<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 371 to 385.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/impassioned-objects-unraveling-the-history-of-fetish"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/platforms-power-and-politics-perspectives-from-domestic-and-care-work-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/platforms-power-and-politics-press-release-pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/platforms-power-and-politics-pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/platforming-precarity-data-narratives-workers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/substantive-areas/new-pedagogies/piracy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/news-nine-shweta-mohandas-and-anamika-kundu-personal-data-protection-bill-must-examine-data-collection-practices-that-emerged-during-pandemic"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/pegasus-snoopgate-an-opportune-moment-to-revisit-legal-framework-governing-state-surveillance-framework"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/peeping-toms-in-inbox"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/pdf-gendered-future-of-work"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/pdf-final-draft-gender-and-the-future-of-work"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/governance-now-april-12-2014-pratap-vikram-singh-parties-give-short-shrift-to-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/parichiti-domestic-workers-access-to-secure-livelihoods-west-bengal"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/factor-daily-sriram-sharma-december-12-2017-paranoid-about-state-surveillance-here-s-the-fd-guide-to-living-in-the-age-of-snoops"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/paper-thin-safeguards.pdf"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/impassioned-objects-unraveling-the-history-of-fetish">
    <title>Pleasure and Pornography: Impassioned Objects</title>
    <link>https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/impassioned-objects-unraveling-the-history-of-fetish</link>
    <description>
        &lt;b&gt;In this post, a third in the series documenting her CIS-RAW project, Pleasure and Pornography, Namita Malhotra explores the idea of fetish as examined by Anne McClintock (i) . This detour is an exploration of the notion of fetish, its histories and meanings, and how it might relate to the story of Indian porn. &lt;/b&gt;
        
&lt;p&gt;&lt;br /&gt;The etymology of fetish derives from the word fetico (Portuguese) which means sorcery or magic arts. In 1760, it was used to refer to primitive religions, especially in relation to the growing project of imperialism. In 1867, Marx coined the term commodity fetishism – using the implied meaning of primitive magic to express the central social form of modern industrial economy, whereby the social relation between people metamorphoses into the relation between things. It was only after this, in 1905, that Freud transferred the word, with all these meanings still clinging to it, to the realm of sexuality and perversions. As Anne McClintock points out, in her useful account and re-understanding of the fetish in the book &lt;em&gt;Imperial Leather&lt;/em&gt; (ii), psychoanalysis, philosophy, and Marxism all take shape around the invention of the primitive fetish, which conveniently displaces what the modern mind cannot accommodate onto the invented domain of the primitive. She states that the not-so-concealed rationale of imperialism is fetishism. Fetishists (racial, sexual and other) became a mode of warranting and justifying conquest and control -- whether it was the policing of sexual fetishism for control of classes in Europe and colonies, or the invention of racial fetishism central to the regime of imposing sexual surveillance in the colonies.&lt;strong&gt; The imperial discourse on fetishism became a discipline of containment&lt;/strong&gt; (iii) .&lt;/p&gt;
&lt;p&gt;On the other hand in the realm of sexuality, fetish becomes a question of male sexuality alone -- male perversion par excellence. There are no female fetishists, either for Freud or Lacan, for to speak of female fetishism would involve displacing the basic precepts of psychoanalysis -- namely the scene of castration leading to phallic fetishism. However, McClintock points to the usefulness of studying female fetishism, as it allows for certain things to happen. First, it dislodges the centrality of the phallus in this discourse, which surprisingly makes way for the presence and legitimacy of a multiplicity of pleasures, needs, and contradictions that can’t be resolved or reduced merely to the desire to preserve the phallus. Very often, feminists such as McClintock read the Lacanian insistence on the centrality of the phallus as itself a fetishistic nostalgia for a single, male myth of origins and fetishistic disavowal of difference. Such a notion of fetish, embedded in phallic theory, gets easily reduced to sexual difference and does not allow/admit race or class as crucially formative categories as well; thus, race and class remain continuously of secondary status in the primarily sexually signifying chain.&lt;/p&gt;
&lt;p&gt;“The racist fetishizing of white skin, black fetishizing gold chains, the fetishizing of black dominatraces, lesbians, cross dressing as men the fetishizing of national flags, slave fetishism, class cross-dressing, fetishes such as nipple clips and bras in male transvestism, leather bondage, PVC fetishism, babyism and so on -- these myriad different deployments of fetishistic ambiguity cannot be categorized under a single mark of desire, without great loss of theoretical subtlety and historical complexity.” Also McClintock points to racist, nationalistic and patriotic fetishes -- such as flags, crowns, maps, swastikas (or for instance chaddis) -- that can’t be simply rendered equivalent to the disavowal of male castration anxiety. &lt;br /&gt;&lt;br /&gt;McClintock calls for a renewed investigation of fetishism -- to open it up to a more complex and valuable history in which racial and class hierarchies would play as formative a role as sexuality. Rejecting the Lacanian and Freudian fixation on the phallus as central to psychoanalysis would call for a mutually transforming investigation into the disavowed relations of psychoanalysis and social history. In a way, it would be the bringing together of the varied ways in which fetish has been used -- by Freud (in the domain of psychoanalysis) in the realm of domesticity and the private, and by Marx (in the domain of male socio-economic history) in the realm of the market and possibly in the public. If these meanings were to speak to each other, what we discover is that fetish is in fact the historical enactment of ambiguity itself.&lt;/p&gt;
&lt;p&gt;Fetishism involves the displacement onto an object of contradictions that the individual cannot resolve at a personal level. These contradictions could indeed be social, though lived with profound intensity in the imagination and flesh of the person. The fetish -- rather than being a merely an insignificant sexual or personal practice -- inhabits both personal and historical memory. It marks a crisis in social meaning -- the embodiment of an impossible resolution. This crisis/contradiction is displaced onto and embodied in the fetish object, which is thus destined to recur in compulsive ways. By displacing this power onto the fetish, then manipulating or controlling the fetish, the individual gains symbolic control over what might otherwise be terrifying ambiguities.&lt;/p&gt;
&lt;p&gt;The fetish then can be called an impassioned object; something that emerges from a variety of social contradictions, rather than merely from the scene of castration or phallic centric domains. Hence they are neither universal, nor are they entirely about personal histories alone, but are about personal and historical memory or a social contradiction that is experienced at an intensely personal level. “As composite symbolic objects, fetishes thus embody the traumatic coincidence not only of individual but also of historical memories held in contradiction” (McClintock). This reading of fetishism gives rise to far richer possibilities of cultural analysis.&lt;/p&gt;
&lt;p&gt;Fetish was neither proper to African or Christian European culture, but sprang into being from an abrupt encounter between two heterogeneous worlds during an era of mercantile capitalism and slavery. At this point it clearly embodies the problem of contradictory social value -- whether it is gold as valuable, or gold as warding off bad luck. Though initially just about heathen customs and rituals, it later also becomes a marking of certain groups of people for conquest. It is from this context that Freud transports the word, laden with meanings of conquest and violence, to the realm of sexuality. Obviously these meanings stain future connotations of fetish, the word fetish itself becoming prey to contradictory meanings of race and sex and difference.&lt;/p&gt;
&lt;p&gt;For Freud, the fetish is the embodiment in one object of two positions -- castration and its denial. Though this does capture some sense of the ambiguity that McClintock also refers to, here the meanings oscillate between two, and only two, fixed options (a recurring male economy). The fetish becomes both a permanent memorial to the horror of castration, embodied not in the male but in the female -- as well as a token of triumph, and safeguard against the threat of castration. This has, of course, been critiqued by feminists quite severely. McClintock’s basic argument is that it is indeed hard, considering the varied nature of fetish objects, to find a single originary explanation in the psychic development of the individual -- in a single originary trauma. What is important here, however is to take on this notion of the fetish as an historical enactment of ambiguity itself, and see if as a theoretical concept it has any value to the study of the loose category of Indian porn, especially MMS porn. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Soap in these strange days: fetish objects&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;em&gt;“Such spectacle creates the promise of a rich sight: not the sight of particular fetishized objects, but sight itself as richness, as the grounds for extensive experience.”&lt;br /&gt;Dana Polan (iv)&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;Anne McClintock’s work on fetish also looks at the seemingly ubiquitous object of soap as the carrier of many ambiguous meanings around gender, class, imperialism -- both the cult of domesticity (the running of the empire of home with servants, sweepers, cleaners, women, maids etc.) and the cult of new imperialism found in soap in its exemplary mediating form. The story of soap, for McClintock, reveals that fetishism rather than a quintessentially African propensity (belonging in the realm of lands and peoples that were being discovered through imperialism) was in fact central to industrial modernity; fetishism was not original either to industrial capitalism or precolonial economies, but was from the outset the embodiment and record of an incongruous and violent encounter (between two or more heterogenous cultures) and about rapid changes of modernity, rather than about the ‘primitive’. &lt;br /&gt;&lt;br /&gt;Marx says that the mystique of the commodity fetish lies not in its use value, but in its exchange value and its potency as a sign: “So far as (a commodity) is a value in use, there is nothing mysterious about it”. This could be linked to the idea of a mobile phone that is supposed to achieve so much beyond mere communication, at least according to the advertising -- they should mend ruptured relations and homes, get all the hot chicks, grow beautiful gardens, change the boring routine of life. For some time, the Samsung mobile phone ad with Estella Warren played in India, which probably moves the mobile phone with camera out of merely its symbolic use as enhancing attractiveness, to actually ‘getting’ or rather capturing girls by clicking. Magically in the ad, the act of clicking photographs make the girl not just willing, but she also takes the phone and photographs herself. Barring one scary moment when it looks like she might turn into an avenging warrior like Xena or The Bride, but instead she simpers into a loving sexy pose, she is willing. The ad can’t be easily dismissed as misogynistic, but it does give an intriguing glimpse of the intimate pictures and moments that can be captured with a mobile phone. &lt;br /&gt;&lt;br /&gt;That a mobile phone is fetishized as a commodity is probably evident, from the rush to get the more enhanced phone with the better camera and features, though mobile phones are also a ubiquitous element of one’s life, in some ways exactly like soap. Probably in a country like India, having a mobile phone can be read as opening up sexual possibilities in a way that wouldn’t be obvious in a more developed country. If the fetish is a social contradiction that is experienced at an intensely personal level, then the mobile phone, especially after the DPS MMS clip, is precariously located between the zones of the private and personal, and that which is entirely in the public domain beyond any control of the person(s). This ability of the mobile phone to occupy simultaneous universes because of its interconnectedness in a network, and that it is (for most people now) an entirely personal object with messages, numbers, conversations, images, videos, is what makes it unpredictable. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Looking at MMS porn&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;“Memories were meant to fade. They were built that way for a reason”&lt;br /&gt;Mace, Strange Days&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;When looking at MMS porn, I’m irresistibly reminded of the movie &lt;em&gt;Strange Days&lt;/em&gt;, in which Angela Basset’s character Mace expresses her frustration with Lenny (played by Ralph Fiennes). Lenny is obsessed with preserving memory and accessing other people’s experiences, through what in the movie are called playbacks. Playbacks are recordings of events in the brain that were fed back into brain waves to reproduce the earlier event -- the feelings, the sensations of touch, the smells and not just the visual. Playbacks haven’t been invented yet, but the obsessiveness with which Lenny wheels and deals (he’s also a dealer and collector of playbacks) gives a peculiar insight into how mobile phones are becoming fetish objects of sorts -- particularly MMSs recorded on mobile phones where other people are able to occupy the space of an unknown character that conveniently rarely ever appears on the screen. The famous pornographic ones are the DPS MMS clip and other MMS scandals, including the hidden voyeuristic ones taken without permission, and a precursor of this is Mysore Mallige where the man appears rarely on the screen and only at the end, almost like a signature. In a peculiar way MMS porn becomes like playback from Strange Days, a movie that is attempting to unravel the unknown future mired in technological changes that are messily intertwined with human desire and frailty. A future (set on the date of turning the millennium) that we’ve hopelessly gone past without even asking many of the questions that the characters in the movie pose.&lt;br /&gt;&lt;br /&gt;Indian websites advertise MMS scandals as a specific category of pornography. This category also includes genuine MMS clips of celebrities kissing (Kareena Kapoor), wardrobe malfunctions from Fashion Week, and also fake ones with celebrity look-alikes bathing, changing, having sex (Preity Zinta, Mallika Sherawat). Mostly what is being talked about are videos made on mobile phones by men, who record themselves having sex with ‘gullible’ women. The alleged gullibility of these women is probably essential to the erotic charge of such videos. They are shaky videos, especially when sex is underway, and have a grainy quality that makes them eerily real. Their perspective is usually that of the man who is holding the phone camera and rarely enters the frame himself, whereas the woman is definitely the desirable object that is being captured. Maybe this phenomenon can be understood better if one looks at McClintock’s idea of fetish and whether MMS/images on mobile phones can be located within that category -- whether the ambiguous nature of the video or image recorded on the mobile phone and its ability to be an intensely personal and private object and also to be so easily transmitted into networks signifies a crisis in social meanings around private and public. The mobile phone then merely becomes an object onto which this anxiety is displaced, and the recording of images repeatedly (and anxieties and fears triggered when they accidentally slip into the public domain) are ways of trying to control terrifying ambiguities over the private and the public (where aspects of sexuality, family and selfhood could be calamitously disrupted by a slip between the two categories). (v)&lt;br /&gt;&lt;br /&gt;In a strange way this is a parable for a larger phenomenon of pornographic circulation and the law, as well. The mass circulation of pornography is perceived as a private secret that is kept by all, and whenever there is slip between the two categories, the law and public discourse are barely able to deal with the furore of anxieties. And if not, then the law and public discourse proceed to deal with the banal unbuttoning of Akshay Kumar’s jeans by his wife as obscenity in courtrooms, as if we hadn’t all imagined an MMS that allowed us to be doing the same. &lt;br /&gt;&lt;br /&gt;&amp;nbsp;i. Anne Mcclintok’s work on sadomasochism illuminates some of the arguments that I make in relation to sexual subjectivity and the state’s interests and desires in policing it.&amp;nbsp; (unpublished article for book on queer issues and the law). Her work borrows from notions developed by Foucault. “Sadomasochism plays social power backwards, visibly and outrageously staging hierarchy, difference and power, the irrational, ecstasy or alienation of the body, placing these ideas at the centre of western reason.” The analysis of sexual subjectivity and State’s interest in it also looks at the judgment on sadomasochism by the House of Lords, England that declares such activities that cause severe injuries and maim the body, as illegal, regardless of consent of parties. &lt;br /&gt;ii. Anne Mcclintok, Imperial Leather: Race, gender and sexuality in the colonial contest, Routledge, 1995.&lt;br /&gt;iii. Ibid&lt;br /&gt;iv. Cited from Laura Mulvey, Some Thoughts on Theories of Fetishism in the Context of Contemporary Culture, October, Vol. 65 (Summer, 1993), pp. 3-20.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;v. As in the story of Chanda in Dev.d loosely inspired from the DPS MMS clip incident&lt;br /&gt;&lt;img src="https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/uploads/kalkichanda.jpg/image_preview" alt="Chanda from Dev.d" class="image-inline image-inline" title="Chanda from Dev.d" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/impassioned-objects-unraveling-the-history-of-fetish'&gt;https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/impassioned-objects-unraveling-the-history-of-fetish&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>namita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>histories of internet in India</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>internet and society</dc:subject>
    
    
        <dc:subject>Obscenity</dc:subject>
    
    
        <dc:subject>women and internet</dc:subject>
    
    
        <dc:subject>YouTube</dc:subject>
    
    
        <dc:subject>Cyborgs</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Digital subjectivities</dc:subject>
    

   <dc:date>2011-08-02T08:35:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/platforms-power-and-politics-perspectives-from-domestic-and-care-work-in-india">
    <title>Platforms, Power, and Politics: Perspectives from Domestic and Care Work in India</title>
    <link>https://cis-india.org/raw/platforms-power-and-politics-perspectives-from-domestic-and-care-work-in-india</link>
    <description>
        &lt;b&gt;CIS has been undertaking a two-year project studying the entry of digital platforms in the domestic and care work in India, supported by the Association for Progressive Communications as part of the Feminist Internet Research Network. Implemented through 2019-21, the objective of the project is to use a feminist lens to critique platform modalities and orient platformisation dynamics in radically different, worker-first ways. Ambika Tandon and Aayush Rathi led the research team at CIS. The Domestic Workers’ Rights Union is a partner in the implementation of the project, as co-researchers. Geeta Menon, head of DWRU, was an advisor on the project, and the research team consisted of Parijatha G.P., Radha Keerthana, Zeenathunnisa, and Sumathi, who are office holders in the union and are responsible for organising workers and addressing their concerns.
&lt;/b&gt;
        &lt;p&gt;&lt;span&gt;The Executive Summary for the project report is below.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The full report, ‘Platforms, power, and politics: Perspectives from domestic and care work in India’, can be found &lt;a href="https://cis-india.org/raw/platforms-power-and-politics-pdf" class="external-link"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The press release can be found &lt;a href="https://cis-india.org/raw/platforms-power-and-politics-press-release-pdf" class="external-link"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;span&gt;Introduction&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Paid domestic and care work is witnessing the entry of digital intermediaries over the past decade. More recently, there has been tremendous growth of digital platforms. This holds the potential to impact millions of workers in the sector, which is characterised by a long history of informality and exclusion from rights-according legal frameworks. Digital intermediation of domestic and care work has been a space of high-growth, but also high-attrition. In India, order books of digital platforms providing domestic and care work services were reported to have been growing by upto 60 percent month-on-month in 2016. This is expected to shift the organisation of workers and employment relations profoundly. &lt;br /&gt;&lt;br /&gt;Broadly, the discourse on digital platforms providing home-based services can be summarised as follows: proponents argue that digitisation will act as a step towards bringing formalisation to the sector, while critics argue that platforms could replicate the exploitation of workers by further disguising the employer-employee relationship. Similar debates around lack of protections and precarity have also taken place in other occupations in gig work such as transportation and food delivery. In fact, the similarity in precarity and the informal nature of this relationship across gig work and domestic work has led to domestic workers being labelled the original gig workers. Domestic work is a particularly vulnerable and unprotected sector, which makes work in the sector qualitatively different from most other sectors in the gig or sharing economy.&lt;br /&gt;&lt;br /&gt;Through a feminist approach to digital labour, our project aimed to examine the dynamics of platformisation in, and of domestic or reproductive care work. Our hypothesis was that platforms are reconfiguring labour conditions, which could empower and/or exploit workers in ways qualitatively different from non-standard work off the platform. In order to interrogate this further, we studied several aspects of the work relationship, including wages, conditions of work, social security, skill levels, and worker surveillance off platforms.&lt;/p&gt;
&lt;h3&gt;Methodology&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We borrowed from ethnographic methods and feminist principles to co-design and implement the research tools with grassroots workers and organisers. Between June to November 2019, we conducted 65 in-depth semi-structured interviews primarily in New Delhi and Bengaluru. A majority of these were with domestic workers who were seeking or had found work through platforms. We also did interviews with workers who had found work through traditional placement agencies to compare our findings, and with representatives from platforms, government labour departments, and workers collectives. Of the workers we interviewed, a majority were women, but men were included as well. Interviews in New Delhi were undertaken by CIS, while interviews with workers in Bengaluru were undertaken by grassroots activists in Bengaluru, affiliated with the Domestic Workers Rights Union (DWRU).&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;In implementing the data collection approach, we employed feminist methodological principles of intersectionality, self-reflexivity, and participation. The methodology draws on standpoint theory, which encourages knowledge production that centres the lived experiences of marginalised groups. We were acutely aware of our own positionality as high income, Savarna researchers studying a sector dominated by Dalit, Bahujan and Adivasi women from low income groups. This power differential was softened partially by involving DWRU through the course of the project. Workers across both field sites were also interviewed in spaces familiar to them, most often their homes, in languages that they were comfortable with including Hindi, Kannada, and Tamil.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Feminist principles also instrumental during the data analysis, with focus on intersectionality and self-reflexivity. We highlighted the ways in which inequalities of gender, income, migration status, caste, and religion are replicated and amplified in the platform economy. In particular, we discussed the impact of the digital gender gap in access and skills on workers’ ability to find economic opportunities.&lt;/p&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;Findings&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Our typology of platforms mediating domestic work finds three types of platforms – (i) marketplace, or platforms that list workers’ data on their profile, provide certain filters for automated selection of a pool of workers, and charge a fee from customers for access to workers’ contact details, (ii) digital placement agency, or platforms that provide an end-to-end placement service to customers, identify appropriate workers on the basis of selection criteria, and negotiate conditions of work on behalf of workers, and (iii) on-demand platforms, or companies that provide services or ‘gigs’ such as cleaning on an hourly basis, performed by a roster of workers who are characterised as ‘independent contractors’.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;When it comes to the role played by platforms in determining employment relations, there is a wide variation within and across platform categories. There are both weak and strong models of intervention. On one end of the spectrum are marketplaces, with minimal intervention in the recruitment process, and on the other on-demand platforms, that exact control over each aspect of work. Digital platforms reconfigure the conception of intermediaries in the domestic work sector, functioning as next-generation placement agencies. All three platform types contain aspects that provide workers agency, as well as those that reinforce their positions of low-power. Platform design impacts the role platforms play in setting conditions of work, but does not determine it entirely.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;(Re)shaping the terms of work&lt;/strong&gt;&lt;br /&gt;Across the three types of platforms, wages are slightly higher than or matching those of workers off platforms. Some marketplace platforms have incorporated features to nudge customers towards setting higher wages, such as enforcing minimum wage standards, or informing customers of expected wages in their locality. Conversely, on-demand platforms charge a high rate of commission from workers, despite refusing to recognise them as employees. This indicates that this is a misclassification of an employment relationship, given that workers are unable to set their own conditions or wages for work. Despite the high rates of commission and appropriation of labour by platforms, on-demand workers earn higher wages than workers on other platforms. The relatively high wage is a result of marketing on-demand cleaning as professionalised and more skilled than day-to-day cleaning. Tasks in the sector continue to be distributed along the lines of gender and caste, as has historically been the case. Dalit, Bahujan and Adivasi women are more likely to take up work such as cleaning and washing dishes, while men and women across castes are equally distributed in cooking work. Women dominate tasks such as elderly and childcare, as in the traditional economy. Workers in professionalised tasks such as deep cleaning that requires technical equipment and chemicals are almost entirely men.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Digital divides and workers’ agency&lt;/strong&gt;&lt;br /&gt;We find that workers are primarily onboarded onto platforms by learning about it from other workers, through onboarding camps held by platforms, or offline advertising by platforms. Such in-person onboarding techniques allows workers with no digital access or literacy to register themselves on marketplace platforms and digital placement agencies.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;However, we find that low levels of education and digital literacy continue to impact platformed labour by creating a strong informational asymmetry between workers and platforms. For instance, we find that women workers from low income communities have very little information about how platforms work, causing deep distrust. Workers with digital devices and literacy (and therefore a relatively better understanding of the functionality of the platform), physical mobility and the resources to bear indirect costs that were outsourced to them were at a significant advantage in finding better-paying jobs. Workers who were seeking flexibility and were not necessarily dependent on the platform for their primary income were also better placed than those entirely dependent on platforms. Women workers tended to be disadvantaged on all these counts, limiting their agency and capacity to reap the benefits of the platform economy.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Across the three types of platforms, systems of placement and ratings add to the information asymmetry, as workers are not aware of the impact of ratings on their ability to find work or charge better wages. Ratings and filtering systems also hard-code the impact of workers’ social characteristics on their work. Workers are unable to exercise control over their data, further undermining their agency vis-a-vis platforms and employers. We identify a clear need for collective bargaining structures to protect workers’ rights, although platformed domestic workers remained distant from both domestic work unions and emergent unions of platform workers in other sectors.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Intersectionalities of formalisation&lt;/strong&gt;&lt;br /&gt;We find that inequalities of caste, class, and gender that have historically shaped the sector continue to be replicated or even amplified in the platform economy. What remains clear is that platforms in the domestic work sector adopt the logics of this sector, more than the converse. Platformisation is conflated with formalisation, and it is within this vector, from complete informality to piecemeal formalisation, that platforms operate. Labour benefits do not take the form of labour protections or welfare entitlements that are the central function of formalisation processes. Instead, the so-called benefits are intended to transform domestic workers to participate within the logics and vagaries of the market.&lt;/p&gt;
&lt;h3&gt;Policy Recommendations&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Recognise and implement labour protections for domestic workers &lt;/strong&gt;&lt;br /&gt;Domestic workers have historically occupied the most vulnerable positions in the workforce, with limited legal protections. Exposed to the regulatory grey areas that platforms operate in, this doubly exposes domestic workers to precarious conditions of work. Despite an avowed move towards formalisation of domestic work, platform-mediated labour continues to retain characteristics of informal labour, even heightening some.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;If pushed to do so, platform companies can be instrumental in resolving some of the implementation challenges that governments have faced in enforcing legislative protections sought to be made available to domestic workers. Platforms have databases of workers, which can be used to mandatorily register them for social security schemes offered by the government. This data can also be used for better policy making, in the absence of reliable statistics particularly on migrant workers in the informal economy.&lt;em&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Reduce the protective gap between employment and self-employment &lt;/strong&gt;&lt;br /&gt;The (mis)classification of “gig” work within labour law frameworks is still a matter that continues to be hotly debated within policy practitioners, legal scholarship, and civil society actors. Three positions, in particular, have been taken—treating gig workers as employees, independent contractors, or occupying a third intermediate category. More recently, there have been some legal victories guaranteeing employment protections and increasing platform companies’ accountability. However, these successes have been more visible in Global North jurisdictions.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Regardless of the resolution of these ongoing debates over employment status, labour frameworks should provide some universal protections to all categories of labour. Such protections must include universal coverage of social security, in addition to rights such as freedom of association, collective bargaining, equal remuneration and anti-discrimination. Policies geared towards achieving this objective would be significant in reducing the protective gaps between different categories of labour, and would particularly help historical and emerging occupational categories of workers such as “gig” workers and domestic workers.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Recognise the specific challenge(s) and potential of platformisation of domestic work &lt;/strong&gt;&lt;br /&gt;Platforms hold the potential of acting as effective facilitators in informal labour markets. Even when they do not replace existing recruitment pathways, they provide alternate ones. Workers were more likely to register on a platform if they were entering the domestic work labour market recently (often distress and migration driven), or had not enjoyed success with informal, word-of-mouth networks. However, platforms also heighten labour market insecurities, and create new ones. These potential risks need to be specifically recognised through appropriate frameworks, such as social security, discrimination law and data protection.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Tailor policy-making to platform models &lt;/strong&gt;&lt;br /&gt;We identify three types of platforms, each of which intervene to varying degrees in the work relationship. We recommend that digital placement agencies and marketplace platforms be registered with governments and enforce basic protections for workers such as provision of minimum wage, preventing abuse (including non-payment of wages) and trafficking. On-demand companies on the other hand, must be treated as employers, and workers be accorded employment protections including social security.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;In addition to rights-based policy actions, legal-regulatory mechanisms geared towards mitigating the precariousness of platform-based work are required. This can take the shape of clarifying and expanding existing legal-regulatory formulations, or preparing new ones. Such policy making should factor in the power and information asymmetry between domestic workers (and gig workers, generally) and platforms.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Further, in the absence of health or retirement benefits, risks and indirect costs of operations are shifted from employers to workers. For instance, workers provide capital in the form of tools or equipment, support the fluctuation of business and income, and can be ‘deactivated’ from an application as a result of poor ratings or periods of inactivity. Any regulation aiming to extend employee status should mandate platforms to support such indirect costs.&lt;/p&gt;
&lt;h3&gt;Related Publications&lt;/h3&gt;
&lt;p&gt;1. &lt;a class="external-link" href="https://www.genderit.org/articles/digital-mediation-of-reproductive-and-care-work"&gt;Research notes&lt;/a&gt; with reflections from union members. &lt;br /&gt;2. The &lt;a class="external-link" href="https://cis-india.org/raw/platformisation-of-domestic-work-in-india-report-from-a-multistakeholder-consultation"&gt;event report&lt;/a&gt; from a stakeholder consultation with workers, unions, companies and government representatives. &lt;br /&gt;3. A &lt;a class="external-link" href="https://www.genderit.org/articles/doing-standpoint-theory"&gt;reflection note&lt;/a&gt; on the participatory approach taken by the project. &lt;br /&gt;4. A &lt;a class="external-link" href="https://library.fes.de/pdf-files/bueros/singapur/17840.pdf"&gt;paper&lt;/a&gt; with a comparative analysis of the policy landscape on domestic work in the platform economy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/platforms-power-and-politics-perspectives-from-domestic-and-care-work-in-india'&gt;https://cis-india.org/raw/platforms-power-and-politics-perspectives-from-domestic-and-care-work-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi, and Ambika Tandon</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Platform-Work</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>RAW Research</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Digital Domestic Work</dc:subject>
    

   <dc:date>2021-07-07T15:19:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/platforms-power-and-politics-press-release-pdf">
    <title>Platforms, Power, and Politics Press Release pdf</title>
    <link>https://cis-india.org/raw/platforms-power-and-politics-press-release-pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/platforms-power-and-politics-press-release-pdf'&gt;https://cis-india.org/raw/platforms-power-and-politics-press-release-pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2021-06-29T13:06:22Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/platforms-power-and-politics-pdf">
    <title>Platforms, Power, and Politics pdf</title>
    <link>https://cis-india.org/raw/platforms-power-and-politics-pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/platforms-power-and-politics-pdf'&gt;https://cis-india.org/raw/platforms-power-and-politics-pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2021-07-07T15:15:20Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/platforming-precarity-data-narratives-workers">
    <title>Platforming precarity: Data narratives of workers sustaining urban platform services</title>
    <link>https://cis-india.org/raw/platforming-precarity-data-narratives-workers</link>
    <description>
        &lt;b&gt;CIS conducted quantitative surveys with over 800 workers employed in the app-based taxi and delivery sectors across 4 cities in India as part of the ‘Labour Futures’ project supported by the Internet Society Foundation. The surveys covered key employment indicators, including earnings and working hours, work-related cost burdens, income and social security, and platform policies and management. Findings from these surveys are presented as data visualisation briefs centring workers’ everyday experiences. These data briefs form a foundational evidence base for policy and action around labour rights, social protection, and urban inclusion in platform work.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;It has  been over a decade since app-based delivery and taxi sectors began  operations in India, and have since expanded to several metropolitan and  smaller cities. These sectors together account for the largest  proportion of the platform workforce in India. Workers’ organising and  collective action have long revealed extractive labour practices in the  platform economy. Their demands call for the recognition of their labour  rights by policymakers and platforms, an end to exploitative working  conditions, and the introduction of effective policy that protects their  rights and wellbeing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  2021-22, the labour research vertical at the Centre for Internet and  Society conducted quantitative surveys with over 800 workers in the  app-based taxi services and app-based delivery services sectors.  Spanning four cities (Delhi-NCR, Mumbai, Guwahati, Lucknow), the surveys  gathered comprehensive data on the conditions of work in the platform  economy in these cities, within its two dominant sectors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  survey covered key labour indicators—(i) the conditions of work for  workers, including recruitment, wages, incentive structures, and  work-related cost burdens (ii) workforce management, including hours  spent working for the platform, surveillance and control measures, and  (iii) workers’ coverage under income security, social security and  social protections, including provident funds, health and accident  insurance, and pensions.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;&lt;a class="external-link" href="https://cis-india.org/raw/delhi-ncr-platforming-precarity"&gt;Read the Delhi-NCR data brief here&lt;/a&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/raw/mumbai-platforming-precarity"&gt;Read the Mumbai data brief here&lt;/a&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a class="external-link" href="https://cis-india.org/raw/guwahati-platforming-precarity"&gt;Read the Guwahati data brief here&lt;/a&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/raw/lucknow-platforming-precarity"&gt;Read the Lucknow data brief here&lt;/a&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/raw/methodology-note-platforming-precarity"&gt;Read the research methodology note here&lt;/a&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a class="external-link" href="https://cis-india.org/raw/platforming-precarity-press-note"&gt;The press note can be found here&lt;/a&gt;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Key Findings&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The  generation of city-level data aimed to support policymaking and advocacy  towards achieving just outcomes for workers in the rapidly  platformising Indian economy. These survey findings speak to i) top-down  approaches of regulatory, legislative, and judicial action through  evidence-building, and ii) bottom-up approaches of mobilisation and  advocacy campaigns of workers’ collectives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  city-wise data briefs highlight region-specific differences and  similarities shaped by histories and newer developments of labour  platforms operating in the urban economy. Across the four survey cities,  the data briefs reveal the ways in which precarity materialised in  platform work. Workers grappled with numerous socioeconomic  vulnerabilities that influenced their entry and continued employment in  platform work. They faced low-wage outcomes, worsened by a reduction in  bonuses, and high operational work-related expenses. Earnings remained  low and uncertain despite workers putting in immensely long hours  working for platforms. Worsening these burdens was widespread income  insecurity that workers faced in both app-based taxi and delivery  sectors.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Mapping delivery and taxi platform services across cities&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The  taxi services sector in all cities was dominated by two large  platforms—Uber and Ola Cabs. These platforms had established a highly  concentrated labour market for taxi workers. The exception to this was  the taxi platform labour market in Guwahati, where the local platform,  PeIndia, employed 35% of taxi workers in the city. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The  delivery services sector in all cities had a high concentration of  pan-India platforms. Food delivery services were concentrated by Swiggy  and Zomato across cities. E-commerce delivery services had a diversity  of platforms including Amazon, Flipkart, E-kart Logistics, and  Shadowfax, as well as grocery delivery services like Big Basket, Dunzo,  and Jio Mart.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Economic necessity and a lack of alternative employment pushing workers into precarious platform work&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The  pathway to precarious platform work was distress-driven, borne out of  low wages in previous salaried work, or a lack of alternative  employment. A large proportion of workers were previously engaged in  salaried employment, who then shifted to platform work, marking  increased informality and precarity in their employment status. In  Mumbai, over 64% of workers were in salaried employment previously, and  this also the case for over 50% of workers in Guwahati, and over 42% of  workers in Delhi-NCR. In Lucknow and Delhi-NCR, pandemic-driven  unemployment was a key driver for a staggering proportion of workers who  joined platform work as a distress employment source. Over 30% of  workers in Lucknow and Delhi-NCR were previously unemployed.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;These  socioeconomic vulnerabilities influenced workers entry and continued  employment in platform work. Key factors for workers entering were the  lack of alternative employment sources and the hope for better pay and  potential job flexibility. The lack of alternative jobs was a major push  into platform work for workers in Delhi-NCR and Lucknow—over 60% of  workers in Delhi-NCR and over 50% of workers in Lucknow. At least 40% of  workers across cities mentioned the expectation of better pay as a  major reason to start platform work, while potential job flexibility was  also a key reason for workers in Mumbai and Guwahati. However, as the  findings below show, workers’ expectations were unmet. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Externalised joining, statutory, and operational costs&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;High  joining, statutory, and operational costs were offloaded onto workers to  access and continue platform work. This was especially the case for  taxi workers who owned their vehicles, and had to incur vehicle  investment costs and downpayment, as well as statutory costs that  included operating permits, road tax, vehicle insurance, and fitness  fee. Across all cities, average monthly expenses for taxi workers were  above INR 30,000. For delivery workers, average monthly expenses mostly  comprised fuel costs, and were around INR 5,500 in Guwahati and Lucknow,  and around INR 6,700 in Delhi-NCR and Mumbai. These high externalised  costs reveal the economic vulnerabilities inherent within platform work. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Compounding  these costs, platforms in the taxi services sectors also charged  commissions unevenly and in varying fee structures—ranging from 20% to  30% of the fare in Mumbai and Lucknow, and going as high as 35% in  Delhi-NCR and Guwahati. It is important to note that high commissions  persist despite the mandate under the Motor Vehicle Aggregator  Guidelines, 2020 to cap commissions and other platform charges at 20% of  the fare.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Platforms’  offloading of costs to workers have resulted in workers’ having to rely  on informal leasing, debt, and subcontracting arrangements. These  arrangements were seen across all cities, where workers in the city were  either renting the vehicle they were driving, paying a commission to a  vehicle owner, paying off vehicle EMIs on someone else’s behalf, or were  paid a fixed salary by a vehicle owner. Notably, in Lucknow, around 35%  of taxi workers were engaged under these informal arrangements. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Insufficient incomes and economic vulnerabilities&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Workers'  experiences, across cities, highlight how a majority contended with  low-wage outcomes. Earnings remained low and uncertain for workers  despite the fact that they were putting in long work hours. Several  factors contributed to this insufficiency and uncertainty in workers’  earnings: stringent platform requirements around high acceptance rates  and ratings, which were important determinants, decreased flexibility,  and high offloaded work-related expenses.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Across  cities, earnings for delivery workers were considerably lower than  those for taxi workers. When earnings were adjusted for standard weekly  work hours (48 hours/week), over 50% of delivery workers in Mumbai,  Guwahati, and Lucknow were earning less than the corresponding  state-wise minimum wages. Further, over 75% of delivery workers in these  cities were earning below estimated state-wise living wages. Platform  work was also insufficient in meeting essential living needs for taxi  workers in Mumbai, Guwahati, and Lucknow. Around 30% of taxi workers  (23% in Guwahati) were earning less than minimum wages, and around 50%  (80% in Mumbai) were earning less than estimated living wages. Earnings  for both delivery and taxi workers in Delhi-NCR were substantially lower  than minimum wage and living wage standards. 69% of workers in the taxi  services sector and 87% of workers in the delivery services sector  earned less than the minimum wage in Delhi. Moreover, 92% of workers in  the taxi sector and 97% of workers in the delivery sector earned lower  than the estimated living wage.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;These  insufficient incomes were particularly damaging to workers’ lives and  livelihoods, considering their high dependence on income from platform  work. An overwhelming proportion of workers (over 94% across all cities)  were engaged in platform work as their main source of income, as  opposed to part-time employment. They also faced significant economic  burdens such as being sole earners in their household, having multiple  financial dependents, having financial commitments to provide  remittances back home, and so on. Worsening these burdens was widespread  income insecurity that workers faced across all cities—for over 43% of  workers (up to 65% in Guwahati), earnings from platform work were  insufficient for covering basic household expenses.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Workplace risks and ineffective redressal mechanisms&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Workers  in both sectors were working immensely long hours in order to try and  make adequate earnings while working for platforms, working several  hours above standard weekly work hours (48 hours/week) typically  prescribed by occupational health standards. Across all cities, delivery  workers spent a median of over 60 weekly hours working for platforms,  and taxi workers spent a median of around 84 weekly hours. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Alongside  the adverse health impacts of long work hours, workers faced grievous  workplace risks, including risks of physical assault, theft, poor road  safety, and harsh weather conditions. Around 75% of delivery and taxi  workers faced these issues in Mumbai and Lucknow. An even greater  proportion of workers were exposed to these risks in Delhi-NCR (84%) and  Guwahati (90%).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Despite  several workplace risks, platforms remained unaccountable for their  failure to guarantee safe working conditions. Across all cities, less  than 10% of workers found that their platform took steps to improve  working conditions. Workers’ overall experience with platform grievance  redressal mechanisms was mixed. For instance, in Lucknow, only around  25% of workers who raised grievances did not receive a resolution. In  contrast, 50% of taxi workers in Delhi-NCR did not receive a resolution,  as was the case for 76% of taxi workers in Mumbai. Workers have limited  recourse when their grievances go unanswered. Platforms, however, wield  significant control over terms of work, making it difficult for workers  to challenge unfair decisions.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Low coverage and accessibility of social protection mechanisms&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Social  security covered by platforms typically included health insurance and  accident insurance. Workers faced significant gaps in insurance  coverage, and these gaps were particularly glaring in the taxi services  sector. Across cities, health and accident insurance coverage for taxi  workers was below 10% (an exception was 11% of workers covered by  accident insurance in Delhi-NCR). It is important to note that this low  coverage exists despite the Motor Vehicle Aggregator Guidelines, 2020  mandating provision of health insurance and term insurance from  platforms. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Delivery  workers had a relatively higher percentage of insurance coverage from  platforms, although coverage varied across cities. Health insurance  coverage was low for delivery workers in Delhi-NCR (21%) and Guwahati  (14%), but higher for workers in Lucknow (34%) and Mumbai (44%). In the  case of accident insurance, insurance was covered by platforms for over  40% of delivery workers in Delhi-NCR and Lucknow, while a greater  proportion of workers were covered in Mumbai (63%) and Guwahati (72%).  Even though delivery workers were covered by platform-provisioned  insurance, claiming benefits was an unreliable and time-consuming  process. Workers who attempted to access benefits faced several  obstacles, including poor awareness of available schemes, inadequate  coverage, and little to no platform support in navigating complex claims  procedures.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The  inadequacy of platform-provisioned insurance was exacerbated by the  exclusion of workers from government social protection mechanisms. In  Delhi-NCR, Guwahati, and Lucknow, over 35% of workers in both sectors  were left outside of social protection from governments. In Mumbai, over  66% of workers were excluded.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Contributors&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;Conceptualisation + planning:&lt;/b&gt; Aayush Rathi, Abhishek Sekharan, Ambika Tandon, Chetna V M, Chiara Furtado, and Nishkala Sekhar&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Writing:&lt;/b&gt; Aayush Rathi, Ambika Tandon, Chetna V M, Chiara Furtado, and Nishkala Sekhar&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Data analysis:&lt;/b&gt; Abhishek Sekharan, Chetna V M, and Nishkala Sekhar&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Data visualisation:&lt;/b&gt; Sriharsha Devulapalli&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Design + design direction:&lt;/b&gt; Annushka Jaliwala and Yatharth&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Review:&lt;/b&gt; Aayush Rathi and Abhineet Nayyar&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Survey design + planning:&lt;/b&gt; Abhishek Sekharan and Ambika Tandon&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Survey implementation:&lt;/b&gt; Abhishek Kumar&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Research advice:&lt;/b&gt; Nora Gobel and Uma Rani Amara&lt;/p&gt;
&lt;p&gt;We are deeply grateful to the workers who participated in the surveys  for generously sharing their time, experiences, and insights with us.&lt;/p&gt;
&lt;p&gt;This work was supported by the Internet Society Foundation, as part of the “&lt;a href="https://cis-india.org/raw/labour-futures-intersectional-responses-to-southern-digital-platform-economies"&gt;Labour Futures&lt;/a&gt;” project at the Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;This work is shared under the &lt;a href="https://creativecommons.org/licenses/by-sa/4.0/"&gt;Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;To know more about this work, please write to us at &lt;a href="mailto:chiara@cis-india.org"&gt;chiara@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Explore more of CIS’ research on labour and digitalisation at &lt;a href="https://platformwork.in"&gt;platformwork.in&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/platforming-precarity-data-narratives-workers'&gt;https://cis-india.org/raw/platforming-precarity-data-narratives-workers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi, Abhishek Sekharan, Ambika Tandon, Chetna V. M., Chiara Furtado, Nishkala Sekhar, and Sriharsha Devulapalli</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Labour Futures</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Digital Labour</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2024-10-15T02:42:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/substantive-areas/new-pedagogies/piracy">
    <title>Piracy</title>
    <link>https://cis-india.org/about/substantive-areas/new-pedagogies/piracy</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;h3&gt;Context&lt;/h3&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p align="justify"&gt;Loss of
	civil liberties as a result of increased and indiscriminate
	enforcement activities by State and private bodies.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Conflation
	of piracy with concepts such as terrorism, child pornography and
	drug trafficking which prevents legitimate off-line and online
	sharing and growth of P2P technologies.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Long
	term social impact of sizable section of the citizenry that views
	themselves as operating outside the law.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Research Agenda&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p align="justify"&gt;Analyse
	different acts that are considered piracy from legal, enforcement,
	corporate and general public perspectives. Document changes in the
	definition of piracy over time in different contexts. Interrogate
	the double standards employed by corporations, film industry using
	case-studies such as T-Series, YouTube/torrent leaks, etc.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Study
	the prevalence of piracy in different regions of the world, market
	segments, technologies and sections of society.  Document the
	social, cultural, technological and economic repercussions of these
	increased levels of piracy. For example: a) understanding how piracy
	contribute to increased consumer choice; b) examining the
	correlation between P2P and piracy-based distribution and
	enhancement of reputation and growth in market share of individual
	artists, bands and small companies.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Document
	the contribution of pirates to the development of cutting edge
	technologies and pushing of the limits of end-user experience.
	Analysing different techniques for movie, book, television,
	software and music piracy employed by individuals and industries.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Identify
	and document various factors which contribute to high level of
	piracy in developing countries. Design and propose strategies and
	policy positions such as: parallel imports, compulsory licensing,
	media surcharge and open licenses to reduce levels of copyright
	infringement.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Document
	and analyze various methods and methodologies for studying and
	tracking piracy. For example aggregation and consolidation of P2P
	statistics by companies such as Big Champagne. Provide technical
	strategies for those engaged in legitimate sharing to protect their
	privacy and civil rights against surveillance technologies.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Studying
	national and regional laws that governs copyright infringement and
	propose changes that protect Access to Knowledge. Examining case law
	for trends, including analysis of the kinds of punishments which are
	prescribed for copyright infringement.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Documenting
	due procedure for enforcement against individuals and organizations?
	Analyzing the legal validity of evidence submitted by enforcement
	agencies for different forms of alleged off-line and online
	copyright infringement.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Document
	and analyse the
	attention paid by developing country policy makers to piracy in
	different markets and technologies. Identify and monitor state
	agencies engaged in tracking piracy and undertaking enforcement
	activities?&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;How do
	citizens justify acts of piracy? How do they view themselves and
	others as criminals?&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Document
	the correlation between high speed Internet connections and
	peer-to-peer file sharing programmes and illegal and legal sharing
	of knowledge.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Resources&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.enotes.com/internet-piracy-article"&gt;Internet
	Piracy—An introduction&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;a class="external-link" href="http://209.85.175.104/search?q=cache:dy2BJ2AiV84J:www.cs.armstrong.edu/sjodis/COURSES/2070/SWPiracy.ppt+what+is+internet+piracy&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;cd=6&amp;amp;gl=uk"&gt;Introduction
	to Internet Piracy&amp;nbsp;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.moreintelligentlife.com/node/719"&gt;Internet
	piracy is good for films&amp;nbsp;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;a class="external-link" href="http://portal.unesco.org/culture/en/files/28696/11513329261panethiere_en.pdf/panethiere_en.pdf"&gt;The
	persistence of piracy: the consequences for creativity, for culture,
	and for sustainable development&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;ol start="5"&gt;&lt;li&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.ft.com/cms/s/0/e72884f6-6175-11dd-af94-000077b07658.html?nclick_check=1"&gt;Music
	industry ‘should embrace illegal websites’&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;ol start="6"&gt;&lt;li&gt;
&lt;p&gt;&lt;a class="external-link" href="http://ivana-dee.blogspot.com/2008/07/causes-of-ilegal-music-products.html"&gt;Causes
	of illegal music product’s existence&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;ol start="7"&gt;&lt;li&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.guardian.co.uk/technology/2008/feb/23/piracy.internet"&gt;Creativity
	policy pits internet providers against pirates&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;ol start="8"&gt;&lt;li&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.mindjack.com/feature/piracy051305.html"&gt;Piracy
	is good?&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/substantive-areas/new-pedagogies/piracy'&gt;https://cis-india.org/about/substantive-areas/new-pedagogies/piracy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>royson</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2009-01-26T10:23:49Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/news-nine-shweta-mohandas-and-anamika-kundu-personal-data-protection-bill-must-examine-data-collection-practices-that-emerged-during-pandemic">
    <title>Personal Data Protection Bill must examine data collection practices that emerged during pandemic</title>
    <link>https://cis-india.org/internet-governance/blog/news-nine-shweta-mohandas-and-anamika-kundu-personal-data-protection-bill-must-examine-data-collection-practices-that-emerged-during-pandemic</link>
    <description>
        &lt;b&gt;The PDP bill is speculated to be introduced during the winter session of the parliament soon. The PDP Bill in its current form provides wide-ranging exemptions which allow government agencies to process citizen’s data in order to fulfil its responsibilities. The bill could ensure that employers have some responsibility towards the data they collect from the employees.

&lt;/b&gt;
        &lt;p&gt;The article by Shweta Mohandas and Anamika Kundu was &lt;a class="external-link" href="https://www.news9live.com/technology/personal-data-protection-bill-must-examine-data-collection-practices-that-emerged-during-pandemic-137031?infinitescroll=1"&gt;originally published by &lt;strong&gt;news nine&lt;/strong&gt;&lt;/a&gt; on November 29, 2021.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Personal Data Protection Bill (PDP) is speculated to be introduced during the winter session of the parliament soon, and the report of the Joint Parliamentary Committee (JPC) has already been &lt;a class="external-link" href="https://www.thehindu.com/news/national/parliamentary-panel-retains-controversial-exemption-clause-in-personal-data-protection-bill/article37633344.ece"&gt;adopted&lt;/a&gt; by the committee on Monday. The Report of the JPC comes after almost two years of deliberation and secrecy over how the final version of the Personal Data Protection Bill will be. Since the publication of the &lt;a class="external-link" href="https://prsindia.org/files/bills_acts/bills_parliament/2019/Personal%20Data%20Protection%20Bill,%202019.pdf"&gt;2019 version&lt;/a&gt; of the PDP Bill, the Covid 19 pandemic and the public safety measures have opened the way for a number of new organisations and reasons to collect personal data that was non-existent in 2019. Hence along with changes that have been suggested by multiple civil society organisations, the dissent notes submitted by the members of the JPC, the new version of the PDP Bill must also look at how data processing has changed over the span of two years.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Concerns with the bill&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;At the outset there are certain parts of the PDP Bill which need to be revised in order to uphold the spirit of privacy and individual autonomy laid out in the Puttaswamy judgement. The two sections that need to be in line with the privacy judgement are the ones that allow for non consensual processing of data by the government, and by employers. The PDP Bill in its current form provides wide-ranging exemptions which allow government agencies to process citizen's data in order to fulfil its &lt;a class="external-link" href="https://www.livemint.com/news/india/big-brother-on-top-in-data-protection-bill-11576164271430.html"&gt;responsibilities&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the &lt;a class="external-link" href="https://www.meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf"&gt;2018 version&lt;/a&gt; of bill, drafted by the Justice Srikrishna Committee exemptions granted to the State with regard to processing of data was subject to a four pronged test which required the processing to be (i) authorised by law; (ii) in accordance with the procedure laid down by the law; (iii) necessary; and (iv) proportionate to the interests being achieved. This four pronged test was in line with the principles laid down by the Supreme Court in the Puttaswamy judgement. The 2019 version of the PDP Bill has diluted this principle by merely retaining the 'necessity principle' and removing the other requirements which is not in consonance with the test laid down by the Supreme Court in Puttaswamy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 35 was also widely discussed in the panel meetings where members had &lt;a class="external-link" href="https://www.thehindu.com/news/national/parliamentary-panel-retains-controversial-exemption-clause-in-personal-data-protection-bill/article37633344.ece"&gt;argued&lt;/a&gt; the removal of 'public order' as a ground for exemption. The panel also insisted for '&lt;a class="external-link" href="https://www.thehindu.com/news/national/parliamentary-panel-retains-controversial-exemption-clause-in-personal-data-protection-bill/article37633344.ece"&gt;judicial or parliamentary oversight&lt;/a&gt;' to grant such exemptions. The final report did not accept these suggestions stating a need to balance &lt;a class="external-link" href="https://www.thehindu.com/news/national/parliamentary-panel-retains-controversial-exemption-clause-in-personal-data-protection-bill/article37633344.ece"&gt;national security, liberty and privacy&lt;/a&gt; of an individual. There ought to be prior judicial review of the written order exempting the governmental agency from any provisions of the bill. Allowing the government to claim an exemption if it is satisfied to be "necessary or expedient" can be misused.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another clause which gives the data principal a wide berth is with respect to employee data Section 13 of the current version of the bill provides the employer with a leeway into processing employee data (other than sensitive personal data) without consent based on two grounds: when consent is not appropriate, or when obtaining consent would involve disproportionate effort on the part of the employer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The personal data so collected can only be collected for recruitment, termination, attendance, provision of any service or benefit, and assessing performance. This covers almost all of the activities that require data of the employee. Although the 2019 version of the bill excludes non-consensual collection of sensitive personal data (a provision that was missing in the 2018 version of the bill), there is still a lot of scope to improve this provision and provide employees further right to their data. At the outset the bill does not define employee and employer, which could result in confusion as there is no one definition of these terms across Indian Labour Laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the bill distinguishes between employee and consumer, where the consumer of the same company or service has a greater right to their data than an employee. In the sense that the consumer as a data principal has the option to use any other product or service and also has the right to withdraw consent at any time, in the case of an employee the consequence of refusing consent or withdrawing consent would be being terminated from the employment. It is understood that there is a requirement for employee data to be collected, and that consent does not work the same way as it does in the case of a consumer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bill could ensure that employers have some responsibility towards the data they collect from the employees, such as ensuring that they are only used for the purpose for which they were collected, the employee knows how long their data will be retained, and know if the data is being processed by third parties. It is also worth mentioning that the Indian government is India's largest employer spanning a variety of agencies and public enterprises.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Concerns highlighted by JPC Members&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Going back to the few members of the JPC who have moved dissent notes, specifically with regard to governmental exemptions. Jairam Ramesh filed a &lt;a href="https://www.news9live.com/india/parliament-panel-adopts-report-on-data-protection-amid-dissent-by-opposition-135591"&gt;dissent note&lt;/a&gt;, to which many other opposition members followed suit. While Jairam Ramesh praised the JPC's functioning, he disagreed with certain aspects of the Report. According to him, the 2019 bill is designed in a manner where the right to privacy is given importance only in cases of private activities. He raised concerns regarding the unbridled powers given to the government to exempt itself from any of the provisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The amendment suggested by him would require parliamentary approval before exemption would take place. He also added that Section 12 of the bill which provided certain scenarios where consent was not needed for processing of personal data should have been made '&lt;a href="https://www.hindustantimes.com/india-news/mps-file-dissent-notes-over-glaring-lacunae-in-report-on-data-protection-bill-101637566365637.html"&gt;less sweeping&lt;/a&gt;'. Similarly, Gaurav Gogoi's &lt;a href="https://www.hindustantimes.com/india-news/mps-file-dissent-notes-over-glaring-lacunae-in-report-on-data-protection-bill-101637566365637.html"&gt;note&lt;/a&gt; stated that the exemptions would create a surveillance state and similarly criticised Section 12 and 35 of the bill. He also mentioned that there ought to be parliamentary oversight for the exemptions provided in the bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the same issue, Congress leader Manish Tiwari noted that the bill creates '&lt;a href="https://timesofindia.indiatimes.com/business/india-business/personal-data-protection-bill-what-is-it-and-why-is-the-opposition-so-unhappy-with-it/articleshow/87869391.cms"&gt;parallel universes&lt;/a&gt;' - one for the private sector which needs to be compliant and the other for the State which can exempt itself. He has opposed the entire bill stating there exists an "inherent design flaw". He has raised specific objections to 37 clauses and stated that any blanket exemptions to the state goes against the Puttaswamy Judgement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In their joint &lt;a href="https://www.news9live.com/india/tmc-congress-mps-submit-dissent-notes-to-joint-panel-on-personal-data-protection-bill-135491"&gt;dissent note&lt;/a&gt;, Derek O'Brien and Mahua Mitra have said that there is a lack of adequate safeguards to protect the data principals' privacy and the lack of time and opportunity for stakeholder consultations. They have also pointed out that the independence of the DPA will cease to exist with the present provision of allowing the government powers to choose members and the chairman. Amar Patnaik is to object to the lack of inclusion of state level authorities in the bill. Without such bodies, he says, there would be federal override.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While a number of issues were highlighted by civil society, the members of the JPC, and the media, the new version of the bill should also need to take into account the shifts that have taken place in view of the pandemic. The new version of the data protection bill should take into consideration the changes and new data collection practices that have emerged during the pandemic, be comprehensive and leave very little provisions to be decided later by the Rules.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/news-nine-shweta-mohandas-and-anamika-kundu-personal-data-protection-bill-must-examine-data-collection-practices-that-emerged-during-pandemic'&gt;https://cis-india.org/internet-governance/blog/news-nine-shweta-mohandas-and-anamika-kundu-personal-data-protection-bill-must-examine-data-collection-practices-that-emerged-during-pandemic&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas and Anamika Kundu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2022-03-30T15:15:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/pegasus-snoopgate-an-opportune-moment-to-revisit-legal-framework-governing-state-surveillance-framework">
    <title>Pegasus snoopgate, an opportune moment to revisit legal framework governing state surveillance framework</title>
    <link>https://cis-india.org/internet-governance/blog/pegasus-snoopgate-an-opportune-moment-to-revisit-legal-framework-governing-state-surveillance-framework</link>
    <description>
        &lt;b&gt;Revelations of hacking call for a relook at India’s surveillance regime&lt;/b&gt;
        
&lt;p&gt;This article by Gurshabad Grover and Tanaya Rajwade was published in &lt;a class="external-link" href="https://indianexpress.com/article/opinion/columns/pegasus-whatsapp-surveillance-data-protection-6183355/"&gt;the Indian Express&lt;/a&gt; on December 25, 2019. The authors would like to thank Arindrajit Basu for his comments and suggestions.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;In early November, it became clear that several lawyers and human 
rights activists had been targeted by spyware that allowed attackers 
unfettered access to information stored on victims’ phones. On November 
29, in the Rajya Sabha, the Minister of Electronics and Information 
Technology was repeatedly asked whether any Indian agency had 
commissioned the attack vector ‘‘&lt;a href="https://indianexpress.com/article/explained/whatsapp-spyware-pegasus-india-surveillance-nso-israel-6096910/"&gt;Pegasus&lt;/a&gt;”
 that was used in the attacks from the Israeli firm NSO. Where a 
categorical response would have sufficed, the minister chose to muddy 
the waters through vague assertions such as “standard operating 
procedures have been followed”.&lt;/p&gt;
&lt;p&gt;There are cogent reasons pointing towards an Indian law enforcement 
agency’s hand in procuring Pegasus. First, NSO maintains that it only 
sells services and software to state agencies. Second, some of the known
 Indian targets of the vulnerability are human rights activists. These 
individuals work on India-specific issues and hardly qualify as serious 
threats in the eyes of a foreign government.&lt;/p&gt;
&lt;p&gt;The government derives some of its powers to conduct electronic 
surveillance from Section 69 of the Information Technology (IT) Act. The
 procedures for such surveillance are defined in the IT (Procedure and 
Safeguards for Interception, Monitoring and Decryption of Information) 
Rules, 2009. It is these rules, and not the parent Act that define the 
terms “interception” and “monitoring” as “acquisition of the contents of
 any information through the use of any means” and “to view or to 
inspect or listen to or record information”, respectively. These 
all-encompassing definitions seemingly permit authorised law enforcement
 agencies to use Pegasus-like tools.&lt;/p&gt;
&lt;p&gt;However, the IT Act also penalises unauthorised access to computers 
without the owner’s permission. These provisions, namely section 43 and 
66, do not carve out an exception for law enforcement agencies. As 
lawyer Raman Chima highlighted recently, any action explicitly 
prohibited under the Act cannot be justified by procedures laid out in 
subordinate legislation. Therefore, no law enforcement agency can “hack”
 devices, though they may “intercept” or “monitor” through other means. 
Additionally, the Supreme Court’s privacy verdict held any invasion of 
privacy by the state must be based on a law. As some of the agencies 
authorised to conduct surveillance (like the Intelligence Bureau) do not
 have statutory backing, surveillance by them is unconstitutional.&lt;/p&gt;
&lt;p&gt;The use of spyware gives the state access to private conversations, 
including privileged communications with lawyers. Such an infringement 
of rights may be justified for militants suspected of actively planning 
an armed attack. For academicians and human rights activists, the use of
 broad surveillance without any evidence or anticipation of such 
activities is unfathomable in a democracy.&lt;/p&gt;
&lt;p&gt;With the popularity of end-to-end encryption, surveillance may 
require the exploitation of vulnerabilities on end-users’ devices. The 
Pegasus snoopgate is an opportune moment to revisit the legal framework 
governing the state surveillance framework. It is crucial to dismantle 
state agencies that run surveillance operations despite lacking 
statutory authority. For other agencies, there is a need to introduce 
judicial and parliamentary oversight. Depending on the concerns of law 
enforcement, it may be necessary to enact legislation permitting 
“hacking” into devices on extremely limited grounds.&lt;/p&gt;
&lt;p&gt;Unfortunately, the government has taken a massive leap backwards by 
ignoring the standards laid down by the Supreme Court and Justice 
Srikrishna Committee’s recommendations, and introducing unconstitutional
 surveillance enablers in the Data Protection Bill. Now is the time for 
Parliament to guarantee the privacy and security of Indians.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Grover and Rajwade are researchers at the Centre for 
Internet and Society (CIS). Views are personal. Disclosure: CIS is a 
recipient of research grants from Facebook.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/pegasus-snoopgate-an-opportune-moment-to-revisit-legal-framework-governing-state-surveillance-framework'&gt;https://cis-india.org/internet-governance/blog/pegasus-snoopgate-an-opportune-moment-to-revisit-legal-framework-governing-state-surveillance-framework&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Gurshabad Grover and Tanaya Rajwade</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-07-09T01:30:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/peeping-toms-in-inbox">
    <title>Peeping Toms In Your Inbox</title>
    <link>https://cis-india.org/news/peeping-toms-in-inbox</link>
    <description>
        &lt;b&gt;Nothing’s safe any more—not your mobile number, nor your e-mail—as they’re put on offer for the benefit of telemarketers, writes Namrata Joshi and Neha Bhatt in an article published in the Outlook.&lt;/b&gt;
        
&lt;p&gt;It was Saturday morning and Sneha Gupta wanted to book a table for dinner at a Delhi restaurant called Rodeo. So she called up a telephone directory service and procured the restaurant’s phone number, firmly nixing the operator’s seemingly casual offer to also provide numbers of similar restaurants. But that wasn’t the end of the story. The next day, Sunday brunch with her extended family was interrupted by calls from sundry restaurants enquiring if she’d be interested in hosting parties and events—at a discount.&lt;/p&gt;
&lt;p&gt;“Instead of enjoying the food, the company and the conversation, I was busy ticking off these guys. Why were they assuming I wanted to organise a party? How did they get my mobile number to blatantly infringe on my private family time?” asks Sneha. She got no answers from them, but the sequence of events is clear: the telephone directory service sold Sneha’s contact details to marketers who broadly assumed, from her Rodeo outing, that she was a party animal, and decided to bombard her with similar offers.&lt;/p&gt;
&lt;p&gt;Something similar happened to media professional Raghav Agarwal. He paid off his bank loan for a car in two-and-a-half years instead of the stipulated five, happy to stop living off credit. But from the next day, he was inundated with calls offering him bigger and better credit for everything—from house to car to education. “It was awfully distracting to deal with this while trying to meet deadlines,” he recounts. The fact that he had paid back the loan ahead of time had, by hook or by crook, reached financial outfits who used the information to serenade what they saw as an attractive catch.&lt;/p&gt;
&lt;p&gt;For Kuhu Tanvir, these attentions come laced with a hint of menace. The film student was startled to find herself receiving unsolicited calls from unknown vendors offering to maintain the water purifier installed in the recesses of her kitchen. “It’s scary to think,” she says, “that there are people out there who even know which products you’ve bought for your house.” It was equally unnerving for film producer Gaurang Jalan to have his personal details passed on to data-miners by none other than a prominent Calcutta club (“strangers now call you on your birthday, offering schemes”). All those out there accosted by calls offering car insurance just at the time their policy is up for renewal will know exactly how they felt....&lt;/p&gt;
&lt;h3&gt;8 Ways In Which You’re Being Intruded Upon&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;Privacy is being redefined in India, with the lines between the public and the private blurring not just for celebrities but also for ordinary citizens...&lt;/li&gt;&lt;li&gt;Personal details like your phone number, date of birth, credit history, bank loans, insurance policies, white goods purchases, favourite restaurants and nightclubs are bought and sold among cellphone operators, banks, shops, telephone directory services, credit card companies, hospitals, hotels, elite clubs and even your locality’s residents’ welfare association.&lt;/li&gt;&lt;li&gt;Unsolicited telemarketing calls, spam SMSes and e-mails intrude incessantly on your private space, time&lt;/li&gt;&lt;li&gt;Your online purchases and searches, archived e-mails and documents are being tracked for marketing purposes. Social networking groups and search engines stand accused of sharing user information and contact details.&lt;/li&gt;&lt;li&gt;Personal pictures, information about relationships on social networking sites are being misused by online predators and molesters.&lt;/li&gt;&lt;li&gt;Identity theft is fast emerging as a threat.&lt;/li&gt;&lt;li&gt;Surveillance cameras and intrusive frisking have become a way of life, at airports, cinema halls, malls, hospitals, hotels, etc.&lt;/li&gt;&lt;li&gt;TV cameras and sting operations blur the line between individual privacy and public interest.&lt;/li&gt;&lt;li&gt;People encouraged and offered inducements to bare all about their lives on TV. Shows like Emotional Atyachar, Splitsvilla, Truth Love Cash play out individual dating rituals and infidelity games for the masses.&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;7 Steps You Can Take To Protect Yourself&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;Give out your mobile number cautiously, if at all; don’t print it on the visiting cards you hand out generously. Give only your landline number if you have to, to avoid being constantly disturbed.&lt;/li&gt;&lt;li&gt;Be wary of filling in random forms at retail stores and restaurants, or the gift voucher you’re offered in return for your friends’ names and phone numbers.&lt;/li&gt;&lt;li&gt;Be alert while shopping with your debit or credit card. The retailer may be also swiping the card on his computer to feed your contact information into it.&lt;/li&gt;&lt;li&gt;Even though the Do Not Call facility has not worked for a majority of users, you lose nothing by registering for it on www.donotcall.gov. You can’t complain about unsolicited calls unless you register.&lt;/li&gt;&lt;li&gt;Online, be cautious of the personal information you reveal, such as your date of birth and photographs, which make you especially vulnerable to identity theft. Use Google dashboard and the new Facebook privacy settings to protect yourself.&lt;/li&gt;&lt;li&gt;Get the latest browser that allows you to delete cookies-as-you-go, delete your browsing history regularly, learn to encrypt your e-mail.&lt;/li&gt;&lt;li&gt;Always read privacy clauses in bank and other forms, and on websites carefully, and remember to tick opt-out boxes if you don’t want to be besieged with new product information.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;For celebrities, the lines between the private and the public have always been blurred. But in a transforming India, ordinary people like Sneha, Raghav, Kuhu and Gaurang are finding themselves intruded upon in newer ways—from the trivial to the serious—and across varied platforms, from the mobile phone to the internet, TV to the surveillance camera. And, with citizens like them mostly dimly aware of how to safeguard, renegotiate or fight for their right to privacy—enshrined in the Constitution, but vaguely defined—in a changing world, and no effective laws to rein in those who violate it, the infringements and threats are set to increase.&lt;/p&gt;
&lt;p&gt;Take telemarketing, perhaps the most insistent manifestation today of this marauding culture. It started out as an irritant, became a nuisance and is now a virtually unchecked invasion. “In the West, telemarketing is an unobtrusive experience thanks to opt-in services by which users get calls only if they ask for them. Moreover, governments discourage telemarketers through strict regulations. In India, it’s a menace,” says Supreme Court advocate Harsh Pathak, who has litigated against telemarketing calls and the sale of personal data to companies.&lt;/p&gt;
&lt;p&gt;Indeed, you can chart an entire day in your life with these intrusions as markers. You get woken up with the SMS: “Hare Krishna. Today is Ekadashi. Fasting from grains and beens (sic). Chant Hare Krishna mahamantra 25 rounds (sic) and be happy. Hari bol.” Through the day, they keep coming, both SMSes and human voices, trying to sell you everything from houses and farmland to hotel deals, sauna belts, equity tips and public speaking skills. And, if you happen to be even an occasional club-hopper, your phone could carry on beeping till two or three am, with SMSes announcing the next gig in town.&lt;/p&gt;
&lt;p&gt;It’s clear from this virtually round-the-clock barrage that our personal lives are up for sale in an aggressive marketing-driven environment. Be it telecom companies, banks, shops, credit card firms, DVD rental libraries, insurance, auto dealers, clubs or hotels, they all profit from sharing personal information—phone numbers, credit history, spending patterns, shopping preferences and much else—about their customers. “The irony is that the corporate world has no accountability or transparency in India but the public has turned transparent for them,” says media analyst and columnist Sudheesh Pachauri.&lt;/p&gt;
&lt;p&gt;Those often identified as the prime offenders in this game are quick to shrug off blame, or not respond, as Outlook found. ICICI Bank could not “participate in this story”, Airtel declined comment while Vodafone did not respond at all. Rajat Mukarji, chief corporate officer, Idea Cellular, who did respond, said phone companies were unfairly blamed for unsolicited calls. “Such data is available everywhere now, you can buy it off the Net for Rs 150,” he argued. HDFC Bank’s chief information security officer Vishal Salvi also stoutly denies that databases are sold, and when asked why existing customers are deluged with new product and service offers, says: “It only happens on a need-to-know, need-to-do-basis.” That’s the theory, but in practice, many customers find that the “need” seems to be defined by the banks, not their clients.&lt;/p&gt;
&lt;p&gt;So where does that leave the consumer? Well, says Bangalore-based freelance writer and photographer Darshan Manakkal, “On a good day, I plead with the telemarketer to never call me again. With the more persistent ones, I try a different approach, like putting them on hold while I go for a bath. On really bad days, I just abuse them.” Others, like Chennai professional P.K. Pradeep, who shared with us pages upon pages of (extremely polite) e-mails to Airtel and Vodafone requesting them to halt unsolicited calls and SMSes, have been more persistent, but have achieved little beyond the robotic response, “We’re looking into it.”&lt;/p&gt;
&lt;p&gt;Signing up, along with some 66 million souls, at the National Do Not Call (NDNC) Registry set up in October 2007, provided no protection to Pradeep, nor did changing phone numbers. “I got a new number from Vodafone recently, and would you believe it, the very next day I was bombarded with promotional messages. They had clearly passed on my number,” he says. The NDNC of the Telecom Regulatory Authority of India (TRAI) is now widely acknowledged as a failure. There was a brief dip in calls, but they resumed with renewed gusto. You could get lost in the maze of explanations for why NDNC doesn’t work; what’s clear, though, is that it has no capacity to deal with telemarketers who fail to register with it—like all those unknown real estate companies who bombard you with SMSes—and little teeth to deal with those who do. Fines are laughably minuscule—ranging from Rs 500 to Rs 1,000—and the threat of disconnecting a telemarketer’s line is an empty one when it can quickly sign up and assault consumers from another connection. In view of its failure, a Do Call registry has been mooted, on the more consumer-friendly principle that those who want to be called should opt in rather than opt out. Consultations are on but its future shape is still unclear, with telecom companies (no surprise there) opposed to it. “We have gone far with dnc. To now backtrack and try something new doesn’t seem feasible,” says Mukarji.&lt;/p&gt;
&lt;p&gt;“The whole problem of unregistered telemarketers will continue and telecom companies will go on blaming them,” S. Saroja, legal coordinator for the Chennai-based Citizen Consumer and Civic Action Group, predicts pessimistically. The group has tried, to no avail, to get phone companies to trace bulk SMSes, which she maintains are easily traceable. “Telemarketing is a Rs 50,000-crore industry and growing at 20 per cent every year. Nobody wants to upset it as everybody is making money out of it, including the government,” says Supreme Court advocate Nivedita Sharma, who has fought her own battles against the sale of privacy.&lt;/p&gt;
&lt;p&gt;Meanwhile, an expanding online world is throwing up its own challenges. By 2013, according to some estimates, India will have the third-largest internet user base in the world. Already, with 50 million-plus users and growing, it is a magnet for marketers, who as we know—without perhaps fully internalising the fact—avidly follow the telltale digital pugmarks and trails we leave on the Net as we e-mail, search, shop and obsessively communicate with each other on platforms like Facebook and Twitter.&lt;/p&gt;
&lt;p&gt;These spaces on the Net, and their counterparts on other media, seem to be drawing us into an open, sharing, even confessional, culture, without our being fully aware of our vulnerability. We occasionally get intimations of it—like when our e-mail account is hacked into and bizarre mail sent out on our behalf; our Facebook pictures downloaded and their obscene versions floated on Orkut, as happened to two Delhi airhostesses recently; or vicious, revealing comments on our personal lives posted amid the banter on our favourite chat sites.&lt;/p&gt;
&lt;p&gt;However, as media analysts point out, there is little push in the Indian environment to do what Western users of Facebook did recently: forcing it to change privacy policies and settings by protesting against its inadequate privacy controls. Here too, as with telemarketing, the regulatory environment is missing.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“In India, there are no regulatory bodies related to online privacy concerns like in the US and Canada where there are privacy commissions which force corporations to make changes in their privacy policy in the interest of citizens,” says Sunil Abraham, executive director, the Centre for Internet and Society, Bangalore.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt; But individuals are to blame too. Saad Akhtar of naukri.com points out: “We don’t even read the fine print on privacy policies on websites, not realising that a lot of the data we upload even on Indian social networking websites becomes their property, which they can share with advertisers.”&lt;/p&gt;
&lt;p&gt;Indeed, Akhila Sivadas of the Centre for Advocacy and Research, says that privacy issues are creating a cultural crisis of sorts, with no understanding of them, leave alone resolution. “Privacy is something that has been negotiated in a personal, intimate, micro universe. We have drawn our individual lakshman rekhas. But we have not debated on privacy norms as a society in a public space, which is very significant in the wake of how the mass media and social networking media is exploding in our country,” she says. It’s leading to an uneasy blend of the very closed and guarded, and the extremely open and no-holds-barred in our society. “There is no robust normative system in place, and corporate entities are exploiting that void,” she says. “The market is primed to take advantage and exploit existing conditions for profit. We are allowing the market to overreach itself,” agrees adman and social commentator Santosh Desai.&lt;/p&gt;
&lt;p&gt;So what should be done? Obviously, the R-word—regulation—is critical, and hopefully, the cry for it from the ground will become stronger, as intrusions gather apace. But it would help for consumers to get smarter. Some of the questions to ask ourselves are: should I really be patronising a phone directory service, as Sneha did, that states that it shares information with third-party members and is not responsible for that information being misused by third parties? Should I hand out my visiting card, with my mobile number on it, to all and sundry? Should I reflexively press the “I agree to the terms &amp;amp; conditions” button while signing up for net services without reading the fine print? As Desai puts it, we need to be “mindful, suspicious and careful”. Without, of course, descending into paranoia. The irony, getting sharper and sharper in our lives, is that the very platforms that are used to invade our privacy also enrich our lives in manifold ways.&lt;/p&gt;
&lt;p&gt;Read the original article in &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?265792"&gt;Outlook&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/peeping-toms-in-inbox'&gt;https://cis-india.org/news/peeping-toms-in-inbox&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T11:42:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/pdf-gendered-future-of-work">
    <title>PDF Gendered Future of Work</title>
    <link>https://cis-india.org/internet-governance/pdf-gendered-future-of-work</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/pdf-gendered-future-of-work'&gt;https://cis-india.org/internet-governance/pdf-gendered-future-of-work&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-03-05T19:48:35Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/pdf-final-draft-gender-and-the-future-of-work">
    <title>PDF Final draft Gender and the future of work</title>
    <link>https://cis-india.org/internet-governance/pdf-final-draft-gender-and-the-future-of-work</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/pdf-final-draft-gender-and-the-future-of-work'&gt;https://cis-india.org/internet-governance/pdf-final-draft-gender-and-the-future-of-work&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-03-05T08:44:57Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/governance-now-april-12-2014-pratap-vikram-singh-parties-give-short-shrift-to-privacy">
    <title>Parties give short shrift to privacy</title>
    <link>https://cis-india.org/news/governance-now-april-12-2014-pratap-vikram-singh-parties-give-short-shrift-to-privacy</link>
    <description>
        &lt;b&gt;Both the Congress and BJP vision documents disappoint, but the real surprise is the CPI-M document that deals with cyber issues in a substantial manner.&lt;/b&gt;
        &lt;p&gt;The article by Pratap Vikram Singh was published in &lt;a class="external-link" href="http://www.governancenow.com/news/regular-story/parties-give-short-shrift-privacy"&gt;GovernanceNow.com&lt;/a&gt; on April 12, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;For civil rights activists in the internet and cyber space, the election manifestoes of major political parties including the Congress and the BJP have come as a disappointment. Both the parties are mute on privacy. In the recent past there has been a vociferous demand for a strong legislation on privacy. A draft bill on privacy has been making rounds of the bureaucratic circle for three years. Manifestoes are also silent on the need for correction in the information technology act, which activists say is characterised by 'arbitrariness and lack of processes'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“A healthy democracy gives equal weightage to transparency and privacy. It’s disappointing that the two parties have overlooked these two,” says Sunil Abraham, director of the Bangalore based Centre for Internet and Society (CIS). Both Congress and BJP don’t mention about the lack of implementation of the open data policy. The policy, aka NDSAP 2012, requires all departments and ministries to put high value data sets in public domain within a few months of the policy enforcement. The parties are also silent on need for a balancing act on surveillance and civil liberty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nikhil Pahwa, founder of Medianama.com, a portal posting news and analysis on digital media, says “The parties could have talked about reforming the IT legislation, especially the Section 79 and IT Rules 2011 which gives the intermediaries—the ISPs, websites, and cyber cafes—the power to strike down content without even hearing the author.” The law, currently, doesn’t provide a redressal mechanism to the author.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly both parties are mute on internet governance, which has become a major global issue after the US showed willingness to cede its monopolistic oversight over the body governing the internet ICANN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Congress manifesto is also blank on making websites and systems accessible for specially-abled population, also called as e-accessibility. While the BJP too doesn’t talk about making government portals e-accessible, it speaks about the use of technology to deliver low cost quality education to specially-abled students. Issuance of universal identity cards for all applicable government benefits and disabled friendly access to public facilities are two other things which the party promises to implement if voted in power.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both election manifestoes don’t mention concerns related to telecommunication sector. Broadband is the only term that appears in the two manifestoes. The Congress promises to bring high speed Internet to every village panchayat. This is not a new initiative; a project under DoT called national optical fibre network, NOFN, proposes to do the same. The BJP’s manifesto says, “Deployment of broadband in every village would be a thrust area.”&lt;br /&gt; &lt;br /&gt;Both parties also talk about putting public services online. There is also nothing concrete about promotion of indigenous manufacturing in electronics and IT hardware. While there are serious omissions in the two manifestoes, the manifesto of the CPI-M surprises many, highlighting key issues concerning civil rights and liberty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The manifesto talks about ‘demilitarisation of cyber space’ and ‘protecting Internet and telecommunications networks from cyber attacks and surveillance by building indigenous capability’.  Edward Snowden’s revelation of the PRISM programme seems to be the context. It also talks about promoting ‘free software and other such new technologies which are free from monopoly ownership through copyrights or patents; knowledge commons should be promoted across disciplines, like biotechnology and drug discovery’.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/governance-now-april-12-2014-pratap-vikram-singh-parties-give-short-shrift-to-privacy'&gt;https://cis-india.org/news/governance-now-april-12-2014-pratap-vikram-singh-parties-give-short-shrift-to-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-05-05T05:54:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/parichiti-domestic-workers-access-to-secure-livelihoods-west-bengal">
    <title>Parichiti - Domestic Workers’ Access to Secure Livelihoods in West Bengal</title>
    <link>https://cis-india.org/raw/parichiti-domestic-workers-access-to-secure-livelihoods-west-bengal</link>
    <description>
        &lt;b&gt;This report by Anchita Ghatak of Parichiti presents findings of a pilot study conducted by the author and colleagues to document the situation of women domestic workers (WDWs) in the lockdown and the initial stages of the lifting of restrictions. This study would not have been possible without the WDWs who agreed to be interviewed for this study and gave their time generously. We are grateful to Dr Abhijit Das of the Centre for Health and Social Justice for his advice and help. The report is edited by Aayush Rathi and Ambika Tandon, and this work forms a part of the CIS’s project on gender, welfare and surveillance supported by Privacy International, United Kingdom.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Domestic Workers’ Access to Secure Livelihoods in West Bengal: &lt;a href="https://www.parichiti.org.in/ckfinder/userfiles/files/Final%20report_WDW_Lockdown.pdf" target="_blank"&gt;Read&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;h4&gt;Cross-posted from &lt;a href="https://www.parichiti.org.in/r&amp;amp;p.php" target="_blank"&gt;Parichiti&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;h2&gt;Executive Summary&lt;/h2&gt;
&lt;p&gt;Hundreds of thousands of women from poor communities work as domestic workers in Kolkata. Domestic work is typically a precarious occupation, with very little recognition in legislation or policy. Along with other workers in the informal economy, women domestic workers (WDWs) were severely impacted by the national lockdown enforced in March, with loss of livelihood and few options for survival.&lt;/p&gt;
&lt;p&gt;Parichiti works with WDWs in 20 different locations - slums and informal settlements in Kolkata and villages in south 24 Parganas. We conducted this pilot study from late June to August 2020 to document the situation of WDWs from March onwards, in the lockdown and the initial stages of lifting of restrictions. We interviewed 14 WDWs on the phone to record their experiences during the lockdown and after, including impact on livelihoods. The objectives of the study were to document the impact of the Covid-19 pandemic on the lives of WDWs, with focus on economic and health dimensions.&lt;/p&gt;
&lt;p&gt;We found that most domestic workers in our sample were paid for March, but faced difficulties in procuring wages April onwards. During this period, they faced economic hardships that threatened their survival, with members of their family also involved in the informal sector and experiencing loss of wages. Workers survived on relief received through civil society or by taking loans from banks or informal lenders. Some are now stuck in a debt trap.&lt;/p&gt;
&lt;p&gt;Most went back to work from June, but faced several barriers – public transport services continued to be dysfunctional, apartment complexes prohibited entry of outsiders, and employers were reluctant to allow workers into their homes. Employers were wary of workers if they were employed in multiple households or used public transport, forcing workers to adapt to these conditions. Due to these reasons, some workers lost their jobs permanently, while others returned with lower wages or lower number of employers. Workers were well aware of the precautions to be taken at the home and workplace with regards to Covid-19.&lt;/p&gt;
&lt;p&gt;Many WDWs were unable to access ration through the Public Distribution System. Some were not enrolled and others were enrolled in the districts they had migrated from. Some were not classified as below the poverty line and were hence not priority households for the state, although they were ‘deserving’ beneficiaries. All of the respondents were affected by Cyclone Amphan, which devastated parts of the state in May 2020. Despite the announcement of a sizeable compensation by the state, those whose homes were impacted were unable to get any relief. WDWs overall tended to not rely on the state for welfare or health services. Many regarded public health systems to have poor quality services, and turned to private services when possible. Both central and state governments fell short of meeting the needs of WDWs during the pandemic, which could potentially have long-term impact on their income and health.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/parichiti-domestic-workers-access-to-secure-livelihoods-west-bengal'&gt;https://cis-india.org/raw/parichiti-domestic-workers-access-to-secure-livelihoods-west-bengal&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Anchita Ghatak</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gig Work</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Network Economies</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Gender, Welfare, and Privacy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2020-12-30T10:01:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/factor-daily-sriram-sharma-december-12-2017-paranoid-about-state-surveillance-here-s-the-fd-guide-to-living-in-the-age-of-snoops">
    <title>Paranoid about state surveillance? Here’s the FD Guide to living in the age of snoops</title>
    <link>https://cis-india.org/internet-governance/news/factor-daily-sriram-sharma-december-12-2017-paranoid-about-state-surveillance-here-s-the-fd-guide-to-living-in-the-age-of-snoops</link>
    <description>
        &lt;b&gt;The US does it, so does China. Ever since Edward Snowden’s revelations back in 2013, which exposed the extent of the US’s global surveillance apparatus, the public has been fairly clued into the extent of mass surveillance.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Sriram Sharma was published in Factor Daily on December 12, 2017&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It doesn’t take a conspiracy theorist to worry that India does it (or  wants to), too, especially with the high decibel campaigns by banks,  telecom service providers and others to have Indians link Aadhaar, the  unique citizen ID, to multiple services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If you want a dystopian picture of the future of surveillance, look  no further than China, considered the world’s worst abuser of internet  freedom for the third year in a row, according to the new Freedom House,  a US-based NGO that conducts research and analysis on the internet.  With a &lt;a href="https://freedomhouse.org/report/freedom-net/2017/china" rel="noopener nofollow external noreferrer" target="_blank"&gt;score of 87/100&lt;/a&gt; (higher is worse), the Chinese state is renowned for its Great  Firewall, which filters access to the wider internet. “Digital activism  has declined amid growing legal and technical restrictions as well as  heavy prison sentences against prominent civil society figures,” the  latest Freedom House report notes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-12235" height="396" src="https://i0.wp.com/factordaily.com/wp-content/uploads/2017/12/freedom-of-net-india-2017.jpg?resize=660%2C416&amp;amp;ssl=1" width="629" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is rated “Partly Free” with a score of 41/100 (lower is better) in Freedom House’s 2017 report on internet freedom&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While it’s a long way away from China, India scores &lt;a href="https://freedomhouse.org/report/freedom-net/2017/india" rel="noopener nofollow external noreferrer" target="_blank"&gt;41/100&lt;/a&gt; on Internet Freedom in 2017 but is still considered only ‘partly free’  owing to blocking of internet and telecom service providers in Kashmir  and detainment of citizens for expressing their views online. The India  report from Freedom House highlights Aadhaar’s mandatory linking for a  wide range of schemes and records concerns regarding its privacy and  security implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this guide, we take a look at the why, what and how of India’s  surveillance apparatus, the legal provisions in the Indian constitution  that enables them, ask domain experts to provide us with tips on living  in an age of state surveillance. We also take a look at a variety of  widely used tools and apps that help you countering state surveillance  or tracking of any kind.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Know your Big Brother: India’s State Surveillance Programs &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Right to privacy organisation Privacy International has a detailed dossier on the &lt;a href="https://www.privacyinternational.org/node/975#toc-4" rel="noopener nofollow external noreferrer" target="_blank"&gt;state of privacy in India&lt;/a&gt;,  which examines India’s surveillance schemes, laws around interception  and access, and central intelligence agencies that carry out  surveillance. Apart from the state police and the army, surveillance is  carried out at least 16 different intelligence agencies, it notes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society (CIS) and Software Freedom Law  Centre (SFLC) have done extensive research in the past on India’s  surveillance apparatus. Earlier &lt;a href="https://cis-india.org/internet-governance/blog/the-design-technology-behind-india2019s-surveillance-programmes" rel="noopener nofollow external noreferrer" target="_blank"&gt;this year&lt;/a&gt;,  CIS reported on the various programs and tech infrastructure behind  India’s surveillance state: these include Central Monitoring System  (CMS), National Intelligence Grid (NATGRID), Network Traffic Analysis  System (NETRA), etc. An earlier &lt;a href="https://cis-india.org/internet-governance/blog/surveillance-industry-india.pdf" rel="noopener nofollow external noreferrer" target="_blank"&gt;CIS report&lt;/a&gt; highlights a boom in surveillance tech in India following the 26/11 terror attacks in Mumbai.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Based on an RTI (Right to Information) filing, SFLC’s &lt;a href="https://www.sflc.in/indias-surveillance-state-our-report-on-communications-surveillance-in-india" rel="noopener nofollow external noreferrer" target="_blank"&gt;2014 report&lt;/a&gt; on India’s Surveillance State reveals that around 7,500 to 9,000  telephone interception orders are issued by the central government alone  each month. State surveillance of citizens’ private communications is  authorised by laws that let them monitor phone calls, texts, e-mails and  Internet activity on a number of broadly worded grounds such as such as  ‘security of the state’, ‘defence of India’, and ‘public safety’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Government of India is also known to said to work with private  third parties, some of which go so far as to infect target devices using  malicious software to extract information on the subject. A 2013  Citizen Lab report titled ‘&lt;a href="https://citizenlab.ca/storage/finfisher/final/fortheireyesonly.pdf" rel="noopener nofollow external noreferrer" target="_blank"&gt;The Commercialisation of Digital Spying&lt;/a&gt;’  found command and control servers (used to control the host system) for  FinFisher (a remote computer monitoring software suite) in India. A  Wikileaks &lt;a href="https://gadgets.ndtv.com/internet/news/upa-was-client-of-controversial-italian-spyware-firm-claim-leaked-mails-713879" rel="noopener nofollow external noreferrer" target="_blank"&gt;expose in 2015&lt;/a&gt; dumped over a million emails belonging to Italian surveillance malware  vendor HackingTeam. The emails revealed how India’s top intelligence  agencies and the government expressed interest in buying Hacking Team’s  malware interception tools.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Fears of an Aadhaar Surveillance State&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Thejesh G N, an infoactivist wrote in &lt;i&gt;FactorDaily&lt;/i&gt; about &lt;a href="https://factordaily.com/hyderabad-police-surveillance-integrated-information-hub/"&gt;Hyderabad’s surveillance hub&lt;/a&gt;,  which wants to collect all manner of details. Aadhaar is one of the  primary keys to matching profiles with external data sources, he notes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-12230" height="457" src="https://i2.wp.com/factordaily.com/wp-content/uploads/2017/12/Aadhaar_Surveillance_infographic.jpg?resize=660%2C480&amp;amp;ssl=1" width="629" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;figure class="aligncenter wp-caption" id="attachment_12230"&gt;A look at data points gathered by Hyderabad’s Integrated Information Hub&lt;/figure&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The end product shows on a map where you live, what you consume, did  you take PDS, move to some other place, your mobile number, gender…  there’s a lot of data in the hands of the very lowest level of  government, which doesn’t have any protection as by a parliamentary  committee or anything like that. It’s run by bureaucrats, so that has  huge implications,” he says. “If you see Citizen Four (a 2014  documentary about Edward Snowden), it shows a similar system, where you  enter one’s SSN, and it shows everything you have done, and are planning  to do. We are building the same system…Governments change, today we  might have a good government, tomorrow we might have the worst possible  government on the planet.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Policy Director of CIS says he doesn’t regard Aadhaar as a surveillance project. “I see Aadhaar as something that can facilitate surveillance, but by and of itself, it isn’t surveillance,” he says, adding that it does so in a non-consensual manner. “By having Aadhaar numbers across multiple databases, you make surveillance easier. But you need to tie it up to a surveillance system. For instance, Aadhaar without NATGRID isn’t surveillance, but Aadhaar with NATGRID can be helpful for surveillance.” NATGRID (National Intelligence Grid) was first proposed in late 2009 following 26/11 attacks by the Union Home Minister, to enhance India’s counter-terror capabilities. It links 21 citizen databases for access to intelligence/enforcement agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="size-full wp-image-12236" height="354" src="https://i1.wp.com/factordaily.com/wp-content/uploads/2017/12/screenshot.jpg?resize=660%2C371&amp;amp;ssl=1" width="629" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ongrid’s website earlier had this visualisation depicting its  verification service, which made privacy advocates cringe.  Source:  Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We discussed some worst-case scenarios around the commercial use of  Aadhaar and India Stack companies with Thejesh. “Let’s say there’s a  screening company and they have your Aadhaar ID. They will send it to  Airtel, or Vodafone, and ask for a list of all the websites you have  viewed. Maybe you’ve watched porn or something, at some point in your  life, and that could hurt your employment,” he says.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Curbing your data exhaust&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The EFF (Electronic Frontier Foundation) has published a number of&lt;a href="https://www.eff.org/deeplinks/2013/10/ten-steps-against-surveillance" rel="noopener nofollow external noreferrer" target="_blank"&gt; useful articles&lt;/a&gt; and&lt;a href="https://ssd.eff.org/en" rel="nofollow external noopener noreferrer"&gt; resources&lt;/a&gt; for countering internet surveillance. Recommendations include using  end-to-end encryption through tools such as  OTR (a messaging protocol  available on Adium),&lt;a href="https://ssd.eff.org/en/module/how-use-pgp-mac-os-x" rel="noopener nofollow external noreferrer" target="_blank"&gt; PGP&lt;/a&gt; (to exchange secure emails), and Signal (messenger).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other useful tips:&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Use VPNs &lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;VPNs (virtual private networks) use encryption protocols and secure  tunneling techniques to keep your internet activity impervious to  snooping. With a VPN, you can bypass ISP restrictions on blocked  websites or access services (Spotify) not available in your country,  making it appear that you are browsing from another part of the world.  Keep in mind that you can still be outed by your VPN provider, so it’s  important to choose one that respects your privacy. There are hundreds  of VPN service providers to choose from, &lt;a href="https://thatoneprivacysite.net/vpn-comparison-chart/" rel="noopener nofollow external noreferrer" target="_blank"&gt;That One Privacy Guy&lt;/a&gt; maintains a detailed comparison chart of over a hundred VPN providers,  with details on jurisdiction, price, ethics, logging policies, VPN  protocols supported, and more. Out of these, the country that the VPN  provider is based in is a key filter: you don’t want to choose a VPN  service based out of the ‘&lt;a href="https://restoreprivacy.com/5-eyes-9-eyes-14-eyes/" rel="noopener nofollow external noreferrer" target="_blank"&gt;14 eyes&lt;/a&gt;‘, as they are known to do mass surveillance.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Use TOR&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Tor, an acronym for ‘The Onion Router’, is a free app that lets you  anonymise your online communication by directing a web browser’s traffic  through a volunteer-run network of thousands of servers. It is funded  by the US-based National Science Foundation, Mozilla, and Open  Technology Fund, among others. Tor is &lt;a href="https://www.torproject.org/download/download-easy.html.en" rel="noopener nofollow external noreferrer" target="_blank"&gt;available for download&lt;/a&gt; on Windows, Mac, Linux, and Android.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="wp-image-12257 size-full" height="579" src="https://i0.wp.com/factordaily.com/wp-content/uploads/2017/12/tor-web-browser.jpg?resize=660%2C607&amp;amp;ssl=1" width="629" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;figure class="aligncenter wp-caption" id="attachment_12257"&gt;Browsing on Tor can be far slower than a regular web browser, but it keeps you anonymous.&lt;/figure&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Encrypt your storage&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It’s now a default feature on your phone, or computer, so there’s no  reason why you shouldn’t make use of it. To check if it is turned on in  Windows 10, Go to Settings &amp;gt; System &amp;gt; About, and look for a  “Device encryption” setting at the bottom of the About tab. Keep in mind  that you need to sign into Windows with a Microsoft account &lt;a href="http://www.independent.co.uk/news/edward-snowden-claims-microsoft-collaborated-with-nsa-and-fbi-to-allow-access-to-user-data-8705755.html" rel="noopener nofollow external noreferrer" target="_blank"&gt;to enable this setting&lt;/a&gt;, so it’s likely that the NSA or FBI might be able to bypass it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On a Mac, you turn on full-disk encryption through FileVault, accessible in &amp;gt; System Preferences &amp;gt; Security &amp;amp; Privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On an iPhone, data protection is enabled once you set up a passcode on your device.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Android 5.0 and above devices support full-disk encryption. If it  isn’t turned on by default on your device, you can turn on encryption  under the Security menu.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sensitive documents can also be encrypted using &lt;a href="http://truecrypt.sourceforge.net" rel="noopener nofollow external noreferrer" target="_blank"&gt;TrueCrypt&lt;/a&gt;. Though you must keep in mind that key disclosure laws apply in India, under the Section 69 of the &lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20(amendment).pdf" rel="noopener nofollow external noreferrer" target="_blank"&gt;Information Technology Act&lt;/a&gt;,  which states that there’s a seven-year prison sentence for failing to  assist the central and state governments in decrypting information on a  computer resource.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Use an air-gapped PC&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;An air-gapped PC is one that is not connected to the internet or to  any computers that are connected to the internet. Air-gapped PCs are  typically used when handling critical infrastructure, and this is an  extreme measure one can take when working with sensitive data that you  don’t want to be leaked.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Use&lt;/b&gt;&lt;a href="https://www.eff.org/https-everywhere" rel="noopener nofollow external noreferrer" target="_blank"&gt; &lt;b&gt;HTTPS everywhere&lt;/b&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;HTTPS Everywhere offers plugins for Firefox, Chrome, and Opera, and  turns every link you open or key in, to a secure version of the HTTP  protocol, which is encrypted by Transport Layer Security (TLS). The tool  protects you from eavesdropping or tampering with the site you are  visiting, but only works on sites that support HTTPS. Keep in mind that  this tool won’t conceal the sites you have accessed from eavesdroppers  but it won’t reveal the specific URL that you visited.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Turn on Advanced Protection in Gmail&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;If you trust Gmail with your data, take the relationship to the next level with &lt;a href="https://landing.google.com/advancedprotection/" rel="noopener nofollow external noreferrer" target="_blank"&gt;Advanced Protection&lt;/a&gt;,  which safeguards your account against phishing attacks, limits access  to trusted apps, and adds extra verification features to block  fraudulent account access. You will need a &lt;a href="https://myaccount.google.com/advanced-protection/enroll/details?pli=1" rel="noopener nofollow external noreferrer" target="_blank"&gt;Bluetooth key and a USB key&lt;/a&gt; to turn this feature on.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Some other don’ts&lt;/b&gt;&lt;/h2&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Don’t leave any cameras open. Tape them up if you are a potential surveillance target.&lt;/li&gt;
&lt;li&gt;Don’t use freemium apps, which trade in your privacy. A recent example of a&lt;a href="http://www.zdnet.com/article/popular-virtual-keyboard-leaks-31-million-user-data/" rel="noopener nofollow external noreferrer" target="_blank"&gt; worst-case scenario&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Don’t send any data via free email services that you would like to keep private.&lt;/li&gt;
&lt;li&gt;Don’t use Google or Facebook, as Snowden says, if you value your privacy. Don’t take our &lt;a href="https://techcrunch.com/2014/10/11/edward-snowden-new-yorker-festival/" rel="noopener nofollow external noreferrer" target="_blank"&gt;word for it&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;As for Aadhaar, Thejesh says that there isn’t much one can do as it  is forcibly linked to many essential services. He recommends using  different email ids for official work and unofficial work. “Use one  email ID for Aadhaar and mobile related accounts, and use the other one  for regular communication. It separates the accounts from surveillance  and adds a layer of security,” he says. “Don’t use Aadhaar until is  necessary. If you use Aadhaar and you are not in a mood to resist  everything, then don’t use it where it is not required. Don’t use it  like a regular address proof,” he adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If you are already an Aadhaar holder, it makes sense to use the biometric locking system provided by UIDAI on &lt;a href="https://resident.uidai.gov.in/biometric-lock" rel="noopener nofollow external noreferrer" target="_blank"&gt;its website&lt;/a&gt; to protect against identity theft and unauthorised access. The  biometric locking feature sends an OTP code to your registered mobile  number to unlock or disable the locking system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If someone is concerned about surveillance, CIS’s Prakash recommends  not having a cell phone. “The cellphone is the single largest means of  data gathering about you,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance can take many forms: it can be physical or off-the-air  surveillance (an interception technique used to snoop on phone calls),  he points out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;figure class="aligncenter wp-caption" id="attachment_12232"&gt;&lt;img class="size-full wp-image-12232" height="415" src="https://i2.wp.com/factordaily.com/wp-content/uploads/2017/12/surveillance-cctv.jpg?resize=660%2C436&amp;amp;ssl=1" width="629" /&gt;A CCTV camera fitted on top of a Hyderabad Police vehicle&lt;/figure&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance is not always bad: medical surveillance, for instance,  an entire field around the spread of diseases, is necessary, Prakash  clarifies. “Even state surveillance for national security purposes is  absolutely necessary. A nation-state can’t survive without surveillance  so I am quite clear that those who oppose all forms of surveillance are  opposing all kinds of rights – because you can’t have rights without  security. And indeed, individual security is a human right guaranteed  under the Universal Declaration of Human Rights and guaranteed in  Article 21 of the Indian Constitution. Without security of the person,  you can’t have the right to freedom of speech, you can’t enjoy the right  to privacy… If you’re in a state of war or in a state of terror, then  you can’t enjoy rights – so clearly for me, surveillance is necessary,”  he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That said, surveillance in India is highly problematic as the laws  and the democratic framework for surveillance is very weak, and  enforcement of that framework is even worse, Prakash adds. “One of the  best ways of countering surveillance, I would suggest, is to actually  demand a democratic framework for surveillance in India. Demand that  your MLA and MP take up this issue at the state and central level… and  that we have a democratic framework for both our intelligence agencies  and for all the surveillance that is conducted by the state in India,”  he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He calls everything else – “the technological stuff, using  anonymising networks, end-to-end encryption” – a second order issue. “It  can help you as an individual, but it doesn’t help us as a society.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/factor-daily-sriram-sharma-december-12-2017-paranoid-about-state-surveillance-here-s-the-fd-guide-to-living-in-the-age-of-snoops'&gt;https://cis-india.org/internet-governance/news/factor-daily-sriram-sharma-december-12-2017-paranoid-about-state-surveillance-here-s-the-fd-guide-to-living-in-the-age-of-snoops&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2017-12-16T13:38:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/paper-thin-safeguards.pdf">
    <title>Paper-thin Safeguards and Mass Surveillance in India File</title>
    <link>https://cis-india.org/internet-governance/blog/paper-thin-safeguards.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/paper-thin-safeguards.pdf'&gt;https://cis-india.org/internet-governance/blog/paper-thin-safeguards.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-06-20T10:12:04Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
