<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 901 to 915.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-supports-the-un-resolution-on-201cthe-right-to-privacy-in-the-digital-age201d"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-submission-to-unga-wsis-review"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-submission-to-the-un-special-rapporteur-on-freedom-of-speech-and-expression-surveillance-industry-and-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-statement-on-right-to-privacy-judgment"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-seminar-series"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-response-to-draft-proposal-to-transition-the-stewardship-of-the-internet-assigned-numbers-authority-iana-functions-from-the-u-s-commerce-department2019s-national-telecommunications-and-information-administration"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-18-2013-lobsang-gyatso-sither"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/cis-cybersecurity-film-screening"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-comments-revised-npd-report"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-supports-the-un-resolution-on-201cthe-right-to-privacy-in-the-digital-age201d">
    <title>CIS Supports the UN Resolution on “The Right to Privacy in the Digital age”.</title>
    <link>https://cis-india.org/internet-governance/blog/cis-supports-the-un-resolution-on-201cthe-right-to-privacy-in-the-digital-age201d</link>
    <description>
        &lt;b&gt;The United Nations adopted the resolution on the right to privacy recently. It recognised privacy as a human right, integral to the right to free expression, and also declared that mass surveillance could have negative impacts on human rights. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;On &lt;a class="external-link" href="https://www.un.org/News/Press/docs/2013/gashc4094.doc.htm"&gt;November 26, 2013&lt;/a&gt;, the United Nations adopted a non-binding resolution on &lt;a href="http://www.un.org/ga/search/view_doc.asp?symbol=A/C.3/68/L.45/Rev.1"&gt;The Right to Privacy in the Digital Age&lt;/a&gt;. The resolution was drafted &lt;a href="http://news.idg.no/cw/art.cfm?id=F0537DC8-A06C-E9D5-2EBACEA94829DAC1"&gt;by Brazil and Germany&lt;/a&gt; and expressed concern over the negative impact of surveillance and interception on the exercise of human rights. The resolution was controversial as countries such as the US, the UK, and Canada opposed language that spoke to the right to &lt;a href="http://www.theguardian.com/world/2013/nov/26/un-surveillance-resolution-human-right-privacy"&gt;privacy extending equally to citizens and non-citizens of a country. &lt;/a&gt; The resolution welcomed the report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression that examined the implications of surveillance of communications on the human rights of privacy and freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The resolution made a number of important statements that India, as a member of the United Nations, and as a country in the process of implementing a number of surveillance projects, like the &lt;a href="http://www.indexoncensorship.org/2013/11/india-online-report-freedom-expression-digital-freedom-3/"&gt;Central Monitoring System&lt;/a&gt;, should take cognizance of, including in short:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Privacy is a human right&lt;/b&gt;: Privacy is a human right according to which no one should be subjected to arbitrary or unlawful interference with his or her privacy, family, home, or correspondence. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Privacy is integral to the right to free expression&lt;/b&gt;: an integral component in recognizing the right to freedom of expression. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Unlawful and arbitrary surveillance violates the right to privacy and freedom of expression&lt;/b&gt;: Unlawful and/or arbitrary surveillance, interception, and collection of personal data are intrusive acts that violate the right to privacy and freedom of expression. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Exceptions to privacy and freedom of expression should be in compliance with human rights law:&lt;/b&gt; Public security is a potential exception justifying collection and protection of information, but States must ensure that this is done fully in compliance with international human rights law. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Mass surveillance may have negative implications for human rights: &lt;/b&gt;Domestic and extraterritorial surveillance, interception, and the collection of personal data on a mass scale may have a negative impact on individual human rights. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Equal protection for online and offline privacy:&lt;/b&gt; The right to privacy must be equally protected online and offline.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;The resolution further called upon states to:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Respect and protect the right to privacy, particularly in the context of digital communications.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To ensure that relevant legislation is in compliance with international human rights law&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To review national procedures and practices around surveillance to ensure full and effective implementation of obligations under international human rights law.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To establish and maintain effective domestic oversight mechanisms around domestic surveillance capable of ensuring transparency and accountability.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The resolution finally calls upon the UN High Commissioner for Human Rights to present a report with views and recommendations on the protection and promotion of the right to privacy in the context of surveillance to the Human Rights Council at its twenty-seventh session and to the General Assembly at its sixty-ninth session and decides to examine “Human rights questions, including alternative approaches for improving the effective enjoyment of human rights and fundamental freedoms”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UN Resolution on the Right to Privacy in the Digital Age is a welcome step towards an international recognition of privacy as a human right in the context of communications and extra territorial surveillance. The Centre for Internet and Society encourages the Government of India to, as called upon in the Resolution, to review national procedures and practices around surveillance to ensure full and effective implementation of obligations under international human rights law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prior to the UN Resolution on “The Right to Privacy in the Digital Age”, a group of international NGO’s developed the &lt;a href="https://en.necessaryandproportionate.org/TEXT"&gt;Necessary and Proportionate principles&lt;/a&gt; that seek to form a backbone for a response to mass surveillance and provide a framework for governments to assess if domestic surveillance regimes are in compliance with international Human Rights Law. CIS has contributed to the process of developing these principles.  The principles include legality, legitimate aim, necessity, adequacy, proportionality, competent judicial authority, due process, user notification, transparency, public oversight, integrity of communications and systems, safeguards for international cooperation, and safeguards against illegitimate access.  A&lt;a href="https://en.necessaryandproportionate.org/take-action/digiges"&gt; petition&lt;/a&gt; to sign onto the principles and demand an end to mass surveillance is currently underway.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both the Government of India and public of India should take into consideration the UN Resolution and the necessary and proportionate principles to reflect on how India’s surveillance regime and practices can be brought in line with international human rights law and understand where the balance is drawn for necessary and proportionate surveillance, specific to the Indian context.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-supports-the-un-resolution-on-201cthe-right-to-privacy-in-the-digital-age201d'&gt;https://cis-india.org/internet-governance/blog/cis-supports-the-un-resolution-on-201cthe-right-to-privacy-in-the-digital-age201d&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-30T07:25:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks">
    <title>CIS Submission to TRAI Consultation on Proliferation of Broadband through Public Wi­Fi Networks</title>
    <link>https://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (“CIS”) is grateful for the opportunity to comment on this Consultation Paper (“Paper”). The comments were prepared by Sunil Abraham, Sharath Chandra Ram, Vidushi Marda, and Thejaswi Melarkode. Special thanks to Shyam Ponappa and Arjun Venkatraman for their inputs and feedback.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Preliminary Comments&lt;/h2&gt;
&lt;ol style="text-align: justify; "&gt;&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Even in the early to mid-seventies, many Indians who wanted to own a radio receiver were expected to get a license from the government. If not then they 	were in violation of the law and there was nothing the government could do to enforce policies for their benefit. The deregulation of radio ownership has 	been key to its unfettered adoption and popularity today. Similarly, Wi-Fi, a radio transceiver must be deregulated further to bridge India's digital 	divide.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before addressing specific questions posed by the Paper, we would like to make the following observations:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt; The Paper considers only commercial models for the provision of public Wi-Fi networks. This is a problematic assumption as it ignores the potential of 	not-for-profit models that involve grassroots communities, academia and civil society.&lt;/li&gt;
&lt;li&gt;The Paper is infused with a vision and philosophy that is reminiscent of a colonial, license raj, centralized, top-down, command and control based, 	state monopoly paradigm. This is diametrically opposed to the foundational ethos of the Internet.&lt;/li&gt;
&lt;li&gt;The Paper assumes that more regulation is required in order to ensure mass adoption of public Wi-Fi. In fact, the exact opposite is true - the rapid 	proliferation of broadband through public Wi-Fi networks will only be accomplished by aggressive deregulation.&lt;/li&gt;
&lt;li&gt;The technological architecture being advanced by the Paper signals support of governance cum surveillance projects such as Aadhaar aka UID, India Stack, 	UPI and related projects which only undermine cyber-security and interferes with healthy competitive market dynamics between commercial and non-commercial 	actors. Again this is diametrically opposed to the foundational ethos of the Internet and a modern democratic information society. &lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_1fl95fmecs67"&gt;&lt;/a&gt; Q1. Are there any regulatory issues, licensing restrictions or other factors that are hampering the growth of public Wi-Fi services in the country?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The most pressing issue which is hampering the growth of public Wi-Fi services in the country is that of over regulation. Under the current regulatory 	framework, public Wi-Fi is subject to licensing requirements, data retention, and Know-Your-Customer ("KYC") policies. The next issue is paucity of 	spectrum. So far the approach has been to assign exclusive property rights to certain frequencies and also raise billions of US Dollars through spectrum 	auctions based on the Supreme Court's understanding of spectrum as a national resource. Given the advancements in transceiver technologies, such as 	cognitive radios, it is possible for us to transcend the grid-lock of property rights and embrace paradigms like shared and unlicensed spectrum. Innovative 	technologies and neutral allocation of unlicensed spectrum will result in the growth of public and community wireless networks including those built on the 	Wi-Fi standard.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_3hwmagyo3b5n"&gt;&lt;/a&gt; Q2. What regulatory/licensing or policy measures are required to encourage the deployment of commercial models for ubiquitous city-wide Wi-Fi networks as 	well as expansion of Wi-Fi networks in remote or rural areas?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The regulatory approach should be to &lt;b&gt;deregulate &lt;/b&gt;the radio transceiver as much as possible so as to encourage innovation with lower 	barriers for participation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The question falsely assumes that only commercial players can provide public Wi-Fi, Para 1.9 of the Paper only identifies scenarios where Unified License 	(UL) holders can take advantage of unlicensed spectrum to provide public Wi-Fi services. It fails to recognize that civil society, academia, and grassroots 	communities can also bring about ubiquitous city-wide Wi-Fi networks and expansion to remote and rural areas. For example, Village Telco and mesh networks 	are community-driven Wi-Fi models that are allowing a large number of individuals to gain access to Internet services using a public spirited or 	peer-to-peer philosophy.&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In terms of regulatory measures, CIS would recommend minimal and proportionate regulation, i.e. the regulation of entities involved in the provision of 	public Wi-Fi networks based on their capacity to harm the public interest and/or individual rights. By this we mean that only public Wi-Fi networks that 	have a large number of users (say, more than 5,000 individual users) should be subject to any regulation. Small-scale public Wi-Fi network providers, like 	public Wi-Fi networks in small villages or apartment complexes, should be left to self-regulation. Regulatory burdens which serve no purpose only deter 	these providers from providing such services at all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regulation must be technology-neutral, and should focus on the entities using these technologies who are capable of unlocking good or causing harm. This 	neutrality should be reflected in the name of the policy: "community-networking policy" and not "community Wi-Fi policy". The necessary changes must also 	be incorporated in the Paper and the draft policy to make this clear. The current definition of Wi-Fi is closely coupled with certain frequencies, and 	public wireless networks should be promoted regardless of technology and specific frequency bands.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In cases where private data services, (such as mobile telephony/ other private application specific data infrastructures) which may have been granted 	permission to deploy on an open-unlicensed or delicensed part of the spectrum, experience interference from a Public Wi-Fi setup. On the same frequency 	band, we call for the Public Wi-Fi to be given priority. This will prevent spectrum squatting.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_bbdam8kpm2d2"&gt;&lt;/a&gt; Q3. What measures are required to encourage interoperability between the Wi-Fi networks of different service providers, both within the country and 	internationally?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This is a requirement for elite parts of society only but not a deal breaker for the provision of public Wi-Fi in India. There are a variety of existing 	market-based approaches. The further deregulation of Wi-Fi will result in the rise of public, community and non-commercial players which in turn will lead 	to further innovation and competition when it comes to interoperability across disparate Wi-Fi networks and providers.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_mu1y5gasks48"&gt;&lt;/a&gt; Q4. What measures are required to encourage interoperability between cellular and Wi-Fi networks?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;No measures are required. Millions of consumers in India already are able to interoperate between cellular networks and their home and office networks as 	they are in charge of the authentication or they have left these networks open. The reason they are unable to operate more easily with other networks is 	due to data retention, and KYC policies. Even in countries with much more challenging national security concerns, the data retention and KYC policies are 	not so strict. We are paying a terrible price in terms of broadband adoption because of our flawed approach to surveillance and cyber security. The answer 	here lies in deregulation of existing requirements, especially for community based organisations, NGOs, research institutions, educational institutions, 	galleries, museums, archives and public libraries. This will address the needs of those who cannot pay and are vulnerable. For those who can pay - 	commercial actors will innovate and provide the high-quality interoperability that they seek - this will not require any action on the part of the 	government.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_cu58z42hlrt2"&gt;&lt;/a&gt; Q5. Apart from frequency bands already recommended by TRAI to DoT, are there additional bands which need to be de-licensed in order to expedite the 	penetration of broadband using Wi-Fi technology? Please provide international examples, if any, in support of your answer.&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In a 2012 policy brief on unlicensed spectrum&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, CIS recommended the changes, listed 	below [in italics]. Since then, more modern approaches may have emerged which merit revisiting this question. These advances also merit delicensing bands 	more aggressively as the proprietary approach becomes more and more dated. This approach should also be technology neutral and must find a balance between 	proprietary, unlicensed, and shared spectrum.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt; Frequencies in the 6, 11, 18, 23, 24, 60, 70, and 80 GHz bands&lt;i&gt;, &lt;/i&gt;to facilitate replicating examples like Webpass (USA) which has radios capable 	of delivering up to 2Gbps both upstream and downstream.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Frequencies in the &lt;b&gt;5.15 GHz-5.35 GHz&lt;/b&gt; bands, as well as&lt;b&gt; 5.725-5.775 GHz&lt;/b&gt; bands are unlicensed for indoor use only. 		These bands should be unlicensed for outdoor use as well in order to facilitate the creation of wider wireless communication networks and the use of 		innovative technologies.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;There should be more unlicensed spectrum in the &lt;b&gt;2.4 GHz range&lt;/b&gt;, beyond what is already unlicensed, for the expansion of wireless 		communication networks.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;The &lt;b&gt;1800-1890 MHz band&lt;/b&gt;, which is earmarked for the operations of low power cordless communication in India, should be unlicensed in line with international practices. Many bands for this use have already been unlicensed in Europe and the United States.		&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;50 Mhz in the&lt;/b&gt; &lt;b&gt;700Mhz - 900Mhz&lt;/b&gt; &lt;b&gt;band, &lt;/b&gt;earmarked for broadcast should be made available to better 	utilize available spectrum, almost 100Mhz is currently unused in most parts of the country. &lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_t8aujvprhoz9"&gt;&lt;/a&gt; Q6. Are there any challenges being faced in the login/authentication procedure for access to Wi-Fi hotspots? In what ways can the process be simplified to 	provide frictionless access to public Wi-Fi hotspots, for domestic users as well as foreign tourists?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The challenge here is that of over regulation and the belief that elaborate KYC requirements will solve problems of national security. What these 	requirements achieve is a lot of inconvenience for the general population while criminals are able to evade detection through fake IDs, burner phones, etc. 	as KYC requirements only create barriers without security payoffs. The fact that jurisdictions such as the UK, and other countries in Europe allow for 	purchase of SIM cards without KYC norms goes to show that there are effective ways of gathering intelligence that do not involve a KYC regime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In terms of authentication, a healthy ecosystem will allow for both anonymous access to Wi-Fi hotspots as well as access through authentication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is a need for deregulation in order to allow anonymous access. For access through authentication, some providers may wish to have light KYC norms 	whereas others may choose to have rigorous KYC norms that are integrated with Aadhaar, India Stack, etc. The decision should ultimately be taken by the 	provider and thus deregulation is the key. The most frictionless model is the unauthenticated model that allows anonymous access, followed by a light KYC 	regime, and the model with the most friction is that with intensive KYC requirements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The existing customer log-in procedure requirements that have been laid down by the Department of Telecommunications (DoT), Ministry of Communications, 	Government of India, which necessitate a user to provide a photo ID or to avail a one-time password (OTP) through SMS should be done away with for two 	reasons. &lt;b&gt;First&lt;/b&gt;, it does not allow for a user to access the public Wi-Fi network without authentication and this leads to a loss of 	anonymity over that network when the user accesses any Internet-based services. &lt;b&gt;Secondly&lt;/b&gt;, it assumes that all people will have access to 	mobile phones/smartphones. So far as the Indian scenario is concerned, this is certainly not the case in many households where only the head of the family, 	who is more often than not a male member, has access to such devices. Many individuals also use much simpler devices which may not be able to receive OTPs 	(&lt;i&gt;see&lt;/i&gt; Raspberry Pi models, for example). Such a requirement would, in effect, deprive a large number of individuals from accessing public Wi-Fi 	services and would defeat the purpose of even setting up such networks.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_m5cx0q9llg2d"&gt;&lt;/a&gt; Q7. Are there any challenges being faced in making payments for access to Wi-Fi hotspots? Please elaborate and suggest a payment arrangement which will 	offer frictionless and secured payment for the access of Wi-Fi services.&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This question is backed by three assumptions. First, it assumes that only commercial provision of Wi-Fi is possible. Second, it assumes that "a (singular) 	payment arrangement" is the preferred approach. Third, it assumes that it is possible for regulators to predict the most appropriate business / 	technological model for payments online. This is best left to competition between commercial and noncommercial players in the market. The existing 	regulations from the RBI and laws that govern electronic transactions are sufficient. No specific regulations are required for access to Wi-Fi hotspots.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_f057f6vzcz3w"&gt;&lt;/a&gt; Q8. Is there a need to adopt a hub-based model along the lines suggested by the WBA, where a central third party AAA (Authentication, Authorization and 	Accounting) hub will facilitate interconnection, authentication and payments? Who should own and control the hub? Should the hub operator be subject to any 	regulations to ensure service standards, data protection, etc.?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;"A central third party AAA (Authentication, Authorization and Accounting) hub" is antithetical to the foundational ethos of the Internet. Any attempt to 	foist that on Indian citizens will lead to a slowing down of wireless broadband adoption. From a cyber-security perspective this can only lead to 	large-scale and irreversible disasters and on the contrary policy measures should be taken to prevent centralization. For Indian cyberspace to be a 	resilient and free market, competition amongst both commercial and noncommercial players must be enabled for Authentication, Authorization and Accounting.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_idfswzxywg43"&gt;&lt;/a&gt; Q9. Is there a need for ISPs/ the proposed hub operator to adopt the Unified Payment Interface (UPI) or other similar payment platforms for easy 	subscription of Wi-Fi access? Who should own and control such payment platforms? Please give full details in support of your answer.&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As we submitted in response to the earlier question: "a central third party AAA (Authentication, Authorization and Accounting) hub" is antithetical to the 	foundational ethos of the Internet. Aadhaar aka UID, India Stack and the Unified Payment Interface (UPI) are similar state sanctioned monopolies that only 	increase fragility and interfere with the functioning of markets. Also this question assumes that citizens will have to pay for access to WiFi. Therefore, 	we recommend that the government does not regulate payments beyond the existing measures in Banking Law.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_ffura5n97nm"&gt;&lt;/a&gt; Q10. Is it feasible to have an architecture wherein a common grid can be created through which any small entity can become a data service provider and able 	to share its available data to any consumer or user?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The government or the regulator should not be making recommendations on technical architectures. All that is required to the lift all limits on reselling 	or sharing data via law.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_c8nuutpxjf12"&gt;&lt;/a&gt; Q11. What regulatory/licensing measures are required to develop such architecture? Is this a right time to allow such reselling of data to ensure 	affordable data tariff to public, ensure ubiquitous presence of Wi-Fi Network and allow innovation in the market?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS would ask for forbearance in this regard, as anything else will be a case of over regulation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_w4subepdd8z"&gt;&lt;/a&gt; Q12. What measures are required to promote hosting of data of community interest at local level to reduce cost of data to the consumers?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There are two measures that can be taken. The first is to change the public procurement policy to promote openness in the form of free and open source 	software, open standards, open content, open access, open educational resources and open data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second is to use public funds to shape the market and create publicly licensed material, or material available under exceptions and limitations of 	copyright law. To promote hosting data of community interest at a local level, public funds must be used to create intellectual property that can be freely 	licensed to the public. India already has a progressive copyright law, and the exceptions available under it should be seeded by the government through 	public funding. These exceptions include the statutory exception of copyright cess/ levy to broadband bills, exceptions for the disabled, libraries and 	archives and also education.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_wkhha0i1vdq7"&gt;&lt;/a&gt; Q13. Any other issue related to the matter of Consultation.&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Figure 2.2 of the Paper depicts Wi-Fi Monetization Pyramid based on Cisco's Wi-Fi Opportunity Pyramid.[2] As pointed out earlier, this ignores the possibility of non-commercial models. To quote Bruce Schneier, "&lt;i&gt;surveillance is the business model of the Internet&lt;/i&gt;"	&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and this business model is one that should not be encouraged. The pyramid only 	allows for a for-profit model and it is inherently based on needless surveillance of users. While monetization may be one of the main incentives, it is by 	no means the only way to sustain such public Wi-Fi networks and for this reason, CIS recommends that such a depiction be discarded.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The balancing of this monetization pyramid is one of the requirements to put in place an effective public Wi-Fi network structure. Another issue arises 	with respect to the definition of Wi-Fi. Currently, spectrum is limited to the 2.4 GHz or the 5 GHz bands but this has been expanded upon to encompass the 	LTE (4G) Core during the GSMA, Wireless Broadband Alliance and Wi-Fi Alliance 3GPP following the Mobile World Congress in 2013. Such a set-up would allow 	for frequency hopping between bands and to prevent (or allow) this, the definition of Wi-Fi in the context of public Wi-Fi networks must be clarified.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;See &lt;/i&gt; Centre for Internet and Society, Unlicensed Spectrum Brief for the Government of India, June 2012;&lt;i&gt; Available at &lt;/i&gt; http://cis-india.org/telecom/unlicensed-spectrum-brief.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 1.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Example of shared spectrum being advanced in the US: " 			&lt;i&gt; Specifically, the FCC adopted rules for CBRS, opening 150 MHz of spectrum in the 3550-3700 MHz band for commercial use. A Spectrum Access 				System (SAS), which is now in the process of being hammered out at the FCC with prospective coordinators, will make it possible to share 				spectrum where it hasn't been done before &lt;/i&gt; ." &lt;i&gt;See, &lt;/i&gt;Monica Alleven, &lt;i&gt;"&lt;/i&gt;&lt;i&gt;Google, Intel, Nokia and more partner to advance U.S. 3.5 GHz CBRS", &lt;/i&gt;Fierce Wireless, (February 			18, 2016) available at 			&lt;a href="http://www.fiercewireless.com/tech/google-intel-nokia-and-more-partner-to-advance-u-s-3-5-ghz-cbrs"&gt; http://www.fiercewireless.com/tech/google-intel-nokia-and-more-partner-to-advance-u-s-3-5-ghz-cbrs &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; " 			&lt;i&gt; Webpass buildings have radios capable of delivering up to 2Gbps both upstream and downstream… Anything beyond 5,000 meters will still 				work but you lose bandwidth… Webpass radios operate in many different frequencies, including the unlicensed 2.4GHz and 5GHz bands used by 				Wi-Fi, Barr said. Webpass also uses the 6, 11, 18, 23, 24, 60, 70, and 80GHz bands. These include a mix of licensed and unlicensed 				frequencies…" &lt;/i&gt; &lt;i&gt;See, &lt;/i&gt; Jon Brodkin, "500 Mbps broadband for $55 a month offered by wireless ISP", arsTECHNICA, (June 18, 2015), available at: 			&lt;a href="http://arstechnica.com/information-technology/2015/06/500mbps-broadband-for-55-a-month-offered-by-wireless-isp/"&gt; http://arstechnica.com/information-technology/2015/06/500mbps-broadband-for-55-a-month-offered-by-wireless-isp/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 1, at 17.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;See&lt;/i&gt; Bruce Schneier, &lt;i&gt;'Stalker economy' here to stay&lt;/i&gt;, CNN, (Nov. 26, 2013, 17:53 GMT), &lt;i&gt;available at &lt;/i&gt; http://edition.cnn.com/2013/11/20/opinion/schneier-stalker-economy/index.html&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks'&gt;https://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sunil Abraham, Sharath Chandra Ram, Vidushi Marda, and Thejaswi Melarkode</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2016-10-02T06:16:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi">
    <title>CIS Submission to TRAI Consultation Note on Model for Nation-wide Interoperable and Scalable Public Wi-Fi Networks</title>
    <link>https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi</link>
    <description>
        &lt;b&gt;​This submission presents responses by the CIS on the ​Consultation Note on Model for Nation-wide Interoperable and Scalable Public Wi-Fi Networks published by the TRAI on November 15, 2016. Our analysis of the solution proposed in the Note, in brief, is that there is no need of a solution for non-existing interoperability problem for authentication and payment services for accessing public Wi-Fi networks. The proposed solution in this Note only adds to over-regulation in this sector, and does not incentivise new investment in the sector, but only establishes UIDAI and NPCI as the monopoly service providers for authentication and payment services.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The comments were authored by Japreet Grewal, Pranesh Prakash, Sharath Chandra, Sumandro Chattapadhyay, Sunil Abraham, and Udbhav Tiwari, with expert comments from Amelia Andersdotter.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;1. Preliminary&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;1.1.&lt;/strong&gt; This submission presents responses by the Centre for Internet and Society (“CIS”) &lt;strong&gt;[1]&lt;/strong&gt; on the &lt;em&gt;Consultation Note on Model for Nation-wide Interoperable and Scalable Public Wi-Fi Networks&lt;/em&gt; (“the Note”) published by the Telecom Regulatory Authority of India (“TRAI”) on November 15, 2016 &lt;strong&gt;[2]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1.2.&lt;/strong&gt; The CIS welcomes the effort undertaken by TRAI to map regulatory and other barriers to deployment of public Wi-Fi in India. We especially appreciate that TRAI has recognised &lt;strong&gt;[3]&lt;/strong&gt; two key barriers to provision of public Wi-Fi networks identified and highlighted in our earlier response to the &lt;em&gt;Consultation Paper on Proliferation of Broadband through Public Wi­Fi&lt;/em&gt; &lt;strong&gt;[4]&lt;/strong&gt;: 1) over regulation (including, licensing requirements, data retention, and Know Your Customer policy), and 2) paucity of spectrum &lt;strong&gt;[5]&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;2. General Responses&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;2.1.&lt;/strong&gt; Before responding to the specific questions posed by the Note, we would like to make the following observations.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.2.&lt;/strong&gt; There is no need of a solution for non-existing interoperability problem for authentication and payment services for accessing public Wi-Fi networks. The proposed solution in this Note only adds to over-regulation in this sector. The proposed solution does not incentivise new investment in the sector, but only establishes UIDAI and NPCI as the monopoly service providers for authentication and payment services.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.3.&lt;/strong&gt; As the TRAI has consulted widely with industry and other stakeholders before it settled on the list of priority issues contained in Section C.6 of the Note, we are surprised to find that this Note aims to address only the problem of lack of “seamless interoperable payment system for Wi-Fi networks” (Section C.6.d. Of the Note), and does not discuss and propose solutions for any other key barriers identified by the Note.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.4.&lt;/strong&gt; The Note fails to clarify the “interoperability” problem in the payment system for usage of public Wi-Fi networks that it is attempting to solve. The Note identifies that lack of “single standard” for “authentication and  payment  mechanisms” for accessing public Wi-Fi networks as a key impediment to provide scalable and interoperable public Wi-Fi networks across the country &lt;strong&gt;[6]&lt;/strong&gt;. By conceptualising the problem in this manner, TRAI has bundled together two completely different concerns - authentication and payment - into one and this is at the root of the problems emanating from the proposed solution in this Note.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.5.&lt;/strong&gt; Lack of standard process for authentication is created by over-regulation via Know Your Customer (“KYC”) policies, and selection of eKYC service provided by UIDAI as the only acceptable authentication mechanism for all users of public Wi-Fi networks across India, creating further economic and legal challenges for smaller would-be providers of public Wi-Fi networks as they assess their liabilities and start-up costs. Additionally, since this would amount to making UID/Aadhaar enrolment mandatory for any user of public wi-fi networks, it seems to create a contradiction with previously communicated policy from the UIDAI and the Government that no such obligation should arise. Supreme Court has also mandated over successive Orders that enrolment for UID/Aadhaar number should remain optional for the citizens and residents.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.6.&lt;/strong&gt; As was observed by the respondents to the TRAI Consultation concluded earlier this year, there is no interoperability problem that needs to be solved regarding payments for accessing public Wi-Fi networks. Payment services continue to be evolved and payment aggregator services provided by existing companies may be expected to resolve many of the outstanding issues of service proliferation in the upcoming years, at least in the absence of additional mandatory technical measures imposed by the government. Bundling of payment with authentication will only undermine the already existing independent market for payment aggregators, and further enforce mandatoriness of UID/Aadhaar number.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.7.&lt;/strong&gt; Further, the payment mechanism proposed would seem to worsen difficulties for tourists and foreigners in accessing public Wi-Fi in India, as well adds an additional layer of authentication in a system already identified (even in the Note itself) to be overburdened by regulations regarding KYC and data retention. Section C.6.b of the Note highlights the problems faced by foreigners and tourists when the authentication mechanism is premised upon use of One Time Password (OTP) that requires a functioning local mobile phone number. It contradicts itself later by proposing an authentication method that requires the user to not only download an application onto their mobile/desktop device, but also to enrol for UID/Aadhaar number and/or to use their existing UID/Aadhaar number. Instead of reducing the existing barriers to provision of and access to public Wi-Fi, which the Note is supposed to achieve, it creates significant new barriers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.8.&lt;/strong&gt; The technological architecture advanced by the Note upholds support of governance and surveillance projects that, in addition to being costly in their implementation and thereby slowing down the objective of getting India connected, are also of questionable value to the security of the Indian polity. UID, UPI, and related projects risk undermining cyber-security through their reliance on centralised architectures and interfere with healthy competitive market dynamics between commercial and non-commercial actors.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.9.&lt;/strong&gt; The Note continues to only consider and enable commercial models for the provision of public Wi-Fi networks. We have identified this as a problematic assumption in our last submission &lt;strong&gt;[7]&lt;/strong&gt;. It is most crucial that TRAI does not ignore and fail to promote and facilitate the possibility of not-for-profit models that involve grassroot communities, academia, and civil society.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.10.&lt;/strong&gt; Last but not the least, the term “Wi-Fi” refers to a particular technology for establishing wireless local area networks. Further, the term is a trademark of the Wi-Fi Alliance &lt;strong&gt;[8]&lt;/strong&gt;. It is this not a neutral term, and it must not be used as a general and universal synonym for wireless local area networks. We recommend that TRAI may consider using a technology-neutral term, say “public wireless services” or “public networking services”, to describe the sector. Following the terminology used in the Note, we have decided to continue using the term “Wi-Fi” in this response. This does not reflect our agreement about the appropriateness of this term. Important: The recommendation for technology-neutral regulation also comes with the qualification that safeguards like regulations on Listen Before Talk and Cycle Time are required to prevent technologies like LTE-U from squatting on spectrum and interfering with connections based on other standards.&lt;/p&gt;
&lt;h2&gt;3. Specific Responses&lt;/h2&gt;
&lt;h4&gt;Q1. Is the architecture suggested in the consultation note for creating unified authentication and payment infrastructure will enable nationwide standard for authentication and payment interoperability?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.1.&lt;/strong&gt; No. The proposed infrastructure is likely to be costly for a large number of actors to implement and undermine some of the ongoing innovation in the Indian digital payment services industry. Rather than being helpful, it risks introducing additional requirements on an industry that TRAI has already identified as facing a number of large challenges.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.&lt;/strong&gt; There is no need for a unified architecture that provides nationwide standard for authentication and payment interoperability. It does not offer any incentive towards provision of public Wi-Fi networks. Neither is there an interoperability problem at the physical or data link layers that has been pointed out, nor is government mandated interoperability required at the payment or ID layer since there are private entities that provide such interoperability (like, payment aggregators). Additionally, we believe it is inappropriate that the TRAI is trying to predict the most suitable business/technological model for digital payments to be used for accessing commercial Wi-Fi networks. India has a booming online payments industry, and it must be allowed to evolve in an enabling regulatory environment that allow for competition and ensures responsible practices.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.&lt;/strong&gt; The Note identifies several structural impediments to expansion of public Wi-Fi networks in India, namely paucity of backhaul connectivity infrastructure (Section C.6.a), Inadequate associated infrastructure to offer carrier  grade  Wi-Fi network (Section C.6.c), dependency of authentication mechanism on pre-existing (Indian) mobile phone connection (Section C.6.b), and limited availability of spectrum to be used for public Wi-Fi networks (Section C.6.e). All these are crucial concerns and none of them have been addressed by the architecture suggested in the Note.&lt;/p&gt;
&lt;h4&gt;Q2. Would you like to suggest any alternate model?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.4.&lt;/strong&gt; Yes. The model proposed in the Note is likely to exclude several types of potential users (say, foreigners and tourists), and impose a single authentication and payment service provider for accessing public Wi-Fi networks, which may undermine both competition and security in the market for these services.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.&lt;/strong&gt; Internationally, there are cities and regions (say, the city of Barcelona and the Catalonia region in Spain) where public Wi-Fi networks have been provided in a pervasive and efficient manner by taking a light regulatory approach that enables opportunities for potential providers to set up their own infrastructures and additionally have access to backhaul. Further, reducing legal requirements on authentication should be considered in place of government mandated technical architectures for authentication and payment. In particular, allowing for anonymous access to Public Wi-Fi or wireless connectivity would reduce both the administrative and the technical burden on potential providers at the hyper-local level, especially for providers whose main activity it is not, and cannot be, to provide internet services (say, event venues, malls, and shops).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.6.&lt;/strong&gt; The CIS suggests the following steps towards conceptualising an “alternative model”:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;remove existing regulatory disincentives,&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;urgently explore policies to promote deployment of wired infrastructures in general, and to enable a larger range of actors, including local authorities, to invest in and deploy local infrastructures by reducing licensing requirements in particular,&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;examine spectrum requirements for provision of public Wi-Fi, and&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;provide incentives, such as allowing telecom service providers to share backhaul traffic over public Wi-Fi, and ways for telecom service providers to lower their costs if they also make Internet access available for free.&lt;/li&gt;&lt;/ol&gt;
&lt;h4&gt;Q3. Can Public Wi-Fi access providers resell capacity and bandwidth to retail users? Is “light touch regulation” using methods such as “registration” instead of “licensing” preferred for them?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.7.&lt;/strong&gt; CIS holds that capacity and bandwidth are neither comparable to tangible goods nor to digital currency. They are a utility, and the provider of the utility has to accept that their customers use the utility in the way they see fit, even if that use entails sharing said capacity and bandwidth with downstream private persons or customers. Wi-Fi capabilities are currently a built-in standardised feature of all consumer routers. Any individual, community, or store with access to an internet connection and a consumer router could become a public Wi-Fi access provider at no additional cost to themselves, furthering the goals of the Indian government in its Digital India strategy to ensure public and universal access to the internet.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.8.&lt;/strong&gt; In order to exploit the opportunities awarded by a large amount of entities in the Indian society potentially becoming Public Wi-Fi providers, TRAI should require neither registration nor licensing of these actors. Imposing administrative burdens on potential public Wi-Fi access providers creates legal uncertainty and will cause a lot of actors, who may otherwise contribute to the goals of Digital India, not to do so. This is particularly true for community organisers and citizens, who may not have access to legal assistance and therefore may avoid contributing to the goals of the government.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.9.&lt;/strong&gt; Light touch regulation when it comes to both granting license to  public Wi-Fi access providers as well as authentication of retail users, however, are needed not only as an exceptional practice for such instances but as a general practice in case of entities offering public Wi-Fi services, either commercially or otherwise. Further, additional laxity in administrative responsibilities is needed to incentivise provision of free, that is non-commercial, public Wi-Fi networks.&lt;/p&gt;
&lt;h4&gt;Q4. What should be the regulatory guidelines on “unbundling” Wi-Fi at access and backhaul level?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.10.&lt;/strong&gt; The Note refers to unbundling of activities related to provision of Wi-Fi but it does not define the term. It is neither explained which specific activities at access and backhaul levels must be considered for unbundling.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.11.&lt;/strong&gt; While unbundling should clearly be allowed and any regulatory hurdles to unbundling should be removed, any such decision must be taken with a focus on urgently addressing the stagnated growth in landline and backhaul, as identified in Section C.6.a of the Note. Relying only on spectrum intensive infrastructures, such as mobile base stations, for providing connectivity, creates a heavy regulatory burden for the TRAI, while simultaneously not ensuring optimal connectivity for business and private users. The CIS is concerned that the focus of the Note on standardising a government-mediated authentication and payment mechanism detracts attention from this urgent obstacle to the fulfillment of the Digital India plans of accelerated provision of broadband highways, universal access, and public, especially free, access to internet services.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.12.&lt;/strong&gt; From the example of European telecommunications legislations, implementation of policy measures to ensure that vertical integration between infrastructure (say, cables, switches, and hubs) providers and service (say, providing a subscriber with a household modem or a SIM card) providers in the telecommunications sector does not become a barrier to new market entrants has yielded much success in countries that have pursued it, like Sweden and Great Britain.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.13.&lt;/strong&gt; Further,  there should be no default assumption of bundling by the TRAI. In particular, the TRAI should consider reviewing all regulations that may cause bundling to occur when this is not necessary, and put in place in a monitoring mechanism for ensuring that bundled practises (especially in electronic networks, base station infrastructures, backhaul and similar) do not cause competitive problems or raise market entry barriers &lt;strong&gt;[9]&lt;/strong&gt;. In most EU countries, especially where the corporate structure of incumbent(s) is not highly vertically integrated, interconnection requirements for electronic network providers of wired networks in the backhaul or backbone (effectively price regulated interconnection), and a conscious effort to ensure that new market players can enter the field, have ensured a competitive telecommunications environment. TRAI may consider reviewing the European regulation on local loop unbundling (1999) and discussions on functional separation (especially by the British regulatory authority Ofcom), within an Indian context.&lt;/p&gt;
&lt;h4&gt;Q5. Whether reselling of bandwidth should be allowed to venue owners such as shop keepers through Wi-Fi at premise? In such a scenario please suggest the mechanism for security compliance.&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.14.&lt;/strong&gt; Yes. Venue owners should be allowed to provide public Wi-Fi service both on a commercial and non-commercial basis.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.15.&lt;/strong&gt; It is not clear from the Note and the question what type of security concerns the TRAI is seeking to address. In terms of payment security, the payment industry already has a large range of verification and testing mechanisms. The CIS objects to the mandatory introduction of the proposed payment system so as to ensure greater security for Wi-Fi access providers and the users.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.16.&lt;/strong&gt; As far as hardware-related security issues are concerned, it is again unclear why consumer equipment compliant with existing Wi-Fi standards would not be sufficiently secure in the Indian context. Wi-Fi has proven to be a sturdy technical standard, its adoption is high in multiple jurisdictions around the world, and it also enjoys great technical stability. Similar security assessments could easily be made for alternative wireless technologies, such as WiMaX.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.17.&lt;/strong&gt; The CIS foresees problems is in the allocation of risk and liability by law. The already existing legal obligation to verify the identity of each user, for instance, is likely to introduce a large administrative burden on potential Public Wi-Fi providers, which may lead to such potential providers abstaining from entering the market. Should the identification requirement be removed, however, other concerns pertaining to legal obligations may arise. These include liability for user activities on the web or on the internet (cf. copyright infringement, libel, hate speech). We propose a “safe harbour” mechanism in these cases, limiting the liability of the potential public Wi-Fi provider.&lt;/p&gt;
&lt;h4&gt;Q6. What should be the guidelines regarding sharing of costs and revenue across all entities in the public Wi-Fi value chain? Is regulatory intervention required or it should be left to forbearance and individual contracting?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.18.&lt;/strong&gt; The market segments identified by the TRAI in Section F.18 of the Note should normally all be competitive markets themselves, and so do not require regulatory assistance in sharing of costs and revenues. The more elaborate the requirements imposed on each actor of each market segment identified by the TRAI in Section F.18, the more costly the roll-out of public Wi-Fi is going to be for the market actors. Such a cost is not avoided by price regulation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.19.&lt;/strong&gt; The TRAI may instead consider introducing public funding for backhaul roll-out in remote areas, where the market is unlikely to engage in such roll-out on its own. Presently, some Indian states (such as Karnataka) are committing to public funding for wireless access in remote areas. The Union Government can assist such endeavours.&lt;/p&gt;
&lt;h2&gt;Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://trai.gov.in/Content/ConDis/20801_0.aspx"&gt;http://trai.gov.in/Content/ConDis/20801_0.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See Section C.6 of the Note.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://trai.gov.in/Content/ConDis/20782_0.aspx"&gt;http://trai.gov.in/Content/ConDis/20782_0.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks"&gt;http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See Section E.11. of the Note.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks"&gt;http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a href="https://www.wi-fi.org/"&gt;https://www.wi-fi.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See: Monitoring bundled products in the telecommunications sector is also recommended by the OECD: &lt;a href="http://oecdinsights.org/2015/06/22/triple-and-quadruple-play-bundles-of-communication-services-towards-all-in-one-packages/"&gt;http://oecdinsights.org/2015/06/22/triple-and-quadruple-play-bundles-of-communication-services-towards-all-in-one-packages/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi'&gt;https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Japreet Grewal, Pranesh Prakash, Sharath Chandra, Sumandro Chattapadhyay, Sunil Abraham, and Udbhav Tiwari, with expert comments from Amelia Andersdotter</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Public Wireless Network</dc:subject>
    
    
        <dc:subject>TRAI</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    

   <dc:date>2016-12-12T13:59:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-submission-to-unga-wsis-review">
    <title>CIS submission to the UNGA WSIS+10 Review</title>
    <link>https://cis-india.org/internet-governance/blog/cis-submission-to-unga-wsis-review</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) submitted its comments to the non-paper on the UNGA Overall Review of
the Implementation of the WSIS outcomes, evaluating the progress made and challenges ahead.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;To what extent has progress been made on the vision of the peoplecentred, inclusive and development oriented Information Society in the ten years since the WSIS?&lt;/b&gt;&lt;br /&gt;The World Summit on the Information Society (WSIS) in 2003 and 2005 played an important role in encapsulating the potential of knowledge and information and communication technologies (ICT) to contribute to economic and social development. Over the past ten years, most countries have sought to foster the use of information and knowledge by creating enabling environment for innovation and through efforts to increase access. There have been interventions to develop ICT for development both at an international and national level through private sector investment, bilateral treaties and national strategies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, much of the progress made in the past ten years in terms of getting people connected and reaping the benefits of ICT has not been sufficiently peoplecentred, nor have they been sufficiently inclusive.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These developments have not been sufficiently peoplecentred, since governments across the world have been using the Internet as a monumental surveillance tool, invading people’s privacy without legitimate justifications, in an arbitrary manner without due care for reasonableness,  proportionality, or democratic accountability. These developments have not been sufficiently peoplecentred, since the largest and most profitable Internet businesses — businesses that have more users than most nationstates have citizens, yet have one-sided terms of service — have eschewed core principles like open standards and interoperability that helped create the Internet and the World Wide Web, and instead promote silos.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We still reside in a world where development has been very lopsided, and ICTs have contributed to reducing some of these gulfs, while exacerbating others. For instance, persons with visual impairment are largely yet to reap the benefits of the Information Society due to a lack of attention paid to universal, while sighted persons have benefited far more; the ability of persons who don’t speak a language like English to contribute to global Internet governance discussions is severely limited; the spread of academic knowledge largely remains behind prohibitive paywalls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As ICTs have grown both in sophistication and reach, much work remains to achieve the peoplecentred, inclusive and developmentoriented information society envisaged in WSIS. While the diffusion of ICTs has created new opportunities for development, even today less than half the world has access to broadband (with only eleven per cent of the world’s population having access to fixed broadband). See &lt;a class="external-link" href="http://www.itu.int/en/ITUD/Statistics/Documents/facts/ICTFactsFigures2015.pdf"&gt;International Telecommunication Union, ICT Facts and Figures: The World in 2015&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ninety per cent of people connected come from the industrialized countries — North America (thirty per cent), Europe (thirty per cent) and the AsiaPacific (thirty per cent). Four billion people from developing countries remain offline, representing two-thirds of the population residing in developing countries. Of the nine hundred and forty million people residing in Least Developed Countries (LDCs), only eighty-nine million use the Internet and only seven per cent of households have Internet access, compared with the world average of forty-six per cent. See &lt;a class="external-link" href="http://www.itu.int/en/ITUD/Statistics/Documents/facts/ICTFactsFigures2015.pdf"&gt;International Telecommunication Union, ICT Facts and Figures: The World in 2015&lt;/a&gt;. This digital divide is first and foremost a question of access to basic infrastructure (like electricity).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, there is a problem of affordability, all the more acute since in the South in comparison with countries of the North due to the high costs related to access to the connection. Further, linguistic, educational, cultural and content related barriers are also contributing to this digital divide. Growth of restrictive regimes around intellectual property, vision of the equal and connected society. Security of critical infrastructure with in light of ever growing vulnerabilities, the loss of trust following revelations around mass surveillance and a lack of consensus on how to tackle these concerns are proving to be a challenge to the vision of a connected information society. The WSIS+10 overall review is timely and a much needed intervention in assessing the progress made and planning for the challenges ahead.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There were two bodies as major outcomes of the WSIS process: the Internet Governance Forum and the Digital Solidarity Fund, with both of these largely failing to achieve their intended goals. The Internet Governance Forum, which is meant to be a leading example of “multi-stakeholder governance” is also a leading example of what the Multi-stakeholder Advisory Group (MAG) noted in 2010 as “‘black box’ approach”, with the entire process around the nomination and selection of the MAG being opaque. Indeed, when CIS requested the IGF Secretariat to share information on the nominators, we were told that this information will not be made private. Five years since the MAG lamented its own blackbox nature, things have scarcely improved. Further, analysis of MAG membership since 2006 shows that 26 persons have served for 6 years or more, with the majority of them being from government, industry, or the technical community. Unsurprisingly, 36 per cent of the MAG membership has come from the WEOG group, highlighting both deficiencies in the nomination/selection&lt;br /&gt;process as well as the need for capacity building in this most important area. The Digital Solidarity Fund failed for a variety of reason, which we have analysed in a &lt;a class="external-link" href="https://docs.google.com/document/d/1E0HKY06744b6i2slR5HMk9Qd6I7zPFWJlKSmhsneAs/ edit"&gt;separate document&lt;/a&gt; annexed to this response.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What are the challenges to the implementation of WSIS outcomes?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the key areas that need attention going forward and need to be addressed include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Access to Infrastructure&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Developing policies aimed at promoting innovation and increasing affordable access to hardware and software, and curbing the ill effects of the currentlyexcessive patent and copyright regimes.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Focussing global energies on solutions to lastmile access to the Internet in a manner that is not decoupled from developmental ground realities.&lt;/li&gt;
&lt;li&gt;This would include policies on spectrum sharing, freeing up underutilized spectrum, and increasing unlicensed spectrum.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;This would also include governmental policies on increasing competition among Internet providers at the last mile as well as at the backbone (both nationally and internationally), as well as commitments for investments in basic infrastructure such as an openaccess national fibreoptic backbone where the private sector investment is not sufficient.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Developing policies that encourage local Internet and communications infrastructure in the form of Internet exchange points, data centres, community broadcasting.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Access to Knowledges&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;As the Washington Declaration on IP and the Public Interest5 points out, the enclosure of the public domain and knowledge commons through expansive “intellectual property” laws and policies has only gotten worse with digital technologies, leading to an unjust allocation of information goods, and continuing royalty outflows from the global South to a handful of developing countries. This is not sustainable, and urgent action is needed to achieve more democratic IP laws, and prevent developments such as extra judicial enforcement mechanisms such as digital restrictions management systems from being incorporated within Web standards.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Aggressive development of policies and adoption of best practices to ensure that persons with disabilities are not treated as secondgrade citizens, but are able to fully and equally participate in and benefit from the Information Society.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Despite the rise of video content on the Internet, much of that has been in parts of the world with already high literacy, and language and illiteracy continue to pose barriers to full usage of the Internet.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;While the Tunis Agenda highlighted the need to address communities marginalized in Information Society discourse, including youth, older persons, women, indigenous peoples, people with disabilities, and remote and rural communities, but not much progress has been seen on this front.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Rights, Trust, and Governance&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ensuring effective and sustainable participation especially from developing countries and marginalised communities. Developing governance mechanisms that are accountable, transparent and provide checks against both unaccountable commercial interests as well as governments.&lt;/li&gt;
&lt;li&gt;Building citizen trust through legitimate, accountable and transparent governance mechanisms.&lt;/li&gt;
&lt;li&gt;Ensuring cooperation between states as security is influenced by global foreign policy, and is of principal importance to citizens and consumers, and an enabler of other rights.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;As the Manila Principles on Intermediary Liability show, uninformed intermediary liability policies, blunt and heavy handed regulatory measures, failing to meet the principles of necessity and proportionality, and a lack of consistency across these policies has resulted in censorship and other human rights abuses by governments and private parties, limiting individuals’ rights to free expression and creating an environment of uncertainty that also impedes innovation online. In developing, adopting, and reviewing legislation, policies and practices that govern the liability of intermediaries, interoperable and harmonized regimes that can promote innovation while respecting users’ rights in line with the Universal Declaration of Human Rights, the International Covenant on Civil and Political Rights and the United Nations Guiding Principles on Business and Human Rights are needed and should be encouraged.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;An important challenge before the Information Society is that of the rise of “quantified society”, where enormous amounts of data are generated constantly, leading to great possibilities and grave concerns regarding privacy and data protection.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Reducing tensions arising from the differences between cultural and digital nationalism including on issues such as data sovereignty, data localisation, unfair trade and the need to have open markets.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Currently, there is a lack of internationally recognized venues accessible to all stakeholders for not only discussing but also acting upon many of these issues.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What should be the priorities in seeking to achieve WSIS outcomes and progress towards the Information Society, taking into account emerging trends?&lt;/b&gt;&lt;br /&gt;All the challenges mentioned above should be a priority in achieving WSIS outcomes and ensuring innovation to lead social and economic progress in society. Digital literacy, multilingualism and addressing privacy and user data related issues need urgent attention in the global agenda. Enabling increased citizen participation thus accounting for the diverse voices that make the Internet a unique medium should also be treated as priority. Renewing the IGF mandate and giving it teeth by adopting indicators for development and progress, periodic review and working towards tangible outcomes would be beneficial to achieving the goal of a connected information society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What are general expectations from the WSIS + 10 High Level Meeting of the United Nations General Assembly?&lt;/b&gt;&lt;br /&gt;We would expect the WSIS+10 High Level Meeting to endorse an outcome document that seeks to d evelop a comprehensive policy framework addressing the challenges highlighted above . It would also be beneficial, if the outcome document could identify further steps to assess development made so far, and actions for overcoming the identified challenges. Importantly, this should not only be aimed at governments, but at all stakeholders. This would be useful as a future road map for regulation and would also allow us to understand the impact of Internet on society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What shape should the outcome document take?&lt;/b&gt;&lt;br /&gt;The outcome document should be a resolution of the UN General Assembly, with high level policy statements and adopted agreements to work towards identified indicators. It should stress the urgency of reforms needed for ICT governance that is democratic, respectful of human rights and social justice and promotes participatory policymaking. The language should promote the use of technologies and institutional architectures of governance that ensure users’ rights over data and information and recognize the need to restrict abusive use of technologies including those used for mass surveillance. Further, the outcome document should underscore the relevance of the Universal Declaration of Human Rights, including civil, political, social, economic, and cultural rights, in the Information Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The outcome document should also acknowledge that certain issues such as security, ensuring transnational rights, taxation, and other such cross jurisdictional issues may need greater international cooperation and should include concrete steps on how to proceed on these issues. The outcome document should acknowledge the limited progress made through outcome-less multi-stakeholder governance processes such as the Internet Governance Forum, which favour status quoism, and seek to enable the IGF to be more bold in achieving its original goals, which are still relevant. It should be frank in its acknowledgement of the lack of consensus on issues such as “enhanced cooperation” and the “respective roles” of stakeholders in multi-stakeholder processes, as brushing these difficulties under the carpet won’t help in magically building consensus. Further, the outcome document should recognize that there are varied approaches to multi-stakeholder governance.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-submission-to-unga-wsis-review'&gt;https://cis-india.org/internet-governance/blog/cis-submission-to-unga-wsis-review&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WSIS+10</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-08-09T16:24:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-submission-to-the-un-special-rapporteur-on-freedom-of-speech-and-expression-surveillance-industry-and-human-rights">
    <title>CIS Submission to the UN Special Rapporteur on Freedom of Speech and Expression: Surveillance Industry and Human Rights</title>
    <link>https://cis-india.org/internet-governance/blog/cis-submission-to-the-un-special-rapporteur-on-freedom-of-speech-and-expression-surveillance-industry-and-human-rights</link>
    <description>
        &lt;b&gt;CIS responded to the call for submissions from the UN Special Rapporteur on Freedom of Speech and Expression. The submission was on the Surveillance Industry and Human Rights.&lt;/b&gt;
        
&lt;p&gt;CIS is grateful for the opportunity to submit the United Nations (UN) Special Rapporteur on call for submissions on the surveillance industry and human rights.1 Over the last decade, CIS has worked extensively on research around state and private surveillance around the world. In this response, individuals working at CIS wish to highlight these programs, with a special focus on India.&lt;/p&gt;
&lt;p&gt;The response can be accessed &lt;a href="https://cis-india.org/internet-governance/resources/the-surveillance-industry-and-human-rights.pdf"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-submission-to-the-un-special-rapporteur-on-freedom-of-speech-and-expression-surveillance-industry-and-human-rights'&gt;https://cis-india.org/internet-governance/blog/cis-submission-to-the-un-special-rapporteur-on-freedom-of-speech-and-expression-surveillance-industry-and-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok, Arindrajit Basu, Gurshabad Grover, Akriti Bopanna, Shweta Mohandas, Martyna Kalvaityte</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Human Rights</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2019-02-20T10:48:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india">
    <title>CIS Submission to the Committee of Experts on a Data Protection Framework for India</title>
    <link>https://cis-india.org/internet-governance/files/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india'&gt;https://cis-india.org/internet-governance/files/cis-submission-to-the-committee-of-experts-on-a-data-protection-framework-for-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-04-06T08:09:09Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-statement-on-right-to-privacy-judgment">
    <title>CIS Statement on Right to Privacy Judgment</title>
    <link>https://cis-india.org/internet-governance/blog/cis-statement-on-right-to-privacy-judgment</link>
    <description>
        &lt;b&gt;In an emphatic endorsement of the right to privacy, a nine judge constitutional bench unanimously upheld a fundamental right to privacy. The events leading to this bench began during the hearings in the ongoing Aadhaar case, when in August 2015, Mukul Rohatgi, the then Attorney General stated that there is no constitutionally guaranteed right to privacy.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;reliance was on two Supreme Court judgments in MP Sharma v Satish Chandra (1954) and Kharak Singh v State of Uttar Pradesh (1962): both cases, decided by eight- and six-judge benches respectively, denied the existence of a constitutional right to privacy. As the subsequent judgments which upheld the right to privacy were by smaller benches, he claimed that MP Sharma and Kharak Singh still prevailed over them, until they were overruled by a larger bench. This landmark judgment was in response to a referral order to clear the confusion over the status of privacy as a right.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We, at the Centre for Internet and Society (CIS) welcome this judgement and applaud the depth and scope of the Supreme Court’s reasoning. CIS has been producing research on the different aspects of the right to privacy and its implications for the last seven years and had the privilege of serving on the Justice AP Shah Committee and contributing to the Report of the Group of Experts on Privacy.&lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt; We are honoured that some of our research has also been cited by the judgment.&lt;a name="fr2" href="#fn2"&gt;[2] &lt;/a&gt;Such judicial recognition is evidence of the impact sound research can have on policymaking.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;In the course of a 547 page judgment, the bench affirmed the fundamental nature of the right to privacy reading it into the values of dignity and liberty. The judgment is instructive in its reference to scholarly works and jurisprudence not only in India but other legal systems such as USA, South Africa, EU and UK, while recognising a broad right to privacy with various dimensions across spatial, informational and decisional spheres. We note with special appreciation that women’s bodily integrity and citizens’ sexual orientation are among those aspects of privacy that were clearly recognised in the judgment. For researchers studying privacy and its importance, this judgment is of great value as it provides clear reasoning to reject oft-quoted arguments which are used to deny privacy’s significance. The judgement is also cognizant of the implications of the digital age and emphasise the need for a robust data protection framework.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The right to privacy has been read into into Article 21 (Right to life and liberty), and Part III (Chapter on Fundamental Rights) of the Constitution. This means that any limitation on the right in the form of reasonable restrictions must not only satisfy the tests evolved under Article 21, but where loss of privacy leads to infringement on other rights, such as chilling effects of surveillance on free speech, the tests for constitutionality under those provisions for also be satisfied by the limiting action. This provides a broad protection to citizens’ privacy which may not be easily restricted. We expect that this judgment will have far reaching impacts, not just with respect to the immediate Aadhaar case, but also to in a score of other matters such as protection of sexual choice by decriminalising Section 377 of the Indian Penal Code, oversight of statutory search and seizure provisions such as Section 132 of the Income Tax Act, personal data collection and processing practices by both state and private actors and mass surveillance programmes in the interest of national security.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;As this judgment comes in response to a referral order, the judges were not dealing with any questions of fact to ground the legal principles in. Subsequent judgments which deal with privacy will apply these principles and further evolve the contours of this right on a case-by-case basis. For now, we welcome this judgment and look forward to its consistent application in the future.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;]. http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;]. CIS was quoted in the judgement on footnote 46, page 33 and 34: &lt;a href="http://supremecourtofindia.nic.in/pdf/LU/ALL%20WP(C)%20No.494%20of%202012%20Right%20to%20Privacy.pdf"&gt;http://supremecourtofindia.nic.in/pdf/LU/ALL%20WP(C)%20No.494%20of%202012%20Right%20to%20Privacy.pdf &lt;/a&gt;The quote is " Illustratively, the Centre for Internet and Society has two interesting articles tracing the origin of privacy within Classical Hindu Law and Islamic Law. See Ashna Ashesh and Bhairav Acharya ,“Locating Constructs of Privacy within Classical Hindu Law”, The Centre for Internet and Society, available at &lt;a href="https://cis-india.org/internet-"&gt;https://cis-india.org/internet-&lt;/a&gt;governance/blog/loading-constructs-of-privacy-within-classical-hindu-law. See also Vidushi Marda and Bhairav Acharya, “Identifying Aspects of Privacy in Islamic Law”, The Centre for Internet and Society, available at &lt;a href="https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law"&gt;https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law&lt;/a&gt; " Further, research commissioned by CIS cited in the judgment includes a reference in page 201 footnote 319, "Bhairav Acharya, “The Four Parts of Privacy in India”, Economic &amp;amp; Political Weekly (2015), Vol. 50 Issue 22, at page 32."&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-statement-on-right-to-privacy-judgment'&gt;https://cis-india.org/internet-governance/blog/cis-statement-on-right-to-privacy-judgment&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-08-31T18:13:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-seminar-series">
    <title>CIS Seminar Series</title>
    <link>https://cis-india.org/internet-governance/blog/cis-seminar-series</link>
    <description>
        &lt;b&gt;The CIS seminar series will be a venue for researchers to share works-in-progress, exchange ideas, identify avenues for collaboration, and curate research. We also seek to mitigate the impact of Covid-19 on research exchange, and foster collaborations among researchers and academics from diverse geographies. Every quarter we will be hosting a remote seminar with presentations, discussions and debate on a thematic area. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The first seminar series was held on 7th and 8th October on the theme of &lt;a href="https://cis-india.org/internet-governance/blog/cis-seminar-series-information-disorder"&gt;‘Information Disorder: Mis-,  Dis- and Malinformation’&lt;/a&gt;,&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Theme for the Second Seminar (to be held online)&lt;/h3&gt;
&lt;h3&gt;Moderating Data, Moderating Lives:  Debating visions of (automated) content moderation in the contemporary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Artificial Intelligence (AI) and Machine Learning (ML) based approaches have become increasingly popular as “solutions” to curb the extent of mis-, dis- mal-information, hate speech, online violence and harassment on social media. The pandemic and the ensuing work from home policy forced many platforms to shift to automated moderation which further highlighted the inefficacy of existing models (&lt;a href="https://www.zotero.org/google-docs/?u73Lwx"&gt;Gillespie, 2020)&lt;/a&gt; to deal with the surge in misinformation and harassment. These efforts, however, raise a range of interrelated concerns such as freedom and regulation of speech on the privately public sphere of social media platforms; algorithmic governance, censorship and surveillance; the relation between virality, hate, algorithmic design and profits; and social, political and cultural implications of ordering social relations through computational logics of AI/ML.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On one hand, large-scale content moderation approaches (that include automated AI/ML-based approaches) have been deemed “necessary” given the enormity of data generated &lt;a href="https://www.zotero.org/google-docs/?JHQ0rF"&gt;(Gillespie, 2020)&lt;/a&gt;, on the other hand, they have been regarded as “technological fixtures” offered by the Silicon Valley &lt;a href="https://www.zotero.org/google-docs/?YLFnLm"&gt;(Morozov, 2013)&lt;/a&gt;, or “tyrannical” as they erode existing democratic measures &lt;a href="https://www.zotero.org/google-docs/?Ia8JYp"&gt;(Harari, 2018)&lt;/a&gt;. Alternatively, decolonial, feminist and postcolonial approaches insist on designing AI/ML models that centre voices of those excluded to sustain and further civic spaces on social media (&lt;a href="https://www.zotero.org/google-docs/?1Sa8vf"&gt;Siapera, 2022)&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the global south perspective, issues around content moderation foreground the hierarchies inbuilt in the existing knowledge infrastructures. First, platforms remain unwilling to moderate content in under-resourced languages of the global south citing technological difficulties. Second, given the scale and reach of social media platforms and inefficient moderation models, the work is outsourced to workers in the global south who are meant to do the dirty work of scavenging content off these platforms for the global north. Such concerns allow us to interrogate the techno-solutionist approaches as well as their critiques situated in the global north. These realities demand that we articulate a different relationship with AI/ML while also being critical of AI/ML as an instrument of social empowerment for those at the “bottom of the pyramid” &lt;a href="https://www.zotero.org/google-docs/?bvx6mV"&gt;(Arora, 2016)&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The seminar invites scholars interested in articulating nuanced responses to content moderation that take into account the harms perpetrated by algorithmic governance of social relations and irresponsible intermediaries while being cognizant of the harmful effects of mis-, dis- mal-information, hate speech, online violence and harassment on social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite abstract submissions that respond to these complexities vis-a-vis content moderation models or propose provocations regarding automated moderation models and their in/efficacy in furthering egalitarian relationships on social media, especially in the global south.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Submissions can reflect on the following themes using legal, policy, social, cultural and political approaches. Also, the list is not exhaustive and abstracts addressing other ancillary concerns are most welcome:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Metaphors of (content) moderation: mediating utopia, dystopia, scepticism surrounding AI/ML approaches to moderation.&lt;/li&gt;
&lt;li&gt;From toxic to healthy, from purity to impurity: Interrogating gendered, racist, colonial tropes used to legitimize content moderation &lt;/li&gt;
&lt;li&gt;Negotiating the link between content moderation, censorship and surveillance in the global south&lt;/li&gt;
&lt;li&gt;Whose values decide what is and is not harmful? &lt;/li&gt;
&lt;li&gt;Challenges of building moderation models for under resourced languages.&lt;/li&gt;
&lt;li&gt;Content moderation, algorithmic governance and social relations. &lt;/li&gt;
&lt;li&gt;Communicating algorithmic governance on social media to the not so “tech-savvy” among us.&lt;/li&gt;
&lt;li&gt;Speculative horizons of content moderation and the future of social relations on the internet. &lt;/li&gt;
&lt;li&gt;Scavenging abuse on social media: Immaterial/invisible labour for making for-profit platforms safer to use.&lt;/li&gt;
&lt;li&gt;Do different platforms moderate differently? Interrogating content moderation on diverse social media platforms, and multimedia content.&lt;/li&gt;
&lt;li&gt;What should and should not be automated? Understanding prevalence of irony, sarcasm, humour, explicit language as counterspeech.&lt;/li&gt;
&lt;li&gt;Maybe we should not automate: Alternative, bottom-up approaches to content moderation&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Seminar Format&lt;/h3&gt;
&lt;p&gt;We are happy to welcome abstracts for one of two tracks:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Working paper presentation&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A working paper presentation would ideally involve a working draft that is presented for about 15 minutes followed by feedback from workshop participants. Abstracts for this track should be 600-800 words in length with clear research questions, methodology, and questions for discussion at the seminar. Ideally, for this track, authors should be able to submit a draft paper two weeks before the conference for circulation to participants.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Coffee-shop conversations&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In contrast to the formal paper presentation format, the point of the coffee-shop conversations is to enable an informal space for presentation and discussion of ideas. Simply put, it is an opportunity for researchers to “think out loud” and get feedback on future research agendas. Provocations for this should be 100-150 words containing a short description of the idea you want to discuss.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We will try to accommodate as many abstracts as possible given time constraints. We welcome submissions from students and early career researchers, especially those from under-represented communities.&lt;/p&gt;
&lt;p&gt;All discussions will be private and conducted under the Chatham House Rule. Drafts will only be circulated among registered participants.&lt;/p&gt;
&lt;p&gt;Please send your abstracts to &lt;a href="mailto:workshops@cis-india.org"&gt;workshops@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;Timeline&lt;/h3&gt;
&lt;div id="_mcePaste"&gt;&lt;ol&gt;
&lt;li&gt;Abstract Submission Deadline: 18th April&lt;/li&gt;
&lt;li&gt;Results of Abstract review: 25th April&lt;/li&gt;
&lt;li&gt;Full submissions (of draft papers): 25th May&lt;/li&gt;
&lt;li&gt;Seminar date: Tentative 31st May&lt;/li&gt;
&lt;/ol&gt;&lt;/div&gt;
&lt;h3&gt;References&lt;/h3&gt;
&lt;p class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;&lt;a href="https://www.zotero.org/google-docs/?ZHb88g"&gt;&lt;span&gt;Arora, P. (2016). Bottom of the Data Pyramid: Big Data and the Global South. &lt;/span&gt;&lt;/a&gt;&lt;a href="https://www.zotero.org/google-docs/?ZHb88g"&gt;&lt;i&gt;&lt;span&gt;International Journal of Communication&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;a href="https://www.zotero.org/google-docs/?ZHb88g"&gt;&lt;span&gt;, &lt;/span&gt;&lt;/a&gt;&lt;a href="https://www.zotero.org/google-docs/?ZHb88g"&gt;&lt;i&gt;&lt;span&gt;10&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;a href="https://www.zotero.org/google-docs/?ZHb88g"&gt;&lt;span&gt;(0), 19.&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;&lt;a href="https://www.zotero.org/google-docs/?ZHb88g"&gt;&lt;span&gt;Gillespie, T. (2020). Content moderation, AI, and the question of scale. &lt;/span&gt;&lt;/a&gt;&lt;a href="https://www.zotero.org/google-docs/?ZHb88g"&gt;&lt;i&gt;&lt;span&gt;Big Data &amp;amp; Society&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;a href="https://www.zotero.org/google-docs/?ZHb88g"&gt;&lt;span&gt;, &lt;/span&gt;&lt;/a&gt;&lt;a href="https://www.zotero.org/google-docs/?ZHb88g"&gt;&lt;i&gt;&lt;span&gt;7&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;a href="https://www.zotero.org/google-docs/?ZHb88g"&gt;&lt;span&gt;(2), 2053951720943234. https://doi.org/10.1177/2053951720943234&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;&lt;a href="https://www.zotero.org/google-docs/?ZHb88g"&gt;&lt;span&gt;Harari, Y. N. (2018, August 30). &lt;/span&gt;&lt;/a&gt;&lt;a href="https://www.zotero.org/google-docs/?ZHb88g"&gt;&lt;i&gt;&lt;span&gt;Why Technology Favors Tyranny&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;a href="https://www.zotero.org/google-docs/?ZHb88g"&gt;&lt;span&gt;. The Atlantic. https://www.theatlantic.com/magazine/archive/2018/10/yuval-noah-harari-technology-tyranny/568330/&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;&lt;a href="https://www.zotero.org/google-docs/?ZHb88g"&gt;&lt;span&gt;Morozov, E. (2013). &lt;/span&gt;&lt;/a&gt;&lt;a href="https://www.zotero.org/google-docs/?ZHb88g"&gt;&lt;i&gt;&lt;span&gt;To save everything, click here: The folly of technological solutionism&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;a href="https://www.zotero.org/google-docs/?ZHb88g"&gt;&lt;span&gt; (First edition). PublicAffairs.&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.zotero.org/google-docs/?ZHb88g" style="text-align: justify; "&gt;Siapera, E. (2022). AI Content Moderation, Racism and (de)Coloniality. &lt;/a&gt;&lt;a href="https://www.zotero.org/google-docs/?ZHb88g" style="text-align: justify; "&gt;&lt;i&gt;International Journal of Bullying Prevention&lt;/i&gt;&lt;/a&gt;&lt;a href="https://www.zotero.org/google-docs/?ZHb88g" style="text-align: justify; "&gt;, &lt;/a&gt;&lt;a href="https://www.zotero.org/google-docs/?ZHb88g" style="text-align: justify; "&gt;&lt;i&gt;4&lt;/i&gt;&lt;/a&gt;&lt;a href="https://www.zotero.org/google-docs/?ZHb88g" style="text-align: justify; "&gt;(1), 55–65. https://doi.org/10.1007/s42380-021-00105-7&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-seminar-series'&gt;https://cis-india.org/internet-governance/blog/cis-seminar-series&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Cheshta Arora</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Machine Learning</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Seminar</dc:subject>
    

   <dc:date>2022-04-11T15:19:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-response-to-draft-proposal-to-transition-the-stewardship-of-the-internet-assigned-numbers-authority-iana-functions-from-the-u-s-commerce-department2019s-national-telecommunications-and-information-administration">
    <title>CIS Response to Draft Proposal to Transition the Stewardship of the Internet Assigned Numbers Authority (IANA) Functions from the U.S. Commerce Department’s National Telecommunications and Information Administration </title>
    <link>https://cis-india.org/internet-governance/blog/cis-response-to-draft-proposal-to-transition-the-stewardship-of-the-internet-assigned-numbers-authority-iana-functions-from-the-u-s-commerce-department2019s-national-telecommunications-and-information-administration</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-response-to-draft-proposal-to-transition-the-stewardship-of-the-internet-assigned-numbers-authority-iana-functions-from-the-u-s-commerce-department2019s-national-telecommunications-and-information-administration'&gt;https://cis-india.org/internet-governance/blog/cis-response-to-draft-proposal-to-transition-the-stewardship-of-the-internet-assigned-numbers-authority-iana-functions-from-the-u-s-commerce-department2019s-national-telecommunications-and-information-administration&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-11-29T06:32:22Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet">
    <title>CIS highlights changes ushered in by the Internet</title>
    <link>https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet</link>
    <description>
        &lt;b&gt;As part of its fifth anniversary celebrations, the Centre for Internet and Society (CIS) has organised an exhibition showcasing its accomplishments, besides a series of talks by experts on the changes ushered in by the Internet. The exhibition will remain open till Thursday.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article was &lt;a class="external-link" href="http://www.thehindu.com/todays-paper/tp-national/tp-karnataka/cis-highlights-changes-ushered-in-by-the-internet/article4737997.ece"&gt;published in the Hindu&lt;/a&gt; on May 22, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;On Wednesday, a talk will be held at 6 p.m. on “Cyber security, privacy  and surveillance”. Also, Laird Brown, strategic planner and writer, and  Purba Sarkar, associate producer with the cyber security film project,  will make presentations on cyber security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The valedictory will have talks by Kannada writer Chandrashekar Kambar  on “Kannada in modern era”, while member of Kannada Software Committee  U.B. Pavanja will speak on “From palm leaf to tablet”. This will be  followed by a Carnatic music programme by Nirmita Narasimha. The CIS has  also invited the public to be its auditors by displaying its account  books and contracts, which shows how it has spent the Rs. 13.13 crore  received from donors. The exhibition is open from 10 a.m. to 8 p.m.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet'&gt;https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-05-22T06:06:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-18-2013-lobsang-gyatso-sither">
    <title>CIS Cybersecurity Series (Part 18) – Lobsang Gyatso Sither</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-18-2013-lobsang-gyatso-sither</link>
    <description>
        &lt;b&gt;CIS interviews Lobsang Gyatso Sither, Tibetan field coordinator and activist, as part of the Cybersecurity Series.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;“The digital arms trade and the digital arms race, that is going on right now is a huge problem, in terms of what is happening around the world. A lot of people talk about digital arms like it’s just digital technology; it’s just surveillance technology; it’s just censorship technology; it’s just technology; it doesn’t kill anyone, but the fact of the matter is that it does kill. It’s as bad as a gun; it’s as bad as a weapon. It's the same thing in my opinion and it has to be restricted; it has to be curtailed, it has to be controlled so that it doesn’t go to places where there are no human rights and where there are rampant human rights violations. People know what it is going to be used for and it is going to be used for human rights violations and that is something that has be kept in mind before the whole aspect of digital arms trade and it has to be treated as any other arms trade&lt;/em&gt;.”&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its eighteenth installment of the CIS Cybersecurity Series.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Lobsang Gyatso Sither is a Tibetan born in exile dedicated to increasing cybersecurity among Tibetans inside Tibet and in the diasporas. He has helped to develop community-specific technologies and educational content and deploys them via training and public awareness campaigns at the grassroots level. Lobsang works with key communicators and organizations in the Tibetan community, including Voice of Tibet Radio and the Tibetan Centre for Human Rights and Democracy.&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/OtLkgoiTBeo?list=UUwD4YvZvns0xOedAnzt6CYA" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-18-2013-lobsang-gyatso-sither'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-18-2013-lobsang-gyatso-sither&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-07-31T05:34:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy">
    <title>CIS Cybersecurity Series (Part 14) – Menaka Guruswamy</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy</link>
    <description>
        &lt;b&gt;CIS interviews Menaka Guruswamy, lawyer at the Supreme Court of India, as part of the Cybersecurity Series.&lt;/b&gt;
        &lt;div&gt;&lt;em&gt;"The courts have rarely used privacy to stop the Indian state from getting into someone's business. So jurisprudentially, it is a weak challenge when you mount a rights based or a privacy right challenge against surveillance by the state. Because the answer of the state to that has always been, and as has been Obama's answer in the United States, that there are national security concerns. And usually national security will trump individual privacy."&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Centre for Internet and Society presents its fourteenth installment of the CIS Cybersecurity Series.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Menaka Guruswamy practices law at the Supreme Court of India. She was a Rhodes Scholar at Oxford University, and a Gammon Fellow at Harvard Law School, and a gold medalist from the National Law School of India. She has law degrees from all three schools, with a focus on Constitutional Law and Public International Law.&amp;nbsp;Guruswamy has worked at the Office of the Attorney General of India, the highest office that represents the federal government of India in the Supreme Court of India.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
http://youtu.be/GCDD6Z-UrGI
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;iframe src="//www.youtube.com/embed/GCDD6Z-UrGI" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2014-07-21T10:39:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian">
    <title>CIS Cybersecurity Series (Part 1) - Christopher Soghoian</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian</link>
    <description>
        &lt;b&gt;CIS interviews Christopher Soghoian, cybersecurity researcher and activist, as part of the Cybersecurity Series&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;"We live in a surveillance state. The government can find out who we communicate with, who we talk to, who we are near, when we are at a protest, which stores we go to, where we travel to... they can find out all of these things. And it's unlikely it's going to get rolled back, but the best we can hope for is a system of law where the government gets to use its powers only in the right situation." – Christopher Soghoian, American Civil Liberties Union.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its first installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;In this installment, CIS interviews Christopher Soghoian, a privacy researcher and activist, working at the intersection of technology, law and policy. Christopher is the Principal Technologist and a Senior Policy Analyst with the Speech, Privacy and Technology Project at the American Civil Liberties Union (ACLU).&lt;/p&gt;
&lt;p&gt;Christopher is based in Washington, D.C. His website is http://www.dubfire.net/&lt;/p&gt;
&lt;p&gt;&lt;iframe src="http://www.youtube.com/embed/SQo4b-jTAWM" frameborder="0" height="315" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-07-12T10:26:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/cis-cybersecurity-film-screening">
    <title>CIS Cybersecurity Film Screening </title>
    <link>https://cis-india.org/events/cis-cybersecurity-film-screening</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society invites you to a screening of Episode 1&amp;2 of DesiSec: the first documentary film on cybersecurity in India. Hope you can join us on 26th March, at CIS, Domlur!&lt;/b&gt;
        
&lt;div&gt;Early 2013, the Centre for Internet and Society began shooting its first documentary film project.&amp;nbsp;After months of researching and interviewing activists and experts, CIS released the first episode on 11th December.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;CIS is hosting a special screening of&amp;nbsp;&lt;strong&gt;DesiSec: Episode 1&amp;amp;2&lt;/strong&gt;&amp;nbsp;on&amp;nbsp;&lt;strong&gt;26th March, 2&lt;/strong&gt;&lt;strong&gt;013, 5.30 pm&lt;/strong&gt;&amp;nbsp;and invites you to this event. The first episode is centered around the issue of privacy and surveillance in cyber space and how it affects Indian society. The second episode is focused on anonymity and free speech online.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;We look forward to seeing you there!&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;RSVP:&amp;nbsp;&lt;a href="mailto:purba@cis-india.org" target="_blank"&gt;purba@cis-india.org&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;Venue:&amp;nbsp;http://osm.org/go/yy4fIjrQL?m=&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/cis-cybersecurity-film-screening'&gt;https://cis-india.org/events/cis-cybersecurity-film-screening&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2014-03-20T09:34:38Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-comments-revised-npd-report">
    <title>CIS Comments Revised NPD report</title>
    <link>https://cis-india.org/internet-governance/cis-comments-revised-npd-report</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-comments-revised-npd-report'&gt;https://cis-india.org/internet-governance/cis-comments-revised-npd-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>aman</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2021-03-22T05:39:03Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
