<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 841 to 855.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/cyber-dialogue-conference-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/curating-genderlog-indias-twitter-handle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cryptoparty-delhi-flyer"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cryptoparty-bangalore-flyer"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/caravan-magazine-august-1-2013-rahul-m-crypto-night"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/aadhaar-bill-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/reuters-february-13-2018-rahul-bhatia-critics-of-indias-id-card-project-say-they-have-been-harassed-put-under-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/critical-look-at-visual-representation-of-cybersecurity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/identity-crisis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/creativity-politics-and-internet-censorship-20160525"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cpdp-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/cpc-gathering-agenda.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-october-18-2012-surabhi-agarwal-courts-approval-needed-to-tap-phones"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/counter-surveillance.pdf"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/cyber-dialogue-conference-2014">
    <title>Cyber Dialogue Conference 2014</title>
    <link>https://cis-india.org/news/cyber-dialogue-conference-2014</link>
    <description>
        &lt;b&gt;The Cyber Dialogue conference, presented by the Canada Centre for Global Security Studies at the Munk School of Global Affairs, University of Toronto, will convene an influential mix of global leaders from government, civil society, academia and private enterprise to participate in a series of facilitated public plenary conversations and working groups around cyberspace security and governance.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Malavika Jayaram is &lt;a class="external-link" href="http://www.cyberdialogue.ca/2014-participants/"&gt;participating in this event&lt;/a&gt; being held on March 30 and 31, 2014. Full event &lt;a class="external-link" href="http://www.cyberdialogue.ca/"&gt;details here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h2 style="text-align: justify; "&gt;After Snowden, Whither Internet Freedom?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A recent stream of documents leaked by former NSA contractor Edward Snowden has shed light on an otherwise highly secretive world of cyber surveillance. Among the revelations — which include details on mass domestic intercepts and covert efforts to shape and weaken global encryption standards — perhaps the most important for the future of global cyberspace are those concerning the way the U.S. government compelled the secret cooperation of American telecommunications, Internet, and social media companies with signals intelligence programs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For American citizens, the NSA story has touched off soul-searching discussions about the legality of mass surveillance programs, whether they violate the Fourth and Fifth Amendments of the U.S. Constitution, and whether proper oversight and accountability exist to protect American citizens' rights. But for the rest of the world, they lay bare an enormous “homefield advantage” enjoyed by the United States — a function of the fact that AT&amp;amp;T, Verizon, Google, Facebook, Twitter, Yahoo!, and many other brand name giants are headquartered in the United States.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prior to the Snowden revelations, global governance of cyberspace was already at a breaking point. The vast majority of Internet users — now and into the future — are coming from the world’s global South, from regions like Africa, Asia, Latin America, and the Middle East. Of the six billion mobile phones on the planet, four billion of them are already located in the developing world. Notably, many of the fastest rates of connectivity to cyberspace are among the world’s most fragile states and/or autocratic regimes, or in countries where religion plays a major role in public life. Meanwhile, countries like Russia, China, Saudi Arabia, Indonesia, India, and others have been pushing for greater sovereign controls in cyberspace. While a US-led alliance of countries, known as the Freedom Online Coalition, was able to resist these pressures at the Dubai ITU summit and other forums like it, the Snowden revelations will certainly call into question the sincerity of this coalition. Already some world leaders, such as Brazil’s President Rousseff, have argued for a reordering of governance of global cyberspace away from U.S. controls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the fourth annual Cyber Dialogue, we are inviting a selected group of participants to address the question, “After Snowden, Whither Internet Freedom?” What are the likely reactions to the Snowden revelations going to be among countries of the global South? How will the Freedom Online Coalition respond? What is the future of the “multi-stakeholder” model of Internet governance? Does the “Internet Freedom” agenda still carry any legitimacy? What do we know about “other NSA’s” out there? What are the likely implications for rights, security, and openness in cyberspace of post-Snowden nationalization efforts, like those of Brazil’s?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As in previous Cyber Dialogues, participants will be drawn from a cross-section of government (including law enforcement, defence, and intelligence), the private sector, and civil society. In order to canvass worldwide reaction to the Snowden revelations, this year’s Cyber Dialogue will include an emphasis on thought leaders from the global South, including Africa, Asia, Latin America, and the Middle East.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/cyber-dialogue-conference-2014'&gt;https://cis-india.org/news/cyber-dialogue-conference-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-08T05:09:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/curating-genderlog-indias-twitter-handle">
    <title>Curating Genderlog India's Twitter handle</title>
    <link>https://cis-india.org/internet-governance/news/curating-genderlog-indias-twitter-handle</link>
    <description>
        &lt;b&gt;Shweta Mohandas has been nominated to curate Genderlog's Twitter handle (@genderlogindia).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Shweta Mohandas &lt;span&gt;will be tweeting about topics related to gender and data, more specifically around AI, big data, privacy and surveillance. To view the tweets, &lt;a class="external-link" href="https://twitter.com/genderlogindia/status/1127892055231873024"&gt;click here&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/curating-genderlog-indias-twitter-handle'&gt;https://cis-india.org/internet-governance/news/curating-genderlog-indias-twitter-handle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-05-14T14:40:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cryptoparty-delhi-flyer">
    <title>Cryptoparty Delhi Flyer</title>
    <link>https://cis-india.org/internet-governance/cryptoparty-delhi-flyer</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cryptoparty-delhi-flyer'&gt;https://cis-india.org/internet-governance/cryptoparty-delhi-flyer&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bernadette</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-06-21T11:53:44Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cryptoparty-bangalore-flyer">
    <title>Cryptoparty bangalore flyer</title>
    <link>https://cis-india.org/internet-governance/cryptoparty-bangalore-flyer</link>
    <description>
        &lt;b&gt;invitation / flyer for cryptoparty bangalore july&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cryptoparty-bangalore-flyer'&gt;https://cis-india.org/internet-governance/cryptoparty-bangalore-flyer&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bernadette</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-06-21T11:53:58Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/caravan-magazine-august-1-2013-rahul-m-crypto-night">
    <title>Crypto Night</title>
    <link>https://cis-india.org/news/caravan-magazine-august-1-2013-rahul-m-crypto-night</link>
    <description>
        &lt;b&gt;Challenging government snooping at an all-night cryptography party.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Rahul M was &lt;a class="external-link" href="http://caravanmagazine.in/lede/crypto-night"&gt;published in the Caravan&lt;/a&gt; on August 1, 2013. Pranesh Prakash and Bernadette Langle are quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Satyakam Goswami sat in a conference hall in the Institute of Informatics &amp;amp; Communication in Delhi University's South  Campus, furiously typing code into his laptop. He typed the string  “/var/log/tor#”, into a Linux terminal, then turned to me and said, “I  am one step away, man.” It was around midnight on a muggy July Saturday,  and Goswami had been here for six hours. He resumed typing—and cursing  under his breath in Telugu as he realised that the online instructions  he was following weren’t helping.&lt;/p&gt;
&lt;div id="stcpDiv" style="text-align: justify; "&gt;
&lt;p&gt;Around  him, the room bustled with the activity of around 25 other people, all  participants at a Cryptoparty, a cryptography event at which programmers  and non-programmers meet to share information and expertise on tools  that can help thwart government spying.&lt;/p&gt;
&lt;p&gt;Goswami was one of the organisers of the event, which was led by  Bernadette Längle, a German ‘hacktivist’ who is a member of  the Chaos  Computer Club (CCC), Europe’s largest association of hackers. Längle was  one of the organisers of the CCC’s Chaos Communication Congress in  2012, an international hackers’ meet held in Hamburg that year. While  processing participant applications for the Congress, she came across a  group that wanted to organise what they called a “Cryptoparty” at the  meet. “I thought Cryptoparty would be a bunch of guys coming together,  learning crypto and having a party,” she told me. Only at the event did  she realise that Cryptoparties are rather more political affairs, at  which participants experiment with ways of combating governmental  intrusions into privacy and freedom.&lt;/p&gt;
&lt;p&gt;After she graduated, Längle decided she wanted to travel. “I hadn’t  been to America or Asia, and I don’t think I want to enter America,” she  said. “I thought India might be a good point to start.” While she was  exploring her options, she met Goswami online. “I first met Bernadette  on an IRC channel, ‘hasgeek’, where she expressed her interest to come  to India,” Goswami said. “I suggested that she write a proposal to CIS  [the Centre for Internet and Society, in Bangalore].” Längle applied,  and was accepted to work with the organisation for six months.&lt;/p&gt;
&lt;p&gt;When Längle was teaching a one-week course on email cryptography at a  CIS event, a participant suggested to her that she organise a  Cryptoparty in the city. “I thought I was travelling anyway, and I can  make a Cryptoparty everywhere I go,” Längle said. This led to the  Bangalore Cryptoparty on 30 June, followed by the Delhi edition on 6  July. Längle then held a Cryptoparty in Dharamsala in the second week of  July, and plans to hold another in Mumbai in October. At each of these,  she gave tutorials on specific aspects of cryptography, such as the  Pretty Good Privacy (PGP) encryption and decryption program, which  Edward Snowden used to communicate with &lt;i&gt;The Guardian&lt;/i&gt;’s Glenn  Greenwald during their now-famous collaboration. Participants would then  experiment with these tools, sending emails and messages to each other  using secure channels. The Delhi edition, which saw around 70  participants, continued late into the night, with the last exhausted  stragglers shutting off their gadgets and heading home at 4 am.&lt;/p&gt;
&lt;p&gt;I met Längle again the day after the Delhi event; with her was  Pranesh Prakash, policy director at CIS, who is a commentator on issues  related to surveillance and privacy. Both agreed that the Indian  government’s Central Monitoring System programme, as well as Edward  Snowden’s recent leaks, had resulted in a greater interest in  cryptography in the country in recent months. “Without the PRISM stuff,  there wouldn’t have been so many people attending,” Längle said. “People  are concerned about that.” Prakash believes that the NSA leaks have  served as a loud wake-up call about a longstanding state of affairs.  “It’s this I-told-you-so moment for lots of people right now,” he said.  “This isn’t the first time there have been revelations about the NSA  spying beyond their authority. These revelations have been happening at  least since 2006.”&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/caravan-magazine-august-1-2013-rahul-m-crypto-night'&gt;https://cis-india.org/news/caravan-magazine-august-1-2013-rahul-m-crypto-night&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-06T06:04:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/aadhaar-bill-2016">
    <title>Critique of the Aadhaar Bill 2016</title>
    <link>https://cis-india.org/aadhaar-bill-2016</link>
    <description>
        &lt;b&gt;The Lok Sabha passed the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016 on March 11, 2016, to give legislative basis to the Aadhaar number assigning being done by the Unique Identification Authority of India (UIDAI). The Bill was introduced, by Finance Minister, Mr. Arun Jaitley, as a money bill, and there was no public consultation to evaluate the provisions therein even though there are very serious ramifications for the Right to Privacy and the Right to Association and Assembly. Since its inception in 2009, the UIDAI project has been shrouded in controversy due to various questions raised about privacy, technological limitations, security concerns,  and legal basis. We have documented various concerns with the Aadhaar Bill 2016, as well as with the project at large. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;About the Aadhaar Bill 2016&lt;/h2&gt;
&lt;h4&gt;&lt;a href="http://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq" target="_blank"&gt;FAQ on the Aadhaar Project and the Bill&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;This FAQ attempts to address the key questions regarding the Aadhaar/UIDAI project and the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. We will continue to add questions to this list, and edit/expand the answers, based on our ongoing research.&lt;/p&gt;
&lt;h4&gt;&lt;a href="http://cis-india.org/internet-governance/blog/the-new-aadhaar-bill-in-plain-english" target="_blank"&gt;The New Aadhaar Bill in Plain English&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;This post summarizes the provisions of Aadhaar Bill 2016 in a simplified language.&lt;/p&gt;
&lt;h4&gt;&lt;a href="http://cis-india.github.io/aadhaar-bill-2016/" target="_blank"&gt;What's New in the Aadhaar Bill 2016?&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;Simple comparison of the texts of the The National Identification Authority of India Bill, 2010 and The Aadhaar (Targeted Delivery of Financial and other Subsidies, Benefits and Services) Bill, 2016.&lt;/p&gt;
&lt;h4&gt;&lt;a href="http://cis-india.org/internet-governance/blog/a-comparison-of-the-2016-aadhaar-bill-and-the-2010-nidai-bill" target="_blank"&gt;Comparison of the Aadhaar Bill 2016 and the NIAI Bill 2010&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;A detailed provision-by-provision comparison of the Bills.&lt;/p&gt;
&lt;h4&gt;&lt;a href="http://cis-india.org/internet-governance/salient-points-in-the-aadhaar-bill-and-concerns" target="_blank"&gt;Salient Points in the Aadhaar Bill and Concerns&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;This post contributes to the growing body of analysis and critique of the Aadhaar Bill 2016, and foregrounds the major concerns identified by CIS with the Bill.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Public Statements and Letters&lt;/h2&gt;
&lt;h4&gt;&lt;a href="http://goo.gl/forms/hw4huFcc4b" target="_blank"&gt;An Urgent Need for the Right to Privacy&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;Along with a group of individuals and organisations from academia and civil society, we have drafted and are signatories to an open letter addressed to the Union government and urging the same to "urgently take steps to uphold the constitutional basis to the right to privacy and fulfil it’s constitutional and international obligations." Here we publish the text of the open letter. Please follow the link below to support it by joining the signatories.&lt;/p&gt;
&lt;h4&gt;&lt;a href="http://cis-india.org/internet-governance/blog/list-of-recommendations-on-the-aadhaar-bill-2016" target="_blank"&gt;List of Recommendations on the Aadhaar Bill, 2016 - Letter Submitted to the Members of Parliament&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;On Friday, March 11, the Aadhaar Bill, 2016, was introduced and passed as a money bill and there was no public consultation to evaluate the provisions therein even though there are very serious ramifications for the Right to Privacy and the Right to Association and Assembly. Based on these concerns, and numerous others, we submitted an initial list of recommendations to the Members of Parliaments to highlight the aspects of the Bill that require immediate attention.&lt;/p&gt;
&lt;h4&gt;&lt;a href="http://cis-india.org/internet-governance/blog/press-release-aadhaar-15032016-the-new-bill-makes-aadhaar-compulsory" target="_blank"&gt;Press Release, March 15, 2016: The New Bill Makes Aadhaar Compulsory!&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;We published and circulated the following press release on March 15, 2016, to highlight the fact that the Section 7 of the Aadhaar Bill, 2016 states that authentication of the person using her/his Aadhaar number can be made mandatory for the purpose of disbursement of government subsidies, benefits, and services; and in case the person does not have an Aadhaar number, s/he will have to apply for Aadhaar enrolment.&lt;/p&gt;
&lt;h4&gt;&lt;a href="http://cis-india.org/internet-governance/blog/press-release-aadhaar-11032016-the-law-cannot-fix-what-technology-has-broken" target="_blank"&gt;Press Release, March 11, 2016: The Law cannot Fix what Technology has Broken!&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;We published and circulated the following press release on March 11, 2016, as the Lok Sabha passed the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. This Bill was proposed by finance minister, Mr. Arun Jaitley to give legislative backing to Aadhaar, being implemented by the Unique Identification Authority of India (UIDAI).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Infographics&lt;/h2&gt;
&lt;h4&gt;&lt;a href="http://cis-india.org/internet-governance/blog/can-the-aadhaar-act-2016-be-classified-as-a-money-bill" target="_blank"&gt;Can the Aadhaar Act 2016 be Classified as a Money Bill?&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt; In this infographic, we show if the Aadhaar Act 2016, recently tabled in and passed by the Lok Sabha as a money bill, can be classified as a money bill. The infographic is designed by Pooja Saxena, based on information compiled by Amber Sinha and Sumandro Chattapadhyay.&lt;/p&gt;
&lt;h4&gt;&lt;a href="http://cis-india.org/internet-governance/blog/can-matters-dealt-with-in-aadhaar-act-be-objects-of-money-bill" target="_blank"&gt;Can the Matters Dealt with in the Aadhaar Act be the Objects of a Money Bill?&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt; In this infographic, we highlight the matters dealt with in the Aadhaar Act 2016, recently tabled in and passed by the Lok Sabha as a money bill, and consider if these can be objects of a money bill. The infographic is designed by Pooja Saxena, based on information compiled by Sumandro Chattapadhyay and Amber Sinha.&lt;/p&gt;
&lt;h4&gt;&lt;a href="http://cis-india.org/internet-governance/blog/vulnerabilities-in-the-uidai-implementation-not-addressed-by-the-aadhaar-bill-2016" target="_blank"&gt;Vulnerabilities in the UIDAI Implementation Not Addressed by the Aadhaar Bill, 2016 &lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;In this infographic, we document the various issues in the Aadhaar enrolment process implemented by the UIDAI, and highlight the vulnerabilities that the Aadhaar Bill, 2016 does not address.&lt;/p&gt;
&lt;h4&gt;&lt;a href="http://cis-india.org/internet-governance/aadhaar-bill-2016-evaluated-against-the-national-privacy-principles" target="_blank"&gt;Aadhaar Bill 2016 Evaluated against the National Privacy Principles&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;In this infographic, we evaluate the privacy provisions of the Aadhaar Bill 2016 against the national privacy principles developed by the Group of Experts on Privacy led by the Former Chief Justice A.P. Shah in 2012.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Legal Critique of the Aadhaar Bill 2016&lt;/h2&gt;
&lt;h4&gt;&lt;a href="http://cis-india.org/internet-governance/blog/analysis-of-aadhaar-act-in-context-of-shah-committee-principles"&gt;Analysis of Aadhaar Act in the Context of A.P. Shah Committee Principles&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;In October 2012, the Group of Experts on Privacy constituted by the Planning Commission under the chairmanship of Justice AP Shah Committee submitted its report which listed nine principles of privacy which all legislations, especially those dealing with personal should adhere to. In this paper, we shall discuss how the Aadhaar Act fares vis-à-vis these nine principles.&lt;/p&gt;
&lt;h4&gt;&lt;a href="http://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india"&gt;Aadhaar Act and its Non-compliance with Data Protection Law in India&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;This post compares the provisions of the Aadhaar Act, 2016, with India's data protection regime as articulated in the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.&lt;/p&gt;
&lt;h4&gt;&lt;a href="http://thewire.in/2016/03/10/aadhaar-bill-fails-to-incorporate-standing-committees-suggestions-24433/" target="_blank"&gt;Aadhaar Bill Fails to Incorporate Suggestions by the Standing Committee&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;An analysis of how recommendations made by the Standing Committee on UID were not incorporated in the Aadhaar Bill 2016.&lt;/p&gt;
&lt;h4&gt;&lt;a href="http://www.livemint.com/Politics/l0H1RQZEM8EmPlRFwRc26H/Govt-narrative-on-Aadhaar-has-not-changed-in-the-last-six-ye.html" target="_blank"&gt;Govt Narrative on Aadhaar has Not Changed in the Last Six Years: Sunil Abraham&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;In this article, Sunil Abraham says that bill is fundamentally the same as the UPA version, with some cosmetic changes, and some token statements towards the "right to privacy."&lt;/p&gt;
&lt;h4&gt;&lt;a href="http://www.hindustantimes.com/india/privacy-concerns-overshadow-monetary-benefits-of-aadhaar-scheme/story-E3o0HRwc6XOdlgjqgmmyAM.html" target="_blank"&gt;Privacy Concerns Overshadow Monetary Benefits of Aadhaar Scheme&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;Amber Sinha and Pranesh Prakash discuss how the privacy concerns remain, and are reinforced through loopholes, in the Aadhaar Bill 2016.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Technical Critique of the Aadhaar / UIDAI Project&lt;/h2&gt;
&lt;h4&gt;&lt;a href="http://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process" target="_blank"&gt;Flaws in the UIDAI Process&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;The accuracy of biometric identification depends on the chance of a false positive: the probability that the 
identifiers of two persons will match. An experiment performed at an early stage of the programme has allowed us to estimate the chance of a false positive. For the current population of 1.2 billion the expected proportion of duplicands is 1/121, a ratio which is far too high.&lt;/p&gt;
&lt;h4&gt;&lt;a href="http://www.business-standard.com/article/opinion/aadhaar-is-actually-surveillance-tech-sunil-abraham-116031200790_1.html" target="_blank"&gt;Aadhaar is Actually Surveillance Tech: Sunil Abraham&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;In this interview, Sunil Abraham argues that the concept of Aadhaar is fundamentally flawed, and it doesn't substantially help in plugging leakages in government schemes.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;&lt;a target="_blank"&gt;&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/aadhaar-bill-2016'&gt;https://cis-india.org/aadhaar-bill-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha, Elonnai Hickok, Sumandro Chattapadhyay, Vanya Rakesh, and Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-05-02T04:49:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/reuters-february-13-2018-rahul-bhatia-critics-of-indias-id-card-project-say-they-have-been-harassed-put-under-surveillance">
    <title>Critics of India's ID card project say they have been harassed, put under surveillance</title>
    <link>https://cis-india.org/internet-governance/news/reuters-february-13-2018-rahul-bhatia-critics-of-indias-id-card-project-say-they-have-been-harassed-put-under-surveillance</link>
    <description>
        &lt;b&gt;Researchers and journalists who have identified loopholes in India’s massive national identity card project have said they have been slapped with criminal cases or harassed by government agencies because of their work.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published by &lt;a class="external-link" href="https://www.reuters.com/article/us-india-aadhaar-breach/critics-of-indias-id-card-project-say-they-have-been-harassed-put-under-surveillance-idUSKBN1FX0H0"&gt;Reuters&lt;/a&gt; on February 13, 2018. &lt;span&gt;Reporting by Rahul Bhatia; Editing by Raju Gopalakrishnan&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last month, the Unique Identification Authority of India (UIDAI), the semi-government body responsible for the national identity project, called Aadhaar, or “Basis”, filed a criminal case against the Tribune newspaper for publishing a story that said access to the card’s database could be bought for 500 rupees ($7.82).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reuters spoke to eight additional researchers, activists and journalists who have complained of being harassed after writing about Aadhaar. They said UIDAI and other government agencies were extremely sensitive to criticism of the Aadhaar programme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar is a biometric identification card that is becoming integral to the digitisation of India’s economy, with over 1.1 billion users and the world’s biggest database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indians have been asked to furnish their Aadhaar numbers for a host of transactions including accessing bank accounts, paying taxes, receiving subsidies, acquiring a mobile number, settling a property deal and registering a marriage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Tribune said one of its reporters purchased access to a portal that could provide data linked to any Aadhaar cardholder.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI complaint, filed with the police cyber cell in the capital, New Delhi, accused the newspaper, the reporter, and others of cheating by impersonation, forgery and unauthorised access to a computer network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Media associations sharply criticised the action - the Editors Guild of India said UIDAI’s move was “clearly meant to browbeat a journalist whose story was of great public interest. It is unfair, unjustified and a direct attack on the freedom of the press.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In response, the agency said “an impression was being created in media that UIDAI is targeting the media or whistleblowers or shooting the messenger.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“That is not at all true. It is for the act of unauthorised access, criminal proceedings have been launched,” it said in a statement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Osama Manzar, the director of the Digital Empowerment Foundation, a New Delhi-based NGO, called the government’s prickliness “a clear sign that rather than it wanting to learn how to make Aadhaar a tool of empowerment, it actually wants to use it as a coercive tool of disempowerment”.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Leakage&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Last May, the Centre for Internet and Society (CIS), an independent Indian advocacy group, published a report that government websites had inadvertently leaked several million identification numbers from the project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI sent the CIS a legal notice within days, said Srinivas Kodali, one of the authors of the report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The notice alleged that some of the data cited in the report would only be available if the site had been accessed illegally. The UIDAI wrote that the people involved had to be “brought to justice.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Kodali, two more notices followed, addressed to the group’s directors and two researchers, containing more accusations. “They said it was a criminal conspiracy, and demanded that we send individual responses,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS then received questions about its funding from the home ministry section that grants NGOs permission to receive foreign funding, said a source in the group who saw the letter. CIS viewed this as a threat to its funding, the source said. CIS declined to comment on the notices or on the questions about funding.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI did not reply to multiple e-mails seeking comment on the accusations about CIS and similar complaints by other activists and journalists, and officials could not be reached by phone. Officials at the Ministry of Information Technology that supervises UIDAI were unreachable by phone.&lt;br /&gt;In a column in the Economic Times newspaper in January, Ajay Pandey, the head of the UIDAI, wrote: “The data of all Aadhaar holders is safe and secure. One should not believe rumours or claims made on its so-called ‘breach’.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;R.S. Sharma, the head of India’s telecom regulatory body, said there was an “orchestrated campaign” against Aadhaar as it was against the interests of those who operated in the shadow economy with fictitious names, or were skimming off subsidies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is going to clean up many systems,” Sharma told a television channel last month. “That’s probably one of the reasons why people realise that this is now becoming too difficult or too dangerous for them.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;That trip to Turkey&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A Bangalore researcher who contributed to the CIS report said scrutiny by police and government officials was a common occurrence, but harassment was stepped up after it was published.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Sometimes people from the police station visit you. Other times from the Home Ministry. It was intimidating,” the researcher said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The person, who asked not to be named for fear of reprisal, said police officers asked questions like “How was that trip to Turkey?',” to make it clear the subjects were under surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When Sameer Kochhar, a social scientist and author of books on Aadhaar, demonstrated how the system’s biometrics safeguards could be bypassed last year, UIDAI filed a police report in New Delhi, a person familiar with the matter said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Subsequently, Kochhar received at least three notices from the Delhi Police alleging that he had violated 14 sections under three separate laws, the person said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kochhar’s lawyer declined comment. Delhi Police officials declined comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Critics have warned Aadhaar could be used as an instrument of state surveillance while data security and privacy regulations are still to be framed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Former central bank governor Raghuram Rajan said last month that the government needed to prove it would protect the privacy of Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I do think that we have to assure the public that their data is safe,” Rajan said. “All these reports about easy availability of data are worrying and we have to ensure security. We cannot just say trust us, trust us, it’s all secure.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/reuters-february-13-2018-rahul-bhatia-critics-of-indias-id-card-project-say-they-have-been-harassed-put-under-surveillance'&gt;https://cis-india.org/internet-governance/news/reuters-february-13-2018-rahul-bhatia-critics-of-indias-id-card-project-say-they-have-been-harassed-put-under-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2018-02-24T07:50:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/critical-look-at-visual-representation-of-cybersecurity">
    <title>Critical Look at Visual Representation of Cybersecurity</title>
    <link>https://cis-india.org/internet-governance/files/critical-look-at-visual-representation-of-cybersecurity</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/critical-look-at-visual-representation-of-cybersecurity'&gt;https://cis-india.org/internet-governance/files/critical-look-at-visual-representation-of-cybersecurity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-08-21T07:58:07Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/identity-crisis">
    <title>Crisis for identity or identity crisis?</title>
    <link>https://cis-india.org/news/identity-crisis</link>
    <description>
        &lt;b&gt;The hurry with which the government is pushing its most ambitious project to assign a number (UID) to every citizen without any feasibility study or public debate has raised many questions.




&lt;/b&gt;
        
&lt;p&gt;“It will empower all”, declared Prime Minister Manmohan Singh when he issued the first UID card to a villager from Tembhli village in Maharashtra. But as days pass and relevant issues come for public discourse, many people have begun to doubt prime minister’s assurance.&lt;/p&gt;
&lt;p&gt;Unique identification number (UID), named Aadhaar is a 12 digit identification number that the government plans to issue to all citizens that will not only be an identity card but will also serve multiple purposes for its holder.&lt;/p&gt;
&lt;p&gt;Infosys co-founder Nandan Nilekani has been assigned the responsibility to execute this proposal as Chairman of the Unique Identification Authority of India (UIDAI). Mr Nilekani leads a team of 120 people having the task of assigning unique identities to 1.2 billion people. He plans to take Aadhaar beyond being just a 12-digit identification number for every Indian. This ambitious and mammoth project is pitched to handle projects as diverse as a national-highway toll-collection system, a technology backbone for the forthcoming Goods and Services Tax (GST) and reform of the vast public distribution system (PDS) for subsidized foodgrains.&lt;/p&gt;
&lt;p&gt;Government plans to cover 60 per cent of the nation’s population under this project in the next three years starting October this year. This project is intended to collect identification data about all residents in the country. It is said that it will impact the PDS and NREGA programmes, and plug leakages and save the government large sums of money.&lt;/p&gt;
&lt;p&gt;But the UID will not replace ration cards and passports, and is not mandatory as of now. No questions would be asked related to language, caste or religion of the person applying for UID.&lt;/p&gt;
&lt;p&gt;The UID number is linked to the fingerprints and the pattern of the eyes of the person assigned that number. This inimitable biometric data ensures that any given number is linked to only one person. So there is hardly a chance of any misgiving or stealing of rations and wages from the holder. It is believed that soon banks, insurance companies, cell phone providers and hospitals will demand UID number before doing business with you.&lt;/p&gt;
&lt;p&gt;In short, in the future our name, address, bank account numbers, personal information and identity as a whole will be solely linked and governed by those 12 digit number we hold.&lt;/p&gt;
&lt;div class="pullquote"&gt;Critics say that there has been no feasible study conducted about UID project, neither has there been a cost benefit analysis done. To add to it, there are serious concerns about data and identity theft.&lt;/div&gt;
&lt;p&gt;But apart from the buzz about this new project, there is an air of suspicion surrounding it too.&lt;/p&gt;
&lt;p&gt;The launch of the UID has led to a flurry of debate amongst policy-makers, legal experts and civil society at large. In response, Mr Nilekani claims the UID to be “a foolproof project implemented at a low cost”.&lt;/p&gt;
&lt;p&gt;However, some critical issues remain unanswered.&lt;/p&gt;
&lt;p&gt;One of the major objections about UID is that there has been no feasible study conducted, neither has there been a cost benefit analysis done. There is no project document as such.&lt;/p&gt;
&lt;p&gt;To add to it, there are serious concerns about data and identity theft.&lt;/p&gt;
&lt;p&gt;In a world where cyber terrorism is the new threat, and the countries are gearing themselves to protect against such a threat, projects like UID come as an open invitation to terrorist outfits to infiltrate their defences.&lt;/p&gt;
&lt;div&gt;The UID number is linked to fingerprints and the patterns of the holder’s eye. But medical studies show that our eye's iris patterns can change due to aging, disease or malnourishment. More over the government has no alternative option for many millions who fall outside this pattern of identification owing to callused hands, corneal scars and cataract induced by malnourishment. Even as enrollment is poised to begin, authentication is still an unstudied field. Fake fingerprints can very easily be made. Hence, the unique element of these numbers can be tampered.&lt;/div&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;&lt;span class="Apple-style-span"&gt;Recently, Sunil Abraham, Director, Centre for Internet and Society has remarked, “If I leave my fingerprints around, my identity can be stolen and transactions done on my behalf. They could use that number, to share information about anybody.”&lt;/span&gt;&lt;/blockquote&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;A cyber-criminal having access to any person’s identification number can virtually control that person. Telephone numbers, addresses, family history can all be tracked down. Bank accounts can be manipulated and transactions done without the person knowing. Since these days, a lot of money transactions are done through internet, a cyber criminal can easily steal few UID numbers and impersonate those persons to manipulate the bank or credit card accounts.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;In an even uglier scenario, where people might be tracked and judged by their numbers, a criminal’s fingerprints left behind on a scene of crime can be mixed with some one else through a slight manipulation and exchange of UID numbers, making an entirely innocent person a suspect in the eyes of law. Some incompetent or revengeful government officials can also frame innocents for a crime one never committed.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;Human rights activists claim that a tech-savvy person can hack into the system and gain any person’s information from the servers unless the government tightens the defenses. A reminiscence of the Bruce Willis starrer Hollywood blockbuster Die Hard 4, a bunch of techno geeks operating from trailer truck hold the entire United States hostage as they hack into every main frame computing network from transportation, communication, power, defence and individual accounts.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The number can also be used for real time tracking, profiling, mounting surveillance and ‘convergence’ of information. Apart from the concerns about identity theft, the number can also invade our private space. If in the future insurance companies and hospitals merge their databases, the insurance companies can increase premium, or simply refuse insurance cover to a person who is not keeping well.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Poor labourers and immigrants who are on the move in search of work could also be the victims of the ‘Aadhaar’. In future, in case of card being lost or misplaced, poor labour would be threatened with financial and welfare exclusion. Where being a legal resident is to be closely tied in with having a UID number, it could render the poor vulnerable to exclusion and expulsion by exploitative employers and others.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="pullquote"&gt;Interestingly, few months back in June, UK government scrapped the plans for the controversial 5 billion pounds National Identity Card scheme. The UK government now plans to destroy all information held on the National Identity Register, effectively dismantling the whole system.&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Though Mr Nilekani claims that UID would be a cost effective project, however deeper analysis throws a different story. It is reported that the UIDAI project will cost Rs 45,000 crores to the exchequer in the next 4 years. This does not seem to include the costs that will be incurred by Registrars, Enrollers, additional costs on the PDS system to connect it to the UID, the estimated cost to the end user and to the number holder.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;Defending himself from the flurry of queries, Mr Nilekani has stressed that the identification number is not mandatory for everyone and only those interested can enroll. The project aims to first enroll the poor and uneducated masses promising them better wages and ration schemes. As was reported, the first villager to get the UID card was ‘happy but did not know its benefits’. Critics allege that the reason why Aadhaar is selling itself to millions of poor in the country is to create a foundation of legitimacy to deflect concerns over its possible misuse, unsafe technology and huge costs. Later, with a larger foundation, the UID can be enforced upon all citizens in the near future as the apex identity proof, making everyone vulnerable to several risks described above.&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;The UIDAI project has proceeded so far without any legal authorization. There has been no feasibility study or cost-benefit analysis preceding the setting up of such a pervasive project. All calculations are of the back-of-the envelope variety. Data theft is a very serious threat to every individual and the country as a whole. There are deeply disconcerting facts about the project that should make even a die-hard UID supporter worry about its long term implications.&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&lt;br /&gt;&lt;em&gt;This article has been written by Sushant Sharma. He is a college fresher and avid reader.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Interestingly, few months back in June, UK government scrapped the plans for the controversial 5 billion pounds National Identity Card scheme. The decision came after about 15,000 citizens had already been enrolled and given their numbers. The UK government now plans to destroy all information held on the National Identity Register, effectively dismantling the whole system.&lt;/p&gt;
&lt;p&gt;The UK system like the Indian UID had also started with much fanfare, claiming to save nearly 900 million pounds for the taxpayers. While the project was axed, UK’s Home Secretary Theresa May stated - “It (the identity card project) is intrusive and bullying, ineffective and expensive. It is an assault on individual liberty that does not promise a great good.”&lt;/p&gt;
&lt;p&gt;The same logic implies to the India as well. But instead of scraping this over-hyped-failure-in-the-making project, our Prime Minister claims the UID project “will empower all”. But will it actually? That is for us to decide now.&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Read the original article &lt;a class="external-link" href="http://www.d-sector.org/article-det.asp?id=1396"&gt;here&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/identity-crisis'&gt;https://cis-india.org/news/identity-crisis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T08:16:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/creativity-politics-and-internet-censorship-20160525">
    <title>Creativity, Politics, and Internet Censorship</title>
    <link>https://cis-india.org/raw/creativity-politics-and-internet-censorship-20160525</link>
    <description>
        &lt;b&gt;In collaboration with Karnataka for Kashmir, we organised a discussion on 'Creativity, Politics and Internet Censorship' on May 25, 2016. Mahum Shabir, a legal activist and artist, Mir Suhail, political cartoonist with Kashmir Reader and Rising Kashmir, and Habeel Iqbal, a lawyer who has worked with several justice groups in Kashmir, shared some of their work and experiences. This discussion was organised as part of Port of Kashmir 2016, a series of events bringing together a small collective of people using different modes of art and activism to address crucial challenges to free speech and democracy in the state. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/MahumShabirHandwara.jpg" alt="null" /&gt;
&lt;h6&gt;Mahum Shabir talking about the Handwara case. Source: Swar Thounaojam.&lt;/h6&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The discussion began with Mahum Shabir giving an overview of the work at the Jammu Kashmir Coalition of Civil Society, specifically on the Handwara case. She spoke of the role of the internet, and social media in particular, in perpetuating the gaze of the state, while also bringing up the larger question of how media propagates a certain way of looking at Kashmir, particularly women, marginalised groups and victims of violence. Internet blockades and media censorship pose several obstacles for the circulation of information, resulting in the need for surreptitious ways of communication as a necessary way to counter predominant narratives in the discourse around occupation. &amp;nbsp;The implications of these for the rights of women in particular, the curbs on freedom at different levels, and the undercurrent of violence that is prevalent in everyday life, came up as significant questions.&lt;/p&gt;
&lt;p&gt;Mir Suhail presented some of his cartoons, and shared some poignant personal experiences of growing up in a state under military occupation. His works reflect his concerns about a changing society, from understanding strife as an almost normalised state of existence, to now a phase of industrialization and control of resources. He spoke on the politics of exercising creative freedom in the present, and his attempt to encourage conversations on contemporary issues through his art. The role of technology in facilitating these conversations is as crucial as it is contentious, for it also brings up questions of surveillance and privacy;his art tries to navigate through some of these questions in different ways.&lt;/p&gt;
&lt;p&gt;Habeel Iqbal, a lawyer who has worked on the Shopian and Handwara cases, spoke on some of the legal aspects of censorship and surveillance related issues in Kashmir, particularly in instances involving social media. He discussed some of the challenges faced by activists, social workers and political groups in working on certain cases, particularly in gathering and circulating information or in writing about sensitive issues. Self-censorship is often the only option for people working on these issues, as he elaborated through some personal experiences.&lt;/p&gt;
&lt;p&gt;The discussion included questions on the possibilities opened up by privacy tools, such the use of encryption and to the extent to which they affect communication. Access to these technologies is a factor here; besides, transparency is also a goal for most human rights organisations working in the state. Social media, and social messaging apps in particular often function as an alternative to mainstream media as a means of communication, and it is interesting to see the questions it opens up for censorship. Examples of activism using not just the internet, but the network (through USBs and hard drives) were also discussed. The responses to such forms of activism, from across the world were interesting to engage with, as it tries to tackle predominant perceptions about the state. The economic aspects of different strategies of censorship and surveillance, through curfews and blockades and its broader implications for socio-economic development in the state were also discussed. The talk provided several insights into the problems and challenges to freedom of speech, the censorship of ideas, and its repercussions for creative freedom and politics in Kashmir.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/MirSuhailPostcards.jpg" alt="null" /&gt;
&lt;h6&gt;Postcards of cartoons by Mir Suhail. Source: Swar Thounaojam.&lt;/h6&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/creativity-politics-and-internet-censorship-20160525'&gt;https://cis-india.org/raw/creativity-politics-and-internet-censorship-20160525&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha-pp</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Practice</dc:subject>
    
    
        <dc:subject>Art</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2016-06-17T07:07:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme">
    <title>CPRsouth 2016 – Young Scholars Programme</title>
    <link>https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme</link>
    <description>
        &lt;b&gt;Rohini Lakshané, Amber Sinha and Vidushi Marda have been selected to attend the two-day Young Scholars' Programme to be held in Zanzibar, Tanzania in early September this year. The programme is a part of the CPRSouth conference.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Read the original announcement published by CPRSouth &lt;a class="external-link" href="http://www.cprsouth.org/cprsouth-2016-young-scholars-programme/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following highly successful joint Afro-Asian CPR conferences in Mauritius in 2012, and India in 2013, CPRafrica and CPRsouth formally merged under the banner of CPRsouth in 2014. Since then, CPRsouth has hosted conferences in the Cradle of Humankind in South Africa (2014), and at the Innovation Center for Big Data and Digital Convergence at Yuan Ze University, Taiwan (2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This year’s conference is co-hosted by&lt;em&gt; COSTECH &lt;/em&gt;and&lt;em&gt; TCRA &lt;/em&gt;in Zanzibar, and will include sessions on cutting-edge developments on ICT policy and regulation in the South and discussion of the research-policy interface.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;30 Young Scholars from Africa and the Asia-Pacific region will be selected to participate in a tutorial programme taught by recognised scholars and practitioners from Africa and Asia, and they will attend the main conference thereafter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Tutorials are scheduled to be held on the 6&lt;sup&gt;th&lt;/sup&gt; and 7&lt;sup&gt;th&lt;/sup&gt; of September 2016, prior to the main CPR&lt;em&gt;south&lt;/em&gt; conference.&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; Who will qualify?&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Masters/PhD students in Economics, Public policy, Communications and Journalism&lt;/li&gt;
&lt;li&gt;Officers of government/regulatory agencies undertaking ICT policy research, developing/gathering indicators (monitoring and evaluation)&lt;/li&gt;
&lt;li&gt;Staff of private companies in the communication industries working in regulatory affairs&lt;/li&gt;
&lt;li&gt;Officers in NGOs/INGOs working in policy and regulation&lt;/li&gt;
&lt;li&gt;Researchers from think tanks, university research centres&lt;/li&gt;
&lt;li&gt;Journalists covering communication public policy and regulation&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Seminar&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The seminar will cover a number of topics of the two days, such as:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;policy analysis using supply-side or demand-side data;&lt;/li&gt;
&lt;li&gt;ICT impact analysis;&lt;/li&gt;
&lt;li&gt;convergence, net neutrality;&lt;/li&gt;
&lt;li&gt;funding broadband network extension, open access networks, spectrum;&lt;/li&gt;
&lt;li&gt;sector and competition regulation;&lt;/li&gt;
&lt;li&gt;research to policy interventions;&lt;/li&gt;
&lt;li&gt;Internet governance – privacy, surveillance, human rights online; and&lt;/li&gt;
&lt;li&gt;introduction to big data, open data.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;(2016 tutorial programme still to be confirmed)&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous tutorial presentations can be accessed at &lt;a href="http://www.cprsouth.org/"&gt;&lt;span style="text-decoration: underline;"&gt;http://www.cprsouth.org/&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Application deadline: 22 April 2016&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Application guidelines&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://form.myjotform.com/60813291616555" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;Applications should be submitted via this link&lt;/span&gt;&lt;/a&gt; by 22 April 2016, and must contain the following:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;one-page curriculum vitae; and&lt;/li&gt;
&lt;li&gt;one-page write-up outlining why you wish to become an African or Asia-Pacific based expert capable of contributing to ICT related policy and regulatory reform in the region&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Applicants’ &lt;strong&gt;write-ups and biographies should be in a single word document&lt;/strong&gt;, and named: CPRsouth2016_YoungScholar_ApplicantLastName.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;em&gt;Kindly note:&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt; Late applications and applications that do not conform to the prescribed format above will automatically be disqualified.&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Review Criteria&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Applications will be reviewed according to the following criteria:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;content of application;&lt;/li&gt;
&lt;li&gt;evidence of interest in, and commitment to, policy-relevant research for Africa or the Asia-Pacific region;&lt;/li&gt;
&lt;li&gt;quality of writing; and&lt;/li&gt;
&lt;li&gt;gender and country representation&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The selection committee may contact your supervisor or mentor before making the final selections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Candidates selected to participate in the tutorial programme must:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;provide a one-page research proposal &lt;em&gt;upon acceptance onto the tutorial programme&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;participate in all tutorial sessions&lt;/li&gt;
&lt;li&gt;participate in the entire CPR&lt;em&gt;south&lt;/em&gt; 2016 conference&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Funding&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Selected young scholars who are passport holders of, and travelling from, low and middle income countries within the Asia Pacific and Africa (as classified by the World Bank http://data.worldbank.org/about/country-classifications/country-and-lending-groups#Low_income) will be provided with:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;lowest-cost economy airfare to conference destination (less USD 150 registration fee);&lt;/li&gt;
&lt;li&gt;ground transfers between the conference venue and airport; and&lt;/li&gt;
&lt;li&gt;twin sharing accommodation on bed and breakfast basis, 5 lunches and 1 dinner for the duration of the conference and tutorials (6 – 10 September 2016). &lt;em&gt;Not all meals are covered.&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The registration fee for young scholars to attend the conference and tutorials is USD150, and airfares will be reimbursed less this registration fee.  Participants will be required to cover:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;transport to and from airports in their home countries;&lt;/li&gt;
&lt;li&gt;visa fees (if any);&lt;/li&gt;
&lt;li&gt;meals not provided; and&lt;/li&gt;
&lt;li&gt;any other incidental costs&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;As the registration fee is so low and should be met personally even if there is no institutional support for attendance of the course and conference, please note that only under exceptional circumstances of extreme financial hardship may the organisers consider a waiver of the conference registration fee. Such waivers will be considered on a case-by-case basis and only where a scholar would otherwise be prevented from attending the YS programme and conference.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Visas&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Letters of invitation will be provided for purposes of visa applications after participant selections have been made. Participants are responsible for securing their own visas to enter Tanzania, and are strongly advised to initiate visa approval procedures immediately on receipt of confirmation of their participation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kindly direct all enquiries to Ondine Bello: admin@researchictafrica.net  orinfo@CPRsouth.org&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme'&gt;https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2016-05-30T02:01:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cpdp-2015">
    <title>CPDP 2015</title>
    <link>https://cis-india.org/internet-governance/news/cpdp-2015</link>
    <description>
        &lt;b&gt;The eighth international conference on computers, privacy and data protection will be held in Brussels from January 21 to 23, 2015. The Centre for Internet and Society is a moral supporter of CPDP. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;CPDP is a non-profit platform originally founded in 2007 by research groups from the Vrije Universiteit Brussel, the Université de Namur and Tilburg University and has grown into a platform carried by 20 academic centers of excellence from the EU, the US and beyond. As a world-leading multidisciplinary conference CPDP offers the cutting edge in legal, regulatory, academic and technological development in privacy and data protection. Within an atmosphere of independence and mutual respect, CPDP gathers academics, lawyers, practitioners, policy-makers, computer scientists and civil society from all over the world in Brussels offering them an arena to exchange ideas and discuss the latest emerging issues and trends. This unique multidisciplinary formula has served to make CPDP one of the leading data protection and privacy conferences in Europe and around the world. CPDP2014 welcomed 854 guests including 343 speakers from 43 different countries dispersed over more than 60 panels which took place during three full days. It attracted another 500 people in several public evening events including debates, a pecha kucha evening and an art exhibition. CPDP2015 aims to repeat the success of last year and will stage panels within the following main topical themes: Data Protection Reform: European and Global Developments, Mobility (mobile technologies, wearable technologies, border surveillance), EU-US developments concerning the regulation of government surveillance, Health, privacy and data protection, Love and lust in the digital age, Internet governance and privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2015 CPDP will take place from January 21 to 23, 2015 in the Halles de Schaerbeek, Brussels, Belgium. &lt;span&gt;Registrations are already open:&lt;/span&gt;&lt;i&gt;&lt;span&gt; &lt;/span&gt;&lt;/i&gt;&lt;span&gt;&lt;a href="http://www.cpdpconferences.org/Registration.html" target="_blank"&gt;http://www.cpdpconferences.org/Registration.html&lt;/a&gt;. For more details &lt;a class="external-link" href="http://www.cpdpconferences.org/Callforpapers.html"&gt;see here&lt;/a&gt;.&lt;/span&gt;&lt;i&gt;&lt;span&gt; &lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cpdp-2015'&gt;https://cis-india.org/internet-governance/news/cpdp-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-30T09:52:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/cpc-gathering-agenda.pdf">
    <title>CPC Gathering Agenda</title>
    <link>https://cis-india.org/internet-governance/files/cpc-gathering-agenda.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/cpc-gathering-agenda.pdf'&gt;https://cis-india.org/internet-governance/files/cpc-gathering-agenda.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-01-20T02:42:40Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-october-18-2012-surabhi-agarwal-courts-approval-needed-to-tap-phones">
    <title>Court’s approval needed to tap phones: Panel</title>
    <link>https://cis-india.org/news/livemint-october-18-2012-surabhi-agarwal-courts-approval-needed-to-tap-phones</link>
    <description>
        &lt;b&gt;Investigators can monitor a person for 15-20 days on executive orders in case of emergencies, suggests panel.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Surabhi Agarwal's article was published in &lt;a class="external-link" href="http://www.livemint.com/Politics/TKvdGjj2mMcp2FNgwIVLeP/Courts-approval-needed-to-tap-phones.html"&gt;LiveMint&lt;/a&gt; on October 18, 2012. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Government agencies need judicial permission before intercepting any communication or starting surveillance of any individual, a panel on the proposed privacy law suggested on Thursday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If there is any urgency, investigators can tap phones or monitor a person’s movements for 15-20 days on executive orders but will then have to approach the courts to continue, the committee led by retired Delhi high court judge &lt;a href="http://www.livemint.com/Search/Link/Keyword/Ajit%20P.%20Shah"&gt;Ajit P. Shah&lt;/a&gt; recommended.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Phone tapping under the present regime is done under executive permission whereas in other countries it is done only with the permission of the courts,” Shah said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Security agencies currently require permission from home secretaries, either at the Centre or the states, to set up wiretaps or monitor emails. An oversight group of the cabinet, law and telecom secretaries at the Centre reviews all such authorizations.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt; &lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/LntqxttkTuE" width="300"&gt;&lt;/iframe&gt; &lt;/th&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The government established the Shah committee in Feburary under the Planning Commission to study international best practices on privacy and surveillance after concerns arose on misuse of information collected by official agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shah said on Thursday that the committee was “not interested” in preparing a privacy law but has only laid down the principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The department of personnel and training will deliberate on the panel’s recommendations and then draft a legislation, said &lt;a href="http://www.livemint.com/Search/Link/Keyword/Ashwani%20Kumar"&gt;Ashwani Kumar&lt;/a&gt;, junior minister in the Planning Commission.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The Shah panel has recommended appointing privacy commissioners and a system under which organizations will have to develop privacy standards that will be approved by a commissioner as a means of self-regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sectoral industry associations would form a code of conduct for companies that will comply with law as they will be approved by the privacy commissioner, according to &lt;a href="http://www.livemint.com/Search/Link/Keyword/Kamlesh%20Bajaj"&gt;Kamlesh Bajaj&lt;/a&gt;, chief executive officer of Data Security Council of India, one of the members of the committee. “These associations could also act as alternative dispute-resolution mechanisms,” Bajaj said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The committee’s other recommendations include giving individuals a choice to provide personal information, collection of only critical personal information, use of data only for the purpose for which it has been collected, and a penalty for violations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Without a comprehensive horizontal regulatory framework and the office of the regulator both private and public entities in India have been trampling on the rights of citizens without complying to any of the international best practices when it comes to protecting the right to privacy,” said &lt;a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;, executive director of Centre for Internet and Society, a Bangalore-based advocacy group. After the privacy law is enacted and the office of a privacy commissioner is created, people will be able to seek redressal against these erring pubic and private entities if their rights are violated, he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has been looking to enact a privacy law to ensure data collected by various programmes such as the National Population Register, Unique Identification Authority of India and National Intelligence Grid was not misused. It was expected to scotch criticism of these programmes by privacy and Internet activists. It later expanded the scope of the proposed legislation after catching flak for a leak of tapped conversations between corporate lobbyist &lt;a href="http://www.livemint.com/Search/Link/Keyword/Niira%20Radia"&gt;Niira Radia&lt;/a&gt;, industrialists and journalists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government now aims to uphold the right of all Indians against any misuse of personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication. That means it effectively covers everything from the misuse of data collected by the government to spam.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there could be opposition from law enforcement agencies if the privacy law mandates that prior permission of the courts will be required before intercepting communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If judges begin taking a call on interception requests, there could be chances of leakage, “since there are so many judges at so many levels”, said &lt;a href="http://www.livemint.com/Search/Link/Keyword/Rumel%20Dahiya"&gt;Rumel Dahiya&lt;/a&gt;, deputy director general at Institute of Defence Studies and Analyses, a New delhi-based think tank. “The government carries out surveillance to gain fool-proof intelligence. That purpose will be defeated.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last week, Prime Minister &lt;a href="http://www.livemint.com/Search/Link/Keyword/Manmohan%20Singh"&gt;Manmohan Singh&lt;/a&gt; said a fine balance needs to be maintained between the right to information and the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Shah committee included representatives from the private sector, the department of information technology, ministry of home affairs, department of telecommunication, the law ministry and the department of personnel and training.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Kirthi V. Rao contributed to this story.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-october-18-2012-surabhi-agarwal-courts-approval-needed-to-tap-phones'&gt;https://cis-india.org/news/livemint-october-18-2012-surabhi-agarwal-courts-approval-needed-to-tap-phones&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-10-22T07:02:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/counter-surveillance.pdf">
    <title>Counter Surveillance Panel: DiscoTech &amp; Hackathon (Flyer)</title>
    <link>https://cis-india.org/internet-governance/blog/counter-surveillance.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/counter-surveillance.pdf'&gt;https://cis-india.org/internet-governance/blog/counter-surveillance.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-02-24T21:29:51Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
