-8162 size-medium" height="300" src="https://www.cima.ned.org/wp-content/uploads/2017/04/Illustration_p11_Network-graphic-300x300.jpg" width="300" /&gt;&lt;/a&gt;Furthermore,  the government has repeatedly restricted access for advocacy groups to  use the Internet to share political information. In 2016, the country’s  media regulator &lt;a href="http://www.bbc.com/news/world-africa-35601220"&gt;restricted the use&lt;/a&gt; of WhatsApp, Facebook, and Twitter to prevent the organizing of  protests before presidential elections in February as the government had  done before in 2011. In both cases, the electoral commission &lt;a href="https://freedomhouse.org/report/freedom-net/2016/uganda"&gt;enforced&lt;/a&gt; the social media shut-down.&lt;/p&gt;
&lt;p&gt;Civil society groups have responded in two ways. First, they have  sought to deepen their digital security capacity. To protect against  threats to journalists, LGBT organizations, and other groups have  learned how to use Facebook and social media applications more securely  and to implement other practices that increase their privacy. In the  lead up to the 2016 election this included the use of &lt;a href="https://en.wikipedia.org/wiki/Virtual_private_network"&gt;virtual private networks&lt;/a&gt; (VPNs) to share information. Civil society groups spread information  about how to use them through radio broadcasts. The fact that the  hashtag #UgandaDecides trended on Twitter shows how they were able to  spread their knowledge through local networks and connect with  international media. Secondly, civil society groups built coalitions  with international organizations to draw attention to abuses taking  place in Uganda. In 2016, &lt;a href="https://www.accessnow.org/"&gt;Access Now&lt;/a&gt; supported a coalition of groups to &lt;a href="https://www.accessnow.org/uganda-blocks-social-media-harms-human-rights/"&gt;demand&lt;/a&gt; that the government stop the Internet shutdown as part of the #KeepitOn campaign.&lt;/p&gt;
&lt;/div&gt;
&lt;div class="tsd-simple_content tsd-cima-module" style="text-align: justify; "&gt;
&lt;h2&gt;3. Accessibility&lt;/h2&gt;
&lt;br /&gt;
&lt;p&gt;In &lt;i&gt;Nigeria&lt;/i&gt;, national broadband plans have overlooked  rural communities, leaving them with low bandwidth and high-cost options  for Internet access. This means that broadband and mobile data fees are  unaffordable to many in Nigeria, especially the poor. Fixed-line  broadband subscriptions cost an average of 39 percent of average income,  and mobile broadband packages cost 13 percent. Given that approximately  80 percent of Nigerians earn below the poverty line ($2 a day or less),  access to the Internet is out of reach and unaffordable for a majority  of citizens in Nigeria.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://a4ai.org/"&gt;The &lt;/a&gt;&lt;a href="http://a4ai.org/"&gt;Alliance for Affordable Internet&lt;/a&gt;,  a global coalition working on Internet affordability, works with  Nigerian civil society leaders to raise awareness around this issue  through thematic working groups. The consumer advocacy and pricing  transparency working group, for instance, works closely with &lt;a href="http://a4ai.org/a4ai-nigeria-multi-stakeholder-coalition/a4ai-nigeria-coalition-members/"&gt;a coalition of Nigerian NGOs&lt;/a&gt; that have been leading campaigns to raise awareness about pricing and  taxation policies that have been proposed in Nigeria. One proposed  policy includes imposing a nine percent tax on voice, data, and SMS  services to consumers. This policy would make the Internet dramatically  more expensive for Nigerian consumers. Groups say they worry about the  consequences of the proposed policy in an environment where farmers are  forced to climb trees just to get a stable Internet connection.&lt;/p&gt;
&lt;p&gt;Civil society leaders who are part of the coalition have worked to  build a healthy dialogue between regulators, civil society, and the  government. A key strategy, according to activists, has been encouraging  groups to find constructive ways to work with government and leveraging  the interests of each of these groups to protect and drive down costs  for Nigerian consumers. They seek to build relationships with the  regulator and to inform them about ways to better communicate with and  engage consumer groups, such as sharing their content through social  media rather than press releases. Another important learning has been  identifying champions within government to work on these issues.&lt;/p&gt;
&lt;/div&gt;
&lt;div class="tsd-simple_content tsd-cima-module" style="text-align: justify; "&gt;
&lt;h2&gt;4. Privacy and Data Protection&lt;/h2&gt;
&lt;br /&gt;
&lt;p&gt;&lt;a href="https://www.cima.ned.org/wp-content/uploads/2017/11/Cell_phone_android_transparent.jpg"&gt;&lt;img class="alignleft wp-image-8896" height="358" src="https://www.cima.ned.org/wp-content/uploads/2017/11/Cell_phone_android_transparent-212x300.jpg" width="253" /&gt;&lt;/a&gt;In &lt;i&gt;Burma,&lt;/i&gt; gaps in the law have left citizens vulnerable when it comes to privacy  and data protection. Restrictions on privacy have eased since the  country’s transition from military rule, but a lack of data protection  laws and general lack of awareness around privacy and data protection  present significant challenges for protecting an open Internet.&lt;/p&gt;
&lt;p&gt;Messaging applications such as Viber and Facebook Messenger, for  example, are the de-facto tool for communication for activists and are  used to organize political events and activities. Cheaper than voice  calls, far more accessible than landlines, and easier to use than email,  these tools are the primary way people in Burma communicate. &lt;a href="https://www.fastcompany.com/40438242/jailed-for-a-facebook-poem-the-fight-against-myanmars-draconian-defamation-laws"&gt;Activists have received harsh penalties for sharing content that may be viewed as threatening state security&lt;/a&gt;.  These applications are often not secure, making it possible for Burma  state authorities or agents of the state to intercept their  conversations. &lt;a href="https://pen.org/sites/default/files/unfinished_freedom_lowres.pdf"&gt;During a crackdown on student protests in March 2015, mobile phones were taken by police&lt;/a&gt;. Activists worried at the time that information on these phones would eventually be used against them.&lt;/p&gt;
&lt;p&gt;Observing the need to protect activists and educate them about data  protection, activists in 2016 formed a coalition, Digital Rights MM. The  coalition, led by &lt;a href="http://phandeeyar.org/"&gt;Phandeeyar&lt;/a&gt;, &lt;a href="http://www.myanmar-responsiblebusiness.org/index.php"&gt;Myanmar Center for Responsible Business&lt;/a&gt;, &lt;a href="http://www.myanmarido.org/"&gt;Myanmar ICT for Development&lt;/a&gt;, and Free Expression Myanmar, has led a national conversation on the issue. &lt;a href="https://www.forbes.com/sites/chynes/2016/12/21/digital-rights-must-become-a-top-priority-in-myanmars-connectivity-revolution/#4fde153b2267"&gt;Drawing on expertise from the region and international organizations&lt;/a&gt;,  22 local Burma-based organizations have been successful in pointing out  gaps when it comes to privacy and freedom of expression in the &lt;a href="https://www.article19.org/resources.php/resource/38665/en/myanmar:-telecommunications-law"&gt;national telecommunications law&lt;/a&gt;,  a comprehensive law that oversees the development of the  telecommunications sector in Burma. They also participated in meetings  with the government and launched a &lt;a href="https://www.facebook.com/MMTelecomLaw/photos/a.821155664669495.1073741830.821091201342608/1347827635335626/?type=3&amp;amp;theater"&gt;public facing campaign #ourvoiceourhluttaw&lt;/a&gt; pushing to amend 23 articles, including one on lawful interception of data.&lt;/p&gt;
&lt;/div&gt;
&lt;div class="light_blue with-bg dropquote-blue tsd-dropquote tsd-cima-module" style="text-align: justify; "&gt;
&lt;div class="expand-on-mobile quote"&gt;&lt;/div&gt;
&lt;div class="expand-on-mobile content"&gt;
&lt;h3&gt;“Messaging applications such as Viber and Facebook  Messenger, for example, are the de-facto tool for communication for  activists and are used to organize political events and activities.”&lt;/h3&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="tsd-simple_content tsd-cima-module" style="text-align: justify; "&gt;
&lt;h2&gt;5. Personal Safety and Security&lt;/h2&gt;
&lt;br /&gt;
&lt;p&gt;In &lt;i&gt;Pakistan&lt;/i&gt;, women face threats of physical, sexual, and  psychological harassment online. Leaking explicit photos and threats of  blackmail are growing increasingly more common. &lt;a href="https://digitalrightsfoundation.pk/drfpcwstraining/"&gt;From  2014 to 2015, more than 3,000 cybercrimes were reported to the Federal  Investigation Agency and of those cases, nearly half were targeted to  women on social media&lt;/a&gt;. Observers estimate far more cases go unreported. In fact, in workshops conducted by the &lt;a href="https://digitalrightsfoundation.pk/"&gt;The Digital Rights Foundation&lt;/a&gt;, many female college students reported that they did not know cyber harassment was a crime.&lt;/p&gt;
&lt;p&gt;Online platforms are an important space for political engagement,  expression, and mobilization in Pakistan. Thus, online harassment  directly impacts the political participation of women, including female  journalists and women politicians. In 2016 the &lt;a href="https://digitalrightsfoundation.pk/"&gt;Digital Rights Foundation&lt;/a&gt; established a &lt;a href="https://digitalrightsfoundation.pk/cyber-harassment-helpline-completes-its-four-months-of-operations/"&gt;Cyber Harassment Helpline&lt;/a&gt; that women can reach out to for help when they are harassed on the  Internet. One of the main objective of the helpline is to help bridge  the trust deficit between survivors and law enforcement agencies. &lt;a href="http://digitalrightsfoundation.pk/wp-content/uploads/2017/04/4-Month-Report.Final_.pdf"&gt;An analysis of more than 400 cases &lt;/a&gt;showed  that the most common barriers to equal participation are non-consensual  use of information, impersonation, account hacking, black mailing, and  receiving unsolicited messages; the most targeted groups include women,  children, human rights defenders, and minority communities. The Digital  Rights Foundation has also been leading efforts to strengthen legal  protections for women and responding to survivors by recommendations to  law enforcement agencies and the government. Pakistan has a National  Response Centre for Cybercrime, but it has faced challenges serving  women outside of major cities.&lt;/p&gt;
&lt;/div&gt;
&lt;div class="tsd-simple_content tsd-cima-module" style="text-align: justify; "&gt;
&lt;h2&gt;6. Inclusion&lt;/h2&gt;
&lt;br /&gt;
&lt;p&gt;In &lt;i&gt;India&lt;/i&gt;, the population of people with disabilities is  estimated to be as high as 150 million people, and the recorded rates of  those who are vision-impaired are among the highest in the world.  Indian digital rights advocacy groups, like the &lt;a href="https://cis-india.org/"&gt;Centre for Internet and Society (CIS)&lt;/a&gt; have worked to ensure that these individuals are able to participate  fully online by promoting policies that prioritize accessibility. These  include the National Policy on Universal Electronics Accessibility, the  Rights of Persons with Disabilities Act, and &lt;a href="http://guidelines.gov.in/"&gt;Guidelines for Indian Government Web (GIGW)&lt;/a&gt;,  which all require government information be shared in formats that are  accessible. Advocacy groups, however, have successfully shown that  policies alone are not enough and have taken action to ensure persons  with disabilities have access to critical resources and information  online.&lt;/p&gt;
&lt;p&gt;Mobile phones in particular are a vital portal to access government  services, but mobile applications remain largely inaccessible to many  people with disabilities, especially those with vision disabilities. For  example, CIS observed in 2015 that the &lt;a href="https://www.mygov.in/"&gt;MyGov&lt;/a&gt;,  the Indian Government’s mobile citizen engagement platform and the  Prime Minister’s application was highly inaccessible: screens cannot be  navigated by visually impaired users and can also not be read using a  screen reader. Based on this, CIS with other advocacy organizations  worked on framing accessibility guidelines for mobile applications  recommended to the Government of India as a standard. Advocacy groups,  such as the &lt;a href="http://www.ncpedp.org/"&gt;National Centre for Promotion of Employment for Disabled People (NCPEDP)&lt;/a&gt;,  have also been appealing to the private sector to ensure products  designed to serve these needs are affordable and readily available to  people with disabilities. They appeal to Indian companies and  policymakers by advocating for the universal appeal of assistive  technology to ensure disabled communities are not left behind.&lt;/p&gt;
&lt;p&gt;Sustained advocacy, new legal mandates applied to public and private  sectors, and increased research in this domain have helped advance the  issue of accessibility of mobile applications. The country’s National  Informatics Centre has set up a committee to revise the GIGW to bring  them up to speed with international standards.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/news/cima-sarah-oh-november-15-2017-openness-nine-ways-civil-society-groups-have-mobilized-to-defend-internet-freedom'&gt;https://cis-india.org/accessibility/news/cima-sarah-oh-november-15-2017-openness-nine-ways-civil-society-groups-have-mobilized-to-defend-internet-freedom&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2017-11-26T03:58:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns">
    <title>Aadhaar seeding: benefits and concerns</title>
    <link>https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns</link>
    <description>
        &lt;b&gt;Products and services such as bank accounts, life insurance policies and phone connections have to be linked with Aadhaar. But is this of any real help? &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shaikh Zoaib Saleem was published by &lt;a class="external-link" href="http://www.livemint.com/Money/Awu9Hz1DmuDzx0VTmQoPvL/Aadhaar-seeding-benefits-and-concerns.html"&gt;Livemint&lt;/a&gt; on November 14, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p class="A5l" style="text-align: justify; "&gt;The  government has made it mandatory for consumers to link many important  services with Aadhaar. You too may be getting frequent reminders to link  your banks account, mutual fund and mobile number with Aadhaar.  Recently, the Reserve Bank of India also clarified that it is mandatory  to link bank accounts with Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The latest addition to this  list are insurance policies. In a circular, the Insurance Regulatory and  Development Authority of India (Irdai) has stated that linking of  Aadhaar number to insurance policies is mandatory under the Prevention  of Money-laundering (Maintenance of Records) Second Amendment Rules,  2017.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issue is being discussed intensively, with the  Supreme  Court taking a decision in favour of linking Aadhaar biometrics and the  number with a host of services. Several petitions have been filed  challenging not just the linking of these services with Aadhaar but also  the validity of Aadhaar itself. We spoke to people who support and  those who oppose this linking, to understand how either case impacts  consumers.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;The benefits &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;According to the Unique  Identification Authority of India (UIDAI), government schemes are asking  for Aadhaar as it helps to clean out duplications and fakes, and  provides accurate data to enable implementation of direct benefit  programmes. “Use of Aadhaar reduces the cost of identifying persons and  provides increased transparency to the government in implementation of  its schemes,” the Authority states under frequently asked questions on  its website (read more at: &lt;a href="https://uidai.gov.in/your-aadhaar/help/faqs.html"&gt;https://uidai.gov.in/your-aadhaar/help/faqs.html) &lt;/a&gt;So,  when you link your bank account with your Aadhaar, government benefits  such as subsidy on LPG cylinders is credited directly to that  account. The FAQs, however, do not elaborate how such linking helps an  individual who does not get, or does not wish to get, such subsidies. In  a tweet, UIDAI had said that verifying a bank account using Aadhaar  adds an additional layer of security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nakul Saxena, a  former banker who now works on policy advocacy at the software think  tank iSpirt Foundation, said that linking of Aadhaar with these services  will help eradicate fake accounts, fake insurance policies and  unauthorised mobile connections. “It is possible that there are many  accounts in the system that have been opened using such documents and  copied signatures and even the banks may not be aware of it. Some people  may not even be aware that an account exists in their name. These  accounts need to be verified using Aadhaar now,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government claims to have removed millions of fake beneficiaries for government benefits by Aadhaar linking. As reported by &lt;i&gt;Mint&lt;/i&gt; in May 2017, over 23 million fake ration cards have been scrapped,  potentially saving the government Rs14,000 crore in food subsidy every  year. Another &lt;i&gt;Mint&lt;/i&gt; report in August says, three states discovered that about 2,72,000 fake students were availing the mid-day meal (MDM) scheme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However,  those who are against linking Aadhaar disagree with these arguments.  “Initially, Aadhaar was about delivery of services. But linking  everybody’s phone number and bank account is not about that anymore. The  real question is, what purpose this linking serves. If the intention is  to update the databases, then there can be other means to update  those,” said Rahul Narayan, a Supreme Court advocate who is among the  lawyers representing petitioners who have challenged Aadhaar linking in  court.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;The concerns &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The fundamental objection to  this linking of services is that all information on an individual will  be available at a single place, which could make surveillance easier and  also increase the risks if this information is hacked. “As of now, your  bank knows something about you, your insurance company knows something  and your mobile phone company knows something about you. Each of these  are different silos of information. When these converge, which is then  accessible to a single person, that person knows almost everything about  you,” said Narayan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, a user’s Aadhaar number  and fingerprint are permanent identifiers, and at least the Aadhaar  number has been compromised for over 130 million citizens, as per  a study by Centre for Internet &amp;amp; Society, said Nikhil Pahwa,  co-founder of the SaveTheInternet.in (&lt;a href="https://internetfreedom.in"&gt;https://internetfreedom.in) &lt;/a&gt;campaign  for net neutrality in India. “This leaves the users vulnerable to  social hacks, some of which we have already been reading about in the  news. To forcefully and mandatorily link Aadhaar to bank accounts means  that their finances are at risk,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saxena said the data  leaks that have been highlighted have been typically about demographic  details such as name, date of birth and address “which have been  commonly available so far.” However, given the heightened sensitivities  in this digital age, customers must ask their service providers to not  publish such details, nor provide this information freely, he added.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Grievance redressal and data privacy &lt;br /&gt;&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Another  major concern is the absence of a clear redressal mechanisms for  consumers in case of a data leak, misuse or hack. “When things go wrong,  consumers need to have access to a proper complaints mechanism. In the  case of Aadhaar, such access is to be provided through the establishment  of ‘contact centres’ under the Regulation 32 of the UIDAI Enrolment and  Update Regulations. To the best of our knowledge, not much beyond  Regulation 32 has yet been specified by the UIDAI,” said Renuka Sane,  associate professor at the National Institute of Public Finance and  Policy, who has worked on data privacy and security issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart  from this, Section 47 of the Aadhaar Act stipulates that only UIDAI or  its authorised officers can file a criminal complaint for violations of  the Act, she added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The UIDAI has been given complete discretion  in determining if and when to file a criminal complaint for violations  of the Act, and an individual aggrieved by actions of a third person is  left to rely upon the bonafide actions of the UIDAI,” Sane added. The  government is also working towards a data privacy legislation, that is  needed to give citizens protection against misuse of their data, and  them having some control over who gets their data, how it is used, and  where it can be shared. “However, a data privacy legislation and  mechanism will not ensure that data remains secure and protected, and  that processes are followed. The Act disallowing people from sharing  Aadhaar numbers did not prevent government departments from publishing  details online,” said Pahwa. He also said that systems can get hacked,  which could include the Aadhaar database, the parallel Aadhaar databases  with state governments, or eKYC databases held with banks and telecom  operators.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saxena said the UIDAI has clarified that biometric  information is not stored with user agencies, and stored biometrics  can't be used for Aadhaar authentication or eKYC. “Hence, customers can  be assured when using Aadhaar and biometrics with authorized entities,”  he said. “The data privacy law will address data privacy and protection  in all digital systems, not just Aadhaar. It will equally apply to  social media and mobile apps. It should also go into the aspect of  ‘right to be forgotten’,” said Saxena.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pahwa, however, insists  that the least that should be done is to give citizens the right to not  link their Aadhaar and use other IDs for authentication, plus the  ability to change their ID number if the system gets compromised.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;What you should do &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;For  now, the deadlines for linking bank accounts with Aadhaar is 31  December 2017, and for mobile phones it is 7 February 2018. In its  latest hearing on the matter, the Supreme Court has directed service  providers to mention these deadlines in their reminders. “Right now,  regardless of what they say, nobody is going to shut down your bank  account or disconnect your mobile connection, at least till the  deadline. There are several petitions being heard in the Supreme Court.  The matter is supposed to be taken up by the Supreme Court in the last  week of November. The final word from the court is yet to come and it is  quite possible that at least the deadlines gets extended,” said  Narayan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If you have already linked these services with Aadhaar,  you are in no trouble. But if you are having second thoughts, the  linking cannot be undone. If you are concerned about safety or other  aspects, you can wait to get more clarity from the Supreme Court.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns'&gt;https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-23T02:02:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/breach-notifications.pdf">
    <title>Breach Notifications</title>
    <link>https://cis-india.org/internet-governance/files/breach-notifications.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/breach-notifications.pdf'&gt;https://cis-india.org/internet-governance/files/breach-notifications.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-11-14T15:31:38Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/india-uk-legal-regulatory-approaches.pdf">
    <title>India UK Legal Regulatory Approaches</title>
    <link>https://cis-india.org/internet-governance/files/india-uk-legal-regulatory-approaches.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/india-uk-legal-regulatory-approaches.pdf'&gt;https://cis-india.org/internet-governance/files/india-uk-legal-regulatory-approaches.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-11-14T15:25:20Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/files/submission-to-trai-november-6-2017">
    <title>Submission to TRAI (November 6, 2017)</title>
    <link>https://cis-india.org/telecom/files/submission-to-trai-november-6-2017</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/files/submission-to-trai-november-6-2017'&gt;https://cis-india.org/telecom/files/submission-to-trai-november-6-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-11-08T01:08:37Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/october-2017-newsletter">
    <title>October 2017 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/october-2017-newsletter</link>
    <description>
        &lt;b&gt;October 2017 Newsletter&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;Dear readers,&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;CIS &lt;a class="external-link" href="https://cis-india.org/accessibility/blog/cis-comments-on-mobile-accessibility-guidelines"&gt;submitted its comments &lt;/a&gt;on mobile accessibility guidelines to the Ministry of Electronics &amp;amp; IT, Govt. of India. &lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;Between 1 to 16 September, an online discussion took place on the creation of social media guidelines and strategy for Telugu Wikimedia handles online. Manasa Rao &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/discussion-on-creation-of-social-media-guidelines-strategy-for-telugu-wikimedia"&gt;captured the developments in a blog post&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;Padma Venkataraman in a blog entry &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/cis2019-efforts-towards-greater-financial-disclosure-by-icann"&gt;chronologically mapped&lt;/a&gt; CIS’ efforts at enhancing financial transparency and accountability at ICANN, while providing an outline of what remains to be done.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;Shyam Ponappa's article on NPAs and structural issues was published in the &lt;a class="external-link" href="https://cis-india.org/telecom/blog/business-standard-shyam-ponappa-october-5-2017-npas-and-structural-issues"&gt;Business Standard&lt;/a&gt; on October 5, 2017.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;CIS in the News:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/daily-o-october-4-2017-attempted-data-breach-of-uidai-rbi-isro-and-flipkart"&gt;Attempted data breach of UIDAI, RBI, ISRO and Flipkart is worrisome&lt;/a&gt; (DailyO, October 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/the-hindu-saurya-sengupta-sex-drugs-and-the-dark-web"&gt;Sex, drugs and the dark web&lt;/a&gt; (Hindu; October 7, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/first-post-october-12-2017-ahead-of-data-protection-law-roll-out-experts-caution-that-it-shouldnt-limit-collection-and-use-of-data"&gt;Ahead of data protection law roll out, experts caution that it shouldn't limit collection and use of data&lt;/a&gt; (First Post; October 12, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-economics-and-business-models-of-iot"&gt;#NAMAprivacy: The economics and business models of IoT and other issues&lt;/a&gt; (Medianama; October 18, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-data-standards-for-iot"&gt;#NAMAprivacy: Data standards for IoT and home automation systems&lt;/a&gt; (Medianama; October 18, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/deccan-herald-furquan-moharkan-october-24-2017-majority-of-top-politicians-twitter-followers-fake"&gt;Majority of top politicians' Twitter followers fake: audit &lt;/a&gt;(Furquan Moharkan; Deccan Herald; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/accessibility/news/eastern-mirror-october-23-2017-awards-for-those-working-on-employment-opportunities-for-disabled"&gt;Awards for those working on employment opportunities for disabled&lt;/a&gt; (Eastern Mirror; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/new-indian-express-october-25-2017-nibbling-away-into-your-bank-account-salami-attackers-cart-away-a-fortune"&gt;Nibbling away into your bank account, salami attackers cart away a fortune&lt;/a&gt; (New Indian Express; October 25, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/accessibility/news/nirmita-narasimhan-wins-the-18th-ncpedp-mindtree-helen-keller-award-2017"&gt;Nirmita Narasimhan wins the 18th NCPEDP-Mindtree Helen Keller Award 2017!&lt;/a&gt; (National Centre for Promotion of Employment for Disabled People; October 31, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;Our Access to Knowledge programme currently consists of two projects. The Pervasive Technologies project, conducted under a grant from the International Development Research Centre (IDRC), aims to conduct research on the complex interplay between low-cost pervasive technologies and intellectual property, in order to encourage the proliferation and development of such technologies as a social good. The Wikipedia project, which is under a grant from the Wikimedia Foundation, is for the growth of Indic language communities and projects by designing community collaborations and partnerships that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;►&lt;/span&gt;Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/odia-wikisource-turns-3"&gt;Odia Wikisource Turns 3&lt;/a&gt; (Manasa Rao; October 22, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/wikimedia-workshop-at-ismailsaheb-mulla-law-college-satara"&gt;Wikimedia Workshop at Ismailsaheb Mulla Law College, Satara&lt;/a&gt; (Subodh Kulkarni; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/marathi-wikipedia-edit-a-thon-at-dalit-mahila-vikas-mandal-satara"&gt;Marathi Wikipedia Edit-a-thon at Dalit Mahila Vikas Mandal, Satara&lt;/a&gt; (Subodh Kulkarni; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/marathi-wikipedia-workshop-at-mgm-trusts-college-of-journalism-and-mass-communication-aurangabad"&gt;Marathi Wikipedia Workshop at MGM Trust's College of Journalism and Mass Communication, Aurangabad&lt;/a&gt; (Subodh Kulkarni; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/orientation-program-at-kannada-university-hampi"&gt;Orientation Program at Kannada University, Hampi&lt;/a&gt; (A. Gopalakrishna; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/marathi-wikipedia-workshop-at-solapur-university"&gt;Marathi Wikipedia Workshop at Solapur University&lt;/a&gt; (Subodh Kulkarni; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/discussion-on-creation-of-social-media-guidelines-strategy-for-telugu-wikimedia"&gt;Discussion on Creation of Social Media Guidelines &amp;amp; Strategy for Telugu Wikimedia&lt;/a&gt; (Manasa Rao; October 24, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;►Openness&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;Our work in the Openness programme focuses on open data, especially open government data, open access, open education resources, open knowledge in Indic languages, open media, and open technologies and standards - hardware and software. We approach openness as a cross-cutting principle for knowledge production and distribution, and not as a thing-in-itself.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;span style="text-align: justify; "&gt; &lt;/span&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;►&lt;/span&gt;Freedom of Expression&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/icann2019s-problems-with-accountability-and-the-web-controversy"&gt;ICANN’s Problems with Accountability and the .WEB Controversy&lt;/a&gt; (Padma Venkataraman; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/why-presumption-of-renewal-is-unsuitable-for-the-current-registry-market-structure"&gt;Why Presumption of Renewal is Unsuitable for the Current Registry Market Structure&lt;/a&gt; (Padma Venkataraman; October 29, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/cis2019-efforts-towards-greater-financial-disclosure-by-icann"&gt;CIS’ Efforts Towards Greater Financial Disclosure by ICANN&lt;/a&gt; (Padma Venkataraman; October 29, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;►&lt;/strong&gt;Cyber Security&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/cy-fy-2017"&gt;CyFy 2017&lt;/a&gt; (Organized by Observer Research Foundation; New Delhi; October 2 - 4, 2017).  Sunil Abraham was a speaker.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;p style="text-align: justify; "&gt;►Privacy&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Blog Entry&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/gdpr-and-india-a-comparative-analysis"&gt;GDPR and India: A Comparative Analysis&lt;/a&gt; (Aditi Chaturvedi; October 17, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/securing-the-digital-payments-ecosystem"&gt;Securing The Digital Payments Ecosystem&lt;/a&gt; (Organized by NITI Aayog; October 9, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;br /&gt;
&lt;div&gt;&lt;strong&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;►&lt;/strong&gt;Big Data&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Blog Entry&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/revisiting-per-se-vs-rule-of-reason-in-light-of-the-intel-conditional-rebate-case"&gt;Revisiting Per Se vs Rule of Reason in Light of the Intel Conditional Rebate Case&lt;/a&gt; (Shruthi Anand; October 4, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;&lt;strong&gt;Event Organized&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/events/emerging-issues-in-the-internet-of-things"&gt;Emerging Issues in the Internet of Things&lt;/a&gt; (CIS, Bengaluru; October 23, 2017). Andrew Rens gave a talk.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&lt;span style="text-align: justify; "&gt;&lt;strong&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/strong&gt;&lt;span style="text-align: justify; "&gt; &lt;/span&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;CIS is involved in promoting access and accessibility to telecommunications services and resources, and has provided inputs to ongoing policy discussions and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Article &lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/telecom/blog/business-standard-shyam-ponappa-october-5-2017-npas-and-structural-issues"&gt;NPAs &amp;amp; Structural Issues&lt;/a&gt; (Shyam Ponappa; Business Standard; October 4, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;&lt;span&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Articles&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;a class="external-link" href="http://cis-india.org/raw/indian-express-nishant-shah-october-9-digital-native-there-is-no-spoon-there-is-no-privacy"&gt;Digital Native: There is no spoon, There is no privacy&lt;/a&gt; (Nishant Shah; October 9, 2017).&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;a class="external-link" href="http://cis-india.org/raw/indian-express-nishant-shah-october-22-2017-digital-native-finger-on-the-buzzer"&gt;Digital Native: Finger on the buzzer&lt;/a&gt; (Nishant Shah; October 22, 2017).&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;-----------------------------------&lt;br /&gt;&lt;/span&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;br /&gt;&lt;/a&gt;&lt;span&gt;----------------------------------- &lt;/span&gt;&lt;/p&gt;
&lt;div class="keyResearch"&gt;
&lt;div id="parent-fieldname-text-8a5942eb6f4249c5b6113fdd372e636c"&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p&gt;The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with disabilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;p&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;► Support Us&lt;/p&gt;
&lt;div&gt;Please help us defend consumer and citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/div&gt;
&lt;p&gt;► Request for Collaboration&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, write to Tanveer Hasan, Programme Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div&gt;&lt;em&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects&lt;/em&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="viewlet-below-content-body"&gt;
&lt;div class="visualClear"&gt;&lt;/div&gt;
&lt;div class="documentActions"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/october-2017-newsletter'&gt;https://cis-india.org/about/newsletters/october-2017-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2018-01-10T00:53:03Z</dc:date>
   <dc:type>Page</dc:type>
   </item>




</rdf:RDF>
