<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 961 to 975.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/tech-president-august-6-2013-david-eaves-beyond-property-rights-thinking-about-moral-definitions-openness"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/better-understanding-of-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/benefits-harms-rights-and-regulation-a-survey-of-literature-on-big-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/battle-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/cryptoparty-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/bangalore-crypto-party"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-moulishree-srivastava-october-22-2013-bali-meet-to-discuss-internet-governance-issues"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-august-19-2013-prashant-jha-balancing-vigilance-and-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/august-2019-newsletter"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf">
    <title>Beyond Public Squares, Dumb Conduits, and Gatekeepers: The Need for a New Legal Metaphor for Social Media</title>
    <link>https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf'&gt;https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2021-05-31T10:19:33Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/tech-president-august-6-2013-david-eaves-beyond-property-rights-thinking-about-moral-definitions-openness">
    <title>Beyond Property Rights: Thinking About Moral Definitions of Openness</title>
    <link>https://cis-india.org/news/tech-president-august-6-2013-david-eaves-beyond-property-rights-thinking-about-moral-definitions-openness</link>
    <description>
        &lt;b&gt;It is hard for Westerners to realize just how much we take for granted about intellectual property, and in particular, how much the property owner’s perspective--be it a corporation, government or creative artist--is embedded in our view of the world as the natural order of things.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This blog post by David Eaves &lt;a class="external-link" href="http://techpresident.com/news/wegov/24244/beyond-property-rights-thinking-about-moral-definitions-openness"&gt;was published in TECH President &lt;/a&gt;on August 6, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;While sharing and copying technologies are disrupting some of the  ways we understanding “content,” when you visit a non-Western country  like India, the spectrum of choices become broader. There is less  timidity wrestling with questions like: should poor farmers pay inflated  prices for patented genetically-engineered seeds? How long should  patents be given for life-saving medicines that cost more than many make  in a year? Should Indian universities spend millions on academic  journals and articles? In the United States or other rich countries we  may weigh both sides of these questions--the rights of the owner vs. the  moral rights of the user--but there’s no question people elsewhere,  such as in India, weigh them different given the questions of life and  death or of poverty and development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consequently, conversations about open knowledge outside the  supposedly settled lands of the “rich” often stretch beyond  permission-based “fair use” and “creative commons” approaches. There is a  desire to explore potential moral rights to use “content” in addition  to just property rights that may be granted under statutes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A couple of months ago I sat down in Bangalore with &lt;a href="https://cis-india.org/publications-automated/cis/sunil"&gt;Sunil Abraham&lt;/a&gt;, the founder and executive director of the &lt;a href="https://cis-india.org/"&gt;Center for Internet &amp;amp; Society (CIS)&lt;/a&gt; there, to talk about the center, and his views on the role of  technology and openness in politics and society. One part of our  conversation led to &lt;a href="http://techpresident.com/news/23934/how-technology-and-isnt-helping-fight-corruption-india"&gt;this WeGov column on “I Paid a Bribe”&lt;/a&gt;&lt;a&gt; and the challenge of fighting corruption in India using technology.  Here I want to reflect further on how Sunil and his counterparts may be  radically challenging how we should think about open information more  generally.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As we talked, Sunil outlined how people and organizations were using  “open” methodologies to advance social movements or create counter  power. To explain his view he sketched out the following “map” of IP  rights and freedoms to show people use and view the different  “permissions” (some legal, some illegal).&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Mapping.png" alt="Mapping the Definition and Use of Open" class="image-inline" title="Mapping the Definition and Use of Open" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;As a high-level overview this map offers a general list of the tools  at the disposal of citizens interested in playing with intellectual  property, particularly as they pursue social justice issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the top of the chart are the various forms of “permissions” that a  property owner may (or may not) grant you. Thus at the far left sits  the most restrictive IP regime and, as you move right, the user gets  more and more freedoms (or, if you take the perspective of property  owners, property loses more and more of its formal legal protections and  a different notion, of “moral rights,” arises).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second row divides the permissions and the actors along what  Sunil believes is one of the most important permissions - the  requirement to attribute (or the freedom not to).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, at the bottom, I’ve placed various actors along the spectrum  to both show where they might be positioned in the access debate and/or  how they use these tools to advance their aims. Thus someone like  Lawrence Lessig, the intellectual father of Creative Commons, might  support many uses of information as long as the owner gives permission;  whereas groups like the Pirate Party or the Yes Men edge further out  into uses that may not appear legitimate to a property owner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Particularly interesting is Sunil’s decision to include non-legal  “permissions” such as ignoring the property holders rights in his  spectrum of openness. He sees this as the position of the Pirate Party,  which he suggests advocates that people should have the right to do what  they want with intellectual property even if they don’t have  permission, with the exception, interestingly, of ignoring attribution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He also includes two even more radical “permissions” –  counterfeiting, that is claiming that you created the work – and false  attribution – assigning your work to someone else! Sunil sees Anonymous  as often using the former and the Yes Men as using the latter. “They  (the Yes Men) are playing with the attribution layer,” he says, by  conducting actions such as their fake DOW press release about the Bhopal  disaster.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pushing the identity envelope&lt;/b&gt;&lt;br /&gt;To Sunil, the big dividing line is less about legal vs. illegal but  around this issue of attribution. “This is the most exciting area  because this (the non-attribution area) is where you escape  surveillance,” he declares.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“All the modern day regulation over IP is trying to pin an individual  against their actions and then trying to attach responsibility so as to  prosecute them,” Sunil says. “All that is circumvented when you play  with the attribution layer.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This matters a great deal for individuals and organizations trying to  create counter power – particularly against the state or large  corporate interests. In this regard Sunil is actually linking the tools  (or permissions) along the open spectrum to civil disobedience. Of  course, such “permissions” are also used by states all the time, such as  pretending that a covert action was the responsibility of someone else,  or simply denying responsibility for some action.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This, in turn, has some interesting implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first is, that it allows Sunil to weave together a number of  groups that might not normally be seen as connected because he can map  their strategies or tools against a common axis. Thus Lawrence Lessig,  the Yes Man, companies and journalists can all be organized based on  what “permissions” they believe are legitimate. For example, journalists  and new publishers are often seen as fairly pro-copyright (it protects  their work) but they are quite happy to ignore the proprietary rights of  a government or corporate document and publish its contents, if they  believe that action is in the public interest. Hence their position on  the spectrum as “willing to ignore proprietary rights.” (Leave aside  government arguments that publishing such documents is “stealing” when,  at least in the US, they are technically already not subject to  copyright.) However, a credible newspaper or journalist would never  knowingly attribute a quote or document to a different person.  Attribution remains sacred, even when legal proprietary rights are not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It also tests the notions of who is actually an IP radical. As Sunil  notes: “The more you move to the right the more radical you are. Because  everywhere on the left you actually have to educate people about the  law, which is currently unfair to the user, before you even introduce  them to the alternatives. You aren’t even challenging the injustice in  the law! On the right you are operating at a level that is liberated  from identity and accountability. You are hacking identity.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil is thus justifying how the use of “illegal” permissions may  actually be a form of civil disobedience that can be recognized as  legitimate. This is something journalists confront regularly as well.  Many are willing to publish “illegally” obtained leaked documents when  they believe that may serve the public good. What is ethical is not  always legal and so there position on this chart is more nuanced than  one might initially suspect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is not to say that Sunil doesn’t believe in the effectiveness of  legal approaches. For him this map represents a more complete range of  choices an activist can choose from as they try to develop their  strategy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“So what you do, and the specific change you are trying to  precipitate, you’ll have to determine what strategy you need. Sometimes  working within the left hand group is sufficient. Having a  non-derivative, non-commercial license to enable students to access  academic works, in India, is good enough… But then, to do what the &lt;a href="http://www.democracynow.org/2004/12/6/yes_men_hoax_on_bbc_reminds"&gt;Yes Men did to DOW Chemicals&lt;/a&gt;? You have to be over on the right side.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/tech-president-august-6-2013-david-eaves-beyond-property-rights-thinking-about-moral-definitions-openness'&gt;https://cis-india.org/news/tech-president-august-6-2013-david-eaves-beyond-property-rights-thinking-about-moral-definitions-openness&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2013-08-07T09:43:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion">
    <title>Beyond Access as Inclusion</title>
    <link>https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion</link>
    <description>
        &lt;b&gt;On 13 September, the day before the fifth Internet Governance Forum opens, CIS is coorganising in Vilnius a meeting on Internet governance and human rights. One of the main aims of this meeting is to call attention to the crucial, yet in Internet governance often neglected, indivisibility of rights. In this blog post, Anja Kovacs uses this lens to illustrate how it can broaden as well reinvigorate our understanding of what remains one of the most pressing issues in Internet governance in developing countries to this day: that of access to the Internet.&lt;/b&gt;
        
&lt;p align="JUSTIFY"&gt;One of the most attractive characteristics of the
Internet – and perhaps also one of the most debated ones – is its
empowering, democratising potential. In expositions in favour of
access to the Internet for all, this potential certainly often plays
a central role: as the Internet can help us to make our societies
more open, more inclusive, and more democratic, everybody should be
able to reap the fruits of this technology, it is argued. In other
words, in debates on access to the Internet, most of us take as our
&lt;em&gt;starting point&lt;/em&gt; the desirability of such access, for the above
reasons. But how justified is such a stance? Is an Internet-induced
democratic transformation of our societies what is actually happening
on the ground?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;I would like to move away, in this blog post, from
the more traditional approaches to the issue of access, where debates
mostly veer towards issues of infrastructure (spectrum, backbones,
last mile connectivity, …) or, under the banner of “diversity”,
towards the needs of specific, disadvantaged communities (especially
linguistic minorities and the disabled). To remind us more sharply of
the issues at stake and of the wide range of human rights that need
our active attention to make our dreams a reality, I would like to
take a step back and to ask two fundamental questions regarding
access: why might access be important? And what do we actually have
access to?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Let me start, then, by exploring the first question:
why, actually, is Internet access important? In his canonical work on
the information age, and especially in the first volume on the rise
of the network society, Manuel Castells (2000) has perhaps provided
the most elaborate and erudite description of the ways in which new
technologies are restructuring our societies and our lives. We are
all all too familiar with the many and deep-seated ways in which the
Internet changes the manner in which we learn, play, court, pay, do
business, maintain relationships, dream, campaign. And yet, the exact
nature of the divide created by the unequal distribution of technical
infrastructure and access, despite being so very real, receives
relatively little attention: this divide is not simply one of
opportunities, it is crucially one of power. If in traditional
Marxist analysis the problem was that the oppressed did not have
access to the means of production, today, one could well argue, the
problem is that they do not have access to the means of communication
and information.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Indeed, the Internet is not something that is simply
happening to us: there are people who are responsible for these new
evolutions. And so it becomes important to ask: who is shaping the
Internet? Who is creating this new world? Let us, by way of example,
consider some figures relating to Internet use in India. So often
hailed as the emerging IT superpower of the world, there are, by the
end of 2009, according to official government figures, in this
country of 1 billion 250 million people slightly more than 15 million
Internet connections. Of these, only slightly more than half, or
almost 8 million, are broadband connections – the rest are still
dial-up ones (TRAI 2010). The number of Internet users is of course
higher – one survey estimates that there are between 52 million and
71 million Internet users in urban areas, where the bulk of users is
still located (IAMAI 2010). But while this is a considerable number,
it remains a fraction of the population in a country so big. What
these figures put in stark relief, then, is that the poor and
marginalised are not so much excluded from the information society
(in fact, many have to bear the consequences of new evolutions made
possible by it in rather excruciating fashion), but rather, that they
are fundamentally excluded from shaping the critical ways in which
our societies are being transformed.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;To have at least the possibility to access the
Internet is, then, of central significance in this context for the
possibility of participation it signals in the restructuring of our
societies at the community, national and global level, and this in
two ways: in the creation of visions of where our societies should be
going, and in the actual shaping of the architecture of our societies
in the information age.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;If we agree that access attains great significance
in this sense, then a second question poses itself, and that is: in
practice, what exactly are we getting access to? This query should be
of concern to all of us. With the increasing corporatisation of the
Internet and the seemingly growing urges of governments on all
continents to survey and control their citizens, new challenges are
thrown up of how to nurture the growth of open, inclusive, democratic
societies, that all of us are required to take an interest in.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Yet it is in the case of poor and marginalised
people that the challenges are most pronounced.&amp;nbsp; Efforts to
include them in the information society are disproportionately
legitimised on the basis of the contribution these can make to
improving their livelihoods. Initiatives, often using mobile
technology, that allow farmers to get immediate information about the
market prices of the produce they are intending to sell, are perhaps
the most well-known and oft-cited examples in this category. Other
efforts aim to improve the information flow from the government to
citizens: India has set up an ambitious network of Common Service
Centres, for example, that aim to greatly facilitate the access of
citizens to particular government services, such as obtaining birth
or caste certificates – and going by first indications, this also
seems to be succeeding in practice. Only rarely, however, do
initiatives to “include” the poor in the information society
address them as holistic beings who do not only have economic lives,
but political, emotional, creative and intellectual existences as
well.&amp;nbsp; This is not to say that economic issues are not of
importance. But by highlighting only this aspect of poor people's
lives, we promote a highly impoverished understanding of their
existences.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The focus on a limited aspect of the poor's identity
- important as that aspect may be - has a function, however: it makes
it possible to hide from view the extremely restrictive terms on
which poor people are currently being integrated into the information
society. Even initiatives such as the Common Service Centres are in
fact based on a public-private-partnership model that explicitly aims
to “align [..] social and commercial goals” (DIT 2006: 1), and in
effect subordinates government service design to the requirements of
the CSC business model (Singh 2008). The point is not simply that we
need strong privacy and data protection policies in such a context –
although we clearly do. There is a larger issue here, which is that
efforts to include the poor in the information society, in the
present circumstances, really seem to simply integrate them more
closely into a capitalist system over which they have little control,
or to submit them to ever greater levels of government and corporate
surveillance. Their own capacity to give shape to the system in which
they are “included”, despite the oft-heralded capacities of the
Internet to allow greater democratic participation and to turn
everybody into a producer and distributor, as well as a consumer,
remains extremely limited.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Such tendencies have not gone unnoticed. For
example, unlike in many other parts of the world, social movements in
India fighting against dams, special economic zones or mining
operations in forest areas - all initiatives that lead to large-scale
displacement – have not embraced technology as enthusiastically as
one might have expected. There are various reasons for this. Within
Indian nationalism, there have always been strands deeply critical of
technology, with Gandhi perhaps their most illustrious proponent. But
for many activists, technology often also already comes with an
ideological baggage: an application such as Twitter, for example, in
so many of its aspects is clearly manufactured by others, for others,
drawing on value sets that activists often in many ways are reluctant
to embrace. And such connotations only gain greater validity because
of the intimate connections that exist in India between the IT boom
and neoliberalism: technology has great responsibility for many of
the trends and practices these activists are fighting against. While
the Internet might have made possible many new publics, most
movements do not – as movements – recognise these publics as
their own (Kovacs, forthcoming).&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;To some extent, these are of course questions of the
extent of access that people are granted. But they also raise the
important issue of the value structure of the Internet. Efforts at
inclusion always take for granted a standard that is already set. But
what if the needs and desires of the many billions that still need to
be included are not served by the Internet &lt;em&gt;as it exists&lt;/em&gt;? What
if, for it to really work for them, they need to be able to make the
Internet a different place than the one we know today? While it is
obvious that different people will give different answers in
different parts of the world, such debates are complicated
tremendously by the fact that it is no longer sufficient to reach a
national consensus on the issues under discussion, as was the case in
earlier eras. The global nature of the Internet's infrastructure
requires that the possibility of differing opinions, too, needs to be
facilitated at the global level. What are the consequences of this
for the development of democracy?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;For access to the Internet to be substantively
meaningful from a human rights perspective in the information age, it
is crucial, then, that at a minimum, the openness of the Internet is
ensured at all levels. Of course, openness can be considered a value
in itself. But perhaps more importantly, at the moment, it is the
only way in which the possibility of a variety of answers to the
pressing question of what shape our societies should take in the
information age can emerge. Open standards and the portability of
data, for example, are crucial if societies are to continue to decide
on the role corporations should play in their public life, rather
than having corporations &lt;em&gt;de facto&lt;/em&gt; rule the roost. Similarly,
under no circumstances should anyone be cut off from the Internet, if
people are to participate in the public life of the societies of
which they are members. And these are not just concerns for
developing countries: if recent incidents from France to Australia
are anything to go by, new possibilities facilitated by the Internet
have, at least at the level of governments, formed the impetus for a
clear shift to the right of the political spectrum in many developed
countries. In the developed world, too, the questions of access and
what it allows for are thus issues that should concern all. In the
information age, human rights will only be respected if such respect
is already inscribed in the very architecture of its central
infrastructure itself.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;List of References&lt;/strong&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Castells, Manuel (2000). &lt;em&gt;The Rise of the Network
Society, 2&lt;sup&gt;nd&lt;/sup&gt; edition&lt;/em&gt;. Oxford: Blackwell.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Department of Information Technology (DIT) (2006).
&lt;em&gt;Guidelines for the Implementation of Common Services Centers
(CSCs) Scheme in States&lt;/em&gt;. New Delhi: Department of Information
Technology, Government of India.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Internet and Mobile Association of India (IAMAI)
(2010). &lt;em&gt;I-Cube 2009-2010: Internet in India&lt;/em&gt;. Mumbai: Internet
and Mobile Association of India.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Kovacs, Anja (forthcoming). &lt;em&gt;Inquilab 2.0?
Reflections on Online Activism in India&lt;/em&gt; (working title).
Bangalore: Centre for Internet and Society.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Singh, Parminder Jeet (2008). &lt;em&gt;Recommendations for a
Meaningful and Successful e-Governance in India&lt;/em&gt;. IT for Change Policy
Brief, IT for Change, Bangalore.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Telecom Regulatory Auhority of India (TRAI) (2010).
&lt;em&gt;The Indian Telecom Services Performance Indicators,
October-December 2009&lt;/em&gt;. New Delhi: Telecom Regulatory Auhority of
India.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion'&gt;https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>anja</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Development</dc:subject>
    
    
        <dc:subject>Digital Access</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>human rights</dc:subject>
    

   <dc:date>2011-08-02T07:29:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global">
    <title>Between the Local and the Global: Notes Towards Thinking the Nature of Internet Policy</title>
    <link>https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global</link>
    <description>
        &lt;b&gt;This post by Nishant Shah is part of a series related to the 2014 Milton Wolf Seminar on Media and Diplomacy: The Third Man Theme Revisited: Foreign Policies of the Internet in a Time Of Surveillance and Disclosure, which takes place in Vienna, Austria from March 30 – April 1, 2014. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;i&gt;The 2014 seminar is jointly organized  by the Center for Global Communication Studies (CGCS) at the University  of Pennsylvania’s Annenberg School for Communication, the American  Austrian Foundation (AAF), and the Diplomatic Academy of Vienna (DA).   For more information visit the &lt;a href="http://cgcs.asc.upenn.edu/cgi-bin/projects-location.cgi?id=123"&gt;seminar webpage&lt;/a&gt; and &lt;a href="https://www.facebook.com/MiltonWolfSeminar"&gt;Facebook Page&lt;/a&gt;. Dr. Nishant Shah is the co-founder and &lt;a href="http://www.cis-india.org/"&gt;Director-Research at the Centre for Internet and Society, Bangalore&lt;/a&gt;, India.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah's post was published on April 1st, 2014 | &lt;a class="external-link" href="http://cgcsblog.asc.upenn.edu/2014/04/01/between-the-local-and-the-global-notes-towards-thinking-the-nature-of-internet-policy/"&gt;by cgcsblog&lt;/a&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;An imagined and perceived gap between the global and the local informs transnational politics and internet policy. The global views the local as both the site upon which the global can manifest itself as well as the microcosm that supports and strengthens global visions by providing mutations, adaptations and reengineering of the governance practices. The local is encouraged to connect with the global through a series of outward facing practices and policies, thus producing two separate domains of preservation and change.  On the one hand, the local, the organic and the traditional, needs to be preserved and make the transnational and the global the exotic other. On the other hand, the local also needs to be in a state of aspiration, transforming itself to belong to global networks of polity and policy that are deemed as desirable, especially for a development and rights based vision of societies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While these negotiations and transactions are often fruitful and local, national, and transnational structures and mechanics have been developed to facilitate this flow, this relationship is precarious. There is an implicit recognition that the local and the transnational, dialectically produced, are often opaque categories and empty signifiers. They sustain themselves through unquestioned presumptions of particular attributes that are taken for granted in these interactions. There have been many different metaphors that have been used to understand and explain these complex transfers of knowledge and information, resources and capital, bodies and ideologies. Vectors, Flows, Disjunctures, Intersections are some of the examples. However, with the rise of the digital technologies and vocabularies, especially the internet, the metaphor of the Network with its distributed nodes has become one of the most potent explanations of contemporary politics. This idea of living in networked worlds is so seductive and ‘common-sense,’ that it has become an everyday practice to think of the global as a robust, never-ending, all-inclusive network where the local becomes an important node because it enables both connectivity within but also an expansion of the edges, in order to connect to that which is outside the traffic capacities of the network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ‘Network Society’ paradigm is distinct from earlier rubrics of information and open society that have informed existing information and communication policies. In this paradigm we have the opportunity to revisit and remap the ways in which local governments and populations function and how they produce locals who can feed into the transnational and global discourse. The network facilitates some knowledge that is valuable and allows us to map inequity and mal-distribution of resources by offering comparisons between the different nodes. Networks force our attention to the edges, the no-person’s-zone which is porous but still serves as an osmotic filter that often keeps the underprivileged and the unintelligible outside its fold. Networks as metaphors are valuable because they produce a cartographic vision of the world with multiple boundaries and layers, dealing with big data sets to create patterns that might otherwise be invisible. They enable the replication of models that can be further localised and adapted to fit the needs of the context.  Networks make the world legible – we write it through the lens of the network, intelligible – we understand it through the language and vocabulary of the network, and accessible – it allows for knowledge and practices to transfer across geographies and times.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, networks are a vicious form of organisation because they work through the logic of resource maximisation, efficiency and optimisation, often disallowing voices of dissent that threaten the consensus making mechanisms of the network. Networks have a self-referential relationship with reality because they produce accounts of reality which can easily stand in for the material and the real. They are the new narratives that can operate with existing data sets and produce such rich insights for analysis that we forget to account for that which cannot be captured in the database structures of these data streams. Networks work through a principle of homogeneity and records, thus precluding forms of operation which cannot be easily quantified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given this complex nature of networks and the fact that they are emerging as the de facto explanations of not only social and cultural relationships but also economic and political transactions, it might be fruitful to approach the world of policy and politics, the local and the transnational, through the lens of the network. Building a critique of the network while also deploying the network as a way to account for the governmental practices might produce key insights into how the world operates. What does it mean to imagine the world in the image of the internet as a gigantic network? What are the ways in which a networked visualisation of policy and governmental processes can help us analyse and understand contemporary politics? What tools can we develop to expose the limitations of a network paradigm and look at more inclusive and sensitive models for public discourse and participation? How do we document events, people, and drivers of political change that often get overlooked in the networked imagination of transnational politics? These are the kind of questions that the Center for Global Communication Study’s Internet Policy Observatory (IPO) could initiate, building empirical, qualitative and historical research to understand the complex state of policy making and its relationship with enforcement, operationalization and localisation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the scope and scale of these questions, there are a few specific directions that can be followed to ensure that research is focused and concentrated rather than too vague and generalised:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Bird’s eye views:&lt;/b&gt; The big picture understanding of  transnational political and policy networks is still missing from our  accounts of contemporary discourse. While global representative networks  of multi-stakeholder dialogues have been established, there is not  enough understanding of how they generate traffic (information,  knowledge, data, people, policies) within the network through the  different nodes. Producing an annotated and visual network map that  looks at the different structural and organisational endeavours and  presences, based on available open public data, bolstered by qualitative  interviews would be very useful both as a research resource but also an  analytic prototype to understand the complex relationships between the  various stakeholders involved in processes of political change. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Crisis Mapping:&lt;/b&gt; One of the most important things within Network studies is how the  network identifies and resolves crises. Crises are the moment when the  internal flaws, the structural weaknesses, and the fragile  infrastructure become visible. The digital network, like the internet,  has specific mechanisms of protecting itself against crises. However,  the appearance of a crisis becomes an exciting time to look at the  discrepancy between the ambition of the network and its usage. A crisis  is generally a symptom that shows the potentials for radical subversion,  overthrowing, questioning and the abuse of network designs and visions.  Locating ICT related crises with historical and geographical focuses  could similarly reveal the discrepancies of the processes of making  policy and orchestrating politics.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Longitudinal Studies:&lt;/b&gt; The network remains strong because it works through a prototype  principle. Consequently, no matter how large the network is, it is  possible to splice, slice, and separate a small component of the network  for deep dive studies. This microcosm offers rich data sets, which can  then be applied across the network to yield different results. Further,  working with different actors – from individual to the collective, from  the informal the institutional – but giving them all equal valency  provides a more equal view of the roles, responsibilities, and  aspirations of the different actors involved in the processes. This kind  of a longitudinal study, working on very small case-studies and then  applying them to analyse the larger social and political conditions help  in understanding the transnational and global processes in a new way.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;These research based inquiries could result in many different outputs based on the key users that they are working with and for. The methods could be hybrid, using existing local and experimental structures, with predefined criteria for rigour and robustness. The research, given its nature, would necessitate working with existing networks and expanding them, thus building strong and sustainable knowledge networks that can be diverted towards intervention through capacity building and pedagogy directed at the different actors identified within these nodes.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Dr. Nishant Shah is the co-founder and Director-Research at the Centre for Internet and Society, Bangalore, India. He is an International Tandem Partner at the Centre for Digital Cultures, Leuphana University, Germany and a Knowledge Partner with the Hivos Knowledge Programme, The Netherlands. In these varied roles, he has been committed to producing infrastructure, frameworks and collaborations in the global south to understand and analyse the ways in which emergence and growth of digital technologies have shaped the contemporary social, political and cultural milieu. He is the editor for a series of monographs on ‘Histories of Internet(s) in India’ that looks at the complicated relationship that technologies have with questions of gender, sexuality, body, city, governance, archiving and gaming in a country like India. He is also the principle researcher for a research programme that produced the four-volume anthology ‘Digital AlterNatives With a Cause?’ that examines the ways in which young people’s relationship with digital technologies produces changes in their immediate environments.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global'&gt;https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-04T03:49:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/better-understanding-of-privacy">
    <title>Better Understanding of the Idea of Privacy Sought</title>
    <link>https://cis-india.org/news/better-understanding-of-privacy</link>
    <description>
        &lt;b&gt;Understanding the ways in which an individual's privacy is violated will help provide a better definition of privacy in India. At a public conference called ‘Privacy Matters' held at the Madras Institute of Development Studies (MIDS) here on Saturday, speakers underscored the need for discussions surrounding the privacy bill. &lt;/b&gt;
        
&lt;p&gt;Prashant Iyengar from Privacy India said, "In India, we do not have a set view on privacy. There is a lot of articulation around privacy in law, yet we do not have an omnibus concept." He stressed the importance of bringing about discussions around the adequacy of safeguards.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Post 26/11 terror attacks, the country has seen an enhancement of electronic surveillance and the proliferation of databases that collect information from individuals, said Santhosh Babu, Secretary, Information Technology Department.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"The problem arises when these databases are misused for political or other reasons. In a legal framework, we have to figure out what information can be given out, what cannot and what can be misused," he said. He stressed the importance of databases going through a software development lifecycle to make them more secure.&lt;/p&gt;
&lt;p&gt;Speaking from a media practitioner's perspective, Sashi Kumar, Chairman, Media Development Foundation, said it is the business of the media to conduct sting operations especially when people in power are obfuscating information. “Sting operations are legitimate when larger public good is at stake. We have to be aware of this when we discuss the privacy bill. It should not protect people in power and keep exposure at bay,” he said. He also stressed that privacy is closely linked with the dignity of the person. R. Ramamurthy, Chairman, Cyber Society of India said, “The definition of privacy varies from what it was twenty years ago to what it is today. A lot has changed since the internet came to India.” The statutes that govern all forms of communication in India should be revamped, he said. Discussions around privacy in relation to&amp;nbsp;telecommunications, financial transactions, consumer rights and basic rights followed. The conference was a collaborative effort between Privacy India, Citizen Consumer and Civic Action Group, Chennai and MIDS.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;A staff reporter from the Hindu covered the event. The original can be read &lt;a class="external-link" href="http://www.thehindu.com/news/cities/Chennai/article2331506.ece"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/better-understanding-of-privacy'&gt;https://cis-india.org/news/better-understanding-of-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-08-08T07:40:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/benefits-harms-rights-and-regulation-a-survey-of-literature-on-big-data">
    <title>Benefits, Harms, Rights and Regulation: A Survey of Literature on Big Data</title>
    <link>https://cis-india.org/internet-governance/files/benefits-harms-rights-and-regulation-a-survey-of-literature-on-big-data</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/benefits-harms-rights-and-regulation-a-survey-of-literature-on-big-data'&gt;https://cis-india.org/internet-governance/files/benefits-harms-rights-and-regulation-a-survey-of-literature-on-big-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-03-23T02:03:07Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data">
    <title>Benefits and Harms of "Big Data"</title>
    <link>https://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data</link>
    <description>
        &lt;b&gt;Today the quantity of data being generated is expanding at an exponential rate. From smartphones and televisions, trains and airplanes, sensor-equipped buildings and even the infrastructures of our cities, data now streams constantly from almost every sector and function of daily life.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2011 it was 	estimated that the quantity of data produced globally would surpass 1.8 zettabyte&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt;. By 2013 that had grown 	to 4 zettabytes&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;, and with the nascent development of the so-called 'Internet of Things' gathering pace, 	these trends are likely to continue. This expansion in the volume, velocity, and variety of data available&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; , together with the development of innovative forms of statistical analytics, is generally referred to as "Big Data"; though there is no single agreed upon 	definition of the term. Although still in its initial stages, Big Data promises to provide new insights and solutions across a wide range of sectors, many 	of which would have been unimaginable even 10 years ago.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite enormous optimism about the scope and variety of Big Data's potential applications however, many remain concerned about its widespread adoption, 	with some scholars suggesting it could generate as many harms as benefits&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;. Most notably these have included concerns about the inevitable threats to privacy associated with the generation, collection and use of large quantities of data	&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;. However, concerns have also been raised regarding, for example, the lack of transparency around the 	design of algorithms used to process the data, over-reliance on Big Data analytics as opposed to traditional forms of analysis and the creation of new 	digital divides to just name a few.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The existing literature on Big Data is vast, however many of the benefits and harms identified by researchers tend to relate to sector specific 	applications of Big Data analytics, such as predictive policing, or targeted marketing. Whilst these examples can be useful in demonstrating the diversity 	of Big Data's possible applications, it can nevertheless be difficult to gain an overall perspective of the broader impacts of Big Data as a whole. As such 	this article will seek to disaggregate the potential benefits and harms of Big Data, organising them into several broad categories, which are reflective of 	the existing scholarly literature.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;What are the potential benefits of Big Data?&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;From politicians to business leaders, recent years have seen Big Data confidently proclaimed as a potential solution to a diverse range of problems from, 	world hunger and diseases, to government budget deficits and corruption. But if we look beyond the hyperbole and headlines, what do we really know about 	the advantages of Big Data? Given the current buzz surrounding it, the existing literature on Big Data is perhaps unsurprisingly vast, providing 	innumerable examples of the potential applications of Big Data from agriculture to policing. However, rather than try (and fail) to list the many possible 	applications of Big Data analytics across all sectors and industries, for the purposes of this article we have instead attempted to distil the various 	advantages of Big Data discussed within literature into the following five broad categories; Decision-Making, Efficiency &amp;amp; Productivity, Research &amp;amp; 	Development, Personalisation and Transparency, each of which will be discussed separately below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Decision-Making &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whilst data analytics have always been used to improve the quality and efficiency of decision-making processes, the advent of Big Data means that the areas 	of our lives in which data driven decision- making plays a role is expanding dramatically; as businesses and governments become better able to exploit new 	data flows. Furthermore, the real-time and predictive nature of decision-making made possible by Big Data, are increasingly allowing these decisions to be 	automated. As a result, Big Data is providing governments and business with unprecedented opportunities to create new insights and solutions; becoming more 	responsive to new opportunities and better able to act quickly - and in some cases preemptively - to deal with emerging threats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This ability of Big Data to speed up and improve decision-making processes can be applied across all sectors from transport to healthcare and is often 	cited within the literature as one of the key advantages of Big Data. Joh, for example, highlights the increased use of data driven predictive analysis by 	police forces to help them to forecast the times and geographical locations in which crimes are most likely to occur. This allows the force to redistribute their officers and resources according to anticipated need, and in certain cities has been highly effective in reducing crime rates	&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;. Raghupathi meanwhile cites the case of healthcare, where predictive modelling driven by big data is 	being used to proactively identify patients who could benefit from preventative care or lifestyle changes&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One area in particular where the decision-making capabilities of Big Data are having a significant impact is in the field of risk management	&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;. For instance, Big Data can allow companies to map their entire data landscape to help detect sensitive 	information, such as 16 digit numbers - potentially credit card data - which are not being stored according to regulatory requirements and intervene 	accordingly. Similarly, detailed analysis of data held about suppliers and customers can help companies to identify those in financial trouble, allowing 	them to act quickly to minimize their exposure to any potential default&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Efficiency and Productivity &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an era when many governments and businesses are facing enormous pressures on their budgets, the desire to reduce waste and inefficiency has never been 	greater. By providing the information and analysis needed for organisations to better manage and coordinate their operations, Big Data can help to alleviate such problems, leading to the better utilization of scarce resources and a more productive workforce	&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within the literature such efficiency savings are most commonly discussed in relation to reductions in energy consumption	&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;. For example, a report published by Cisco notes how the city of Olso has managed to reduce the energy 	consumption of street-lighting by 62 percent through the use of smart solutions driven by Big Data&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;. 	Increasingly, however, statistical models generated by Big Data analytics are also being utilized to identify potential efficiencies in sourcing, 	scheduling and routing in a wide range of sectors from agriculture to transport. For example, Newell observes how many local governments are generating 	large databases of scanned license plates through the use of automated license plate recognition systems (ALPR), which government agencies can then use to 	help improve local traffic management and ease congestion&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commonly these efficiency savings are only made possible by the often counter-intuitive insights generated by the Big Data models. For example, whilst a 	human analyst planning a truck route would always tend to avoid 'drive-bys' - bypassing one stop to reach a third before doubling back - Big Data insights 	can sometimes show such routes to be more efficient. In such cases efficiency saving of this kind would in all likelihood have gone unrecognised by a human 	analyst, not trained to look for such patterns&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Research, Development, and Innovation&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Perhaps one of the most intriguing benefits of Big Data is its potential use in the research and development of new products and services. As is 	highlighted throughout the literature, Big Data can help businesses to gain an understanding of how others perceive their products or identify customer 	demand and adapt their marketing or indeed the design of their products accordingly&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;. Analysis of social 	media data, for instance, can provide valuable insights into customers' sentiments towards existing products as well as discover demands for new products 	and services, allowing businesses to respond more quickly to changes in customer behaviour&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to market research, Big Data can also be used during the design and development stage of new products; for example by helping to test thousands 	of different variations of computer-aided designs in an expedient and cost-effective manner. In doing so, business and designers are able to better assess 	how minor changes to a products design may affect its cost and performance, thereby improving the cost-effectiveness of the production process and 	increasing profitability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Personalisation&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For many consumers, perhaps the most familiar application of Big Data is its ability to help tailor products and services to meet their individual 	preferences. This phenomena is most immediately noticeable on many online services such as Netflix; where data about users activities and preferences is 	collated and analysed to provide a personalised service, for example by suggesting films or television shows the user may enjoy based upon their previous 	viewing history&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;. By enabling companies to generate in-depth profiles of their customers, Big Data 	allows businesses to move past the 'one size fits all' approach to product and services design and instead quickly and cost-effectively adapt their 	services to better meet customer demand.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to service personalisation, similar profiling techniques are increasingly being utilized in sectors such as healthcare. Here data about a 	patient's medical history, lifestyle, and even their gene expression patterns are collated, generating a detailed medical profile which can then be used to 	tailor treatments to meet their specific needs&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt;. Targeted care of this sort can not only help to reduce 	costs for example by helping to avoid over-prescriptions, but may also help to improve the effectiveness of treatments and so ultimately their outcome.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Transparency &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If 'knowledge is power', then, - so say Big Data enthusiasts - advances in data analytics and the quantity of data available can give consumers and 	citizens the knowledge to hold governments and businesses to account, as well as make more informed choices about the products and services they use. 	Nevertheless, data (even lots of it) does not necessarily equal knowledge. In order for citizens and consumers to be able to fully utilize the vast 	quantities of data available to them, they must first have some way to make sense of it. For some, Big Data analytics provides just such a solution, 	allowing users to easily search, compare and analyze available data, thereby helping to challenge existing information asymmetries and make business and 	government more transparent&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the private sector, Big Data enthusiasts have claimed that Big Data holds the potential to ensure complete transparency of supply chains, enabling concerned consumers to trace the source of their products, for example to ensure that they have been sourced ethically	&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;. Furthermore, Big Data is now making accessible information which was previously unavailable to 	average consumers and challenging companies whose business models rely on the maintenance of information asymmetries.The real-estate industry, for example, 	relies heavily upon its ability to acquire and control proprietary information, such as transaction data as a competitive asset. In recent years, however, 	many online services have allowed consumers to effectively bypass agents, by providing alternative sources of real-estate data and enabling prospective 	buyers and sellers to communicate directly with each other&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt;. Therefore, providing consumers with access 	to large quantities of actionable data . Big Data can help to eliminate established information asymmetries, allowing them to make better and more informed 	decisions about the products they buy and the services they enlist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This potential to harness the power of Big Data to improve transparency and accountability can also be seen in the public sector, with many scholars 	suggesting that greater access to government data could help to stem corruption and make politics more accountable. This view was recently endorsed by the 	UN who highlighted the potential uses of Big Data to improve policymaking and accountability in a report published by the Independent Expert Advisory Group 	on the "Data Revolution for Sustainable Development". In the report experts emphasize the potential of what they term the 'data revolution', to help 	achieve sustainable development goals by for example helping civil society groups and individuals to 'develop data literacy and help communities and individuals to generate and use data, to ensure accountability and make better decisions for themselves'	&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;What are the potential harms of Big Data?&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Whilst it is often easy to be seduced by the utopian visions of Big Data evangelists, in order to ensure that Big Data can deliver the types of 	far-reaching benefits its proponents promise, it is vital that we are also sensitive to its potential harms. Within the existing literature, discussions 	about the potential harms of Big Data are perhaps understandably dominated by concerns about privacy. Yet as Big Data has begun to play an increasingly 	central role in our daily lives, a broad range of new threats have begun to emerge including issues related to security and scientific epistemology, as 	well as problems of marginalisation, discrimination and transparency; each of which will be discussed separately below.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Privacy&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;By far the biggest concern raised by researchers in relation to Big Data is its risk to privacy. Given that by its very nature Big Data requires extensive 	and unprecedented access to large quantities of data; it is hardly surprising that many of the benefits outlined above in one way or another exist in tension with considerations of privacy. Although many scholars have called for a broader debate on the effects of Big Data on ethical best practice	&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, a comprehensive exploration into the complex debates surrounding the ethical 	implications of Big Data go far beyond the scope of this article. Instead we will simply attempt to highlight some of the major areas of concern expressed 	in the literature, including its effects on established principles of privacy and the implication of Big Data on the suitability of existing regulatory 	frameworks governing privacy and data protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Re-identification&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Traditionally many Big Data enthusiasts have used de-identification - the process of anonymising data by removing personally identifiable information (PII) 	- as a way of justifying mass collection and use of personal data. By claiming that such measures are sufficient to ensure the privacy of users, data 	brokers, companies and governments have sought to deflect concerns about the privacy implications of Big Data, and suggest that it can be compliant with 	existing regulatory and legal frameworks on data protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, many scholars remain concerned about the limits of anonymisation. As Tene and Polonetsky observe 'Once data-such as a clickstream or a cookie 	number-are linked to an identified individual, they become difficult to disentangle'&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;. They cite the 	example of University of Texas researchers Narayanan and Shmatikov, who were able to successfully re-identify anonymised Netflix user data by cross 	referencing it with data stored in a publicly accessible online database. As Narayanan and Shmatikov themselves explained, 'once any piece of data has been linked to a person's real identity, any association between this data and a virtual identity breaks anonymity of the latter'	&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;. The quantity and variety of datasets which Big Data analytics has made associable with individuals is 	therefore expanding the scope of the types of data that can be considered PII, as well as undermining claims that de-identification alone is sufficient to 	ensure privacy for users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Privacy Frameworks Obsolete?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In recent decades privacy and data protection frameworks based upon a number of so-called 'privacy principles' have formed the basis of most attempts to 	encourage greater consideration of privacy issues online&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt;. For many however, the emergence of Big Data 	has raised question about the extent to which these 'principles of privacy' are workable in an era of ubiquitous data collection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Collection Limitation and Data Minimization&lt;/i&gt; : Big Data by its very nature requires the collection and processing of very large and very diverse data sets. Unlike other forms scientific research and 	analysis which utilize various sampling techniques to identify and target the types of data most useful to the research questions, Big Data instead seeks 	to gather as much data as possible, in order to achieve full resolution of the phenomenon being studied, a task made much easier in recent years as a 	result of the proliferation of internet enabled devices and the growth of the Internet of Things. This goal of attaining comprehensive coverage exists in 	tension however with the key privacy principles of collection limitation and data minimization which seek to limit both the quantity and variety of data 	collected about an individual to the absolute minimum&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Purpose Limitation:&lt;/i&gt; Since the utility of a given dataset is often not easily identifiable at the time of collection, datasets are increasingly being processed several times 	for a variety of different purposes. Such practices have significant implications for the principle of purpose limitation, which aims to ensure that organizations are open about their reasons for collecting data, and that they use and process the data for no other purpose than those initially specified	&lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Notice and Consent: &lt;/i&gt; The principles of notice and consent have formed the cornerstones of attempts to protect privacy for decades. Nevertheless in an era of ubiquitous data 	collection, the notion that an individual must be required to provide their explicit consent to allow for the collection and processing of their data seems 	increasingly antiquated, a relic of an age when it was possible to keep track of your personal data relationships and transactions. Today as data streams 	become more complex, some have begun to question suitability of consent as a mechanism to protect privacy. In particular commentators have noted how given 	the complexity of data flows in the digital ecosystem most individuals are not well placed to make truly informed decisions about the management of their 	data&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt;. In one study, researchers demonstrated how by creating the perceptions of control, users were more likely to share their personal information, regardless of whether or not the users had actually gained control	&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt;. As such, for many, the garnering of consent is increasingly becoming a symbolic box-ticking exercise which achieves little more than to irritate and inconvenience customers whilst providing a burden for companies and a hindrance to growth and innovation	&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Access and Correction:&lt;/i&gt; The principle of 'access and correction' refers to the rights of individuals to obtain personal information being held about them as well as the right to 	erase, rectify, complete or otherwise amend that data. Aside from the well documented problems with privacy self-management, for many the real-time nature 	of data generation and analysis in an era of Big Data poses a number of structural challenges to this principle of privacy. As x comments, 'a good amount 	of data is not pre-processed in a similar fashion as traditional data warehouses. This creates a number of potential compliance problems such as difficulty 	erasing, retrieving or correcting data. A typical big data system is not built for interactivity, but for batch processing. This also makes the application 	of changes on a (presumably) static data set difficult'&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Opt In-Out:&lt;/i&gt; The notion that the provision of data should be a matter of personal choice on the part of the individual and that the individual can, if they chose decide 	to 'opt-out' of data collection, for example by ceasing use of a particular service, is an important component of privacy and data protection frameworks. 	The proliferation of internet-enabled devices, their integration into the built environment and the real-time nature of data collection and analysis 	however are beginning to undermine this concept. For many critics of Big Data the ubiquity of data collection points as well as the compulsory provision of 	data as a prerequisite for the access and use of many key online services is making opting-out of data collection not only impractical but in some cases 	impossible. &lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. "Chilling Effects"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For many scholars the normalization of large scale data collection is steadily producing a widespread perception of ubiquitous surveillance amongst users. 	Drawing upon Foucault's analysis of Jeremy Bentham's panopticon and the disciplinary effects of surveillance, they argue that this perception of permanent visibility can cause users to sub-consciously 'discipline' and self- regulate of their own behavior, fearful of being targeted or identified as 'abnormal'	&lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt;. As a result, the pervasive nature of Big Data risks generating a 'chilling effect' on user behavior 	and free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the notion of "chilling effects" is quite prevalent throughout the academic literature on surveillance and security, the difficulty of quantifying 	the perception and effects of surveillance on online behavior and practices means that there have only been a limited number of empirical studies of this 	phenomena, and none directly related to the chilling effects of Big Data. One study, conducted by researchers at MIT however, sought to assess the impact 	of Edward Snowden's revelations about NSA surveillance programs on Google search trends. Nearly 6,000 participants were asked to individually rate certain 	keywords for their perceived degree of privacy sensitivity along multiple dimensions. Using Google's own publicly available search data, the researchers 	then analyzed search patterns for these terms before and after the Snowden revelations. In doing so they were able to demonstrate a reduction of around 	2.2% in searchers for those terms deemed to be most sensitive in nature. According to the researchers themselves, the results 'suggest that there is a 	chilling effect on search behaviour from government surveillance on the Internet'&lt;a href="#_ftn35" name="_ftnref35"&gt;[35]&lt;/a&gt;. Although this study focussed on the effects on government surveillance, for many privacy advocates the growing pervasiveness of Big Data risks generating similar results.	&lt;a href="#_ftn36" name="_ftnref36"&gt;[36]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Dignitary Harms of Predictive Decision-Making&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to its potentially chilling effects on free speech, the automated nature of Big Data analytics also possess the potential to inflict so-called 'dignitary harms' on individuals, by revealing insights about themselves that they would have preferred to keep private	&lt;a href="#_ftn37" name="_ftnref37"&gt;[37]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an infamous example, following a shopping trip to the retail chain Target, a young girl began to receive mail at her father's house advertising products 	for babies including, diapers, clothing, and cribs. In response, her father complained to the management of the company, incensed by what he perceived to 	be the company's attempts to "encourage" pregnancy in teens. A few days later however, the father was forced to contact the store again to apologies, after 	his daughter had confessed to him that she was indeed pregnant. It was later revealed that Target regularly analyzed the sale of key products such as 	supplements or unscented lotions in order to generate "pregnancy prediction" scores, which could be used to assess the likelihood that a customer was 	pregnant and to therefore target them with relevant offers&lt;a href="#_ftn38" name="_ftnref38"&gt;[38]&lt;/a&gt;. Such cases, though anecdotal illustrate how 	Big Data if not adopted sensitively can lead to potential embarrassing information about users being made public.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Security&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In relation to cybersecurity Big Data can be viewed to a certain extent as a double-edged sword. On the one hand, the unique capabilities of Big Data 	analytics can provide organizations with new and innovative methods of enhancing their cybersecurity systems. On the other however, the sheer quantity and 	diversity of data emanating from a variety of sources creates its own security risks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. "Honey-Pot"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The larger the quantities of confidential information stored by companies on their databases the more attractive those databases may appear to potential 	hackers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. Data Redundancy and Dispersion&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Inherent to Big Data systems is the duplication of data to many locations in order to optimize query processing. Data is dispersed across a wide range of 	data repositories in different servers, in different parts of the world. As a result it may be difficult for organizations to accurately locate and secure 	all items of personal information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Epistemological and Methodological Implications&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2008 Chris Anderson infamously proclaimed the 'end of theory'. Writing for Wired Magazine, Anderson predicted that the coming age of Big Data would create a 'deluge of data' so large that the scientific methods of hypothesis, sampling and testing would be rendered 'obsolete'	&lt;a href="#_ftn39" name="_ftnref39"&gt;[39]&lt;/a&gt;. 'There is now a better way' Anderson insisted, 'Petabytes allow us to say: "Correlation is enough." 	We can stop looking for models. We can analyze the data without hypotheses about what it might show. We can throw the numbers into the biggest computing 	clusters the world has ever seen and let statistical algorithms find patterns where science cannot'&lt;a href="#_ftn40" name="_ftnref40"&gt;[40]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In spite of these bold claims however, many theorists remain skeptical of Big Data's methodological benefits and have expressed concern about its potential 	implications for conventional scientific epistemologies. For them the increased prominence of Big Data analytics in science does not signal a paradigmatic 	transition to a more enlightened data-driven age, but a hollowing out of the scientific method and an abandonment of casual knowledge in favor of shallow 	correlative analysis&lt;a href="#_ftn41" name="_ftnref41"&gt;[41]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;7. &lt;/i&gt; Obfuscation &lt;i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although Big Data analytics can be utilized to study almost any phenomena where enough data exists, many theorists have warned that simply because Big Data 	analytics &lt;i&gt;can&lt;/i&gt; be used does not necessarily mean that they &lt;i&gt;should&lt;/i&gt; be used&lt;a href="#_ftn42" name="_ftnref42"&gt;[42]&lt;/a&gt;. Bigger is 	not always better and indeed the sheer quantity of data made available to users may in fact act to obscure certain insights. Whereas traditional scientific 	methods use sampling techniques to identify the most important and relevant data, Big Data by contrast encourages the collection and use of as much data as 	possible, in an attempt to attain full resolution of the phenomena being studied. However, not all data is equally useful and simply inputting as much data 	as possible into an algorithm is unlikely to produce accurate results and may instead obscure key insights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, whilst the promise of automation is central to a large part of Big Data's appeal, researchers observe that most Big Data analysis still requires an 	element of human judgement to filter out the 'good' data from the 'bad', and to decide what aspects of the data are relevant to the research objectives. As 	Boyd and Crawford observe, 'in the case of social media data, there is a 'data cleaning' process: making decisions about what attributes and variables will 	be counted, and which will be ignored. This process is inherently subjective"&lt;a href="#_ftn43" name="_ftnref43"&gt;&lt;sup&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google's Flu Trend project provides an illustrative example of how Big Data's tendency to try to maximise data inputs can produce misleading results. 	Designed to accurately track flu outbreaks based upon data collected from Google searches, the project was initially proclaimed to be a great success. 	Gradually however it became apparent that the results being produced were not reflective of the reality on the ground. Later it was discovered that the 	algorithms used by the project to interpret search terms were insufficiently accurate to filter out anomalies in searches, such as those related to the 	2009 H1N1 flu pandemic. As such, despite the great promise of Big Data, scholars insist it remains critical to be mindful of its limitations, remain selective about the types of data included in the analysis and exercise caution and intuition whenever interpreting its results	&lt;a href="#_ftn44" name="_ftnref44"&gt;&lt;sup&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. "Apophenia"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In complete contrast to the problem of obfuscation, Boyd and Crawford observe how Big Data may also lead to the practice of 'apophenia', a phenomena whereby analysts interpret patterns where none exist, 'simply because enormous quantities of data can offer connections that radiate in all directions"	&lt;a href="#_ftn45" name="_ftnref45"&gt;&lt;sup&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. David Leinweber for example demonstrated that data mining techniques could show strong but ultimately spurious correlations between changes in the S&amp;amp;P 500 stock index and butter production in Bangladesh	&lt;a href="#_ftn46" name="_ftnref46"&gt;[46]&lt;/a&gt;. Such spurious correlation between disparate and unconnected phenomena are a common feature of Big 	Data analytics and risks leading to unfounded conclusions being draw from the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although Leinweber's primary focus of analysis was the use of Data-Mining technologies, his observations are equally applicable to Big Data. Indeed the 	tendency amongst Big Data analysts to marginalise the types of domain specific expertise capable of differentiating between relevant and irrelevant 	correlations in favour of algorithmic automation can in many ways be seen to exacerbate many of the problems Leinweber identified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;9. &lt;/i&gt; From Causation to Correlation&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Closely related to the problem of Aphonenia is the concern that Big Data's emphasis on correlative analysis risks leading to an abandonment of the pursuit 	of causal knowledge in favour of shallow descriptive accounts of scientific phenomena&lt;a href="#_ftn47" name="_ftnref47"&gt;[47]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For many, Big Data enthusiasts 'correlation is enough', producing inherently meaningful results interpretable by anyone without the need for pre-existing 	theory or hypothesis. Whilst proponents of Big Data claim that such an approach allows them to produce objective knowledge, by cleansing the data of any 	kind of philosophical or ideological commitment, for others by neglecting the knowledge of domain experts, Big Data risks generating a shallow type of 	analysis, since it fails to adequately embed observations within a pre-existing body of knowledge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This commitment to an empiricist epistemology and methodological monism is particularly problematic in the context of studies of human behaviour, where 	actions cannot be calculated and anticipated using quantifiable data alone. In such instances, a certain degree of qualitative analysis of social, 	historical and cultural variables may be required in order to make the data meaningful by embedding it within a broader body of knowledge. The abstract and 	intangible nature of these variables requires a great deal of expert knowledge and interpretive skill to comprehend. It is therefore vital that the 	knowledge of domain specific experts is properly utilized to help 'evaluate the inputs, guide the process, and evaluate the end products within the context 	of value and validity'&lt;a href="#_ftn48" name="_ftnref48"&gt;[48]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As such, although Big Data can provide unrivalled accounts of "what" people do, it fundamentally fails to deliver robust explanations of "why" people do 	it. This problem is especially critical in the case of public policy-making since without any indication of the motivations of individuals, policy-makers 	can have no basis upon which to intervene to incentivise more positive outcomes.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Digital Divides and Marginalisation&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Today data is a highly valuable commodity. The market for data in and of itself has been steadily growing in recent years with the business models of many 	online services now formulated around the strategy of harvesting data from users&lt;a href="#_ftn49" name="_ftnref49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. 	As with the commodification of anything however, inequalities can easily emerge between the haves and have not's. Whilst the quantity of data currently 	generated on a daily basis is many times greater than at any other point in human history, the vast majority of this data is owned and tightly controlled 	by a very small number of technology companies and data brokers. Although in some instances limited access to data may be granted to university researchers 	or to those willing and able to pay a fee, in many cases data remains jealously guarded by data brokers, who view it as an important competitive asset. As 	a result these data brokers and companies risk becoming the gatekeepers of the Big Data revolution, adjudicating not only over who can benefit from Big 	Data, but also in what context and under what terms. For many such inconsistencies and inequalities in access to data raises serious doubts about just how 	widely distributed the benefits of Big Data will be. Others go even further claiming that far from helping to alleviate inequalities, the advent of Big Data risks exacerbating already significant digital divides that exist as well as creating new ones	&lt;a href="#_ftn50" name="_ftnref50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;10. Anti-Competitive Practices&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a result of the reluctance of large companies to share their data, there increasingly exists a divide in access between small start-ups companies and 	their larger and more established competitors. Thus, new entrants to the marketplace may be at a competitive disadvantage in relation to large and well 	established enterprises, being as they are unable to harness the analytical power of the vast quantities of data available to large companies by virtue of 	their privileged market position. Since the performance of many online services are today often intimately connected with the collation and use of users 	data, some researchers have suggested that this inequity in access to data could lead to a reduction in competition in the online marketplace, and 	ultimately therefore to less innovation and choice for consumers&lt;a href="#_ftn51" name="_ftnref51"&gt;[51]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a result researchers including Nathan Newman of New York University have called for a reassessment and reorientation of anti-trust investigations and 	regulatory approaches more generally to 'to focus on how control of personal data by corporations can entrench monopoly power and harm consumer welfare in 	an economy shaped increasingly by the power of "big data"'&lt;a href="#_ftn52" name="_ftnref52"&gt;[52]&lt;/a&gt;. Similarly a report produced by the European 	Data Protection Supervisor concluded that, 'The scope for abuse of market dominance and harm to the consumer through refusal of access to personal information and opaque or misleading privacy policies may justify a new concept of consumer harm for competition enforcement in digital economy'	&lt;a href="#_ftn53" name="_ftnref53"&gt;[53]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;11. Research&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From a research perspective barriers to access to data caused by proprietary control of datasets are problematic, since certain types of research could 	become restricted to those privileged enough to be granted access to data. Meanwhile those denied access are left not only incapable of conducting similar 	research projects, but also unable to test, verify or reproduce the findings of those who do. The existence of such gatekeepers may also lead to reluctance 	on the part of researchers to undertake research critical of the companies, upon whom they rely for access, leading to a chilling effect on the types of 	research conducted&lt;a href="#_ftn54" name="_ftnref54"&gt;[54]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;12. Inequality&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whilst bold claims are regularly made about the potential of Big Data to deliver economic development and generate new innovations, some critics of remain concerned about how equally the benefits of Big Data will be distributed and the effects this could have on already established digital divides	&lt;a href="#_ftn55" name="_ftnref55"&gt;[55]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Firstly, whilst the power of Big Data is already being utilized effectively by most economically developed nations, the same cannot necessarily be said for 	many developing countries. A combination of lower levels of connectivity, poor information infrastructure, underinvestment in information technologies and 	a lack of skills and trained personnel make it far more difficult for the developing world to fully reap the rewards of Big Data. As a consequence the Big 	Data revolution risks deepening global economic inequality as developing countries find themselves unable to compete with data rich nations whose 	governments can more easily exploit the vast quantities of information generated by their technically literate and connected citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Likewise, to the extent that the Big Data analytics is playing a greater role in public policy-making, the capacity of individuals to generate large 	quantities of data, could potentially impact upon the extent to which they can provide inputs into the policy-making process. In a country such as India 	for example, where there exist high levels of inequality in access to information and communication technologies and the internet, there remain large 	discrepancies in the quantities of data produced by individuals. As a result there is a risk that those who lack access to the means of producing data will be disenfranchised, as policy-making processes become configured to accommodate the needs and interests of a privilege minority	&lt;a href="#_ftn56" name="_ftnref56"&gt;[56]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Discrimination&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;13. Injudicious or Discriminatory Outcomes&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Big Data presents the opportunity for governments, businesses and individuals to make better, more informed decisions at a much faster pace. Whilst this 	can evidently provide innumerable opportunities to increase efficiency and mitigate risk, by removing human intervention and oversight from the 	decision-making process Big Data analysts run the risk of becoming blind to unfair or injudicious results generated by skewed or discriminatory programming 	of the algorithms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There currently exists a large number of automated decision-making algorithms in operation across a broad range of sectors including most notably perhaps 	those used to asses an individual's suitability for insurance or credit. In either of these cases faults in the programming or discriminatory assessment 	criteria can have potentially damaging implications for the individual, who may as a result be unable to attain credit or insurance. This concern with the 	potentially discriminatory aspects of Big Data is prevalent throughout the literature and real life examples have been identified by researchers in a large 	number of major sectors in which Big Data is currently being used&lt;a href="#_ftn57" name="_ftnref57"&gt;[57]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yu for instance, cites the case of the insurance company Progressive, which required its customers to install 'Snapsnot' - a small monitoring device - into 	their cars in order to receive their best rates. The device tracked and reported the customers driving habits, and offered discounts to those drivers who 	drove infrequently, broke smoothly, and avoided driving at night - behaviors that correlate with a lower risk of future accidents. Although this form of 	price differentiation provided incentives for customers to drive more carefully, it also had the unintended consequence of unfairly penalizing late-night 	shift workers. As Yu observes, 'for late night shift-workers, who are disproportionately poorer and from minority groups, this differential pricing 	provides no benefit at all. It categorizes them as similar to late-night party-goers, forcing them to carry more of the cost of the intoxicated and other 	irresponsible driving that happens disproportionately at night'&lt;a href="#_ftn58" name="_ftnref58"&gt;[58]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In another example, it is noted how Big Data is increasingly being used to evaluate applicants for entry-level service jobs. One method of evaluating 	applicants is by the length of their commute - the rationale being that employees with shorter commutes are statistically more likely to remain in the job 	longer. However, since most service jobs are typically located in town centers and since poorer neighborhoods tend to be those on the outskirts of town, 	such criteria can have the effect of unfairly disadvantaging those living in economically deprived areas. Consequently such metrics of evaluation can 	therefore also unintentionally act to reinforce existing social inequalities by making it more difficult for economically disadvantaged communities to work 	their way out of poverty&lt;a href="#_ftn59" name="_ftnref59"&gt;[59]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;14. Lack of Algorithmic Transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If data is indeed the 'oil of the 21&lt;sup&gt;st&lt;/sup&gt; century'&lt;a href="#_ftn60" name="_ftnref60"&gt;[60]&lt;/a&gt; then algorithms are very much the engines 	which are driving innovation and economic development. For many companies the quality of their algorithms is often a crucial factor in providing them with 	a market advantage over their competitor. Given their importance, the secrets behind the programming of algorithms are often closely guarded by companies, 	and are typically classified as trade secrets and as such are protected by intellectual property rights. Whilst companies may claim that such secrecy is 	necessary to encourage market competition and innovation, many scholars are becoming increasingly concerned about the lack of transparency surrounding the 	design of these most crucial tools.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In particular there is a growing sentiment common amongst many researchers that there currently exists a chronic lack of accountability and transparency in terms of how Big Data algorithms are programmed and what criteria are used to determine outcomes	&lt;a href="#_ftn61" name="_ftnref61"&gt;&lt;sup&gt;&lt;sup&gt;[61]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. As Frank Pasquale observed,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;'&lt;/i&gt; &lt;i&gt; hidden algorithms can make (or ruin) reputations, decide the destiny of entrepreneurs, or even devastate an entire economy. Shrouded in secrecy and 		complexity, decisions at major Silicon Valley and Wall Street firms were long assumed to be neutral and technical. But leaks, whistleblowers, and legal 		disputes have shed new light on automated judgment. Self-serving and reckless behavior is surprisingly common, and easy to hide in code protected by 		legal and real secrecy'&lt;a href="#_ftn62" name="_ftnref62"&gt;&lt;b&gt;[62]&lt;/b&gt;&lt;/a&gt;. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As such, without increased transparency in algorithmic design, instances of Big Data discrimination may go unnoticed as analyst are unable to access the 	information necessary to identify them.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Today Big Data presents us with as many challenges as it does benefits. Whilst Big Data analytics can offer incredible opportunities to reduce 	inefficiency, improve decision-making, and increase transparency, concerns remain about the effects of these new technologies on issues such as privacy, 	equality and discrimination. Although the tensions between the competing demands of Big Data advocates and their critics may appear irreconcilable; only by 	highlighting these points of contestation can we hope to begin to ask the types of important and difficult questions necessary to do so, including; how can 	we reconcile Big Data's need for massive inputs of personal information with core principles of privacy such as data minimization and collection 	limitation? What processes and procedures need to be put in place during the design and implementation of Big Data models and algorithms to provide 	sufficient transparency and accountability so as to avoid instances of discrimination? What measures can be used to help close digital divides and ensure 	that the benefits of Big Data are shared equitably? Questions such as these are today only just beginning to be addressed; each however, will require 	careful consideration and reasoned debate, if Big Data is to deliver on its promises and truly fulfil its 'revolutionary' potential.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Gantz, J., &amp;amp;Reinsel, D. Extracting Value from Chaos, &lt;i&gt;IDC, &lt;/i&gt;(2011), available at: 			&lt;a href="http://www.emc.com/collateral/analyst-reports/idc-extracting-value-from-chaos-ar.pdf"&gt; http://www.emc.com/collateral/analyst-reports/idc-extracting-value-from-chaos-ar.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Meeker, M. &amp;amp; Yu, L. Internet Trends, &lt;i&gt;Kleiner Perkins Caulfield Byers,&lt;/i&gt; (2013),			&lt;a href="http://www.slideshare.net/kleinerperkins/kpcb-internet-trends-2013"&gt;http://www.slideshare.net/kleinerperkins/kpcb-internet-trends-2013&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Douglas, L&lt;i&gt;. &lt;/i&gt; &lt;a href="http://blogs.gartner.com/doug-laney/files/2012/01/ad949-3D-Data-Management-Controlling-Data-Volume-Velocity-and-Variety.pdf"&gt; &lt;i&gt;"3D Data Management: Controlling Data Volume, Velocity and Variety"&lt;/i&gt; &lt;/a&gt; &lt;i&gt; . Gartner, &lt;/i&gt; (2001)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Boyd, D., and Crawford, K. 'Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon'&lt;i&gt;, &lt;/i&gt;&lt;i&gt;Information, Communication &amp;amp; Society,&lt;/i&gt;Vol 15, Issue 5, (2012)			&lt;a href="http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878"&gt;http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878&lt;/a&gt;, 			Tene, O., &amp;amp;Polonetsky, J. Big Data for All: Privacy and User Control in the Age of Analytics&lt;i&gt;, 11 Nw. J. Tech. &amp;amp;Intell. Prop. 239&lt;/i&gt; (2013)			&lt;a href="http://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1"&gt;http://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Ibid.,&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Joh. E, 'Policing by Numbers: Big Data and the Fourth Amendment', &lt;i&gt;Washington Law Review, Vol. 85: 35, &lt;/i&gt;(2014) 			&lt;a href="https://digital.law.washington.edu/dspace-law/bitstream/handle/1773.1/1319/89WLR0035.pdf?sequence=1"&gt; https://digital.law.washington.edu/dspace-law/bitstream/handle/1773.1/1319/89WLR0035.pdf?sequence=1 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Raghupathi, W., &amp;amp;Raghupathi, V. &lt;a href="http://www.hissjournal.com/content/2/1/3"&gt;Big data analytics in healthcare: promise and potential&lt;/a&gt;.			&lt;i&gt;Health Information Science and Systems&lt;/i&gt;, (2014)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Anderson, R., &amp;amp; Roberts, D. 'Big Data: Strategic Risks and Opportunities, &lt;i&gt;Crowe Horwarth Global Risk Consulting Limited&lt;/i&gt;, (2012) 			&lt;a href="https://www.crowehorwath.net/uploadedfiles/crowe-horwath-global/tabbed_content/big%20data%20strategic%20risks%20and%20opportunities%20white%20paper_risk13905.pdf"&gt; https://www.crowehorwath.net/uploadedfiles/crowe-horwath-global/tabbed_content/big%20data%20strategic%20risks%20and%20opportunities%20white%20paper_risk13905.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Kshetri. N, 'The Emerging role of Big Data in Key development issues: Opportunities, challenges, and concerns'. &lt;i&gt;Big Data &amp;amp; Society&lt;/i&gt; (2014)&lt;a href="http://bds.sagepub.com/content/1/2/2053951714564227.abstract"&gt;http://bds.sagepub.com/content/1/2/2053951714564227.abstract&lt;/a&gt;,&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Tene, O., &amp;amp;Polonetsky, J. Big Data for All: Privacy and User Control in the Age of Analytics&lt;i&gt;, 11 Nw. J. Tech. &amp;amp;Intell. Prop. 239&lt;/i&gt; (2013)			&lt;a href="http://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1"&gt;http://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Cisco, 'IoE-Driven Smart Street Lighting Project Allows Oslo to Reduce Costs, Save Energy, Provide Better Service', Cisco, (2014) Available at: 			&lt;a href="http://www.cisco.com/c/dam/m/en_us/ioe/public_sector/pdfs/jurisdictions/Oslo_Jurisdiction_Profile_051214REV.pdf"&gt; http://www.cisco.com/c/dam/m/en_us/ioe/public_sector/pdfs/jurisdictions/Oslo_Jurisdiction_Profile_051214REV.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; Newell, B, C. Local Law Enforcement Jumps on the Big Data Bandwagon: Automated License Plate Recognition Systems, Information Privacy, and Access to Government Information. &lt;i&gt;University of Washington - the Information School&lt;/i&gt;, (2013)			&lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2341182"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2341182&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Morris, D. Big data could improve supply chain efficiency-if companies would let it&lt;i&gt;, Fortune, August 5 &lt;/i&gt;2015, 			http://fortune.com/2015/08/05/big-data-supply-chain/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Tucker, Darren S., &amp;amp; Wellford, Hill B., Big Mistakes Regarding Big Data, Antitrust Source, American Bar Association, (2014). Available at SSRN: 			http://ssrn.com/abstract=2549044&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; Davenport, T., Barth., Bean, R. How is Big Data Different, &lt;i&gt;MITSloan Management Review, Fall &lt;/i&gt;(2012), Available at,			&lt;a href="http://sloanreview.mit.edu/article/how-big-data-is-different/"&gt;http://sloanreview.mit.edu/article/how-big-data-is-different/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; Tucker, Darren S., &amp;amp; Wellford, Hill B., Big Mistakes Regarding Big Data, Antitrust Source, American Bar Association, (2014). Available at SSRN: 			http://ssrn.com/abstract=2549044&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Raghupathi, W., &amp;amp;Raghupathi, V. &lt;a href="http://www.hissjournal.com/content/2/1/3"&gt;Big data analytics in healthcare: promise and potential&lt;/a&gt;.			&lt;i&gt;Health Information Science and Systems&lt;/i&gt;, (2014)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Brown, B., Chui, M., Manyika, J. 'Are you Ready for the Era of Big Data?', &lt;i&gt;McKinsey Quarterly,&lt;/i&gt; (2011), Available at, 			&lt;a href="http://www.t-systems.com/solutions/download-mckinsey-quarterly-/1148544_1/blobBinary/Study-McKinsey-Big-data.pdf"&gt; http://www.t-systems.com/solutions/download-mckinsey-quarterly-/1148544_1/blobBinary/Study-McKinsey-Big-data.pdf &lt;/a&gt; ; Benady, D., 'Radical transparency will be unlocked by technology and big data', &lt;i&gt;Guardian &lt;/i&gt;(2014) Available at: 			&lt;a href="http://www.theguardian.com/sustainable-business/radical-transparency-unlocked-technology-big-data"&gt; http://www.theguardian.com/sustainable-business/radical-transparency-unlocked-technology-big-data &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; United Nations, A World That Counts: Mobilising the Data Revolution for Sustainable Development, 			&lt;i&gt; Report prepared at the request of the United Nations Secretary-General,by the Independent Expert Advisory Group on a Data Revolutionfor 				Sustainable Development. &lt;/i&gt; (2014), pg. 18, see also, Hilbert, M. Big Data for Development: From Information- to Knowledge Societies (2013). Available at SSRN:			&lt;a href="http://ssrn.com/abstract=2205145"&gt;http://ssrn.com/abstract=2205145&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; Greenleaf, G. Abandon All Hope? &lt;i&gt;Foreword for Issue 37(2) of the UNSW Law Journal on 'Communications Surveillance, Big Data, and the Law'&lt;/i&gt; ,(2014) &lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2490425"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2490425##&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;Boyd, D., and Crawford, K. 'Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon'&lt;i&gt;, &lt;/i&gt;&lt;i&gt;Information, Communication &amp;amp; Society,&lt;/i&gt; Vol. 15, Issue 5, (2012)			&lt;a href="http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878"&gt;http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; Tene, O., &amp;amp;Polonetsky, J. Big Data for All: Privacy and User Control in the Age of Analytics, 11 Nw. J. Tech. &amp;amp;Intell. Prop. 239 (2013)			&lt;a href="http://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1"&gt;http://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; Narayanan and Shmatikov quoted in Ibid.,&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; OECD, Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, The Organization for Economic Co-Operation and Development, 			(1999); The European Parliament and the Council of the European Union, EU Data Protection Directive, "Directive 95/46/EC of the European Parliament 			and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of 			such data," (1995)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; Barocas, S., &amp;amp;Selbst, A, D., Big Data's Disparate Impact,&lt;i&gt;California Law Review, Vol. 104, &lt;/i&gt;(2015). Available at SSRN:			&lt;a href="http://ssrn.com/abstract=2477899" target="_blank"&gt;http://ssrn.com/abstract=2477899&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Article 29 Working Group., Opinion 03/2013 on purpose limitation, &lt;i&gt;Article 29 Data Protection Working Party, &lt;/i&gt;(2013) available at: 			&lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2013/wp203_en.pdf"&gt; http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2013/wp203_en.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; Solove, D, J. Privacy Self-Management and the Consent Dilemma, 126 Harv. L. Rev. 1880 (2013), Available at: 			&lt;a href="http://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2093&amp;amp;context=faculty_publications"&gt; http://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2093&amp;amp;context=faculty_publications &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; Brandimarte, L., Acquisti, A., &amp;amp; Loewenstein, G., Misplaced Confidences:&lt;/p&gt;
&lt;p&gt;Privacy and the Control Paradox,			&lt;i&gt;Ninth Annual Workshop on the Economics of Information Security (WEIS) June 7-8 2010, Harvard University, Cambridge, MA, &lt;/i&gt;(2010), available 			at: 			&lt;a href="https://fpf.org/wp-content/uploads/2010/07/Misplaced-Confidences-acquisti-FPF.pdf"&gt; https://fpf.org/wp-content/uploads/2010/07/Misplaced-Confidences-acquisti-FPF.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; Solove, D, J., Privacy Self-Management and the Consent Dilemma, &lt;i&gt;126 Harv. L. Rev. 1880&lt;/i&gt; (2013), Available at: 			http://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2093&amp;amp;context=faculty_publications&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; Yu, W, E., Data., Privacy and Big Data-Compliance Issues and Considerations, &lt;i&gt;ISACA Journal, Vol. 3 2014 &lt;/i&gt;(2014), available at: 			&lt;a href="http://www.isaca.org/Journal/archives/2014/Volume-3/Pages/Data-Privacy-and-Big-Data-Compliance-Issues-and-Considerations.aspx"&gt; http://www.isaca.org/Journal/archives/2014/Volume-3/Pages/Data-Privacy-and-Big-Data-Compliance-Issues-and-Considerations.aspx &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Ramirez, E., Brill, J., Ohlhausen, M., Wright, J., &amp;amp; McSweeny, T., Data Brokers: A Call for Transparency and Accountability,			&lt;i&gt;Federal Trade Commission&lt;/i&gt; (2014) 			https://www.ftc.gov/system/files/documents/reports/data-brokers-call-transparency-accountability-report-federal-trade-commission-may-2014/140527databrokerreport.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; Michel Foucault, Discipline and Punish: The Birth of the Prison. Translated by Alan Sheridan, &lt;i&gt;London: Allen Lane, Penguin,&lt;/i&gt; (1977)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; Marthews, A., &amp;amp; Tucker, C., Government Surveillance and Internet Search Behavior (2015), available at SSRN: http://ssrn.com/abstract=2412564&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; Boyd, D., and Crawford, K. 'Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon', Information, 			Communication &amp;amp; Society, Vol. 15, Issue 5, (2012)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; Hirsch, D., That's Unfair! Or is it? Big Data, Discrimination and the FTC's Unfairness Authority, &lt;i&gt;Kentucky Law Journal, Vol. 103&lt;/i&gt;, 			available at: 			&lt;a href="http://www.kentuckylawjournal.org/wp-content/uploads/2015/02/103KyLJ345.pdf"&gt; http://www.kentuckylawjournal.org/wp-content/uploads/2015/02/103KyLJ345.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; Hill, K., How Target Figured Out A Teen Girl Was Pregnant Before Her Father 			Didhttp://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; Anderson, C (2008) "The End of Theory: The Data Deluge Makes the Scientific Method Obsolete", WIRED, June 23 2008, www.wired.com/2008/06/pb-theory/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; Ibid.,&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; Kitchen, R (2014) Big Data, new epistemologies and paradigm shifts, Big Data &amp;amp; Society, April-June 2014: 1-12&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; Boyd D and Crawford K (2012) Critical questions for big data. Information, Communication and Society 15(5): 662-679&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; Lazer, D., Kennedy, R., King, G., &amp;amp;Vespignani, A. " 			&lt;a href="http://gking.harvard.edu/publications/parable-Google-Flu%c2%a0Traps-Big-Data-Analysis"&gt; The Parable of Google Flu: Traps in Big Data Analysis &lt;/a&gt; ." &lt;i&gt;Science 343&lt;/i&gt; (2014): 1203-1205. Copy at &lt;a href="http://j.mp/1ii4ETo"&gt;http://j.mp/1ii4ETo&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; Boyd, D., and Crawford, K. 'Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon'&lt;i&gt;, &lt;/i&gt;&lt;i&gt;Information, Communication &amp;amp; Society,&lt;/i&gt;Vol 15, Issue 5, (2012)			&lt;a href="http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878"&gt;http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; Leinweber, D. (2007) 'Stupid data miner tricks: overfitting the S&amp;amp;P 500', The Journal of Investing, vol. 16, no. 1, pp. 15-22.			&lt;a href="http://m.shookrun.com/documents/stupidmining.pdf"&gt;http://m.shookrun.com/documents/stupidmining.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; Boyd D and Crawford K (2012) Critical questions for big data. Information, Communication and Society 15(5): 662-679&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; McCue, C., Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis, &lt;i&gt;Butterworth-Heinemann,&lt;/i&gt; (2014)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; De Zwart, M. J., Humphreys, S., &amp;amp; Van Dissel, B. Surveillance, big data and democracy: lessons for Australia from the US and UK.			&lt;i&gt;Http://www.unswlawjournal.unsw.edu.au/issue/volume-37-No-2&lt;/i&gt;. (2014) Retrieved from 			https://digital.library.adelaide.edu.au/dspace/handle/2440/90048&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; Boyd, D., and Crawford, K. 'Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon'&lt;i&gt;, &lt;/i&gt;&lt;i&gt;Information, Communication &amp;amp; Society,&lt;/i&gt;Vol 15, Issue 5, (2012)			&lt;a href="http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878"&gt;http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878&lt;/a&gt;; 			Newman, N., Search, Antitrust and the Economics of the Control of User Data, &lt;i&gt;31 YALE J. ON REG. 401 &lt;/i&gt;(2014)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; Newman, N., The Cost of Lost Privacy: Search, Antitrust and the Economics of the Control of User Data (2013). Available at SSRN: 			http://ssrn.com/abstract=2265026, Newman, N. ,Search, Antitrust and the Economics of the Control of User Data, &lt;i&gt;31 YALE J. ON REG. 401&lt;/i&gt; (2014)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; Ibid.,&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; European Data Protection Supervisor, Privacy and competitiveness in the age of big data:&lt;/p&gt;
&lt;p&gt;The interplay between data protection, competition law and consumer protection in the Digital Economy, (2014), available at: 			&lt;a href="https://secure.edps.europa.eu/EDPSWEB/webdav/shared/Documents/Consultation/Opinions/2014/14-03-26_competitition_law_big_data_EN.pdf"&gt; https://secure.edps.europa.eu/EDPSWEB/webdav/shared/Documents/Consultation/Opinions/2014/14-03-26_competitition_law_big_data_EN.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; Boyd, D., and Crawford, K. 'Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon'&lt;i&gt;, &lt;/i&gt;&lt;i&gt;Information, Communication &amp;amp; Society,&lt;/i&gt;Vol 15, Issue 5, (2012)			&lt;a href="http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878"&gt;http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; Schradie, J., Big Data Not Big Enough? How the Digital Divide Leaves People Out, MediaShift, 31 July 2013, (2013), available at: 			&lt;a href="http://mediashift.org/2013/07/big-data-not-big-enough-how-digital-divide-leaves-people-out/"&gt; http://mediashift.org/2013/07/big-data-not-big-enough-how-digital-divide-leaves-people-out/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; Crawford, K., The Hidden Biases in Big Data, &lt;i&gt;Harvard Business Review, 1 April 2013 &lt;/i&gt;(2013), available at:			&lt;a href="https://hbr.org/2013/04/the-hidden-biases-in-big-data"&gt;https://hbr.org/2013/04/the-hidden-biases-in-big-data&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; Robinson, D., Yu, H., Civil Rights, Big Data, and Our Algorithmic Future, (2014)			&lt;a href="http://bigdata.fairness.io/introduction/"&gt;http://bigdata.fairness.io/introduction/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; Rotellla, P., Is Data The New Oil? Forbes, 2 April 2012, (2012), available at: 			&lt;a href="http://www.forbes.com/sites/perryrotella/2012/04/02/is-data-the-new-oil/"&gt; http://www.forbes.com/sites/perryrotella/2012/04/02/is-data-the-new-oil/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; Barocas, S., &amp;amp;Selbst, A, D., Big Data's Disparate Impact,&lt;i&gt;California Law Review, Vol. 104, &lt;/i&gt;(2015). Available at SSRN:			&lt;a href="http://ssrn.com/abstract=2477899" target="_blank"&gt;http://ssrn.com/abstract=2477899&lt;/a&gt;; Kshetri. N, 'The Emerging role of Big Data in Key development issues: Opportunities, challenges, and concerns'. &lt;i&gt;Big Data &amp;amp; Society&lt;/i&gt;(2014)			&lt;a href="http://bds.sagepub.com/content/1/2/2053951714564227.abstract"&gt;http://bds.sagepub.com/content/1/2/2053951714564227.abstract&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; Pasquale, F., The Black Box Society: The Secret Algorithms That Control Money and Information, Harvard University Press , (2015)&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data'&gt;https://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Scott Mason</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2015-12-30T02:48:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/battle-internet">
    <title>Battle for the Internet </title>
    <link>https://cis-india.org/news/battle-internet</link>
    <description>
        &lt;b&gt;In this article written by Latha Jishnu and published by Down to Earth, Issue: March 15 2011, the author reports about the events in the United States in the post WikiLeaks scenario.&lt;/b&gt;
        
&lt;p&gt;As the Internet becomes the public square and the marketplace of our world, it is increasingly becoming a contested terrain. Its potential for diffusing knowledge and subverting the traditional channels of information is tremendous. So it is not surprising that governments, corporations and even seemingly innocuous social networking sites all want to control and influence the way the Internet operates. It’s easy to see why. Close to a third of humanity is linked to this system—and the dramatic growth in Internet usage over the past decade is set to explode in coming years. So is its commercial promise. Latha Jishnu looks at events in the US following the WikiLeaks exposé of its diplomatic cables, and in the hot spots of political turmoil across the world to understand the significance of the Internet in today’s interconnected world and the threats it faces. Arnab Pratim Dutta explains the technology used to block access to the Net.&lt;/p&gt;
&lt;table style="text-align: center;" class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;&lt;img src="https://cis-india.org/home-images/D2E1.jpg/image_preview" style="float: none;" title="D2E1" class="image-inline image-inline" alt="D2E1" /&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: left;"&gt;
&lt;p&gt;&amp;nbsp;An opposition supporter holds up a laptop showing images of celebrations in Cairo's Tahrir Square, after Egypt's President Hosni Mubarak resigned (Photo: Reuters)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Ideas and ideologies, images and reports of events, both minor and cataclysmic, fly on the Internet, swirling through cyberspace, gathering resonance, metamorphosing and touching millions of lives in different ways. Many of the ideas—and visuals—could be banal (as they very often are), some dangerous, others bringing promise of change. Some have the power to subvert, helping to stir and stoke the smouldering embers of political and social unrest as recent uprisings in north Africa, West Asia and Asia have shown. To many, the Internet is the rebel hero of our times, subverting conventional media and leaking news and information that governments would like to censor. Even a village in the remote reaches of Odisha’s Malkangiri district which may have no electricity is in some way linked to cyberspace through smart cell phones because mobile operators are increasingly turning Internet service providers (ISPs) and bringing the worldwide web to the conflict-ridden forests of central India.&lt;/p&gt;
&lt;p&gt;It is about the power and reach of connection, unprecedented since people first began communicating with each other. The Internet, therefore, is turning into a conflict zone with everyone seeking control of it: governments, corporations and social networking sites, all of whom have different agendas. Social networks may seem innocuous but they are as much a hazard as the others to Internet freedom. Surveillance of “netizens” is becoming commonplace, whether in democracies or in totalitarian regimes, through a host of new laws and regulations ostensibly aimed at strengthening national security, cyber security or protecting business interests.&amp;nbsp;&lt;br /&gt;&amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: center;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/D2E2.jpg/image_preview" alt="Down to Earth 2" class="image-inline image-inline" title="Down to Earth 2" /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;While most governments are seeking to filter and block specific content, in extreme cases, as in Egypt, the Net has been blacked out using what some experts say is the “kill switch” (see ‘The Egypt shutdown’). This could emerge as the biggest threat to the Internet since other regimes could be tempted to go the Egyptian way. Most governments, however, prefer not to use it, not even the censorship-obsessed Chinese and Saudi regimes because the Internet is also about business—commerce of increasing significance is being routed through its sinews. Take one small example: In January alone, Britons spent a whopping £5.1 billion online, recording a 21 per cent jump in e-commerce revenues over January 2010, according to the latest edition of the IMRG/CapGemini e-Retail Sales Index. It is the kind of figure that stops authorities from reaching for the kill switch.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: left;"&gt;In the case of China, e-commerce transactions hit 4.5 trillion yuan (US $682.16 billion) in 2010, up 22 per cent year-on-year, according to China e- Business Research Center and CNZZ Data Center. Of this, online B2B or business-to-business deals accounted for the bulk: 3.8 trillion yuan (US&amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: left;" class="pullquote"&gt;Popular whistleblower website wikileaks.org was unavailable for some time in December 2010&amp;nbsp;&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: left;"&gt;
&lt;p&gt;$576.05 billion). And retail sales are expected to zoom, too, pretty soon with e-commerce websites selling directly to customers growing to more than 18,600 last year. Thanks to a dramatic spike in the rate of Net penetration and impressive growth of online business.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;But the world has a long way to go before the Internet becomes ubiquitous or an all-encompassing global commons. Currently, just two billion people are linked to the system (see above: ‘Big picture’), which is less than a third of the world’s population. And the reach, as the chart shows, is rather patchy. India may be in the top five Internet user nations with a total of 81 million users but penetration is an abysmal 6.9 per cent, the worst in the list. Blame that on our pathetic education levels and poverty. China, however, is the undisputed leviathan with 420 million users in 2010—some estimates put the figure closer to 500 million now—who account for more than a fifth of the world’s Internet users. No other country’s growth in this sector matches China’s either in speed or drama.&amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: -webkit-auto;"&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/D3E3.jpg/image_preview" alt="Down to Earth 3" class="image-inline" title="Down to Earth 3" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;This is one reason Washington frequently raises the issue of China’s policing of the Internet in different fora. The most recent was on February 15 when secretary of state Hillary Clinton made the second of her rousing speeches on safeguarding the Internet from all kinds of government interference. Speaking at George Washington University in Washington DC, Clinton pointed out that the attempts to control the Internet were rife across the world but singled China for repeated attacks.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;“In China, the government censors content and redirects search requests to error pages. In Burma, independent news sites have been taken down with distributed denial of service (DDoS) attacks. In Cuba, the government is trying to create a national intranet, while not allowing their citizens to access the global internet. In Vietnam, bloggers who criticize the government are arrested and abused. In Iran, the authorities block opposition and media websites, target social media, and steal identifying information about their own people in order to hunt them down. These actions reflect a landscape that is complex and combustible, and sure to become more so in the coming years as billions of more people connect to the Internet.”&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: -webkit-auto;"&gt;
&lt;div style="text-align: -webkit-auto;"&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: -webkit-auto;"&gt;&lt;span class="Apple-style-span"&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/D4E4.jpg/image_preview" alt="Down to Earth 4" class="image-inline image-inline" title="Down to Earth 4" /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;That seemed a fair assessment of the trends&amp;nbsp;but the irony is that even as the secretary of state was speaking,&amp;nbsp;the Department of Justice was seeking to enforce a court order to direct Twitter Inc,&amp;nbsp;to provide the US government records&amp;nbsp;of three individuals, including Birgitta Jonsdottir, a member of Iceland's Parliament who had been in touch with others about WikiLeaks and its founder Juan Assange last year when WikiLeaks released its huge cache of US diplomatic cables.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;A commentary in China Daily noted with asperity: “The Assange case reveals such rhetoric is just so much hypocrisy. It is apparent that when Internet freedom conflicts with self-declared US national interests, or when Internet freedom exposes lies by the self-proclaimed open and transparent government, it immediately becomes a crime.”&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The Assange case more than anything else has exposed how vulnerable the Net is to political meddling and control. In December last year, Amazon said it stopped hosting the WikiLeaks website because it “violated its terms of service” and not because the office of the Senate Homeland Security Committee chaired by Joe Lieberman had questioned Amazon about its relationship with WikiLeaks.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;WikiLeaks had turned to Amazon to keep its site available after hackers tried to flood it and prevent users accessing the classified information. Few people were willing to credit Amazon’s feeble explanation for cutting off WikiLeaks and the general surmise was that Lieberman had put some kind of pressure on the webhosting platform. According to one analyst, the simple reason is that the US government is one of the company’s biggest clients. According to a press note issued by the company: “Government adoption of AWS (Amazon Web Services) grew significantly in 2010. Today we have nearly 20 government agencies leveraging AWS, and the US federal government continues to be one of our fastest growing customer segments.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As Amazon abandoned WikiLeaks, Paypal, Visa and MasterCard had also dumped WikiLeaks. This set off a fullscale cyber war in which a fourth party made its presence felt: Hackers/ ‘hacktivists’ who unleashed operation payback for what they deemed unfair targeting of WikiLeaks and Assange. This involved a series of (DDOS) attacks on Paypal, MasterCard, Swiss Bank PostFinance and Lieberman’s website.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;So while governments in many parts of the world block sites, jail or kill dissidents for expressing their views on the Net, threats to the freedom of the Internet come primarily from the paranoia that governments suffer and from badly crafted policies they implement to protect business and other interests.&amp;nbsp;&lt;/p&gt;
&lt;div class="pullquote"&gt;US enforcement agencies shut down 84,000 sites, falsely accusing them of child pornography&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The US, the ultimate symbol of liberal democracy, is no less uneasy about the power of the Internet. A slew of laws are making their way through the Senate, laws that will give the administration sweeping powers to seize domain names and shut down websites, even those outside its territory, and laws that strengthen the powers of the president in the time of a cyber emergency, including the use of a kill switch. In September, the US Senate introduced the Combating Online Infringement and Counterfeits Act, which would allow the government to create a blacklist of websites that are suspected to be infringing IP rights and to pressure or require all ISPs to block access to those sites. In these cases, no due process of law protects people before they are disconnected or their sites are blocked.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In India, in the wake of the terrorist attacks in Mumbai in November 2008, Parliament hastily passed amendments to the Information Technology Act, 2000, without any discussion in either House. The December 2008 amendments have some good points but they also allow increased online surveillance. Section 69A permits the Centre to “issue directions for blocking of public access to any information through any computer resource”, which means that the government can block any website.&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;div style="text-align: center;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: -webkit-auto;"&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Pranesh Prakash of the Bengalurubased Centre for Internet and Society notes that while necessity or expediency in terms of certain restricted interests is specified, no guidelines have been specified. “It has to be ensured that they are prescribed first, before any powers of censorship are granted to anybody,” said Prakash in an analysis of the amendments. “In India, it is clear that any law that gives unguided discretion to an administrative authority to exercise censorship is unreasonable.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div style="text-align: center;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: -webkit-auto;"&gt;
&lt;p&gt;Civil rights activists say the section has broadened the scope of surveillance and that there are no legal or procedural safeguards to prevent violation of civil liberties.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As the battle for keeping the Internet is joined by netizens who are aware of the power of connection, governments, too, are ramping up command and control measures. Among the risks to an open, democratic Internet are the following:&lt;/p&gt;
&lt;h3&gt;Threat to universality&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;The basic design principle underlying the World Wide Web is universality, and, according to its founder Tim Berners-Lee, several threats are emerging. Among these are: cable companies that sell Internet connectivity wanting to limit their Net users to downloading only the company’s mix of entertainment and social networking sites (see ‘&lt;a class="external-link" href="http://www.downtoearth.org.in/content/hidden-dangers-facebook"&gt;Hidden dangers of Facebook&lt;/a&gt;’).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Another is by pricing Net connectivity out of the reach of the poor and allowing differential pricing. Berners- Lee, warned at a recent London conference: “There are a lot of companies who would love to be able to limit what web pages you can see...the moment you let Net neutrality go, you lose the web as it is...You lose something essential—the fact that any innovator can dream up an idea and set up a website at some random place and let it just take off from word of mouth...”&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Actions against piracy&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;The nub of such operations lies in the US Department of Homeland Security, whose Immigration and Customs Enforcement (ICE) and the Department of Justice (DoJ) have been seizing domains because they are suspected of hawking pirated goods. The first seizure was in November last year when 82 websites selling counterfeit goods ranging from handbags to golf clubs were taken out.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Last month, there was another raid on the Internet. According to TorrentFreak and other Internet monitoring sites, the two agencies wrongly shut down 84,000 websites that had not broken the law, falsely accusing them of child pornography crimes. After the mistake was identified, it took about three days for some of the websites to go live again. The domain provider, FreeDNS, was taken aback. “Freedns.afraid.org has never allowed this type of abuse of its DNS service. We are working to get the issue sorted as quickly as possible,” it said.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Earlier, DoJ and ICE had seized the domain of the popular sports streaming and P2P download site Rojadirecta. What is shocking is that the site is based in Spain and is perfectly legal. Two courts in Spain have ruled that the site operates legally, and other than the .org domain the site has no links to the US.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Internet freedom could easily become the biggest casualty in the illconceived and poorly designed procedures adopted by developed countries— France, the UK, South Korea, Taiwan and New Zealand have similar laws—to protect intellectual property from counterfeiters and pirates, primarily at the behest of the film and music recording industries.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;There are indications India may be planning to follow suit (see ‘&lt;a class="external-link" href="http://www.downtoearth.org.in/content/indias-three-strikes-policy"&gt;India’s three-strikes policy&lt;/a&gt;’), although civil rights groups say it could amount to a form of deprivation of liberty.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Surveillance technology&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;The problem with the use of technology in keeping the Internet safe cuts both ways. With increasing number of cyber attacks on both official and public websites from an array of hackers and malware, governments are reaching for ever more sophisticated high-tech surveillance systems. For instance, computer systems of the US Congress and the executive branches are under attack an average of 1.8 billion times per month, according to a recent Senate report. The result: more spyware. One such is deep packet inspection technology. It is a tool that protects customers from rampant spam and virus traffic. Experts say the Internet could not survive without this technology and yet, it helps authorities to keep a close watch on what people are doing on the Net. In the US, ISPs are required to have this technology.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;So what can be done? Keep close tabs on government involvement in the Internet and ensure that its intrusion in both the content and the engines of this system is kept to the minimum.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Read the original article written by Latha Jishnu in Down to Earth&lt;/em&gt; &lt;a class="external-link" href="http://www.downtoearth.org.in/content/battle-internet"&gt;here&lt;/a&gt;&lt;span class="Apple-style-span"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/battle-internet'&gt;https://cis-india.org/news/battle-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T15:28:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/cryptoparty-bangalore">
    <title>Bangalore: Learn to secure your online communication!</title>
    <link>https://cis-india.org/internet-governance/events/cryptoparty-bangalore</link>
    <description>
        &lt;b&gt;Having a Cryptoparty in Bangalore&lt;/b&gt;
        
&lt;p&gt;"Governments around the world, are greatly increasing their surveillance of the Internet. Alongside a loss of the private sphere, this also represents a clear danger to basic civil liberties. The good news is that we already have the solution: encrypting communications makes it very hard, if not entirely impossible, for others to eavesdrop on our conversations. The bad news is that crypto is largely ignored by the general public, partly because they don't know about it, and partly because even if they do, it seems too much trouble to implement." (&lt;a href="https://www.techdirt.com/articles/20121009/06132920660/cryptoparty-like-its-1993.shtml"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;p&gt;&lt;img src="https://netzpolitik.org/wp-upload/1012366_534624166585046_1146520866_n.png" alt="yes we scan and obama with headphones" height="167" width="450" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;So lets go and have a party, and teach each other how to crypto!&lt;/strong&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Everyone is invited! Especially do not hesitate to join if you are not using any crypto at all (yet!)&lt;/strong&gt;&lt;/p&gt;
&lt;a href="https://cis-india.org/internet-governance/cryptoparty-bangalore-flyer/at_download/file"&gt;Here is a Flyer / Printout for you&lt;/a&gt; to spread the message!
&lt;div&gt;&amp;nbsp;
&lt;div&gt;
&lt;p&gt;Please add your name on the list &lt;a href="https://www.cryptoparty.in/bangalore?&amp;amp;#who"&gt;here&lt;/a&gt;, or RSVP at bernadette@cis-india.org, Thank you!&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/cryptoparty-bangalore'&gt;https://cis-india.org/internet-governance/events/cryptoparty-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bernadette</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-06-27T11:11:32Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/bangalore-crypto-party">
    <title>Bangalore CryptoParty!</title>
    <link>https://cis-india.org/internet-governance/events/bangalore-crypto-party</link>
    <description>
        &lt;b&gt;Care about your privacy and online security? Want to fight against pervasive governmental surveillance and corporate invasions of privacy? The Centre for Internet &amp; Society invites you to the CryptoParty tonight (Friday) at 6.00 p.m. Make sure to bring friends (and your laptop and smart phones)!
&lt;/b&gt;
        &lt;p&gt;We will discuss, install and use digital security and privacy tools and practices.&lt;/p&gt;
&lt;h2&gt;Hosts&lt;/h2&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a class="external-link" href="https://twitter.com/thej"&gt;Thejesh GN&lt;/a&gt;&lt;br /&gt;&lt;a class="external-link" href="https://twitter.com/houndbee"&gt;Kaustubh Srikanth&lt;/a&gt;&lt;br /&gt;&lt;a class="external-link" href="https://twitter.com/pranesh_prakash"&gt;Pranesh Prakash&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Details&lt;/h2&gt;
&lt;hr /&gt;
&lt;h3&gt;We Will Provide&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Food and drinks: Snacks - Samosas + Kachoris + Biscuits + Tea + Soft Drinks&lt;/li&gt;
&lt;li&gt;Software: Security-in-a-box toolkits + Ubuntu Live USBs + software + internet connection&lt;/li&gt;
&lt;li&gt;Expertise: Kaustubh Srikanth + Thejesh GN + Pranesh Prakash &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span class="mw-headline" id="You_need_to_bring"&gt;You need to bring&lt;/span&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Your own laptop (highly recommended)&lt;/li&gt;
&lt;li&gt;Desire to learn about secure and private communications and storage (mandatory! :D)&lt;/li&gt;
&lt;li&gt;Expertise, to share with others (if possible) &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Intro&lt;/h3&gt;
&lt;p&gt;(20 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Privacy vs. convenience &lt;/li&gt;
&lt;li&gt;Importance of Free and Open      Source Software and Open Standards &lt;/li&gt;
&lt;li&gt;Basics of Passwords &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Choosing secure passwords &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Dropbox        Register Page &lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;Storing comes later &lt;/li&gt;
&lt;li&gt;2FA - Google Authenticator &lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;Securing online Identities &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Show and tell&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Browsing (45 mins)&lt;/b&gt;&lt;br /&gt;(5 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Firefox (multiple platforms)      / offline &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;(15 mins):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;AdBlockPlus &lt;/li&gt;
&lt;li&gt;RequestPolicy &lt;/li&gt;
&lt;li&gt;HTTPSEverywhere &lt;/li&gt;
&lt;li&gt;Ghostery / DoNotTrackMe &lt;/li&gt;
&lt;li&gt;Noscript &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;(5 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Anti-Google Surveillance &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;DuckDuckGo &lt;/li&gt;
&lt;li&gt;GoogleSharing &lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;p&gt;(10 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Password management &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Keepass + Password Safe &lt;/li&gt;
&lt;li&gt;Cloud Services &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;LastPass &lt;/li&gt;
&lt;li&gt;Keepass        + Dropbox &lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Email + IM (1 hour)&lt;/b&gt;&lt;br /&gt;(10 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Thunderbird (multiple      platforms) / available offline &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Enigmail &lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;p&gt;(30 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;GPG4Win + GPGTools / offline &lt;/li&gt;
&lt;li&gt;Seahorse (on Ubuntu Fresh      Install) &lt;/li&gt;
&lt;li&gt;Enigmail + Key Management      (Kaustubh) &lt;/li&gt;
&lt;li&gt;Key-signing party! &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;(15 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Instant Messaging with OTR &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Pidgin + Adium / offline &lt;/li&gt;
&lt;li&gt;OTR / offline &lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Tell (27 mins)&lt;/b&gt;&lt;br /&gt;(5 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Tor (Pranesh) &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;(5 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;VPNs and SSH tunnel &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;RiseUp (Kaustubh) &lt;/li&gt;
&lt;li&gt;SSH tunneling using AWS /       RackSpace (Thej) &lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;p&gt;(12 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mobiles &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;APG + K9 (Pranesh) &lt;/li&gt;
&lt;li&gt;WhisperCore (Kaustubh       mentions) &lt;/li&gt;
&lt;li&gt;Text Secure (Thej) &lt;/li&gt;
&lt;li&gt;Gibbberbot (Pranesh) &lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;p&gt;(3 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Full-disk encryption &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Ubuntu (Pranesh demoes       quickly) &lt;/li&gt;
&lt;li&gt;BitLocker &lt;/li&gt;
&lt;li&gt;TrueCrypt &lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;p&gt;(2 mins)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Virtual machines &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;VirtualBox (Kaustubh demoes       quickly) &lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/bangalore-crypto-party'&gt;https://cis-india.org/internet-governance/events/bangalore-crypto-party&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-06T13:47:02Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-moulishree-srivastava-october-22-2013-bali-meet-to-discuss-internet-governance-issues">
    <title>Bali meet to discuss Internet governance issues</title>
    <link>https://cis-india.org/news/livemint-moulishree-srivastava-october-22-2013-bali-meet-to-discuss-internet-governance-issues</link>
    <description>
        &lt;b&gt;Four-day event hosted by Internet Governance Forum to also discuss Internet access and diversity, privacy, security.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Moulishree Srivastava was &lt;a class="external-link" href="http://www.livemint.com/Politics/nSMWfhzTld5AHD3lJFrv3L/Bali-meet-to-discuss-Internet-governance-issues.html"&gt;published in Livemint&lt;/a&gt; on October 22, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Representatives of governments around the world,  technology executives and activists will discuss issues such as Internet  access and diversity, privacy, security, inter-governmental  corporation, and Internet governance at a four-day event hosted by the  Internet Governance Forum (IGF) that begins on Tuesday in Bali,  Indonesia.&lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/J.%20Satyanarayana"&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/J.%20Satyanarayana"&gt;J. Satyanarayana&lt;/a&gt;&lt;/span&gt;,  secretary, ministry of communications and information technology,  confirmed India’s participation in the forum and said the country would  be represented by Dr Govind, a senior director and head of department,  e-infrastructure and Internet governance division, department of  information technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We  will also be taking part in a working group on Internet governance and  enhanced cooperation, which will be convened by the United Nations  Commission on Science and Technology for Development in November,” said  Satyanarayana.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“IGF  is a valuable learning forum wherein different stakeholders can discuss  Internet governance policy issues without any antagonism. Other fora for  Internet policy like ICANN, WIPO (World Intellectual Property  Organization), ITU (International Telecommunication Union), etc., are  places where international law and policy are developed, and do not  allow for such learning because negotiations are always very  acrimonious. Since IGF is only meant for learning, it does not directly  address the global policy vacuum that exists for cyber crime, data  protection and privacy,” said &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;&lt;/span&gt;, executive director of Bangalore-based Centre for Internet and Society, who will be participating in the Bali event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Indian  government, private sector, civil society, technical and academic  community can become more competent and effective through such a  dialogue in other multilateral and multi-stakeholder fora where  international Internet standards, policies and laws are formulated. It  also helps the stakeholders contribute to the development of  internationally interoperable domestic policy,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  2006, the UN secretary general established a small secretariat in Geneva  to assist him in the convening of IGF. The first meeting was convened  in October-November 2006 in Athens. In December 2010, IGF’s mandate was  extended for five years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its  eighth edition, IGF will have detailed discussions on issues such as  free flow of information on the Internet, regulatory approaches to  privacy, and protection of interests of individuals and communities in  cyberspace, Internet surveillance and legal framework for cyber crime,  said the forum in a statement on its website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During  the four-event, for instance, one of the workshops “will explore what  core principles and strategies are needed to achieve a balanced and fair  approach to data protection that is effective internationally and  regionally”, according to IGF.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the prominent speakers in the event include &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Jari%20Arkko"&gt;Jari Arkko&lt;/a&gt;&lt;/span&gt;, chairman, Internet Engineering Task Force, Finland; &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Virat%20Bhatia"&gt;Virat Bhatia&lt;/a&gt;&lt;/span&gt;, president, South Asia, &lt;span class="company"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/AT&amp;amp;T%20Inc."&gt;AT&amp;amp;T Inc.&lt;/a&gt;&lt;/span&gt;; &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Chris%20Painter"&gt;Chris Painter&lt;/a&gt;&lt;/span&gt;, coordinator for cyber issues, US department of state; &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Karen%20Mulberry"&gt;Karen Mulberry&lt;/a&gt;&lt;/span&gt;, policy adviser, Internet Society; and &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Matthew%20Shears"&gt;Matthew Shears&lt;/a&gt;&lt;/span&gt;, director of Internet policy and human rights, Center for Democracy and Technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According  to industry estimates, over 2.5 billion Internet users interact in  shared cross-border online spaces where they can post content  potentially accessible worldwide.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“No  clear frameworks exist yet to handle the tensions between these  competing normative orders or values and enable peaceful cohabitation in  cross-border cyberspace. This challenge constitutes a rare issue of  common concern for all stakeholder groups,” said IGF on its website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According  to a UN estimate, nearly 40% of the world’s population will be online  by the end of 2013. “The Internet has become an essential tool for the  creation of jobs and the delivery of basic public services,” said the UN  undersecretary-general for economic and social affairs, &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Wu%20Hungbo"&gt;Wu Hungbo&lt;/a&gt;&lt;/span&gt;,  in a statement, adding that it is also essential “for improving access  to knowledge and education, for empowering women, for enhancing  transparency, and for giving marginalized populations a voice in  decision-making processes”.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-moulishree-srivastava-october-22-2013-bali-meet-to-discuss-internet-governance-issues'&gt;https://cis-india.org/news/livemint-moulishree-srivastava-october-22-2013-bali-meet-to-discuss-internet-governance-issues&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-23T08:29:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-august-19-2013-prashant-jha-balancing-vigilance-and-privacy">
    <title>Balancing vigilance and privacy</title>
    <link>https://cis-india.org/news/the-hindu-august-19-2013-prashant-jha-balancing-vigilance-and-privacy</link>
    <description>
        &lt;b&gt;As the government steps up its surveillance capabilities, the entire social contract between the state and citizens is being reformulated, with worrying consequences.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;This article by Prashant Jha was &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/technology/balancing-vigilance-and-privacy/article5037582.ece"&gt;published in the Hindu on August 18, 2013&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Indian state is arming itself with both technological capabilities  and the institutional framework to track the lives of citizens in an  unprecedented manner.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A new Centralised Monitoring System (CMS) is in the offing, which would build on the already existing mechanisms. As &lt;i&gt;The Hindu &lt;/i&gt;reported  on June 21, this would allow the government to access in real-time any  mobile and fixed line conversation, SMS, fax, website visit, social  media usage, Internet search and email, and will have ‘unmatched  capabilities of deep search surveillance and monitoring’.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Civil society groups and citizens expressed concern about the  government’s actions, plans, and intent at a discussion organised by the  Foundation for Media Professionals, on Saturday.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The context&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Usha Ramanathan, a widely respected legal scholar, pointed to the larger  political context which had permitted this form of surveillance. It  stemmed, she argued, from a misunderstanding of the notion of  sovereignty. “It is not the government, but the people who are  sovereign.” Laws and the Constitution are about limiting the power of  the state, but while people were being subjected to these restrictions,  the government itself had found ways to remain above it – either by not  having laws, or having ineffective regulators. States knew the kind of  power they exercised over citizens, with the result that ‘impunity had  grown’.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“There is also a complete breakdown of the criminal justice system,” Ms  Ramanathan said. This had resulted in a reliance on extra-judicial  methods of investigation, and ‘scape-goating’ had become the norm.  ‘National security’ had been emphasised, re-emphasised, and projected as  the central goal. “We haven’t paused to ask what this means, and the  extent to which we have been asked to give up personal security for the  sake of national security.” It was in this backdrop that technology had  advanced by leaps, and made extensive surveillance possible.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The implications are enormous. The data is often used for purposes it is  not meant for, including political vendetta, keeping track of rivals,  corporates, and digging out facts about a citizen when he may have  antagonised those in power.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Pranesh Prakash, director of the Centre of Internet and Society (CIS)  looked back at the killing of Haren Pandya, the senior Bharatiya Janata  Party (BJP) leader in Gujarat. Mr Pandya was using the SIM card of a  friend, and it was by tracking the SIM, and through it his location,  that the Gujarat government got to know that Mr Pandya had deposed  before a commission and indicted the administration for its role in the  riots. Eventually, he was found murdered outside a park in Ahmedabad.  The Gujarat Police had accessed call details of 90,000 phones.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It is also not clear whether mining this kind of data has been effective  for the national security purposes, which provide the reason for doing  it in the first place. Saikat Datta, resident editor of Daily News and  Analysis, and an expert on India’s intelligence apparatus, said a core  problem was the absence of any auditing and over sight. “There needs to  be a constant review of the number of calls, emails under surveillance,  with questions about whether it is yielding results. But this does not  happen, probably because a majority is not for counter-terrorism. There  would be trouble if you build accountability mechanisms.” When he sought  information under RTI around precisely such issues, he was denied  information on the grounds that it would strengthen ‘enemies of the  state’.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Anja Kovacs, who works with the Internet Democracy Project, said this  form of “mass surveillance” criminalised everybody since it was based on  the assumption that each citizen was a “potential criminal”. She also  pointed out that having “more information” did not necessarily mean it  was easier to address security threats – there was intelligence  preceding the Mumbai attacks, but it was not acted upon. She added,  “Most incidents have been resolved by traditional intelligence.  Investing in agencies, training them better could be more effective.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Bring in the caveats&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Few argue that the state is not entitled to exercise surveillance at  all. In fact, a social contract underpins democratic states. Citizens  agree to subject some of their rights to restrictions, and vest the  state with the monopoly over instruments and use of violence. In turn,  the state – acting within a set of legal principles; being accountable  to citizens; and renewing its popular legitimacy through different  measures, including elections – provides order and performs a range of  developmental functions.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;This framework, citizens and civil liberty groups worry, is under threat  with governments appropriating and usurping authority to conduct  unprecedented surveillance. Citizen groups, technology and privacy  experts came together globally to draft the International Principles on  the Application of Human Rights to Communication Surveillance.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It prescribed that any restriction to privacy through surveillance must  be ‘legal’; it must be for a ‘legitimate aim’; it must be ‘strictly and  demonstrably necessary’; it must be preceded by showing to an  established authority that other ‘less invasive investigative  techniques’ have been used; it must follow ‘due process’; decisions must  be taken by a ‘competent judicial authority’; there must be ‘public  oversight’ mechanisms; and ‘integrity of communications and systems’  should be maintained. (Full text available on  www.necessaryandproportionate.org)Mr Prakash of CIS, which has done  extensive work on surveillance and privacy issues, said, “An additional  principle must be collection limitation or data minimisation.” Giving  the instance of Indian Railways seeking the date of birth from a  customer booking a ticket, Mr Prakash said this was not information  which was necessary. But it could be used by hackers and many other  agencies to access an individual’s private transactions in other areas.  The UPA government is finalising a privacy Bill, but its final version  is not yet public, and it is not clear how far the government would go  in protecting citizen rights.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-august-19-2013-prashant-jha-balancing-vigilance-and-privacy'&gt;https://cis-india.org/news/the-hindu-august-19-2013-prashant-jha-balancing-vigilance-and-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Central Monitoring System</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-05T10:53:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward">
    <title>Automated Facial Recognition Systems and the Mosaic Theory of Privacy: The Way Forward</title>
    <link>https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward</link>
    <description>
        &lt;b&gt; Arindrajit Basu and Siddharth Sonkar have co-written this blog as the third of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems? &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Mosaic Theory of Privacy&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Whether the data collected by the AFRS should be treated similar to 
face photographs taken for the purposes of ABBA is not clear in the 
absence of judicial opinion. The AFRS would ordinarily collect 
significantly more data than facial photographs during authentication. 
This can be explained with the help of the &lt;em&gt;&lt;a href="https://www.lawfareblog.com/defense-mosaic-theory" rel="noreferrer noopener" target="_blank"&gt;mosaic theory of privacy&lt;/a&gt;&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;The mosaic theory of privacy suggests that data collected for long 
durations of an individual can be qualitatively different from single 
instances of observation. It argues that aggregating data from different
 instances can create a picture of an individual which affects her 
reasonable expectation of privacy. This is because a mere slice of 
information reveals a lot less if the same is contextualised in a broad 
pattern — a mosaic.&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/p&gt;
&lt;p&gt;The mosaic theory of privacy does not find explicit reference in 
Puttaswamy II. The petitioners had argued that seeding of Aadhaar data 
into existing databases would bridge information across silos so as to 
make real time surveillance possible. This is because information when 
integrated from different silos becomes more than the sum of its parts.&lt;/p&gt;
&lt;p&gt;The Court, however, dismissed this argument, accepting UIDAI’s 
submission that the data collected remains in different silos and 
merging is not permitted within the Aadhaar framework. Therefore, the 
Court did not examine whether it is constitutionally permissible to 
integrate data from different silos; it simply rejected the possibility 
of surveillance as a result of Aadhaar authentication.&lt;/p&gt;
&lt;p&gt;Jurisprudence in other jurisdictions is more advanced. In&amp;nbsp;&lt;em&gt;United States v. Jones&lt;/em&gt;,
 the United States Supreme Court&amp;nbsp;had observed that the insertion of a 
global positioning system into Antoine Jones’ Jeep in the absence of a 
warrant and without his consent invaded his privacy, entitling him to 
Fourth Amendment Protection. In this case, the movement of Jones’ 
vehicle was monitored for a period of twenty-eight days. Five concurring
 opinions in Jones acknowledges that aggregated and extensive 
surveillance is capable of violating the reasonable expectation of 
privacy irrespective of whether or not surveillance has taken place in 
public.&lt;/p&gt;
&lt;p&gt;The Court distinguished between prolonged surveillance and short term
 surveillance. Surveillance in the short run does not reveal what a 
person repeatedly does, as opposed to sustained surveillance which can 
reveal significantly more about a person. The Court takes the example of
 how a sequence of trips to a bar, a bookie, a gym or a church can tell a
 lot more about a person than the story of any single visit viewed in 
isolation.&lt;/p&gt;
&lt;p&gt;Most recently, in&lt;a href="https://www.supremecourt.gov/opinions/17pdf/16-402_h315.pdf" rel="noreferrer noopener" target="_blank"&gt; &lt;em&gt;Carpenter v. United States&lt;/em&gt;&lt;/a&gt;,
 the Supreme Court of the United States held that the collection of&amp;nbsp; 
historical cell data by the government&amp;nbsp; exposes the physical movements 
of an individual to potential surveillance, and an individual holds a 
reasonable expectation of privacy against such&amp;nbsp; collection. The Court 
admitted that historical-cell site information allows the government to 
go back in time in order to retract the exact whereabouts of a person.&lt;/p&gt;
&lt;p&gt;Judicial decisions have not addressed specifically whether facial 
recognition through law enforcement constitutes a search under the 
Fourth Amendment or a “mere visual observation”.&lt;/p&gt;
&lt;p&gt;The common thread linking CCTV footages and cellular data is the 
unique ability to track the movement of an individual from one place to 
another, enabling extreme forms of surveillance. It is perhaps this 
crucial link that would make ARFS-enabled CCTVs prejudicial to 
individual privacy.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;The mosaic theory as understood in &lt;em&gt;Carpenter&lt;/em&gt; helps one 
understand the extent to which an AFRS can augment the capacities of law
 enforcement in India. This in turn can help in understanding whether it
 is constitutionally permissible to install such systems&amp;nbsp;across the 
country.&lt;/p&gt;
&lt;p&gt;AFRS enabled-CCTV footages from different CCTVs. if viewed in 
conjunction could reveal a sequence of movements of an individual, 
enabling long-term surveillance of a nature that is qualitatively 
distinct from isolated observances observed across unrelated CCTV 
footages.&lt;/p&gt;
&lt;p&gt;Subsequent to &lt;em&gt;Carpenter&lt;/em&gt;, &lt;a href="https://www.lawfareblog.com/four-months-later-how-are-courts-interpreting-carpenter" rel="noreferrer noopener" target="_blank"&gt;federal district courts&lt;/a&gt;
 in the United States have declined to apply Carpenter to video 
surveillance cases since the judgement did not “call into question 
conventional surveillance techniques and tools, such as security 
cameras.”&lt;/p&gt;
&lt;p&gt;The extent of processing that an AFRS-enabled CCTV exposes an 
individual to would be significantly greater. This is because every time
 an individual is in the zone of a AFRS-enabled CCTV, the facial image 
will be compared to a common database. Snippets from different CCTVs 
capturing the individual’s physical presence in two different locations 
may not be meaningful per se. When observed together, the AFRS will make
 it possible to identify the individual’s movement from one place to 
another.&lt;/p&gt;
&lt;p&gt;For instance, the AFRS will be able to identify the person when they 
are on Street A at a particular time and when they are Street B in the 
immediately subsequent hour recorded by respective CCTV cameras, 
indicating the person’s physical movement from A to B. While a CCTV 
camera only records movement of an individual in video format, AFRS 
translates that digital information into individualised data with the 
help of a comparison of facial features with a pre-existing database.&lt;/p&gt;
&lt;p&gt;Through data aggregation, which appears to be the aim of the Indian 
government&amp;nbsp;in their tender that links three databases, it is apparent 
that the right to privacy is in danger. Yet,&amp;nbsp;at present, there does not 
exist any case law or legislation that can render such&amp;nbsp;efforts illegal 
at this juncture.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Conclusions and The Way Forward&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Despite a lack of judicial recognition of the potential 
unconstitutionality of deploying&amp;nbsp;AFRS, it is clear that the introduction
 of these systems pose a clear and present danger to civil rights and 
human dignity. Algorithmic surveillance alters a human being’s life in 
ways that even the subject of this surveillance cannot fully comprehend.
 As an individual’s data is manipulated and aggregated to derive&amp;nbsp;a 
pattern about that individual’s world, the individual or his data no 
longer exists for itself&lt;sup&gt; &lt;/sup&gt;but are massaged into various categories.&lt;/p&gt;
&lt;p&gt;Louis Amoore terms this a ‘&lt;a href="https://journals.sagepub.com/doi/abs/10.1177/0263276411417430?journalCode=tcsa" rel="noreferrer noopener" target="_blank"&gt;data-derivative&lt;/a&gt;’,
 which is an abstract conglomeration of data that continuously shapes 
our futures without us having a say in their framing. The branding of an
 individual as a criminal and then aggregating their data causes 
emotional distress as individuals move about in fear of the state gaze 
and their association with activities that are branded as potentially 
dangerous — thereby suppressing a right to dissent — as exemplified by 
their use reported use during the recent protests in Hong Kong.&lt;/p&gt;
&lt;p&gt;Case law both in India and abroad has clearly suggested that a right 
to privacy is contextual and is not surrendered merely because an 
individual is in a public place. However, the jurisprudence protecting 
public photography or videography under the umbrella of privacy remains 
less clear globally and non-existent in India.&lt;/p&gt;
&lt;p&gt;The mosaic theory of privacy is useful in this regard as it prevents 
mass ‘data-veillance’ of individual behaviour and accurately identifies 
the unique power that the volume, velocity and variety of Big Data 
provides to the state. Therefore, it is imperative that the judiciary 
recognise safeguards from data aggregation as an essential component of a
 reasonable expectation of privacy. At the same time, legislation could 
also provide the required safeguards.&lt;/p&gt;
&lt;p&gt;In the US, Senators Coons and Lee recently introduced a draft Bill titled ‘&lt;a href="https://www.coons.senate.gov/imo/media/doc/ALB19A70.pdf" rel="noreferrer noopener" target="_blank"&gt;The Facial Recognition Technology Warrant Act of 2019’&lt;/a&gt;.
 The Bill aims to impose reasonable restrictions on the use of facial 
recognition technology by law enforcement. The Bill creates safeguards 
against sustained tracking of physical movements of an individual in 
public spaces. The Bill terms such tracking ‘ongoing surveillance’ when 
it occurs for over a period of 72 hours in real time or through 
application of technology to historical records. The Bill requires that 
ongoing surveillance only be conducted for law enforcement purposes &lt;em&gt;and&lt;/em&gt; in pursuance of a Court Order (unless it is impractical to do so).&lt;/p&gt;
&lt;p&gt;While the Bill has its textual problems, it is definitely worth 
considering as a model going forward and ensure that AFR systems are 
deployed in line with a rights-respecting reading of a reasonable 
expectation of privacy.&amp;nbsp; &lt;a href="http://datagovernance.org/report/adoption-and-regulation-of-facial-recognition-technologies-in-india" rel="noreferrer noopener" target="_blank"&gt;Parsheera&lt;/a&gt;
 suggests that the legislation should narrow tailoring of the objects 
and purposes for deployment of AFRS, restrictions on the person whose 
images may be scanned from the databases, judicial approval for its use 
on a case by case basis and effective mechanisms of oversight, analysis 
and verification.&lt;/p&gt;
&lt;p&gt;Appropriate legal intervention is crucial. A failure to implement 
this effectively jeopardizes the expression of our true selves and the 
core tenets of our democracy.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward'&gt;https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu, Siddharth Sonkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-01-02T14:12:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns">
    <title>Automated Facial Recognition Systems (AFRS): Responding to Related Privacy Concerns</title>
    <link>https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns</link>
    <description>
        &lt;b&gt;Arindrajit Basu and Siddharth Sonkar have co-written this blog as the second of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems? &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Supreme Court of India, in &lt;a href="https://indiankanoon.org/doc/91938676/"&gt;Puttaswamy I&lt;/a&gt;&lt;em&gt; &lt;/em&gt;recognized&lt;em&gt;&amp;nbsp;&lt;/em&gt;that
 the right to privacy is not surrendered merely because the individual 
is in a public place. Privacy is linked to the individual as it is an 
essential facet of human dignity. Justice Chelameswar further clarified 
that privacy is contextual. Even in a public setting, people trying to 
converse in whispers would signal a claim to the right to privacy. 
Speaking on a loudspeaker would naturally not signal the same claim.&lt;/p&gt;
&lt;p&gt;The Supreme Court of Canada has also affirmed the notion of 
contextual privacy. As recently as on 7 March, 2019, the Supreme Court 
of Canada &lt;a href="http://www.thecourt.ca/r-v-jarvis-carving-out-a-contextual-approach-to-privacy/" rel="noreferrer noopener" target="_blank"&gt;in a landmark decision&lt;/a&gt; defined privacy rights in public areas implicitly applying &lt;a href="https://crypto.stanford.edu/portia/papers/RevnissenbaumDTP31.pdf"&gt;Helena Nissenbaum’s theory of contextual integrity&lt;/a&gt;.
 Helena Nissenbaum explains that the extent to which the right to 
privacy is eroded in public spaces with the help of her theory of 
contextual integrity.&lt;/p&gt;
&lt;p&gt;Nissenbaum suggests that labelling information as exclusively public 
or private fails to take into account the context which rationalises the
 desire of the individual to exercise her privacy in public. To explain 
this with an illustration, there exists a reasonable expectation of 
privacy in the restroom of a restaurant, even though it is in a public 
space.&lt;/p&gt;
&lt;p&gt;In &lt;a href="http://www.thecourt.ca/r-v-jarvis-carving-out-a-contextual-approach-to-privacy/"&gt;&lt;em&gt;R v Jarvis&lt;/em&gt;&lt;/a&gt; (Jarvis), the Court overruled a Court of Appeal for Ontario &lt;a href="https://www.canlii.org/en/on/onca/doc/2017/2017onca778/2017onca778.pdf"&gt;decision&lt;/a&gt;
 to hold that people can have a reasonable expectation of privacy even 
in public spaces. In this case, Jarvis was charged with the offence of 
voyeurism for secretly recording his students. The primary issue that 
the&amp;nbsp; Supreme Court of Canada was concerned with was whether the students
 filmed by Mr. Jarvis enjoyed a reasonable expectation of privacy at 
their school.&lt;/p&gt;
&lt;p&gt;The Court in this case unanimously held that students did indeed have
 a reasonable expectation of privacy.&amp;nbsp; The Court concluded nine 
contextual factors relevant in determining whether a person has a 
reasonable expectation to privacy would arise. The listed factors were:&lt;/p&gt;
&lt;p&gt;“1. The location the person was in when he or she was observed or recorded,&lt;/p&gt;
&lt;p&gt;2. The nature of the impugned conduct (whether it consisted of observation or recording),&lt;/p&gt;
&lt;p&gt;3. Awareness of or consent to potential observation or recording,&lt;/p&gt;
&lt;p&gt;4. The manner in which the observation or recording was done,&lt;/p&gt;
&lt;p&gt;5. The subject matter or content of the observation or recording,&lt;/p&gt;
&lt;p&gt;6. Any rules, regulations or policies that governed the observation or recording in question,&lt;/p&gt;
&lt;p&gt;7. The relationship between the person who was observed or recorded and the person who did the observing or recording,&lt;/p&gt;
&lt;p&gt;8. The purpose for which the observation or recording was done, and&lt;/p&gt;
&lt;p&gt;9. The personal attributes of the person who was observed or recorded.” (paragraph 29 of the judgement).&lt;/p&gt;
&lt;p&gt;The Court emphasized that the factors are not an exhaustive list, but
 rather were meant to be a guiding tool in determining whether a 
reasonable expectation of privacy existed in a given context. It is not 
necessary that each of these factors is present in a given situation to 
give rise to an expectation of privacy.&lt;/p&gt;
&lt;p&gt;Compared to the above-mentioned factors in Jarvis, the Indian Supreme Court in &lt;a href="https://indiankanoon.org/doc/127517806/"&gt;Justice K.S Puttaswamy (Retd.) v. Union of India&lt;/a&gt;: Justice Sikri (Puttaswamy II) &lt;strong&gt;—&lt;/strong&gt;
 the case which upheld the constitutionality of the Aadhaar project 
relied on the following factors to determine a reasonable expectation of
 privacy in a given context:&lt;/p&gt;
&lt;p&gt;“(i) What is the context in which a privacy claim is set up?&lt;/p&gt;
&lt;p&gt;(ii) Does the claim relate to private or family life, or a confidential relationship?&lt;/p&gt;
&lt;p&gt;(iii) Is the claim a serious one or is it trivial?&lt;/p&gt;
&lt;p&gt;(iv) Is the disclosure likely to result in any serious or significant injury and the nature and extent of disclosure?&lt;/p&gt;
&lt;p&gt;(v) Is disclosure relates to personal and sensitive information of an identified person?&lt;/p&gt;
&lt;p&gt;(vi) Does disclosure relate to information already disclosed publicly? If so, its implication?”&lt;/p&gt;
&lt;p&gt;These factors (acknowledged in Puttaswamy II in paragraph 292) seem 
to be very similar to the ones laid down in Jarvis, i.e., there is a 
strong reliance on the context in both cases. While there is no explicit
 mention of individual attributes of the individual claiming a 
reasonable expectation, the holding that children should be given an opt
 out indicates that the Court implicitly takes into account personal 
attributes (e.g. age) as well.&lt;/p&gt;
&lt;p&gt;The Court in Jarvis further (in paragraph 39) took the example of a 
woman in a communal change room at a public pool. She may expect other 
users to incidentally observe her undress but she would continue to 
expect only other women in the change room to observe her and reserve 
her rights against the general public. She would also expect not to be 
video recorded or photographed while undressing, both from other users 
of the pool and by the general public.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;If it is later found out that the change room had a one-way glass 
which allowed the pool staff to view the users change — or if there was a
 concealed camera recording persons while they were changing, she could 
claim a breach of her reasonable expectation of privacy under such 
circumstances and it would constitute an invasion of privacy.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;So, in the context of an AFRS, an individual walking down a 
public road may still signal that they wish to avail of their right to 
privacy. In such contexts, a concerted surveillance mechanism may come 
up against constitutional&amp;nbsp; roadblocks.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is the nature of information being collected?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The second big question &lt;strong&gt;—&lt;/strong&gt; the nature of information 
which is being collected plays a role in determining the extent to which
 a person can exercise their reasonable expectation of privacy. 
Puttaswamy II laid down that collection of core biometric information 
such as fingerprints, iris scans in the context of the Aadhaar-Based 
Biometric Authentication (‘ABBA’) is constitutionally permissible. The 
basis of this conclusion is that the Aadhaar Act does not deal with the 
individual’s intimate or private sphere.&lt;/p&gt;
&lt;p&gt;The judgement of the Supreme Court in Puttaswamy II is in a very 
specific context (i.e. the ABBA). It does not explain or identify the 
contextual factors which determine the extent to which privacy may be 
reasonably expected over biometrics generally. In this judgment, the 
Court observed that demographic information and photographs do not raise
 a reasonable expectation of privacy under Article 21 unless there exist
 special circumstances such as the disclosure of juveniles in conflict 
of law or a rape victim’s identity.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Most importantly, the Court held that face photographs for 
the purpose of identification are not covered by a reasonable 
expectation of privacy. The Court distinguished face photographs from 
intimate photographs or those photographs which concern confidential 
situations. &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Face photographs, according to the Court, are shared by 
individuals in the ordinary course of conduct for the purpose of 
obtaining a driving &lt;/strong&gt;l&lt;strong&gt;icense, voter id, passport, 
examination admit cards, employment cards, and so on. Face photographs 
by themselves reveal no information.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Naturally, this&amp;nbsp;pronouncement of the Apex Court is a huge boost for the introduction of AFRS in India.&lt;/p&gt;
&lt;p&gt;Abroad, however, on 4 September 2019, in &lt;a href="https://www.judiciary.uk/wp-content/uploads/2019/09/bridges-swp-judgment-Final03-09-19-1.pdf"&gt;Edward Bridges v. Chief Constable of South Wales Police&lt;/a&gt;, a Division Bench of the High Court in England and Wales heard a challenge against an AFRS introduced by law enforcement (&lt;em&gt;see&lt;/em&gt;
 Endnote 1). The High Court rejected a claim for judicial review holding
 that the AFRS in question does not violate inter alia the right to 
privacy under Article 8 of the European Convention of Human Rights 
(‘ECHR’).&lt;/p&gt;
&lt;p&gt;According to the Court, the AFRS was used for specific and limited 
purposes, i.e., only when the image of the public matched a person on an
 existing watchlist. The use of the AFRS was therefore considered a 
lawful and fair restriction.&lt;/p&gt;
&lt;p&gt;The Court, however, acknowledged that extracting biometric data 
through AFRS is “well beyond the expected and unsurprising”. This seems 
to be a departure from the Indian Supreme Court’s observation in 
Puttaswamy II that there is no reasonable expectation of privacy over 
biometric data in the context of ABBA, and may be a wiser approach for 
the Indian courts to adopt.&lt;/p&gt;
&lt;h6&gt;&lt;strong&gt;Endnote &lt;/strong&gt;&lt;/h6&gt;
&lt;p&gt;1. The challenge was put forth by Edward Bridges, a civil liberties 
campaigner from Cardiff for being caught on camera in two particular 
deployments of the AFRS a) when he was at Queen Street, a busy shopping 
area in Cardiff and b) when he was at the Defence Procurement, Research,
 Technology and Exportability Exhibition held at the Motorpoint Arena.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This was published by &lt;a class="external-link" href="https://aipolicyexchange.org/2019/12/28/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns/"&gt;AI Policy Exchange&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns'&gt;https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu, Siddharth Sonkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-01-02T14:09:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/august-2019-newsletter">
    <title>August 2019 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/august-2019-newsletter</link>
    <description>
        &lt;b&gt;Centre for Internet &amp; Society newsletter for the month of August 2019.&lt;/b&gt;
        
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights for August 2019&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;The Oxford Internet Institute and CIS are creating a State of the Internet’s Languages report, as baseline research with both numbers and stories, to demonstrate how far we are from making the internet multilingual. The call is available in&amp;nbsp;&lt;a href="https://whoseknowledge.org/initiatives/callforcontributions/#CIS-AR" target="_blank"&gt;Arabic&lt;/a&gt;,&amp;nbsp;&lt;a href="https://whoseknowledge.org/initiatives/callforcontributions/#CIS-PT" target="_blank"&gt;Brazilian Portuguese&lt;/a&gt;,&amp;nbsp;&lt;a href="https://cis-india.org/raw/dtil-2019-call#en"&gt;English&lt;/a&gt;,&amp;nbsp;&lt;a href="https://whoseknowledge.org/initiatives/callforcontributions/#CIS-IZ" target="_blank"&gt;IsiZulu&lt;/a&gt;,&amp;nbsp;&lt;a href="https://whoseknowledge.org/initiatives/callforcontributions/#CIS-ES" target="_blank"&gt;Spanish&lt;/a&gt;, and&amp;nbsp;&lt;a href="https://cis-india.org/raw/dtil-2019-call#ta"&gt;Tamil&lt;/a&gt;. &lt;a class="external-link" href="https://cis-india.org/raw/dtil-2019-call"&gt;CIS invites&amp;nbsp;friends and communities to translate the call into other languages&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;CIS's Access to Knowledge (A2K) team &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/call-for-joining-the-free-knowledge-movement-wikipedia-wikimedia"&gt;is conducting a free knowledge movement&lt;/a&gt; and as part of this initiative it is inviting contributions from the Wikipedia community. Photos, media, content or archives&amp;nbsp;donated by community members would be used worldwide to disseminate information. The content you are donating must be under Creative Commons Share-like content. You must have the copyright of the content under&amp;nbsp;&lt;a class="external-link" href="https://en.wikipedia.org/wiki/Creative_Commons_license"&gt;CC licenses&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Over the last few years, several &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/digtial-identities-research-plan"&gt;digital identity schemes have been initiated in different countries across the world&lt;/a&gt;. There has been significant momentum on digital ID, especially after the adoption of UN Sustainable Development Goal 16.9, which calls for legal identity for all by 2030. Authors, Amber Sinha and Pooja Saxena, explore about the uses and design of digital identity systems and ask two core questions a) What are appropriate uses of ID?, and b) How should we think about the technological design of ID?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Together with the&amp;nbsp;&lt;a class="external-link" href="https://itsrio.org/pt/home/"&gt;Institute of Technology &amp;amp; Society&lt;/a&gt; (ITS), Brazil, and the&amp;nbsp;&lt;a class="external-link" href="https://www.cipit.org/"&gt;Centre for Intellectual Property and Information Technology Law&lt;/a&gt;(CIPIT), Kenya, CIS participated at a side event in&amp;nbsp;&lt;a class="external-link" href="https://www.rightscon.org/"&gt;RightsCon 2019&lt;/a&gt; held in Tunisia, titled Holding ID Issuers Accountable, What Works?, organised by the&amp;nbsp;&lt;a class="external-link" href="https://www.omidyar.com/"&gt;Omidyar Network&lt;/a&gt;. A report of the event is published &lt;a class="external-link" href="https://digitalid.design/rightscon-2019-report.html"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;As governments across the globe implement new, foundational, digital identification systems (“Digital ID”), or modernize existing ID programs, there is dire need for greater research and discussion about appropriate uses of Digital ID systems. At RightsCon 2019 in Tunis, we presented&amp;nbsp;&lt;a class="external-link" href="https://bit.ly/CISDigitalIDAppropriateUse"&gt;working drafts&lt;/a&gt; on appropriate use of Digital ID by the partner organisations of this&amp;nbsp;&lt;a class="external-link" href="https://www.omidyar.com/blog/appropriate-use-digital-identity-why-we-invested-three-region-research%C2%A0alliance"&gt;three-region research alliance&lt;/a&gt; - ITS from Brazil, CIPIT from Kenya, and CIS from India.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;CIS &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/comments-to-the-id4d-practitioners2019-guide"&gt;gave its comments to the ID4D Practitioners’ Guide: Draft For Consultation&lt;/a&gt; released by ID4D in June, 2019. The submission is divided into three main parts. The first part (General Comments) contains the high-level comments on the Practitioners’ Guide, while the second part (Specific Comments) addresses individual sections in the Guide. The third and final part (Additional Comments) does not relate to particulars in the Practitioners' Guide but other documents that it relies upon.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The Ministry of Health and Family Welfare had released the National Digital Health Blueprint on 15 July 2019 for comments. &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/samyukta-prabhu-ambika-tandon-torsha-sarkar-and-aayush-rathi-august-4-2019-comments-on-national-digital-health-blueprint"&gt;CIS submitted its comments&lt;/a&gt;. CIS notes that the nature of data which would be subject to processing in the proposed digital framework pre-supposes a robust data protection regime in India, one which is currently absent. Accordingly, it urges the ministry to cease the implementation of the framework until the Personal Data Protection Bill is passed by the Parliament. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Aayush Rathi , Vedika Pareek , Divij Joshi and Pranav Bidare &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/future-of-work-in-the-asean"&gt;co-authored a research paper 'Future of Work in the ASEAN'&lt;/a&gt;. The authors reveal that the future of work will be mediated through region and country specific factors such as socioeconomic,geopolitical and demographic change. The report was edited by Elonnai Hickok and Ambika Tandon with research assistance by Sankalp Srivastava and Anjanaa Aravindan. The research is supported by Tides Foundation.&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;CIS and the News&lt;/h3&gt;
&lt;p&gt;The following articles were authored by CIS secretariat during the month:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/loksatta-august-3-2019-subodh-kulkarni-and-madhav-gadgil-the-knowledge-base-is-liberated"&gt;The Knowledge Base is Liberated&lt;/a&gt; (Subodh Kulkarni and Madhav Gadgil; Loksatta; August 3, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/nextrends-india-arindrajit-basu-august-5-2019-private-sector-and-the-cultivation-of-cyber-norms-in-india"&gt;Private Sector and the cultivation of cyber norms in India&lt;/a&gt; (Arindrajit Basu; Nextrends India; August 5, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/cyber-brics-august-12-2019-torsha-sarkar-rethinking-the-intermediary-liability-regime-in-india"&gt;Rethinking the intermediary liability regime in India &lt;/a&gt;(Torsha Sarkar; CyberBRICS; August 16, 2019).&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste"&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-august-18-2019-digital-native-how-free-is-internet"&gt;Digital Native: How free is the internet?&lt;/a&gt; (Nishant Shah; Indian Express; August 18, 2019).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/prime-time-august-26-2019-sunil-abraham-linking-aadhaar-with-social-media-or-ending-encryption-is-counterproductive"&gt;Linking Aadhaar with social media or ending encryption is counterproductive&lt;/a&gt; (Sunil Abraham; Prime Time; August 26, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/the-hindu-august-27-2019-a-judicial-overreach-into-matters-of-regulation"&gt;A judicial overreach into matters of regulation&lt;/a&gt; (Gurshabad Grover; The Hindu; August 28, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/the-hindu-august-29-2019-aayush-rathi-and-akriti-bopanna-kashmirs-information-vacuum"&gt;Kashmir’s information vacuum&lt;/a&gt; (Aayush Rathi and Akriti Bopanna; The Hindu; August 29, 2019).&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;CIS in the News&lt;/h3&gt;
&lt;p&gt;CIS secretariat was consulted for the following articles published during the month in various publications:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/the-print-august-6-2019-will-modi-govt-move-on-kashmir-article-370-stand-the-scrutiny-of-supreme-court"&gt;Will Modi govt move on Kashmir’s Article 370 stand the scrutiny of Supreme Court?&lt;/a&gt; (The Print; August 6, 2019).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/washington-post-august-6-2019-niha-masih-internet-mobile-blackout-shuts-down-communication-with-kashmir"&gt;‘I’m just helpless’: Concern about Kashmir mounts as communication blackout continues&lt;/a&gt; (Niha Masih; Washington Post; August 6, 2019).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/the-news-minute-haripriya-suresh-august-8-2019-why-madras-hc-case-on-whatsapp-traceability-could-have-wider-ramifications"&gt;Why the Madras HC case on WhatsApp traceability could have wider ramifications&lt;/a&gt; (Haripriya Suresh; The News Minute; August 8, 2019).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/medianama-trisha-jalan-august-8-2019-ministry-of-health-public-consultation-on-national-digital-health-blueprint"&gt;Ministry of Health's public consultation on National Digital Health Blueprint: Legal issues around telemedicine, consent, and 'egosystems' in healthcare&lt;/a&gt; (Trisha Jalan; Medianama; August 8, 2019).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/deccan-herald-nina-c-george-august-13-2019-abuse-linked-to-net-fixation"&gt;Abuse linked to Net fixation&lt;/a&gt; (Nina C. George; Deccan Herald; August 13, 2019).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/new-york-times-august-14-2019-vindu-goel-karan-deep-singh-and-sameer-yasir-india-shut-down-kashmir-internet-access-now-we-cannot-do-anything"&gt;India Shut Down Kashmir’s Internet Access. Now, ‘We Cannot Do Anything.’&lt;/a&gt; (Vindu Goel, Karan Deep Singh and Sameer; New York Times; August 14, 2019).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/openness/news/quartz-india-august-16-2019-india-s-top-science-institution-is-trying-hard-to-fix-its-manel-problem"&gt;India’s top science institution is trying hard to fix its “manel” problem&lt;/a&gt; (Quartz India; August 16, 2019).&amp;nbsp;This piece was originally published on Connect under the headline, “We Learned (The Hard Way) Not to Have Manels.”&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/raffaele-angius-august-19-2019-india-kashmir-internet"&gt;Perché l'India ha tagliato internet al Kashmir&lt;/a&gt; (Raffaele Angius; WIRED.IT; August 19, 2019).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/et-prime-sandhya-sharma-august-19-2019-us-pressure-threatens-to-weaken-data-localisation-mandate-in-indias-landmark-data-protection-bill"&gt;US pressure threatens to weaken data - localisation mandate in India's landmark data-protection bill&lt;/a&gt; (Sandhya Sharma; ET Prime; August 19, 2019).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/money-control-swathi-moorthy-august-20-2019-linking-aadhaar-to-facebook-whatsapp-wont-curb-fake-news-impinge-on-privacy-experts"&gt;Linking Aadhaar to Facebook, WhatsApp won't curb fake news, but may undermine its legislation: Experts&lt;/a&gt; (Swathy Moorthy; Moneycontrol; August 20, 2019).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a style="text-align: justify;" class="external-link" href="https://cis-india.org/internet-governance/news/the-print-august-21-2019-taran-deol-and-revathi-krishnan-linking-aadhaar-to-facebook-twitter"&gt;Linking Aadhaar to Facebook, Twitter: Possible witch-hunt or key to curb crime &amp;amp; fake news?&lt;/a&gt;&lt;span style="text-align: justify;"&gt; (Taran Deol and Revathi Krishanan; The Print; August 21, 2019).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/deccan-herald-rajmohan-sudhakar-august-25-2019-ai-is-biased-you-see-if-you-google-hands"&gt;AI is biased, you’ll see if you Google ‘hands’&lt;/a&gt; (Rajmohan Sudhakar; Deccan Herald; August 25, 2019).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/cnbc-tv-18-august-28-2019-government-plans-tighter-rules-for-social-media-brands-like-facebook-tiktok-sharechat"&gt;Government plans tighter rules for social media brands like Facebook, TikTok, ShareChat&lt;/a&gt; (Sunny Sen; CNBC TV 18; August 28, 2019).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/hindustan-times-august-28-2019-amrita-madhukalya-what-centre-will-tell-sc-on-aadhaar-and-social-media-account-linkage"&gt;What Centre will tell Supreme Court on Aadhaar and social media account linkage&lt;/a&gt; (Amrita Madhukalya; Hindustan Times; August 28, 2019).&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;&lt;a class="external-link" href="https://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Access to Knowledge is a campaign to promote the fundamental principles of justice, freedom, and economic development. It deals with issues like copyrights, patents and trademarks, which are an important part of the digital landscape.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Wikipedia&lt;/h3&gt;
&lt;p&gt;Under a grant from Wikimedia Foundation we are doing a project &lt;span style="text-align: justify;"&gt;for the growth of Indic language communities and projects by designing community collaborations and partnerships that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;&lt;strong&gt;Blog Entry&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/call-for-joining-the-free-knowledge-movement-wikipedia-wikimedia"&gt;Call for joining the Free Knowledge movement #Wikipedia #Wikimedia&lt;/a&gt; (Bhuvana Meenakshi; August 19, 2019).&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The Tunis Agenda of the second World Summit on the Information Society has defined internet governance as the development and application by governments, the private sector and civil society, in their respective roles of shared principles, norms, rules, decision making procedures and programmes that shape the evolution and use of the Internet. As part of internet governance work we work on policy issues relating to freedom of expression primarily focusing on the Information Technology Act and issues of liability of intermediaries for unlawful speech and simultaneously ensuring that the right to privacy is safeguarded as well.&lt;/p&gt;
&lt;h3&gt;Freedom of Speech &amp;amp; Expression&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Under a grant from the MacArthur Foundation, CIS is doing research on the restrictions placed on freedom of expression online by the Indian government and contribute studies, reports and policy briefs to feed into the ongoing debates at the national as well as international level. As part of the project we bring you the following outputs:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Participation in Events&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/packets-net-neutrality-and-gaming-public-policy-outcomes"&gt;Packets, net neutrality and gaming public policy outcomes&lt;/a&gt; (Organized by Has Geek; Bangalore; August 15, 2019).&amp;nbsp;Gurshabad Grover attended Prof. Vishal Misra's lecture on net neutrality.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Privacy&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Under a grant from Privacy International and IDRC we are doing a project on surveillance. CIS is researching the history of privacy in India and how it shapes the contemporary debates around technology mediated identity projects like Aadhar. As part of our ongoing research, we bring you the following outputs:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Submission&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/samyukta-prabhu-ambika-tandon-torsha-sarkar-and-aayush-rathi-august-4-2019-comments-on-national-digital-health-blueprint"&gt;Comments on the National Digital Health Blueprint&lt;/a&gt; (Samyukta Prabhu, Ambika Tandon, Torsha Sarkar and Aayush Rathi; August 7, 2019). &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Participation in Events&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/digital-id-forum-2019"&gt;Digital ID Forum 2019&lt;/a&gt; (Organized by UNDP; Chulalongkorn University, Thailand; July 3, 2019). Sunil Abraham was one of the panelists at this event.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/bis-litd-17-meeting"&gt;BIS LITD 17 meeting&lt;/a&gt; (Organized by Bureau of Indian Standards; New Delhi; July 3, 2019). Gurshabad Grover attended the sixteenth meeting of the Information Systems Security and Biometrics Section Committee (LITD17).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/facebook-data-for-good-in-bangalore"&gt;Facebook Data for Good in Bangalore&lt;/a&gt; (Organized by Facebook; Indian Institute of Science, Bangalore; July 25, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/roundtable-with-the-whatsapp-leadership"&gt;Roundtable with the WhatsApp leadership&lt;/a&gt; (Organized by WhatsApp; Mountbatten, The Oberoi, New Delhi; July 26, 2019). Will Cathcart, WhatsApp's new global head, visited India and invited Sunil Abraham for a discussion.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/facebook-data-for-good-delhi"&gt;Facebook Data for Good in New Delhi&lt;/a&gt; (Organized by Facebook; University of Chicago Center, New Delhi; July 29, 2019).&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;IT / Information Technology&lt;/h3&gt;
&lt;p&gt;A research on the usage of systems (computers and telecommunications) for storing, retrieving and sending information as well as the IT Act:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Research Paper&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/future-of-work-in-the-asean"&gt;Future of Work in the ASEAN&lt;/a&gt; (Aayush Rathi , Vedika Pareek , Divij Joshi and Pranav Bidare; edited by Elonnai Hickok and Ambika Tandon with research assistance from Sankalp Srivastava and Anjanaa Aravindan; August 31, 2019).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/cyber-policy-2.0"&gt;Cyber Policy 2.0&lt;/a&gt; (Organized by National Law University; Bangalore; August 17, 2019). Arindrajit Basu was a speaker.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Artificial Intelligence&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;With origins dating back to the 1950s Artificial Intelligence (AI) is not necessarily new. However, interest in AI has been rekindled over the recent years due to advancements of technology and its applications to real-world scenarios. We conduct research on the existing legal and regulatory parameters:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Participation in Events&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/emergence-of-chinese-technology-rising-stakes-for-innovation-competition-and-governance"&gt;Emergence of Chinese Technology:Rising stakes for innovation, competition and governance&lt;/a&gt; (Organized by&amp;nbsp;Omidyar Network in partnership with the Esya Centre; New Delhi; August 12, 2019).&amp;nbsp;Arindrajit Basu attended the event.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/impact-of-industrial-revolution-4-0-it-and-automotive-sector-in-india-by-the-dialogue-and-fes"&gt;Impact of Industrial Revolution 4.0 - IT and Automotive Sector in India&lt;/a&gt; (Organized by the Dialogue and&amp;nbsp;Friedrich-Ebert-Stiftung; Bangalore; August 21, 2019). Aayush Rathi attended the event.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/policies-for-the-platform-economy"&gt;Policies for the Platform Economy&lt;/a&gt; (Organized by IT for Change; India Habitat Centre; New Delhi; August 30, 2019). Amber Sinha and Anubha Sinha were panelists. &lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Digital Identity&lt;/h3&gt;
&lt;p&gt;Omidyar Network is investing in establishment of a three-region research alliance — to be co-led by the Institute for Technology &amp;amp; Society (ITS), Brazil, the Centre for Intellectual Property and Information Technology Law (CIPIT) , Kenya, and CIS.&amp;nbsp;As part of this Alliance, we at the CIS will look at the policy objectives of digital identity projects, how technological policy choices can be thought through to meet the objectives, and how legitimate uses of a digital identity framework may be evaluated.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Research Paper&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/digtial-identities-research-plan"&gt;Design and Uses of Digital Identities - Research Plan&lt;/a&gt; (Amber Sinha and Pooja Saxena; August 8, 2019). &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Submissions&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/the-appropriate-use-of-digital-identity"&gt;The Appropriate Use of Digital Identity&lt;/a&gt; (Amber Sinha; August 8, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/comments-to-the-id4d-practitioners2019-guide"&gt;Comments to the ID4D Practitioners’ Guide&lt;/a&gt; (Amber Sinha; August 8, 2019).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/holding-id-issuers-accountable-what-works"&gt;Holding ID Issuers Accountable, What Works?&lt;/a&gt; (Organized by Omidyar Network; RightsCon 2019; August 8, 2019).&lt;/li&gt;&lt;/ul&gt;
&lt;h2 style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/raw"&gt;Researchers@Work&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The researchers@work programme at CIS produces and supports pioneering and sustained trans-disciplinary research on key thematics at the intersections of internet and society; organise and incubate networks of and fora for researchers and practitioners studying and making internet in India; and contribute to development of critical digital pedagogy, research methodology, and creative practice.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/workshop-on-archival-standards-and-digitisation-workflow"&gt;Workshop on Archival Standards and Digitisation Workflow&lt;/a&gt; (Organized by British Library; NCBS; Bangalore; August 19 - 20, 2019). P.P. Sneha attended the event.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://medium.com/rawblog/hookingup-bbd0f06a8851"&gt;#HookingUp&lt;/a&gt; (Akhil Kang, Christina Thomas Dhanraj, Dhrubo Jyoti, and Gowthaman Ranganathan; August 1, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/dtil-2019-call"&gt;Call for Contributions and Reflections: Your experiences in Decolonizing the Internet’s Languages!&lt;/a&gt; (P.P. Sneha; August 7, 2019).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/simiran-lalvani-worker-kinship-food-delivery-mumbai"&gt;Simiran Lalvani - Workers’ fictive kinship relations in Mumbai app-based food delivery&lt;/a&gt; (Sumandro Chattapadhyay; August 16, 2019).&lt;/li&gt;&lt;/ul&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;a class="external-link" href="http://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;CIS is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with disabilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Follow CIS on:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Access to Knowledge:&amp;nbsp;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Information Policy:&amp;nbsp;&lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Access to Knowledge:&amp;nbsp;a2k@cis-india.org&lt;/li&gt;
&lt;li&gt;E-Mail - Researchers at Work:&amp;nbsp;raw@cis-india.org&lt;/li&gt;
&lt;li&gt;List - Researchers at Work:&amp;nbsp;&lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Support CIS:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Please help us defend consumer and citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collaborate with CIS:&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at&amp;nbsp;sunil@cis-india.org&amp;nbsp;(for policy research), or Sumandro Chattapadhyay, Research Director, at&amp;nbsp;sumandro@cis-india.org&amp;nbsp;(for academic research), with an indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, write to Tanveer Hasan, Programme Officer, at&amp;nbsp;tanveer@cis-india.org.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects&lt;/em&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/august-2019-newsletter'&gt;https://cis-india.org/about/newsletters/august-2019-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2019-12-06T04:54:20Z</dc:date>
   <dc:type>Page</dc:type>
   </item>




</rdf:RDF>
