<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 671 to 685.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-17-2016-govt-to-keep-aadhaar-record-for-seven-years-activitsts-worried"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-march-8-2016-shreeja-sen-govt-narrative-on-aadhaar-has-not-changed-in-last-six-years-sunil-abraham"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/govt-and-blackberry"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/resources/govt-policy-and-guidelines"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/governing-id-principles-for-evalution"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/good-intentions-recalcitrant-text-2013-ii-what-india2019s-itu-proposal-may-mean-for-internet-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/good-intentions-going-awry-i-why-india2019s-proposal-at-the-itu-is-troubling-for-internet-freedoms"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/gni-assessment-finds-ict-companies-protect-user-privacy-and-freedom-of-expression"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/gni-annual-report.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/global-partners-meeting-london"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/global-partners-meeting-london.pdf"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-17-2016-govt-to-keep-aadhaar-record-for-seven-years-activitsts-worried">
    <title>Govt to keep Aadhaar record for 7 years, activists worried</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-17-2016-govt-to-keep-aadhaar-record-for-seven-years-activitsts-worried</link>
    <description>
        &lt;b&gt;The government will keep for seven years a record of all the services and benefits availed using the Aadhaar number, say new rules, prompting fears that the database could be used for surveillance.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aloke Tikku was published in the &lt;a class="external-link" href="http://www.hindustantimes.com/india-news/govt-to-keep-aadhar-record-for-7-years-activists-worried/story-jSY820Ee1ZnQNLL5vuWMOI.html"&gt;Hindustan Times&lt;/a&gt; on October 17, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Unique Identification Authority of India (UIDAI), which issues the 12-digit biometric identity to all Indian residents, will be required to preserve its record of verification of an Aadhaar number for the duration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is an unprecedented centralised data retention provision,” said Sunil Abraham, director of the Bengaluru-based think tank, Centre for Internet and Society.&lt;br /&gt;&lt;br /&gt;UIDAI chief executive officer ABP Pandey said the concerns were exaggerated. The agency was keeping records in case a dispute arose over a transaction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The information will be retained online for two years and another five years in the offline archives, say the rules notified in September.&lt;br /&gt;&lt;br /&gt;Users will be able to check the records but only for two years.&lt;br /&gt;&lt;br /&gt;This restriction won’t apply to security agencies. Pandey, however, said the records would not be available to them without a district judge’s permission.&lt;br /&gt;&lt;br /&gt;But, HT found that the rules allow designated joint secretary-level officers at the Centre to order access to information on the grounds of national security.&lt;br /&gt;&lt;br /&gt;“Once Aadhaar becomes mandatory for all services, it can be used by benign and malignant actors to conduct a 360-degree surveillance on any individual,” Abraham said.&lt;br /&gt;&lt;br /&gt;This is how the system, which will need millions of fingerprint-reading machines, works.&lt;br /&gt;&lt;br /&gt;Every time a person fingerprints and quotes the Aadhaar number, the agency concerned sends the data to UIDAI to crosscheck the particulars.&lt;br /&gt;&lt;br /&gt;The UIDAI authenticates about five million Aadhaar numbers, which are quoted to avail LPG subsidy, cheap ration and even passport, a day against a capacity to verify 100 million requests daily.&lt;br /&gt;&lt;br /&gt;“You can think of it as Natgrid Plus,” Abraham said, a reference to the National Intelligence Grid being built by the government.&lt;br /&gt;&lt;br /&gt;A one-stop database for counter-terrorism agencies, Natgrid will collate information real time from databases of various agencies such as bank, rail and airline networks.&lt;br /&gt;&lt;br /&gt;“…we do not record the purpose for which an authentication request was received but only the details of the agency that sent it,” UIDAI’s Pandey said.&lt;br /&gt;&lt;br /&gt;But seven years is a long time. Only a select category of government files are kept for longer than five years.&lt;br /&gt;&lt;br /&gt;Asked about two-year deadline for users, Pandey said it would have been a logistic nightmare to let people access the records once the information was offline.&lt;br /&gt;&lt;br /&gt;The Supreme Court has a ruled that Aadhaar is not a must for availing welfare schemes and is to decide if collecting biometric data for the 12-digit number infringed an individual’s privacy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-17-2016-govt-to-keep-aadhaar-record-for-seven-years-activitsts-worried'&gt;https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-17-2016-govt-to-keep-aadhaar-record-for-seven-years-activitsts-worried&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-10-17T01:53:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework">
    <title>Govt releases white paper on data protection framework</title>
    <link>https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework</link>
    <description>
        &lt;b&gt;Public comments are welcome till 31 December on the data protection white paper, which is aimed at securing digital transactions and addressing privacy issues.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Komal Gupta was published in &lt;a class="external-link" href="http://www.livemint.com/Politics/LIKM3FxX3KEcA52uGMlcJP/Govt-releases-white-paper-on-data-protection-framework.html"&gt;Livemint&lt;/a&gt; on November 28, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;A  nuanced approach towards data protection will have to be followed in  India, keeping in mind the fact that individual privacy is a fundamental  right limited by reasonable restrictions, according to a white paper  issued by the government on a data protection framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  government has sought public comments till 31 December on the white  paper, which is aimed at securing digital transactions and addressing  customer and privacy protection issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The white paper, drafted  by the committee of experts on data protection framework, was released  by the ministry of electronics and information technology on Monday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On  31 July, the government constituted a 10-member committee of experts  headed by former Supreme Court justice B.N. Srikrishna to study various  issues relating to data protection and make specific suggestions on the  principles to be considered for data protection as well as suggest a  draft Data Protection bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other members of the committee include  telecom secretary Aruna Sundararajan,  Unique Identification Authority  of India chief executive Ajay Bhushan Pandey, and additional secretary  in the information technology ministry Ajay Kumar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  committee seeks to put the onus on stakeholders and the public through a  questionnaire on issues such as collection of personal data, consent of  consumers, penalties and compensation, code of conduct and an  enforcement model that should be set up.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The sensitivity of the  data could also develop based on its combination with other types of  information. For example, an email address taken in isolation, is not  sensitive. However, if it is combined with a password, then it could  become sensitive as it opens access to many other websites and systems,  which may expose the individual to harm such as cyberattacks and  phishing frauds,” the white paper said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is also possible that  personal or even non-personal data, when processed using big data  analytics, could be transformed into sensitive personal data. Therefore,  there may be a need to create safeguards which will prevent misuse of  personal information in these contexts of use, it added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The white  paper also seeks “to designate certain lawful grounds under which data  can be processed, even in the absence of consent.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In some  situations, seeking consent prior to a data processing activity would  not be possible, or it may defeat the purpose of the processing. For  instance, where law enforcement officials need to apprehend a criminal,  seeking the consent of the criminal prior to processing would defeat the  purpose of the investigation, it said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It seems to be an  eminently reasonable white paper which raises the right questions.  However, it lacks analysis of data protection vis-a-vis Aadhaar,” said  Pranesh Prakash, policy director at the Centre for Internet and Society,  a Bengaluru-based think tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Safeguarding privacy rights needs  much more than a data protection law; it needs a larger consultation  that includes issues like surveillance as well, added Prakash.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework'&gt;https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-28T14:34:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy">
    <title>Govt presses 'undo' button on draft encryption policy</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy</link>
    <description>
        &lt;b&gt;The decision came a day before PM embarked on a visit to the US, where he is expected to meet leaders of firms such as Apple, Facebook, Google and Tesla.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/govt-presses-undo-button-on-draft-encryption-policy-115092201014_1.html"&gt;Business Standard&lt;/a&gt; on September 23, 2015. Sunil Abraham gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The government on Tuesday scrapped a draft &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=National+Encryption+Policy" target="_blank"&gt;national encryption policy &lt;/a&gt;that mandated firms and individuals to allow authorities access to all encrypted information on email, apps, websites and business servers.&lt;br /&gt;&lt;br /&gt;The decision came a day before Prime Minister&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Narendra+Modi" target="_blank"&gt;Narendra Modi &lt;/a&gt;embarked on a visit to the US, where he is expected to meet leaders of firms such as Apple, Facebook, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Google" target="_blank"&gt;Google &lt;/a&gt;and Tesla. Activists and executives from technology firms had expressed outrage on the draft policy, saying the move would have taken India a step back in technology adoption.&lt;br /&gt;&lt;br /&gt;At a meeting of the Union Cabinet on Tuesday, Modi was livid at the controversy generated by the draft policy and directed officials to withdraw it ahead of his US trip, sources said.&lt;br /&gt;&lt;br /&gt;The draft had global ramifications, as Facebook,&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Twitter" target="_blank"&gt;Twitter &lt;/a&gt;and messaging apps such as &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Whatsapp" target="_blank"&gt;WhatsApp &lt;/a&gt;were named in it.&lt;br /&gt;&lt;br /&gt;Ravi Shankar Prasad, Union minister for communications and information technology, distanced the government from the draft hosted on the IT department site, but admitted it gave “uncalled-for misgivings”. He directed officials to rework the draft but did not set a timeframe for seeking feedback from the public.&lt;br /&gt;&lt;br /&gt;“Yesterday (Monday), it was brought to our notice that the draft had been put in the public domain for, seeking comment. I read the draft. I understand that the manner in which it was written could lead to misconceptions. I have asked for the draft policy to be withdrawn and reworded. I personally feel some of the expressions used in the draft are giving rise to uncalled-for misgivings,” Prasad said. “Experts had framed the draft policy. It is not the government’s final view.”&lt;br /&gt;&lt;br /&gt;According to the original draft, the encryption policy sought every message sent by a user, be it through services such as WhatsApp, an SMS or an email, be mandatorily stored in plain text format for 90 days and made available on demand to security agencies. Failure to do so, it added, would draw legal action.&lt;br /&gt;&lt;br /&gt;This was because typically, all messaging apps and services such as WhatsApp, Viber, Line, Google Chat and Yahoo! Messenger have high levels of encryption, which security agencies find hard to crack and intercept.&lt;br /&gt;&lt;br /&gt;Early on Tuesday, before Prasad announced the withdrawal of the draft policy, the government had issued an addendum to keep social media and web applications such as WhatsApp, Twitter and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Facebook" target="_blank"&gt;Facebook &lt;/a&gt;out of its purview.&lt;br /&gt;&lt;br /&gt;In a three-point clarification, the Department of Electronics and Information Technology (DeitY) said some encryption products were exempt. “Mass-use encryption products, currently being used in web applications, social media sites and social media applications, such as WhatsApp, Facebook and Twitter…SSL/TLS encryption products being used in internet banking and payment gateways, as directed by the Reserve Bank of India”, and SSL/TLS encryption products being used for e-commerce and password based transactions,” it said.&lt;br /&gt;&lt;br /&gt;“Ideally, the new policy should only focus on two objectives: It should mandate encryption standards within the government, military, law enforcement and intelligence agencies. It shouldn’t regulate the use of encryption by the private sector; the private sector should be allowed to use whatever it believes is appropriate, as long as it is considered a reasonable security measure by courts, under section 43A of the IT Act,” said Sunil Abraham, director,&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Centre+For+Internet+And+Society" target="_blank"&gt;Centre for Internet and Society &lt;/a&gt;(CIS).&lt;br /&gt;&lt;br /&gt;Prasad reiterated the government, under the leadership of Prime Minister Narendra Modi, had promoted social media activism. “The right of articulation and freedom we fully respect. But at the same time, we need to acknowledge that cyber space transaction is rising enormously for individuals, businesses, the government and companies,” he said.&lt;br /&gt;&lt;br /&gt;Opposition parties slammed the Draft policy. Congress communications in-charge Randeep Surjewala said, “Subjugation of individual freedom, surveillance of the citizen and suppression of dissent have emerged as the DNA of the Narendra Modi-led BJP government. The draft policy on encryption, first circulated, then amended and now, withdrawn with a rider for re-issuing it, is a totalitarian, misconceived and a failed attempt of the Modi government to override all sense of individual freedom of speech and expression and encroach upon the right to privacy of communication…With 243.1 million internet users in India at the end of 2014 (173 million being mobile internet users), 112 million Facebook users, 80 million WhatsApp users, 22 million Twitter users and 950 million mobile connections, the intrusion of individual liberty is fraught with dangerous dimensions under the Modi government.”&lt;br /&gt;&lt;br /&gt;Aam Aadmi Party spokesperson Raghav Chadha said, “Only a fascist government can bring such a policy. The draft policy was in violation of the right to personal liberty and the fundamental tenets of freedom of speech and expression…the draft policy was for snooping. It presupposes the 1.2 billion people of India are potential criminals. It reflects the inclination of the government and its intention to turn India into a totalitarian state.”&lt;br /&gt;&lt;br /&gt;&lt;b&gt;ABOUT THE NATIONAL ENCRYPTION POLICY&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Five things the government  draft policy wanted&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Information security for individuals, businesses and government agencies&lt;/li&gt;
&lt;li&gt;Development of indigenous encryption standards&lt;/li&gt;
&lt;li&gt;Use of digital signatures to authenticate transactions&lt;/li&gt;
&lt;li&gt;Legal interception and data retention&lt;/li&gt;
&lt;li&gt;Service providers to register under appropriate government agency&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Things that caused outrage&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Regulation of private sector encryption&lt;/li&gt;
&lt;li&gt;Storage of all encrypted communications for&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;90 days&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Gaining backdoor into private communications of users&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Amendment &amp;amp; withdrawal&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Omission of mass encryption products such as those used by social networks&lt;/li&gt;
&lt;li&gt; Withdrawal of draft policy following Ravi Shankar Prasad’s statement&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy'&gt;https://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-25T01:55:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-march-8-2016-shreeja-sen-govt-narrative-on-aadhaar-has-not-changed-in-last-six-years-sunil-abraham">
    <title>Govt narrative on Aadhaar has not changed in the last six years: Sunil Abraham</title>
    <link>https://cis-india.org/internet-governance/news/livemint-march-8-2016-shreeja-sen-govt-narrative-on-aadhaar-has-not-changed-in-last-six-years-sunil-abraham</link>
    <description>
        &lt;b&gt;The bill is basically the same as the UPA version, with some cosmetic changes, and some tokenism towards the right to privacy, says Abraham.&lt;/b&gt;
        &lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Shreeja Sen interviewed Sunil Abraham. The article was &lt;a class="external-link" href="http://www.livemint.com/Politics/l0H1RQZEM8EmPlRFwRc26H/Govt-narrative-on-Aadhaar-has-not-changed-in-the-last-six-ye.html"&gt;published in Livemint &lt;/a&gt; on March 8, 2016.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The government’s bid to push financial inclusiveness and access to government services has received a fresh boost, with finance minister Arun Jaitley introducing a proposed law to give legislative backing to Aadhaar, being implemented by the Unique Identification Authority of India (UIDAI).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This project, which uses a person’s biometric data like fingerprints and iris scans to authenticate identity of people receiving subsidies and other state benefits, will move India towards a cashless economy and help digital initiatives such as biometric attendance, Pradhan Mantri Jan Dhan Yojana, digital certificates, pension payments and the proposed introduction of payments banks.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, 42&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham is executive director of Centre for Internet and Society, a Bengaluru-based think tank focusing on accessibility, access to knowledge, telecom and Internet governance. He has written extensively on the UID scheme, and the intersection of privacy and security. He founded Mahiti—an enterprise that aims to reduce the cost and complexity of information and communications technology for the voluntary sector by using free software.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar project has faced its share of roadblocks with cases challenging it pending before the Supreme Court. A constitution bench of the court will decide whether the right to privacy is a fundamental right and if Aadhaar violates it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, the executive director of Centre for Internet and Society, a Bengaluru-based policy research institute, is a critic of Aadhaar for several reasons. He explained his concerns in an interview. Edited excerpts:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Have any of the concerns regarding the Aadhaar project since its inception in 2009 been addressed?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whatever we complained about six or seven years ago, whatever complaints were made by the civil society...all of those complaints remain in the exact same situation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nothing has changed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;What kind of concerns?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first thing to remember is that privacy and security are just two sides of the same coin. You cannot have one without the other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our first concern with the project is centralization. Whenever you build an information system, and you create a central point of failure, then it will fail because the possibility of failure exists. The Internet has no central point of failure. That is why it is so difficult for you to bring the Internet down. Complaint number 2 is the opaque technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI keeps saying that “we have built a technology using a free software and open standard stack”. The first is a de-duplication software and the second one is the authentication software—those are the most important pieces of software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This software is proprietary and nobody knows how they work and nobody can independently audit them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third complaint is the use of an irrevocable and non-consensual authentication factor. In the UID scheme, the biometrics serve two purposes: it can be used to identify a citizen and it can be used to authenticate a transaction. Authentication factors, commonly known as passwords, should always be revocable. That means if the password is compromised, you should be able to change the password or at least say that this password is no longer valid. The use of biometrics eliminates those two important requirements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, in most other authentication, the process of authentication ensures that you are consenting. For example, PIN (personal identity number) authentications. But suppose I am authenticating you through your irises, then as long as your eyes are open, the machine will think you’re authenticating. There’s no way of saying I don’t want to authenticate. Or if you’re sleeping, somebody can hold your fingers over a biometric reader and open your iPhone. So that’s complaint number three.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fourth complaint from the privacy perspective is: there is a very important database that they don’t talk about. I call it the transactions database. Suppose there is somebody who is using the UIDAI service to authenticate a transaction, then UIDAI should keep a record of that successful or unsuccessful transaction authentication. That means you have been registered into the database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;You go to a fair price shop to purchase subsidized grain and at that fair price shop or ration shop, you use your finger on the biometric reader, and then the UIDAI system says “yes you are indeed who you say you are”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So, at that point, later the shop should not be able to say X never came here, or X came twice. So, in order for them to not say all those things, a record should be made on the UID database, that on this day, from this geographical location, this particular biometric reader sent us X’s biometric template and asked if the template matched against X’s UID number...the transaction database can be used for profiling. They never talk about it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They never tell us what that database holds and how long they’re keeping all those records. None of that is clear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Does Aadhaar bill help assuage your doubts about the project?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government narrative has not changed in the last six years; the bill is basically the same as the UPA (United Progressive Alliance) version, with some cosmetic changes, and some tokenism towards the right to privacy. The proof that the technology is fallible is in the bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the technology was infallible, as the UIDAI would like us to believe, then the bill would not criminalize the following: (1) impersonation at the time of enrolment; (2) unauthorized access to the Central Identities Data Repository.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Imagine that the bill admits that every Indian’s biometric can be stolen from one single centralized database. Now why don’t we have a similar offence for stealing all private keys from the Internet—we don’t because that is technical impossibility thanks to decentralization.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore we don’t need a law to make (it) illegal. We’ve suggested changes to both the technology and the law. We’ve written seven open letters to the UIDAI, and we’ve never gotten any response. Very few of our concerns have been addressed. We’ve seen dogs getting UID, various other things getting UID, so there’s a lot of evidence that the system does not work. From Kerala we have stories of one person getting several UIDs, so we have no idea about technological feasibility of the project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of our distinguished fellows, Hans Varghese Mathews, has published an academic paper in the latest &lt;i&gt;EPW&lt;/i&gt; (&lt;i&gt;Economic and Political Weekly&lt;/i&gt;), by extrapolating UIDAI field trial data to national scale. He predicts that by the time the number crosses 1 billion, every time UIDAI tries to register someone new, they will match with about 850 people already in the database positively. So, the unique identification capability of the UIDAI will not scale above the billion. The consequence of the technology failing is not trivial. If someone replaces your biometrics in the central database, then the onus is on you to prove that you are a resident of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previously, human beings determined the answer to this question, and they had to find proof that you were not a resident. Now, a fallible technology will be asked to answer this important question.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Isn’t the basic function of the Aadhaar project to ensure that benefits reach the person they are meant for, and it’s easier for people to get an identity proof for those who have no other ID, like migrant workers?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two responses: is it good anti- corruption technology? Unfortunately not, because it is intended at retail fraud. The person under surveillance is very poor. But the person responsible for corruption is not poor. So, I believe you should be surveilling those responsible for corruption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What I had said is UID should be first given to every single bureaucrat and every single politician in the country. From Delhi till the Panchayat office, till the ration shop in the village, that supply chain must be monitored and documented using cryptography, so that nobody can deny anything. We need non-repudiatable audit trail from New Delhi to the village because according to all analyses, that is where the theft is happening—in the supply chain. The villager who is taking false benefits, that is called retail fraud.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bulk of the fraud is actually wholesale fraud. Please tackle wholesale fraud using non-repudiatable public audit trail from New Delhi to the village first, before you start surveilling the poor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second point is that people find it easy to get the UID. That is fine, but there is a problem; that it’s not uniquely identifying anybody. So, people will keep registering and the UID system will keep giving them more and more UIDs because there are no human checks and balances. Because you’ve gone with a pure technological solution, it’s very easy to fool (the system).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So, the ease of registration has not served the purpose.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-march-8-2016-shreeja-sen-govt-narrative-on-aadhaar-has-not-changed-in-last-six-years-sunil-abraham'&gt;https://cis-india.org/internet-governance/news/livemint-march-8-2016-shreeja-sen-govt-narrative-on-aadhaar-has-not-changed-in-last-six-years-sunil-abraham&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-16T16:37:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/govt-and-blackberry">
    <title>Govt and BlackBerry firm wait for the other to hang up</title>
    <link>https://cis-india.org/news/govt-and-blackberry</link>
    <description>
        &lt;b&gt;Sunil Abraham speaks to Archna Shukla on the stand-off between the Government of India and RIM. The news was published in expressindia.com.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;What is the current stand-off between the government and RIM all about? &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The current logjam is with regards to BlackBerry messenger, email and web traffic. Around two years ago, the government had asked BlackBerry to allow it to monitor the text messages (SMSes) and phone calls exchanged through its platform. The government has since then been monitoring these services with the help of telecom service providers. It, however, still doesn’t have any means to monitor, intercept or decrypt BlackBerry’s messenger, email and web exchanges. The government wants to put in place a surveillance infrastructure to monitor these services and is asking BlackBerry to cooperate.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is unique about BlackBerry services? Why doesn’t the government have a similar problem with Nokia or Apple? &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Companies such as Apple do not provide email and messenger services in India. They only sell their handsets in the country. Nokia recently started providing such services under the Nokia Messaging Services Platform. The service, which includes enterprise solutions, consumer services and Nokia’s own messaging solution Ovi mail, is still in beta format. Nokia’s India spokesperson said the company will set up servers for its various services inside India whenever it kickstarts the functions in a full fledged manner.&lt;/p&gt;
&lt;p&gt;Canadian firm Research in Motion (RIM), makers of BlackBerry, on the other hand, provides all these services alongside selling its handsets. It also manages all its data and traffic on its own without giving the access to anybody. The servers for these services are installed outside India. The government is concerned that keeping servers outside the country will give access to foreign authorities to monitor its local traffic and information. In the US, for instance, this kind of monitoring will be possible under the provisions of the Patriot Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Is BlackBerry the only one to use strong encryptions? &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The use of strong encryption in information technology is prevalent in both the wireless industry and Internet platforms. BlackBerry, however, uses a superior encryption that is highly reliable and secure and it owes its popularity in the world markets to this feature mainly. According to Sunil Abraham, the Executive Director of Bangalore-based advocacy group Centre for Internet and Society, BlackBerry uses strong encryption with 256 bit keys. In comparison, gmail.com and Citibank.co.in use only 128 bit keys.&lt;/p&gt;
&lt;p&gt;“If you have encryption on while visiting citibank.com or when using an offline mail client like MS Outlook Express, the government can identify the encrypted service that you are using and the recipient of your encrypted messages. Then they can launch a targeted brute-force attack to intercept and decrypt specific communications,” he says, adding that with the BlackBerry, the government can only see that you are having an encrypted transaction with the BlackBerry servers. They cannot identify the recipients and web services. This makes the brute-force attack difficult as a lot of time is spent decrypting unimportant messages.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is the problem that RIM is facing in UAE and Saudi Arabia? &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In UAE, it is facing the same problem as in India. In Saudi Arabia, BlackBerry will instal computer servers, which would allow the government some access to user’s data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Can the Indian government and RIM meet half-way?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Unlikely. Though, as per PTI reports,&lt;/p&gt;
&lt;p&gt;BlackBerry has made an attempt to break the logjam by offering metadata and relevant information to security agencies which will enable them in lawful interception, it has has failed to enthuse them. At a meeting between government officials and RIM, company’s representatives said that “they can provide the metadata of the message like the Internet Protocol address of BES and PIN and International Mobile Equipment Identity of the BlackBerry mobile”, sources said. Metadata is loosely defined as data about data. It provides information about a certain item’s content like how large the picture is, the colour depth, the image resolution when the image was created, and other data. A text document’s metadata may contain information about how long the document is, who the author is, when the document was written, and a short summary of the document. However, sources said the RIM, which has nearly one million subscribers across India, failed to enthuse the security agencies who want an uninterrupted access to the messaging services on BlackBerry platform. The security agencies apprehend that BlackBerry services in the present format pose a serious security threat.&lt;/p&gt;
&lt;p&gt;The government may argue that if surveillance is allowed in some countries, it should have the same access, too.&lt;/p&gt;
&lt;p&gt;So far, RIM’s public stand has been that its security architecture was specifically designed to provide corporate customers with the ability to transmit information wirelessly while providing them with the necessary confidence that no one, including RIM, could access their data.&lt;/p&gt;
&lt;p&gt;Abraham of the Centre for Internet and Society says there is a possibility of a compromise behind the doors and the citizens may never get to know that a surveillance regime and infrastructure have been put in place to monitor their communications.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.expressindia.com/latest-news/Govt-and-BlackBerry-firm-wait-for-the-other-to-hang-up/657828/"&gt;Click&lt;/a&gt; to read the original.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/govt-and-blackberry'&gt;https://cis-india.org/news/govt-and-blackberry&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2011-04-02T10:46:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/resources/govt-policy-and-guidelines">
    <title>Government Policy and Guidelines</title>
    <link>https://cis-india.org/telecom/resources/govt-policy-and-guidelines</link>
    <description>
        &lt;b&gt;In this unit Snehashish dwells upon the four main policy guidelines that were formulated by the Government of India.&lt;/b&gt;
        &lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/resources/national-telecom-policy-1994" class="external-link"&gt;National Telecom Policy, 1994&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/resources/new-telecom-policy-1999" class="external-link"&gt;New Telecom Policy, 1999&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/resources/broadband-policy-2004" class="external-link"&gt;Broadband Policy, 2004&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/resources/national-telecom-policy" class="external-link"&gt;National Telecom Policy, 2012&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The above were the four main telecom policies formulated by the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the main functions of DoT is to issue guidelines with respect to issuing of licence, allocation of spectrum, interconnection, etc. These guidelines operate as additional conditions, laid down by DoT with respect to conduct and functioning of telecom operators. For example, the DoT issued guideline for radiation standards in respect of electromagnetic radiations (EMR) for mobile towers, which came into effect on September 1, 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DoT has issued numerous guidelines across the years. However, it is important to discuss the DoT guidelines with respect to issuance of telecom service licences.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Basic Telephone Services Licences (BTS)&lt;/li&gt;
&lt;li&gt;Cellular Mobile Telephone Service Licence (CMTS)&lt;/li&gt;
&lt;li&gt;Unified Access Service Licence (UASL)&lt;/li&gt;
&lt;li&gt;National Long Distance (NLD) and&lt;/li&gt;
&lt;li&gt;International Long Distance Licence (ILD)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Guidelines on issuing of Basic Telephone Services&lt;/h3&gt;
&lt;p&gt;DoT issued guideline for issuing of BTS licences in January, 2001. The key features of the guidelines are:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The applicant must be an Indian company. There was no restriction on the number of BTS licensees in a circle. The applicants were also required to have a minimum amount of paid up equity capital. This varied from circle to circle. There was a cap of 49 per cent foreign equity on companies applying for the BTS licence&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;BTS licences were issued for a period of 20 years on a non-exclusive basis&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The licences had to pay an entry fee before the grant of the licence. Consequently, the basic telecom service operators had to pay an annual licence fee based on their annual gross revenue&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The basic telecom service operators also had to submit two bank guarantee as an assurance to meet the contractual and roll out obligation under the BTS licence&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Guideline also laid down that the license holders can also provide  limited mobility services, by using the spectrum allocated to them for last mile delivery. However, service operators provided limited mobility services had to pay additional 2 per cent fee.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Guidelines declared that a CMTS licensee can also provide fixed services using GSM networks within their service area. *This was done to satisfy cellular operators who were protesting against permission given to the basic telephone operators to provide limited mobility services.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The basic operators could carry intra-circle long distance traffic. However, the operators had to provide the subscribers, the option to choose their own long distance carriers. For this purpose, BTS licensee could enter into an arrangement with the national long distance licensee.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Basic operators were required to make their own arrangements for the installation of infrastructure, network equipment and, right of way. They were also allowed to enter into agreements related to interconnection     with other licensee in other service areas. The terms and conditions of such interconnectivity agreement were subject to TRAI regulations and directions.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Guidelines on issuing of Cellular Mobile Telephone Service Licences&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The DoT issued Guidelines for CMTS licences along with guidelines for the issuing of the basic telecom licences. These two sets of guidelines are generally similar to each other but they vary in certain issues.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;In the light of the criticism of the previous licensing policy, the DoT guidelines on issuing CMTS licence proposed “informed ascending bidding process”&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; for auctioning of CMTS licence.&lt;/li&gt;
&lt;li&gt;The CMTS licence was issued for a period of 20 years on a non-exclusive basis, extendable by 10 years.&lt;/li&gt;
&lt;li&gt;The licensee can transfer; assign the licence only with the permission of the DoT, the licensor.&lt;/li&gt;
&lt;li&gt;The prospective cellular operator had to submit roll-out plans and financial arrangements with the application.&lt;/li&gt;
&lt;li&gt;The licence period was set at 20 years, extendable by another 10 years.&lt;/li&gt;
&lt;li&gt;The winning bidder had to pay an entry fee. They also had to pay an annual fee which is a percentage of the annual gross revenue.&lt;/li&gt;
&lt;li&gt;The cellular operator also had to pay an additional sum for spectrum.&lt;/li&gt;
&lt;li&gt;The cellular operator, were given freedom to use any kind of network equipment as long as they satisfied certain international and domestic standards.&lt;/li&gt;
&lt;li&gt;The cellular operators were allowed to enter into any interconnection arrangements subject to TRAI regulations.&lt;/li&gt;
&lt;li&gt;The guideline also laid down that cellular operators will fully co-operate with law enforcement and government agencies in providing access to their infrastructure.&lt;/li&gt;
&lt;li&gt;The licensees have to make their own arrangement for installing infrastructure and equipment and for right of way.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Guidelines for issuing Unified Access Service Licences&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The UASL Guidelines were issued in November, 2003. They were consistent with the TRAI recommendations. Option was given to the existing licensees to continue under their basic telecom and cellular mobile telecom licences or migrate to the new unified access service licence regime. The main highlights of the Guidelines on issuing of UASL were:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Cellular licensees can offer limited mobility service within their short distance coverage areas.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Basic telecom service operators had to pay an entry fee for the UASL which was equal to the entry fee paid by the fourth cellular operator for the specific service area or the entry fee paid by the basic telecom provider in that circle, whichever is higher.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;No additional entry fee had to be paid by the cellular mobile service providers.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The basic telecom service operator, who choose not to completely migrate to full mobility regime may pay additional licence fee for providing services in wireless in local loop (WLL). However, such service will be restricted to the short distance charging areas.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;There was no additional spectrum allotted to the licensee for migrating to the UASL regime.&lt;/li&gt;
&lt;li&gt;The unified access service providers can use any technology without any restrictions.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Additional Entry fee to be paid by the existing Basic Service Operators for migration to Unified Access Service License&lt;/b&gt;&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;S.No.&lt;/th&gt;&lt;th&gt;Name of the operator&lt;/th&gt;&lt;th&gt;Service Area of the basic service operator (BSO)&lt;/th&gt;&lt;th&gt;Date of signing of licence agreements&lt;/th&gt;&lt;th&gt;Entry fee paid by BSO&lt;br /&gt;(in crores)&lt;/th&gt;&lt;th&gt;Entry fee paid by 4&lt;sup&gt;th&lt;/sup&gt; cellular operator(in crores)&lt;/th&gt;&lt;th&gt;Additional entry fee to be paid for migration to UASL(in crores)&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.&lt;/td&gt;
&lt;td&gt;Reliance Infocomm Ltd.&lt;/td&gt;
&lt;td&gt;Rajasthan&lt;/td&gt;
&lt;td&gt;20.7.2001&lt;/td&gt;
&lt;td&gt;20&lt;/td&gt;
&lt;td&gt;32.25&lt;/td&gt;
&lt;td&gt;12.25&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;UP(East)&lt;/td&gt;
&lt;td&gt;20.7.2001&lt;/td&gt;
&lt;td&gt;15&lt;/td&gt;
&lt;td&gt;45.25&lt;/td&gt;
&lt;td&gt;30.25&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Maharashtra&lt;/td&gt;
&lt;td&gt;20.7.2001&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;189+203.66*&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;115&lt;/td&gt;
&lt;td&gt;392.66&lt;/td&gt;
&lt;td&gt;277.66&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Karnataka&lt;/td&gt;
&lt;td&gt;20.7.2001&lt;/td&gt;
&lt;td&gt;35&lt;/td&gt;
&lt;td&gt;206.83&lt;/td&gt;
&lt;td&gt;171.83&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Punjab&lt;/td&gt;
&lt;td&gt;20.7.2001&lt;/td&gt;
&lt;td&gt;20&lt;/td&gt;
&lt;td&gt;151.75&lt;/td&gt;
&lt;td&gt;131.75&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Andhra Pradesh&lt;/td&gt;
&lt;td&gt;20.7.2001&lt;/td&gt;
&lt;td&gt;35&lt;/td&gt;
&lt;td&gt;103.01&lt;/td&gt;
&lt;td&gt;68.01&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Haryana&lt;/td&gt;
&lt;td&gt;20.7.2001&lt;/td&gt;
&lt;td&gt;10&lt;/td&gt;
&lt;td&gt;21.46&lt;/td&gt;
&lt;td&gt;11.46&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Kerala&lt;/td&gt;
&lt;td&gt;20.7.2001&lt;/td&gt;
&lt;td&gt;20&lt;/td&gt;
&lt;td&gt;40.54&lt;/td&gt;
&lt;td&gt;20.54&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Uttar Pradesh (West)&lt;/td&gt;
&lt;td&gt;20.7.2001&lt;/td&gt;
&lt;td&gt;15&lt;/td&gt;
&lt;td&gt;30.55&lt;/td&gt;
&lt;td&gt;15.55&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;West Bengal&lt;/td&gt;
&lt;td&gt;20.7.2001&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;0+78.01*&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;25&lt;/td&gt;
&lt;td&gt;78.01&lt;/td&gt;
&lt;td&gt;53.01&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Madhya Pradesh&lt;/td&gt;
&lt;td&gt;20.7.2001&lt;/td&gt;
&lt;td&gt;20&lt;/td&gt;
&lt;td&gt;17.4501&lt;/td&gt;
&lt;td&gt;0&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Bihar&lt;/td&gt;
&lt;td&gt;20.7.2001&lt;/td&gt;
&lt;td&gt;10&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Himachal Pradesh&lt;/td&gt;
&lt;td&gt;20.7.2001&lt;/td&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;1.1&lt;/td&gt;
&lt;td&gt;0&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Orissa&lt;/td&gt;
&lt;td&gt;20.7.2001&lt;/td&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Tamil Nadu&lt;/td&gt;
&lt;td&gt;26.9.2001&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;79+154*&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;50&lt;/td&gt;
&lt;td&gt;233&lt;/td&gt;
&lt;td&gt;183&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Delhi&lt;/td&gt;
&lt;td&gt;20.7.2001&lt;/td&gt;
&lt;td&gt;50&lt;/td&gt;
&lt;td&gt;170.7&lt;/td&gt;
&lt;td&gt;120.7&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Andaman &amp;amp; Nicobar **&lt;/td&gt;
&lt;td&gt;20.7.2001&lt;/td&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;0&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.&lt;/td&gt;
&lt;td&gt;RTL&lt;/td&gt;
&lt;td&gt;Gujarat&lt;/td&gt;
&lt;td&gt;18.3.1997&lt;/td&gt;
&lt;td&gt;179.0859030&lt;/td&gt;
&lt;td&gt;109.01&lt;/td&gt;
&lt;td&gt;0&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.&lt;/td&gt;
&lt;td&gt;Tata Teleservices Ltd.&lt;/td&gt;
&lt;td&gt;Gujarat&lt;/td&gt;
&lt;td&gt;31.8.2001&lt;/td&gt;
&lt;td&gt;40&lt;/td&gt;
&lt;td&gt;109.01&lt;/td&gt;
&lt;td&gt;69.01&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Karnataka&lt;/td&gt;
&lt;td&gt;31.8.2001&lt;/td&gt;
&lt;td&gt;35&lt;/td&gt;
&lt;td&gt;206.83&lt;/td&gt;
&lt;td&gt;171.83&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Andhra Pradesh&lt;/td&gt;
&lt;td&gt;4.11.1997&lt;/td&gt;
&lt;td&gt;161.47(old)&lt;/td&gt;
&lt;td&gt;103.01&lt;/td&gt;
&lt;td&gt;0&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Tamil Nadu&lt;/td&gt;
&lt;td&gt;31.8.2001&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;79+154*&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;50&lt;/td&gt;
&lt;td&gt;233&lt;/td&gt;
&lt;td&gt;183&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Delhi&lt;/td&gt;
&lt;td&gt;31.8.2001&lt;/td&gt;
&lt;td&gt;50&lt;/td&gt;
&lt;td&gt;170.7&lt;/td&gt;
&lt;td&gt;120.7&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.&lt;/td&gt;
&lt;td&gt;TTL (Mah.) Ltd.&lt;/td&gt;
&lt;td&gt;Maharashtra&lt;/td&gt;
&lt;td&gt;31.8.2001&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;189+203.66*&lt;/td&gt;
&lt;td&gt;-&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.&lt;/td&gt;
&lt;td&gt;Bharti Telenet Ltd.&lt;/td&gt;
&lt;td&gt;Karnataka&lt;/td&gt;
&lt;td&gt;29.10.2001&lt;/td&gt;
&lt;td&gt;35&lt;/td&gt;
&lt;td&gt;206.83&lt;/td&gt;
&lt;td&gt;171.83&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Madhya Pradesh&lt;/td&gt;
&lt;td&gt;28.2.1997&lt;/td&gt;
&lt;td&gt;35.33 (old)&lt;/td&gt;
&lt;td&gt;17.4501&lt;/td&gt;
&lt;td&gt;0&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Tamil Nadu&lt;/td&gt;
&lt;td&gt;29.10.2001&lt;/td&gt;
&lt;td&gt;50&lt;/td&gt;
&lt;td&gt;79+154*&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;233&lt;/td&gt;
&lt;td&gt;183&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Delhi&lt;/td&gt;
&lt;td&gt;29.10.2001&lt;/td&gt;
&lt;td&gt;50&lt;/td&gt;
&lt;td&gt;170.7&lt;/td&gt;
&lt;td&gt;120.7&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6.&lt;/td&gt;
&lt;td&gt;Shyam Telelink&lt;/td&gt;
&lt;td&gt;Rajasthan&lt;/td&gt;
&lt;td&gt;4.3.1998&lt;/td&gt;
&lt;td&gt;29.29(old)&lt;/td&gt;
&lt;td&gt;32.25&lt;/td&gt;
&lt;td&gt;2.96&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7.&lt;/td&gt;
&lt;td&gt;HFCL Infotel Ltd.&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Punjab&lt;/td&gt;
&lt;td&gt;7.11.1997&lt;/td&gt;
&lt;td&gt;177.59(old)&lt;/td&gt;
&lt;td&gt;151.75&lt;/td&gt;
&lt;td&gt;0&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Guidelines on issuing of National Long Distance (NLD) Services Licence&lt;/h3&gt;
&lt;p&gt;The DoT issued guidelines for NLD operations along with the licences. The main aspects of the Guidelines are:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Unlimited entry for carrying inter-circle and intra-circle calls&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Total foreign equity of the operator should not exceed 74 per cent.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Private operators had to enter into an agreement with fixed service providers with in a circle for traffic between long distance and short distance charging centres&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A timeframe of seven years was set for rolling out services. This timeframe was divided into four phases. If in any of the phases the operator failed to achieve its network coverage target then it would result in encashment and forfeiture of the bank guarantee of that phase&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Private operators had to pay an entry fee of 25 million and a financial bank guarantee of Rs. 200 million.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Under the revenue sharing agreement, the DoT would charge maximum 6 per cent revenue generated by the private operator.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Private operators were allowed to set up landing facilities for accessing submarine cables and make use of available excess bandwidth.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Guidelines on issuing of International Long Distance (ILD) Services licences&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The DoT issued new guidelines for ILD licences in December, 2005. This was done to implement licence simplification measures and also to allow higher foreign investment. The key features of the Guidelines were:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The ILD service, under the Guidelines was defined as network carriage or bearer service which allows NLD licensees international connectivity to foreign networks&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ILD service provider was allowed to provide all kinds of bearer services from an integrated platform. However, a separate licence was required for satellite and global mobile personal communication services.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The terms for the license: (i) the applicant must be an Indian company; (ii) the company must have net-worth and paid up capital of 2.5 crores; (ii) the total foreign equity should not exceed 74 per cent&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ILD licence was issued for a period of 20 year on a non-exclusive basis, and it would be automatically renewed for another term of five year subject to satisfactory performance.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The entry fee for the ILD licence was Rs. 2.5 crores and an unconditional bank guarantee of the same amount has to be submitted, which could be forfeited subject to failure in fulfilling the roll out obligations. The licensee had to also submit an additional financial bank guarantee of Rs. 20 crores. The ILD operators also had to pay a 6 per cent of the annual adjusted gross revenue as annual licence fee. The Guideline also laid down that an additional fee will be charged for the universal service obligation and use of spectrum&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ILD operator has to submit to the DoT detailed plan of the rollout obligation and also commission at least one gateway switch in order to interconnect with NLD licensees. Such networks must be in conformity with the international and national standards.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;For provide ILD services, the operator may obtain leased lines from other access providers.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ILD operators can provide lower-than-toll quality service, provided that there is no degradation in the quality of services.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The gateway and landing stations may be established. However, this will be subject to security and monitoring requirements.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ILD operator had to furnish detailed accounts periodically and furnish any such information requested by TRAI.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;An ILD operator, must co-operate provide facilities to law enforcement and government agencies for monitoring and surveillance. However, the licensee must also ensure protection of privacy of communication.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. The auction process consisted of three rounds of bidding. A minimum bid price was prescribed for each round. The highest bid in the first round was declared the minimum reserve price in the second round. Subsequently the highest bid in the second round was set as the reserve price in the third round. The lowest bidders in each round were rejected to participate in the next round of bidding.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Annexure 1,  Guidelines for Unified Access (Basic and Cellular) Service Licence, November 11, 2003 available at  &lt;a href="http://www.dot.gov.in/uas/Guidelines-Unified_License111103.doc"&gt;www.dot.gov.in/uas/Guidelines-Unified_License111103.doc&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/resources/govt-policy-and-guidelines'&gt;https://cis-india.org/telecom/resources/govt-policy-and-guidelines&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>snehashish</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2013-03-15T06:27:26Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/governing-id-principles-for-evalution">
    <title>Governing ID: Principles for Evalution</title>
    <link>https://cis-india.org/internet-governance/governing-id-principles-for-evalution</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/governing-id-principles-for-evalution'&gt;https://cis-india.org/internet-governance/governing-id-principles-for-evalution&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-03-02T08:20:55Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework">
    <title>Governing ID: Introducing our Evaluation Framework</title>
    <link>https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;div class="content"&gt;
&lt;p&gt;With the rise of national digital identity systems (Digital ID) across the world, there is a growing need to examine their impact on human rights. In several instances, national Digital ID programmes started with a specific scope of use, but have since been deployed for different applications, and in different sectors. This raises the question of how to determine appropriate and inappropriate uses of Digital ID. In April 2019, our research began with this question, but it quickly became clear that a determination of the legitimacy of uses hinged on the fundamental attributes and governing structure of the Digital ID system itself. Our evaluation framework is intended as a series of questions against which Digital ID may be tested. We hope that these questions will inform the trade-offs that must be made while building and assessing identity programmes, to ensure that human rights are adequately protected.&lt;/p&gt;
&lt;h4&gt;Rule of Law Tests&lt;/h4&gt;
&lt;p&gt;Foundational Digital ID must only be implemented along with a 
legitimate regulatory framework that governs all aspects of Digital ID, 
including its aims and purposes, the actors who have access to it, etc. 
In the absence of this framework, there is nothing that precludes 
Digital IDs from being leveraged by public and private actors for 
purposes outside the intended scope of the programme. Our rule of law 
principles mandate that the governing law should be enacted by the 
legislature, be devoid of excessive delegation, be clear and accessible 
to the public, and be precise and limiting in its scope for discretion. 
These principles are substantiated by the criticism that the Kenyan 
Digital ID, the Huduma Namba, was met with when it was legalized through
 a Miscellaneous Amendment Act, meant only for small or negligible 
amendments and typically passed without any deliberation. These set of 
tests respond to the haste with which Digital ID has been implemented, 
often in the absence of an enabling law which adequately addresses its 
potential harms.&lt;/p&gt;
&lt;h4&gt;Rights based Tests&lt;/h4&gt;
&lt;p&gt;Digital ID, because of its collection of personal data and 
determination of eligibility and rights of users, intrinsically involves
 restrictions on certain fundamental rights. The use of Digital ID for 
essential functions of the State, including delivery of benefits and 
welfare, and maintenance of civil and sectoral records, enhance the 
impact of these restrictions. Accordingly, the entire identity 
framework, including its architecture, uses, actors, and regulators, 
must be evaluated at every stage against the rights it is potentially 
violating. Only then will we be able to determine if such violation is 
necessary and proportionate to the benefits it offers. In Jamaica, the 
National Identification and Registration Act, which mandated citizens’ 
biometric enrolment at the risk of criminal sanctions, was held to be a 
disproportionate violation of privacy, and therefore unconstitutional.&lt;/p&gt;
&lt;h4&gt;Risk based Tests&lt;/h4&gt;
&lt;p&gt;Even with a valid rule of law framework that seeks to protect 
rights, the design and use of Digital ID must be based on an analysis of
 the risks that the system introduces. This could take the form of 
choosing between a centralized and federated data-storage framework, 
based on the effects of potential failure or breach, or of restricting 
the uses of the Digital ID to limit the actors that will benefit from 
breaching it. Aside from the design of the system, the regulatory 
framework that governs it should also be tailored to the potential risks
 of its use. The primary rationale behind a risk assessment for an 
identity framework is that it should be tested not merely against 
universal metrics of legality and proportionality, but also against an 
examination of the risks and harms it poses. Implicit in a risk based 
assessment is also the requirement of implementing a responsive 
mitigation strategy to the risks identified, both while creating and 
governing the identity programme.&lt;/p&gt;
&lt;p&gt;Digital ID programmes create an inherent power imbalance 
between the State and its residents because of the personal data they 
collect and the consequent determination of significant rights, 
potentially creating risks of surveillance, exclusion, and 
discrimination. The accountability and efficiency gains they promise 
must not lead to hasty or inadequate implementation.&lt;/p&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework'&gt;https://cis-india.org/internet-governance/blog/governing-id-introducing-our-evaluation-framework&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shruti Trikanad</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2020-03-02T08:03:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity">
    <title>Governing ID: A Framework for Evaluation of Digital Identity</title>
    <link>https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;As governments across the globe implement new and foundational 
digital identification systems (Digital ID), or modernize existing ID 
programs, there is an urgent need for more research and discussion about
 appropriate uses of Digital ID systems. This significant momentum for 
creating Digital ID has been accompanied with concerns about privacy, 
surveillance and exclusion harms of state-issued Digital IDs in several 
parts of the world, resulting in campaigns and litigations in countries,
 such as UK, India, Kenya, and Jamaica. Given the sweeping range of 
considerations required to evaluate Digital ID projects, it is necessary
 to formulate evaluation frameworks that can be used for this purpose.&lt;/p&gt;
&lt;p&gt;This work began with the question of what the appropriate uses
 of Digital ID can be, but through the research process, it became clear
 that the question of use cannot be divorced from the fundamental 
attributes of Digital ID systems and their governance structures. This 
framework provides tests, which can be used to evaluate the governance 
of Digital ID across jurisdictions, as well as determine whether a 
particular use of Digital ID is legitimate. Through three kinds of 
checks — Rule of Law tests, Rights based tests, and Risks based tests — 
this scheme is a ready guide for evaluation of Digital ID.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/internet-governance/image-governing-id-principles-for-evalution/" alt="null" width="100%" /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;View the &lt;a class="external-link" href="https://digitalid.design/evaluation-framework-02.html"&gt;framework&lt;/a&gt; or download as&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/governing-id-principles-for-evalution" class="internal-link" title="Governing ID: Principles for Evalution"&gt;PDF&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity'&gt;https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vrinda Bhandari, Shruti Trikanad, and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2020-03-02T13:22:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/good-intentions-recalcitrant-text-2013-ii-what-india2019s-itu-proposal-may-mean-for-internet-governance">
    <title>Good Intentions, Recalcitrant Text – II: What India’s ITU Proposal May Mean for Internet Governance</title>
    <link>https://cis-india.org/internet-governance/blog/good-intentions-recalcitrant-text-2013-ii-what-india2019s-itu-proposal-may-mean-for-internet-governance</link>
    <description>
        &lt;b&gt;The UN's International Telecommunications Union (ITU) is hosting its Plenipotentiary Conference (PP-14) this year in South Korea. At PP-14, India introduced a new draft resolution on ITU's Role in Realising Secure Information Society. The Draft Resolution has grave implications for human rights and Internet governance. Geetha Hariharan explores.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Disclaimer and update (2 November 2014)&lt;/strong&gt;: India's Draft Resolution was discussed during the meeting of the &lt;span style="text-align: justify; "&gt;Ad Hoc Working Group on Internet-related Resolutions at the ITU Plenipot on the evening of November 1, 2014 (KST). &lt;/span&gt;After the discussion, India revised the text of the resolution, seeking to address concerns raised by ITU member states. The revised resolution may be &lt;a href="https://cis-india.org/internet-governance/blog/india-itu-resolution-busan-2014-revised/at_download/file"&gt;found here&lt;/a&gt;. However, this blog&lt;span style="text-align: justify; "&gt; post was written with reference to the &lt;/span&gt;&lt;a href="http://cis-india.org/internet-governance/blog/india-draft-resolution-itus-role-in-securing-information-security/at_download/file" style="text-align: justify; "&gt;original text&lt;/a&gt;&lt;span style="text-align: justify; "&gt; of India's Draft Resolution.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;***&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As I mentioned in my &lt;a href="http://cis-india.org/internet-governance/blog/good-intentions-going-awry-i-why-india2019s-proposal-at-the-itu-is-troubling-for-internet-freedoms"&gt;last post&lt;/a&gt;, India’s &lt;a href="http://cis-india.org/internet-governance/blog/india-draft-resolution-itus-role-in-securing-information-security/at_download/file"&gt;Draft Resolution&lt;/a&gt; on ‘ITU’s Role in Realising Secure Information Society’ raises security and equity concerns. The Draft Resolution has 3 security concerns: (i) security weaknesses in the network architecture that permit “&lt;i&gt;camouflaging the identity of the originator of the communication&lt;/i&gt;” and make “&lt;i&gt;tracing of communication difficult&lt;/i&gt;”; (ii) non-systematic, non-contiguous allocation of naming, numbering and addressing resources on the Internet, which makes it difficult to identify both the users and what states the IP addresses are located in; (iii) non-local routing and address resolution relating to traffic originating and terminating in the same country. Op. §§1, 3-7 seek to address these. It also identifies the present system of allocation of naming, numbering and addressing resources as inequitable, unfair, unjust and undemocratic (Op. §2 of the Draft Resolution offers a solution). I discussed some human rights implications of India’s Draft Resolution in my last post.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this post, I explore the implications of the Draft Resolution for Internet governance and multi-stakeholder approaches (most notably, an &lt;a href="http://bestbits.net/lf/initiative/show/2.html"&gt;equal footing model&lt;/a&gt;).&lt;a href="http://cis-india.org/internet-governance/blog/good-intentions-recalcitrant-text-2013-ii-what-india2019s-itu-proposal-may-mean-for-internet-governance#_ftn1"&gt;[1]&lt;/a&gt; Given the uncertainties around defining multi-stakeholderism for Internet governance, this is rather ambitious. So I will try to point to concerns with certain &lt;i&gt;textual&lt;/i&gt; interpretations of the Draft Resolution, map that against the positions India’s representatives have taken on Internet governance in the past, and the motivations/concerns that underlie the tabling of the Draft Resolution. This Resolution may not be the best way to allay India's concerns, for there are technical and rights implications. But the concerns it raises are worth discussion and knowledge, and at forums where concerns are heard, acknowledged and discussed collectively. The text of the Draft Resolution and its attendant implications are not, then, the sole subjects of this post.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;The Draft Resolution and Internet governance&lt;/span&gt;&lt;span&gt;:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;The text of the Draft Resolution is problematic. Many of its clauses may be seen as taking positions against multi-stakeholder approaches to Internet governance. Introducing such a resolution at the ITU may itself bring back memories of the controversies surrounding &lt;/span&gt;&lt;a href="http://files.wcitleaks.org/public/S12-WCIT12-C-0065!!MSW-E.pdf"&gt;Resolution 3&lt;/a&gt;&lt;span&gt; of the World Conference on International Telecommunications (WCIT), 2012.&lt;/span&gt;&lt;a href="#_ftn2"&gt;[2]&lt;/a&gt;&lt;span&gt; In 3 ways, the text of the Draft Resolution has indications for multi-stakeholder approaches.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;First&lt;/i&gt;, the Draft Resolution frames issues primarily from the perspective security. In its preamble, the Draft Resolution makes several references to security threats posed by and on the Internet. For instance, it points to the ability of the network to “&lt;i&gt;camouflage the identity of the originator of the communication&lt;/i&gt;” (Pream. §(e) [&lt;i&gt;recognizing&lt;/i&gt;]), as well as national security concerns in the present-day system of routing Internet traffic through multiple countries (Pream. §§(f) and (g), [&lt;i&gt;recognizing&lt;/i&gt;]). The apparent difficulty in tracing IP addresses, due to their random allocation, is another concern (Pream. §(h), [&lt;i&gt;recognizing&lt;/i&gt;]). Among the “&lt;i&gt;significant public policy issues&lt;/i&gt;” identified in telecom/ICT management, “&lt;i&gt;security and safety of the Telecom/ICTs&lt;/i&gt;” is specifically noted (Pream. §(i) [&lt;i&gt;considering&lt;/i&gt;]). In the Context note to the Draft Resolution and in several places in the Preamble, there are references to ITU &lt;a href="https://www.itu.int/osg/csd/cybersecurity/WSIS/RESOLUTION_130.pdf"&gt;Resolution 130&lt;/a&gt; (‘Strengthening the role of ITU in building confidence and security in the use of information and communication technologies’) and ITU’s Cyber-security Agenda. Given the (legitimate or otherwise) disproportionate involvement of governments and not other stakeholders in matters of cyber-security, the framing of issues from a security perspective may lend itself to worries for multi-stakeholderism. Specifically, the Draft Resolution notes: “&lt;i&gt;ensuring security of ICT networks is sovereign right of Member States&lt;/i&gt;” (Pream. §(b) [&lt;i&gt;recognizing&lt;/i&gt;]).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second&lt;/i&gt;, the Draft Resolution emphasizes the sovereign right of states to regulate and control telecom/ICT. It says, for instance, “&lt;i&gt;it is the sovereign right of each state to regulate its telecommunication&lt;/i&gt;” (Pream. §(b) [&lt;i&gt;considering&lt;/i&gt;]). With regard to the Internet, the Context note to the Draft Resolution (page 1) considers the Internet to be synonymous with telecom/ICTs: “&lt;i&gt;the Telecom/ICTs, which in common lexicon is used interchangeably many times as Internet…&lt;/i&gt;”. Public telecom networks managed by telecom service providers, interconnected with other networks, are necessary for  “&lt;i&gt;proper functioning of a telecom network resources namely, among others, naming, numbering and addressing&lt;/i&gt;” (Pream. §(k) [&lt;i&gt;considering&lt;/i&gt;]). It is worth noting that the sovereign authority of states over Internet public policy issues is settled text from §35 of the &lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt;, though expressing it as synonymous with telecom may lead to possibilities of licensing and registration, which Bulgaria, for instance, does not do.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Third&lt;/i&gt;, the Draft Resolution identifies issues of equity and fairness in the allocation of Internet resources such as naming, numbering and addressing (Pream. §(g) [&lt;i&gt;consdering&lt;/i&gt;], Op. §2). It states that to correct this inequity, “&lt;i&gt;facilitation and collaboration among international, inter-governmental organizations and individual member states to ensure planning, implementation, monitoring and cooperation in its policies&lt;/i&gt;” is required (Pream. §(g) [&lt;i&gt;considering&lt;/i&gt;]). In operative paragaphs, our Draft Resolution calls for collaboration with “&lt;i&gt;all the concerned stakeholders including International and intergovernmental organizations to develop policies for allocation, assignment and management of IP resources including naming, numbering and addressing which is systematic, equitable, fair, just, democratic and transparent&lt;/i&gt;” (Op. §2). One may pay attention to the oversight over implementation and the necessity of inter-governmental involvement in planning and monitoring as problematic to iterations of multi-stakeholderism.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These concerns are valid and legitimate, and it is desirable that the text of the resolution be altered to address them. The text should also be altered to address the human rights concerns I point out in my &lt;a href="http://cis-india.org/internet-governance/blog/good-intentions-going-awry-i-why-india2019s-proposal-at-the-itu-is-troubling-for-internet-freedoms"&gt;previous post&lt;/a&gt;&lt;span&gt;. But human rights enforcement or implementation is within the domain of states, though civil society may be a careful watchdog. The Draft Resolution's text, most certainly, will face certain oppositions: for instance, that it is outside the scope and mandate of the ITU. That the ITU does not deal with content regulation – and this issue touches upon content – will be mentioned. That Internet governance is already being discussed and performed in multiple other multi-stakeholder fora, such as ICANN, the NRO and RIRs, IGF and WSIS, will be emphasized. That the Draft Resolution implicates national security concerns will be mentioned as well. But as an aside, on national security: under international law, states always mention their prerogative over national security, and so as a matter of international custom, national security is outside the scope of agreements unless expressly surrendered. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, debates around the role of ITU in Internet governance are not new, and those familiar will remember the &lt;a href="http://www.icannwatch.org/archive/mueller_icann_and_internet_governance.pdf"&gt;ITU’s views&lt;/a&gt; right before the creation of ICANN (also &lt;i&gt;see&lt;/i&gt; Mueller, Ruling the Root 145-48 (2002)), Resolution 3 of the WCIT, and the constant tug-of-war since then. The new Secretary-General of the ITU, Mr. Houlin Zhao, &lt;a href="http://www.itu.int/ITU-T/tsb-director/itut-wsis/files/zhao-netgov01.pdf"&gt;wrote a note&lt;/a&gt; in October 2004, before the Tunis phase of the WSIS, justifying ITU’s involvement in Internet governance, advocating that IPv6 address blocks be allocated to countries. Mr. Zhao &lt;span&gt;describes, with specific examples, ITU's role in the development and widespread growth of the Internet. He takes the examples of standards developed within the ITU and ITU's policy role in liberalisation and spread of telecommunications (such as Articles 4 &amp;amp; 9 of the 1988 ITRs).&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Zhao’s concrete proposals are rendered inapplicable by the creation of the NRO and RIRs, and the growth and entrenchment of ICANN. But it may be argued that his principled justifications for ITU involvement remain. It is these that India hopes to highlight, I was told, along with the inequities in resource allocation (IPv4 was spoken of), and the disproportionate weight some states enjoy in Internet governance. &lt;span style="text-align: justify; "&gt;Her concerns are, I am told, also shared by some other states. Given that the text exhibits a less-than-friendly approach to multi-stakeholderism, &lt;/span&gt;India's previous positions on the issue are of interest. While this would not correct the snags in the Draft Resolution's text, allaying these concerns may be ideal to craft an inclusive and transparent multi-stakeholder model for Internet governance.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;India and Multi-stakeholderism in Internet Governance&lt;/span&gt;&lt;span&gt;:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India’s position on multi-stakeholder models for Internet governance is a matter of some obscurity. Statements at various forums exhibit a certain disagreement – or at the least, lack of engagement – among India’s ministries on our position on multi-stakeholder approaches, particularly the Ministry of External Affairs (MEA), the Department of Telecommunications (DOT) and the Department of Electronics and Information Technology (DeitY), both within the Ministry of Communications and Information Technology (MCIT). While both the MEA and DOT have been cautious supporters of a diluted form of multi-stakeholderism (they have repeatedly emphasized §35 of the &lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt;), DeitY has been more open in entertaining multi-stakeholder approaches for Internet governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;At the 66&lt;/span&gt;&lt;sup&gt;th&lt;/sup&gt;&lt;span&gt; session of UN General Assembly, Mr. Dushyant Singh, Member of India’s Parliament from the Bharatiya Janata Party, presented our &lt;/span&gt;&lt;a href="http://cis-india.org/internet-governance/blog/india-statement-un-cirp"&gt;proposal&lt;/a&gt;&lt;span&gt; for a Committee on Internet-related Policies. The proposal sought the establishment of a UN committee comprising 50 member-states, with advisory groups including the private sector and civil society, to deal with Internet-related matters.&lt;/span&gt;&lt;a href="#_ftn3"&gt;[3]&lt;/a&gt;&lt;span&gt; Though India was &lt;/span&gt;&lt;a href="http://www.medianama.com/2011/11/223-why-indias-proposal-for-a-un-committee-for-internet-related-policy-isnt-all-that-evil/"&gt;not opposed&lt;/a&gt;&lt;span&gt; to multi-stakeholder advisories in its CIRP proposal, it was less than inviting in this regard.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At NETmundial (April 2014), the Indian government’s &lt;a href="http://content.netmundial.br/contribution/government-of-india-s-initial-submission-to-global-multistakeholder-meeting-on-the-future-of-internet-governance-sau-paulo-brazil-april-23-24-2014/138"&gt;contribution document&lt;/a&gt; highlighted §35 of the Tunis Agenda, which delineates ‘roles and responsibilities’ of ‘respective stakeholders’ – i.e., governments (with whom reside “&lt;i&gt;sovereign policy authority&lt;/i&gt;”), the private sector (technical and economic development of the Internet) and civil society (grassroots participation). At NETmundial, Mr. Vinay Kwatra of the MEA &lt;a href="http://netmundial.br/wp-content/uploads/2014/04/NETMundial-23April2014-Welcome-Remarks-en.pdf"&gt;echoed this&lt;/a&gt;, also noting the lack of consensus on what multi-stakeholderism means for Internet governance (page 64).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Admittedly, this is a legitimate concern. Internet governance at various fora does not seem to have a clear answer on what multi-stakeholderism means. The debate was/is alive, for instance, at &lt;/span&gt;&lt;a href="http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf"&gt;NETmundial 2014&lt;/a&gt;&lt;span&gt;, the ICANN-convened &lt;/span&gt;&lt;a href="https://www.icann.org/stewardship"&gt;IANA transition process&lt;/a&gt;&lt;span&gt;, the World Economic Forum’s new &lt;/span&gt;&lt;a href="http://www.circleid.com/posts/20141007_beyond_netmundial_initiative_or_inertia/"&gt;NETmundial Initiative&lt;/a&gt;&lt;span&gt;, and in the many &lt;/span&gt;&lt;a href="http://bestbits.net/igf-statement-2014/"&gt;calls&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="http://www.global.asc.upenn.edu/app/uploads/2014/08/BeyondNETmundial_FINAL.pdf"&gt;suggestions&lt;/a&gt;&lt;span&gt; (pages 38-46) made over the years on strengthening the IGF (&lt;/span&gt;&lt;i&gt;see also&lt;/i&gt;&lt;span&gt;, Malcolm, Multi-stakeholder Governance and the IGF (2008), chapter 6). It is hardly surprising then, that India and other states raise this as a concern.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With regard to multi-stakeholderism, the DeitY in India has been the outlier. &lt;a href="http://www.intgovforum.org/cms/174-igf-2014/transcripts/1977-2014-09-04-ms-evolution-of-the-ig-main-room"&gt;Speaking&lt;/a&gt; at the 2014 IGF in Istanbul, Mr. R.S. Sharma, Secretary (DeitY), expressed “&lt;i&gt;no doubt that Internet Governance mechanism require the involvement of all the stakeholders, since the evolution of Internet has been a product of many different diverse groups working together in a loosely coordinated manner&lt;/i&gt;”, advocating strengthening of the IGF and pointing to India’s proposed India-IGF as an example of multi-stakeholderism at home. Most interestingly, Mr. Sharma did not focus on international Internet-related policies being the “&lt;i&gt;sovereign policy authority of states&lt;/i&gt;”. Also in the transcripts of the four meetings of the &lt;a href="http://unctad.org/en/Pages/CSTD/WGEC.aspx"&gt;Working Group on Enhanced Cooperation&lt;/a&gt; under the Committee for Science, Technology and Development (CSTD), I have been unable to find outright rejections of multi-stakeholder approaches, though India has not advocated multi-stakeholderism unequivocally either.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But this – the emphasis on “&lt;i&gt;sovereign policy authority of states&lt;/i&gt;” in Internet governance – has been a consistent position for India, especially the MEA and DOT. Here at the ITU PP-14 as well, members of the Indian delegation also emphasized states’ sovereign monopoly over policy matters. “Why not take this to the ITU”, I was asked, as “many governments are uncomfortable” with the way Internet governance is being conducted at other fora. There are grave concerns, I was told, about the possibility of excessive control some governments have over both user and government data of other states (government-speak, of course, for the Snowden revelations).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These are, of course, concerns similar to those of authoritarian governments, or those reluctant to open up to multi-stakeholderism and looking for excuses to retain/increase government control. But it is equally possible that these concerns need not be limited only to such states. Perhaps for developing countries as well, these are real concerns. &lt;span&gt;In conversation with members of the Indian delegation at the ITU Plenipot, I was able to discern 3 broad concerns. &lt;/span&gt;&lt;i&gt;First&lt;/i&gt;&lt;span&gt;,&lt;/span&gt;&lt;i&gt; t&lt;/i&gt;&lt;span&gt;he definition of multi-stakeholderism in Internet governance. India has not shown herself comfortable with an all-out endorsement of multi-stakeholderism. This is troubling. Civil society and the private sector in India will attest to the difficulties in engaging with our government at all levels. For instance, seeking a place on India's delegation for the Plenipot proved a disheartening exercise for some members of India's civil society. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But there are also conflicting indications. India is in the process of instituting an India-IGF, and CIS' E&lt;span style="text-align: justify; "&gt;xecutive Director, Sunil Abraham, is on the MAG. India expressed agreement, at least in informal conversation, to opening up ITU documents to the public on grounds of public interest. The Law &lt;span style="text-align: justify; "&gt;Commission of India  recently conducted a multi-stakeholder consultation on media laws in India, and &lt;span style="text-align: justify; "&gt;Telecom Regulatory Authority of India (TRAI) regularly conducts consultations, though the private sector is more active there. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;What is lacking in India, however, is a set of clear procedures and processes for multi-stakeholder engagement, particularly on Internet issues. Clear, public, accessible, foreseeable and predictable set of rules or processes on participation from civil society, private sector and academia would make a world of difference to multi-stakeholderism within India. But this lack should not blind states or other stakeholders to the genuineness of privacy/security or equity concerns - for instance, of the protection of our information from mass surveillance or the feasibility and actual participation of developing countries at many Internet governance fora.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second&lt;/i&gt;, members of the delegation expressed concern over inequalities in the allocation of naming, numbering and addressing resources. While I am uncertain how IPv6 allocation falls within this concern, t&lt;span style="text-align: justify; "&gt;he inequalities of IPv4 allocations are well documented. To gather a sense of this, it would be useful to read chapter 5 of Professor DeNardis’ &lt;/span&gt;&lt;a href="http://mitpress.mit.edu/books/protocol-politics" style="text-align: justify; "&gt;Protocol Politics&lt;/a&gt;&lt;span style="text-align: justify; "&gt;, and to glance at Figure 5.7 (page 173). Africa controls, for instance, a mere 1% of all available IPv4 addresses, while North America and Europe control about 63%. A study on engagement from the Asia-Pacific in Internet standards organisations shows, for instance, greater participation from Western countries and from some states like Japan.&lt;/span&gt;&lt;a href="#_ftn4" style="text-align: justify; "&gt;[4]&lt;/a&gt;&lt;span style="text-align: justify; "&gt; India and other states from Asia and Africa have lesser participation. Even at ICANN, with efforts to increase participation, meaningful engagement is still from a majority of Western countries. Perhaps states and other stakeholders on the other side of the table can address these concerns through clear, inclusive, non-discriminatory commitments and implementation.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Third&lt;/i&gt;, India emphasized how the Draft Resolution does not propose that ITU be involved in content management or resources control, but only seeks to systematize allocation by asking the ITU Secretary General to collaborate and coordinate with other Internet governance organisations to create a set of principles for fair, equitable, transparent and democratic - as well as secure - allocation of resources. ITU Resolution 101 already instructs the Secretary General to collaborate with relevant Internet governance organisations, and the Draft Resolution merely seeks to spell out his tasks. However, as I pointed out in my previous post, the text of the Draft Resolution is at odds with this intention of India's. By dint of its drafting, it gravely implicates human rights, as well as touching upon resource allocation oversight ("&lt;i&gt;needs to be adhere to"&lt;/i&gt; in Op. §2). To reflect the above stated intention, the Draft Resolution would need to be redrafted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, the text of the Draft Resolution exhibits, unfortunately, a certain disregard for existing network architecture and efficiency within the Internet, and to the &lt;a href="http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf"&gt;principles&lt;/a&gt; of a free, open and inter-operable and unified Internet, when it seeks to develop a network architecture that facilitates (domestic) localization of traffic-routing, address resolution and allocation of naming, numbering and addressing. An argument may, of course, &lt;a href="http://www.internetpolicy.net/practices/ixp-india.pdf"&gt;be made&lt;/a&gt; in favour of efficiency and costs, including reduced latency. But it is clear that this has the &lt;a href="http://www.lawfareblog.com/wp-content/uploads/2014/07/Lawfare-Research-Paper-Series-Vol2No3.pdf"&gt;potential&lt;/a&gt; to increase domestic surveillance capabilities and government &lt;a href="https://www.accessnow.org/blog/2014/06/04/the-impact-of-forced-data-localisation-on-fundamental-rights"&gt;censorship&lt;/a&gt; of content. In any case, traffic localization (if not local address resolution) can be &lt;a href="http://trai.gov.in/WriteReadData/Recommendation/Documents/9SEP1052012.pdf"&gt;achieved&lt;/a&gt; without ITU coordination: through Internet Exchange Points, and through more efficient and better-negotiated peering and transit arrangements (pages 14-17). Internationally coordinated rules for localized traffic routing is not necessary; you just need to have a more efficient Internet Exchange Point. How to get more ISPs to interconnect through India’s National Internet Exchange (NIXI) is one of the very questions that India’s Telecom Regulatory Authority has taken up in its recent &lt;a href="http://www.trai.gov.in/WriteReaddata/ConsultationPaper/Document/Consultation%20Paper%20on%20Broadband%2024Sep2014.pdf"&gt;consultation&lt;/a&gt; on expanding broadband access (page 49). So it is possible that India's concerns could be addressed without ITU involvement, though I am unsure of its impact on the global Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Draft Resolution will be discussed at the ITU Plenipot today. The discussion will allow India and sympathetic countries to raise several of their concerns relating to the present system of Internet governance, and the direction of its progress. I will report on these discussions upon their completion.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;A Note on Limitations&lt;/span&gt;&lt;span&gt;:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The aim of this post is to clarify. I would caution against its being the last word on anything, much less India’s positions on Internet governance. An issue as important as this needs far greater access to and confirmation from India’s government – and a more in-depth understanding of the politics – than I do, at the moment.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, India has not been a model for civil society engagement, as illustratively, the &lt;a href="http://en.wikipedia.org/wiki/Narmada_Bachao_Andolan"&gt;Narmada Bachao Andolan&lt;/a&gt; and/or P. Sainath’s evaluation of government policies in &lt;a href="http://www.amazon.com/Everybody-Loves-Good-Drought-Districts/dp/0140259848"&gt;&lt;i&gt;Everybody Loves a Good Drought&lt;/i&gt;&lt;/a&gt; reveal. It has been harder to effectively engage with India’s government than in many states in North America, Latin America and Europe. But I believe the complex dynamics of that is not unique to India. The &lt;a href="http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded"&gt;NSA&lt;/a&gt; and &lt;a href="http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo"&gt;GCHQ&lt;/a&gt; revelations (as an example of governmental trust deficit of unmatched proportions) have shown that where governments want to keep everyone out and oblivious, they do it well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;I am not in favour of a purely multilateral approach to Internet governance. But at the same time, I share concerns over definition and the evolution of processes as well, as I am sure others in civil society also do. &lt;/span&gt;Particularly on the issue of Internet governance and multi-stakeholderism, evidence reveals inconsistency among India’s various ministries. Until this is addressed by our government (hopefully in consultation with all concerned stakeholders), an open mind would probably be the best thing we - including states - could keep.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;Acknowledgements&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;: I would like to thank Sunil Abraham, Pranesh Prakash, Rishabh Dara, Arun Sukumar, Anja Kovacs and Parminder Jeet Singh for the freedom to bounce ideas, feedback and the many discussions about multi-stakeholder approaches and Internet governance. I also wish to acknowledge Samir Saran’s &lt;a href="http://www.cfr.org/internet-policy/itu-unbundling-internet-governance/p33656"&gt;article&lt;/a&gt; in CFR, which offers an interesting perspective on India’s Draft Resolution.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;hr size="1" style="text-align: justify; " width="33%" /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1"&gt;[1]&lt;/a&gt; For this post, I will use ‘multi-stakeholder approaches’ as an umbrella term, but would urge readers to keep in mind the many uncertainties and disagreements about defining multi-stakeholderism for Internet governance. These disagreements exist among and within all stakeholders, including government and civil society. In addition to various iterations of the ‘equal footing model’, the model proposed in §35 of the Tunis Agenda is also multi-stakeholder, albeit in a different – and for many in civil society, less desirable – sense.&lt;/p&gt;
&lt;p style="text-align: left; "&gt;&lt;a href="#_ftnref2"&gt;[2]&lt;/a&gt; For those unacquainted with WCIT, &lt;i&gt;see&lt;/i&gt; Mueller, &lt;i&gt;ITU Phobia: Why WCIT was derailed&lt;/i&gt;, Internet Governance Blog (18 December 2012), &lt;a href="http://www.internetgovernance.org/2012/12/18/itu-phobia-why-wcit-was-derailed/"&gt;http://www.internetgovernance.org/2012/12/18/itu-phobia-why-wcit-was-derailed/&lt;/a&gt;; Kleinwächter, &lt;i&gt;WCIT and Internet governance: Harmless resolution or Trojan horse?&lt;/i&gt;, CircleID Blog (17 December 2012), &lt;a href="http://www.circleid.com/posts/20121217_wcit_and_internet_governance_harmless_resolution_or_trojan_horse/"&gt;http://www.circleid.com/posts/20121217_wcit_and_internet_governance_harmless_resolution_or_trojan_horse/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3"&gt;[3]&lt;/a&gt; For a commentary, &lt;i&gt;see&lt;/i&gt; Mueller, &lt;i&gt;A United Nations Committee for Internet-related Policies? A Fair Assessment&lt;/i&gt;, Internet Governance Blog (29 October 2011), &lt;a href="http://www.internetgovernance.org/2011/10/29/a-united-nations-committee-for-internet-related-policies-a-fair-assessment/"&gt;http://www.internetgovernance.org/2011/10/29/a-united-nations-committee-for-internet-related-policies-a-fair-assessment/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4"&gt;[4]&lt;/a&gt; Contreras, &lt;i&gt;Divergent Patterns of Engagement in Internet Standardization: Japan, Korea and China&lt;/i&gt;. I am unable to find this paper online. Please email me for information.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/good-intentions-recalcitrant-text-2013-ii-what-india2019s-itu-proposal-may-mean-for-internet-governance'&gt;https://cis-india.org/internet-governance/blog/good-intentions-recalcitrant-text-2013-ii-what-india2019s-itu-proposal-may-mean-for-internet-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Multi-stakeholder</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-11-03T07:07:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/good-intentions-going-awry-i-why-india2019s-proposal-at-the-itu-is-troubling-for-internet-freedoms">
    <title>Good Intentions, Recalcitrant Text - I: Why India’s Proposal at the ITU is Troubling for Internet Freedoms</title>
    <link>https://cis-india.org/internet-governance/blog/good-intentions-going-awry-i-why-india2019s-proposal-at-the-itu-is-troubling-for-internet-freedoms</link>
    <description>
        &lt;b&gt;The UN's International Telecommunications Union (ITU) is hosting its Plenipotentiary Conference (PP-14) this year in South Korea. At PP-14, India introduced a new draft resolution on ITU's Role in Realising Secure Information Society. The Draft Resolution has grave implications for human rights and Internet governance. Geetha Hariharan explores.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the 2014 Plenipotentiary Conference (‘PP-14’ or ‘Plenipot’) of the International Telecommunications Union (ITU), India has tabled &lt;a href="https://cis-india.org/internet-governance/blog/india-draft-resolution-itus-role-in-securing-information-security/at_download/file"&gt;a draft proposal&lt;/a&gt; on “ITU’s Role in Realising Secure Information Society” [Document 98, dated 20 October 2014] (“&lt;strong&gt;Draft Resolution&lt;/strong&gt;”). India’s proposal has incited a great deal of concern and discussion among Plenipot attendees, governments and civil society alike. Before offering my concerns and comments on the Draft Resolution, let us understand the proposal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our Draft Resolution identifies 3 security concerns with exchange of information and resource allocation on the Internet:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;i&gt;First&lt;/i&gt;, it is troubling for India that present network architecture has “&lt;i&gt;security weaknesses&lt;/i&gt;” such as “&lt;i&gt;camouflaging the identity of the originator of the communication&lt;/i&gt;”;&lt;a href="#_ftn1"&gt;[1]&lt;/a&gt; random IP address distribution also makes “&lt;i&gt;tracing of communication difficult&lt;/i&gt;”;&lt;a href="#_ftn2"&gt;[2]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Second&lt;/i&gt;, India is concerned that under the present allocation system of naming, numbering and addressing resources on the Internet, it is impossible or at the very least, cumbersome to identify the countries to which IP address are allocated;&lt;a href="#_ftn3"&gt;[3]&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;i&gt;Third&lt;/i&gt;, India finds it insecure from the point of view of national security that traffic originating and terminating in the same country (domestic traffic) often routes through networks overseas;&lt;a href="#_ftn4"&gt;[4]&lt;/a&gt; similarly, local address resolution also routes through IP addresses outside the country or region, which India finds troubling.&lt;a href="#_ftn5"&gt;[5]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;In an effort to address these concerns, the Draft Resolution seeks to instruct the ITU Secretary General:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;i&gt;First&lt;/i&gt;,&lt;i&gt; &lt;/i&gt;to develop and recommend a ‘traffic routing plan’ that can “&lt;i&gt;effectively ensure the traceability of communication&lt;/i&gt;”;&lt;a href="#_ftn6"&gt;[6]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Second&lt;/i&gt;, to collaborate with relevant international and intergovernmental organisations to develop an&lt;i&gt; &lt;/i&gt;“&lt;i&gt;IP address plan&lt;/i&gt;”&lt;i&gt; &lt;/i&gt;which facilitates identification of locations/countries to which IP addresses are allocated and coordinates allocation accordingly;&lt;a href="#_ftn7"&gt;[7]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Third&lt;/i&gt;, to develop and recommend “&lt;i&gt;a public telecom network architecture&lt;/i&gt;” that localizes both routing&lt;a href="#_ftn8"&gt;[8]&lt;/a&gt; as well as address resolution&lt;a href="#_ftn9"&gt;[9]&lt;/a&gt; for local/domestic traffic to “&lt;i&gt;within the country&lt;/i&gt;”.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Admittedly, our Draft Resolution is intended to pave a way for “&lt;i&gt;systematic, fair and equitable allocation&lt;/i&gt;” of, &lt;i&gt;inter alia&lt;/i&gt;, naming, numbering and addressing resources,&lt;a href="#_ftn10"&gt;[10]&lt;/a&gt; keeping in mind security and human rights concerns.&lt;a href="#_ftn11"&gt;[11]&lt;/a&gt; In an informal conversation, members of the Indian delegation echoed these sentiments. Our resolution does not, I was told, raise issues about the “&lt;i&gt;concentration of control over Internet resources&lt;/i&gt;”, though “&lt;i&gt;certain governments&lt;/i&gt;” have historically exercised more control. It also does not, he clarified, wish to make privacy or human rights a matter for discussion at the ITU. All that the Draft Resolution seeks to do is to equip the ITU with the mandate to prepare and recommend a “&lt;i&gt;roadmap for the systematization&lt;/i&gt;” of allocation of naming, numbering and addressing resources, and for local routing of domestic traffic and address resolution. The framework for such mandate is that of security, given the ITU’s role in ‘building confidence and security in the use of ICTs’ under Action Line C5 of the &lt;a href="http://www.itu.int/wsis/docs/geneva/official/poa.html"&gt;Geneva Plan of Action&lt;/a&gt;, 2003.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, the text of our Draft Resolution, by dint of imprecision or lack of clarity, undermines India’s intentions. On three issues of utmost importance to the Internet, the Draft Resolution has unintended or unanticipated impacts. &lt;strong&gt;&lt;i&gt;First&lt;/i&gt;&lt;/strong&gt;, its text on tracing communication and identity of originators, and systematic allocation of identifiable IP address blocks to particular countries, has impacts on privacy and freedom of expression. Given Edward Snowden’s &lt;a href="http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded"&gt;NSA files&lt;/a&gt; and the absence of adequate protections against government incursions or excesses into privacy,&lt;a href="#_ftn12"&gt;[12]&lt;/a&gt; either in international human rights law or domestic law, such text is troublesome. &lt;strong&gt;&lt;i&gt;Second&lt;/i&gt;&lt;/strong&gt;, it has the potential to undermine multi-stakeholder approaches to Internet governance by proposing text that refers almost exclusively to sovereign monopolies over Internet resource allocation, and &lt;strong&gt;&lt;i&gt;finally&lt;/i&gt;&lt;/strong&gt;, displays a certain disregard for network architecture and efficiency, and to principles of a free, open and unified Internet, when it seeks to develop global architecture that facilitates (domestic) localization of traffic-routing, address resolution and allocation of naming, numbering and addressing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this post, I will address the first concern of human rights implications of our Draft Resolution.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Unintended Implications for Privacy and Freedom of Expression:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India’s Draft Resolution has implications for individual privacy. At two different parts of the preamble, India expresses concerns with the impossibility of locating the user at the end of an IP address:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Pream. §(e): “&lt;i&gt;recognizing&lt;/i&gt;… that the modern day packet networks, which at present have many security weaknesses, &lt;i&gt;inter alia&lt;/i&gt;, camouflaging the identity of originator of the communication”;&lt;/li&gt;
&lt;li&gt;Pream. §(h): “&lt;i&gt;recognizing&lt;/i&gt;… that IP addresses are distributed randomly, that makes the tracing of communication difficult”.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The concerns here surround difficulties in tracking IP addresses due to the widespread use of NATs, as also the existence of IP anonymisers like Tor. Anonymisers like Tor permit individuals to cover their online tracks; they conceal user location and Internet activity from persons or governments conducting network surveillance or traffic analysis. For this reason, Tor has caused much discomfort to governments. &lt;a href="http://www.wired.com/2014/10/laura-poitras-crypto-tools-made-snowden-film-possible/"&gt;Snowden used Tor&lt;/a&gt; while communicating with Laura Poitras. Bradley (now Chelsea) Manning of Wikileaks fame is&lt;i&gt; &lt;/i&gt;&lt;a href="http://belfercenter.ksg.harvard.edu/files/maurer-dp-2011-10-wikileaks-final.pdf"&gt;reported&lt;/a&gt; to have used Tor (page 24). Crypto is increasingly the safest – perhaps the only safe – avenue for political dissidents across the world; even Internet companies were &lt;a href="http://gizmodo.com/the-nsa-was-going-to-fine-yahoo-250k-a-day-if-it-didnt-1633677548"&gt;coerced&lt;/a&gt; into governmental compliance. No wonder, then, that governments are doing all they can to dismantle IP anonymisers: the &lt;a href="http://arstechnica.com/security/2013/10/nsa-repeatedly-tries-to-unpeel-tor-anonymity-and-spy-on-users-memos-show/"&gt;NSA&lt;/a&gt; and &lt;a href="http://www.itproportal.com/2013/10/04/nsa-and-gchq-repeatedly-tried-infiltrate-tor-documents-reveal/"&gt;GCHQ&lt;/a&gt; have tried to break Tor; the Russian government has &lt;a href="http://www.bloomberg.com/news/2014-07-29/putin-sets-110-000-bounty-for-cracking-tor-as-anonymous-internet-usage-in-russia-surges.html"&gt;offered a reward&lt;/a&gt; to anyone who can.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Far be it from me to defend Tor blindly. There are reports &lt;a href="http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption"&gt;suggesting&lt;/a&gt; that Tor is being &lt;a href="http://news.softpedia.com/news/Tor-Attracts-More-and-More-Cybercriminals-Experts-Warn-430659.shtml"&gt;used by offenders&lt;/a&gt;, and not merely those of the Snowden variety. But governments must recognize the very obvious trust deficit they face, especially after &lt;a href="http://www.statewatch.org/news/2014/may/ep-LIBE-Inquiry-NSA-Surveillance.pdf"&gt;Snowden’s revelations&lt;/a&gt;, and consider the implications of seeking traceability and identity/geolocation for every IP address, in a systematic manner. The implications are for privacy, a right guaranteed by Article 17 of the International Covenant on Civil and Political Rights (ICCPR). Privacy has been &lt;a href="http://www.hrw.org/sites/default/files/related_material/UNGA_upload_0.pdf"&gt;recognized&lt;/a&gt; by the UN General Assembly as applicable in cases of surveillance, interception and data collection, in Pream. §4 of its resolution &lt;i&gt;The Right to Privacy in the Digital Age&lt;/i&gt;. But many states do not have robust privacy protections for individuals and data. And while governments may state the necessity to create international policy to further effective criminal investigations, such an aim cannot be used to nullify or destroy the rights of privacy and free speech guaranteed to individuals. Article 5(1), ICCPR, codifies this principle, when it states that States, groups or persons may not “&lt;i&gt;engage in any activity or perform any act aimed at the destruction of any of the rights and freedoms recognized herein…&lt;/i&gt;”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Erosion of privacy has a chilling effect on free speech [&lt;/span&gt;&lt;i&gt;&lt;a href="http://www.law.cornell.edu/supremecourt/text/376/254"&gt;New York Times v. Sullivan&lt;/a&gt;&lt;/i&gt;&lt;span&gt;, 376 U.S. 254], so free speech suffers too. Particularly with regard to Tor and identification of IP address location and users, anonymity in Internet communications is at issue. At the moment, most states already have anonymity-restrictions, in the form of identification and registration for cybercafés, SIM cards and broadband connections. For instance, Rule 4 of India’s &lt;/span&gt;&lt;a href="http://deity.gov.in/sites/upload_files/dit/files/GSR315E_10511(1).pdf"&gt;Information Technology (Guidelines for Cyber Cafe) Rules, 2011&lt;/a&gt;&lt;span&gt;, mandates that we cannot not use computers in a cybercafé without establishing our identities. But our ITU Draft Resolution seeks to &lt;/span&gt;&lt;i&gt;dismantle&lt;/i&gt;&lt;span&gt; the ability of Internet users to operate anonymously, be they political dissidents, criminals or those merely acting on their expectations of privacy. Such dismantling would be both violative of international human rights law, as well as dangerous for freedom of expression and privacy in principle. Anonymity is integral to democratic discourse, held the US Supreme Court in &lt;/span&gt;&lt;i&gt;&lt;a href="http://www.law.cornell.edu/supct/html/93-986.ZO.html"&gt;McIntyre v. Ohio Elections Commission&lt;/a&gt;&lt;/i&gt;&lt;span&gt; [514 U.S. 334 (1995)].&lt;/span&gt;&lt;a href="#_ftn13"&gt;[13]&lt;/a&gt;&lt;span&gt; Restrictions on Internet anonymity facilitate communications surveillance and have a chilling effect on the free expression of opinions and ideas, &lt;/span&gt;&lt;a href="http://www.ohchr.org/Documents/HRBodies/HRCouncil/RegularSession/Session23/A.HRC.23.40_EN.pdf"&gt;wrote Mr. Frank La Rue&lt;/a&gt;&lt;span&gt;, Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression (¶¶ 48-49).&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So a law or international policy for blanket identification and traceability of IP addresses has grave consequences for and &lt;i&gt;prima facie &lt;/i&gt;violates privacy, anonymity and freedom of speech. But these rights are not absolute, and can be validly restricted. And because these human rights are implicated, the ITU with its lack of expertise in the area may not be the adequate forum for discussion or study.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;To be valid and justified interference, any law, policy or order interfering with privacy and free speech must meet the standards of reasonableness and proportionality, even if national security were the government’s legitimate aim, laid down in Articles 19(3) and 17 of the Covenant on Civil and Political Rights (CCPR) [&lt;/span&gt;&lt;i&gt;&lt;a href="http://www1.umn.edu/humanrts/undocs/html/vws488.htm"&gt;Toonen v. Australia&lt;/a&gt;&lt;/i&gt;&lt;span&gt;, Communication No. 488/1992, U.N. Doc CCPR/C/50/D/488/1992 (1994), ¶6.4]. And as the European Court of Human Rights found in &lt;/span&gt;&lt;i&gt;&lt;a href="http://hudoc.echr.coe.int/sites/eng/pages/search.aspx?i=001-76586"&gt;Weber &amp;amp; Saravia v. Germany&lt;/a&gt;&lt;/i&gt;&lt;span&gt; [Application no. 54934/00, 29 June 2006 (ECHR), ¶95], law or executive procedure that &lt;/span&gt;&lt;i&gt;enables&lt;/i&gt;&lt;span&gt; surveillance without sufficient safeguards is &lt;/span&gt;&lt;i&gt;prima facie&lt;/i&gt;&lt;span&gt; unreasonable and disproportionate. Re: anonymity, in &lt;/span&gt;&lt;i&gt;&lt;a href="http://hudoc.echr.coe.int/sites/eng/pages/search.aspx?i=001-126635"&gt;Delfi AS v. Estonia&lt;/a&gt;&lt;/i&gt;&lt;span&gt; [Application no. 64569/09, 17 February 2014, ¶83], while considering the liability of an Internet portal for offensive anonymous comments, the ECHR has emphasized the importance of balancing freedom of expression and privacy. It relied on certain principles such as “&lt;/span&gt;&lt;i&gt;contribution to a debate of general interest, subject of the report, the content, form and consequences of the publication&lt;/i&gt;&lt;span&gt;” to test the validity of government’s restrictions.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The implications of the suggested text of India’s Draft Resolution should then be carefully thought out. And this is a good thing. For one must wonder why governments need perfect traceability, geolocation and user identification for &lt;i&gt;all&lt;/i&gt; IP addresses. Is such a demand really different from mass or blanket surveillance, in scale and government tracking ability? Would this not tilt the balance of power strongly in favour of governments against individuals (citizens or non-citizens)? This fear must especially arise in the absence of domestic legal protections, both in human rights, and criminal law and procedure. For instance, India’s Information Technology Act, 2000 (amended in 2008) has Section 66A, which criminalizes offensive speech, as well as speech that causes annoyance or inconvenience. Arguably, arrests under Section 66A have been &lt;a href="http://timesofindia.indiatimes.com/city/bangalore/Man-arrested-for-allegedly-sending-offensive-MMS-against-Modi-confirmed-innocent-by-police-released/articleshow/35624351.cms"&gt;arbitrary&lt;/a&gt;, and traceability may give rise to a host of new worries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In any event, IP addresses and users can be discerned under existing domestic law frameworks. Regional Internet Registries (RIR) such as APNIC allocate blocks of IP addresses to either National Internet Registries (NIR – such as IRINN for India) or to ISPs directly. The ISPs then allocate IP addresses dynamically to users like you and me. Identifying information for these ISPs is maintained in the form of &lt;/span&gt;&lt;a href="http://www.irinn.in/whoisSearchform.action"&gt;WHOIS records&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="file://localhost/pub/stats/apnic"&gt;registries&lt;/a&gt;&lt;span&gt; with RIRs or NIRs, and this information is public. ISPs of most countries require identifying information from users before Internet connection is given, i.e., IP addresses allocated (mostly by dynamic allocation, for that is more efficient). ISPs of some states are also regulated; in India, for instance, ISPs require a &lt;/span&gt;&lt;a href="http://www.dot.gov.in/licensing/data-services"&gt;licence&lt;/a&gt;&lt;span&gt; to operate and offer services.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If any government wished, on the basis of some reasonable cause, to identify a particular IP address or its user, then the government could first utilize WHOIS to obtain information about the ISP. Then ISPs may be ordered to release specific IP address locations and user information under executive or judicial order. There are also technical solutions, such as &lt;a href="http://traceroute.monitis.com/"&gt;traceroute&lt;/a&gt; or &lt;a href="http://ip-lookup.net/"&gt;IP look-up&lt;/a&gt; that assist in tracing or identifying IP addresses. Coders, governments and law enforcement must surely be aware of better technology than I.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If we take into account this possibility of geolocation of IP addresses, then the Draft Resolution’s motivation to ‘systematize’ IP address allocations on the basis of states is unclear. I will discuss the implication of this proposal, and that of traffic and address localization, in my next post.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;hr size="1" style="text-align: justify; " width="33%" /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1"&gt;[1]&lt;/a&gt; Pream. §(e), Draft Resolution: “recognizing… that the modern day packet networks, which at present have many security weaknesses, inter alia, camouflaging the identity of originator of the communication”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2"&gt;[2]&lt;/a&gt; Pream. §(h), Draft Resolution: “recognizing… that IP addresses are distributed randomly, that makes the tracing of communication difficult”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3"&gt;[3]&lt;/a&gt; Op. §1, Draft Resolution: “instructs the Secretary General… to collaborate with all stakeholders including International and intergovernmental organizations, involved in IP addresses management to develop an IP address plan from which IP addresses of different countries are easily discernible and coordinate to ensure distribution of IP addresses accordingly”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4"&gt;[4]&lt;/a&gt; Pream. §(g), Draft Resolution: “recognizing… that communication traffic originating and terminating in a country also many times flows outside the boundary of a country making such communication costly and to some extent insecure from national security point of view”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5"&gt;[5]&lt;/a&gt; Pream. §(f), Draft Resolution: “recognizing… that even for local address resolution at times, system has to use resources outside the country which makes such address resolution costly and to some extent insecure from national security perspective”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6"&gt;[6]&lt;/a&gt; Op. §6, Draft Resolution: “instructs the Secretary General… to develop and recommend a routing plan of traffic for optimizing the network resources that could effectively ensure the traceability of communication”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7"&gt;[7]&lt;/a&gt; Op. §1, Draft Resolution; &lt;i&gt;see&lt;/i&gt; note 3.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8"&gt;[8]&lt;/a&gt; Op. §5, Draft Resolution: “instructs the Secretary General… to develop and recommend public telecom network architecture which ensures that effectively the traffic meant for the country, traffic originating and terminating in the country remains within the country”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9"&gt;[9]&lt;/a&gt; Op. §4, Draft Resolution: “instructs the Secretary General… to develop and recommend public telecom network architecture which ensures effectively that address resolution for the traffic meant for the country, traffic originating and terminating in the country/region takes place within the country”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10"&gt;[10]&lt;/a&gt; Context Note to Draft Resolution, ¶3: “Planning and distribution of numbering and naming resources in a systematic, equitable, fair and just manner amongst the Member States…”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11"&gt;[11]&lt;/a&gt; Context Note to Draft Resolution, ¶2: “…there are certain areas that require critical attention to move in the direction of building the necessary “Trust Framework” for the safe “Information Society”, where privacy, safety are ensured”.&lt;/p&gt;
&lt;p style="text-align: left; "&gt;&lt;a href="#_ftnref12"&gt;[12]&lt;/a&gt; &lt;i&gt;See, for instance&lt;/i&gt;, Report of the Office of the High Commission for Human Rights (“OHCHR”), &lt;i&gt;Right to Privacy in the Digital Age&lt;/i&gt;, A/HRC/27/37 (30 June 2014), ¶34-35, &lt;a href="http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf"&gt;http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf&lt;/a&gt;. &lt;i&gt;See esp. &lt;/i&gt;note 30 of the Report, ¶35.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13"&gt;[13]&lt;/a&gt; Many thorny political differences exist between the US and many states (including India and Kenya, who I am told has expressed preliminary support for the Draft Resolution) with regard to Internet governance. Irrespective of this, the US Constitution’s First Amendment and judicial protections to freedom of expression remain a yardstick for many states, including India. India, for instance, has positively referred to the US Supreme Court’s free speech protections in many of its decisions; &lt;i&gt;ex. see&lt;/i&gt; Kharak Singh v. State of Uttar Pradesh, 1963 Cri. L.J. 329; R. Rajagopal v. State of Tamil Nadu, AIR 1995 SC 264.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/good-intentions-going-awry-i-why-india2019s-proposal-at-the-itu-is-troubling-for-internet-freedoms'&gt;https://cis-india.org/internet-governance/blog/good-intentions-going-awry-i-why-india2019s-proposal-at-the-itu-is-troubling-for-internet-freedoms&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cryptography</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Multi-stakeholder</dc:subject>
    
    
        <dc:subject>Anonymity</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    

   <dc:date>2014-11-02T15:13:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/gni-assessment-finds-ict-companies-protect-user-privacy-and-freedom-of-expression">
    <title>GNI Assessment Finds ICT Companies Protect User Privacy and Freedom of Expression</title>
    <link>https://cis-india.org/internet-governance/blog/gni-assessment-finds-ict-companies-protect-user-privacy-and-freedom-of-expression</link>
    <description>
        &lt;b&gt;Elonnai Hickok analyses a public report recently published by GNI on the independent assessment process for Google, Microsoft, and Yahoo. The report finds Google, Microsoft, and Yahoo to be in compliance with the GNI principles on privacy and freedom of expression.&lt;/b&gt;
        &lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In January 2014, the &lt;a href="http://www.globalnetworkinitiative.org/sites/default/files/GNI_-_Principles_1_.pdf"&gt;Global Network Initiative (GNI)&lt;/a&gt; published t&lt;a href="http://globalnetworkinitiative.org/sites/default/files/GNI%20Assessments%20Public%20Report.pdf"&gt;he &lt;i&gt;Public Report on the Independent Assessment Process for Google, Microsoft, and Yahoo&lt;/i&gt;&lt;/a&gt;&lt;i&gt;. &lt;/i&gt;GNI is an industry consortium that was started in 2008 with the objective of protecting user’s right to privacy and freedom of expression globally. The main objectives of GNI are to provide a framework for companies that is based on international standards, ensure accountability of ICT companies through independent assessments, create opportunities for policy engagement, and create opportunities for stakeholders from multiple jurisdictions to engage in dialogue with each other. The Centre for Internet and Society, Bangalore, is a member of GNI. Companies based in India have yet to join as members to the GNI network.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Overview of the Public Report&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Public Report provides an overview of assessments completed on the practices and policies of Google, Yahoo, and Microsoft from 2011 - 2013 to measure company compliance with the &lt;a href="http://www.globalnetworkinitiative.org/sites/default/files/GNI_-_Principles_1_.pdf"&gt;GNI principles&lt;/a&gt; on freedom of expression and privacy. The principles lay out broad guidelines that member companies  should seek to incorporate in their internal and external practices and speak to freedom of expression, privacy, responsible company decision making, multi – stakeholder collaboration, and organizational governance, accountability, and transparency. The GNI principles have also been developed with &lt;a href="https://globalnetworkinitiative.org/sites/default/files/GNI_-_Implementation_Guidelines_1_.pdf"&gt;Implementation Guidelines&lt;/a&gt; to provide companies with a framework for companies to respond to government requests. The assessment carried out by GNI reviewed cases in each company pertaining to governmental: blocking and filtering, takedown requests, criminalization of speech, intermediary liability, selective enforcement, content surveillance, and requests for user information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Importantly, the assessment undertaken by GNI finds Yahoo, Microsoft, and Google to be in compliance with the GNI principles on freedom of expression and privacy. The Report highlights practices by the companies that work to protect freedom of expression and privacy such as conducting human rights impact assessments, issuing transparency reports, and notifying affected users when content is removed, have been, adopted by these companies. For example, Google conducts Human Rights Impact Assessments to assess potential threats to freedom of expression and privacy. Google also has in place internal processes to review governmental requests impacting freedom of expression and privacy, and the legal team at Google prepares a “global removal report” to provide a bird’s eye view of trends emerging from content removal requests. If Google has the email address of a user who’s posted content is removed, Google will often notify the user and directs the user to the Chilling Effects website. Google has also published a transparency report since 2010. Like Google, Microsoft conducts Human Rights Impact Assessments before making decisions on whether to incorporate certain features into its platforms when operating in high risk markets. Microsoft has also issued two global law enforcement requests reports in 2013. Yahoo has established a Business and Human Rights Program to ensure responsible actions are taken by the company with regards to freedom of expression and privacy, and now issues transparency reports about government requests. Yahoo’s Public Policy team also engages in dialogue with governments  on an international level about existing and proposed legislation impacting and implicating privacy and freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Report highlights challenges to compliance with the GNI principles that companies face – namely legal restraints and mandates that they are faced with. On the issue of transparency, the assessment found that companies do not disclose information when there are legal prohibitions on such disclosure, when users privacy would be implicated, when companies choose to assert attorney client privilege, and when trade secrets are involved. Despite this, the assessment found that companies do deny and push back on governmental requests impacting freedom of expression and privacy for reasons such as the request needed clarification and modification, or that the request needed to follow established procedure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A number of findings came out of the assessments undertaken for the Report including:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;As demonstrated by the lack of ability to access information about secret national security requests, and the lack of ability for companies to disclose information on this topic there is a dire need for governments to reform surveillance policy and law impacting freedom of expression and privacy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The implementation of the GNI Principles is challenging when a company is undergoing an acquisition. In this scenario, contractual provisions limiting third party disclosure are critical in ensuring protection of privacy and free expression rights. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Companies need to pro-actively and on an ongoing basis internally review governmental restrictions on content to determine if it is in compliance with the commitment made by that company to the GNI Principles. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The assessment resulted in GNI defining a number of actionable (non-binding) recommendations for companies such as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Improving the integration of human rights considerations in the due diligence process with respect to the acquiring and selling companies. &lt;/li&gt;
&lt;li&gt;Consider the impact of hardware on freedom of expression and privacy.&lt;/li&gt;
&lt;li&gt;Improve external and internal reporting.&lt;/li&gt;
&lt;li&gt;Review employee access to user data to ensure that employee access rights are restricted by both policy and technical measures on a ‘need to know’ basis across global operations. &lt;/li&gt;
&lt;li&gt;Review executive management training.&lt;/li&gt;
&lt;li&gt;Improve stakeholder engagement.&lt;/li&gt;
&lt;li&gt;Improve communication with users. &lt;/li&gt;
&lt;li&gt;Increase sharing of best practices. &lt;/li&gt;
&lt;li&gt;The GNI principles are focused on freedom of expression and privacy and are based on internationally recognized laws and standards for human rights. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;NSA leaks, global push for governmental surveillance reform, and the Public Report&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;With special attention given to the various companies responses to the NSA leaks, the Report notes that in response to the NSA leaks the assessed companies have issued public statements and filed legal challenges with the US government  and filed suit with the FISA Court seeking the right to disclose data relating to the number of FISA requests received with the public. All three companies have also supported legislation and policy that would allow for such transparency. Furthermore in December 2014, the companies , along with other internet companies, developed and issued the five &lt;a href="http://reformgovernmentsurveillance.com/"&gt;Principles on Global Government Surveillance Reform&lt;/a&gt;.  Similar to other efforts to end mass and disproportionate surveillance, such as the &lt;a href="https://en.necessaryandproportionate.org/text"&gt;Necessary and Proportionate&lt;/a&gt; principles, the Principles on Global Government Surveillance Reform address: Limiting Governments’ Authority to Collect Users’ Information, Oversight and Accountability, Transparency about Government Demands, Respecting the Free Flow of Information, Avoiding Conflicts Among Governments. Other companies that signed these principles include AOL, Facebook, LinkedIn, and Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Along these lines, on January 14&lt;sup&gt;th&lt;/sup&gt;, GNI released the statement &lt;a href="http://globalnetworkinitiative.org/news/surveillance-reforms-protect-rights-and-restore-trust"&gt;“Surveillance Reforms to Protect Rights and Restore Trust”, &lt;/a&gt; urging the U.S Government to review and enact surveillance legislation that incorporate a ‘rights based’ approach to issues involving national security. In the statement, GNI specifically recommends the Government to action and: end mass collection of communications metadata, protect and uphold the rights of non-Americans, continue to increase transparency of surveillance practices, support the use of strong encryption standards.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion and way forward&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Looking ahead, GNI is planning on developing and implementing a mechanism to address effectively address consumer engagement and complaints issued by individuals who feel that GNI member companies have not acted consistently with the commitments made as a GNI member. GNI is also looking to expand work around public policy and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Public Report on the Independent Assessment Process for Google, Microsoft, and Yahoo is an important step towards ensuring ICT sector companies are accountable to the public in their practices impacting freedom of expression and privacy. The assessment comes at a time when ICT companies often find themselves stuck between a rock and a hard place – with Governments issuing surveillance and censorship demands with mandates for non-disclosure, and the public demanding transparency, company resistance to such demands from the Government, and a strong commitment to users freedom of expression and privacy. Hopefully, the GNI assessment is and will evolve into a middle ground for ICT companies – where they can be accountable to the public and their customers and compliant with Governmental mandates in all jurisdictions that they operate in. It will be interesting to see if in the future Indian companies join GNI as members and being to adopt the GNI principles and undergo GNI assessments.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/gni-assessment-finds-ict-companies-protect-user-privacy-and-freedom-of-expression'&gt;https://cis-india.org/internet-governance/blog/gni-assessment-finds-ict-companies-protect-user-privacy-and-freedom-of-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-01-20T06:17:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/gni-annual-report.pdf">
    <title>GNI Annual Report</title>
    <link>https://cis-india.org/internet-governance/blog/gni-annual-report.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/gni-annual-report.pdf'&gt;https://cis-india.org/internet-governance/blog/gni-annual-report.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-04-25T07:14:33Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/global-partners-meeting-london">
    <title>Global Partners Meeting @ London</title>
    <link>https://cis-india.org/news/global-partners-meeting-london</link>
    <description>
        &lt;b&gt;Privacy International is organizing the Global Partners Meeting in London from March 22 to 25, 2013. The workshop will be held at the London School of Economics and Political Science. Sunil Abraham and Malavika Jayaram will be participating in this event.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: center; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/global-partners-meeting-london.pdf" class="internal-link"&gt;Click to read the full details published by Privacy International here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The meeting is an opportunity to connect global partners with each other and with researchers, human rights advocates, and privacy and technology experts from over 20 countries. This will provide an opportunity for discussion and debate, that will enrich global research and advocacy agenda for the next two years.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Workshop Overview&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The purpose of the three day workshop is as follows:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;To understand the privacy discourse and identify the challenges faced in advancing the right to privacy across the globe.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To consolidate our network and look for opportunities for collaboration and cross-pollination for research and advocacy initiatives.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To share experiences about research, dissemination and advocacy strategies that influence policy change.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;We envisage this workshop as a launching pad for the work that Privacy International and our global partners will conduct over the next two years under the ambit of the Surveillance and Freedom: Global Understandings and Rights Development (SAFEGUARD) project, funded by the International Development&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Research Centre. The focus of the SAFEGUARD project is to understand what are the threats, challenges and obstacles to, and opportunities for, the protection of privacy in developing countries.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Background to the SAFEGUARD project&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Nowhere are the challenges to, and opportunities for, privacy protections as dynamic and complex as in the developing world. As these countries seek new measures to develop their economies, build social and technological infrastructures, sustain their social systems, and ensure security they need to consider what are the modern policy frameworks they require to ensure a just society. The windows around these policy frameworks are key opportunities for reflection about rights and democratic values, and in the case of this project, the protection of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The vast scope and relevance of the right to privacy in this age of technology gives rise to a myriad of challenges and issues, many of which have relevance across, as well as within, borders. This is particularly the case in the developing world, where South-South collaboration is gaining increasing currency in the development sector, and donor countries continue to contribute to and influence policy in recipient countries, particularly with respect to the adoption of new technologies. Many of the trends in developing countries – communications surveillance, biometrics and DNA databases, and identity cards – mirror those being adopted in the global North. Policy laundering and modelling, such as that witnessed with respect to counter-terrorism policies in the aftermath of 9/11 is taking hold in the context of communications surveillance laws and national ID databases. Such phenomena raise concerns not only as to the spread of practices that threaten to undermine privacy, but also with respect to the stifling of national policy discourses and legislative processes.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conceptual framework&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This projects sets out to isolate and understand the challenges to privacy in the developing world. In order to ensure that the research developed is sufficiently targeted to influence policy debates, we have identified a set of themes that cover the range of privacy-related issues and that together will give a comprehensive picture of the difficult relationship between privacy and technology. This set of themes has been developed in collaboration with our partners, who have identified those discussions around which there is perfect storm of advancing surveillance policies and technologies, poor legal and technical safeguards, and a scarcity of research and understanding. We have designed our conceptual framework accordingly.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: center; "&gt;&lt;img src="https://cis-india.org/PI.png" alt="Human Rights &amp;amp; Privacy Laws" class="image-inline" title="Human Rights &amp;amp; Privacy Laws" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Research questions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The legal and constitutional landscape&lt;/b&gt;: What laws and constitutional provisions exist to protect privacy, how are they implemented and monitored, and where are the legal and policy gaps?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data protection&lt;/b&gt;: What is the state of data protection in partner countries, and what are the local and  regional regulatory standards and good practices?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Communications surveillance&lt;/b&gt;: What communications surveillance regimes are in  place, how are they designed in law and how do they operate in practice?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Adoption of surveillance technologies&lt;/b&gt;: Where are governments buying surveillance technologies, and how are they using them? What legal regimes are in place to establish safeguards over the use of advanced surveillance technologies? What is the state of the art in legal protections?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Political intelligence oversight&lt;/b&gt;: What is the nature and operation of local intelligence services, what oversight mechanisms are in place, and how can these mechanisms be implemented or enforced?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Politics, Identity, sexual and reproductive health and social sorting&lt;/b&gt;: To what the extent do governments misuse personal information to pursue social sorting practices?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Delivery of public services&lt;/b&gt;: What is the state of privacy protections in public service delivery, particularly those related to e-health systems and social protection programmes, and how can protections be improved?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;ID, DNA and biometrics&lt;/b&gt;: What privacy risks are associated with the collection and use of personal information for ID and biometric systems?&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Partners&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;span&gt;Africa&lt;/span&gt;&lt;/th&gt;&lt;th&gt;&lt;span&gt;Latin America&lt;/span&gt;&lt;/th&gt;&lt;th&gt;&lt;span&gt;Asia&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Zimbabwe Human Rights Forum, Zimbabwe&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Kenyan Ethical and Legal Issues Network, Kenya&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Media Institute of Southern Africa, Namibia&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Jonction, Senegal &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Centre for Social Sciences Research, University of Cape Town&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;African Platform for Social Protection, Kenya&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Dejusticia, Columbia&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Asociacion por los Derechos Civiles, Argentina&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Autonomous University of Mexico State, Mexico&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Centro de Tecnologia y Sociedad, Universidad San Andres, Argentina, in collaboration with the Centro de Tecnologica da Escola de Direito da Fundacao Getulio Vargas, Brasil&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Instituto NUPEF, Brazil&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Derechos Digitales, Chile&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;VOICE, Bangladesh&lt;/li&gt;
&lt;li&gt;University of Hong Kong, Hong Kong&lt;/li&gt;
&lt;li&gt;Centre for Internet and Society, India&lt;/li&gt;
&lt;li&gt;Thai Netizen Network, Thailand&lt;/li&gt;
&lt;li&gt;Thai Media Policy Center, Thailand&lt;/li&gt;
&lt;li&gt;Bytes For All, Pakistan&lt;/li&gt;
&lt;li&gt;Centre for Cyber Law Studies, Indonesia&lt;/li&gt;
&lt;li&gt;Foundation for Media Alternatives, Philippines&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Participants&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Ababacar Diop&lt;/li&gt;
&lt;li&gt;Allan Maleche&lt;/li&gt;
&lt;li&gt;Anna Fielder&lt;/li&gt;
&lt;li&gt;Anthony Jackson&lt;/li&gt;
&lt;li&gt;Arthit Suriyawongkul&lt;/li&gt;
&lt;li&gt;Arthur Gwagwa&lt;/li&gt;
&lt;li&gt;Ben Hayes&lt;/li&gt;
&lt;li&gt;Ben Wagner&lt;/li&gt;
&lt;li&gt;Benjamin Barretto&lt;/li&gt;
&lt;li&gt;Carly Nyst&lt;/li&gt;
&lt;li&gt;Carolin Moeller&lt;/li&gt;
&lt;li&gt;Charles Dhewa&lt;/li&gt;
&lt;li&gt;Claudio Ruiz&lt;/li&gt;
&lt;li&gt;Clement Chen&lt;/li&gt;
&lt;li&gt;Danilo Doneda&lt;/li&gt;
&lt;li&gt;Eric King&lt;/li&gt;
&lt;li&gt;Farjana Akter&lt;/li&gt;
&lt;li&gt;Fieke Jansen&lt;/li&gt;
&lt;li&gt;Graciela Sulamein&lt;/li&gt;
&lt;li&gt;Gus Hosein&lt;/li&gt;
&lt;li&gt;Helen Wallace&lt;/li&gt;
&lt;li&gt;Juan Camilo Rivera&lt;/li&gt;
&lt;li&gt;Karelle Dagon&lt;/li&gt;
&lt;li&gt;Katitza Rodriguez&lt;/li&gt;
&lt;li&gt;Kevin Donovan&lt;/li&gt;
&lt;li&gt;Levinson Kabwato&lt;/li&gt;
&lt;li&gt;Malavika Jayaram&lt;/li&gt;
&lt;li&gt;Mathias Vermeulen&lt;/li&gt;
&lt;li&gt;Michael Rispoli&lt;/li&gt;
&lt;li&gt;Nelson Arteaga Botello&lt;/li&gt;
&lt;li&gt;Pablo Palazzi&lt;/li&gt;
&lt;li&gt;Pirongrong Ramasoota&lt;/li&gt;
&lt;li&gt;Ramiro Alvarez Ugarte&lt;/li&gt;
&lt;li&gt;Richie Tynan&lt;/li&gt;
&lt;li&gt;Sam Smith&lt;/li&gt;
&lt;li&gt;Sinta Dewi Rosadi&lt;/li&gt;
&lt;li&gt;Shahzad Ahmed&lt;/li&gt;
&lt;li&gt;Sinta Dewi Rosadi&lt;/li&gt;
&lt;li&gt;Sunil Abraham&lt;/li&gt;
&lt;li&gt;Stephanie Perrin&lt;/li&gt;
&lt;li&gt;Tavengwa Nhongo&lt;/li&gt;
&lt;li&gt;Vera Franz&lt;/li&gt;
&lt;li&gt;Vicky Nida&lt;/li&gt;
&lt;li&gt;Vivian Newman Pont&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Agenda&lt;/h2&gt;
&lt;h3&gt;Friday, March 22, 2013: Reception&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Meet with Privacy International staff members and advisors, and workshop participants from more than 20 countries in Latin America, Asia, Africa, Europe and Central Asia. Food and drinks will be provided.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Time: 6.00 p.m.&lt;br /&gt;Location: 2nd Floor, 46 Bedford Row, London WC1R 4LR&lt;br /&gt;Contact: 0207 242 2836&lt;br /&gt;Getting there: Our office is a short walk 10 minute from your hotel. See &lt;b&gt;Map 1&lt;/b&gt; below for directions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Saturday, March 23, 2013: Day 1 (Objectives and Reviewing the Landscape)&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;10:00 a.m. - Welcome Breakfast: Setting The Scene&lt;/b&gt;&lt;br /&gt;Location: Mercure London Bloomsbury restaurant&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Welcome and introduction&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Overview of PI’s work in developing countries&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Participant introductions&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Setting the agenda&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12:30 p.m. - Session 1: Reviewing The Landscape&lt;br /&gt;&lt;/b&gt;Location: Old Building, Room 3.21, London School of Economics and Political Science, Houghton Street, London WC2A 2AE&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mapping privacy in constitutions&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Masterclass 1: communications surveillance laws around the world&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Break-out groups on assigned topics, and reporting back&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;2:30 p.m. - Afternoon tea&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Privacy quiz&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Masterclass 2: SIM card registration&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Building a network: how can PI facilitate your work?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Masterclass 3: Oversight of intelligence agencies&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;6:00 p.m. - Drinks&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;7:00 p.m. - Dinner&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Location: Tohbang, 164 Clerkenwell Road&lt;br /&gt;&lt;a class="external-link" href="http://www.tohbang.com/sub_eng/main.php"&gt;http://www.tohbang.com/sub_eng/main.php&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Sunday, March 24: Day 2 (Research Topics and Strategies)&lt;/h3&gt;
&lt;p&gt;Location: Old Building, Room 3.21, London School of Economics and Political Science, Houghton Street, London WC2A 2AE&lt;/p&gt;
&lt;p&gt;&lt;b&gt;10:00 a.m. - Recap of day one&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Masterclass 4 - The UN Universal Periodic Review&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Open-space - research and policy priorities&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;br /&gt;1:00 p.m. - Lunch&lt;br /&gt;&lt;/b&gt;Location: Ship Tavern, Holborn&lt;/p&gt;
&lt;p&gt;&lt;b&gt;2:30 p.m. - Reconvene&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Open space - research, dissemination and communication strategies&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Wrapping up and going forward&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;6:00 p.m. - Dinner&lt;br /&gt;&lt;/b&gt;Location: Wahaca, Charlotte St, &lt;a class="external-link" href="http://www.wahaca.co.uk/"&gt;http://www.wahaca.co.uk/&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/global-partners-meeting-london'&gt;https://cis-india.org/news/global-partners-meeting-london&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-03-20T06:37:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/global-partners-meeting-london.pdf">
    <title>Global Partners Meeting - Agenda and Info</title>
    <link>https://cis-india.org/internet-governance/blog/global-partners-meeting-london.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/global-partners-meeting-london.pdf'&gt;https://cis-india.org/internet-governance/blog/global-partners-meeting-london.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-03-20T06:25:09Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
