<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 551 to 565.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/february-2015-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-march-17-2015-aadhaar-an-identity-crisis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell-us-about-indian-government-record-on-free-expression-and-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/state-of-cyber-security-and-surveillance-in-india.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/surveillance-industry-india.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/policy-recommendations-for-surveillance-law-in-india-and-analysis-of-legal-provisions-on-surveillance-in-india-and-the-necessary-and-proportionate-principles.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-of-news-items-and-cases-on-surveillance-and-digital-evidence-in-india.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/surveillance-and-security-industry-in-india.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-joins-worldwide-campaign-to-discover-depth-of-gchq-illegal-spying"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/preliminary-submission-on-internet-governance-issues-to-assocham"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy">
    <title>Security, Governments and Data: Technology and Policy </title>
    <link>https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy</link>
    <description>
        &lt;b&gt;On January 8, 2015, the Centre for Internet and Society, in collaboration with the Observer research foundation, hosted the day long conference "Security, Governments, and Data: Technology and Policy"  The conference discussed a range of topics including internet governance, surveillance, privacy, and cyber security. &lt;/b&gt;
        &lt;p&gt;The full report written and compiled by Lovisha Aggarwal and Nehaa Chaudhari and edited by Elonnai Hickok &lt;a href="https://cis-india.org/internet-governance/blog/security-governments-data-technology-policy.pdf" class="internal-link"&gt;can be accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The conference was focused on the technologies, policies, and practices around cyber security and surveillance. The conference reached out to a number of key stakeholders including civil society, industry, law enforcement, government, and academia and explored the present scenario in India to reflect on ways forward. The conference was a part of CIS’s work around privacy and surveillance, supported by Privacy International.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Welcome Address&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The welcome address opened with a reference to a document circulated by CIS in 2014 which contained hypothetical scenarios of potential threats to Indian cyber security. This document highlighted the complexity of cyber security and the challenges that governments face in defending their digital borders. When talking about cyber security it is important that certain principles are upheld and security is not pursued only for the sake of security. This approach allows for security to be designed and to support other rights such as the right of access, the right to freedom of expression, and the right to privacy. Indeed, the generation, use, and protection of communications data by the private sector and the government are a predominant theme across the globe today. This cannot be truer for India, as India hosts the third largest population on the internet in the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the welcome, a brief introduction to the Centre for Internet and Society was given. It was noted that CIS is a 6.5 half year old organization that is comprised of lawyers, mathematicians, sociologists, and computer scientists and works across multiple focus areas including accessibility, internet governance, telecom, openness, and access to knowledge. CIS began researching privacy and surveillance in 2010, and has recently begun to expand their research into cyber security. The purpose of this is to understand the relationship between privacy, surveillance, and security and is the beginning of a learning process for CIS. In 2013 CIS undertook a process to attempt to evolve a legal regime to intelligently and adequately deal with privacy in India. Industry specific requirements are key in the Indian context and this process was meant to try and evolve a consensus on what a privacy law in India should look like by bringing together key stakeholders for roundtables. CIS is now in the final stages of preparing individual legal proposals that will be sent to the Government – to hopefully have an informed Privacy Law in India. This event represents CIS’s first attempt to have a simultaneous dialogue on surveillance, cyber security, and privacy. As part of this event and research CIS is trying to understand the technology and market involved in surveillance and cyber security as these are important factors in the development of policy and law.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy'&gt;https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-04-04T05:59:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/february-2015-bulletin">
    <title>February 2015 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/february-2015-bulletin</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;It is my distinct pleasure to share with you the second issue of the CIS newsletter (February 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, I joined the Centre for Internet and Society (CIS) as the Research Director. I have been fortunate to periodically work with CIS in 	various capacities since mid-2012, mostly focusing on the topics of open data, open access, and visual exploration of data. Most importantly perhaps for my 	present responsibilities, for the last year or so, I have been in communication with various projects teams at CIS and supported their efforts through 	workshops on research methodologies, and by discussing and co-designing their research questions and approaches.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the Research Director, I look forward to take these works forward, along with leading the Researchers at Work (RAW) programme, which has been shaped by 	Prof. Nishant Shah to host an exciting range of critical research initiatives into how the Internet and digital technologies reconfigure social processes 	and structures, and vice versa. Please keep an eye on the newsletter for further updates from the RAW programme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our sincere apologies for the delay in sending out this month's newsletter. We will soon be back in our usual rhythm. The past editions of the newsletter 	can be accessed at &lt;a href="http://cis-india.org/about/newsletters"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sumandro Chattapadhyay 	&lt;br /&gt; Email: &lt;a href="mailto:sumandro@cis-india.org"&gt;sumandro@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Highlights&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Forbes India in an article titled "	&lt;a href="http://forbesindia.com/article/special/minds-that-%28should%29-matter/39289/2"&gt;Minds that (should) matter&lt;/a&gt;" names Sunil Abraham as one of the Thinkers who best explain a rapidly-changing India to the world (and the world to India).	&lt;i&gt;Errata: This story was shared in the last newsletter but with an error, which is now rectified.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;NVDA team organized three workshops during the month for training participants on using eSpeak with NVDA software. The languages covered were&lt;a href="https://cis-india.org/accessibility/blog/report-on-training-of-use-of-e-speak-punjabi-nvda"&gt;Punjabi&lt;/a&gt;,&lt;a href="https://cis-india.org/accessibility/blog/report-on-training-in-use-of-e-speak-oriya-with-nvda"&gt;Oriya&lt;/a&gt; and	&lt;a href="https://cis-india.org/accessibility/blog/training-on-use-of-espeak-hindi-nvda"&gt;Hindi&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;The Department of Industrial Policy and Promotion (DIPP), Government of India invited comments on the First Draft of India's National IPR Policy. 	&lt;a href="https://cis-india.org/a2k/blogs/national-ipr-policy-series-cis-comments-to-the-first-draft-of-the-national-ip-policy"&gt; CIS sent its comments &lt;/a&gt; . CIS commended the DIPP for this initiative and appreciated the opportunity to provide comments on the National IPR Policy. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; CIS sent out 		&lt;a href="https://cis-india.org/a2k/blogs/rti-requests-dipp-details-on-constitution-and-working-of-ipr-think-tank"&gt; three different Right to Information (RTI) requests &lt;/a&gt; to find out more details about the constitution and working of the IPR Think Tank to draft the first national IPR Policy. &lt;/li&gt;
&lt;li&gt; Anubha Sinha 		&lt;a href="https://cis-india.org/a2k/blogs/academia-and-civil-society-submit-critical-comments-to-dipp-on-draft-national-ipr-policy"&gt; analyses the submission &lt;/a&gt; to the DIPP by Academia and Civil Society on the draft National IPR Policy from a public interest perspective. &lt;/li&gt;
&lt;li&gt; In an &lt;a href="https://cis-india.org/a2k/blogs/open-letter-to-prime-minister-modi"&gt;Open Letter to the Prime Minister of India&lt;/a&gt;, CIS requests 		the Government of India to initiate the formation of a patent pool of critical mobile technologies and a five per cent compulsory license.&lt;/li&gt;
&lt;li&gt;CIS's Access to Knowledge team (CIS-A2K) in collaboration with the Centre for Indian Languages (CILHE) at TISS, Mumbai	&lt;a href="https://cis-india.org/openness/blog/developing-open-knowledge-digital-resources-in-indian-languages"&gt;conducted a two-day workshop&lt;/a&gt; at 	English and Foreign Languages University (EFLU) at Hyderabad on January 28 - 29, 2015. Tejaswini Niranjana captures the developments in a blog post. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Subhashish Panigrahi wrote an		&lt;a href="https://cis-india.org/openness/blog/our-endangered-languages"&gt;op-ed on the endangered languages in India&lt;/a&gt;. This was published by 		Odia daily Samaja on February 21 which is celebrated as the International Mother Language Day. &lt;/li&gt;
&lt;li&gt; CIS-A2K team conducted the "		&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Events/Train_the_Trainer_Program/2015"&gt;Train the Trainer Program&lt;/a&gt;" (TTT 2015) at 		CEO Centre, Dodda Gubbi, Bangalore. About 25 delegates attended the programme. &lt;/li&gt;
&lt;li&gt; CIS has 		&lt;a href="https://cis-india.org/internet-governance/blog/cis-joins-worldwide-campaign-to-discover-depth-of-gchq-illegal-spying"&gt; joined an international campaign &lt;/a&gt; to allow anyone in the world to request whether Britain's intelligence agency GCHQ has illegally spied on them.&lt;/li&gt;
&lt;li&gt;On January 30, 2015, Associated Chambers of Commerce &amp;amp; Industry of India (ASSOCHAM) held a consultation on Internet governance. A committee was 	set up to draft a report on Internet governance, with a focus on issues relevant to India. CIS is represented on the committee, and has provided its 	&lt;a href="https://cis-india.org/internet-governance/blog/preliminary-submission-on-internet-governance-issues-to-assocham"&gt; preliminary comments to ASSOCHAM &lt;/a&gt; . &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; As part of		&lt;a href="https://cis-india.org/internet-governance/blog/collection-of-net-neutrality-definitions"&gt;CIS's inquiry into 'Network Neutrality'&lt;/a&gt; in 		the developing world a set of definitions of the term from different sources was collected and published as a blog post. &lt;/li&gt;
&lt;li&gt; Namita A. Malhotra in a &lt;a href="https://cis-india.org/raw/figures-of-learning-the-pornographer"&gt;blog entry&lt;/a&gt; examines the figure of the 		pornographer, as a mixed media figure entrenched in various networks of knowledge production, circulation and consumption. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility and Inclusion &lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Under a grant from the Hans Foundation we are doing two projects. The first project is on creating a national resource kit of state-wise laws, policies and 	programmes on issues relating to persons with disabilities in India. CIS in partnership with CLPR (Centre for Law and Policy Research) compiled the 	National Compendium of Policies, Programmes and Schemes for Persons with Disabilities (29 states and 6 union territories). The publication has been finalised and is being printed. The draft chapters and the quarterly reports can be accessed on the	&lt;a href="http://cis-india.org/accessibility/resources/national-resource-kit-project"&gt;project page&lt;/a&gt;. The second project is on developing text-to-speech software for 15 Indian languages. The progress made so far in the project can be accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►NVDA and eSpeak&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Monthly Update&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/accessibility/blog/nvda-e-speak-report-february-2015.pdf"&gt;February 2015 Report&lt;/a&gt; (Suman Dogra; February 28, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Events Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/accessibility/blog/training-on-use-of-espeak-hindi-nvda"&gt;&lt;b&gt; &lt;/b&gt;Joint Report on Training of the Use of eSpeak in Hindi with NVDA &lt;/a&gt; (Organized by NVDA team; National Association for the Blind, New Delhi, February 5 - 6, 2015 and Blind Relief Association, Delhi, February 13 - 14, 		2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/blog/report-on-training-in-use-of-e-speak-oriya-with-nvda"&gt; Report on Training in the use of eSpeak Oriya with NVDA &lt;/a&gt; (Organized by NVDA team; Orissa Association for the Blind, Bhubaneswar; February 8 - 10, 2015). Thirty six delegates attended the workshop. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/blog/report-on-training-of-use-of-e-speak-punjabi-nvda"&gt; Training of the use of eSpeak Punjabi with NVDA &lt;/a&gt; (Organized by NVDA team; Asha Kiran Training Institute, Chandigarh; February 20-21, 2015). The workshop was inaugurated by Shri Tilak Raj, Director, 		Ministry of Social Justice and Empowerment, Government of Punjab. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International 	Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support 	intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a 	grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships 	that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Pervasive Technologies&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the Pervasive Technologies project, Rohini Lakshané wrote an Open Letter to India's Prime Minister, Shri Narendra Modi for creation of a 	patent pool of critical mobile technologies. And as part of broader Access to Knowledge work CIS submitted comments to DIPP on the National IP Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/national-ipr-policy-series-cis-comments-to-the-first-draft-of-the-national-ip-policy"&gt; National IPR Policy Series: CIS Comments to the First Draft of the National IP Policy &lt;/a&gt; (Nehaa Chaudhari, Pranesh Prakash and Anubha Sinha; February 4, 2015). Varnika Chawla assisted the team. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/rti-requests-dipp-details-on-constitution-and-working-of-ipr-think-tank"&gt; RTI Requests - DIPP: Details on constitution and working of IPR Think Tank &lt;/a&gt; (Nehaa Chaudhari; February 9, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/open-letter-to-prime-minister-modi"&gt;Open Letter to Prime Minister Modi&lt;/a&gt; (Rohini Lakshané; February 10, 2015). Copies of the open letter were sent to various ministers. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/academia-and-civil-society-submit-critical-comments-to-dipp-on-draft-national-ipr-policy"&gt; Academia and Civil Society submit critical comments to DIPP on draft National IPR Policy &lt;/a&gt; (Anubha Sinha; February 16, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/news/india-at-leisure"&gt;India at Leisure: Media, Culture and Consumption in the New Economy&lt;/a&gt; (Organized by Jamia University; January 8 - 10, 2015). Maggie Huang attended the event and presented a paper titled "The Future of Music Streaming: 		Business Practices and Copyright Management in India". The paper was co-authored by Maggie and Amba Kak. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in 	Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Op-ed&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/blog/our-endangered-languages"&gt;Our Endangered Languages&lt;/a&gt; (Subhashish Panigrahi; February 21, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/blog/a-wikipedia-presentation-at-goa"&gt;A Wikipedia Presentation at BITS, Goa&lt;/a&gt; (Radhakrishna Arvapally; February 9, 2015). Arvapally was a guest blogger. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/developing-open-knowledge-digital-resources-in-indian-languages"&gt; Developing Open Knowledge Digital Resources in Indian Languages &lt;/a&gt; (Tejaswini Niranjana; February 20, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/telugu-wikipedia-winter-camp-at-andhra-loyola-college"&gt; Telugu Wikipedia Winter Camp at Andhra Loyola College &lt;/a&gt; (Rahmanuddin Shaik; February 26, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/openness/events/train-the-trainer-program"&gt;Train the Trainer&lt;/a&gt; (Organized by CIS-A2K; CEO Centre, Dodda Gubbi, Bangalore; February 26 - March 1, 2015). Rohini Lakshané took a session on GLAM. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;News and Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K team gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/the-hindu-february-16-2015-ad-rangarajan-more-online-free-content-in-telugu-wikipedia-soon"&gt; More online free content in Telugu Wikipedia soon &lt;/a&gt; (A.D.Rangarajan; Hindu, February 16, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/opensource-feburary-18-2015-jen-wike-huger-cultural-knowledge-needs-to-be-more-open"&gt; Cultural knowledge needs to be more open &lt;/a&gt; (Jen Wike Huger; OpenSource.com; February 18, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/andhra-jyothy-february-16-2015-online-free-content-in-telugu-wikipedia"&gt; Online Free Content in Telugu Wikipedia &lt;/a&gt; (Andhra Jyothy; February 19, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Announcements&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/news/opensource-2015-award-winners"&gt;2015 Opensource.com Community Awards&lt;/a&gt; : Every year, Opensource.com awards people from our community who have excelled in contributing and sharing stories about open source. Subhashish 		Panigrahi from the CIS-A2K team won the award under the category 'People's Choice Awards'. &lt;/li&gt;
&lt;li&gt; CIS-A2K team also &lt;a href="http://stats.wikimedia.org/EN/TablesWikipediaTE.htm"&gt;published the Telugu Wikipedia Stats tables&lt;/a&gt;. Most metrics have been 		collected from a partial dump (aka stub dump), which contains all revisions of every article, meta data, but no page content. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/blog/how-the-first-time-face-to-face-interaction-helped-india-hindi-wikipedia-community"&gt;&lt;b&gt; &lt;/b&gt;Hindi Wiki Community Baithak &lt;/a&gt; (Organized by Wikipedia Community; February 14 - 15, 2015). Subhashish Panigrahi attended the event. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/international-conclave-odia-language"&gt;An International Conclave of Odia Language&lt;/a&gt; (Organized by the Intellects; February 20 - 21, 2015; Constitutional Club, Rafi Marg, New Delhi). Subhashish Panigrahi participated in the event. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Openness&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/news/region-open-data-workshop-2015"&gt;Regional Open Data Agenda-Setting Workshop 2015&lt;/a&gt; (Organized by Open Data Lab, Jakarta Web Foundation; Jakarta; February 4 - 6, 2015). Sunil Abraham was a speaker. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/washington-meeting-on-open-data-principles"&gt;Washington Meet on Open Data&lt;/a&gt; (Organized by World Bank; Washington; February 20 - 21, 2015). Sunil Abraham was a speaker and made a presentation on Open Data. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and 	International Development Research Centre (IDRC)) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur 	Foundation) is on studying the restrictions placed on freedom of expression online by the Indian goverTnment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Privacy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos"&gt;&lt;b&gt; &lt;/b&gt;The Surveillance Industry in India - An Analysis of Indian Security Expos &lt;/a&gt; (Divij Joshi; February 19, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/rti-requests-to-bsnl-mtnl-regarding-security-equipment"&gt; Right to Information (RTI) Requests to BSNL and MTNL Regarding Security Equipment &lt;/a&gt; (Maria Xynou; February 25, 2015). CIS had sent RTI requests to MTNL and BSNL in July 2013. MTNL responded recently whereas BSNL has yet to reply. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Announcements&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;CIS joins Worldwide Campaign to Discover Depth of GCHQ's Illegal Spying (Elonnai Hickok; February 28, 2015). Individuals who wish to take part in 	this process can sign up at &lt;a href="https://www.privacyinternational.org/illegalspying"&gt;https://www.privacyinternational.org/illegalspying&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Prof. Peng Hwa Ang from Nanyang Technology University visited CIS recently. He had a series of interactions with several researchers at CIS and has 	prepared a &lt;a href="https://cis-india.org/internet-governance/blog/peng-hwa-trip-report.pdf"&gt;brief visit report&lt;/a&gt;. Impressed with the research 	work of CIS he had discussions with CIS on possible collaborations including publication in more academic journals, collaboration with academic 	institutions in research projects in Privacy / Data Protection and other areas of Internet Governance. He also discussed on the possible areas where he 	could contribute to CIS including conduction of training session on writing for academic journals.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Freedom of Expression&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;Requests to ICANN: CIS sent ICANN six requests to ICANN regarding ICANN's expenditure on travels and meetings, granular revenue, cyber-attacks on 	ICANN, ICANN's implementation of the NETmundial principles, complaints under the Ombudsman process, and information regarding revenues received from gTLD 	auctions. These were prepared by Geetha Hariharan: 	&lt;a href="https://cis-india.org/internet-governance/blog/didp-request-1-icanns-expenditures-on-travel-meetings"&gt; DIDP Request #1: ICANN's Expenditures on "Travel &amp;amp; Meetings" &lt;/a&gt; ; &lt;a href="https://cis-india.org/internet-governance/blog/didp-request-2"&gt;DIDP Request #2: Granular Revenue/Income Statements from ICANN&lt;/a&gt;;	&lt;a href="https://cis-india.org/internet-governance/blog/didp-request-3-cyber-attacks-on-icann"&gt;DIDP Request #3: Cyber-attacks on ICANN&lt;/a&gt;; 	&lt;a href="https://cis-india.org/internet-governance/blog/didp-request-4-icann-and-the-netmundial-principles"&gt; DIDP Request #4: ICANN and the NETmundial Principles &lt;/a&gt; ; 	&lt;a href="https://cis-india.org/internet-governance/blog/didp-request-5-the-ombudsman-and-icanns-misleading-response-to-our-request-1"&gt; DIDP Request #5: The Ombudsman and ICANN's Misleading Response to Our Request &lt;/a&gt; ; and	&lt;a href="https://cis-india.org/internet-governance/blog/didp-request-6-revenues-from-gtld-auctions"&gt;DIDP Request #6: Revenues from gTLD auction&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/collection-of-net-neutrality-definitions"&gt;Collection of Net Neutrality Definitions&lt;/a&gt; (Tarun Krishnakumar; February 8, 2015). The definitions were compiled by Manoj Kurbet, Maitreya Subramaniam and Tarun Krishnakumar under the guidance 		of Sunil Abraham. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/icann-accountability-iana-transition-and-open-questions"&gt; ICANN accountability, IANA transition and open questions &lt;/a&gt; (Geetha Hariharan; February 6, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/where-does-icann2019s-money-come-from-we-asked-they-don2019t-know"&gt; Where Does ICANN's Money Come From? We Asked; They Don't Know &lt;/a&gt; (Geetha Hariharan; February 9, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/preliminary-submission-on-internet-governance-issues-to-assocham"&gt; Preliminary Submission on "Internet Governance Issues" to the Associated Chambers of Commerce &amp;amp; Industry of India &lt;/a&gt; (Geetha Hariharan; February 12, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Miscellaneous&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/gender-it-february-19-2015-selection-tweets-how-make-crowdmaps-effectual-mapping-violence-against-women"&gt; A Selection of Tweets on How to Make Crowdmaps Effectual for Mapping Violence against Women &lt;/a&gt; (Rohini Lakshané; February 19, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/reply-to-rti-applications-with-respect-to-foreign-contractors-and-vendors-of-it-and-telecommunication-enterprises"&gt; Reply to RTI Applications filed with respect to Foreign Contractors and Vendors of IT and Telecommunication Enterprises &lt;/a&gt; (Lovisha Aggarwal; February 25, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Co-organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/events/digital-security-workshop-for-journalists"&gt;&lt;b&gt; &lt;/b&gt;Digital Security Workshop for Journalists &lt;/a&gt; (Organized by CIS and Mumbai Press Club; Mumbai Press Club, Azad Maidan, Mumbai; February 7, 2015). Rohini Lakshané conducted the workshop as part 		of the Cyber Stewards project. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/events/talk-on-cybersecurity-and-internet-of-things"&gt;&lt;b&gt; &lt;/b&gt;Cybersecurity and the Internet of Things &lt;/a&gt; (Organized by US Consulate Chennai, Cyber Security &amp;amp; Privacy Foundation and CIS; Hotel Atria, Palace Road, Bangalore; March 19, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection"&gt;&lt;b&gt; &lt;/b&gt;Winter School on Privacy, Surveillance and Data Protection &lt;/a&gt; (Organized by the Centre for Communication Governance (CCG) in collaboration with the UNESCO Chair on Freedom of Communication and Information at the University of Hamburg and the Hans Bredow; Delhi; January 19 - 23, 2015). Bhairav Acharya was a facilitator.		&lt;i&gt;Errata: This was wrongly mentioned in the last newsletter. We have corrected this&lt;/i&gt;. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/net-gain-working-together-for-stronger-digital-society"&gt; NetGain: Working Together for a Stronger Digital Society &lt;/a&gt; (Organized by Ford Foundation; February 11 - 12, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------- 	&lt;br /&gt; &lt;a href="http://cis-india.org/news"&gt;News &amp;amp; Media Coverage&lt;/a&gt; &lt;br /&gt; --------------------------------- 	&lt;br /&gt; CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/pc-world-john-riberio-february-10-2015-facebook-offers-free-but-limited-access-to-the-internet-in-india"&gt; Facebook offers free but limited access to the Internet in India &lt;/a&gt; (PC World; February 10, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/livemint-february-10-2015-moulishree-srivastava-govt-may-turn-to-supercomputing-for-better-use-of-aadhaar-database"&gt; Govt may turn to supercomputing for better use of Aadhaar database &lt;/a&gt; (Moulishree Srivastava; Livemint; February 10, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/business-standard-february-20-2015-surabhi-agarwal-analytics-to-help-govt-read-public-mood-online"&gt; Analytics to help govt read public mood online &lt;/a&gt; (Surabhi Talwar; Business Standard; February 10, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/hindu-lalatendu-mishra-sriram-srinivasan-february-11-2015-hindu-facebook-launches-internet-org-in-india"&gt; Facebook launches Internet.org in India &lt;/a&gt; (Lalatendu Mishra and Sriram Srinivasan; Hindu; February 11, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/india-today-february-25-2015-sahil-mohan-gupta-google-war-on-nude-photos-goes-against-user-rights"&gt; Google's war on nude photos goes against user rights &lt;/a&gt; (Sahil Mohan Gupta; India Today; February 25, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked"&gt; Hacking of SIM card by spy agencies raises fears of sensitive documents being leaked &lt;/a&gt; (PK Jayadevan and Neha Alawadhi; Economic Times; February 25, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/economic-times-harsimran-julka-february-25-2015-delhi-government-in-consultation-with-centre-to-block-ubers-internet-address"&gt; Delhi government in consultation with Centre to block Uber's Internet address &lt;/a&gt; (Harsimran Julka; Economic Times; February 25, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/livemint-shreeja-sen-february-26-2015-sc-reserves-judgment-in-cases-against-section-66a"&gt; SC reserves judgement in cases against Section 66A &lt;/a&gt; (Shreeja Sen; Livemint; February 26, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by contemporary concerns to understand the reconfigurations of 	social practices and structures through the Internet and digital media technologies, and vice versa. It is interested in producing local and contextual 	accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Innovative Infrastructures for Research and Pedagogy in Interdisciplinary Social Sciences and Humanities (Co-organized by Centre for Study of 	Culture and Society and CIS, Bangalore): The RAW programme organized a consultation to discuss and conceptualise an upcoming project. The project will be 	hosted by the RAW programme. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/raw/figures-of-learning-the-pornographer"&gt;Figures of Learning: The Pornographer&lt;/a&gt; (Namita A. Malhotra; February 28, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, 	accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and 	engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt; &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 	194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and 	improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at sunil@cis-india.org. To discuss collaborations on Indic language Wikipedia, write to T. Vishnu Vardhan, Programme Director, A2K, at	&lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding 		and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans 		Foundation, MacArthur Foundation, and IDRC for funding its various projects. &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/february-2015-bulletin'&gt;https://cis-india.org/about/newsletters/february-2015-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-30T16:09:05Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-march-17-2015-aadhaar-an-identity-crisis">
    <title>Live Chat: Aadhaar: An identity crisis? </title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-march-17-2015-aadhaar-an-identity-crisis</link>
    <description>
        &lt;b&gt;The Aadhaar card is not compulsory for citizens and "no person should be denied any benefits or ‘suffer’ for not having the Aadhaar cards issued by Unique Identification Authority of India," the Supreme Court ruled on Monday. &lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The live chat was &lt;a class="external-link" href="http://www.thehindu.com/news/national/the-debate-around-aadhaar-card/article7003376.ece"&gt;published in the Hindu&lt;/a&gt; on March 17, 2015. Sunil Abraham took part in the discussions.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;Four years after Aadhaar was launched – and touted as a panacea to  access social services and subsidies – its users continue to be dogged  by an array of problems ranging from technical glitches to procedural  delays. And those who do not have an Aadhaar card find themselves  quizzed by government authorities.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;i&gt;The Hindu&lt;/i&gt;’s Tamil Nadu edition today &lt;a href="http://www.thehindu.com/news/cities/chennai/issues-in-obtaining-aadhaar-from-glitches-to-lack-of-forms/article7000268.ece" target="_self"&gt;highlighted the challenges&lt;/a&gt; ordinary citizens - both those who have cards and those who do not –  face, be it from non-availability of application forms or glitches in  the biometrics process.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;We will be hosting a live chat on Aadhaar at 5 pm today. You can pose  questions and share your views with Sunil Abraham, Executive Director of  Bangalore-based research organisation, Centre for Internet and Society;  K. Gopinath, Professor at the Computer Science and Automation  Department at the Indian Institute of Science (IISc) and The Hindu’s K.  Venkatraman.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Anon &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;What could have happened such that the current government, who were once  in the opposition, were members of the parliamentary committee that  strongly opposed UIDAI, now suddenly wants to use it everywhere? What  could have transpired such that the PM got so convinced that it would  help its citizens more than it could potentially harm?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham: &lt;/b&gt;Usually the party that is in power is  pro-surveillance and anti-censorship and the opposition is pro-privacy  and pro-free speech. After the elections - if the parties swap positions  as a result of the mandate - then they usually also swap positions on  surveillance and censorship. This phenomenon is not specific to India.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K. Gopinath:&lt;/b&gt; The leakage in the current models is very high. Hence, the attraction.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The issue earlier was whether there was some costs to the use of sw  (esp. proprietary) from outside the country. Probably, these have been  addressed.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Saurabh &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aadhaar was supposed to be a good 2 factor authentication mechanism, what happens to it now ?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; Aadhaar architecture was designed to allow for  multiple authentication factors. Unfortunately biometrics is a poor  authentication factor since it cannot be revoked. Any two-factor  authentication scheme where one factor is biometrics is in reality only a  one-factor scheme. Pin code as with credit cards and debit cards would  have been much more secure for authentication.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K Venkataramanan:&lt;/b&gt; It will continue to be relevant, but is unlikely to be mandatory for quite some time.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K. Gopinath:&lt;/b&gt; Real-time 2-factor auth (biometrics, signatures) are not easy, esp over Internet, and would require a much longer rollout&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Saurabh &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I did not get Aadhar for myself or my family. Does this mean, I will not have to as yet.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; As per the UIDAI - Aadhaar is not mandatory. Also  according to the latest remarks from the Supreme Court - Aadhaar should  not be made mandatory without enabling law. But many state and central  government agencies have ignored the comments made by the SC and have  made Aadhaar mandatory for various programmes and schemes.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The Hindu:&lt;/b&gt; Is Aadhaar virtually redundant now following the SC order? Nothing more than an expensive experiment?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K. Gopinath: &lt;/b&gt;I think it will be used as an addl auth mechanism  (just like elec./ph. receipts). May be once the technology is demo'ed  properly (it has not been done seriously anywhere else), it will be  taken up again.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Abubacker &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I am an NRI and need to have Aadhaar Card? How to obtain Appointmet - I am from Tuticorin, Tamil Nadu&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K Venkataramanan:&lt;/b&gt; Your family member or representative living in  Tuticorin may apply for Aadhaar through the local body. It may be  possible to get a date for recording biometrics. However, you have to  come down here for recording biometric details.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Kishore J &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Why is Govt. not able to legalize the Aadhar, I'm assuming the only  reason Supreme court keeps blocking it is because its not a law passed  by Parliament ?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K. Gopinath:&lt;/b&gt; SC goes by the constitution. If there is some concern someone is being "excluded", they will block it.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham: &lt;/b&gt;The NIA bill was proposed in parliament and then  referred to a Standing Committee. Our summary and detailed feedback to  the Bill is available here: http://cis-india.org/intern... The Standing  Committee harshly criticized the Bill. See:  http://164.100.47.134/lsscommittee/Finance/42%20Report.pdf After which  the Bill has not been reworked by the UIDAI or the Planning Commission  /Niti Aayog for re-presentation to the Parliament.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; No - it is not just an expensive experiment. It is  much more dangerous - it is what security experts call a Honey Pot. A  centralized repository of biometrics harvested from residents of India.  These biometrics can be used to authenticate transactions in the UIDAI  database and other services. If there is a breach - then this huge  collection of authentication factors will end us in the hands of  criminal elements or some foreign state.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From vaz &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aadhar is a joke, i have so many IDs and i cannot get any benefits out  of it, it is simply wasting time, if Govt really want mandate make it  easy for people, i pay taxes and Govt should treat me like one , i can  not waste my time standing in queues to get that card, get me time slot  and don't waste my time.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; This is because the process of registration has  been outsourced to private agencies. These private agencies have futher  outsourced to others and so on and so forth. Consequently, there is very  poor management and quality control by these agencies. If indeed  corruption was a priority - we should have tackled high-ticket  corruption first. We could have had biometric registration just for only  the politicians and bureaucrats. We could use biometric authentication  with them to create a non-repudiable audit trail of subsidies flowing  from the Centre to the Panchayat. Unfortunately, we tried to register  everybody simultaneously and that has resulted in poor quality of  biometrics and demographic data. We have visited some of the  registration centre and have seen the reality on the ground.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Guest &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I have been threatened by Gas Agency people if i don't link Aadhar to  Bank Account, won't be given a refilling cylinder.Is this a right one?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K Venkataramanan:&lt;/b&gt; There is an option for getting DBT even without  Aadhaar. The bank account and the gas agency consumer account can be  linked without Aadhar. Please check www.mylpg.in for knowing how to  apply for DBT registration without Aadhaar&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The Hindu: &lt;/b&gt;Your views Prof Gopinath? Do you see it as a biometrics Honey Pot too?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K. Gopinath: &lt;/b&gt;From a security pov, it is certainly risky. It needs  really robust technologies before one can think of rolling out. For  example, we have "denial of service" attacks. ie, a service can be shut  out by random bombardment of msgs. Most curr large scale systems are  designed to handle it but some cannot handle it if large numbers  collude. This only prevents access to service but other attacks can  exfiltrate (take out) data, modify data, etc.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The Hindu:&lt;/b&gt; And Mr. Venkataramanan, your thoughts?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From kuldeep singh chauhan &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;We need a strong law for data security. Aadhar is collecting data but  there is no provision except some provisions of IT Act and IPC for data  security.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K. Gopinath:&lt;/b&gt; Yes, the legislation is weak or unnecessarily vague  (eg. the IT2000 act) or too broad in scope. I think what we need is a  citizen's charter for data access, security and privacy. Also, what  needs to be done when systems do not work!&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; There are two interpretations of Sec. 43A of the  IT Act. Acccording to most experts it only applies to Body Corporates in  other words it does not apply to the Government when it plays the role  of a data controller. According to an order issued by the IT Secy of  Maharastra [the court of first instance for 43A of ITA] -this section  will also apply to the Government. But beyond that order we have no  clarity on this question.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Pavan &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;With no privacy laws, isn't it a bad idea to store citizen's data in a  database? We all know how inept our government is in ensuring any  security/privacy.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; With or without laws. Centralized approaches to  identity/authentication management are much more fragile and vulnerable  compared to decentralized options. The Internet is secured by digital  signatures - there is no centralized repository of all these signatures.  Therefore there is no centralized point of failure for the Internet. If  the Aadhaar project was based on Smart Cards instead of Biometrics -  then just like the Internet it would be robust without a central point  of failure. http://cis-india.org/intern...&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K. Gopinath:&lt;/b&gt; Storing all info in a single place is a big security  risk. It needs very robust technologies (such as replication and  "secret sharing protocols") that work inspite of failures. These have  been done here and there but doing it on a large scale requires care.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Kunal Soni &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;SC Adhar card recommendations, ok Got it! But what about the banks for  example SBI who ask for adhar cards stating its the bank's rule? Who's  going to answer the question as they would never listen to common man  and they never did.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Sandeep &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Hi,May be it is a strong message, but what exactly is the need to  make/introduce the Adhaar card, which is not recognizable worldwide? Why  dont we make our passport smart enough and reduce it to a chip as in  Europe. This will also enable everyone to get enrolled in our  administrative system. Basically, we are only repeating the entire  process with no international recognition.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Krishna Rao &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Need to make it mandatory in the lines of SSN in US. Else it would be  very difficult to manage and ensure the subsidies and benefits reach the  really deserved section.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Ramesh &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It is a great concept it all information like property purchases, tax  returns, ration card, pf, esi, bank accounts , rail, air tickets are all  linked. will reduce corrupt practice considerably. It should be the  main identity of an Indian&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From arun &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;@Sunil what are the privacy safeguards that are in place currently  regarding protection of information collected by the government and  private agencies designated for this?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; Do you mean legal or technical?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K Venkataramanan:&lt;/b&gt; @The Hindu: Yes, there are serious privacy  issues involved in a centralised database. However, their is a  counter-view that this is no different from any other data base  available in the hands of the government such as the one relating to  PAN. The main concern of those worried about the privacy problem in  Aadhaar is that data collection is done by private agencies, and details  such as biometric data could be misused&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The Hindu:&lt;/b&gt; Sunil, a question for you from arun&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Pawan &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Govt should give it legal recognition and give legal guarantee about the  usage and storage of the data... After that there would be no concern  related to identity security or enforcing it on the people.. People  would trust it and come forward to register for it.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; Legal recognition and guarantees are not  sufficient. You cannot use the law to fix poor technology design. The  security of the Internet is not a function of good law. It is a function  of good technological design.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Pappan &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;the so called Europe, US an other developed countries already have  Social security numbers, why cant we just look at it like that?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Social Security Number are an additional identifier. The  database just contains a collection of identifiers. If that database is  compromised the information cannot be used to authenticate transactions.  This is very unlike the UIDAI centralized database which is a  collection of authentication factors. Think of it as a database filled  with the passwords of all Indian residents.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: @Kunal Soni - SBI can't insist on it as of now. The  person who issued any circular to that effect may be hauled up in court&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I have two questions. First, why is the honourable supreme court strking  down aadhar, on what grounds? Second, how can the government come  around those objections and allay the courts fears/objections? The  informed panelists may please give their opinions too. Thank you&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: There are 3 sets of petitioners who are being heard by  the SC in the combined case. Some of them associated with the right are  arguing that the UID is a threat to national security as it legitimizes  illegal immigrants. Those associated with the left are arguing that it  is a violation of the right to privacy. Still other who are ex-officers  from the armed forces are arguing that the project is mired in corrupt  practices.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: The Court has not struck down Aadhaar. It has only  passed interim orders protecting the access to services of those who  have not yet had them.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Aashish Gupta&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aadhaar was supposed to usher in portability of benefits. That is, you  could migrate to a different state and still get the benefit you  deserved.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: The Aadhaar database only contains information that  identifies you and also allow you to authenticate against that database.  It does not indicate eligibility for various schemes/subsidies. The  migration across State level eligibility lists has to be done by the  State. It is not a functionality provided by the UIDAI.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Ramesh&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Supreme Court should have suggested a better option instead of coming  down heavily on the Aadhar Card. The card will straight eliminate  multiple rations cards and voter ids.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: The previous technology adopted by the NDA government -  smart cards or SCOSTA [for the MNIC]. This technology option is free  from many of the flaws of UIDAI's current design.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Mrigesh&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Why is Aadhaar needed? I am for a middle class or for the elite class?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Geetha&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Has the government (or concerned agencies/departments) formulated any  policy on using the Aadhar information collected? For instance, what  agency can use the information, under what conditions, with whose  approval, for what limited purposes? Is this policy publicly available?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: No. Anyone who is approved by the UIDAI as a legitimate  can use the KYC API. Absolutely anyone can use the Authentication API.  There is no policy on what data collection/retention practices must be  adhered to by the users of both these APIs.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Arun Jayapal&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Has the government ever considered/analyzed a way to link the existing  resources (such as ration card, DL, passport, voter id, etc.,) and not  have come up with a completely new system (aadhaar). Is this not an  absolute waste of time and resources?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Yes, you are absolutely right. The government should have  used biometrics as a means to dedup an existing high value database  like the Electoral Rolls or more importantly the PAN Card database. That  would have been better RoI for our anti-corruption Rupee.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: @Ramesh The Court has come down heavily on only  officials who insist on Aadhar for delivery of services when there are  clear orders that it should not be mandatory&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From George J&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I'm an NRI. I presently work and live in a country where the first order  of business on landing/Birth is to register one self and get a unique  ID number and ID. This the case for expats as well as residents be they  foreigners or Citizens. The registration process includes collection of  Biometric data. This single No and Id is used for everything from Bank  Accounts to School Admissions. It is good that India is doing something  similar. It is high time people with multiple ration cards, Passports  and the like are weeded out and provided a single verifiable identity.  Data Security is of essence and necessary safeguards are available.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Could you name the country? And can you use biometrics  your country to authenticate transactions in a centralized database for  all sorts of transactions? If yes, then the technology design in your  country is as poor as in ours and it is only a question of time when the  centralized database leaks.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Aashish Gupta&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Apart from the Honey Pot, Aadhaar does not serve its primary purpose:  tackling corruption. Most pilots of Aadhaar have crash landed, and as a  result, state governments have created their own simpler systems to  tackle corruption.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: See: http://www.thehindu.com/opi... If the authentication  match is not working [1:1 match]. Then basically the dedup will not  work [1:n] match. That is why they are doing demographic dedup before  biometric dedup - because they know that the biometric dedup is  fallible.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Balu&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A citizenship card , backed with a strond database is a must for every  citixen . Some serious thoughts should be done in this matter at the  earliest , instead of wasting time and money on different schemes .&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: We should use decentralized Internet scale technologies  based on open standards that are already proven. If we had used smart  cards based on SCOSTA or EMV standard we would be in a much better  place.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From PRASHANTH&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Has the government (or concerned agencies/departments) formulated any  policy on using the Aadhar information collected? For instance, what  agency can use the information, under what conditions, with whose  approval, for what limited purposes? Is this policy publicly available?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From vikash&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;supreme court should not have to push such legal hurdles given that the  750 million card has already been generated.A lot of money has been  investad in the project&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Saket&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aaadhar card is full of errors. At the place where I got registered  person was issuing it in a hurry which creates lots of typing errors in  DOB and Place.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Aashish Gupta&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The supreme court has not struck down aadhaar, it has said that aadhaar  cannot be mandatory. This is to make sure that people who do not have an  aadhaar card do not miss out on their entitlements.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Ramesh&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aadhaar should be made mandatory with necessary safeguards. Unless there  is an ultimatum and time frame to get the card it will never be  implemented. Even now many do not know where to get it done.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Aadharam&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Could you clarify whether this is an interim order or a final order on  Aadhar? Is there scope for a retraction/shift on the Supreme Court's  part?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Onkar Tiwari&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Why supreme court doesnt understand Adhar is necessary? it can curb  corruption. it wll reduce corruption specially in manrega where people  enters fake details and grab the money.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: It is only an interim order. The Court will,  hopefully, resolve the questions raised by the petitioners about privacy  and data security issues&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From George J&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I have taken Aadhar Card. The procedure asks the applicant themselves to  verify the data entered for typing mistakes etc. before being uploaded,  in fact where I registered they had asked for a sign off on the final  data on a printout. So how errors can creep in is beyond me. However the  photography equipment and skill of the data entry operator leave much  to be desired as the mug shot is not very kind to me!&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There should be a guide line which need to be followed as it is in the  hands of private partners who are also ask for bribe from the poor  people for the aadhar and they have no other option to pay for it as  they thought that this only can help them to get the govt. facilities  and subsidies.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: @Onkar Tiwari, It is up to the government to convince  the court that Aadhaar will help curb corruption, and how. The Court is  unlikely to stop the use of technology to improve delivery of services  and curb corruption.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From v subrahmanian&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;help line over phone and the email correspondence is total waste.. they  themselves are helpless. Any query has never been replied to the  caller's satisfaction. Getting them on line itself is a challenge. It's  so complex. Of course, every eligible citizen of this complex country  must have the identity card. Why not if it is done through employer in  case of organized salaried employees?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Ramakrishna Rao&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Hi !! I request the panelists to kindly sum up in few 4 or 5 points the  reasons/grounds on which the parliamentary committee has rejected the  aadhar&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The agencies who are collecting data for Aadhar Card are not doing good.  The aadhar card is full with many kind of errors including Name and  DOB.. Even a person is able to register twice under this scheme.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: Mr. Venkataramanan would you like to respond to Ramakrishna Rao?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;@K Gopinath - how robust is the de-duplication UID claims to have. And  in real time transactions, is it possible to authenticate n request  without 'false positives' or 'negatives'?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K. Gopinath: Dedup claims assume “good” conditions. For example, a  farmhand may have rough skin, etc that may make the fingerprints  problematic. 1% errors have been reported in the past. Real time txns: I  think the current Aadhar is not geared for it. The connectivity is not  there. Also, with fingerprint technologies, the ability to check large  number of fingerprints for a match is not good enough. It has never been  scaled to the extent that is being planned.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Sandeep&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Still not sure if Aadhaar then other ID cards not needed ? Or Still all  along with Aadhaar ? then what is meaning of Aadhaar ? Only for LPG  connection? Why not govt making Aadhaar is mandatory in all other fields  as well , As Govt spent huge money for Aadhaar&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;@ Sunil - How plausible is the idea that govt can use UID data to profile public?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Sushubh&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I for one is very happy that at least the Supreme Court is not falling  for this privacy infringing scam. People defending this card here on  this platform needs to read more about it.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Govt. created panic among public regarding adhaar. Public is highly  annoyed with the way the government is handling this adhaar project.  Only court reprimands,govt. backtracks as far as the adhaar is  concerned. It is high time for govt. to have serious insight into this.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: The parliamentary committee on Finance had objected to  the UID being extended to non-citizens on the ground that it may end up  in illegal immigrants getting Aadhaar numbers.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It had also questioned the rollout ofthe scheme before legislation was  passed. It had objected to its implementation without regard to its  consequences.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Srinivasa&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I believe Nandan Nilkeni had mentioned certain very good examples of the  system flagging duplicates. So I assume the system is robust. We need  to make it mandatory for all services delivery and have suitable policy  and technology to protect data.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: I don't think we can go by the assurance of someone no  longer associated with the project. It is not persons that keep us safe  it is proper technology and law.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: Welcome back Sunil! Lots of questions await you&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: The committee had said UIDAI had no conceptual  clarity, no proper assessment of the costs involved, and that it could  end up in the hands of private agencies, that the technology was  untested and the UID may not meet the objectives for which it was  conceived&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Sorry I was logged out.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There was a recent news in The Hindu about linking of Adhar cards to  election voter ID cards in Andhra Pradesh. Do you think that adopting  such moves by every state result in mandating the procedure eventually?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;First Passport then PAN , voter id and now adahar, in any country there  is only passport and SSN, why india needs so many identity cards&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K. Gopinath: The PAN database has been problematic just as the voter id.  Hence, every technology cycle, a new system is usually attempted that  attempts to be "better" than the before. However, this requires care  which is not in good supply in the govt where the "lowest" bidder wins  or outsourcing happens.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: We have Prof Gopinatha back too. Sorry about that technical glitch.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Deepak Vasudevan&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Why are different apex agencies managing Aadhar like UIDAI, Census and  NPR? There should be one root (apex) body and others should report onto  it.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Yes. The division of work between UIDAI and NPR is not very clear and has added to the confusion.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: The parliamentary standing committee, too pointed out the overlap of functions involving UIDAI and NPR&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: There was this question for you earlier on the thread @K  Gopinath - how robust is the de-duplication UID claims to have. And in  real time transactions, is it possible to authenticate n request without  'false positives' or 'negatives'?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K. Gopinath: Dedup claims assume “good” conditions. For example, a  farmhand may have rough skin, etc that may make the fingerprints  problematic. 1% errors have been reported in the past. Real time txns: I  think the current Aadhar is not geared for it. The connectivity is not  there. Also, with fingerprint technologies, the ability to check large  number of fingerprints for a match is not good enough. It has never been  scaled to the extent that is being planned.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;When Union Of India aimed to greater transparency... these are the road  blocks they get... If Aadhar is not mandatory... then make Voter ID, PAN  Card, Ration card also not mandatory in their respective Govt  Businesses ... make self declaration as mandatory .. lets go to the  stone age in this Information age. Instead SC should direct the center  to come up with procedure to accommodate legitimate citizens of India  into the scheme in a time bound manner and frame policies to avoid  misuse of the personal data. are we looking the current world  Information age thru the same old glasses... it is time to adopt the  change...&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Indeed we need more transparency. But privacy protections  must be inversely proportionate to power and as Julian Assange says  transparency requirements should be directly proportionate to power See:  http://openup2014.org/priva...&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: Linking Aadhaar and voter ID cards is also being tried  out in other states It is only one more means of eliminating fake  voters or duplicates, but is unlikely tobe a ground to make Aadhaar  mandatory&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Ganesh&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;@Mr.Sunil, The current technology adopted for UIDAI is not good compared to last regime?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Please see my our open letter on this question http://cis-india.org/intern...&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Madhavan R&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Just because UPA government bring this, its not good for NDA to object  it.. STOP wasting our money.. Just try to make best out of it..&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Pouring more money into a failed project will not save  it. It has serious technological flaw and without addressing it we are  just making a bad situation worse.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From George J&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Currently all embassy's are collecting biometric data when you apply for  a visa. Most of this collection is done by private parties on behalf of  the respective governments. So if an Indian has travelled abroad the  chances of his Biometric data being available to foreign govts is 99%.  So what is the big scare about this? The need that it should be secure  and should not be misused is sacrosanct. with the kind of revelations  that have been made about mass eavesdropping I think people should get  used to living in glass houses!&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Pappan&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;@Sunil, please clarify about your comment on technology inadequecy&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Yuvaraj&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I strongly support Adhaar card implemenataion. intially they may face  challeneges but for the long run its very effective mechanism to monitor  every thing&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Monitoring everything means you monitor nothing. The  bigger the haystack the harder it is to find the needle. Good  surveillance practices means targetting survelliance not en masse data  collection.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It is heard that privacy of citizens is at stake with adhaar card. can panelists respond to this?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: I have dealt with your question here: http://www.business-standar...&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Srinivasa&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;That comparison of the two standards (SCOSTA and Aadhar) made  interesting reading. Why not a system where you collect biometrics and  iris and then issue a SCOSTA card? the biometrics and iris can be used  to remove duplicates and maintain a clean registry by failing the  duplicate SCOSTA cards. And all further transactions will only need a  card based access.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Loganathan&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;This is one the worst move by any government in the center to remember.  With no motive for the card, they introduced just to add to the loss in  exchequer and there is no benefit out of it. Many have wrong data  entered against their name and totally the waste one of all&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Sabari Arasu&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I am aware of someone who is not Indian citizen got Aadhar card for  himself and his family. This scares me a lot as anyone(read  Bangaladheshis, Sri Lankans, Pakintanis, etc..) can get Aadhar card. Is  there a measure taken by Government to identify these issues?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: This is possible because the technology [biometrics]  cannot verify citizenship. Even worse biometrics can be imported from  foreign countries and can be used to create resident ghosts. This is  because the technology cannot even verify if the person in India. We  will need surveillance cameras at every point of registration to take  care of this possible fraud.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Chandra Sekhar&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aadhaar card was a huge opportunity for the government to improve the  efficiency of governance.It was a challenging task and required great  amount accuracy.The way this project was executed is a question mark on  efficiency of governance.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: Sunil, Venkatramanan, Gopinath - would you agree that Aadhaar  was an opportunity to improve governance? @chandra sekhar&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Freebee lovers/netas will always oppose when you want to implement some thing which might deny them the benefit.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Any evidence to backup this statement?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;if the ASDHAAR is nt necessary as per SC then why everywhere it is being preferred identity such as Subsidy, Passport etc.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Preference is not the same as a mandatory requirement.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-march-17-2015-aadhaar-an-identity-crisis'&gt;https://cis-india.org/internet-governance/news/the-hindu-march-17-2015-aadhaar-an-identity-crisis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-04-03T06:54:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell-us-about-indian-government-record-on-free-expression-and-privacy">
    <title>What Does Facebook's Transparency Report Tell Us About the Indian Government's Record on Free Expression &amp; Privacy?</title>
    <link>https://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell-us-about-indian-government-record-on-free-expression-and-privacy</link>
    <description>
        &lt;b&gt;Given India's online population, the number of user data requests made by the Indian government aren't very high, but the number of content restriction requests are not only high on an absolute number, but even on a per-user basis.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Further, Facebook's data shows that India is more successful at getting Facebook to share user data than France or Germany.  Yet, our government complains far more about Facebook's lack of cooperation with Indian authorities than either of those countries do.  I think it unfair for any government to raise such complaints unless that government independently shows to its citizens that it is making legally legitimate requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the Prime Minister of India Shri Narendra Modi has stated that "&lt;a class="external-link" href="http://pmindia.gov.in/en/quest-for-transparency/"&gt;transparency and accountability are the two cornerstones of any pro-people government&lt;/a&gt;", the government ought to publish a transparency report about the requests it makes to Internet companies, and which must, importantly, provide details about how many user data requests actually ended up being used in a criminal case before a court, as well as details of all their content removal requests and the laws under which each request was made.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, &lt;a class="external-link" href="https://govtrequests.facebook.com/"&gt;Facebook's Global Government Requests Report&lt;/a&gt; implicitly showcases governments as the main causes of censorship and surveillance.  This is far from the truth, and it behoves Facebook to also provide more information about private censorship requests that it accedes to, including its blocking of BitTorrent links, it's banning of pseudonymity, and the surveillance it carries out for its advertisers.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell-us-about-indian-government-record-on-free-expression-and-privacy'&gt;https://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell-us-about-indian-government-record-on-free-expression-and-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Transparency Reports</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-04-05T05:08:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/state-of-cyber-security-and-surveillance-in-india.pdf">
    <title>State of Cyber Security and Surveillance in India: A Review of the Legal Landscape</title>
    <link>https://cis-india.org/internet-governance/blog/state-of-cyber-security-and-surveillance-in-india.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/state-of-cyber-security-and-surveillance-in-india.pdf'&gt;https://cis-india.org/internet-governance/blog/state-of-cyber-security-and-surveillance-in-india.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-14T03:23:35Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/surveillance-industry-india.pdf">
    <title>The Surveillance Industry in India</title>
    <link>https://cis-india.org/internet-governance/blog/surveillance-industry-india.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/surveillance-industry-india.pdf'&gt;https://cis-india.org/internet-governance/blog/surveillance-industry-india.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-14T03:20:42Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/policy-recommendations-for-surveillance-law-in-india-and-analysis-of-legal-provisions-on-surveillance-in-india-and-the-necessary-and-proportionate-principles.pdf">
    <title>Policy Recommendations for Surveillance Law in India and an Analysis of Legal Provisions on Surveillance in India and the Necessary &amp; Proportionate Principles</title>
    <link>https://cis-india.org/internet-governance/blog/policy-recommendations-for-surveillance-law-in-india-and-analysis-of-legal-provisions-on-surveillance-in-india-and-the-necessary-and-proportionate-principles.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/policy-recommendations-for-surveillance-law-in-india-and-analysis-of-legal-provisions-on-surveillance-in-india-and-the-necessary-and-proportionate-principles.pdf'&gt;https://cis-india.org/internet-governance/blog/policy-recommendations-for-surveillance-law-in-india-and-analysis-of-legal-provisions-on-surveillance-in-india-and-the-necessary-and-proportionate-principles.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-14T03:08:04Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-of-news-items-and-cases-on-surveillance-and-digital-evidence-in-india.pdf">
    <title>An Analysis of News Items and Cases on Surveillance and Digital Evidence in India</title>
    <link>https://cis-india.org/internet-governance/blog/analysis-of-news-items-and-cases-on-surveillance-and-digital-evidence-in-india.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-of-news-items-and-cases-on-surveillance-and-digital-evidence-in-india.pdf'&gt;https://cis-india.org/internet-governance/blog/analysis-of-news-items-and-cases-on-surveillance-and-digital-evidence-in-india.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Lovisha Aggarwal</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-14T03:02:23Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/surveillance-and-security-industry-in-india.pdf">
    <title>The Surveillance and Security Industry in India - An Analysis of Indian Security Expos </title>
    <link>https://cis-india.org/internet-governance/blog/surveillance-and-security-industry-in-india.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/surveillance-and-security-industry-in-india.pdf'&gt;https://cis-india.org/internet-governance/blog/surveillance-and-security-industry-in-india.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-14T02:56:35Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf">
    <title>Security, Surveillance and Data Sharing Schemes and Bodies in India</title>
    <link>https://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf'&gt;https://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-14T02:35:31Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/">
    <title>[···]</title>
    <link>https://cis-india.org/internet-governance/blog/</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/'&gt;https://cis-india.org/internet-governance/blog/&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>kaeru</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2025-11-19T17:19:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked">
    <title>Hacking of SIM card by spy agencies raises fears of sensitive documents being leaked</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked</link>
    <description>
        &lt;b&gt;The hacking of SIM-card and digital security services provider Gemalto by American and British spy agencies has raised fears that sensitive communications, by the Indian government and hundreds of domestic companies, may have been at the risk of being spied on.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by PK Jayadevan and Neha Alawadhi was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2015-02-25/news/59499696_1_gemalto-encryption-keys-security-solutions"&gt;published in the Economic Times&lt;/a&gt; on February 25, 2015. Pranesh Prakash and Sunil Abraham were quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Netherlands-based Gemalto was jointly hacked by the &lt;a href="http://economictimes.indiatimes.com/topic/US%20National%20Security%20Agency"&gt;US National Security Agency&lt;/a&gt; and Britain's Government Communications Headquarters, and encryption  keys were stolen to monitor mobile communications, according to a news  report published last week.&lt;/p&gt;
&lt;div class="mod-articletext mod-economictimesarticletext mod-economictimesarticletextwithadcpc" id="mod-a-body-after-first-para" style="text-align: justify; "&gt;
&lt;p&gt;India's largest telecom vendors including Airtel, Vodafone and &lt;a href="http://economictimes.indiatimes.com/topic/Idea%20Cellular"&gt;Idea Cellular&lt;/a&gt; use SIM cards supplied by Gemalto, the world's biggest maker of  mobile-phone chips and provider of secure devices such as smart cards  and tokens. &lt;a href="http://economictimes.indiatimes.com/topic/Online%20publisher"&gt;Online publisher&lt;/a&gt; The Intercept in its report named Idea Cellular as one of the networks from which the spy agencies accessed encryption keys.&lt;/p&gt;
&lt;p&gt;"Phone calls and text messages by military, government, diplomats, spy  corporations and by ordinary citizen of India - all of those get  affected by this hack," said Pranesh Prakash, Policy Director at  research and advocacy firm &lt;a href="http://economictimes.indiatimes.com/topic/Centre%20for%20Internet"&gt;Centre for Internet&lt;/a&gt; and Society.&lt;/p&gt;
&lt;p&gt;The Intercept, which accessed top secret documents provided by NSA whistleblower &lt;a href="http://economictimes.indiatimes.com/topic/Edward%20Snowden"&gt;Edward Snowden&lt;/a&gt;,  said American and British spies dug into the private communications of  Gemalto engineers and other employees to steal encryption keys.&lt;/p&gt;
&lt;p&gt;Gemalto provides security services such as two-factor authentication and  access management, and has hundreds of clients in India. The company in  2012 said it provided 25 million e-driver's licences and vehicle  registration certificates in India that let the government "consolidate  driver and vehicle registration information across the population in a  central repository".&lt;/p&gt;
&lt;p&gt;"We believe that the biggest risk stands for  the large number of Vodafone users in the country as the company has  deployed Gemalto's Near Field Communication services solutions to  provide secure and convenient 'wave and pay' contactless transactions  via mobile phone," said Sanchit Vir Gogia, Chief Analyst and Group CEO,  Greyhound Research.&lt;/p&gt;
&lt;p&gt;"We have no further details of these  allegations, which are industry-wide in nature and are not focused on  any one mobile operator. We will support industry bodies and Gemalto in  their investigations," said a Vodafone spokesperson in an email  response.&lt;/p&gt;
&lt;p&gt;Emails to Idea and &lt;a href="http://economictimes.indiatimes.com/topic/Airtel"&gt;Airtel&lt;/a&gt; were unanswered till the time of going to Press.&lt;/p&gt;
&lt;p&gt;"Indian operators typically go for cheaper Chinese vendors that are  anyway low on security. Among the European SIM vendors, Gemalto has the  largest share in India," said a senior mobile services executive,  requesting anonymity.&lt;/p&gt;
&lt;p&gt;The report on the hack comes at a time when Gemalto was looking to tap the &lt;a href="http://economictimes.indiatimes.com/topic/Indian%20market"&gt;Indian market&lt;/a&gt;,  including e-governance initiatives. The company in a recent email to ET  said it had plans to expand its center of excellence in India to  develop multiple products, offer tech support and provide security  solutions for the domestic market.&lt;/p&gt;
&lt;p&gt;"We take this (breach) very  seriously and will devote all resources necessary to fully investigate  and understand the scope of such highly sophisticated attacks to obtain  SIM card data," a Gemalto spokesperson said. "The target was not  Gemalto, per se - it was an attempt to try and cast the widest net  possible to reach as many mobile phones as possible."&lt;/p&gt;
&lt;p&gt;Initial  investigations indicate that SIM products as well as banking cards,  passports and other products and platforms are secure, the company said.  Gemalto is expected to announce the results of its investigation on  Wednesday. British and US spy agencies have been under fire for hacking  and spying on citizens after Snowden in mid-2013 began leaking documents  that revealed massive surveillance programmes by the two governments.  At the time, the Indian government said the NSA was only collecting  meta-data and had no access to the actual contents of phone calls or  text messages.&lt;/p&gt;
&lt;div class="mod-articletext mod-economictimesarticletext mod-economictimesarticletextwithadcpc" id="mod-a-body-after-second-para"&gt;
&lt;p&gt;Experts suggest a multinational consensus or treaty that strikes a balance between national security concerns and privacy.&lt;/p&gt;
&lt;p&gt;"Governments will have to debate this in the United Nations and some  kind of rules for surveillance, maybe treaties, are relevant in the  future," said Kamlesh Bajaj, Chief Executive at Data Security Council of  India. "They shall have to have some kind of a limit to surveillance.  They can't be vacuuming all data in the name of finding a needle in the  haystack."&lt;/p&gt;
&lt;p&gt;Sunil Abraham, Executive Director at Center for  Internet and Society, suggested the Indian government should replace  proprietary operating systems and Android on phones with pure free  software projects, use of virtual private network on phones to  carry voice and data traffic, and encrypt voice and data payloads  separately.&lt;/p&gt;
&lt;p&gt;"When it comes to all the other services provided by  Gemalto, the India government should insist that they will do key  management on their own. This will also mitigate the compromise of  Gemalto's enterprise networks by the NSA," he said.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked'&gt;https://cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-03-09T01:31:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos">
    <title>The Surveillance Industry in India – An Analysis of Indian Security Expos</title>
    <link>https://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos</link>
    <description>
        &lt;b&gt;The author talks about the surveillance industry in India and analyses Indian security expos.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 'Spy Files', a series of documents released by whistleblower website WikiLeaks over the last few years, exposed the tremendous growth of the private 	surveillance industry across the world - a multi-billion dollar industry thriving on increasing governmental and private capabilities for mass surveillance 	of individuals.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; These documents showed how mass surveillance is increasingly made possible through new 	technologies developed by private players, often exploiting the framework of nascent but burgeoning information and communication technologies like the 	internet and communication satellites. Moreover, the unregulated and undiscerning nature of the industry means that it has enabled governments (and also 	private agencies) across the world - from repressive dictatorships to governments in western democracies with a growing track record of privacy and civil 	liberties infringements - to indulge in secretive, undemocratic and often illegal surveillance of their citizens. The Spy Files and related research have 	revealed how the mass surveillance industry utilizes the rhetoric of national security and counter-terrorism to couch technologies of surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;'Security' and the Normalization Of Surveillance&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;New technologies undoubtedly create a potential for both malicious as well as beneficial use for society. Surveillance technologies are a prime example, 	having both enabled improvements in law enforcement and security, but at the same time creating unresolved implications for privacy and civil liberties. 	These technologies expose what Lawrence Lessig describes as 'latent ambiguities' in the law - ambiguities that require us to assess the implications and 	effects of new technologies and how to govern them, and most importantly, to choose between conflicting values regarding the use of technologies, for 	example, increased security as against decreased privacy.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, In India, the ambiguity seems to have been resolved squarely in favour of surveillance - under the existing regulatory regime, surveillance 	is either expressly mandated or unregulated, and requires surveillance to be built into the architecture and design of public spaces like internet and 	telephone networks, or even public roads and parks. Most of these regulations or mechanisms are framed without democratic debate, through executive 	mechanisms and private contracts with technology providers, without and public accountability or transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, under the telecom licensing regime in India, the ISP and UASL licenses specifically require lawful interception mechanisms through hardware or 	software to be installed by the licensees, for information (Call Data Records, Packet Mirroring, Call Location) to be provided to 'law enforcement 	agencies', as specified by the Government.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; Section 69 of the Information Technology Act, the main 	legislation governing the Internet in India, read with the rules framed under the Act, makes it incumbent upon 'intermediaries' to provide surveillance 	facilities at the behest of government agencies.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Beyond this, the State and its agencies Section 69 and 69B of the IT Act empower the government to intercept and monitor any data on the Internet. The 	Telegraph Act also permits wiretapping of telephony.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; The proposed Central Monitoring System by the Central 	Government would give state agencies centralized access to all telecommunications in real time, on telephony or on the Internet. Other surveillance schemes include the Keyword Tracking system NETRA, as well as several state government proposed comprehensive CCTV-surveillance schemes for cities.	&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; Clearly, therefore, there is a massive market for surveillance technologies in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Tracking the Surveillance Market&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Mass surveillance industry by its very nature is closed, secretive and without democratic oversight, Insights into the prevalence, nature and scope of 	the companies that form this industry, or the technologies that are utilized are far and few. No democratic debate about surveillance can take place in 	such a paradigm. In this context, security expos and exhibitions provide critical insight into this industry. Several of the important revelations about 	the industry in the past have been from examinations of large exhibitions in which the various governmental and industry actors participate, and therefore, 	such analysis is critical to the debate surrounding mass surveillance. Such exhibitions are a logical starting point because they are one of the few 	publically accessible showcases of surveillance-ware, and are also a congregation of most major players who are part of this market both as suppliers and 	purchasers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our research identified at least 13 exhibitions in India that specifically cater to the surveillance industry. A brief outline of each of these exhibitions 	is provided below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Secutech India (Brochures: &lt;/b&gt; 2015 -&lt;a href="http://www.secutechindia.co.in/pdf/secutech%20brochure.pdf"&gt;http://www.secutechindia.co.in/pdf/secutech%20brochure.pdf&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Secutech Expo is an exhibition held in Bombay and Delhi since 2011, to showcase Information Security, Electronic Security and Homeland Security 	technologies. Secutech also organizes the Global Digital Surveillance Forum, a conference amongst the stakeholders of digital surveillance industry in 	India.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Ivis; Matrix Comsec; Neoteric; Smartlink; Kanoe; Micro Technologies; Aditya Infrotech; CoreTech Solutions; Merit Lilin; Schneider Electric; 	Pash systems; Nettrack Technologies Pvt Ltd.; QNAP; Axxonsoft; Hk Vision (China); Alhua; Axis; Vivotech (Taiwan); Endroid (USA); Vantge (UK); Pelco 	(France); Advik; Hi Focus (UK); ESMS; Keeper (China); Neoteric; Vizor, etc&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: The visitor profile and target audience consists of government and defense agencies, besides private agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on display: Digital surveillance, biometrics, CCTV and RFID are some categories of the technologies which are showcased here.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;IFSEC India (Brochures: &lt;/b&gt; 2013 -	&lt;a href="http://www.ifsecindia.com/uploads/IFSEC%20INDIA%20brochure%202013.pdf"&gt;http://www.ifsecindia.com/uploads/IFSEC%20INDIA%20brochure%202013.pdf&lt;/a&gt;; 	2014 - http://www.ubmindia.in/ifsec_india/uploads/IFSEC_INDIA_Brochure_CS5_new_low.pdf.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IFSEC India, an extension of IFSEC UK, the 'worlds largest security exhibition', proclaims to be South Asia's largest security exhibition with 15,000 	participants in its latest edition, including a special segment on surveillance. It has been held in either Bombay or Delhi since 2007.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Honeywell; Infinova; Radar Vision; QNAP; Ensign; Winposee; Bosch; Comguard; Verint; ACSG; Ensign etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors include government agencies such as the Central Industrial Security Force, Border Security Force, Department of Internal Security, 	Railway Protection Force and the Department of Border Management.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on display: RFID, Video Surveillance, Surveillance Drones, IP Surveillance, Digital Surveillance and Monitoring were some of the categories of 	technologies on display.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;India International Security Expo (Brochures: &lt;/b&gt; 2014 - http://www.indiasecurityexpo.com/images/e_brochure.pdf)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Held in New Delhi since 1996, and organized by the Ministry of Home Affairs, the expo is described as "India's largest show case of goods and services 	related to Homeland Security, Fire Safety, Traffic Management, Industrial Safety and Public Safety, Hospitality and Reality Security." With specific 	reference to the changing 'modus operandi of crime by using technology', the Expo focuses on using surveillance technologies for law enforcement purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Intellivision (USA); Intex (India); ESC Baz (Israel); Sparsh Securitech; Source Security (USA); Intellivision (USA); Interchain Solutions; 	ESSI; Kritikal; Matrix; Pace Solutions etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: According to the show's brochure, visitors include Central &amp;amp; State Police Organisations, Paramilitary Forces, Policy-makers from the 	Government, Industrial Establishments, Security Departments of Educational, Retail, Hospitality, Realty &amp;amp; other sectors, Colonisers, Builders, RWAs, 	System Integrators Large business houses and PSU's.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on display: Access control systems, surveillance devices, RFID, traffic surveillance and GPS Tracking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Secure Cities Expo (Brochures: &lt;/b&gt; 2013 - &lt;a href="http://securecitiesindia.com/Secure_Cities_2013_Brochure.pdf"&gt;http://securecitiesindia.com/Secure_Cities_2013_Brochure.pdf&lt;/a&gt;; 2014 - 	http://securecitiesindia.com/images/2014/SC_2014_Brochure.pdf.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secure Cities Expo has been organized since 2008, on the platform of providing homeland security solutions and technologies to government and private 	sector participants.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Dell; Palo Alto Networks; Motorola; Konnet; Vian Technologies; Quick Heal; Intergraph, GMR, Tac Technologies, Steria, Teleste, Elcom, Indian 	Eye Security; Mirasys; CBC Group; Verint (USA); IBM (USA); Digitals; EyeWatch; Kanoe; NEC (Japan); ACSG Corporate; ESRI (USA), etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors include government and law enforcement agencies including the Ministry of Home Affairs as well as systems integrators and private firms 	including telecom firms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on display: CCTV, Biometrics, Covert Tracking and Surveillance Software, Communication Interception, Location and Tracking systems, and IT 	Security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Defexpo India (Brochures: No publically available brochures)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By far India's largest security exposition, the Ministry of Defense has organized Defexpo India since 1999, showcasing defense, border, and homeland 	security systems from technology providers internationally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Aurora Integrated; Airbus Defence (France); Boeing (USA); Hacking Team (Italy); Kommlabs (Germany); Smoothwall; Atlas Electronik; Cyint; 	Audiotel International; Cobham; Tas-Agt; Verint; Elsira (Elbit) (Israel); IdeaForge; Comint; Controp; Northrop Gruman; Raytheon; C-DoT; HGH Infrared 	(Israel); Okham Solutions (France); Septier (Israel); Speech Technology Centre (Russia); Aerovironment (USA); Textron; Sagem (France); Amesys (France); 	Exelis; ITP Novex (Israel), etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: The latest edition of the Expo saw participation from governmental delegations from 58 countries, besides Indian governmental and law enforcement 	authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on display: The entire spectrum of surveillance and homeland security devices is on display at Defexpo, from Infrared Video to Mass Data 	Interception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Convergence India Expo (Brochures: &lt;/b&gt; 2012 - &lt;a href="http://convergenceindia.org/download/CI2012-PSR.pdf"&gt;http://convergenceindia.org/download/CI2012-PSR.pdf&lt;/a&gt;; 2014 -&lt;a href="http://www.convergenceindia.org/pdf/CI-2014-Brochure.pdf"&gt;http://www.convergenceindia.org/pdf/CI-2014-Brochure.pdf&lt;/a&gt;; 2015 -	&lt;a href="http://www.convergenceindia.org/pdf/brochure-2015.pdf"&gt;http://www.convergenceindia.org/pdf/brochure-2015.pdf&lt;/a&gt;.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Convergence India, being held in New Delhi since 1991, is a platform for interaction between Information and Communication Technology providers and 	purchasers in the market. In recent years, the expo has catered to the niche market for IT surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: ELT (UK); Comguard; Fastech; Synway (China); Saltriver; Anritsu (Japan); Cdot; Fastech; Rahul Commerce; Deviser Electronics; RVG Diginet; Blue 	Coat (USA); Cyberoam (USA); ZTE (China); Net Optics (USA); Controp; Comint etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors include Paramilitary Forces, Cable Operators, Government Ministries and PSU's and Telecom and Internet Service Providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on Display: Biometrics, Content Filtering, Data Mining, Digital Forensics, IP-Surveillance, Embedded Softwares, Network Surveillance and 	Satellite Monitoring were some of the technologies on display.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;International Police Expo (Brochures: &lt;/b&gt; 2014 - http://www.nexgengroup.in/exhibition/internationalpoliceexpo/download/International_Police_Expo_2014.pdf.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The International Police Expo held in New Delhi focuses on providing technologies to police forces across India, with specific focus on IT security and 	communications security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: 3G Wireless Communications Pvt Ltd; Motorola Solutions; Cyint; Matrix Comsec; Cellebrite; Hayagriva; MKU; CP Plus etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors include State Police, Procurement Department, CISF, CRPF, RAF, BSF, Customs, GRPF, NDRF, Special Frontier Force, Para Commandos, Special 	Action Group, COBRA and PSU's and educational institutes, stadiums and municipal corporations, among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on display: Technologies include RFID and surveillance for Internal Security and Policing, CCTV and Monitoring, Vehicle Identification 	Systems, GPS, Surveillance for communications and IT, Biometrics and Network surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8. &lt;/b&gt; &lt;b&gt;Electronics For You Expo (EFY Expo) (&lt;/b&gt; 2014 -	&lt;a href="http://2013.efyexpo.com/wp-content/uploads/2014/03/efy_PDFisation.pdf"&gt;http://2013.efyexpo.com/wp-content/uploads/2014/03/efy_PDFisation.pdf&lt;/a&gt;; 	2015 - http://india.efyexpo.com//wp-content/uploads/2014/03/5th%20EFY%20Expo%20India_Brochure.pdf.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;EFY Expo is a electronics expo which showcases technologies across the spectrum of electronics industry. It has been held since 2010, in New Delhi, and is 	partnered by the Ministry of Communications and IT and the Ministry of Electronics and IT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Vantage Security; A2z Securetronix; Avancar Security; Digitals security; Securizen Systems; Vision Security; Mangal Security Systems, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: The visitors include Government Agencies and ministries as well as systems integrators and telecom and IT providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on display: Identification and Tracking Products and Digital Security Systems are a specific category of the technologies on display.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;9. &lt;/b&gt; &lt;b&gt;Indesec Expo (Brochures: &lt;/b&gt; 2009 - http://www.ontaero.org/Storage/14/897_INDESEC_Oct11-13_2009.pdf. &lt;b&gt;)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An exhibition focused on homeland security, and sponsored by the Ministry of Home Affairs, the expo has been held since 2008 in New Delhi, which includes a 	specific category for cyber security and counter terrorism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Rohde and Schwarz; Salvation Data; AxxonSoft; KritiKal; Shyam Networks; Teledyne Dalsa; Honeywell; General Dynamics; Northrop Grumman; 	Interchain Solutions, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors include officials of the central government, central police and paramilitary forces, Ministry of Defence, central government 	departments, institutes and colleges, state government and police and ports and shipping companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10. &lt;/b&gt; &lt;b&gt;Next Generation Cyber Threats Expo &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Held since 2012 in New Delhi and Mumbai, the Next Generation Cyber Threats Expo focuses on securing cyber infrastructure and networks in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Ixia, CheckPoint, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors include Strategic Planning Specialists, Policy Makers and Law Enforcement among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;11. &lt;/b&gt; &lt;b&gt;SmartCards/RFID/e-Security/Biometrics expo (Brochures: &lt;/b&gt; 2013 - 	&lt;a href="http://cis-india.org/internet-governance/blog/brochures-from-expos-in-india-2013"&gt; http://cis-india.org/internet-governance/blog/brochures-from-expos-in-india-2013 &lt;/a&gt; ; 2015 -	&lt;a href="http://www.smartcardsexpo.com/pdf/SmartCards_Expo_2015_Brochure_$.pdf"&gt;http://www.smartcardsexpo.com/pdf/SmartCards_Expo_2015_Brochure_$.pdf&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These expos are organized by Electronics Today in Delhi or Mumbai since 1999 and supported by the Ministries of Commerce, Home Affairs and External 	Affairs. They showcase various identification solutions, attended by hundreds of domestic and international exhibitors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Target audiences include central and local level law enforcement and government organizations, Colleges and Universities, and defense forces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12. &lt;/b&gt; &lt;b&gt;Com-IT Expo (Brochure: &lt;/b&gt; 2014 - http://www.comitexpo.in/doc/Brochure.pdf)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This expo has been organized by the Trade Association of Information and Technology in Mumbai since 2008, and focuses on software and hardware Information 	Technology, with specific focus on IT security and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors include Government Agencies, Airport Authorities, Police and Law Enforcement, Urban Planners, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies Displayed: CCTV's, Surveillance Devices and IP Cameras, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;13. &lt;/b&gt; &lt;b&gt;GeoIntelligence India (Brochures: &lt;/b&gt; 2013 - http://www.geointelligenceindia.org/2013/Geointelligence%20India%20Brochure.pdf; 2014 - http://geointworld.net/Documents/GeoInt_Brochure_2014.pdf.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is an exposition held in New Delhi since 2014, organized by Geospatial Media and Communications Pvt Ltd, and is 'dedicated to showcasing the highest 	levels of information exchange and networking within the Asian defense and security sector.'&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: ESRI (USA); BAE Systems (UK); Leica (Switzerland); Helyx (UK); Digital Globe; Intergraph; Trimble (USA); RSI Softech; Silent Falcon etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors included the Director General of Information Systems, CRPF, Manipur, Delhi, Haryana and Nagaland Police, CBI, ITBP, NSDI, SSB, National 	Investigation Agency, Signals Intelligence Directorate among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Surveillance Wares in India - The Surveillance Exhibits and what they tell us about the Indian Surveillance Industry&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An analysis of the above companies and their wares give us some insight into what is being bought and sold in the surveillance industry, and by whom. 	Broadly, the surveillance technologies can be grouped in the following categories:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Video Surveillance and Analysis&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IP Video Surveillance and CCTV are quickly becoming the norm in public spaces. Emerging video surveillance tools allow for greater networking of cameras, 	greater fields of vision, cheaper access and come with a host of tools such as facial recognition and tracking as well as vehicle tracking. For example, 	IBM has developed an IP Video Analytics system which couples monitoring with facial recognition.&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; USA's Intellivision also offers analytics systems which enable licence plate tracking, facial recognition and object recognition.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; HGH Infrared's &lt;i&gt;Spynel &lt;/i&gt;system allows infrared wide-area surveillance,&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; and CBC's GANZ allows long-range, hi-resolution surveillance.	&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Video surveillance is gradually infiltrating public spaces in most major cities, with Governments promoting large-scale video surveillance schemes for 	security, with no legal sanctions or safeguards for protecting privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies showcasing Video Surveillance: 3G Wireless Communications Pvt Ltd, Motorola Solutions (USA), Bosch, CP Plus, Ivis, Aditya Infotech, Micro 	technologies, Core Tech (Denmark), Merit Lilin , Schneider Electric, Shyam Systems, Dalsa, Honeywell, Teleste, Mirasys, CBC Group, Infinova, Radar Vision, 	QNAP, Ensign, Winposee, Bosch, Hik Vision (China), Alhua, Axis Communications, Vivotech (Taiwan), Endroid (USA), Vantge (UK), Pelco (France), Advik, Hi 	Focus (UK), ESMS, Keeper (China), Neoteric, Vizor, Verint (USA), IBM (USA), Digitals Security, Intellivision (USA), Intex, Esc Baz (Israel), Sparsh 	Securitech, A2zsecuretronix, Avancar Security, Securizen Systems, Vision Security, HGH Infrared (Israel).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;RFID/Smart Cards/Biometric Identification&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has begun the implementation of the Unique Identification Programme for its 1.2 billion strong population, combining a host of identification 	technologies to provide a unique identification number and Aadhar Card - promoted as an all-purpose ID. However, this remains without legislative sanction, 	and continues in the face of severe privacy concerns. Such centralized, accessible databases of ostensibly private information present a grave threat to 	privacy. RFID, Smart Cards and Biometric Identification technologies (like the Aadhar) all make individual monitoring and surveillance significantly easier 	by enabling tracking of individual movements, consumer habits, attendance, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies showcasing Identification Technologies:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;AxxonSoft, Matrix Comsec, Ensign, Hi focus, Intellivision (USA), Interchain solutions, Inttelix, Kanoe, NEC (Japan), Pace, Realtime, Secugen, Source 	Security (USA), Spectra, Speech technology centre (Russia), BioEnable Technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(For a more detailed list, see the Smart Cards Expo Brochures, linked above)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Mass Data Gathering, Monitoring and Analysis &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The age of Big Data has led to big surveillance. Information and communication technologies now host significant amounts of individual data, and the 	surveillance industry makes all of this data accessible to a surveyor. Government mandated surveillance means any and all forms of communication and data 	monitoring are being implemented in India - there are network taps on telephony and deep packet inspection on internet lines, which makes telephone calls, 	SMS, VoIP, Internet searches and browsing and email all vulnerable to surveillance, constantly monitored through systems like the Central Monitoring 	System. Moreover, centralized information stores enable data mining - extracting and extrapolating data to enable better surveillance, which is what 	India's NATGRID aims to do.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hacking Team Italy, Blue Coat USA and Amesys France, three of the five companies identified as 'enemies of the internet' for enabling dictatorships to use 	surveillance to quell dissent and violate human rights,&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; have all presented surveillance solutions at 	Defexpo India. Cyberoam USA and ZTE China also market Deep Packet Inspection technology,&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; while ESRI's Big Data suite allows analysis through mass surveillance and analysis of social media and publically available sources.	&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian companies showcasing mass data monitoring technologies include Cyint, Fastech DPI tools,&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; Kommlabs VerbaProbe packet switching probes,&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; and ACSG's OSINT, which allows Big Data social media 	surveillance and Call Data Record analysis.&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies showcasing Data Gathering and Monitoring technologies:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cobham, Comguard, Cyint, ELT (UK), Fastech, Hacking Team (Italy), Smoothwall (USA), Verint Systems (USA), Cyint technologies, Atlas Electronik (Germany), 	Audiotel International (UK), Avancar, Cobham (UK), ELT (UK), Eyewatch, Kommlabs, Mangal Security Systems, Merit Lilin (Taiwan), Ockham Solutions (France), 	Septier (Israel), Synway (China), ACSG Corporate, Amesys (France), Anritsu (Japan), Axis (Sweden), BAE Systems (UK), Blue Coat (USA), C-dot, Comint, 	Cyberoam (USA), Deviser Electronics, Elsira (Elbit) (Israel), Esri (USA), Exelis, General Dynamics (USA), Helyx (UK), ITP Novex (Israel), Leica 	(Switzerland), Net Optics (Ixia) (USA), Northrop Gruman (USA), Rahul Commerce, Rohde And Schwarz (Germany), RVG Diginet, Tas-Agt, Trueposition (USA), Zte 	Technologies (China).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cell-Phone Location Tracking and Vehicle Monitoring&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A number of technologies enable location tracking through vehicle GPS, GLONASS or other location technologies. RFID or optical character recognition 	further enables Automatic Number Plate Recognition, which can be exploited to enable vehicle surveillance to track individual movements. Embedded hardware 	and software on mobile phones also allows constant transmission of location data, which is exploited by surveillance agencies to track individual movements 	and location.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies showcasing Cell-Phone Location Tracking technologies: Verint, Eyewatch, Septier (Israel), True Position (USA),&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies showcasing Vehicle Monitoring technologies: Hi-techpoint technologies pvt ltd, Axxonsoft, Essi, Fareye, Intellivision (USA), Interchain 	Solutions, ITP Novex (Israel), Kaneo, Kritikal, NEC (Japan), Saltriver Infosystems, Vision Security Systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Air/Ground Drones and Satellite Surveillance&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The use of unmanned drones for security purposes is being adopted for law enforcement and surveillance purposes across the world, and India is no 	exception, using UAV's for surveillance in insurgency-hit areas,&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; amongst other uses, while still having 	no regulations for their use.&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; Drones, both aerial and ground level, are capable of large-scale 	territorial surveillance, often equipped with high-technology video surveillance that allows for efficient monitoring at the ground level.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Digital Globe offers satellite reconnaissance surveillance coupled with Big Data analysis for predictive monitoring.	&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt; Controp offers cameras specifically for aerial surveillance, while Sagem's Patroller Drone and Sperwer, and Silent Falcon's Solar Powered surveillance drone are Unmanned Aerial Vehicles (UAV's) for aerial video surveillance. Auruora Integrated,	&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; and IdeaForge are Indian companies which have developed UAV surveillance drones in collaboration with 	Indian agencies.&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies showcasing Drone Surveillance: Aurora Integrated, Controp (Israel), Aerovironment (USA), Digital Globe (USA), ESRI (USA), Intergraph (USA), RSI 	Softech, Sagem (France), Silent Falcon (UAS), Textron (USA), Trimble (USA), Northrop Grumman (USA).&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;br clear="all" /&gt; 
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Wikileaks, The Spy Files, &lt;i&gt;available at &lt;/i&gt;https://www.wikileaks.org/the-spyfiles.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Lawrence Lessig, &lt;i&gt;Code V 2.0.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; For more information on the licensing regime, see&lt;i&gt; 'Data Retention in India', available at &lt;/i&gt; http://cis-india.org/internet-governance/blog/data-retention-in-india.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Rule 13, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Section 5, Indian Telegraph Act, 1885.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; &lt;i&gt;See, for example, &lt;/i&gt; the Bangalore Traffic Police CCTV Scheme, 			&lt;a href="http://www.bangaloretrafficpolice.gov.in/index.php?option=com_content&amp;amp;view=article&amp;amp;id=66&amp;amp;btp=66"&gt; http://www.bangaloretrafficpolice.gov.in/index.php?option=com_content&amp;amp;view=article&amp;amp;id=66&amp;amp;btp=66 &lt;/a&gt; ; the surveillance scheme supported by the MPLAD Scheme,			&lt;a href="http://mplads.nic.in/circular08112012.pdf"&gt;http://mplads.nic.in/circular08112012.pdf&lt;/a&gt;; Mumbai's proposed video surveillance scheme, 			http://www.business-standard.com/article/companies/wipro-tata-ibm-reliance-among-31-bids-for-cctv-scheme-in-mumbai-112112600160_1.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Information on the Forum is available at http://gdsf-india.com/Global-Digital-Surveillance-Forum1/images/GDSF-Bengaluru-Conference-program.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; http://www-01.ibm.com/support/knowledgecenter/SS88XH_1.6.0/iva/int_i2frs_intro.dita&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; http://www.intelli-vision.com/products/recognition-suite&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; http://www.hgh-infrared.com/Products/Optronics-for-security&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; http://www.ifsecglobal.com/cbc-high-end-surveillance-tech-on-display-at-ifsec-india/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; http://surveillance.rsf.org/en/category/corporate-enemies/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; http://www.cyberoam.com/firewall.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; http://www.esri.com/products/arcgis-capabilities/big-data&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; http://www.fastech-india.com/packetBrokers.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; http://www.kommlabs.com/products-verbaprobe.asp&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; http://www.acsgcorporate.com/osint-software.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; http://timesofindia.indiatimes.com/india/UAV-proves-ineffective-in-anti-Maoist-operations/articleshow/20400544.cms&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; http://dronecenter.bard.edu/drones-in-india/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; https://www.digitalglobe.com/products/analytic-services&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; http://www.aurora-is.com/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; http://www.ideaforge.co.in/home/&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos'&gt;https://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-03-08T12:25:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/preliminary-submission-on-internet-governance-issues-to-assocham">
    <title>Preliminary Submission on "Internet Governance Issues" to the Associated Chambers of Commerce &amp; Industry of India </title>
    <link>https://cis-india.org/internet-governance/blog/preliminary-submission-on-internet-governance-issues-to-assocham</link>
    <description>
        &lt;b&gt;On January 30, 2015, Associated Chambers of Commerce &amp; Industry of India (ASSOCHAM) held a consultation on Internet governance. A committee was set up to draft a report on Internet governance, with a focus on issues relevant to India. The Centre for Internet and Society (CIS) is represented on the committee, and has provided its preliminary comments to ASSOCHAM.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;ASSOCHAM convened a meeting of its members and other stakeholders, at which CIS was represented. At this meeting, inputs were sought on Internet governance issues relevant for India, on which the industry body proposed to make comments to the Ministry of External Affairs, Government of India. Such a discussion, proposing to consolidate the views of ASSOCHAM members in consultation with other stakeholders, is a commendable move. This submission presents preliminary comments from the Centre for Internet and Society (CIS) in light of ASSOCHAM's consultation on Internet governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I. &lt;/b&gt; &lt;b&gt;&lt;span&gt;About CIS&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; CIS is a non-profit research organization that works, &lt;i&gt;inter alia&lt;/i&gt;, on issues relating to privacy, freedom of expression, intermediary liability and 	internet governance, access to knowledge, open data and open standards, intellectual property law, accessibility for persons with disabilities, and engages 	in academic research on the budding Indian disciplines of digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; CIS engages in international and domestic forums for Internet governance. We are a Sector-D member of the International Telecommunications Union (ITU),&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; and participated in the World Conference on International Telecommunications (WCIT), 2012 (Dubai)	&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; and the Plenipotentiary Conference, 2014 (Busan).&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; We 	have also participated in the WSIS+10 Multistakeholder Preparatory Platform (MPP)&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; and the WSIS+10 High 	Level Event, organized by the ITU.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; CIS is also a member of the Non-Commercial Users Constituency (NCUC) at ICANN. Pranesh Prakash, our Policy Director, held a position on the NCUC Executive 	Committee from December 2013 to November 2014.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; CIS has been engaging at the Internet Governance Forum (IGF) since 2008, and has organized and participated in over 60 panels to date.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; We have also organized panels at the Asia-Pacific Regional IGF (APrIGF).	&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; Our Executive Director Sunil Abraham is a member of the Multistakeholder Advisory Group (MAG) for the 	India-IGF, and has attended in its meetings.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; We are also in the process of developing international principles for intermediary liability, in collaboration with international civil society organisations like EFF and Article19.	&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II. &lt;/b&gt; &lt;b&gt;&lt;span&gt;Structure of Submission&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; In this submission, we identify issues in Internet governance where engagement from and within India is necessary. In particular, brief descriptions of 	issues such as freedom of expression and privacy online, cyber-security, critical Internet resources and ICANN, multistakeholderism and net neutrality are 	provided.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III. &lt;/b&gt; &lt;b&gt;&lt;span&gt;Internet Governance Issues&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; The history of the Internet is unique, in that it is not exclusively government-regulated. Though governments regulate the Internet in many ways (for 	instance, by ordering website blocking or filtering, licensing of ISPs, encryption controls, investment caps, etc.), the running of the Internet is largely 	in the hands of private businesses, technical organisations and end-users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; International processes like the World Summit on Information Society (WSIS), and forums such as ICANN, the ITU, the IGF and the UN are involved in 	governing in the Internet in many ways. Regional organisations like the OECD, APEC and the Shanghai Cooperation Organisation (SCO) are also involved (for 	instance, in cyber-security matters).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8. &lt;/b&gt; The issues surrounding Internet governance are many, and range from telecom infrastructure and technical coordination to human rights and access to 	information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;&lt;span&gt;Rights Online&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;9. &lt;/b&gt; The status of 'human rights online' has come under discussion, with the	&lt;a href="http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf"&gt;NETmundial Outcome Document&lt;/a&gt; affirming that offline 	rights must also be protected online. These issues are important in the context of, among others, the large scale violations of privacy in light of the 	Snowden Revelations,&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; and increased instances of website blocking and takedowns in different parts of 	the world.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10. &lt;/b&gt; Internationally, issues of freedom of speech, privacy and access or the digital divide (though it is debatable that the latter is a human right) are discussed at the UN Human Rights Council, such as the	&lt;a href="http://geneva.usmission.gov/2012/07/05/internet-resolution/"&gt;resolution on human rights and the Internet&lt;/a&gt;, and the UN Human Rights Commissioner's	&lt;a href="http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf"&gt;report on the right to privacy in the digital age&lt;/a&gt; , which discusses the need for checks and balances on digital mass surveillance. During the Universal Periodic Review of India in 2012, India noted a 	&lt;a href="http://www.upr-info.org/database/index.php?limit=0&amp;amp;f_SUR=77&amp;amp;f_SMR=All&amp;amp;order=&amp;amp;orderDir=ASC&amp;amp;orderP=true&amp;amp;f_Issue=All&amp;amp;searchReco=&amp;amp;resultMax=100&amp;amp;response=&amp;amp;action_type=&amp;amp;session=&amp;amp;SuRRgrp=&amp;amp;SuROrg=&amp;amp;SMRRgrp=&amp;amp;SMROrg=&amp;amp;pledges=RecoOnly"&gt; recommendation from Sweden &lt;/a&gt; to " 	&lt;i&gt; ensure that measures limiting freedom of expression on the internet is based on clearly defined criteria in accordance with international human rights 		standard &lt;/i&gt; ".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;11. &lt;/b&gt; Freedom of speech and privacy are also relevant for discussion at the ITU.&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; For instance, at the Plenipotentiary meeting in 2014 (Busan), India proposed a resolution that sought, among other things, complete traceability of all Internet communications.	&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; This has implications for privacy that are not yet addressed by our domestic laws. A Privacy Bill and 	such other protections are only in the pipeline in India.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12. &lt;/b&gt; At ICANN as well, the &lt;a href="http://en.wikipedia.org/wiki/DNS_root_zone"&gt;root zone management&lt;/a&gt; function may affect freedom of expression. If, for 	instance, a top level domain (TLD) such as &lt;b&gt;.com &lt;/b&gt;is erased from the root zone file, hundreds of thousands of websites and their content can 	be wiped from the World Wide Web. A TLD can be erased by Verisign if a request to that effect is raised or accepted by ICANN, and signed off on by the National Telecommunications and Information Administration (NTIA) of the US government. Similarly,&lt;a href="http://whois.icann.org/en/about-whois"&gt;the WHOIS database&lt;/a&gt;, which contains information about the holders of domain names and IP addresses, has	&lt;a href="http://en.wikipedia.org/wiki/Domain_privacy"&gt;implications for privacy and anonymity&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;13. &lt;/b&gt; In India, the judiciary is currently adjudicating the constitutionality of several provisions of the Information Technology Act, 2000 (as amended in 2008), 	including S. 66A, S. 69A and S. 79. A series of writ petitions filed, among others, by the Internet Service Providers Association of India (ISPAI) and Mouthshut.com, relate to the constitutionality of the nature of content controls on the Internet, as well as intermediary liability.	&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;14. &lt;/b&gt; A judgment on the constitutionality of Ss. 66A, 69A and 79 are crucial for end-users and citizens, as well as companies in the Internet ecosystem. For 	instance, an uncertain intermediary liability regime with penalties for intermediaries - S. 79, IT Act and Intermediaries Guidelines Rules, 2011 - disincentivises ISPs, online news websites and other content providers like Blogger, Youtube, etc. from allowing free speech to flourish online.	&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt; The ongoing cases of &lt;i&gt;Kamlesh Vaswani &lt;/i&gt;v. &lt;i&gt;UOI &lt;/i&gt;and &lt;i&gt;Sabu George &lt;/i&gt;v. &lt;i&gt;UOI&lt;/i&gt; also have consequences for ISPs and search engines, as well as for fundamental rights.&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; International and domestic engagement is desirable, including in consultations with the Law Commission of India (for instance, the	&lt;a href="http://www.lawcommissionofindia.nic.in/views/Consultation%20paper%20on%20media%20law.doc"&gt;consultation on media laws&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;&lt;span&gt;Critical Internet Resources&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;15. &lt;/b&gt; Critical Internet Resources form the backbone of the Internet, and include management of IP addresses, the domain name system (DNS) and the root zone.	&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; ICANN, a global non-profit entity incorporated in California, manages the IANA functions (Internet 	Assigned Numbers Authority) for the global Internet. These functions include allocating the global pool of IP addresses (IPv4 and IPv6) to Regional 	Internet Registries (RIRs), administering the domain name system and maintaining a protocol registry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;16. &lt;/b&gt; At present, the IANA functions are performed under a &lt;a href="http://www.ntia.doc.gov/page/iana-functions-purchase-order"&gt;contract with the NTIA&lt;/a&gt;. On March 14, 2014, the	&lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;NTIA announced&lt;/a&gt; its intention 	to transition oversight of the IANA functions to an as-yet-undetermined "global multi-stakeholder body". The deadline for this transition is September 30, 2015, though the NTIA has	&lt;a href="http://www.ntia.doc.gov/speechtestimony/2015/remarks-assistant-secretary-strickling-state-net-conference-1272015"&gt;expressed its willingness&lt;/a&gt; to renew the IANA contract and extend the deadline. ICANN was charged with convening the transition process, and set up the	&lt;a href="https://www.icann.org/stewardship/coordination-group"&gt;IANA Coordination Group&lt;/a&gt; (ICG), a team of 30 individuals who will consolidate community input to create a transition proposal. At the moment, the&lt;a href="https://www.icann.org/en/system/files/files/cwg-naming-transition-01dec14-en.pdf"&gt;names (CWG-Names)&lt;/a&gt;,&lt;a href="https://www.nro.net/wp-content/uploads/ICG-RFP-Number-Resource-Proposal.pdf"&gt;numbers (CRISP)&lt;/a&gt; and	&lt;a href="http://datatracker.ietf.org/doc/draft-ietf-ianaplan-icg-response/"&gt;protocols (IETF)&lt;/a&gt; communities are debating existing draft proposals. A 	number of new entities with which ICANN will have contractual arrangements have been proposed. At ICANN's meetings in Singapore (February 7-12, 2015) and 	Buenos Aires (June 2015), these proposals will be discussed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;17. &lt;/b&gt; At the same time, a parallel track to examine ICANN's own transparency and accountability has been introduced. The	&lt;a href="https://community.icann.org/display/acctcrosscomm/CCWG+on+Enhancing+ICANN+Accountability"&gt;CCWG-Accountability&lt;/a&gt; is considering ICANN's 	accountability in two Workstreams: first, in light of the IANA transition and second, a revision of ICANN's policies and by-laws to strengthen 	accountability. ICANN's accountability and transparency are crucial to its continued role in Internet governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;18. &lt;/b&gt; Several issues arise here: Should ICANN continue to remain in the US? Should the IANA Functions Department be moved into a separate entity from ICANN? 	Ought ICANN's by-laws be amended to create oversight over the Board of Directors, which is now seen to have consolidated power? Ought ICANN be more 	transparent in its financial and operational matters, proactively and reactively?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;19. &lt;/b&gt; It is, for instance, beneficial to the stability of the Internet and to India if the IANA department is separate from ICANN - this will ensure a&lt;a href="https://cis-india.org/internet-governance/blog/cis-india.org/internet-governance/blog/icann-accountability-iana-transition-and-open-questions"&gt;separation of powers&lt;/a&gt;. Second,	&lt;a href="http://cis-india.org/internet-governance/blog/cis-comments-enhancing-icann-accountability"&gt;stronger transparency and accountability mechanisms&lt;/a&gt; are necessary for ICANN; it is a growing corporate entity performing a globally Internet function. As such,	&lt;a href="http://cis-india.org/internet-governance/blog/cis-receives-information-on-icanns-revenues-from-domain-names-fy-2014"&gt;granular information&lt;/a&gt; about ICANN's revenues and expenses should be made public. See, for ex.,&lt;a href="https://www.icann.org/en/system/files/files/cis-request-18dec14-en.pdf"&gt;CIS' request&lt;/a&gt; for ICANN's expenses for travel and meetings, and	&lt;a href="https://www.icann.org/en/system/files/files/cis-response-17jan15-en.pdf"&gt;ICANN's response&lt;/a&gt; to the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;20. &lt;/b&gt; The most ideal forum to engage in this is ICANN, and within India, working groups on Internet governance at the Ministry level. As such, ASSOCHAM may seek 	open, transparent and inclusive consultations with the relevant departments of the Government (the Ministry of External Affairs, DeitY, Department of 	Telecommunications). At ICANN, industry bodies can find representation in the Business Constituency or the Commercial Stakeholders Group. Additionally, 	comments and proposals can be made to the ICG and the CCWG-Accountability by anyone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;&lt;span&gt;Cyber-security &lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;21. &lt;/b&gt; Cyber-security is often used as an umbrella-term, covering issues ranging from network security (DNSSEC and the ICANN domain), cyber-crime, and 	cyber-incidents such as the 	&lt;a href="http://timesofindia.indiatimes.com/tech/it-services/How-to-fight-cyber-war-Estonia-shows-the-way/articleshow/24274994.cms"&gt; Distributed Denial of Service attacks &lt;/a&gt; on Estonian public institutions and the &lt;a href="http://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet"&gt;Stuxnet virus&lt;/a&gt; that attacked Iran's nuclear programme. Within the ITU, spam and child safety online are also assessed as security issues (See	&lt;a href="http://www.itu.int/en/ITU-T/about/groups/Pages/sg17.aspx"&gt;Study Group 17 under ITU-T&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;22. &lt;/b&gt; At the international level, the UN Group of Governmental Experts has	&lt;a href="http://www.un.org/disarmament/topics/informationsecurity/"&gt;published three reports&lt;/a&gt; to date, arguing also that in cyber-security incidents, 	international humanitarian law will apply. International humanitarian law applies during armed attacks on states, when special rules apply to the treatment 	of civilians, civilian and military buildings, hospitals, wounded soldiers, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;23. &lt;/b&gt; The ITU also launched a &lt;a href="http://www.itu.int/en/action/cybersecurity/Pages/gca.aspx"&gt;Global Cybersecurity Agenda&lt;/a&gt; in 2007, aiming at international cooperation. Such cooperative methods are also being employed at the OSCE, APEC and the SCO, which have developed drafts of	&lt;a href="http://www.osce.org/pc/109168?download=true"&gt;Confidence Building Measures&lt;/a&gt;. The Global Conferences on Cyberspace (London 2011, Budapest 2012, Seoul 2013, The Hague 2015) resulted in, &lt;i&gt;inter alia&lt;/i&gt;, the	&lt;a href="http://conventions.coe.int/Treaty/EN/Treaties/Html/185.htm"&gt;Budapest Convention on Cybercrime&lt;/a&gt;. India has not ratified the Convention, and 	remains tight-lipped about its security concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;24. &lt;/b&gt; Surveillance and monitoring of online communications is a crucial issue in this regard. In India, the surveillance power finds its source in S. 5, Telegraph Act, 1888, and the	&lt;a href="http://cis-india.org/internet-governance/resources/rule-419-a-indian-telegraph-rules-1951"&gt;Rule 419A of the Telegraph Rules, 1951&lt;/a&gt;. Further, S. 	69 of the Information Technology Act, 2000 and the 	&lt;a href="http://cis-india.org/internet-governance/resources/it-procedure-and-safeguards-for-interception-monitoring-and-decryption-of-information-rules-2009"&gt; Interception Rules, 2009 &lt;/a&gt; enable the government and authorized officers to intercept and monitor Internet traffic on certain grounds. Information regarding the implementation of 	these Rules is scant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;25. &lt;/b&gt; In any event, the applicability of targeted surveillance should be	&lt;a href="http://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india"&gt;subject to judicial review&lt;/a&gt; , and a balance should be struck between fundamental rights such as freedom of speech and privacy and the needs of security. An	&lt;a href="http://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability"&gt;accountability model&lt;/a&gt; such as that present in the UK for the Interception of Communications Commissioner may provide valuable insight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;26. &lt;/b&gt; In India, the government does not make public information regarding its policies in cyber-security and cybercrime. This would be welcome, as well as 	consultations with relevant stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;&lt;span&gt;Models of Internet Governance&lt;/span&gt;&lt;/i&gt;&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27. &lt;/b&gt; Multi-stakeholderism has emerged as one of the catchphrases in Internet governance. With the display of a multi-stakeholder model at NETmundial (April 	2014), controversies and opinions regarding the meaning, substance and benefits of multi-stakeholderism have deepened.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;28. &lt;/b&gt; The debates surrounding stakeholder-roles in Internet governance began with ¶49 of the Geneva Declaration of Principles and ¶35 of the	&lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt;, which delineated clear roles and responsibilities. It created a 	'contributory' multi-stakeholder model, where states held sovereign authority over public policy issues, while business and civil society were contributed 	to 'important roles' at the 'technical and economic fields' and the 'community level', respectively.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;29. &lt;/b&gt; As the WGEC meeting (April 30-May 2, 2014) demonstrated, there is as yet no consensus on stakeholder-roles. Certain governments remain strongly opposed to 	equal roles of other stakeholders, emphasizing their lack of accountability and responsibility. Civil society is similarly splintered, with a majority 	opposing the Tunis Agenda delineation of stakeholder-roles, while others remain dubious of permitting the private sector an equal footing in public 	policy-making.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;30. &lt;/b&gt; The positions in India are similarly divided. While there is appears to be high-level acceptance of "multi-stakeholder models" across industry, academia 	and civil society, there exists no clarity as to what this means. In simple terms, does a multi-stakeholder model mean that the government should consult industry, civil society, academia and the technical community? Or should decision-making power be split among stakeholders? In fact, the debate is	&lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2354377"&gt;more specific&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;31. &lt;/b&gt; In India, the Multistakeholder Advisory Group (MAG) for the India-IGF was established in February 2014, and some meetings were held. Unfortunately, neither 	the minutes of the meetings nor action points (if any) are publicly available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;32. &lt;/b&gt; The Indian government's position is more complex. At the 68&lt;sup&gt;th&lt;/sup&gt; UN General Assembly session in 2011, India argued for a (multilateral) 50-member 	UN &lt;a href="http://cis-india.org/internet-governance/blog/india-statement-un-cirp"&gt;Committee on Internet-related Policies (CIRP)&lt;/a&gt;. However, the Ministry 	for Communications and Information Technology (MCIT) has, over the years, presented differing views at the IGF and ITU through its two departments: DeitY and DoT. Further, at the meetings of the Working Group on Enhanced Cooperation (WGEC), India has presented	&lt;a href="http://unctad.org/Sections/un_cstd/docs/WGEC_IndiaMission.pdf"&gt;more nuanced views&lt;/a&gt;, suggesting that certain issues remain within the 	governmental domain (such as cyber-security and child online protection). At the 9&lt;sup&gt;th&lt;/sup&gt; IGF (Istanbul, September 2014), Mr. R.S. Sharma of the 	DeitY &lt;a href="http://www.intgovforum.org/cms/174-igf-2014/transcripts/1977-2014-09-04-ms-evolution-of-the-ig-main-room"&gt;echoed such a view&lt;/a&gt; of 	delineated roles for stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;33. &lt;/b&gt; A clear message from the Indian government, on whether it favours multistakeholderism or governmental policy authority for specific issues, would be 	invaluable in shaping opinion and domestic processes. In any event, a transparent consultative procedure to take into account the views of all stakeholders 	is desirable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;&lt;span&gt;Emerging Issues&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;Net Neutrality&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;34. &lt;/b&gt; In simple terms, net neutrality concerns differential treatment of packets of data by carriers such as ISPs, etc. over networks. The issue has gained international attention following the U.S. FCC's regulatory stance, and the U.S. Court of Appeal's 2014 decision in	&lt;a href="http://www.cadc.uscourts.gov/internet/opinions.nsf/3AF8B4D938CDEEA685257C6000532062/$file/11-1355-1474943.pdf"&gt;Verizon v. FCC&lt;/a&gt;. Though this decision turned on the interpretation of 'broadband providers' under the Communications Act, 1934, net neutrality has since been debated in the US, both	&lt;a href="http://techcrunch.com/2015/02/09/fcc-chairman-tom-wheeler-defends-his-net-neutrality-proposal/"&gt;by the FCC&lt;/a&gt; and other stakeholders. There is no international consensus in sight; the NETmundial Outcome Document	&lt;a href="http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf"&gt;recognized&lt;/a&gt; net neutrality as an emerging issue (page 	11, no. IV).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;35. &lt;/b&gt; In India, a TRAI consultation on Over-The-Top Services on August 5, 2014 brought concerns of telecom and cellular operators to light. OTTs were seen as 	hijacking a portion of telcos' revenues, and as lacking consumer protection and privacy safeguards. While these concerns are legitimate, net neutrality regulation is not yet the norm in India. In any event, any such regulation must	&lt;a href="http://cis-india.org/telecom/blog/otts-eating-into-our-revenue-telcos-in-india"&gt;take into account&lt;/a&gt; the consequences of regulation on 	innovation, competition, and consumer choice, as well as on the freedom of the medium (which may have detrimental impacts freedom of expression).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;36. &lt;/b&gt; Though net neutrality regulation is being mooted, there is as yet an&lt;a href="http://cis-india.org/internet-governance/blog/collection-of-net-neutrality-definitions"&gt;array of definitions&lt;/a&gt; of 'net neutrality'. The	&lt;a href="http://www.medianama.com/2014/11/223-net-neutrality-telcos-india/"&gt;views of telcos themselves differ&lt;/a&gt; in India. Further study on the methods of 	identifying and/or circumventing net neutrality is necessary before a policy position can be taken.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IV. &lt;/b&gt; &lt;b&gt;&lt;span&gt;Conclusions&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;37. &lt;/b&gt; CIS welcomes ASSOCHAM's initiative to study and develop industry-wide positions on Internet governance. This note provides brief descriptions of several 	issues in Internet governance where policy windows are open internationally and domestically. These issues include freedom of expression and privacy under 	Part III (Fundamental Rights) of the Constitution of India. The Supreme Court's hearing of a set of cases alleging unconstitutionality of Ss. 66A, 69, 69A 	and 79 (among others) of the IT Act, 2000, as well as consultations on issues such as pornography by the Rajya Sabha Parliamentary Committee and media laws 	by the Law Commission of India are important in this regard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;38. &lt;/b&gt; International and domestic engagement is necessary in the transition of stewardship of the IANA functions, as well as ICANN's own accountability and 	transparency measures. Similarly, in the area of cyber-security, though several initiatives are afoot internationally, India's engagement has been cursory 	until now. A concrete position from India's stakeholders, including the government, on these and the question of multi-stakeholderism in Internet 	governance would be of immense assistance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;39. &lt;/b&gt; Finally, net neutrality is an emerging issue of importance to industry's revenues and business models, and to users' rights such as access to information 	and freedom of expression.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr align="left" size="1" width="100%" /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; CIS gets ITU-D Sector Membership, &lt;a href="http://goo.gl/PBGKWt"&gt;goo.gl/PBGKWt&lt;/a&gt; (l.a. 8 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Letter for Civil Society Involvement in WCIT, &lt;a href="http://goo.gl/gXpYQD"&gt;goo.gl/gXpYQD&lt;/a&gt; (l.a. 8 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; See, ex., Hariharan, &lt;i&gt;What India's ITU Proposal May Mean for Internet Governance&lt;/i&gt;, &lt;a href="http://goo.gl/hpWaZn"&gt;goo.gl/hpWaZn&lt;/a&gt; (l.a. 8 			Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Panday, &lt;i&gt;WSIS +10 High Level Event: Open Consultation Process MPP: Phase Six: Fifth Physical Meeting&lt;/i&gt;,			&lt;a href="http://goo.gl/3XR24X"&gt;goo.gl/3XR24X&lt;/a&gt; (l.a. 8 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Hariharan, &lt;i&gt;WSIS+10 High Level Event: A Bird's Eye Report&lt;/i&gt;, &lt;a href="http://goo.gl/8XkwyJ"&gt;goo.gl/8XkwyJ&lt;/a&gt; (l.a. 8 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Pranesh Prakash elected as Asia-Pacific Representative to the Executive Committee of NonCommercial Users Constituency,			&lt;a href="http://goo.gl/iJM7C0"&gt;goo.gl/iJM7C0&lt;/a&gt; (l.a. 8 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; See, ex., &lt;i&gt;CIS@IGF 2014&lt;/i&gt;, &lt;a href="http://goo.gl/Werdiz"&gt;goo.gl/Werdiz&lt;/a&gt; (l.a. 8 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; &lt;i&gt;Multi-stakeholder Internet Governance: The Way Ahead&lt;/i&gt; , &lt;a href="http://goo.gl/NuktNi"&gt;goo.gl/NuktNi&lt;/a&gt;; &lt;i&gt;Minimising legal risks of online Intermediaries while protecting user rights,&lt;/i&gt; &lt;a href="http://goo.gl/mjQyww"&gt;goo.gl/mjQyww&lt;/a&gt; (l.a. 8 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; First Meeting of the Multistakeholder Advisory Group for India Internet Governance Forum, &lt;a href="http://goo.gl/NCmKRp"&gt;goo.gl/NCmKRp&lt;/a&gt; (l.a. 8 			Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; See Zero Draft of Content Removal Best Practices White Paper, &lt;a href="http://goo.gl/RnAel8"&gt;goo.gl/RnAel8&lt;/a&gt; (l.a. 8 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; See, ex., &lt;i&gt;UK-US surveillance regime was unlawful 'for seven years'&lt;/i&gt;, &lt;a href="http://goo.gl/vG8W7i"&gt;goo.gl/vG8W7i&lt;/a&gt; (l.a. 9 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; See, ex., &lt;i&gt;Twitter: Turkey tops countries demanding content removal&lt;/i&gt;, &lt;a href="http://goo.gl/ALyO3B"&gt;goo.gl/ALyO3B&lt;/a&gt; (l.a. 9 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; See, ex., &lt;i&gt;The ITU convenes a programme on Child Online Protection&lt;/i&gt;, &lt;a href="http://goo.gl/qJ4Es7"&gt;goo.gl/qJ4Es7&lt;/a&gt; (l.a. 9 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Hariharan, &lt;i&gt;Why India's Proposal at the ITU is Troubling for Internet Freedoms&lt;/i&gt;, &lt;a href="http://goo.gl/Sxh5K8"&gt;goo.gl/Sxh5K8&lt;/a&gt; (l.a. 9 			Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Hickok, &lt;i&gt;Report of the Group of Experts on Privacy vs. The Leaked 2014 Privacy Bill&lt;/i&gt;, &lt;a href="http://goo.gl/454qA6"&gt;goo.gl/454qA6&lt;/a&gt; (l.a. 			9 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; See, &lt;i&gt;Supreme Court Of India To Hear Eight IT Act Related Cases On 11th April 2014 - SFLC&lt;/i&gt;, &lt;a href="http://goo.gl/XLWsSq"&gt;goo.gl/XLWsSq&lt;/a&gt; (l.a. 9 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; See, Dara, &lt;i&gt;Intermediary Liability in India: Chilling Effects on Free Expression on the Internet&lt;/i&gt;,			&lt;a href="http://goo.gl/bwBT0x"&gt;goo.gl/bwBT0x&lt;/a&gt; (l.a. 9 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; See, ex., Arun, &lt;i&gt;Blocking online porn: who should make Constitutional decisions about freedom of speech?&lt;/i&gt;,&lt;a href="http://goo.gl/NPdZcK"&gt;goo.gl/NPdZcK&lt;/a&gt;; Hariharan &amp;amp; Subramanian,			&lt;i&gt;Search Engine and Prenatal Sex Determination: Walking the Tight Rope of the Law&lt;/i&gt;, &lt;a href="http://goo.gl/xMj4Zw"&gt;goo.gl/xMj4Zw&lt;/a&gt; (l.a. 9 			Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; CSTD, &lt;i&gt;The mapping of international Internet public policy issues&lt;/i&gt;, &lt;a href="http://goo.gl/zUWdI1"&gt;goo.gl/zUWdI1&lt;/a&gt; (l.a. 9 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/preliminary-submission-on-internet-governance-issues-to-assocham'&gt;https://cis-india.org/internet-governance/blog/preliminary-submission-on-internet-governance-issues-to-assocham&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-02-12T14:52:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection">
    <title>Winter School on Privacy, Surveillance and Data Protection </title>
    <link>https://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection</link>
    <description>
        &lt;b&gt;The   Centre   for   Communication   Governance   (CCG)   in   collaboration   with   the  UNESCO  Chair  on  Freedom  of  Communication  and  Information at  the  University  of  Hamburg  and  the  Hans   Bredow   conducted a week-long winter school on 'Privacy, Surveillance and Data Protection at National Law University, Delhi, from January 19 to 23, 2015.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The winter school focused on the law governing privacy in the EU and in India and covered issues ranging from surveillance to data protection. German and Indian members of faculty used interactive methods of teaching and group activities in each session, to help students from Germany, India and Israel contribute to the classroom and learn from each other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhairav Acharya was a speaker at the event. He spoke on 'privacy theory'. More &lt;a class="external-link" href="http://www.nludelhi.ac.in/wp-content/uploads/CCG-at-NLUD-Call-for-Delhi-Winter-School.pdf"&gt;information here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection'&gt;https://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-02-07T00:37:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
