<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 861 to 875.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/consilience-2013.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/news/apr-igf-delhi-2014-connecting-the-next-two-billion-the-role-of-foss"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/citizenlab-summer-institute-on-monitoring-internet-openness-and-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/concept-note-unicef-nasscom-foundation-workshop-on-child-online-protection"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/comments-the-personal-data-protection-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/comments-to-the-united-nations-human-rights-commission-report-on-gender-and-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/cis-comments-to-the-telecommunications-bill-2023"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/comments-to-the-pdp-bill-2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-to-national-security-council-on-national-cybersecurity-strategy-2020"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-draft-outcome-document-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-communications-policy"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/consilience-2013.pdf">
    <title>Consilience 2013 Report</title>
    <link>https://cis-india.org/internet-governance/blog/consilience-2013.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/consilience-2013.pdf'&gt;https://cis-india.org/internet-governance/blog/consilience-2013.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-11-20T06:14:01Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore">
    <title>Consilience – 2013</title>
    <link>https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore</link>
    <description>
        &lt;b&gt;The Law and Technology Committee of National Law School of India University, Bangalore is organising ‘Consilience – 2013′, an annual conference on law and technology, to be held on May 25 and 26, 2013. The Centre for Internet and Society is a co-partner for this event.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Theme: Data Protection and Cyber Security in India. Click to read the &lt;a href="https://cis-india.org/internet-governance/blog/consilience-2013.pdf" class="internal-link"&gt;report here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Topics:&lt;br /&gt;Frameworks for Data Protection in India: The J. A.P. Shah “Report of the Group of Experts on Privacy”&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.       What is the scope of the principles/framework?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b.      What could be the strengths and limitation of their application?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c.       How does Report define privacy for India?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d.      Would an alternative framework for privacy in India be better? If so, what would this framework look like?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;India and the EU: The Privacy Debate&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.       How does the Indian data protection regime differ from the EU regime?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b.      Was the EU is justified in not accepting India as a data secure country? Reason for or against.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c.      In what way does the Indian regime on data protection not meet the requirements of EU’s data protection directive?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d.      What changes need to be made in the Indian regime to become  EU compliant? Are these changes feasible? Should India make these  changes?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Governmental Schemes, Data Protection, and Security&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. In India, do private public partnerships between government  and the private sector adequately incorporate data protection standards?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. What have been concerns related to data protection and  security that have arisen from government schemes? (Please use two  governmental schemes as case studies)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. Are these concerns related to the policy associated with the  project – the architecture of the project as well as the implementation?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d. Should the larger question of data protection for governmental  schemes be incorporated into a privacy legislation? If yes, how so?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Contracts and Data Protection in India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.       How are contracts used to ensure data protection in India? What actors use contracts?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b.      Are there weaknesses in using contracts to ensure data protection standards?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c.       Do contracts address questions brought about from technology like the cloud?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Cyber security in India&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;a.      What are the perceived challenges and threats to cyber security in India?&lt;/p&gt;
&lt;p&gt;b.      Are these currently being addressed through policy/projects? If yes, how so?&lt;/p&gt;
&lt;p&gt;c.      How does India’s cyber security regime compare to other countries?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance and Cyber Security&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.      Does policy in India enable the Government of India to surveil individuals for reasons related to cyber security?&lt;/p&gt;
&lt;p&gt;b.      If so – through what policy, projects, legislation?&lt;/p&gt;
&lt;p&gt;c.      Do the relevant policies, projects, and legislation impact privacy? How so?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;The Draft National Cyber Security Policy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.   What is the scope of the National Cyber Security Policy of  India? Does the draft policy adequately address all of the concerns  within the ambit of cyber security?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b.   Would the Draft National Cyber Security Policy of India be  effective in meeting the goal of enhancing cyber security levels in  India?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c.    How does the Draft National Cyber Security Policy compare to other countries cyber security policies?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Word Limit&lt;/b&gt;:&lt;/p&gt;
&lt;p&gt;Abstract:              750-800 words&lt;/p&gt;
&lt;p&gt;Paper:                   2,500 words&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Deadlines:&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Abstract Submission:     April 30, 2013&lt;/p&gt;
&lt;p&gt;Paper Submission:        May 15, 2013&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Contact Details&lt;/b&gt;:&lt;/p&gt;
&lt;p&gt;consilience2013[at]gmail[dot]com&lt;/p&gt;
&lt;p&gt;Mohak Arora:  +91-90359-21926&lt;/p&gt;
&lt;p&gt;Shivam Singla: +91-99167-08701&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each participant is required to submit an abstract on &lt;b&gt;any one&lt;/b&gt; of the seven topics above and can choose the specific issue within the selected topic to discuss.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For additional details, click&lt;b&gt; &lt;a href="http://consilience.co.in/index.php/component/content/article/20-frontpage/310-call-for-papers"&gt;here&lt;/a&gt;.&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore'&gt;https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-20T06:15:15Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/news/apr-igf-delhi-2014-connecting-the-next-two-billion-the-role-of-foss">
    <title>Connecting the Next Two Billion: The Role of FOSS</title>
    <link>https://cis-india.org/openness/news/apr-igf-delhi-2014-connecting-the-next-two-billion-the-role-of-foss</link>
    <description>
        &lt;b&gt;Sunil Abraham was a speaker at this event organized by ICFOSS at the APrIGF in Noida on August 4, 2014.&lt;/b&gt;
        &lt;h3&gt;Specific Issues of Discussions &amp;amp; Description&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Connecting the next two billion users on the Internet poses unique  challenges that must be addressed. The next two billion users will have  very different profiles as compared to the first billion in terms of  factors such as geography, demography, gender, disability, technology  access, language access, and connectivity devices. In addition, with the  coming of the Internet of Things, the users of the Internet may also  include devices, sensors and sensor networks. Further, the context of  the Internet itself may be changing, particularly in relation to efforts  by various State and non-State actors to restrict  freedom of access to  the Internet and freedom of expression on it.Free &amp;amp; Open Source  Software (FOSS) has now assumed greater significance in the light of  revelations related to arbitrary surveillance conducted by states. This  issue highlights the need to use audited technology and infrastructure  to prevent the wanton violation of privacy of citizens. FOSS can be used  to build shared community infrastructure that will protect users from  privacy abuses. As most of the online applications run on top of free  software, there is also a need for greater  collaboration between the  industry and free software community to ensure security and robustness  of software to prevent incidents like the heartbleed bug  vulnerabilities. As the next two billion comes online, FOSS assumes  great significance for building a safe and secure Internet and robust  communication platforms.The panel will discuss the following issues:•  Relevance of FOSS as an access enabler and source of robust,  cost-effective andfreedom-preserving software• The importance of FOSS in  preventing arbitrary surveillance• Co-operation among businesses and  free software community to develop secure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Building community communication infrastructure using FOSS to restrict the dependence on centralised services.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Moderator and Speakers&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Moderator: &lt;/b&gt;Ms. &lt;a href="http://2014.rigf.asia/speakers/#Mishi" title="Speakers Profile"&gt;Mishi Choudhary&lt;/a&gt;, Executive Director, SFLC.IN, New Delhi&lt;/li&gt;
&lt;li&gt;Dr. &lt;a href="http://2014.rigf.asia/speakers/#Rahul" title="Speakers Profile"&gt;Rahul De&lt;/a&gt;, IIM Bangalore &lt;i&gt;(Remote)&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Dr. &lt;a href="http://2014.rigf.asia/speakers/#Nagariuna" title="Speakers Profile"&gt;G. Nagarjuna&lt;/a&gt;, Free Software Foundation of India &lt;i&gt;(Remote)&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Mr. &lt;a href="http://2014.rigf.asia/speakers/#Prasanth" title="Speakers Profile"&gt;Prasanth Sugathan&lt;/a&gt;, Counsel, SFLC.in&lt;/li&gt;
&lt;li&gt;Mr. &lt;a href="http://2014.rigf.asia/speakers/#Satish" title="Speakers Profile"&gt;Satish Babu&lt;/a&gt;, Director, ICFOSS&lt;/li&gt;
&lt;li&gt;Mr. &lt;a href="http://2014.rigf.asia/speakers/#Sunil" title="Speakers Profile"&gt;Sunil Abraham&lt;/a&gt;, Executive Director, Centre for Internet and Society, Bangalore&lt;/li&gt;
&lt;li&gt;
&lt;p class="p1"&gt;Mr. S. Ramakrishnan, Media Lab Asia/Govt. of India&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Workshop Organizer&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This workshop will be jointly organised by International Centre For Free and Open Source Software (ICFOSS), an autonomous institution under the Government of Keralamandated with the objectives of co-ordinating FOSS initiatives within Kerala, as well as linking up with FOSS initiatives in other parts of the world and SFLC.IN, a donor supported legal services organisation that works to protect freedom in the digital world.The details of the contact person for the workshop is given below:Name: Mr.Satish BabuDesignation: DirectorOrganisation: International Center for Free and Open Source Software (IC-FOSS).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For more details &lt;a class="external-link" href="http://2014.rigf.asia/agenda/workshop-proposals/workshop-proposal-8/"&gt;see the APrIGF website&lt;/a&gt;.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/news/apr-igf-delhi-2014-connecting-the-next-two-billion-the-role-of-foss'&gt;https://cis-india.org/openness/news/apr-igf-delhi-2014-connecting-the-next-two-billion-the-role-of-foss&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>FOSS</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-09-10T05:04:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/citizenlab-summer-institute-on-monitoring-internet-openness-and-rights">
    <title>Connaught Summer Institute on Monitoring Internet Openness and Rights</title>
    <link>https://cis-india.org/news/citizenlab-summer-institute-on-monitoring-internet-openness-and-rights</link>
    <description>
        &lt;b&gt;Malavika Jayaram is a speaker at this event being held at the Munk School of Global Affairs, Bloor Street West.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://citizenlab.org/summerinstitute/program.html"&gt;Click to read the original posted on Citizen Lab website&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Monday, July 22, 2013&lt;/h2&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Location:&lt;/b&gt; Munk School of Global Affairs (Observatory Site), 315 Bloor Street West (&lt;a href="https://maps.google.ca/maps?q=315+bloor+stret+west&amp;amp;hl=en&amp;amp;ll=43.668027,-79.398386&amp;amp;spn=0.009127,0.021329&amp;amp;sll=43.664674,-79.39667&amp;amp;sspn=0.009127,0.021329&amp;amp;gl=ca&amp;amp;hnear=315+Bloor+St+W,+Toronto,+Ontario+M5S+1W7&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A"&gt;map)&lt;/a&gt;&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;b&gt;14:00 - 17:00&lt;/b&gt;&lt;/th&gt;
&lt;td&gt;&lt;b&gt;Meet and Greet at the Citizen Lab&lt;/b&gt;
&lt;p style="text-align: justify; "&gt;Participants are free to drop by the Lab between 2:00-5:00 pm to see the  space and meet with Citizen Lab researchers. Participants should go to  the reception desk on the first floor and have the receptionist call the  Lab.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Tuesday, July 23, 2013&lt;/h2&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Location:&lt;/b&gt; Campbell Conference Room, South House, Munk School of Global Affairs (Trinity site), 1 Devonshire Place (&lt;a href="https://maps.google.ca/maps?q=1+devonshire+place&amp;amp;hl=en&amp;amp;ll=43.664674,-79.39667&amp;amp;spn=0.009127,0.021329&amp;amp;sll=43.661244,-79.400897&amp;amp;sspn=0.009128,0.021329&amp;amp;gl=ca&amp;amp;hnear=1+Devonshire+Pl,+Toronto,+Ontario+M5S+3K7&amp;amp;t=m&amp;amp;z=16"&gt;map&lt;/a&gt;)&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;08:00 - 09:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Breakfast&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;09:00 - 09:15&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Opening Remarks&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;09:15 - 10:45&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Tutorial&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="http://citizenlab.org/summerinstitute/abstracts.html#budish"&gt;Welcome to Oz: Beyond a Black and White Debate on Internet Regulation (and Control)&lt;/a&gt;" &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;– Jon Penney (Berkman Centre/Oxford Internet Institute/Citizen Lab) and Ryan Budish (Berkman Centre/Herdict)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;10:45 - 11:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Break&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;11:00 - 12:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Commercialization of Information Controls&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#parsons"&gt;Regulators, Politicians, and Deep Packet Inspection: Who's Driving What and Why&lt;/a&gt;" – Chris Parsons (University of Victoria)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"Fingerprinting Internet Filtering Products" – Jakub Dalek (Citizen Lab)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#marczak"&gt;Cash Rules Everything Around Me: The Commercialization of Online Spying&lt;/a&gt;" – Bill Marczak &lt;br /&gt;(UC Berkeley)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;12:00 - 13:45&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Lunch&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;13:45 - 14:45&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Circumvention / Attacks 1&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#robinson"&gt;Collateral Freedom&lt;/a&gt;" – David Robinson (Robinson + Yu)&lt;/li&gt;
&lt;li&gt;﻿﻿"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#KheOps"&gt;Remedy: Relays Monitoring and Deployment&lt;/a&gt;" – KheOps (Telecomix)&lt;/li&gt;
&lt;li&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#carbone"&gt;Fake Domain Attacks on Civil Society Groups&lt;/a&gt;" – Michael Carbone (Access)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;14:45 - 15:45&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Characterization / Measurement 1&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#anderson"&gt;Iran through the Eyes of Big Data&lt;/a&gt;" – Collin Anderson (Independent Researcher)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"Measurement, Detection, and Comparison of Surveillance Data" – Praveen Selvasekaran (Simple Tech Life)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#Filbaan"&gt;Filbaan: What is Filtered Today?&lt;/a&gt;"&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;15:45 - 16:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Break&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;16:00 - 16:45&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Identity Systems and Monitoring&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#Jia"&gt;Desperately Seeking the Names: Examining the Historical Progression of Real Name Policies on the Chinese Internet&lt;/a&gt;" – Lianrui Jia (Carleton University)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#jayaram"&gt;India's Civil Liberties Crisis: Digital Free Will in Free Fall&lt;/a&gt;" – Malavika Jayaram (Centre for Internet and Society, Bangalore)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;17:00 - 18:30&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Poster and Demo Session&lt;br /&gt;&lt;/b&gt;&lt;i&gt;Light refreshments will be served&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#aceto"&gt;User-side Approach for Censorship Detection: Home-router and Client-based Platforms&lt;/a&gt;" – Giuseppe Aceto (University of Naples Federico II)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#brantly"&gt;The Cyber Losers&lt;/a&gt;" – Aaron Brantly and Katrin Verclas (National Democratic Institute)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#james"&gt;What is the Impact of Internet Censorship in China?&lt;/a&gt;" – Carlotta James (Psiphon Inc.)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#matsushita"&gt;Open Integrity Index&lt;/a&gt;" – Jun Matsushita&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#soltesz"&gt;M-Lab: Exploring the Possibilities for Open, Global Censorship and Surveillance Detection&lt;/a&gt;" – Stephen Soltesz (Open Technology Institute) and Meredith Whittaker (Google Research)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#stevenson"&gt;Mapping Google:  Global Business Infrastructure and Implications for Openness &lt;/a&gt;" – John Harris Stevenson (University of Toronto)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#wiseman"&gt;Chat Program Censorship and Surveillance in China: Tracking TOM-Skype and Sina UC&lt;/a&gt;" – Greg Wiseman (Citizen Lab)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#zaiser"&gt;The Growth and Spread of Cyberspace Controls&lt;/a&gt;" – Benjamin Zaiser (Free University of Berlin)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;Wednesday, July 24, 2013&lt;/h2&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Location:&lt;/b&gt; Campbell Conference Room, South House, Munk School of Global Affairs (Trinity site), 1 Devonshire Place (&lt;a href="https://maps.google.ca/maps?q=1+devonshire+place&amp;amp;hl=en&amp;amp;ll=43.664674,-79.39667&amp;amp;spn=0.009127,0.021329&amp;amp;sll=43.661244,-79.400897&amp;amp;sspn=0.009128,0.021329&amp;amp;gl=ca&amp;amp;hnear=1+Devonshire+Pl,+Toronto,+Ontario+M5S+3K7&amp;amp;t=m&amp;amp;z=16"&gt;map&lt;/a&gt;)&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;08:00 - 09:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Breakfast&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;09:00 - 10:20&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Characterization / Methodology 2&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#burnett"&gt;Refining the Tor Censorship Detector&lt;/a&gt;" – Sam Burnett (Georgia Tech)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#goldberg"&gt;From Internet Security to Internet Freedom: The case of the RPKI&lt;/a&gt;" – Sharon Goldberg (Boston University)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#knockel"&gt;Running Software in Albuquerque to Measure Censorship Anywhere&lt;/a&gt;" – Jeffrey Knockel (University of New Mexico)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#ng"&gt;Social Media as Labratory: What We Can Learn about Chinese Politics from Sina Weibo Censorship and Online Discussion&lt;/a&gt;" – Jason Q. Ng (Citizen Lab)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;﻿&lt;b&gt;10:20 - 11:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Break&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;11:00 - 12:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Circumvention 2&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;"VPNthnography: Hacking the Great Firewall for Fun and Profit"&lt;/li&gt;
&lt;li&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#haselton"&gt;Economics of Web Proxy Networks&lt;/a&gt;" – Bennett Haselton (Peace Fire/Citizen Lab)&lt;/li&gt;
&lt;li&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#kathuria"&gt;Censors Working Overtime&lt;/a&gt;" – Karl Kathuria (Psiphon Inc.)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;12:00 - 14:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Lunch&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;14:00 - 15:30&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Tutorial&lt;br /&gt;&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#weaver"&gt;Network Censorship Techniques, Detection, and Localization&lt;/a&gt;" – Nick Weaver (ICSI)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;15:30 - 16:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Break&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;16:00 - 17:30&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Panel: Bridging Activism and Research&lt;/b&gt; (5 minute talks + discussion)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ali Bangi (ASL19 / Citizen Lab)&lt;/li&gt;
&lt;li&gt;Stefania Milan (Tillburg University)&lt;/li&gt;
&lt;li&gt;Deji Olukotun (PEN)&lt;/li&gt;
&lt;li&gt;John Scott-Railton (Citizen Lab / UCLA)&lt;/li&gt;
&lt;li&gt;'Gbenga Sesan (Paradigm Initiative Nigeria)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Thursday, July 25, 2013&lt;/h2&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Location:&lt;/b&gt; Campbell Conference Room, South House, Munk School of Global Affairs (Trinity site), 1 Devonshire Place (&lt;a href="https://maps.google.ca/maps?q=1+devonshire+place&amp;amp;hl=en&amp;amp;ll=43.664674,-79.39667&amp;amp;spn=0.009127,0.021329&amp;amp;sll=43.661244,-79.400897&amp;amp;sspn=0.009128,0.021329&amp;amp;gl=ca&amp;amp;hnear=1+Devonshire+Pl,+Toronto,+Ontario+M5S+3K7&amp;amp;t=m&amp;amp;z=16"&gt;map&lt;/a&gt;)&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;08:00 - 09:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Breakfast&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;09:00 - 10:20&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Jurisdictions and Borders Online&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#ashraf"&gt;Cyberconflict and the Legal-Territorial Paradox&lt;/a&gt;" – Cameran Ashraf (UCLA)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#goh"&gt;Beyond Borders: Legislative Challenges to the Management of Records in the Cloud&lt;/a&gt;" – Elaine Goh (University of British Columbia)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#hussain"&gt;Civil Society 2.0: The Global Struggle to Govern the Democratic Impacts of ICTs&lt;/a&gt;" – Muzammil M. Hussain (University of Michigan)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#losey"&gt;The Anti-Counterfeiting Trade Agreement and the Networked Public Sphere: How to avoid a Convergent Crisis&lt;/a&gt;" – James Losey (Open Technology Institute) &lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;10:20 - 10:40&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Break&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;10:40 - 12:10&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Tutorial&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#mackinnon"&gt;Ranking Companies on Digital Rights: Challenges and Synergies&lt;/a&gt;" – Rebecca MacKinnon (New America Foundation)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;12:10 - 14:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Lunch&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;14:00 - 15:30&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Surveillance and Monitoring&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#bronk"&gt;Revisiting Webtapping: Learning From Five Years’ of U.S. Cyber and Intel Policy&lt;/a&gt;" – Chris Bronk (Rice University)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#saint-louis"&gt;Who Watches the Watchmen?: Detecting Stealth and Unattributed Information Controls&lt;/a&gt;" – Herve Saint Louis (University of Toronto)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"IX Maps" – Andrew Clement (University of Toronto)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#gutteridge"&gt;Technologies of Control, ‘National Security’ and Systemic Abuse of Minorities in the East and Horn of Africa&lt;/a&gt;" –  Clara Gutteridge (Equal Justice Forum) &lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;15:30 - 15:45&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Break&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;15:45 - 16:30&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Closing Discussion on Interdisciplinary Research and Information Controls&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Friday, July 26, 2013&lt;/h2&gt;
&lt;div id="_mcePaste"&gt;&lt;/div&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Location:&lt;/b&gt; Rooms 108, 208 and Basement, North House, Munk School of Global Affairs (Trinity site), 1 Devonshire Place (&lt;a href="https://maps.google.ca/maps?q=1+devonshire+place&amp;amp;hl=en&amp;amp;ll=43.664674,-79.39667&amp;amp;spn=0.009127,0.021329&amp;amp;sll=43.661244,-79.400897&amp;amp;sspn=0.009128,0.021329&amp;amp;gl=ca&amp;amp;hnear=1+Devonshire+Pl,+Toronto,+Ontario+M5S+3K7&amp;amp;t=m&amp;amp;z=16"&gt;map&lt;/a&gt;)&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;10:00 - 14:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Breakout Sessions&lt;/b&gt; &lt;br /&gt;
&lt;p&gt;&lt;i&gt;Light refreshments will be served&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The half day will be dedicated to giving participants the opportunity to  break into small groups to further discuss, share, and hack on topics  raised during the workshop.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Sponsor&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The workshop is sponsored by University of Toronto's &lt;a href="http://www.research.utoronto.ca/connaught/"&gt;Connaught Fund&lt;/a&gt;. Since it was founded in 1972, the fund has invested more than $1 million in projects that span across the disciplines.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/citizenlab-summer-institute-on-monitoring-internet-openness-and-rights'&gt;https://cis-india.org/news/citizenlab-summer-institute-on-monitoring-internet-openness-and-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-07-26T09:17:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop">
    <title>Concerns over central snoop</title>
    <link>https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop</link>
    <description>
        &lt;b&gt;Eyebrows have been raised at the Centre’s single-window system to intercept phone calls and internet exchanges — the desi version of the US’s surveillance programme, PRISM — that is expected to roll out this year-end.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Aloke Tikku was &lt;a class="external-link" href="http://www.hindustantimes.com/India-news/NewDelhi/Concerns-over-central-snoop/Article1-1083658.aspx"&gt;published in the Hindustan Times&lt;/a&gt; on June 28, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The &lt;span class="WebRupee"&gt; Rs. &lt;/span&gt;400-crore project — tentatively  called the Central Monitoring System (CMS) — will not only allow the  government to listen to a target’s phone conversation but also track  down a caller’s precise location, match his voice against known  suspects’ before the call is completed and see what people have been up  to on the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And then, it can also use analytics to discover possible links — between  suspected terrorists, criminals or just about anybody — from the  internet and phone data. All this will be done from one place without  keeping the internet or phone service provider in the loop — something  the telecom and home ministries insist will enhance citizens’ privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both ministries also insist that the CMS won’t change the rules of the  game. “The process to seek authorisation for interception will not be  diluted,” a home ministry official promised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So is everything hunky dory?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hardly. But technology — in this case, the CMS — is a smaller part of the problem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bigger chunk is the process of approving “lawful interception” orders and the lack of transparency around it.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;It was in December 1996 that the Supreme Court held that the State could  spy on its citizens in extraordinary circumstances but, as an interim  measure, made it mandatory for the home secretary to approve each and  every such request.&lt;/p&gt;
&lt;p&gt;Telecom minister Kapil Sibal, who appeared in this case in the  mid-1990s, convinced the court that it didn’t have the powers to order  that a judge decide each phone-tapping case. Instead, Sibal suggested  that this power remain with the executive on lines of the law in the UK.&lt;/p&gt;
&lt;p&gt;A former home secretary, however, conceded that they hardly have the time to apply their mind before signing a wiretap order.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Interest.png/@@images/9beb69be-db6c-45d6-9f70-4888deef3295.png" alt="Interest of State" class="image-inline" title="Interest of State" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;That isn’t surprising. The home secretary approves around 7,500-9,000  interception orders every month. That means he or she has to sign an  average of 300 orders every day without a break.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If he were to spend just 30 seconds on each case, he would have to  keep aside four-and-a-half hours just approving interception orders  every day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An official said the ministry was considering a suggestion to pick up  a fixed number of cases at random for closer scrutiny before approval.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many believe this might not be enough. It is argued that the  government — which was trying to replicate surveillance technology from  the west — needs to adopt their safeguards and transparency norms too.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director of the Bangalore-based Centre for  Internet and Society, said he didn’t have a problem with CMS as long as  it didn’t go for blanket surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“But there is no reason why the executive — and not a judge — should  have the powers to decide on phone-tapping requests,” he said. Or for  that matter, why shouldn’t there be an independent audit of  phone-tapping decisions, their implementation and outcome?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The aggregated data should be put in the public domain,” Abraham  said. The US has such provisions. So does Britain, which inspired Sibal  to argue for retaining interception powers with the executive in the  mid-1990s. It is time to follow-up on that model.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop'&gt;https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-01T09:33:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/concept-note-unicef-nasscom-foundation-workshop-on-child-online-protection">
    <title>Concept Note: UNICEF &amp; Nasscom Foundation Workshop on Child Online Protection </title>
    <link>https://cis-india.org/internet-governance/blog/concept-note-unicef-nasscom-foundation-workshop-on-child-online-protection</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/concept-note-unicef-nasscom-foundation-workshop-on-child-online-protection'&gt;https://cis-india.org/internet-governance/blog/concept-note-unicef-nasscom-foundation-workshop-on-child-online-protection&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-02-14T10:16:34Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology">
    <title>Communication Rights in the Age of Digital Technology </title>
    <link>https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) invites you to a conference to discuss the evolution of privacy and surveillance in India on Friday, October 30, 2015 at Deck Suite Hall, 5th Floor, Habitat Centre, Lodhi Road, Near Air Force Bal Bharti School, New Delhi - 110003, from 11 a.m. to 5 p.m.&lt;/b&gt;
        &lt;p&gt;The conference will be conducted in a round-table format. Topics to be discussed shall include, among others, the Human DNA Profiling Bill, 2012, the PIL questioning the data collection under the UID scheme, the draft National Encryption Policy and the Supreme Court judgement in Shreya Singhal v. Union of India, in the context of privacy and surveillance in India. The conference will be a forum for discussion, knowledge exchange and agenda building.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;Background Note&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In India, the Right to Privacy has been interpreted to mean an individuals’ right to be left alone. In the age of massive use of Information and Communications Technology, it has become imperative to have this right protected. The Supreme Court has held in a number of its decisions that the right to privacy is implicit in the fundamental right to life and personal liberty under Article 21 of the Indian Constitution, though Part III does not explicitly mention this right. Since the 1960s, the Apex Court has been dealing with this issue, primarily with respect to privacy being recognised as a fundamental or common law right and the standards that need to be satisfied in order to impose any restrictions on it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the year 2012, the Planning Commission constituted a Group of Experts under the chairmanship of Justice AP Shah, Former Chief Justice of the Delhi High Court to recommend a &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;potential privacy framework&lt;/a&gt; for  privacy in India. Previously in 2011 the Department of Personnel and Training had prepared a &lt;a href="https://bourgeoisinspirations.files.wordpress.com/2010/03/draft_right-to-privacy.pdf"&gt;draft Bill on Right to Privacy &lt;/a&gt;which has yet to materialize into a comprehensive legislation on privacy. In 2014, a version of the revised Right to Privacy Bill was &lt;a href="http://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011"&gt;leaked&lt;/a&gt;. Amendments to the Bill  aim to protect individuals against misuse of their data by the government or private agencies, and is in the process of being &lt;a href="http://www.newindianexpress.com/nation/Centre-Giving-Final-Touches-to-Right-to-Privacy-Bill/2015/03/17/article2717271.ece"&gt;finalized by the Indian Government&lt;/a&gt;&lt;a href="http://www.newindianexpress.com/nation/Centre-Giving-Final-Touches-to-Right-to-Privacy-Bill/2015/03/17/article2717271.ece"&gt;. &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of late, privacy concerns have gained importance in India due to the initiation of national programmes like the UID Scheme, DNA Profiling, the National Encryption Policy, etc. attracting criticism for their impact on the right to privacy. For example, DeitY introduced a draft National Encryption Policy in September this year to prescribe methods for encryption. However, the policy would have posed significant restriction on the ability of citizens to encrypt online communication. Backlash from the citizens, industry, social media and privacy experts led the Government to withdraw  the policy as the measures included made the information system vulnerable in every sense.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, the Apex Court gave a &lt;a href="http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf"&gt;historical&lt;/a&gt;&lt;a href="http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf"&gt; judgement&lt;/a&gt; by striking down section 66A of the IT (Amendment) Act 2008. The Court upheld section 69A and the Information Technology  (Procedure &amp;amp; Safeguards for Blocking for Access of Information by Public) Rules 2009 to be constitutionally valid, which accords the government with the authority to block transmission of information and websites when it deems it as necessary for reasons like sovereignty and integrity of India, public order, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another government initiative which has generated considerable controversy for its threat to privacy is the UID project which aims to issue a unique identification number to all citizens by the Unique Identification Authority of India, which can be authenticated and verified online. In August this year, the Supreme Court, &lt;a href="http://judis.nic.in/supremecourt/imgs1.aspx?filename=42841"&gt;vide an interim order&lt;/a&gt;, restricted the use of Aadhaar by declaring it to be optional for availing government benefits and services. Though the Government contended the right to privacy as a fundamental right in India, the Court deferred this issue to a larger Constitutional Bench, and the Supreme Court upheld its decision yet again in the month of October.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the &lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;d&lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;raft&lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt; Human DNA &lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;P&lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;rofiling &lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;B&lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;ill 2015&lt;/a&gt; is being questioned on grounds of privacy invasion on  a massive scale as it aims to collect and store the DNA samples of criminals, suspects, volunteers, and victims and regulate DNA laboratories and DNA sampling for use by law enforcement agencies. The Bill also fails to include comprehensive privacy safeguards and provisions regarding collection of DNA samples with or without the consent of an individual, making individual privacy an important concern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Going by these ongoing debates, one can say that Privacy as a right has primarily evolved by way of judicial interpretation and continues to evolve in light of several controversial Government policies, projects and schemes. However its development is often undermined by tension between several competing national interests which calls for clear guidelines to protect this inviolable right of the citizens.&lt;/p&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/internet-governance/blog/gsma-conference-invite.pdf" class="internal-link"&gt; 
&lt;hr /&gt;
&lt;b&gt;Download the Invite&lt;/b&gt;&lt;/a&gt;&lt;/h3&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology'&gt;https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rakesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-10-24T07:45:26Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/comments-the-personal-data-protection-bill">
    <title>Comments: The Personal Data Protection Bill</title>
    <link>https://cis-india.org/internet-governance/comments-the-personal-data-protection-bill</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/comments-the-personal-data-protection-bill'&gt;https://cis-india.org/internet-governance/comments-the-personal-data-protection-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-11-15T09:35:33Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/comments-to-the-united-nations-human-rights-commission-report-on-gender-and-privacy">
    <title>Comments to the United Nations Human Rights Commission Report on Gender and Privacy</title>
    <link>https://cis-india.org/internet-governance/files/comments-to-the-united-nations-human-rights-commission-report-on-gender-and-privacy</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/comments-to-the-united-nations-human-rights-commission-report-on-gender-and-privacy'&gt;https://cis-india.org/internet-governance/files/comments-to-the-united-nations-human-rights-commission-report-on-gender-and-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi, Ambika Tandon and Pallavi Bedi</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-10-27T04:08:18Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/cis-comments-to-the-telecommunications-bill-2023">
    <title>Comments to the Telecommunications Bill, 2023</title>
    <link>https://cis-india.org/telecom/blog/cis-comments-to-the-telecommunications-bill-2023</link>
    <description>
        &lt;b&gt;The Parliament has passed the Telecommunications Bill, 2023 which seeks to replace the Indian Telegraph Act, 1885. The Centre for Internet &amp; Society (CIS) submits its comments to the bill. &lt;/b&gt;
        &lt;p&gt;The comments were reviewed by Tanveer Hasan. &lt;a class="external-link" href="https://cis-india.org/telecom/files/cis-comments-to-telecommunications-bill-2023"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Key concerns&lt;/h3&gt;
&lt;ol type="1"&gt;&lt;/ol&gt; &lt;ol&gt;&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Definition of Telecommunication Service &lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;&lt;/ol&gt; &lt;ol type="1"&gt;&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The definition of the terms telecommunication (section 2(p) and telecommunication service (section 2(t)) is extremely broad and would effectively include transmission of any signal by any electromagnetic systems. This wide definition increases the scope of the Bill  to include almost all kinds of means of communication used in modern times including messaging services, email, OTT services, among others. Even if one were to accept the argument that the scope of the Bill has been deliberately kept wide so that the government has the power to regulate all means of telecommunication in order to prevent mischief and illegal activities, the problem arises with the onerous language of section 3(1) which makes it compulsory to obtain an authorisation from the Central Government for any and all telecommunication services, unless specifically exempted under section 3(3).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In simpler words the Bill not only seeks to regulate all communication services, but requires government permission to provide such services in the first place. Such an approach has the very likely potential to hamper future telecom innovation especially in light of the fact that the penalty for not obtaining permission is imprisonment upto 3 years as well as fine of upto Rs. 2 crores.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such a wide definition leads to ambiguity and lack of regulatory certainty to businesses as well as users participating in the ecosystem. This proposal triggers immediate concerns, particularly a confusing definition of telecommunication services which may also incorporate the provision of a broad range of digital and online services. Such a wide definition could lead to confusion and arbitrary implementation on one hand, and if made applicable to the content layer of the internet architecture stifle innovation in the digital ecosystem due to onerous licensing/registration requirements on the other hand. It is also pertinent to note that some of the internet-based services listed in the definition in 2(21) are already regulated under the Information Technology (IT) Act 2000. For example, the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 regulates intermediaries, including the significant social media intermediaries (SSMI) such as Facebook and Twitter. Putting an additional regulatory burden on these service layer companies will hamper innovation and competitiveness of the sector and also amount to regulatory overreach.&lt;/p&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Power of authorisation and assignment&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;&lt;/ol&gt; &lt;ol type="1"&gt;&lt;/ol&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Section 3 (7) -&lt;/b&gt; &lt;i&gt;Any authorised entity which provides such telecommunication services as &lt;/i&gt;&lt;i&gt;may be notified by the Central Government, shall identify the person to whom it provides telecommunication services through use of any verifiable biometric based identification as may be prescribed.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All services do not require a biometric based identification of the person. While  there is a legitimate need to verify a person in the case of financial transactions, however a similar level of scrutiny is not warranted for applications that a person might use once, or applications that do not pose a threat. For example the need to verify a person through Know Your Customer (KYC) or otherwise for an application to order food, or an application which is meant for communication can be excessive regulation. In addition to the enhanced burden of collecting and storing this data that will come on the telecommunication service, there will also be the added requirement to maintain strict data protection and security measures under the Digital Personal Data Protection Act 2023. Furthermore, as has been seen in multiple instances of data breaches and cyber security attacks such as the one at AIIMS&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Justpay&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; demonstrate that both public and private organisations can be affected by cyber attacks. It is therefore  advisable to reduce the number of entities that store and collect sensitive personal data such as biometric information in the interest of privacy as well as national security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court while looking at the constitutionality of the Aadhaar Act upheld the need for banking and financial institutions to require an individual’s Aadhaar number stating the legitimate aim of preventing money laundering; however, the Court struck down the provision that required any private entity to collect Aadhaar details. Justice Bhushan held that the collection by private entities violated the right to privacy, by failing the first prong of the test laid down in Puttaswamy judgement, the test of legality.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More importantly, through the requirement of ‘verifiable biometric based identification’, the Bill is likely to nudge telecom service providers to incorporate Aadhar Based identification, even though the Indian Supreme Court in 2018 held that  the mandatory linking of mobile connections with biometric identification is unlawful.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;Standards, Public Safety, National Security and Protection of Telecommunication Networks&lt;/h3&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol type="1"&gt;&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Power to notify standards&lt;/b&gt;&lt;/p&gt;
&lt;ol type="1"&gt;&lt;/ol&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Section 19 (f)&lt;/b&gt; The power to notify standards and conformity measures on encryption is a sweeping power that allows the central government to potentially request for backdoors on encryption, or ask for alternatives to end to end encryption such as client side scanning, which have been critiqued&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; as measures that undermine privacy for all users. If the objective is to provide recommendations for certain encryption techniques when dealing with sensitive government data, a more specific compliance certification can be issued to such firms. For example, the United States government mandates certain government agencies to comply with the Federal Information Processing Standards (FIPS)&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; which also apply to non-government firms holding government contracts. Standards like FIPS recommend specific cryptographic modules to ensure secure communication of sensitive data. Such conditions and cases must be explicitly scoped in defining the standard setting powers of government with regard to encryption, in consultation with the industry and civil society organisations.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol type="1"&gt;&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Provisions for public emergency or public safety&lt;/b&gt;&lt;/p&gt;
&lt;ol type="1"&gt;&lt;/ol&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Section 20(2) (a) -&lt;/b&gt; Messaging apps such as WhatsApp and Signal enable end to end encryption, where messages are encrypted on endpoints such as user devices. Service providers and intermediaries cannot decrypt messages. Requiring messages to be amenable to disclosure in an 'intelligible format' is technically impossible within the end to end paradigm of privacy engineering&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. Technical means of disclosing the contents of messages can either reside on a user’s device, in a middle-box that mediates communication, or on servers where some computation can occur. Restructuring end-to-end encrypted communication networks to facilitate these technical means of disclosure would result in the creation of potential points of vulnerability and encryption backdoors. These vulnerabilities can be exploited by malicious actors and backdoors act as ‘intentional vulnerabilities’&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; that can be used for excessive surveillance of communication that users believe to be private.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 20 (2) states the grounds for which such information may be sought. These include sovereignty and integrity of India, defence and security of the State, friendly relations with foreign States, and public order. Prima facie, these may appear to be reasonable grounds for facilitating government access, however, the current phrasing is too wide and leaves room for an expansive interpretation. This is particularly true for maintenance of “public order” that is routinely invoked in a variety of situations.&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; According to research conducted in 2021 by Vrinda Bhandari and others on the “Use and Misuse of Section 144 found orders issued under the guise of public order restrictions to regulate a variety of activities, many of which would not qualify as illegal activities per se. For instance, orders were issued to prohibit flying of hot air balloons, unmanned aerial vehicles, unmanned aircraft systems, use of “special” or “metallic”  manjhas to fly kites and carrying tiffin boxes inside cinemas.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; And tracing encrypted messages to thwart such perceived public order threats would be excessive and disproportionate. The order to intercept, detain, disclose or suspend a communication made between private individuals, acts as a violation of privacy and provides extensive grounds to surveil people.&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These grounds may be used to intercept or monitor all communication where a particular word or set of words is used. And its implementation would require communication of all users to be monitored effectively leading to a lower degree of privacy for all users&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; - including internet communication based apps due to definitional ambiguity.  The Supreme Court has held that any infringement of the right to privacy should be proportionate to the need for such interference.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The judgement in the Puttaswamy case provides some guidance to assess the limits and scope of the constitutional right to privacy in the form of the three prong test. The test requires the existence of a law, a legitimate state interest and the restriction (to privacy) should be ‘proportionate'. This provision violates a user’s fundamental right to privacy since it fails to meet the proportionality requirement as laid down by the Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 20 (2) (b) provides for suspension of telecommunication service or class of services on similar grounds. The Bill empowers the DoT to suspend telecommunication services and if applicable to internet based communication services such as WhatsApp, Signal, among others without the need for any judicial oversight or procedural safeguards as enunciated by the Supreme Court in Anuradha Bhasin vs Union Of India. The provision must incorporate an independent oversight mechanism for such orders and also incorporate safeguards laid down by the Supreme Court in the Anuradha Bhasin judgement&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; to prevent arbitrary, frequent, and prolonged suspension of telecommunication services in India.&lt;/p&gt;
&lt;h3&gt;Protection of users&lt;/h3&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ol type="1"&gt;&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Measures for protection of users&lt;/b&gt;&lt;/p&gt;
&lt;ol type="1"&gt;&lt;/ol&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Section 28 - &lt;/b&gt;This section should also provide mechanisms for de-registering from “specific messages” . While this section mentions the need for prior consent of users for receiving the specified messages/ class of specified messages, it should look at the full spectrum of rights the Digital Personal Data Protection Act 2023 provides, which includes the right to withdraw consent. Hence we suggest that Section 28(3) adds that the authorised entity providing telecommunication services shall establish an online mechanism for withdrawal of consent, in addition to grievance redressal.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol type="1"&gt;&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Duty of users &lt;/b&gt;&lt;/p&gt;
&lt;ol type="1"&gt;&lt;/ol&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Section 29 - &lt;/b&gt;While listing out the duties of the users the Act puts the onus on the user to furnish correct information. It fails to take into account instances where the information is fed into the system by third parties, due to issues of access and literacy on the part of the users. While the section heading states “duty of the user” the preceding text “no user shall” has the potential to penalise users for acts carried out without a malicious intent. Additionally,  there is also a need to look at how notices and terms and conditions   of most telecommunication services are primarily in English, making it even more difficult for a large number of Indian users to read and hence understand the requirements. Furthermore,   the associated penalty for failing to comply with these provisions are, i.e. up to INR 25,000 for the first offence and for the second or subsequent offences, up to INR 50,000 for every day till the contravention continues. Considering the low digital literacy rates, the government would be well advised to reconsider imposition of such hefty fines.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If applicable on internet based services, this will also impact the ability of a user to retain anonymity over the internet. Individuals may choose to remain anonymous online for a number of reasons. It is important to understand that an individual may remain anonymous for a variety of legitimate purposes such as expressing opinions about their employers and whistleblowers, providing anonymous tips to newspapers or law enforcement, expressing political opinions and criticism that may be subject to persecution, or simply someone saying something that they may be embarrassed about. &lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In India, in particular, an individual’s caste can be identified from their name, and they may choose to remain anonymous or adopt a pseudonym to escape centuries of stigma and discrimination that their communities have faced. The broad definition of telecommunication services as elaborated above places restrictions on anonymity online and severely degrades an individual’s ability to exercise their fundamental right to freedom of expression.&lt;/p&gt;
&lt;div&gt;
&lt;hr /&gt;
&lt;br /&gt;
&lt;div id="ftn1"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;Business Today Desk, “Cyber attack at AIIMS Delhi: Hackers demand Rs 200 cr in crypto, says report” &lt;i&gt;Business Today,&lt;/i&gt; 22 November 2022, https://www.businesstoday.in/latest/in-focus/story/cyber-attack-at-aiims-delhi-hackers-demand-rs-200-cr-in-crypto-says-report-354475-2022-11-28.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;Ashwin Manikandan, Anandi Chandrashekhar, “Juspay Data Leak fallout: RBI swings into action to curb cyberattacks”, &lt;i&gt;The Economic Times, &lt;/i&gt;6 January  2021, https://economictimes.indiatimes.com/tech/technology/juspay-data-leak-fallout-rbi-swings-into-action-to-curb-cyberattacks/articleshow/80125430.cms&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “Judgement in Plain English Constitutionality of Aadhaar Act”, “&lt;i&gt;Supreme Court Observer&lt;/i&gt;, accessed 22 December 2023,https://www.scobserver.in/reports/constitutionality-of-aadhaar-justice-k-s-puttaswamy-union-of-india-judgment-in-plain-english/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “Why Adding Client-Side Scanning Breaks End-To-End Encryption”, &lt;i&gt;The Electronic Freedom Foundation&lt;/i&gt;, accessed 22 December 2023, https://www.eff.org/deeplinks/2019/11/why-adding-client-side-scanning-breaks-end-end-encryption.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “Compliance FAQs: Federal Information Processing Standards (FIPS)”, NIST, accessed December 22 2023. https://www.nist.gov/standardsgov/compliance-faqs-federal-information-processing-standards-fips&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “Personal Data in the Cloud Is Under Siege. End-to-End Encryption Is Our Most Powerful Defense.”, &lt;i&gt;Lawfare,&lt;/i&gt; accessed 22 December 2023, https://www.lawfaremedia.org/article/personal-data-in-the-cloud-is-under-siege.-end-to-end-encryption-is-our-most-powerful-defense&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “Breaking Encryption Myths”, &lt;i&gt;Global Encryption Coalition,&lt;/i&gt; accessed 22 December 2023, https://www.globalencryption.org/2020/11/breaking-encryption-myths/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Smriti Parsheera “Political misinformation is a problem. But asking WhatsApp to risk user privacy is the wrong solution”,&lt;i&gt; The Indian Express,&lt;/i&gt; October 28 202 &lt;a href="https://indianexpress.com/article/opinion/editorials/remedy-worse-than-malaise-9002600/"&gt;https://indianexpress.com/article/opinion/editorials/remedy-worse-than-malaise-9002600/&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Vrinda Bhandari, &lt;i&gt;et al, &lt;/i&gt;The Use and Misuse of Section 144 Cr.P.C, https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID4404496_code2801004.pdf?abstractid=4389147&amp;amp;mirid=1&amp;amp;type=2&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;CIS’ Comments to the (Draft) Indian Telecommunication Bill 2022 &lt;i&gt;“Centre for Internet and Society, &lt;/i&gt;accessed 22 December 2023 https://cis-india.org/telecom/blog/cis-comments-to-draft-indian-telecom-bill-2022#:~:text=Comment%3A%20The%20draft%20bill%20attempts,power%20over%20the%20local%20government.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Telecommunications Bill, 2023,&lt;i&gt; PRS Legislative Research,&lt;/i&gt; accessed 22 December 2023, https://prsindia.org/billtrack/the-telecommunication-bill-2023&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Justice K.S. Puttaswamy (Retd) vs Union of India, W.P.(Civil) No 494 of 2012, Supreme Court of India, September 26, 2018.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Writ Petition (Civil) NO. 1031   OF    2019, accessed 22 Decmber 2023, &lt;a href="https://main.sci.gov.in/supremecourt/2019/28817/28817_2019_2_1501_19350_Judgement_10-Jan-2020.pdf"&gt;https://main.sci.gov.in/supremecourt/2019/28817/28817_2019_2_1501_19350_Judgement_10-Jan-2020.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;Palme, Jacob, and Mikael Berglund. &lt;i&gt;"Anonymity on the Internet&lt;/i&gt;." Accessed 22 December  2023: 2009.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/cis-comments-to-the-telecommunications-bill-2023'&gt;https://cis-india.org/telecom/blog/cis-comments-to-the-telecommunications-bill-2023&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Isha Suri, Nishant Shankar, Shweta Mohandas, and Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2024-01-06T01:21:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019">
    <title> Comments to the Personal Data Protection Bill 2019</title>
    <link>https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019</link>
    <description>
        &lt;b&gt;The Personal Data Protection Bill, 2019 was introduced in the Lok Sabha on December 11, 2019. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Please view our general comments below, or download as PDF &lt;a href="https://cis-india.org/accessibility/blog/cis-general-comments-to-the-pdp-bill-2019" class="internal-link" title="CIS' General Comments to the PDP Bill 2019"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;Our comments and recommendations can be downloaded as PDF &lt;a href="https://cis-india.org/accessibility/blog/cis-comments-pdp-bill-2019" class="internal-link" title="CIS Comments PDP Bill 2019"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;We have also prepared an annotated version of the Bill, where our detailed comments and recommendations can be viewed alongside the Bill, available as PDF &lt;a href="https://cis-india.org/accessibility/blog/annotated-ver-pdp-bill-2019" class="internal-link" title="Annotated ver PDP Bill 2019"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;h2&gt;General Comments&lt;/h2&gt;
&lt;h3&gt;1. Executive notification cannot abrogate fundamental rights &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;In 2017, the Supreme Court in K.S. Puttaswamy v Union of India [1] held the right to privacy to be a fundamental right. While this right is subject to reasonable restrictions, the restrictions have to meet a three fold requirement, namely (i) existence of a law; (ii) legitimate state aim; (iii) proportionality.Under the 2018 Bill, the exemption to government agencies for processing of personal data from the provisions of the Bill in the ‘interest of the security of the State’ [2] was subject to a law being passed by Parliament. However, under Clause 35 of the present Bill, the Central Government is merely required to pass a written order exempting the government agency from the provisions of the Bill.Any restriction on the right to privacy will have to comply with the conditions prescribed in Puttaswamy I. An executive order issued by the central government authorising any agency of the government to process personal data does not satisfy the first requirement laid down by the Supreme Court in Puttaswamy I — as it is not a law passed by Parliament. The Supreme Court while deciding upon the validity of Aadhar in K.S. Puttaswamy v Union of India [3] noted that “an executive notification does not satisfy the requirement of a valid law contemplated under Puttaswamy. A valid law in this case would mean a law passed by Parliament, which is just, fair and reasonable. Any encroachment upon the fundamental right cannot be sustained by an executive notification.”&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;2. Exemptions under Clause 35 do not comply with the legitimacy and proportionality test&lt;/h3&gt;
&lt;p&gt;The lead judgement in Puttaswamy I while formulating the three fold test held that the restraint on privacy emanate from the procedural and content based mandate of Article 21 [4]. The Supreme Court in Maneka Gandhi v Union India [5] had clearly established that “mere prescription of some kind of procedure cannot ever meet the mandate of Article 21. The procedure prescribed by law has to be fair, just and reasonable, not fanciful,  oppressive and arbitrary” [6]. The existence of a law is the first requirement; the second requirement is that of ‘legitimate state aim’. As per the lead judgement this requirement ensures that “the nature and content of the law which imposes the restriction falls within the zone of reasonableness mandated by Article 14, which is  a guarantee against arbitrary state action” [7]. It is established that for a provision which confers upon the executive or administrative authority discretionary powers to be regarded as non-arbitrary, the provision should lay down clear and specific guidelines for the executive to exercise  the power [8]. The third test to be complied with is that the restriction should be ‘proportionate,’ i.e. the means that are adopted by the legislature are proportional to the object and needs sought to be fulfilled by the law. The Supreme Court in Modern Dental College &amp;amp; Research Centre v State of Madhya Pradesh [9] specified the components of proportionality standards —&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;A measure restricting a right must have a legitimate goal;&lt;/li&gt;
&lt;li&gt;It must be a suitable means of furthering this goal;&lt;/li&gt;
&lt;li&gt;There must not be any less restrictive, but equally effective alternative; and&lt;/li&gt;
&lt;li&gt;The measure must not have any disproportionate impact on the right holder&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;Clause 35 provides extensive grounds for the Central Government to exempt any agency from the requirements of the bill but does not specify the procedure to be followed by the agency while processing personal data under this provision. It merely states that the ‘procedure, safeguards and oversight mechanism to be followed’ will be prescribed in  the rules.The wide powers conferred on the central government without clearly specifying the procedure may be contrary to the three fold test laid down in Puttaswamy I, as it is difficult to ascertain whether a legitimate or proportionate objective is being fulfilled [10].&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;3. Limited powers of Data Protection Authority in comparison with the Central Government&lt;/h3&gt;
&lt;p&gt;In comparison with the last version of the Personal Data Protection Bill, 2018 prepared by the Committee of Experts led by Justice Srikrishna, we witness an abrogation of powers of the Data Protection Authority (Authority), to be created, in this Bill. The powers and functions that were originally intended to be performed by the Authority have now been allocated to the Central Government. For example:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;In the 2018 Bill, the Authority had the power to notify further categories of sensitive personal data. Under the present Bill, the Central Government in consultation with the sectoral regulators has been conferred the power to do so.&lt;/li&gt;
&lt;li&gt;Under the 2018 Bill, the Authority had the sole power to determine and notify significant data fiduciaries, however, under the present Bill, the Central Government has in consultation with the Authority been given the power to notify social media intermediaries as significant data fiduciaries.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;In order to govern data protection effectively, there is a need for a responsive market regulator with a strong mandate and resources. The political nature of the personal data also requires that the governance of data, particularly the rule-making and adjudicatory functions performed by the Authority are independent of the Executive.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;4. No clarity on data sandbox&lt;/h3&gt;
&lt;p&gt;The Bill contemplates a sandbox for “ innovation in artificial intelligence, machine-learning or any other emerging technology in public interest.” A Data Sandbox is a non-operational environment where the analyst can model and manipulate data inside the data management system. Data sandboxes have been envisioned as a secure area where only a copy of the company’s or participant companies’ data is located [11]. In essence, it refers to the scalable and creation platform which can be used to explore an enterprise’s information sets. On the other hand, regulatory sandboxes are controlled environments where firms can introduce innovations to a limited customer base within a relaxed regulatory framework, after which they may be allowed entry into the larger market after meeting certain conditions. This purportedly encourages innovation through the lowering of entry barriers by protecting newer entrants from unnecessary and burdensome regulation. Regulatory sandboxes can be interpreted as a form of responsive regulation by governments that seek to encourage innovation – they allow selected companies to experiment with solutions within an environment that is relatively free of most of the cumbersome regulations that they would ordinarily be subject to, while still subject to some appropriate safeguards and regulatory requirements. Sandboxes are regulatory tools which may be used to permit companies to innovate in the absence of heavy regulatory burdens. However, these ordinarily refer to burdens related to high barriers to entry (such as capital requirements for financial  and banking companies), or regulatory costs. In this Bill, however, the relaxing of data protection provisions for data fiduciaries would lead to restrictions of the privacy of individuals. Limitations to a fundamental rights on grounds of ‘fostering innovation’ is not a constitutional tenable position, and contradict the primary objectives of a data protection law.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;5. The primacy of ‘harm’ in the Bill ought to be reconsidered&lt;/h3&gt;
&lt;p&gt;While a harms based approach is necessary for data protection frameworks, such approaches should be restricted to the positive obligations, penal provisions and responsive regulation of the Authority. The Bill does not provide any guidance on either the interpretation of the term ‘harm,’ [12] or on the various activities covered within the definition of the term. Terms such as ‘loss of reputation or humiliation’ ‘any discriminatory treatment’ are a subjective standard and are open to varied interpretations. This ambiguity in the definition will make it difficult for the data principal to demonstrate harm and for the DPA to take necessary action as several provisions are based upon harm being caused or likely to be caused.Some of the significant provisions where ‘harm’ is a precondition for the provision to come into effect are —&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Clause 25: Data Fiduciary is required to notify the Authority about the breach of personal data processed by the data fiduciary, if such breach is likely to cause harm to any data principal. The Authority after taking into account the severity of the harm that may be caused to the data principal will determine whether the data principal should be notified about the breach.&lt;/li&gt;
&lt;li&gt;Clause 32 (2): A data principal can file a complaint with the data fiduciary for a contravention of any of the provisions of the Act, which has caused or is likely to cause ‘harm’ to the data principal.&lt;/li&gt;&lt;li&gt;Clause 64 (1): A data principal who has suffered harm as a result of any violation of the provision of the Act by a data fiduciary, has the right to seek compensation from the data fiduciary.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;Clause 16 (5): The guardian data fiduciary is barred from profiling, tracking or undertaking targeted advertising directed at children and undertaking any other processing of personal data that can cause significant harm to the child.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;6. Non personal data should be outside the scope of this Bill&lt;/h3&gt;
&lt;p&gt;Clause 91 (1) states that the Act does not prevent the Central Government from framing a policy for the digital economy, in so far as such policy does not govern personal data. The Central Government can, in consultation with the Authority, direct any data fiduciary  to provide any anonymised personal data or other non-personal data to enable better targeting of delivery of services or formulation of evidence based policies in any manner as may be prescribed.It is concerning that the data protection bill has specifically carved out an exception for the Central Government to frame policies for the digital economy and seems to indicate that the government plans to freely use any and all anonymized and/or non-personal data that rests with any data fiduciary that falls under the ambit of the bill to support the digital economy including for its growth, security, integrity, and prevention of misuse. It is unclear how the government, in practice, will be able to compel organizations to share this data. Further, there is a lack of clarity on the contours of the definition of non-personal data and the Bill does not define the term. It is also unclear whether the Central Government can compel the data fiduciary to transfer/share all forms of non-personal data and the rights and obligations of the data fiduciaries and data principals over such forms of data. Anonymised data refers to data which has ‘ irreversibly’ been converted into a form in which the data principal cannot be identified. However, as several instances have shown ‘ irreversible’ anonymisation is not possible. In the United States, the home addresses of taxi drivers were uncovered and in Australia individual health records were mined from anonymised medical bills [13]. In September 2019, the Ministry of Electronics and Information Technology, constituted an expert committee under the chairmanship of Kris Gopalkrishnan to study various issues relating to non-personal data and to deliberate over a data governance framework for the regulation of such data.The provision should be deleted and the scope of the bill should be limited to protection of personal data and to provide a framework for the protection of individual privacy. Until the report of the expert committee is published, the Central Government should not frame any law/regulation on the access and monetisation of non-personal/ anonymised data nor can they create a blanket provision allowing them to request such data from any data fiduciary that falls within the ambit of the bill. If the government wishes to use data resting with a data fiduciary; it must do so on a case to case basis and under formal and legal agreements with each data fiduciary.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;7. Steps towards greater decentralisation of power&lt;/h3&gt;
&lt;p&gt;We propose the following steps towards greater decentralisation of powers and devolved jurisdiction —&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Creation of State Data Protection Authorities: A single centralised body may not be the appropriate form of such a regulator. We propose that on the lines of central and state commissions under the Right to Information Act, 2005, state data protection authorities are set up which are in a position to respond to local complaints and exercise jurisdiction over entities within their territorial jurisdictions.&lt;/li&gt;
&lt;li&gt;More involvement of industry bodies and civil society actors: In order to lessen the burden on the data protection authorities it is necessary that there is active engagement with industry bodies, sectoral regulators and civil society bodies engaged in privacy research. Currently, the Bill provides for involvement of industry or trade association, association representing the interests of data principals, sectoral regulator or statutory Authority, or an departments or ministries of the Central or State Government in the formulation of codes of practice. However, it would be useful to also have a more active participation of industry associations and civil society bodies in activities such as promoting  awareness among data fiduciaries of their obligations under this Act, promoting measures and undertaking research for innovation in the field of protection of personal data.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;8. The Authority must be empowered to exercise responsive regulation&lt;/h3&gt;
&lt;p&gt;In a country like India, the challenge is to move rapidly from a state of little or no data protection law, and consequently an abysmal state of data privacy practices to a strong data protection regulation and a powerful regulator capable of enabling a state of robust data privacy practices. This requires a system of supportive mechanisms to the stakeholders in the data ecosystem, as well as systemic measures which enable the proactive detection of breaches. Further, keeping in mind the limited regulatory capacity in India, there is a need for the Authority to make use of different kinds of inexpensive and innovative strategies.We recommend the following additional powers for the Authority to be clearly spelt out in the Bill —&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Informal Guidance: It would be useful for the Authority to set up a mechanism on the lines of the Security and Exchange Board of India (SEBI)’s Informal Guidance Scheme, which enables regulated entities to approach the Authority for non-binding advice on the position of law. Given that this is the first omnibus data protection law in India, and there is very little jurisprudence on the subject from India, it would be extremely useful for regulated entities to get guidance from  the regulator.&lt;/li&gt;
&lt;li&gt;Power to name and shame: When a DPA makes public the names of organisations that have seriously contravened data protection legislation, this is a practice known as “naming and shaming.”  The UK ICO and other DPAs recognise the power of publicity, as evidenced by their willingness to co-operate  with the media. The ICO does not simply post monetary penalty notices (MPNs or fines) on its websites for journalists to find, but frequently issues press releases, briefs journalists and uses social media. The ICO’s publicity statement on communicating enforcement activities states that the “ICO aims to get media coverage for  enforcement activities.”&lt;/li&gt;
&lt;li&gt;Undertakings: The UK ICO has also leveraged the threats of fines into an alternative enforcement mechanism seeking contractual undertakings from data controllers to take certain remedial steps. Undertakings have significant advantages for the regulator. Since an undertaking is a more “co-operative”solution, it is less likely that a data controller will change it. An undertaking is simpler and easier to put in place. Furthermore, the Authority can put an undertaking in place quickly as opposed to legal proceedings which are longer.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;9. No clear roadmap for the implementation of the Bill&lt;/h3&gt;
&lt;p&gt;The 2018 Bill had specified a roadmap for the different provisions of the Bill to come into effect from the date of the Act being notified [14]. It specifically stated the time period within which the Authority had to be established and the subsequent rules and regulations notified.The present Bill does not specify any such blueprint; it does not provide any details on either when the Bill will be notified or the time period within within which the Authority shall be established and specific rules and regulations notified. Considering that 25 provisions have been deferred to rules that have to be framed by the Central Government and a further 19 provisions have been deferred to the regulations to be notified by the Authority the absence and/or delayed notification of such rules and regulations will impact the effective functioning of the Bill.The absence of any sunrise or sunset provision may disincentivise political or industrial will to support or enforce the provisions of the Bill. An example of such a lack of political will was the establishment of the Cyber Appellate Tribunal. The tribunal was established in 2006 to redress cyber fraud. However, it was virtually a defunct body from 2011 onwards when the last chairperson retired. It was eventually merged with the Telecom Dispute Settlement and Appellate Tribunal in 2017.We recommend that Bill clearly lays out a time period for the implementation of the different provisions of the Bill, especially a time frame for the establishment of the Authority. This is important to give full and effective effect to the right of privacy of the &lt;br /&gt;individual. It is also important to ensure that individuals have an effective mechanism  to enforce the right and seek recourse in case of any breach of obligations by the  data fiduciaries.For offences, we suggest a system of mail boxing where provisions and punishments are enforced in a staggered manner, for a period till the fiduciaries are aligned with the provisions of the Act. The Authority must ensure that data principals and fiduciaries have sufficient awareness of the provisions of this Bill before bringing the provisions for punishment are brought into force. This will allow the data fiduciaries to align their practices with the provisions of this new legislation and the Authority will also have time to define and determine certain provisions that the Bill has left the Authority to define. Additionally enforcing penalties for offences initially must be in a staggered process, combined with provisions such as warnings, in order to allow first time and mistaken offenders from paying a high price. This will relieve the fear of smaller companies and startups who might fear processing data for the fear of paying penalties for offences.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;10. Lack of interoperability&lt;/h3&gt;
&lt;p&gt;In its current form, a number of the provisions in the Bill will make it difficult for India’s framework to be interoperable with other frameworks globally and in the region. For example, differences between the draft Bill and the GDPR can be found in the grounds for processing,&amp;nbsp; data localization frameworks, the framework for cross border transfers, definitions of sensitive personal data, inclusion of&amp;nbsp; the undefined category of ‘critical&amp;nbsp; data’, and the roles of the authority and the central government.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;11. Legal Uncertainty&lt;/h3&gt;
&lt;p&gt;In its current structure, there are a number of provisions in the Bill that, when implemented, run the risk of creating an environment of legal uncertainty. These include: lack of definition of critical data, lack of clarity in the interpretation of the terms ‘harm’ and ‘significant harm’, ability of the government to define further categories of sensitive personal data,&amp;nbsp; inclusion of requirements for ‘social media intermediaries’, inclusion of ‘non-personal data’, framing of the requirements for data transfers, bar on processing of certain forms of biometric data as defined by the Central Government, the functioning between a consent manager and another data fiduciary, the inclusion of an AI sandbox and the definition of state. To ensure the greatest amount of protection of individual privacy rights and the protection of personal data while also enabling innovation, it is important that any data protection framework is structured and drafted in a way to provide as much legal certainty as possible.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Endnotes&lt;/h3&gt;
&lt;p&gt;1. (2017) 10 SCC 641 (“Puttaswamy I”).&lt;/p&gt;
&lt;p&gt;2. Clause 42(1) of the 2018 Bill states that “Processing of personal data in the interests of the security of the State shall not be permitted unless it is authorised pursuant to a law, and is in accordance with the procedure established by such law, made by Parliament and is necessary for, and proportionate to such interests being achieved.”&lt;/p&gt;
&lt;p&gt;3. (2019) 1 SCC 1 (“Puttaswamy II”)&lt;/p&gt;
&lt;p&gt;4. Puttaswamy I, supra, para 180.&lt;/p&gt;
&lt;p&gt;5. (1978) 1 SCC 248.&lt;/p&gt;
&lt;p&gt;6. Ibid para 48.&lt;/p&gt;
&lt;p&gt;7. Puttaswamy I supra para 180.&lt;/p&gt;
&lt;p&gt;8. State of W.B. v. Anwar Ali Sarkar, 1952 SCR 284; Satwant Singh Sawhney v A.P.O AIR 1967 SC1836.&lt;/p&gt;
&lt;p&gt;9. (2016)7 SCC 353.&lt;/p&gt;
&lt;p&gt;10. Dvara Research “Initial Comments of Dvara Research dated 16 January 2020 on the Personal Data Protection Bill, 2019 introduced in Lok Sabha on 11 December 2019”, January 2020, https://www.dvara.com/blog/2020/01/17/our-initial-comments-on-the-personal-data-protection-bill-2019/ (“Dvara Research”).&lt;/p&gt;
&lt;p&gt;11. “A Data Sandbox for Your Company”, Terrific Data, last accessed on January 31, 2019, http://terrificdata.com/2016/12/02/3221/.&lt;/p&gt;
&lt;p&gt;12. Clause 3(20) — “harm” includes (i) bodily or mental injury; (ii) loss, distortion or theft of identity; (ii) financial loss or loss of property; (iv) loss of reputation or humiliation; (v) loss of employment; (vi) any discriminatory treatment; (vii) any subjection to blackmail or extortion; (viii) any denial or withdrawal of service,benefit or good resulting from an evaluative decision about the data principal; (ix) any restriction placed or suffered directly or indirectly on speech, movement or any other action arising out of a fear of being observed or surveilled; or (x) any observation or surveillance that is not reasonably expected by the data principal.&lt;/p&gt;
&lt;p&gt;13. Alex Hern “Anonymised data can never be totally anonymous, says study”, July 23, 2019 https://www.theguardian.com/technology/2019/jul/23/anonymised-data-never-be-anonymous-enough-study-finds.&lt;/p&gt;
&lt;p&gt;14. Clause 97 of the 2018 Bill states“(1) For the purposes of this Chapter, the term ‘notified date’ refers to the date notified by the Central Government under sub-section (3) of section 1. (2)The notified date shall be any date within twelve months from the date of enactment of this Act. (3)The following provisions shall come into force on the notified date-(a) Chapter X; (b) Section 107; and (c) Section 108. (4)The Central Government shall, no later than three months from the notified date establish the Authority. (5)The Authority shall, no later than twelve months from the notified date notify the grounds of processing of personal data in respect of the activities listed in sub-section (2) of section 17. (6)The Authority shall no, later than twelve months from the date notified date issue codes of practice on the following matters-(a) notice under section 8; (b) data quality under section 9; (c) storage limitation under section 10; (d) processing of personal data under Chapter III; (e) processing of sensitive personal data under Chapter IV; (f ) security safeguards under section 31; (g) research purposes under section 45; (h) exercise of data principal rights under Chapter VI; (i) methods of de-identification and anonymisation; (j) transparency and accountability measures under Chapter VII. (7)Section 40 shall come into force on such date as is notified by the Central Government for the purpose of that section.(8)The remaining provision of the Act shall come into force eighteen months from the notified date.”&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019'&gt;https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha, Elonnai Hickok, Pallavi Bedi, Shweta Mohandas, Tanaya Rajwade</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2020-02-21T10:13:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/comments-to-the-pdp-bill-2019">
    <title>Comments to The PDP Bill 2019</title>
    <link>https://cis-india.org/internet-governance/comments-to-the-pdp-bill-2019</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/comments-to-the-pdp-bill-2019'&gt;https://cis-india.org/internet-governance/comments-to-the-pdp-bill-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>akash</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-02-12T11:52:11Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-to-national-security-council-on-national-cybersecurity-strategy-2020">
    <title>Comments to National Security Council on National Cybersecurity Strategy 2020</title>
    <link>https://cis-india.org/internet-governance/blog/comments-to-national-security-council-on-national-cybersecurity-strategy-2020</link>
    <description>
        &lt;b&gt;CIS submitted brief  comments to the National Security Council on the National Cybersecurity Strategy within the 5000 character limit provided. CIS will continue producing outputs building on these ideas.&lt;/b&gt;
        
&lt;h2&gt;Approach and Key Principles:&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;India’s 2020 strategy will need to account for key vectors that have come to define cyberspace including:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Increased power held by non-state actors - both private corporations and terrorist groups&lt;/li&gt;&lt;li&gt;Augmented capacity of states to use cyberspace as a tool of external power projection-both through asymmetric warfare, and alleged interference via the spread of misinformation&lt;/li&gt;&lt;li&gt;The  progression of norms formulation processes in cyberspace that have failed to attain consensus due to disagreement on the application of specific standards of International Law to cyberspace.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The 2020 framework should&amp;nbsp; be grounded in:&lt;/div&gt;
&lt;ol&gt;&lt;li&gt;&lt;strong&gt;Legality&lt;/strong&gt;: Capabilities, measures, and processes for cyber security must be&amp;nbsp; legally defined and backed.&amp;nbsp; &lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Necessity and Proportionality&lt;/strong&gt;: Any measure taken for the purpose of&amp;nbsp; ‘cyber security’ that might have implications for fundamental rights&amp;nbsp; must be necessary, and proportionate to the infringement.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Transparency&lt;/strong&gt;: Transparency must be a key principle with clear standards to resolve&amp;nbsp; situations where there is a conflict of interests. &lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Accountability and Oversight: Capabilities&lt;/strong&gt;, measures and processes must be held accountable through capable and funded bodies and mechanisms. &lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Human Rights&lt;/strong&gt;:&amp;nbsp; Security of the individual, the community, society, and the nation must be achieved through through promoting a ‘feeling of being secure’ that must stem from a rights-respecting framework.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Free and fair digital economy&lt;/strong&gt;: Pursue both domestic and geo-strategic policies and actions that enable a free and fair digital economy.&amp;nbsp;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The strategy should be based on the following:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;strong&gt;Evidence based&lt;/strong&gt;: Regular audits of the state of cyber security in India to inform action and policy.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Appropriate metrics:&lt;/strong&gt; Key metrics are needed to measure, track, and communicate&amp;nbsp; cyber security in India. &lt;/li&gt;&lt;li&gt;&lt;strong&gt;Funding:&lt;/strong&gt; Funding for cyber security needs to be built into the budget.&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h2&gt;Pillars of Strategy&lt;/h2&gt;
&lt;h3&gt;Secure &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Key Defensive Measures: &lt;/strong&gt;Technical defense measures such as:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Testing and auditing of hardware and software&lt;/li&gt;&lt;li&gt;Identification of threat intelligence vectors and existing vulnerabilities, particularly in systems designated as Critical Information Infrastructure (CII)&lt;/li&gt;&lt;li&gt;Outline scenarios in which retaliatory operations may be taken and their nature,scope and limits&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Designing a credible deterrence strategy, &lt;/strong&gt;which includes:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Articulation of the nature, scale and permissible limits of retaliatory or escalatory measures undertaken AND&lt;/li&gt;&lt;li&gt;An exposition of how this matches with&amp;nbsp; the application of key tenets of International Law in cyberspace&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Offensive Measures: &lt;/strong&gt;If India pursues cyber offensive capabilities, this must be done in accordance with the principles&amp;nbsp; articulated above. This includes ensuring that the surveillance regime in India is inline with international human rights norms.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Emerging Technologies&lt;/strong&gt;: Emerging technologies must meet high security standards before they are scaled and deployed.&amp;nbsp; Creation of sandboxes should not be an exception.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Developing attribution capabilities&lt;/strong&gt;: If India pursues attribution capabilities,&amp;nbsp; this must be through multi-stakeholder collaboration, should not risk military escalation, and must demonstrate compliance with evidentiary requirements of Indian criminal law and requirements in International Law on State Responsibility.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Process for response&lt;/strong&gt;: Define clear roles for the response protocol to a cyber attack including detection, mitigation and response.&lt;/p&gt;
&lt;h3&gt;Strengthen&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Regulatory Requirements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Legal and Technical Security Standards: Develop harmonised and robust legal and technical security standards across sectors for crucial issues - encryption and breach notifications etc. Promote industry wide adoption of standards developed by BIS and encourage participation at standard setting fora.&lt;/li&gt;&lt;li&gt;Cross border sharing of data: Focus on a solution to the MLAT process - potentially including the negotiation of an executive agreement under the CLOUD Act.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;p&gt;&lt;strong&gt;Coordinated Vulnerability Disclosure&lt;/strong&gt;: Improve the processes for disclosing security vulnerabilities to the Government by stakeholders outside the government.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Incentives&lt;/strong&gt;: Develop incentives for strong cyber security practices such as cyber insurance programmes, certifications and seals, and tax incentives.&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Education and End User Awareness&lt;/strong&gt;: Develop solutions to aid users to understand and manage their digital security.&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;&lt;strong&gt;Harmonization and interoperability&lt;/strong&gt;: Harmonize legislation, legal provisions, and department mandates and processes related to cyber security.&lt;/p&gt;
&lt;h3&gt;Synergise&lt;/h3&gt;
&lt;p&gt;Engage in processes at the regional and global level to prevent potential misunderstandings, define shared understandings, and identify areas of collaboration. This can take place through:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Norms&lt;/strong&gt;: Clarify India’s understanding of the applicability of international law to cyber space and engage in norms processes and contribute to the articulation of&amp;nbsp; a development dimension for cyber norms.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;CBMs&lt;/strong&gt;: Focus on political and legal&amp;nbsp; measures around transparency, cooperation, and stability in the region and globally. &lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div class="pullquote"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-to-national-security-council-on-national-cybersecurity-strategy-2020'&gt;https://cis-india.org/internet-governance/blog/comments-to-national-security-council-on-national-cybersecurity-strategy-2020&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok and Arindrajit Basu</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-01-13T09:18:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-draft-outcome-document-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10">
    <title>Comments on the Draft Outcome Document of the UN General Assembly’s Overall Review of the Implementation of WSIS Outcomes (WSIS+10)</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-draft-outcome-document-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10</link>
    <description>
        &lt;b&gt;Following the comment-period on the Zero Draft, the Draft Outcome Document of the UN General Assembly's Overall Review of implementation of WSIS Outcomes was released on 4 November 2015. Comments were sought on the Draft Outcome Document from diverse stakeholders. The Centre for Internet &amp; Society's response to the call for comments is below.&lt;/b&gt;
        &lt;p class="Normal1" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="Normal1" style="text-align: justify; "&gt;The WSIS+10 Overall Review of the Implementation of WSIS Outcomes, scheduled for December 2015, comes as a review of the WSIS process initiated in 2003-05. At the December summit of the UN General Assembly, the WSIS vision and mandate of the IGF are to be discussed. The Draft Outcome Document, released on 4 November 2015, is towards an outcome document for the summit. Comments were sought on the Draft Outcome Document. Our comments are below.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The Draft Outcome Document of the UN General Assembly’s Overall Review of the Implementation of WSIS Outcomes (“&lt;i&gt;the current Draft&lt;/i&gt;”) stands considerably altered from the Zero Draft. With references to development-related challenges, the Zero Draft covered areas of growth and challenges of the WSIS. It noted the persisting digital divide, the importance of innovation and investment, and of conducive legal and regulatory environments, and the inadequacy of financial mechanisms. Issues crucial to Internet governance such as net neutrality, privacy and the mandate of the IGF found mention in the Zero Draft.&lt;/li&gt;
&lt;li&gt;The current Draft retains these, and adds to them. Some previously-omitted issues such as surveillance, the centrality of human rights and the intricate relationship of ICTs to the Sustainable Development Goals, now stand incorporated in the current Draft. This is most commendable. However, the current Draft still lacks teeth with regard to some of these issues, and fails to address several others. &lt;/li&gt;
&lt;li&gt;In our comments to the Zero Draft, CIS had called for these issues to be addressed. We reiterate our call in the following paragraphs.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;strong&gt;(1) &lt;/strong&gt;&lt;strong&gt;ICT for Development&lt;/strong&gt;&lt;/h2&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;In the current Draft, paragraphs 14-36 deal with ICTs for development. While the draft contains rubrics like ‘Bridging the digital divide’, ‘Enabling environment’, and ‘Financial mechanisms’, the following issues are unaddressed:&lt;/li&gt;
&lt;li&gt;Equitable development for all;&lt;/li&gt;
&lt;li&gt;Accessibility to ICTs for persons with disabilities;&lt;/li&gt;
&lt;li&gt;Access to knowledge and open data.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;Equitable development&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;In the &lt;a class="external-link" href="http://www.itu.int/net/wsis/docs/geneva/official/dop.html"&gt;Geneva Declaration of Principles&lt;/a&gt; (2003), two goals are set forth as the Declaration’s “ambitious goal”: (a) the bridging of the digital divide; and (b) equitable development for all (¶ 17). The current Draft speaks in detail about the bridging of the digital divide, but the goal of equitable development is conspicuously absent. At WSIS+10, when the WSIS vision evolves to the creation of inclusive ‘knowledge societies’, equitable development should be both a key principle and a goal to stand by.&lt;/li&gt;
&lt;li&gt;Indeed, inequitable development underscores the persistence of the digital divide. The current Draft itself refers to several instances of inequitable development; for ex., the uneven production capabilities and deployment of ICT infrastructure and technology in developing countries, landlocked countries, small island developing states, countries under occupation or suffering natural disasters, and other vulnerable states; lack of adequate financial mechanisms in vulnerable parts of the world; variably affordable (or in many cases, unaffordable) spread of ICT devices, technology and connectivity, etc. &lt;/li&gt;
&lt;li&gt;What underscores these challenges is the inequitable and uneven spread of ICTs across states and communities, including in their production, capacity-building, technology transfers, gender-concentrated adoption of technology, and inclusiveness. &lt;/li&gt;
&lt;li&gt;As such, it is essential that the WSIS+10 Draft Outcome Document reaffirm our commitment to equitable development for all peoples, communities and states.&lt;/li&gt;
&lt;li&gt;We suggest the following inclusion to &lt;strong&gt;paragraph 5 of the current Draft&lt;/strong&gt;:&lt;/li&gt;
&lt;/ol&gt; 
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;&lt;span style="text-align: justify; "&gt;“5. We reaffirm our common desire and commitment to the WSIS vision to build &lt;/span&gt;&lt;i style="text-align: justify; "&gt;&lt;span&gt;an equitable,&lt;/span&gt;&lt;/i&gt;&lt;span style="text-align: justify; "&gt; people-centred, inclusive, and development-oriented Information Society…”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;Accessibility for persons with disabilities&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;10. Paragraph 13 of the Geneva Declaration of Principles (2003) pledges to “pay particular attention to the special needs of marginalized and vulnerable groups of society” in the forging of an Information Society. Particularly, ¶ 13 recognises the special needs of older persons and persons with disabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;11. Moreover, ¶ 31 of the Geneva Declaration of Principles calls for the special needs of persons with disabilities, and also of disadvantaged and vulnerable groups, to be taken into account while promoting the use of ICTs for capacity-building. Accessibility for persons with disabilities is thus core to bridging the digital divide – as important as bridging the gender divide in access to ICTs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;12. Not only this, but the &lt;a class="external-link" href="http://www.itu.int/net/wsis/implementation/2014/forum/inc/doc/outcome/362828V2E.pdf"&gt;WSIS+10 Statement on the Implementation of WSIS Outcomes&lt;/a&gt; (June 2014) also reaffirms the commitment to “provide equitable access to information and knowledge for all… including… people with disabilities”, recognizing that it is “crucial to increase the participation of vulnerable people in the building process of Information Society…” (¶8).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;13. In our previous submission, CIS had suggested language drawing attention to this. Now, the current Draft only acknowledges that “particular attention should be paid to the specific ICT challenges facing… persons with disabilities…” (paragraph 11). It acknowledges also that now, accessibility for persons with disabilities constitutes one of the core elements of quality (paragraph 22). However, there is a glaring omission of a call to action, or a reaffirmation of our commitment to bridging the divide experienced by persons with disabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;14. We suggest, therefore, the addition of the following language the addition of &lt;strong&gt;paragraph 24A to the current Draft&lt;/strong&gt;. Sections of this suggestion are drawn from ¶8, WSIS+10 Statement on the Implementation of WSIS Outcomes.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;"24A. &lt;span style="text-align: justify; "&gt;Recalling the UN Convention on the rights of people with disabilities, the Geneva principles paragraph 11, 13, 14 and 15, Tunis Commitment paras 20, 22 and 24, and reaffirming the commitment to providing equitable access to information and knowledge for all, building ICT capacity for all and confidence in the use of ICTs by all, including youth, older persons, women, indigenous and nomadic peoples, people with disabilities, the unemployed, the poor, migrants, refugees and internally displaced people and remote and rural communities, it is crucial to increase the participation of vulnerable people in the building process of information Society and to make their voice heard by stakeholders and policy-makers at different levels. It can allow the most fragile groups of citizens worldwide to become an integrated part of their economies and also raise awareness of the target actors on the existing ICTs solution (such as tolls as e- participation, e-government, e-learning applications, etc.) designed to make their everyday life better. We recognise need for continued extension of access for people with disabilities and vulnerable people to ICTs, especially in developing countries and among marginalized communities, and reaffirm our commitment to promoting and ensuring accessibility for persons with disabilities. In particular, we call upon all stakeholders to honour and meet the targets set out in Target 2.5.B of the Connect 2020 Agenda that enabling environments ensuring accessible telecommunication/ICT for persons with disabilities should be established in all countries by 2020.”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;Access to knowledge and open data&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;15. The Geneva Declaration of Principles dedicates a section to access to information and knowledge (B.3). It notes, in ¶26, that a “rich public domain” is essential to the growth of Information Society. It urges that public institutions be strengthened to ensure free and equitable access to information (¶26), and also that assistive technologies and universal design can remove barriers to access to information and knowledge (¶25). Particularly, the Geneva Declaration advocates the use of free and open source software, in addition to proprietary software, to meet these ends (¶27).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;16. It was also recognized in the WSIS+10 Statement on the Implementation of WSIS Outcomes (‘Challenges-during implementation of Action Lines and new challenges that have emerged’) that there is a need to promote access to all information and knowledge, and to encourage open access to publications and information (C, ¶¶9 and 12).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;17. In our previous submission, CIS had highlighted the importance of open access to knowledge thus: “…the implications of open access to data and knowledge (including open government data), and responsible collection and dissemination of data are much larger in light of the importance of ICTs in today’s world. As Para 7 of the Zero Draft indicates, ICTs are now becoming an indicator of development itself, as well as being a key facilitator for achieving other developmental goals. As Para 56 of the Zero Draft recognizes, in order to measure the impact of ICTs on the ground – undoubtedly within the mandate of WSIS – it is necessary that there be an enabling environment to collect and analyse reliable data. Efforts towards the same have already been undertaken by the United Nations in the form of ‘Data Revolution for Sustainable Development’. In this light, the Zero Draft rightly calls for enhancement of regional, national and local capacity to collect and conduct analyses of development and ICT statistics (Para 56). Achieving the central goals of the WSIS process requires that such data is collected and disseminated under open standards and open licenses, leading to creation of global open data on the ICT indicators concerned.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;18. This crucial element is missing from the current Draft of the WSIS+10 Outcome Document. Of course, the current Draft notes the importance of access to information and free flow of data. But it stops short of endorsing and advocating the importance of access to knowledge and free and open source software, which are essential to fostering competition and innovation, diversity of consumer/ user choice and ensuring universal access.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;19. We suggest the following addition – of &lt;strong&gt;paragraph 23A to the current Draft&lt;/strong&gt;:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;"23A. &lt;span style="text-align: justify; "&gt;We recognize the need to promote access for all to information and knowledge, open data, and open, affordable, and reliable technologies and services, while respecting individual privacy, and to encourage open access to publications and information, including scientific information and in the research sector, and particularly in developing and least developed countries.”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;strong&gt;(2) &lt;/strong&gt;&lt;strong&gt;Human Rights in Information Society&lt;/strong&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;20. The current Draft recognizes that human rights have been central to the WSIS vision, and reaffirms that rights offline must be protected online as well. However, the current Draft omits to recognise the role played by corporations and intermediaries in facilitating access to and use of the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;21. In our previous submission, CIS had noted that “the Internet is led largely by the private sector in the development and distribution of devices, protocols and content-platforms, corporations play a major role in facilitating – and sometimes, in restricting – human rights online”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;22. We reiterate our suggestion for the inclusion of &lt;strong&gt;paragraph 43A to the current Draft&lt;/strong&gt;:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;"43A. &lt;span style="text-align: justify; "&gt;We recognize the critical role played by corporations and the private sector in facilitating human rights online. We affirm, in this regard, the responsibilities of the private sector set out in the Report of the Special Representative of the Secretary General on the issue of human rights and transnational corporations and other business enterprises, A/HRC/17/31 (21 March 2011), and encourage policies and commitments towards respect and remedies for human rights.”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;strong&gt;(3) &lt;/strong&gt;&lt;strong&gt;Internet&lt;/strong&gt; &lt;strong&gt;Governance&lt;/strong&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;The support for multilateral governance of the Internet&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;23. While the section on Internet governance is not considerably altered from the zero draft, there is a large substantive change in the current Draft. The current Draft states that the governance of the Internet should be “multilateral, transparent and democratic, with full involvement of all stakeholders” (¶50). Previously, the zero draft recognized the “the general agreement that the governance of the Internet should be open, inclusive, and transparent”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;24. A return to purely ‘multilateral’ Internet governance would be regressive. Governments are, without doubt, crucial in Internet governance. As scholarship and experience have both shown, governments have played a substantial role in shaping the Internet as it is today: whether this concerns the availability of content, spread of infrastructure, licensing and regulation, etc. However, these were and continue to remain contentious spaces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;25. As such, it is essential to recognize that a plurality of governance models serve the Internet, in which the private sector, civil society, the technical community and academia play important roles. &lt;strong&gt;We recommend returning to the language of the zero draft in ¶32: “open, inclusive and transparent governance of the Internet”.&lt;/strong&gt;&lt;/p&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;Governance of Critical Internet Resources&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;26. It is curious that the section on Internet governance&lt;strong&gt; &lt;/strong&gt;in both the zero and the current Draft makes no reference to ICANN, and in particular, to the ongoing transition of IANA stewardship and the discussions surrounding the accountability of ICANN and the IANA operator. The stewardship of critical Internet resources, such as the root, is crucial to the evolution and functioning of the Internet. Today, ICANN and a few other institutions have a monopoly over the management and policy-formulation of several critical Internet resources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;27. While the WSIS in 2003-05 considered this a troubling issue, this focus seems to have shifted entirely. Open, inclusive, transparent and &lt;i&gt;global&lt;/i&gt; Internet are misnomer-principles when ICANN – and in effect, the United States – continues to have monopoly over critical Internet resources. The allocation and administration of these resources should be decentralized and distributed, and should not be within the disproportionate control of any one jurisdiction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;28. Therefore, we reiterate our suggestion to add &lt;strong&gt;&lt;span&gt;paragraph 53A&lt;/span&gt;&lt;/strong&gt; after Para 53:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;"53A. &lt;span style="text-align: justify; "&gt;We affirm that the allocation, administration and policy involving critical Internet resources must be inclusive and decentralized, and call upon all stakeholders and in particular, states and organizations responsible for essential tasks associated with the Internet, to take immediate measures to create an environment that facilitates this development.”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;Inclusiveness and Diversity in Internet Governance&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;29. The current Draft, in ¶52, recognizes that there is a need to “promote greater participation and engagement in Internet governance of all stakeholders…”, and calls for “stable, transparent and voluntary funding mechanisms to this end.” This is most commendable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;30. The issue of inclusiveness and diversity in Internet governance is crucial: today, Internet governance organisations and platforms suffer from a lack of inclusiveness and diversity, extending across representation, participation and operations of these organisations. As CIS submitted previously, the mention of inclusiveness and diversity becomes tokenism or formal (but not operational) principle in many cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;31. As we submitted before, the developing world is pitifully represented in standards organisations and in ICANN, and policy discussions in organisations like ISOC occur largely in cities like Geneva and New York. For ex., 307 out of 672 registries listed in ICANN’s registry directory are based in the United States, while 624 of the 1010 ICANN-accredited registrars are US-based.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;32. Not only this, but 80% of the responses received by ICANN during the ICG’s call for proposals were male. A truly global and open, inclusive and transparent governance of the Internet must not be so skewed. Representation must include not only those from developing countries, but must also extend across gender and communities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;33. We propose, therefore, the addition of a &lt;strong&gt;&lt;span&gt;paragraph 51A&lt;/span&gt;&lt;/strong&gt; after Para 51:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;"51A. &lt;span style="text-align: justify; "&gt;We draw attention to the challenges surrounding diversity and inclusiveness in organisations involved in Internet governance, including in their representation, participation and operations. We note with concern that the representation of developing countries, of women, persons with disabilities and other vulnerable groups, is far from equitable and adequate. We call upon organisations involved in Internet governance to take immediate measures to ensure diversity and inclusiveness in a substantive manner.”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;hr size="1" style="text-align: justify; " width="33%" /&gt;
&lt;p style="text-align: justify; "&gt;Prepared by Geetha Hariharan, with inputs from Sunil Abraham and Japreet Grewal. All comments submitted towards the Draft Outcome Document may be found &lt;a class="external-link" href="http://unpan3.un.org/wsis10/Preparatory-Process-Roadmap/Comments-on-Draft-Outcome-Document"&gt;at this link&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-draft-outcome-document-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-draft-outcome-document-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICT4D</dc:subject>
    
    
        <dc:subject>Call for Comments</dc:subject>
    
    
        <dc:subject>WSIS+10</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Human Rights Online</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    
    
        <dc:subject>Open Source</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2015-11-18T06:33:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-communications-policy">
    <title>Comments on the Draft Digital Communications Policy</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-communications-policy</link>
    <description>
        &lt;b&gt;This submission presents comments by the Centre for Internet &amp; Society, India (“CIS”) on the Draft Digital Communications Policy which was released to the public by the Department of Telecommunications of the Ministry of Communications on 1st May 2018 for comments and views.

&lt;/b&gt;
        
&lt;h2&gt;Preliminary&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;On 1st May 2018, the Department of Telecommunications of the Ministry
 of Communications released the Draft Digital Communications Policy for 
comments and feedback.&amp;nbsp; We laud the Government’s attempts to realise the
 socio-economic potential of India by increasing&amp;nbsp; access to Internet, 
and drafting a comprehensive policy while adequately keeping in mind the
 various security and privacy concerns that arise due to online 
communication. On behalf of the Centre for Internet &amp;amp; Society (CIS),
 we thank the Department of Telecommunications for the opportunity to 
submit its comments on the draft policy.&lt;/p&gt;
&lt;p&gt;We would like to point out two concerns with the consultation 
process: (i) a character-limit imposed on the comments to each section, 
due to which this submission has to sacrifice on providing comprehensive
 references to research; and (ii) issues with signing in on the MyGov 
where this consultation was hosted. We strongly recommend that the 
consultation process be liberal in accepting content, and allow for 
multiple types of submissions.&lt;/p&gt;
&lt;h2&gt;Comments&lt;/h2&gt;
&lt;h3&gt;Connect India: Creating a Robust Digital Communication Infrastructure&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;On 2022 Goals&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;a. Provide Universal broadband coverage at 50 Mbps to every citizen&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;According to UNICEF’s 2017 report, &lt;a class="external-link" href="https://www.unicef.org/publications/files/SOWC_2017_ENG_WEB.pdf"&gt;Children in a Digital World&lt;/a&gt;, 
only 29% of the internet users in India are female.&amp;nbsp; It is essential 
that the policy recognise the wide digital gender gap and other 
differences in internet access that result from traditional 
sociocultural barriers. Therefore, we recommend that the goal read as: 
“Provide Universal broadband coverage at 50 Mpbs to every citizen, with 
special focus on increasing internet access for women, people with 
disabilities, and historically-marginalised communities.”&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;g. Ensure connectivity to all uncovered areas&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;The term “connectivity” should be changed to “active internet 
connectivity”. As per the current norms, a gram panchayat may be 
considered “connected” if the fibre infrastructure exists, but this does
 not necessarily mean an active internet connection being serviced in 
the area. For example, &lt;a class="external-link" href="http://indianexpress.com/article/business/four-years-of-modi-government-telecom-and-it-ravi-shankar-prasad-5188871/"&gt;as on May 20&lt;/a&gt;, “of 1.22 lakh gram panchayats with 
fibre connectivity, 1.09 lakh had active internet.”&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;On Strategies&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;1.1 (a) i. BharatNet – Providing 1 Gbps to Gram Panchayats upgradeable to 10 Gbps&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;The Central Government, under the “State-led” implementation of the
 BharatNet initiative, has allowed certain state governments to 
implement the program in their respective states. This has allowed State
 Governments to take misplaced liberty with the core objective of the 
program, which originally was to increase access to internet services. 
For example, after the Telecom Commission’s approval of Andhra Pradesh’s
 “State-led” implementation of the program, the state government set up a
 body corporate Andhra Pradesh State FiberNet Limited. This body then 
went on to &lt;a class="external-link" href="https://164.100.158.235/question/annex/245/Au4554.pdf"&gt;exceed&lt;/a&gt; its mandate by venturing into the television 
broadcasting and distribution business by offering Internet Protocol 
Television (IPTV) services.&amp;nbsp; This is deeply problematic a it indicates 
that central government funds meant for increasing internet access are 
being used for IPTV services, despite the TRAI’s repeated 
&lt;a class="external-link" href="http://www.trai.gov.in/notifications/press-release/trai-issues-recommendations-%E2%80%9Cissues-related-entry-certain-entities"&gt;recommendations&lt;/a&gt; (since 2012) that state-owned entities should not be 
allowed to enter broadcasting and distribution activities ; allowing 
state entities in the business is against fair play and competition, 
runs contrary to the principle of independent and free media, and has 
chilling effects on the freedom of expression.&lt;/div&gt;
&lt;div&gt;Additionally, this has created a problem for aggregated data 
availability on the expenditure on the program. While the central 
government should ideally have all data pertaining to state-wise 
expenditure of funds for the program, data regarding the states 
implementing the initiative on their own is &lt;a class="external-link" href="http://164.100.47.190/loksabhaquestions/annex/14/AU4334.pdf"&gt;generally&lt;/a&gt; &lt;a class="external-link" href="http://164.100.47.190/loksabhaquestions/annex/14/AS73.pdf"&gt;excluded&lt;/a&gt; from the 
data provided by the Ministry. The goals of the program need to be 
specifically defined so that funds are directed effectively. The program
 needs stricter monitoring mechanisms to ensure that the intended 
objectives are met.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;1.1 (a) iv. JanWiFi – Establishing 2 Million Wi-Fi Hotspots in rural areas&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Under present regulations, resale of communication data logged by 
WiFi hotspots is not permitted. However, &lt;a class="external-link" href="https://www.livemint.com/Industry/T4c6JlgpofYfHODmuQUjJP/Govt-may-allow-data-resale-in-boost-to-public-WiFi-plan.html"&gt;recent&lt;/a&gt; news &lt;a class="external-link" href="https://www.livemint.com/Industry/1jJ6MGWuQM7RiBNhPOb4zI/Data-resale-should-be-allowed-to-boost-public-WiFi-hotspots.html"&gt;reports&lt;/a&gt; suggest
 that the DoT may change these norms to permit (virtual network) 
operators to further sell this information. We understand that while 
changing such norms may incentivise the operators to set up WiFi 
hotspots, however, the proliferation of internet access cannot come at 
the cost of privacy of users. The data available to the operators of 
these hotspots includes all browsing data, which is sensitive private 
information, and thus, should be restricted from sale. We strongly 
recommend that in compatibility with the security &amp;amp; privacy goals 
for consumers envisioned in the latter sections of this draft policy, 
the DoT ensure that strong privacy measures are in place for public WiFi
 hotspots made available through programs like JanWiFi.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;1.1 (f) Enabling Infrastructure Convergence of IT, telecom and broadcasting sectors&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;The policy proposes a convergence of the infrastructure 
administration currently performed by three central Government 
departments: IT, Broadcasting and Telecom. As admitted in the draft, 
this will require amendments, amongst many Acts, to the Telegraph Act. 
However, the draft policy has not clearly delineated the new proposed 
responsibilities for each department, and avoids elaborating on the 
nuance that will be required to address the multiple legal and 
administrative concerns stemming from the proposed convergence. The 
document also fails to detail how infrastructure (say internet access 
through 4G) will be regulated differently services (say IPTV operating 
on 4G). Further clarity is also required (i) how department-specific 
concerns (which are unsuited for a larger body) will be handled; and 
(ii) regarding the auspices under which the new converged body will 
operate.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;1.2 (a) Making adequate spectrum available to be equipped for the new broadband era&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;TRAI’s &lt;a class="external-link" href="https://www.trai.gov.in/sites/default/files/Consultation-Paper_Final%2028-3-14.pdf"&gt;consultation paper&lt;/a&gt;, Allocation and Pricing of Microwave 
Access (MWA) and Microwave Backbone (MWB) RF carriers (March 2014), 
recommends the exploration of the usage of the E-band (71 - 76 / 81-86 
GHz) and V-band (57-64 MHz),&amp;nbsp; and for the allocation of the same to 
telecom service providers.&amp;nbsp; We recommend that the Ministry accept TRAI’s
 recommendations, and reflect it in this policy.&lt;/div&gt;
&lt;div&gt;While the draft policy aims to decrease regulation of the spectrum,
 including liberalising spectrum “sharing, leasing and trading” regime, 
in addition, the policy should clear the government’s stance on 
unlicensed spectrum usage. CIS has written earlier (&lt;a class="external-link" href="https://cis-india.org/telecom/unlicensed-spectrum-policy-brief-for-govt-of-india"&gt;June 2012&lt;/a&gt;) about the
 demonstrable need for unlicensed spectrum to create a path for 
inexpensive connectivity in rural and remote areas.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;1.2 (a) v. Optimal Pricing of Spectrum to ensure sustainable and affordable access to Digital Communications&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;The draft policy should review existing approach to spectrum 
pricing in India. The Indian telecom sector is under heavy debt, and if 
rejuvenating this sector is a purported goal of this policy via “optimal
 pricing of spectrum”, auctions with a view to revenue maximisation 
should no longer remain the preferred method of assigning spectrum. The 
National Telecom Policy, 1999 which adopted a revenue-sharing approach 
to license fees, showed good results for the sector and translated into 
huge benefits for consumers. The government should adopt a similar 
approach to rescue the industry.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;Propel India: Enabling Next Generation Technologies and Services 
through Investments, Innovation, Indigenous Manufacturing and IPR 
Generation&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;On Strategies&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;2.2 (a) ii. Simplifying&amp;nbsp; licensing&amp;nbsp; and regulatory frameworks 
whilst&amp;nbsp; ensuring&amp;nbsp; appropriate security&amp;nbsp; frameworks&amp;nbsp; for&amp;nbsp; IoT/&amp;nbsp; M2M&amp;nbsp; /&amp;nbsp; 
future services&amp;nbsp; and&amp;nbsp; network&amp;nbsp; elements incorporating international best
 practices&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The process of “simplifying” licensing and regulatory regime is 
currently vague, and the intentions remain unclear. Simplifying licences
 without clear intentions can lead to losing the necessary nuance in the
 license agreements required to maintain competitive markets. In recent 
months, the industry has already witnessed a dilution of provisions 
which were placed to ensure healthy competition in the sector. For 
example, on May 31st, new norms were &lt;a class="external-link" href="https://telecom.economictimes.indiatimes.com/news/dot-amends-licence-rule-to-allow-higher-spectrum-holding/64406115"&gt;announced&lt;/a&gt; by DoT under which now 
allow an operator to hold 35% of the total spectrum&amp;nbsp; as opposed to the 
earlier regulation which only allowed for holding a maximum 25% of the 
total spectrum.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;2.3 (d) (iii) Providing financial incentives for the 
development of Standard Essential Patents(SEPs) in the field of digital 
communications technologies&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is a welcome step by the government to incentivise the 
development of SEPs in the country. However, this appreciable step will 
only yield results in the long term - and realistically speaking, not 
before a decade. It is equally necessary to improve the environment of 
licensing of SEPs in the short-term. The government should take 
initiative for creation of government-controlled patent pools for SEPs, 
which will solve issues of licensing for SEP holders, and also improve 
transparency of information relating to SEPs. Specifically, we recommend
 that the government initiate the &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/open-letter-to-prime-minister-modi"&gt;formation of a patent pool&lt;/a&gt; of critical
 mobile technologies and apply a five percent compulsory license.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Secure India: Ensuring Digital Sovereignty, Safety and Security of Digital Communications&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;On Strategies&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;3.1 Harmonising communications law and policy with the evolving
 legal framework and jurisprudence relating to privacy and data 
protection in India&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;We welcome the Ministry’s intention to amend licence agreements to 
include data protection and privacy provisions. In the same vein, the 
Ministry should also consider removing provisions from licenses that 
prevent the operator from using certain encryption methods in its 
network. For example, Clause 2.2 (vii) of the &lt;a class="external-link" href="http://www.dot.gov.in/isplicense/template-agreement-between-internet-service-provider-isp-and-vendor-equipment-product-and"&gt;License Agreement between 
DoT &amp;amp; ISP&lt;/a&gt; prohibits bulk encryption.&amp;nbsp; Additionally, in the License 
Agreement, encryption with only up to 40-bit in RSA (or equivalent) is 
normally permitted.&amp;nbsp; Similarly, Clause 37.1 of the &lt;a class="external-link" href="http://www.dot.gov.in/sites/default/files/Unified%20Licence_0.pdf"&gt;Unified Service 
License Agreement&lt;/a&gt; prohibits bulk encryption.&amp;nbsp; These provisions must be 
revised to ensure that ISPs and other service providers can employ more 
cryptographically secure methods.&lt;/p&gt;
&lt;p&gt;When regulating on encryption, we recommend that the government only 
set positive minimum mandates for the storage and transmission of data, 
and not set upper limits on the number of bits or on the quality of 
cryptographical method. In pursuance of the same goals, we also 
recommend adding point ‘iii’ to 3.1 (b): “promoting the use of 
encryption in private communication by providing positive minimum 
mandates for strong encryption in (or along with) the data protection 
framework.”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;3.2 (a) Recognising the need to uphold the core principles of net neutrality&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Like other goals of the draft policy, the target for ensuring and 
enforcing net neutrality principles has been set as 2022. However, this 
goal is achievable by as early as December 2018. We suggest that the 
Government take the first step towards this goal by accepting the net 
neutrality principles proposed by the TRAI and its recommendations to 
the government which have been pending with the Ministry since November 
2017. The government may additionally take into consideration &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality"&gt;CIS’ 
position&lt;/a&gt; on &lt;a class="external-link" href="https://cis-india.org/internet-governance/resources/net-neutrality/2015-06-29_PositionPaperonNetNeutralityinIndia/view"&gt;net neutrality&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The vaguely worded “appropriate exclusions and exceptions” carved out
 to net-neutrality principles in the policy need urgent elaboration. 
Given the vague boundaries between different control layers in digital 
communication, content regulation is very easy to slip into, and needs 
to be consciously avoided by the government.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;3.3 (f) ii. Facilitating lawful interception agencies with 
state of the art lawful intercept and analysis systems for 
implementation of law and order and national security&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no clarity in policy on how the government plans to meet the
 goal of “[f]acilitating lawful interception agencies with state of the 
art lawful intercept and analysis systems for implementation of law and 
order and national security.”&amp;nbsp; It has been &lt;a class="external-link" href="https://ajayshahblog.blogspot.com/2018/05/indias-communication-surveillance.html"&gt;recently suggested&lt;/a&gt; that some 
legal provisions that enable targeted communication surveillance might 
be violative of the privacy guidelines laid out in the recent Supreme 
Court judgment that affirmed the Right to Privacy.&amp;nbsp; Additionally, mass 
surveillance, prime facie, does not meet the “proportionality test.” 
Therefore, the policy documents needs details as to how the Ministry 
will aid intelligence agencies, and whether these interception details 
will be known to ISPs, TSPs and the public via reflection in the various
 License Agreements.&lt;/p&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-communications-policy'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-communications-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Anubha Sinha, Gurshabad Grover and Swaraj Barooah</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-06-14T12:43:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
