<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 551 to 565.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/interview-with-big-brother-watch-on-privacy-and-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-maitreyee-boruah-june-29-2013-internet-users-enraged-over-us-online-spying"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/internet-surveillance-policy-lecture"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/home-images/Surveillance.png"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/internet-shutdowns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-shutdown-stories"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/irc18-offline-call"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/internet-privacy-surveillance.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/internet-opens-doors-to-trillions-more-net-addresses"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/internet-monitor-2013.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/internet-liability"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/internet-l-w"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/internet-institute-repository"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/internet-governance-forum-report-2017"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/interview-with-big-brother-watch-on-privacy-and-surveillance">
    <title>Interview with Big Brother Watch on Privacy and Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/interview-with-big-brother-watch-on-privacy-and-surveillance</link>
    <description>
        &lt;b&gt;Maria Xynou interviewed Emma Carr, the Deputy Director of Big Brother Watch, on privacy and surveillance. View this interview and gain an insight on why we should all "have something to hide"!&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;For all those of you who haven't heard of Big Brother Watch, it's a London-based campaign group which was founded in 2009 to protect individual privacy and defend civil liberties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.bigbrotherwatch.org.uk/about"&gt;Big Brother Watch&lt;/a&gt; was set up to challenge policies that threaten our  privacy, our freedoms and our civil liberties, and to expose the true  scale of the surveillance state. The campaign group has produced unique research exposing the erosion of civil liberties in the  UK, looking at the dramatic expansion of surveillance powers, the growth  of the database state and the misuse of personal information. Big Brother Watch campaigns to give individuals more control over their personal data,  and hold to account those who fail to respect our privacy, whether  private companies, government departments or local authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.bigbrotherwatch.org.uk/who-we-are/emma-frances-carr-deputy-director"&gt;Emma Carr&lt;/a&gt; joined Big Brother Watch as Deputy Director in February 2012 and has since been regularly quoted in the UK press. The Centre for Internet and Society interviewed Emma Carr on the following questions:&lt;/p&gt;
 &lt;ol&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;How do you define privacy?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Can privacy and freedom of expression co-exist? Why/Why 	not?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;What is the balance between Internet freedom and 	surveillance?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;According to your research, most people worldwide care 	about their online privacy – yet they give up most of it through 	the use of social networking sites and other online services. Why, 	in your opinion, does this occur and what are the potential 	implications?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Should people have the right to give up their right to 	privacy? Why/Why not?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;What implications on human rights can mass surveillance 	potentially have?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;“I'm not a terrorist and I have nothing to hide...and 	thus surveillance can't affect me personally.” Please comment.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Do we have Internet freedom?&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
&lt;p align="JUSTIFY"&gt; &lt;/p&gt;
&lt;p&gt;VIDEO  &lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/KhmwPYgLfjo" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/interview-with-big-brother-watch-on-privacy-and-surveillance'&gt;https://cis-india.org/internet-governance/blog/interview-with-big-brother-watch-on-privacy-and-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-15T14:24:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-maitreyee-boruah-june-29-2013-internet-users-enraged-over-us-online-spying">
    <title>Internet users enraged over US online spying</title>
    <link>https://cis-india.org/news/times-of-india-maitreyee-boruah-june-29-2013-internet-users-enraged-over-us-online-spying</link>
    <description>
        &lt;b&gt;India is the fifth most tracked nation by American intelligence agencies.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Maitreyee Boruah was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-06-29/people/40256468_1_privacy-private-information-sunil-abraham"&gt;published in the Times of India&lt;/a&gt; on June 29, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Have you been posting pictures and messages with gay abandon on your  social networking sites or having personal discussions on instant chat  or video messaging and thinking that no one other than the intended  recipient(s) has access to it? Well, going by the recent revelation that  government agencies, and that too from the US, have been spying on our  internet usage and collating private information, even the most hardcore  security settings for your online data are apparently of no use.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to former US &lt;a href="http://timesofindia.indiatimes.com/topic/Central-Intelligence-Agency"&gt;Central Intelligence Agency&lt;/a&gt; (CIA) employee Edward Snowden's testimony, the US National Security Agency ( &lt;a href="http://timesofindia.indiatimes.com/topic/National-Security-Agency"&gt;NSA&lt;/a&gt;)  has been using major tech giants to spy on private information of users  around the world. And India is the fifth most tracked nation by the US  intelligence system. But isn't this a direct infringement on our right  to privacy? Or are such measures the need of the hour, given the  increasing incidences of terror acts across the world?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What should the &lt;a href="http://timesofindia.indiatimes.com/topic/Indian-Government"&gt;Indian government&lt;/a&gt; do?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, a PIL (Public Interest Litigation) was filed in the Indian  Supreme Court on the issue of the web snooping by the US. The PIL  sought the Centre to initiate action against internet companies for  sharing information with foreign authorities, which amounts to breach of  contract and violation of the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"First, we need to urgently enact a horizontal privacy law, which articulates privacy principles and institutes &lt;a href="http://timesofindia.indiatimes.com/topic/The-Office"&gt;the office&lt;/a&gt; of the &lt;a href="http://timesofindia.indiatimes.com/topic/Privacy-Commissioner"&gt;privacy commissioner&lt;/a&gt;.  Second, we need to promote the use of encryption and other  privacy-enhancing technologies. The use of foreign internet  infrastructure by those in public offices should be banned, except in  the case of public dissemination. And last, but not the least, take  action against online firms that have access to personal data of users  and violate the privacy of Indian citizens through the office of the  regulator," suggests Sunil Abraham, executive director of  Bangalore-based research organization, Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anja Kovacs, project director at the Internet Democracy Project in  India, meanwhile, wants the Indian government to assert itself. "The  best the Indian government can do is to demand that this kind of  snooping does not happen. However, it can't ensure that such episodes  won't happen in the future, as there is no enforceable global legal  framework to deal with online snooping."&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Era of the Big Brother?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the lack of  legal support, does it mean that internet users have no right to  privacy? "We do have a right to privacy. Unfortunately, our right is not  respected. By and large, unless they use special tools to protect  themselves, internet users do not have any real privacy in many  countries, including India," says Anja, adding, "The right to privacy is  not explicitly included in the Constitution, and the Privacy Bill  continues to be pending. Also, Indian intelligence agencies are not  under supervision of the Parliament, which is an important weakness in  the accountability system." Echoing Anja, Sunil says, "In India,  unfortunately, our right to privacy is not sufficiently protected.  Indian laws are not strong enough to safeguard privacy of Internet  users."&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Anger in the online community&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A  large number of internet users who we spoke to said they were "shocked"  after hearing about the US government's spying mechanism. "The recent  revelation of snooping by the &lt;a href="http://timesofindia.indiatimes.com/topic/US-Government"&gt;US government&lt;/a&gt; is a clear case of intrusion into our privacy. It is absolutely illegal," says 24-year-old IT professional Subodh Gupta.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-maitreyee-boruah-june-29-2013-internet-users-enraged-over-us-online-spying'&gt;https://cis-india.org/news/times-of-india-maitreyee-boruah-june-29-2013-internet-users-enraged-over-us-online-spying&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-01T04:10:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/internet-surveillance-policy-lecture">
    <title>Internet Surveillance Policy: “…the second time as farce?” – A Public Lecture by Caspar Bowden</title>
    <link>https://cis-india.org/events/internet-surveillance-policy-lecture</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, Bangalore, invites you to a public lecture by Caspar Bowden*, the Chief Privacy Adviser of Microsoft’s Worldwide Technology Office, on Internet Surveillance Policy: “…the second time as farce?&lt;/b&gt;
        
&lt;h3&gt;Abstract&lt;/h3&gt;
&lt;p&gt;In 2000, as Director of the independent think-tank, "&lt;a class="external-link" href="http://www.fipr.org/"&gt;Foundation for Information Policy Research&lt;/a&gt;", Caspar led a campaign to revise several aspects of a new comprehensive UK law governing electronic surveillance ("&lt;a class="external-link" href="http://www.fipr.org/rip/"&gt;the RIP Act&lt;/a&gt;"). UK legislated in this area many years before most other countries, and the approach was widely criticized although some amendments were achieved. After a hiatus of a decade, many Commonwealth countries are now copying the RIP law (evidently unaware of the original controversies over its defects). Caspar will discuss the legal-technical intricacies of such legislation, the underlying policy dilemmas, the background context of the failed 1990s policy of “key escrow”, and the subsequent privacy catastrophe of blanket retention of the “traffic data” of all of the 500m citizens of the EU.&lt;/p&gt;
&lt;h2&gt;Caspar Bowden&lt;/h2&gt;
&lt;p&gt;Caspar Bowden is Microsoft's Worldwide Technology Officer for Privacy, providing advice on technology policy matters concerning privacy in over 40 countries, with particular focus on Europe and regions with horizontal privacy law. His goal is to ensure that users of Microsoft products and services are in control of their personal data and that fair information practices are respected. He is a specialist in data protection policy, privacy enhancing technology research, identity management and authentication.&lt;/p&gt;
&lt;p&gt;Earlier he was the director of the Foundation for Information Policy Research and was also an expert adviser to the UK Parliament for the passage of three bills concerning privacy issues, and was co-organizer of the influential Scrambling for Safety public conferences on UK encryption and surveillance policy. His previous career over two decades ranged from investment banking (proprietary trading risk-management for option arbitrage), to software engineering (graphics engines and cryptography), including work for Goldman Sachs, Microsoft Consulting Services, Acorn, Research Machines, and IBM.&lt;/p&gt;
&lt;h3&gt;Who should attend?&lt;/h3&gt;
&lt;p&gt;This public talk aims to engage in a dialogue with anybody interested in questions of technology, surveillance, policy and the politics of Internet based governance. Students, research scholars, academics, practitioners, those in the business of technology development, design and study, are invited to attend the lecture that approaches the issue from different angles of technology, society and politics.&amp;nbsp;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;Entry: Free; Limited Seating&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Registration recommended: prasad@cis-india.org&lt;br /&gt;&lt;br /&gt;For additional info &lt;a href="https://cis-india.org/internet-governance/internet-privacy-surveillance.pdf" class="internal-link" title="Internet Privacy and Surveillance"&gt;click here [PDF, 521 kb]&lt;/a&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;* &lt;em&gt;Caspar is speaking in his private capacity and his remarks do not necessarily reflect any official Microsoft position&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/div&gt;
&lt;h2&gt;Videos&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;embed width="250" height="250" allowfullscreen="true" allowscriptaccess="always" wmode="transparent" type="application/x-shockwave-flash" src="http://blip.tv/play/AYLM2GsA"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/internet-surveillance-policy-lecture'&gt;https://cis-india.org/events/internet-surveillance-policy-lecture&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Lecture</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-09-08T03:19:35Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/home-images/Surveillance.png">
    <title>Internet Surfing</title>
    <link>https://cis-india.org/home-images/Surveillance.png</link>
    <description>
        &lt;b&gt;Internet Surfing&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/home-images/Surveillance.png'&gt;https://cis-india.org/home-images/Surveillance.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-07-15T10:09:34Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/internet-shutdowns">
    <title>Internet Shutdowns</title>
    <link>https://cis-india.org/internet-governance/files/internet-shutdowns</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/internet-shutdowns'&gt;https://cis-india.org/internet-governance/files/internet-shutdowns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-04-27T15:53:53Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-shutdown-stories">
    <title>Internet Shutdown Stories</title>
    <link>https://cis-india.org/internet-shutdown-stories</link>
    <description>
        &lt;b&gt;A collection of stories of the impact of internet shutdowns on the lives of Indian citizens.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-shutdown-stories'&gt;https://cis-india.org/internet-shutdown-stories&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Ambika Tandon</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Access</dc:subject>
    
    
        <dc:subject>Internet Shutdown</dc:subject>
    
    
        <dc:subject>Digital Rights</dc:subject>
    

   <dc:date>2018-05-17T10:45:20Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/irc18-offline-call">
    <title>Internet Researchers' Conference 2018 (IRC18): Offline - Call for Sessions</title>
    <link>https://cis-india.org/raw/irc18-offline-call</link>
    <description>
        &lt;b&gt;Does being offline necessarily mean being disconnected? Beyond anxieties such as FOMO, being offline is also seen as disengagement from a certain milieu of the digital (read: capital), an impediment to the way life is organised by and around technologies in general. However, being offline is not the exception, as examples of internet shutdown and acts on online censorship illustrate the persistence and often alarming regularity of the offline even for the ‘connected’ sections of the population. The *offline* is the theme of the third Internet Researchers' Conference (IRC18). We invite teams of two or more members to submit sessions proposals by Sunday, November 19 (final deadline). The session selection process is described below. The Conference will be hosted by the Sambhaavnaa Institute of Public Policy and Politics (Kandbari, Palampur, Himachal Pradesh) on February 22-24, 2018.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;&lt;a href="#offline"&gt;IRC18: Offline&lt;/a&gt;&lt;/h4&gt;
&lt;h4&gt;&lt;a href="#call"&gt;Call for Sessions&lt;/a&gt;&lt;/h4&gt;
&lt;h4&gt;&lt;a href="https://cis-india.github.io/irc/irc18/proposed-sessions.html" target="_blank"&gt;Proposed Sessions&lt;/a&gt; (Conference Website)&lt;/h4&gt;
&lt;h4&gt;&lt;a href="http://www.sambhaavnaa.org/" target="_blank"&gt;Sambhaavnaa Institute of Public Policy and Politics&lt;/a&gt; (External Link)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3 id="offline"&gt;&lt;strong&gt;IRC18: Offline&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Does being offline necessarily mean being disconnected? Beyond anxieties such as FOMO, being offline is also seen as disengagement from a certain milieu of the digital (read: capital), an impediment to the way life is organised by and around technologies in general. However, being offline is not the exception, as examples of internet shutdown and acts on online censorship illustrate the persistence and often alarming regularity of the offline even for the ‘connected’ sections of the population.&lt;/p&gt;
&lt;p&gt;State and commercial providers of internet and telecommunication services work in tandem to produce both the “online” and the “offline” - through content censorship, internet regulation, generalised service provision failures, and so on. Further, efforts to prioritise the use of digital technologies for financial transactions, especially since demonetisation, has led to a not-so-subtle equalisation of the ‘online economy’ with the ‘formal economy’; thus recognising the offline as the zones of informality, corruption, and piracy. This contributes to the offline becoming invisible, and in many cases, illegal, rather than being recognised as a condition that necessarily informs what it means to be digital.&lt;/p&gt;
&lt;p&gt;Who is offline, and is it a choice? The global project of bringing people online has spurred several commendable initiatives in expanding access to digital devices, networks, and content, and often contentious ones such as Free Basics / internet.org, which illustrate the intersectionalities of scale, privilege, and rights that we need to be mindful of when we imagine the offline. Further, the experience of the internet, for a large section of people is often mediated through prior and ongoing experiences of traditional media, and through cultural metaphors and cognitive frames that transcend more practical registers such as consumption and facilitation. How do we approach, study, and represent this disembodied internet – devoid of its hypertext, platforms, devices, it's nuts and bolts, but still tangible through engagement in myriad, personal and often indiscernible ways.&lt;/p&gt;
&lt;h4&gt;For the third edition of the Internet Researchers’ Conference (IRC18), we invite participants to critically discuss the *offline*. We invite sessions that present or propose academic, applied, creative, or technical works that explore social, economic, cultural, political, infrastructural, or aesthetic dimensions of the *offline*.&lt;/h4&gt;
&lt;p&gt;For example, the sessions may explore one or more of the following themes:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Geographies of internet access: Infrastructural, socio-political, and discursive forces and contradictions&lt;/li&gt;
&lt;li&gt;Terms, objects, metaphors, and events of the internet and their offline remediation and circulation&lt;/li&gt;
&lt;li&gt;Minimal computing, maker cultures, and digital collaboration and creativity in the offline&lt;/li&gt;
&lt;li&gt;Offline economic cultures and transition towards less-cash economy&lt;/li&gt;
&lt;li&gt;Offline as democratic choice: the right to offline lives in the context of global debates on privacy, surveillance, and data justice&lt;/li&gt; 
&lt;li&gt;Methodologies of studying the *offline* at the intersections of offline and online lives&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Please note that the above are not sub-themes or tracks under which a session should be proposed, but are illustrations of possible session themes and concerns.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 id="call"&gt;&lt;strong&gt;Call for Sessions&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;We invite teams of two or more members to propose sessions for IRC18. All sessions will be one and half hours long, and will be fully designed and facilitated by the team concerned, including moderation (if any). Please remember this when planning the session. Everything happening during the session, except for logistical support, will be led and managed by the session team.&lt;/p&gt;
&lt;p&gt;The sessions are expected to drive conversations on the topic concerned. They may include presentation of research papers but this is not mandatory.&lt;/p&gt;
&lt;p&gt;We look forward to sessions that involve collaborative work (either in groups or otherwise), including discussions, interactions, documentation, learning, and making, are most welcome.&lt;/p&gt;
&lt;p&gt;We also look forward to sessions conducted in Indic languages. The proposing team, in such a case, should consider how participants who do not understand the language concerned may engage with the session. IRC organisers and other participants shall help facilitate these sessions, say by offering translation support.&lt;/p&gt;
&lt;p&gt;The only eligibility criteria for proposing sessions are that they must be proposed by a team of at least two members, and that they must engage with the *offline*.&lt;/p&gt;
&lt;p&gt;The deadline for submission of sessions proposals for IRC18 is &lt;strong&gt;Sunday, November 19 (final deadline)&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;To propose a session, please send the following documents (as attached text files) to raw@cis-india.org:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Title of the Session:&lt;/strong&gt; The session should be named in the form of a hashtag (check the &lt;a href="https://cis-india.org/raw/irc17-selected-sessions"&gt;IRC17 selected sessions&lt;/a&gt; for example).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Context of the Session:&lt;/strong&gt; This should be a 300 words note discussing the context, the motivations, and the expectations behind the proposed session.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Session Plan:&lt;/strong&gt; This should describe the objectives of the session, what will be done and discussed during the session, and who among the people organising the session will be responsible for what. This note need not be more than 300 words long. If your session involves inviting others to present their work (say papers), then please provide a description and timeline of the process through which these people will be identified.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Session Team Details:&lt;/strong&gt; Please share brief biographic notes of each member of the session team, and contact details.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;There is no registration fee for the Conference, but participants are expected to pay for their own travel and accommodation (to be organised by CIS) expenses. Limited funding will be available to support travel and accommodation expenses of few participants who are unemployed or under-employed.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Session selection process:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;November 19:&lt;/strong&gt; Deadline of submission of session proposals.All submitted sessions will be posted on the CIS website, along with the names and details of the session team members.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;November 20 - December 17:&lt;/strong&gt; Open review period. All session teams, as well as other interested contributors, are invited to review and comment upon each other's submitted proposals and revise their own. Read the proposed sessions here: &lt;a href="https://cis-india.github.io/irc/irc18/proposed-sessions.html"&gt;Conference Website&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;December 18-31:&lt;/strong&gt; The selection process takes place. All session teams will select 10 sessions to be included in the IRC18 programme. The votes will be anonymous, that is no session team will know which other sessions have voted for their session.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;January 08:&lt;/strong&gt; Announcement of selected sessions.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;February 22-24:&lt;/strong&gt; IRC18 at Sambhaavnaa Institute!&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/irc18-offline-call'&gt;https://cis-india.org/raw/irc18-offline-call&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha-pp</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Researcher's Conference</dc:subject>
    
    
        <dc:subject>IRC18</dc:subject>
    
    
        <dc:subject>RAW Events</dc:subject>
    

   <dc:date>2017-11-29T12:30:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india">
    <title>Internet Privacy in India</title>
    <link>https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india</link>
    <description>
        &lt;b&gt;Internet privacy encompasses a wide range of issues and topics. It can be understood as privacy rights that an individual has online with respect to their data, and violations of the same that take place online. Given the dynamic nature of the online sphere, privacy concerns and issues are rapidly changing. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;The Changing Nature of Information&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For example – the way in which the internet allows data to be produced, collected, combined, shared, stored, and analyzed is constantly changing and re-defining  personal data and what type of protections personal data deserves and can be given. For example, seemingly harmless data such IP address, key words used in searches, websites visited, can now be combined and analysed to identify individuals and learn personal information about an individual.  From information shared on social media sites, to cookies collecting user browser history, to individuals transacting online, to mobile phones registering location data – information about an individual is generated through each use of the internet. In some cases the individual is aware that they are generating information and that it is being collected, but in many cases, the individual is unaware of the information trail that they are leaving online, do not know who is accessing the information, and do not have control over how their information is being handled, and for what purposes it is being used. For example, law enforcement routinely troll social media sites for information that might be useful in an investigation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Blurry Line between the Public and Private Sphere&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The above example also highlights how the “sphere” of information on the internet is unclear i.e. is information posted on social media public information – free for use by any individual or entity including law enforcement, employees, data mining companies etc. or is information posted on social media – private, and thus requires authorization for further use. For example, in India, in 2013 the Mumbai police established a “social media lab” for the purposes of monitoring and tracking user behavior and activities.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Authorization is not required for the lab to monitor individuals and their behavior, and individuals are not made aware of the same, as the project claims to analyze only publicly available information. Similar dilemmas have been dealt with by other countries. For example, in the U.S, individuals have contested the use of their tweets without permission,&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; while courts in the US have ruled that tweets, private and public, can be obtained by law enforcement with only a subpoena, as technically the information has been shared with another entity, and is therefore no longer private.&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;Indian Courts have yet to deal directly with the question of social media content being public or private information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Complication of Jurisdiction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The borderless nature of information flows over the Internet complicates online privacy, as individual's data is subjected to different levels of protection depending on which jurisdiction it is residing in. Thus, for example an Indian using Gmail, will be subject to the laws of the United States. On one hand this could be seen as a positive, if one country has stronger privacy protections than another, but could also be damaging to privacy in the reverse situation – where one company has lower privacy standards and safeguards. In addition to the dilemma of different levels of protection being provided over data as it flows through different jurisdictions, access by law enforcement to data stored in a different jurisdiction, or data from one country accessible to law enforcement because it is being processed in their jurisdiction, are two other complications that arise.  These complications cannot be emphasized more than with the case of the NSA Leaks. Because Indian data was residing in US servers, the US government could access and use the data with no obligation to the individual.&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;In response to the NSA leaks, the government of India has stated that all facts need to be known before any action is taken, while citizens initially sought to hold the companies who disclosed the data to US security agencies such as Google, Facebook etc. accountable.&lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite this, because the companies were acting within the legal limits of the United States where they were incorporated, they could not be held liable. In response to the dilemma, many actors in India, including government and industry are asking for the establishment of 'domestic servers'. For example, Dr. Kamlesh Bajaj, CEO of Data Security Council of India was quoted in Forbes magazine promoting the establishment of India centric social media platforms.&lt;a href="#fn6" name="fr6"&gt;[6] &lt;/a&gt;Similarly, after the PRISM scandal became public, the National Security Advisor requested the Telecom Department to only route traffic data through Indian servers.&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In these contexts, the internet is a driving force behind a growing privacy debate and awareness in India.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Current  Policy for Internet Privacy in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Currently, India's most comprehensive legal provisions that speak to privacy on the internet can be found in the Information Technology Act (ITA) 2000.  The ITA contains a number of provisions that can, in some cases, safeguard online privacy, or in other cases, dilute online privacy. Provisions that clearly protect user privacy include: penalizing child pornography,&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;penalizing, hacking and fraud&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;and defining data protection standards for body corporate.&lt;a href="#fn10" name="fr10"&gt;[10] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provisions that serve to dilute user privacy speak to access by law enforcement to user's personal information stored by body corporate&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; collection and monitoring of internet traffic data&lt;a href="#fn12" name="fr12"&gt;[12] &lt;/a&gt;and real time monitoring, interception, and decryption of online communications.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; Additionally, legislative gaps in the ITA serve to weaken the privacy of online users. For example, the ITA does not address questions and circumstances like the evidentiary status of social media content in India, merging and sharing of data across databases, whether individuals can transmit images of their own “private areas” across the internet, if users have the right to be notified of the presence of cookies and do-not track options, the use of electronic personal identifiers across data bases, and if individuals have the right to request service providers to take down and delete their personal content.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Online Data Protection&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Since 2010, there has been an increasing recognition by both the government and the public that India needs privacy legislation, specifically one that addresses the collection, processing, and use of personal data. The push for adequate data protection standards in India has come both from industry and industrial bodies like DSCI – who regard strong data protection standards as an integral part of business, and from the public, who has voiced increasing concerns that governmental projects, such as the UID, involved with collecting, processing, and using personal data are presently not adequately regulated and are collecting and processing data in such a way that abuses individual privacy.  As mentioned above, India's most comprehensive data protection standards are found in the ITA and are known as  the Information Technology “Reasonable security practices and procedures and sensitive personal data or information” Rules 2011.&lt;a href="#fn14" name="fr14"&gt;[14] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Rules seek to provide rights to the individual with regards to their information and obligate body corporate to take steps towards protecting the privacy of consumer's information. Among other things, the Rules define “sensitive personal information' and require  that any corporate body must publish an online privacy policy, provide individuals with the right to access and correct their information, obtain consent before disclosing sensitive personal information ' except in the case of law enforcement, provide individuals the ability to withdraw consent, establish a grievance officer, require companies to ensure equivalent levels of protection when transferring information, and put in place reasonable security practices. Though the Rules are the strongest form of data protection in India, they have not been recognized by the European Union as meeting the EU standards of “data secure”&lt;a href="#fn15" name="fr15"&gt;[15] &lt;/a&gt;and many gaps still exist. For example, the Rules apply only to:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Body corporate and not to the government&lt;/li&gt;
&lt;li&gt;Electronically generated and transmitted information &lt;/li&gt;
&lt;li&gt;A limited scope of sensitive personal information.&lt;/li&gt;
&lt;li&gt;A body corporate when a contractual agreement is not already in place.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;These gaps leave a number of bodies unregulated and types of information unprotected, and limits the scope of the Rules.  It is also unclear to what extent companies are adhering to these Rules, and if they are applying the Rules only to the use of their website or if they are also applying the Rules to their core business practices.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Cyber Cafés&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2011 the Guidelines for Cyber Café Rules were notified under the Information Technology Act. These Rules, among other things, require Cyber Café’s to retain the following details for every user for a period of one year: details of identification, name, address, contact number, gender, date, computer terminal identification, log in time, and log out time. These details must be submitted to the same agency as directed, on a monthly basis.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; Cyber Cafes must also retain the history of websites accessed and logs of proxy servers installed at the cyber café for a period of one year.&lt;a href="#fn17" name="fr17"&gt;[17] &lt;/a&gt;Furthermore, Cyber Café’s must ensure that the partitions between cubicles do not exceed four and half feet in height from floor level.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; Lastly, the cyber café owner is required to provide every related document, register, and information to any officer authorized by the registration agency on demand.&lt;a href="#fn19" name="fr19"&gt;[19] &lt;/a&gt;In effect, the identification and retention requirements of these rules both impact privacy and freedom of expression, as cyber cafes users cannot use the facility anonymously and all their information, including browser history, is stored on an a-priori basis. The disclosure provisions in these rules also impact privacy and demonstrate a dilution of access standards for law enforcement to users internet communications as the provision does not define:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;An authorization process by which the registration agency follows to authorize individuals to conduct inspections.&lt;/li&gt;
&lt;li&gt;Circumstances on which inspection of a Cyber Café by an authorized officer is necessary and permissible.&lt;/li&gt;
&lt;li&gt;The process for which information can be requested, and instead vaguely requires cyber café owners to disclose information “on demand”.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Online Surveillance and Access&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The ITA also allows for the interference of user privacy online by defining broad standards of access to law enforcement and security agencies, and providing the government with the power to determine what tools individuals can use to protect their privacy. This is most clearly demonstrated by provisions that permit the interception, monitoring, and decryption of digital communications&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; provide for the collection and monitoring of traffic data&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; and allow the government to set the national encryption standard.&lt;a href="#fn22" name="fr22"&gt;[22] &lt;/a&gt;In particular, the structure of these provisions and the lack of safeguards incorporated, serve as a dilution to user privacy. For example, though these provisions create a framework for interception they are missing a number of internationally recognized safeguards and practices, such as notice to the individual, judicial oversight, and transparency requirements. Furthermore, the provisions place extensive security and technical obligations on the service provider – as they are required to extend all facilities necessary to security agencies for interception and decryption, and hold the service provider liable for imprisonment up to seven years for non-compliance. This creates an environment where it is unlikely that the service provider would challenge any request for access or interception from law enforcement. Interception is also regulated through provisions and rules under the Indian Telegraph Act 1885 and subsequent ISP and UAS licenses.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Scope of Surveillance and Access&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The extent to which the Government of India lawfully intercepts communications is not entirely clear, but in 2011 news items quoted that in the month of July  8,736 phones and e-mail accounts were under lawful surveillance.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though this number is representative of authorized interception, there have been a number of instances of unauthorized interceptions that have taken place as well. For example, in 2013 it was found that in Himachel Pradesh 1371 phones were tapped based on verbal approval, while the Home Ministry had only authorized interception of 170.&lt;a href="#fn24" name="fr24"&gt;[24] &lt;/a&gt;This demonstrates that there are instances of when existing safeguards for interception and surveillance are undermined and highlights the challenge of enforcement for even existing safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Demonstrating the tensions between right to privacy and governmental access to communications, and at the same time highlighting the issue of jurisdiction was the standoff between RIM/BlackBerry and the Indian Government. For several years, the Indian Government has requested that RIM provide access to the company’s communication traffic, both BIS and BES, as Indian security agencies have been unable to decrypt the data. Solutions that the Indian Government has proposed include: RIM providing the decryption keys to the government, RIM establishing a local server, local ISPs and telcos developing an indigenous monitoring solution. In 2012, RIM finally established a server in Mumbai and in 2013 provided a lawful interception solution that satisfied the Indian Government.&lt;a href="#fn25" name="fr25"&gt;[25]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The implementation of the Central Monitoring System by the Indian Government is another example of the Government seeking greater access to communications. The system will allow security agencies to bypass service providers and directly intercept communications. It is unclear if the system will provide for the interception of only telephonic communications or if it will also allow for the interception of digital communications and internet traffic. It is also unclear what checks and balances exist in the system. By removing the service provider from the equation the government is not only taking away a potential check, as service providers can resist unauthorized requests, but it is also taking away the possibility for companies to be transparent about the interception requests that they comply with.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Future frameworks for privacy in India: The Report of the Group of Experts on Privacy&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In October 2012 the Report of the Group of Experts on Privacy was published by a committee of experts chaired by Justice A.P. Shah.&lt;a href="#fn26" name="fr26"&gt;[26] &lt;/a&gt;The report creates a set of recommendations for a privacy framework and legislation in India. Most importantly, the Report recognizes privacy as a fundamental right and defines nine National Privacy Principles that would apply to all data controllers both in the private sector and the public sector. This would work to ensure that businesses and governments are held accountable to protecting privacy and that legislation and practices found across sectors, states/governments, organizations, and governmental bodies are harmonized. The privacy principles are in line with global standards including the EU, OECD, and APEC principles on privacy, and include: notice, choice &amp;amp; consent, collection limitation, purpose limitation, access and correction, accountability, openness, disclosure of information, security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Report also envisions a system of co-regulation, in which the National Privacy Principles will be binding for every data controller, but Self Regulatory Organizations at the industry level will have the option of developing principles for that specific sector. The principles developed by industry must be approved by the privacy commissioner and be in compliance with the National Privacy Principles. In addition to defining principles, the Report recommends the establishment of a privacy commissioner for overseeing the implementation of the right to privacy in India and specifies that aggrieved individuals can seek redress either through issuing a complaint the privacy commissioner or going before a court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The nine national privacy principles include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notice: Principle 1: Notice&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A data controller shall give simple to understand notice of its information practices to all  individuals, in clear and concise language, before any personal information is collected from them. Such notices should include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;During Collection &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What personal information is being collected; &lt;/li&gt;
&lt;li&gt;Purposes for which personal information is being collected; &lt;/li&gt;
&lt;li&gt;Uses of collected personal information; &lt;/li&gt;
&lt;li&gt;Whether or not personal information may be disclosed to third persons; &lt;/li&gt;
&lt;li&gt;Security safeguards established by the data controller in relation to the personal information; &lt;/li&gt;
&lt;li&gt;Processes available to data subjects to access and correct their own personal information; &lt;/li&gt;
&lt;li&gt;Contact details of the privacy officers and SRO ombudsmen for filing complaints. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Other Notices&lt;/b&gt;&lt;br /&gt;Data breaches must be notified to affected individuals and the commissioner when applicable. Individuals must be notified of any legal access to their personal information after the purposes of the access have been met. Service providers would have to explain how the information would be used and if it may be disclosed to third persons such as advertisers, processing  Individuals must be notified of changes in the data controller’s privacy policy. Any other information deemed necessary by the appropriate authority in the interest of the privacy of data subjects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: A telecom service provider must make available to individuals a privacy policy before any personal information is collected by the company. The notice must include all categories of information as identified in the principle of notice. For example, the service provider must identify the types of personal information that will be collected from the individual from the initial start of the service and during the course of the consumer using the service. For a telecom service provider this could range from name and address to location data.  The notice must identify if information will be disclosed to third parties such as advertisers, processers, or other telecom companies. If a data breach that was the responsibility of the company takes place, the company must notify all affected customers. If individuals have their personal data accessed or intercepted by Indian law enforcement or for other legal purposes, they have the right to be notified of the access after the case or other purpose for the data has been met.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 2: Choice and Consent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A data controller shall give individuals choices (opt-in/opt-out) with regard to providing their personal information, and take individual consent only after providing notice of its information practices. Only after consent has been taken will the data controller collect, process, use, or disclose such information to third parties, except in the case of authorized agencies. When provision of information is mandated by law, it should be in compliance with all other National Privacy Principles. Information collected on a mandatory basis should be anonymized within a reasonable timeframe if published in public databases. As long as the additional transactions are performed within the purpose limitation, fresh consent will not be required. The data subject shall, at any time while availing the services or otherwise, also have an option to withdraw his/her consent given earlier to the data controller. In such cases the data controller shall have the option not to provide goods or services for which the said information was sought if such information is necessary for providing the goods or services. In exceptional cases, where it is not possible to provide the service with choice and consent, then choice and consent should not be required.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of implementation&lt;/b&gt;: If an individual is signing up to a service, a company can only begin collecting, processing, using and disclosing their data after consent has been taken. If the provision of information is mandated by law, as is the case for the census, this information must be anonymized after a certain amount of time if it is published in public databases. If there is a case where consent is not possible, such as in a medical emergency, consent before processing information, does not need to be taken.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 3: Collection Limitation&lt;/h3&gt;
&lt;p&gt;A data controller shall only collect personal information from data subjects as is necessary for the purposes identified for such collection, regarding which notice has been provided and consent of the individual taken. Such collection shall be through lawful and fair means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: If a bank is collecting information to open an account for a potential customer, they must collect only that information which is absolutely necessary for the purpose of opening the account, after they have taken the consent of the individual.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 4: Purpose Limitation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Personal data collected and processed by data controllers should be adequate and relevant to the purposes for which they are processed. A data controller shall collect, process, disclose, make available, or otherwise use personal information only for the purposes as stated in the notice after taking consent of individuals. If there is a change of purpose, this must be notified to the individual. After personal information has been used in accordance with the identified purpose it should be destroyed as per the identified procedures. Data retention mandates by the government should be in compliance with the National Privacy Principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: If a bank is collecting information from a customer for opening a bank account, the bank can only use that information for the purpose of opening the account and any other reasons consented to. After a bank has used the information to open an account, it must be destroyed. If the information is retained by the bank, it must be done so with consent, for a specific purpose, with the ability of the individual to access and correct the stored information, and in a secure fashion.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 5: Access and Correction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Individuals shall have access to personal information about them held by a data controller; shall be able to seek correction, amendments, or deletion such information where it is inaccurate; be able to confirm that a data controller holds or is processing information about them; be able to obtain from the data controller a copy of the personal data. Access and correction to personal information may not be given by the data controller if it is not, despite best efforts, possible to do so without affecting the privacy rights of another person, unless that person has explicitly consented to disclosure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: An individual who has opened a bank account, has the right to access the information that was initially provided and subsequently generated. If there is a mistake, the individual has the right to correct the mistake. If the individual requests information related to him that is stored on a family member from the bank, the bank cannot disclose this information without explicit consent from the family member as it would impact the privacy of another.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 6: Disclosure of Information&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A data controller shall only disclose personal information to third parties after providing notice and seeking informed consent from the individual for such disclosure. Third parties are bound to adhere to relevant and applicable privacy principles. Disclosure for law enforcement purposes must be in accordance with the laws in force. Data controllers shall not publish or in any other way make public personal information, including personal sensitive information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: If a website, like a social media site, collects information about how a consumer uses its website, this information cannot be sold or shared with other websites or partners, unless notice of such sharing has been given to the individual and consent has been taken from the individual. If websites provide information to law enforcement, this must be done in accordance with laws in force, and cannot be done through informal means. The social media site would be prohibited from publishing, sharing, or making public the personal information in any way without obtaining informed consent.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 7: Security&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A data controller shall secure personal information that they have either collected or have in their custody, by reasonable security safeguards against loss, unauthorised access, destruction, use, processing, storage, modification, deanonymization, unauthorized disclosure [either accidental or incidental] or other reasonably foreseeable risks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: If a company is a telecommunication company, it must have security measures in place to protect customers communications data from loss, unauthorized access, destruction, use, processing, storage, modification, denanonmyization, unauthorized disclosure, or other forseeable risk. This could include encrypting communications data, having in place strong access controls, and establishing clear chain of custody for the handling and processing communications data.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 8: Openness&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A data controller shall take all necessary steps to implement practices, procedures, policies and systems in a manner proportional to the scale, scope, and sensitivity to the data they collect, in order to ensure compliance with the privacy principles, information regarding which shall be made in an intelligible form, using clear and plain language, available to all individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: If a hospital is collecting and processing personal information of, for example, 1,000 patients, their policies and practices must reflect and be applicable to the amount, sensitivity, and nature of information that they are collecting. The policies about the same must be made available to all individuals – this includes individuals of different intelligence, skill, and developmental levels.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 9: Accountability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The data controller shall be accountable for complying with measures which give effect to the privacy principles. Such measures should include mechanisms to implement privacy policies; including tools, training, and education; external and internal audits, and requiring organizations or overseeing bodies extend all necessary support to the Privacy Commissioner and comply with the specific and general orders of the Privacy Commissioner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: To ensure that a hospital is in compliance with the national privacy principles, it must undertake activities like running trainings and providing educational information to employees on how to handle patient related information, conducting audits, and establishing an officer or body for overseeing the implementation of privacy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Public Discourses on Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In India, there have been a number of important discourses related to privacy around various projects and topics. These discourses have been driving public awareness about privacy in India, and represent an important indication of public perception of privacy and privacy concerns.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Unique Identification Project&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;One of these discourses is a public dialogue and debate on the Unique Identification Project. Since 2009 the Government of India has been rolling out an identity scheme known as UID or Aadhaar.  The scheme is applicable to all residents in India, and seeks to provide individuals with an identity based on their fingerprints, iris scans, and photograph. The project has been heavily supported by some, and at the same time, heavily critiqued by others. Of those critiquing the project, which included a Parliamentary Standing Committee on Finance,&lt;a href="#fn27" name="fr27"&gt;[27] &lt;/a&gt;privacy has been a driving force behind the concerns about the project. Arguing that not only does the UID Bill not have sufficient privacy safeguards in its provisions&lt;a href="#fn28" name="fr28"&gt;[28] &lt;/a&gt;but the design of the project and the technology of the project places individual privacy at risk. For example,  the project relies on centralized storage of biometrics collected under the scheme; it does not account for or address how transaction data that is generated each time an individual identifies himself/herself with the UID will be stored, processed, and shared; and does not provide adequate security measures to protect sensitive information like biometrics.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Human DNA Profiling Bill&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2006 the Department of Biotechnology piloted a draft human DNA Profiling Bill with the objective of creating DNA databases at the national and regional levels, and enabling the creation and storage of DNA profiles for forensic purposes. Since 2006 there have been two more drafts of the bill released to the public, and an expert committee has been created to finalize the text of the bill. Individuals, including the Centre for Internet and Society, publicly raising concern about the bill, cite a lack of privacy safeguards in the provisions, and expansive circumstances and reasons that the bill permits the creation and storage of DNA profiles.&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Surveillance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For many years there has been running public discourse about the surveillance that the Indian government has been undertaking. This discourse is growing and is now being linked to privacy and the need for India to enact a privacy legislation. As discussed above, the current surveillance regime is lacking on many fronts, while at the same time the government continues to seek greater interception powers and more access to larger sets of information in more granularity. Projects like the Central Monitoring System, NATGRID, and Lawful Interception Solutions have caused individuals to question the government on the proportionality of State surveillance and ask for a comprehensive privacy legislation that also regulates surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The need for strong and enforceable surveillance provisions is not unique to India, and in 2013 the International Principles on the Application of Human Rights to the Surveillance of Communications were drafted. The principles lay out standards that ensure that surveillance is in compliance with international human rights law and serve as safeguards that countries can incorporate into their regimes to ensure the same. The principles include: legality, legitimate aim, necessity, adequacy, proportionality, competent judicial authority, due process, user notification, transparency, public oversight, integrity of communications and systems, safeguards for international cooperation, safeguards against illegitimate access. Along with defining safeguards, the principles highlight the challenge of rapidly changing technology and how it is constantly changing how information can be surveilled by governments and what information surveilled by governments, and how information can be combined and analysed to draw conclusions about individuals.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A Privacy Legislation for India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Since 2010, there has been a strong public discourse around the need for a privacy legislation in India. In November 2010, a “Privacy Approach” paper was released to the public which envisioned the creation of a data protection legislation. In 2011, the Department of Personnel and Training released a draft privacy bill that defined a privacy regime that encompassed data protection, surveillance, and mass marketing, and recognized privacy as a fundamental right.&lt;a href="#fn31" name="fr31"&gt;[31] &lt;/a&gt;In 2012 the Report of the Group of Experts on Privacy, as discussed above, was published.&lt;a href="#fn32" name="fr32"&gt;[32] &lt;/a&gt;Presently, the Department of Personnel and Training is drafting the text of the Governments Privacy Bill.  In 2013, the Centre for Internet and Society drafted the Citizen’s Privacy Protection Bill – a citizen’s version of a privacy legislation for India.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt; From April 2013 – October 2013, the Centre for Internet and Society, in collaboration with the Federation of Indian Chambers of Commerce and Industry and the Data Security Council of India, held a series of seven Privacy Roundtables across India.  The objective of the Roundtables was to gain public feedback to a privacy framework in India. Topics discussed during the meetings included, how to define sensitive personal information vs. Personal information, if co-regulation should be a model adopted as a regulatory framework, and what should be the legal exceptions to the right to privacy.&lt;a href="#fn34" name="fr34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Clearly, privacy is an emerging and increasingly important field in India’s internet society. As companies collect greater amounts of information from and about online users, and as the government continues to seek greater access and surveillance capabilities, it is critical that India prioritizes privacy and puts in place strong safeguards to protect the privacy of both Indians and foreigners whose data resides temporarily or permanently in India.  The first step towards this is the enactment of a comprehensive privacy legislation recognizing privacy as a fundamental right. The Report of the Group of Experts on Privacy and the government considering a draft privacy bill are all steps in the right direction.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. http://www.zdnet.com/in/india-sets-up-social-media-monitoring-lab-7000012758/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. http://www.techdirt.com/articles/20130203/18510621869/investigative-journalist-claims-her-public-tweets-arent-publishable-threatens-to-sue-blogger-who-does-exactly-that.shtml&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. http://www.bbc.co.uk/news/technology-24744695&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. http://www.thehindu.com/news/national/sc-to-hear-pil-on-us-surveillance-of-internet-data/article4829549.ece&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. http://forbesindia.com/article/checkin/indias-internet-privacy-woes/35971/1&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. http://www.thehindubusinessline.com/industry-and-economy/info-tech/route-domestic-net-traffic-via-india-servers-nsa-tells-operators/article5022791.ece&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. ITA section 67&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. ITA section 43, 66, and 66F&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Information Technology (Reasonable security practices and procedures and Sensitive personal data or information) Rules, 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Information Technology (Reasonable security practices and procedures and Sensitive personal data or information) Rules, 2011.  section 6(1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Information Technology (Procedure and Safeguards for monitoring and collection of Traffic Data or other information) Rules 2009&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn1"&gt;13&lt;/a&gt;]. Information Technology (Procedure and Safeguards for intercepting, monitoring, and decryption) Rules 2009&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Ibid footnote 6&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Business Standard. Data secure status for India is vital: Sharma on the FTA with EU. September 3rd 2013. Available at: http://www.business-standard.com/article/economy-policy/data-secure-status-for-india-is-vital-sharma-on-fta-with-eu-113090300889_1.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Guidelines for Cyber Cafe Rules 5(2) &amp;amp; 5(3). Available at: http://deity.gov.in/sites/upload_files/dit/files/GSR315E_10511(1).pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Guidelines for Cyber Cafe Rules 5(4)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Guidelines for Cyber Cafe Rules 5(6)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Guidelines for Cyber Café Rules 5(6)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Guidelines for Cyber Café Rules 7(1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Ibid footnote 9&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. Ibid footnote 8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. ITA section 84A&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. Jain, B. 8,736 phone and e-mail accounts tapped by different government agencies in July. September 17th 2011. Available at: http://articles.economictimes.indiatimes.com/2011-09-17/news/30169231_1_phone-tap-e-mail-accounts-indian-telegraph-act&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. The Economic Times. Action to be taken in ‘phone tapping’ during BJP rule: Virbhadra Singh. March 6th 2013. Available at: http://articles.economictimes.indiatimes.com/2013-03-06/news/37500338_1_illegal-phone-virbhadra-singh-previous-bjp-regime&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. Chaudhary, A. BlackBerry’s Tussle with Indian Govt. Finally Ends; BB Provides Interception System. http://www.medianama.com/2013/07/223-blackberrys-tussle-with-indian-govt-finally-ends-bb-provides-interception-system/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. Report of the Group of Experts on Privacy. Available at: http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. http://164.100.47.134/lsscommittee/Finance/42%20Report.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. http://www.indianexpress.com/news/uid-bill-skips-vital-privacy-issues/688614/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. http://www.epw.in/authors/elonnai-hickok&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. http://ccis.nic.in/WriteReadData/CircularPortal/D2/D02rti/aproach_paper.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. http://www.iltb.net/2011/06/analysis-of-the-privacy-bill-2011/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. http://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-updated-third-draft&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. http://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india'&gt;https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Access</dc:subject>
    

   <dc:date>2014-01-08T13:51:06Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/internet-privacy-surveillance.pdf">
    <title>Internet Privacy and Surveillance</title>
    <link>https://cis-india.org/internet-governance/internet-privacy-surveillance.pdf</link>
    <description>
        &lt;b&gt;Caspar Bowden, Chief Privacy Adviser for Microsoft gave a public talk at TERI, Bangalore on 27 June 2011. The Centre for Internet and Society organised the event. The views expressed herein are his personal and not attributable to Microsoft.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/internet-privacy-surveillance.pdf'&gt;https://cis-india.org/internet-governance/internet-privacy-surveillance.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    

   <dc:date>2011-09-08T03:16:39Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/internet-opens-doors-to-trillions-more-net-addresses">
    <title>Internet opens doors to trillions more Net addresses with IPv6</title>
    <link>https://cis-india.org/news/internet-opens-doors-to-trillions-more-net-addresses</link>
    <description>
        &lt;b&gt;The global Internet industry reached a key milestone on June 6 when a group of Web sites, Internet service providers (ISPs) and router manufacturers banded together to participate in the World IPv6 Launch.&lt;/b&gt;
        
&lt;p&gt;This blog post by Aaron Tan was published in techgoondu. Nishant Shah is quoted in this.&lt;/p&gt;
&lt;p&gt;Google, Facebook and Yahoo have flipped the switch to the new Internet addressing system, while ISPs such as Japan’s KDDI and India’s HNS will permanently enable IPv6 for a significant portion of their residential wireline subscribers. Home networking equipment manufacturers will also turn on IPv6 by default in home router products.&lt;br /&gt;&lt;br /&gt;The World IPv6 Launch was organised by the &lt;a class="external-link" href="http://www.techgoondu.com/2012/05/15/internet-society-opens-singapore-regional-office-supports-switch-to-ipv6"&gt;Internet Society&lt;/a&gt; as part of its mission to ensure that the Internet remains open and accessible for everyone, including five billion people who have yet to connect to the Internet.&lt;br /&gt;&lt;br /&gt;“The support of IPv6 from these thousands of organizations delivers a critical message to the world: IPv6 is not just a ‘nice to have’; it is ready for business today and will very soon be a ‘must have’,” said Leslie Daigle, chief Internet technology officer of Internet Society in a statement Wednesday.&lt;br /&gt;&lt;br /&gt;Last April, Asia-Pacific became the first region in the world to run out of IPv4 addresses. Europe will deplete its allocation of IPv4 addresses later this year, followed by the U.S. in 2013, and Latin America and Africa in 2014. With IPv6, the Internet can now support over 340 trillion, trillion, trillion addresses compared with 4.3 billion addresses for IPv4.&lt;br /&gt;&lt;br /&gt;“Understanding the importance of IPv6, some governments in Asia Pacific have committed to enable IPv6 in their internal networks with set deadlines and, given that they run such large networks, having them on IPv6 is a big step in itself,” said Rajnesh Singh, regional director of the Internet Society’s Asia-Pacific bureau.&lt;br /&gt;&lt;br /&gt;The Singapore Government, for instance, has spearheaded an initiative to make e-government services accessible via IPv6. The Infocomm Development Authority (IDA) has also started an &lt;a class="external-link" href="http://www.ida.gov.sg/Technology/20060419151629.aspx"&gt;IPv6 transition programme&lt;/a&gt; that offers grants and information for companies that intend to implement IPv6 on their networks.&lt;br /&gt;&lt;br /&gt;With the launch of IPv6, consumers can expect to see applications and services that take advantage of IPv6′s features. Microsoft’s upcoming Windows 8 operating system will also &lt;a class="external-link" href="http://blogs.msdn.com/b/b8/archive/2012/06/05/connecting-with-ipv6-in-windows-8.aspx"&gt;favour IPv6 connectivity&lt;/a&gt; over IPv4.&lt;br /&gt;&lt;br /&gt;According to Nishant Shah, research director at the Bangalore-based Centre for Internet and Society, IPv6 has an in-built security protocol called IPSec, which authenticates and secures all IP data. The data carrying capacity of IPv6 networks is also going to be higher.&lt;br /&gt;&lt;br /&gt;“This means that more devices with more features will be able to work seamlessly through these networks. Despite the larger load of information, IPv6 packets are easier to handle and route, just like postcards with pincodes in their addresses are easier to deliver than those without”, Shah said in a joint statement with Tata Communications.&lt;br /&gt;&lt;br /&gt;As an example, every aspect of the Beijing Olympics – from security surveillance to managing vehicles and media coverage – was done over IPv6. “The Chinese government, in fact, has already launched a ‘China Next Generation Internet’ project to build IPv6 networks which are going to radically change the face of high-speed internet in the country,” Shah revealed.&lt;br /&gt;&lt;br /&gt;With all these benefits, why does IPv6 only command two percent of the world’s Internet traffic? Shah offers two clear reasons:&lt;br /&gt;&lt;br /&gt;The first one is that of costs and infrastructure. The IPv6 platforms do not communicate easily with the IPv4 networks. We have the choice of a mammoth transition of all IPv4 websites and networks to new IPv6 protocols. This idea of abandoning IPv4 and moving to a new protocol is not only redundant; it is also futile, because IPv4 is already running the largest network in human history quite efficiently.&lt;br /&gt;&lt;br /&gt;What we need are translators which will be able to speak to both the different versions and help our devices work through them seamlessly. Older, more successful technologies have been able to do this. So, television, for instance, whether it receives terrestrial data, satellite images or data transferred via cable, is able to translate and render them into images and sounds which we can consume with ease. However, the translators for the IPv4 – IPv6 are still expensive and we need more resources diverted towards making them affordable.&lt;br /&gt;&lt;br /&gt;The second reason is linked to the first. In order for IPv6 to become popular, it needs a minimum threshold of service providers and users riding that network. As long as the deployment remains nascent, there will be no concentrated energy to actually try and make the bridges between versions 4 and 6. While global technology organisations like Tata Communications are ready for the transition, we are going to need a systemic change among all stakeholders to make IPv6 a reality, towards a faster, safer and more robust Internet.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/internet-opens-doors-to-trillions-more-net-addresses'&gt;https://cis-india.org/news/internet-opens-doors-to-trillions-more-net-addresses&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-14T05:12:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/internet-monitor-2013.pdf">
    <title>Internet Monitor</title>
    <link>https://cis-india.org/internet-governance/blog/internet-monitor-2013.pdf</link>
    <description>
        &lt;b&gt;Malavika's piece on India's Identity Crisis is published in this report.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/internet-monitor-2013.pdf'&gt;https://cis-india.org/internet-governance/blog/internet-monitor-2013.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-01-09T07:33:02Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/internet-liability">
    <title>Internet Liability</title>
    <link>https://cis-india.org/internet-governance/files/internet-liability</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/internet-liability'&gt;https://cis-india.org/internet-governance/files/internet-liability&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-10-20T07:04:53Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/internet-l-w">
    <title>Internet L@w</title>
    <link>https://cis-india.org/internet-governance/news/internet-l-w</link>
    <description>
        &lt;b&gt;Vanya Rakesh will attend the Internet law course organized by the University of Geneva from 20 June 2016 to 1 July 2016 as part of the Geneva Summer School. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Study Internet Law in Geneva, where the World Wide Web was born!&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Topics that will be covered include cybersecurity, digital privacy and online surveillance, free speech, consumer protection, legal issues of social media, dangers of cloud computing, Internet and telecom infrastructure, intellectual property, antitrust, and much more...&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is a unique opportunity to gain hands-on experience in the framework of an Internet law clinic and to discuss cutting edge Internet law and policy issues with academics, practitioners, representatives of global policy makers, international organizations and leading institutions, including the &lt;a href="https://cyber.law.harvard.edu/" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;Berkman Center for Internet and Society at Harvard University&lt;/span&gt;&lt;/a&gt;, the &lt;a href="http://www.itu.int/en/Pages/default.aspx" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;International Telecommunication Union&lt;/span&gt;&lt;/a&gt; (ITU) and the &lt;a href="http://www.wipo.int/portal/en/" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;World Intellectual Property Organization&lt;/span&gt;&lt;/a&gt; (WIPO).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For its first and second sessions (in June 2014 and 2015), the Internet l@w summer school welcomed participants from very diverse background and countries including Argentina, China, Egypt, Germany, India, Italy, Lithuania, Ukraine and the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Discover an international city in the heart of Europe. Participate in an exciting social programme, including excursions and social gatherings, and build a global network of new friends as well as of Internet law and policy experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A video testimony of participants to the 2014 edition &lt;a href="https://www.youtube.com/watch?v=wtXY7p6GEvg" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;is available here&lt;/span&gt;&lt;/a&gt;!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;Equivalence of 6 ECTS credits.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;Please note: Changes to the draft program may be made at any time prior to the start of the course.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More Info, &lt;a class="external-link" href="https://www.genevasummerschools.ch/courses/courses-2016/internet-law"&gt;click here&lt;/a&gt;.&lt;i&gt;&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/internet-l-w'&gt;https://cis-india.org/internet-governance/news/internet-l-w&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-05-30T02:07:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/internet-institute-repository">
    <title>Internet Institute Repository</title>
    <link>https://cis-india.org/internet-governance/files/internet-institute-repository</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/internet-institute-repository'&gt;https://cis-india.org/internet-governance/files/internet-institute-repository&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-07-17T03:38:33Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/internet-governance-forum-report-2017">
    <title>Internet Governance Forum Report 2017</title>
    <link>https://cis-india.org/internet-governance/files/internet-governance-forum-report-2017</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/internet-governance-forum-report-2017'&gt;https://cis-india.org/internet-governance/files/internet-governance-forum-report-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-01-11T02:03:44Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
