<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1 to 15.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/arindrajit-basu-september-24-2021-the-geopolitics-of-cyberspace-compendium-of-cis-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/rbi-ban-on-cryptocurrencies-not-backed-by-any-data-or-statistics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cryptocurrency-regulation-in-india-2013-a-brief-history"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/extra-territorial-surveillance-and-the-incapacitation-of-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/call-for-comments-model-security-standards-for-the-indian-fintech-industry"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cybersecurity-visuals-media-handbook-launch-event"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/draft-security-standards-for-the-financial-technology-sector-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/cultivating-india2019s-cyber-defense-strategy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/lawfare-arindrajit-basu-november-7-2019-indias-role-in-global-cyber-policy-formulation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/discussion-at-cyfy-on-technology-policy-and-national-security-building-21st-century-curricula-in-india2019s-law-schools"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cyber-policy-2.0"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/nextrends-india-arindrajit-basu-august-5-2019-private-sector-and-the-cultivation-of-cyber-norms-in-india"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/arindrajit-basu-september-24-2021-the-geopolitics-of-cyberspace-compendium-of-cis-research">
    <title>The Geopolitics of Cyberspace: A Compendium of CIS Research</title>
    <link>https://cis-india.org/internet-governance/blog/arindrajit-basu-september-24-2021-the-geopolitics-of-cyberspace-compendium-of-cis-research</link>
    <description>
        &lt;b&gt;Cyberspace is undoubtedly shaping and disrupting commerce, defence and human relationships all over the world. Opportunities such as improved access to knowledge, connectivity, and innovative business models have been equally met with nefarious risks including cyber-attacks, disinformation campaigns, government driven digital repression, and rabid profit-making by ‘Big Tech.’ Governments have scrambled to create and update global rules that can regulate the fair and equitable uses of technology while preserving their own strategic interests.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;With a rapidly digitizing economy and clear interests in shaping global rules that favour its strategic interests, India stands at a crucial juncture on various facets of this debate. How India governs and harnesses technology, coupled with how India translates these values and negotiates its interests globally, will surely have an impact on how similarly placed emerging economies devise their own strategies. The challenge here is to ensure that domestic technology governance as well as global engagements genuinely uphold and further India’s democratic fibre and constitutional vision.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Since 2018, researchers at the Centre for Internet and Society have produced a body of research including academic writing, at the intersection of geopolitics and technology covering global governance regimes on trade and cybersecurity, including their attendant international law concerns, the digital factor in bilateral relationships (with a focus on the Indo-US and Sino-Indian relationships). We have paid close focus to the role of emerging technologies in this debate, including AI and 5G as well as how private actors in the technology domain, operating across national jurisdictions, are challenging and upending traditionally accepted norms of international law, global governance, and geopolitics.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The global fissures in this space matter fundamentally for individuals who increasingly use digital spaces to carry out day to day activities: from being unwitting victims of state surveillance to harnessing social media for causes of empowerment to falling prey to state-sponsored cyber attacks, the rules of cyber governance, and its underlying politics. Yet, the rules are set by a limited set of public officials and technology lawyers within restricted corridors of power. Better global governance needs more to be participatory and accessible. CIS’s research and writing has been cognizant of this, and attempted to merge questions of global governance with constitutional and technical questions that put individuals and communities centre-stage.&lt;/p&gt;
&lt;p&gt;Research and writing produced by CIS researchers and external collaborators from 2018 onward is detailed in the appended compendium.&lt;/p&gt;
&lt;h2&gt;Compendium&lt;/h2&gt;
&lt;h3&gt;Global cybersecurity governance and cyber norms&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Two decades since a treaty governing state behaviour in cyberspace was mooted by Russia, global governance processes have meandered along. The security debate has often been polarised along “Cold War” lines but the recent amplification of cyberspace governance as developmental, social and economic has seen several new vectors added to this debate. This past year two parallel processes at the United Nations General Assembly’s First Committee on Disarmament and International Security-United Nations Group of Governmental Experts (UN-GGE) and the United Nations Open Ended Working Group managed to produce consensus reports but several questions on international law, norms and geopolitical co-operation remain. India has been a participant at these crucial governance debates. Both the substance of the contribution, along with its implications remain a key focus area for our research.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Edited Volumes&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Karthik Nachiappan and Arindrajit Basu &lt;a href="https://www.india-seminar.com/2020/731.htm"&gt;India and Digital World-Making&lt;/a&gt;, &lt;em&gt;Seminar &lt;/em&gt;731, 1 July 2020 &lt;em&gt;(featuring contributions from Manoj Kewalramani, Gunjan Chawla, Torsha Sarkar, Trisha Ray, Sameer Patil, Arun Vishwanathan, Vidushi Marda, Divij Joshi, Asoke Mukerji, Pallavi Raghavan, Karishma Mehrotra, Malavika Raghavan, Constantino Xavier, Rajen Harshe' and Suman Bery&lt;/em&gt;)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;&lt;br /&gt;Long-Form Articles&lt;/em&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Arindrajit Basu and      Elonnai Hickok, &lt;a href="https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs"&gt;&lt;em&gt;Cyberspace      and External Affairs: A Memorandum for India&lt;/em&gt;&lt;/a&gt; (Memorandum,      Centre for Internet and Society, 30 Nov 2018) &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-potential-for-the-normative-regulation-of-cyberspace-implications-for-india"&gt;&lt;em&gt;The Potential for the Normative Regulation of Cyberspace&lt;/em&gt;&lt;/a&gt;&lt;em&gt; &lt;/em&gt;(White Paper, Centre for Internet and Society,      30 July 2018) &lt;/li&gt;
&lt;li&gt;Arindrajit Basu and      Elonnai Hickok &lt;a href="https://cis-india.org/internet-governance/blog/conceptualizing-an-international-security-regime-for-cyberspace"&gt;&lt;em&gt;Conceptualizing      an International Security Architecture for cyberspace&lt;/em&gt;&lt;/a&gt;&lt;em&gt; &lt;/em&gt;(Briefings of the Global      Commission on the Stability of Cyberspace, Bratislava, Slovakia, May 2018)&lt;/li&gt;
&lt;li&gt;Sunil      Abraham, Mukta Batra, Geetha Hariharan, Swaraj Barooah, and Akriti      Bopanna,&lt;a href="https://cis-india.org/internet-governance/files/indias-contribution-to-internet-governance-debates"&gt; India's contribution to internet governance debates&lt;/a&gt; (NLUD Student Law Journal, 2018)&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;em&gt;&lt;br /&gt;Blog Posts and Op-eds&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Arindrajit Basu, Irene Poetranto, and Justin Lau, &lt;a href="https://carnegieendowment.org/2021/05/19/un-struggles-to-make-progress-on-securing-cyberspace-pub-84491"&gt;The UN struggles to make progress in cyberspace&lt;/a&gt;&lt;em&gt;, Carnegie Endowment for International Peace&lt;/em&gt;, May 19th, 2021&lt;/li&gt;
&lt;li&gt;Andre’ Barrinha and Arindrajit Basu, &lt;a href="https://directionsblog.eu/could-cyber-diplomacy-learn-from-outer-space/"&gt;Could cyber diplomacy learn from outer space&lt;/a&gt;, &lt;em&gt;EU Cyber Direct&lt;/em&gt;, 20th April 2021&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Pranesh Prakash&lt;strong&gt;, &lt;/strong&gt;&lt;a href="https://www.thehindu.com/opinion/lead/patching-the-gaps-in-indias-cybersecurity/article34000336.ece"&gt;Patching the gaps in India’s cybersecurity&lt;/a&gt;, &lt;em&gt;The Hindu, &lt;/em&gt;6th March 2021&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Karthik Nachiappan, &lt;a href="https://www.leidensecurityandglobalaffairs.nl/articles/will-india-negotiate-in-cyberspace"&gt;Will India negotiate in cyberspace?&lt;/a&gt;, Leiden Security and Global Affairs blog,December 16, 2020&lt;/li&gt;
&lt;li&gt;Elizabeth Dominic, &lt;a href="https://cis-india.org/internet-governance/blog/the-debate-over-internet-governance-and-cyber-crimes-west-vs-the-rest"&gt;The debate over internet governance and cybercrimes: West vs the rest?&lt;/a&gt;,&lt;em&gt; Centre for Internet and Society, &lt;/em&gt;June 08, 2020&lt;/li&gt;
&lt;li&gt;Arindrajit Basu, &lt;a href="https://www.lawfareblog.com/indias-role-global-cyber-policy-formulation"&gt;&lt;em&gt;India’s role in Global Cyber Policy Formulation&lt;/em&gt;&lt;/a&gt;&lt;em&gt;, Lawfare, Nov 7, 2019&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;Pukhraj Singh, &lt;a href="https://cis-india.org/internet-governance/blog/guest-post-before-cyber-norms-let2019s-talk-about-disanalogy-and-disintermediation"&gt;Before cyber norms,let's talk about disanalogy and disintermediation&lt;/a&gt;, &lt;em&gt;Centre for Internet and Society, &lt;/em&gt;Nov 15th, 2019&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Karan Saini, &lt;a href="https://mwi.usma.edu/setting-international-norms-cyber-conflict-hard-doesnt-mean-stop-trying/"&gt;Setting International Norms of Cyber Conflict is Hard, But that Doesn’t Mean that We Should Stop Trying&lt;/a&gt;&lt;em&gt;, Modern War Institute, &lt;/em&gt;30th Sept, 2019&lt;/li&gt;
&lt;li&gt;Arindrajit Basu, &lt;a href="https://www.orfonline.org/expert-speak/politics-by-other-means-fostering-positive-contestation-and-charting-red-lines-through-global-governance-in-cyberspace-56811/"&gt;&lt;em&gt;Politics by other means: Fostering positive contestation and charting red lines through global governance in cyberspace&lt;/em&gt;&lt;/a&gt;&lt;em&gt; (Digital Debates, &lt;/em&gt;Volume 6, 2019&lt;em&gt;)&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;Arindrajit Basu&lt;em&gt;, &lt;/em&gt;&lt;a href="https://thewire.in/trade/will-the-wto-finally-tackle-the-trump-card-of-national-security"&gt;Will the WTO Finally Tackle the ‘Trump’ Card of National Security?&lt;/a&gt;&lt;em&gt; (The Wire, &lt;/em&gt;8th May 2019&lt;em&gt;)&lt;/em&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;Policy Submissions&lt;/em&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Arindrajit Basu, &lt;a href="https://cis-india.org/internet-governance/blog/cis-comments-on-pre-draft-of-the-report-of-the-un-open-ended-working-group"&gt;CIS Submission to OEWG &lt;/a&gt;(Centre for Internet and Society, Policy      Submission, 2020)&lt;/li&gt;
&lt;li&gt;Aayush      Rathi, Ambika Tandon, Elonnai Hickok, and Arindrajit Basu. “&lt;a href="https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-cooperation"&gt;CIS Submission to UN High-Level Panel on Digital      Cooperation&lt;/a&gt;.” Policy submission. Centre for Internet and      Society, January 2019.&lt;/li&gt;
&lt;li&gt;Arindrajit      Basu,Gurshabad Grover, and Elonnai Hickok. “&lt;a href="https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation"&gt;Response to GCSC on Request for Consultation: Norm      Package Singapore&lt;/a&gt;.” Centre for Internet and Society, January      17, 2019.&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Elonnai Hickok. &lt;a href="https://cis-india.org/internet-governance/files/gcsc-response."&gt;Submission of Comments to the GCSC Definition of      ‘Stability of Cyberspace&lt;/a&gt; (Centre for Internet and Society,      September 6, 2019)&lt;/li&gt;&lt;/ol&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;h3&gt;Digital Trade and India's Political Economy&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;The modern trading regime and its institutions were born largely into a world bereft of the internet and its implications for cross-border flow and commerce. Therefore, regulatory ambitions at the WTO have played catch up with the technological innovation that has underpinned the modern global digital economy. Driven by tech giants, the “developed” world has sought to restrict the policy space available to the emerging world to impose mandates regarding data localisation, source code disclosure, and taxation - among other initiatives central to development. At the same time emerging economies have pushed back, making for a tussle that continues to this day. Our research has focussed both on issues of domestic political economy and data governance,and the implications these domestic issues have on how India and other emerging economies negotiate at the world stage.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Long-Form articles and essays&lt;/em&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Arindrajit Basu, Elonnai Hickok and Aditya Chawla,&lt;em&gt; &lt;/em&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-localisation-gambit-unpacking-policy-moves-for-the-sovereign-control-of-data-in-india"&gt;&lt;strong&gt;T&lt;/strong&gt;&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-localisation-gambit-unpacking-policy-moves-for-the-sovereign-control-of-data-in-india"&gt;he Localisation Gambit: Unpacking      policy moves for the sovereign control of data in India&lt;/a&gt;&lt;em&gt; (&lt;/em&gt;Centre for Internet and Society&lt;em&gt;, &lt;/em&gt;March 19, 2019)&lt;strong&gt;&lt;em&gt; &lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Arindrajit Basu,&lt;a href="about:blank"&gt;Sovereignty in a datafied world: A framework for      Indian diplomacy&lt;/a&gt; in Navdeep Suri and Malancha Chakrabarty (eds) &lt;em&gt;A 2030 Vision for India’s Economic      Diplomacy &lt;/em&gt;(Observer Research Foundation 2021) &lt;/li&gt;
&lt;li&gt;Amber Sinha, Elonnai Hickok, Udbhav Tiwari and      Arindrajit Basu, &lt;a href="https://cis-india.org/internet-governance/files/mlat-report"&gt;Cross Border Data-Sharing and India &lt;/a&gt;(Centre      for Internet and Society, 2018)&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;em&gt;Blog posts and op-eds &lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Arindrajit Basu,&lt;a class="external-link" href="http://www.hinrichfoundation.com/research/article/wto/can-the-wto-build-consensus-on-digital-trade/"&gt; Can the WTO build consensus on digital trade,&lt;/a&gt; Hinrich Foundation,October 05,2021&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Amber Sinha, &lt;a href="https://thewire.in/tech/twitter-modi-government-big-tech-new-it-rules"&gt;The power politics behind Twitter versus Government of India&lt;/a&gt;, &lt;em&gt;The Wire&lt;/em&gt;, June 03, 2021&lt;/li&gt;
&lt;li&gt;Karthik Nachiappan and Arindrajit Basu, &lt;a href="https://www.thehindu.com/opinion/op-ed/shaping-the-digital-world/article32224942.ece?homepage=true"&gt;Shaping the Digital World&lt;/a&gt;, &lt;em&gt;The Hindu&lt;/em&gt;, 30th July 2020&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Karthik Nachiappan, &lt;a href="https://www.india-seminar.com/2020/731/731_arindrajit_and_karthik.htm"&gt;&lt;em&gt;India and the global battle for data governance&lt;/em&gt;&lt;/a&gt;, Seminar 731, 1st July 2020&lt;/li&gt;
&lt;li&gt;Amber Sinha and Arindrajit Basu, &lt;a href="https://scroll.in/article/960676/analysis-reliance-jio-facebook-deal-highlights-indias-need-to-revisit-competition-regulations"&gt;Reliance Jio-Facebook deal highlights India’s need to revisit competition regulations&lt;/a&gt;, &lt;em&gt;Scroll&lt;/em&gt;, 30th April 2020&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Amber Sinha, &lt;a href="https://thediplomat.com/2020/04/the-realpolitik-of-the-reliance-jio-facebook-deal/"&gt;The realpolitik of the Reliance-Jio Facebook deal&lt;/a&gt;, &lt;em&gt;The Diplomat&lt;/em&gt;, 29th April 2020&lt;/li&gt;
&lt;li&gt;Arindrajit Basu, &lt;a href="https://thediplomat.com/2020/01/the-retreat-of-the-data-localization-brigade-india-indonesia-and-vietnam/"&gt;&lt;em&gt;The Retreat of the Data Localization Brigade: India, Indonesia, Vietnam&lt;/em&gt;&lt;/a&gt;&lt;em&gt;, The Diplomat&lt;/em&gt;, Jan 10, 2020&lt;/li&gt;
&lt;li&gt;Amber Sinha and Arindrajit Basu, &lt;a href="https://www.epw.in/engage/article/politics-indias-data-protection-ecosystem"&gt;&lt;em&gt;The Politics of India’s Data Protection Ecosystem&lt;/em&gt;&lt;/a&gt;, &lt;em&gt;EPW Engage&lt;/em&gt;, 27 Dec 2019&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Justin Sherman, &lt;a href="https://www.lawfareblog.com/key-global-takeaways-indias-revised-personal-data-protection-bill"&gt;Key Global Takeaways from India’s Revised Personal Data Protection Bill&lt;/a&gt;, &lt;em&gt;Lawfare&lt;/em&gt;, Jan 23, 2020&lt;/li&gt;
&lt;li&gt;Nikhil Dave,“&lt;a href="https://cis-india.org/internet-governance/geo-economic-impacts-of-the-coronavirus-global-supply-chains-part-i"&gt;Geo-Economic Impacts of the Coronavirus: Global Supply Chains&lt;/a&gt;.” &lt;em&gt;Centre for Internet and Society&lt;/em&gt; , June 16, 2020.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;International Law and Human Rights&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;International law and human rights are ostensibly technology neutral, and should lay the edifice for digital governance and cybersecurity today. Our research on international human rights has focussed on global surveillance practices and other internet restrictions employed by a variety of nations, and the implications this has for citizens and communities in India and similarly placed emerging economies. CIS researchers have also contributed to, and commented on World Intellectual Property Organization negotiations at the intersection of international Intellectual Property (IP) rules and the human rights.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Long-form article&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt; &lt;/em&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Arindrajit Basu, &lt;a href="https://cis-india.org/internet-governance/extra-territorial-surveillance-and-the-incapacitation-of-human-rights"&gt;Extra Territorial Surveillance      and the incapacitation of international human rights law&lt;/a&gt;, 12 NUJS LAW REVIEW 2 (2019)&lt;/li&gt;
&lt;li&gt;Gurshabad Grover and Arindrajit Basu, ”&lt;a href="https://cyberlaw.ccdcoe.org/wiki/Scenario_24:_Internet_blockage"&gt;Internet Blockage&lt;/a&gt;”(Scenario contribution to NATO CCDCOE Cyber      Law Toolkit,2021)&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Elonnai Hickok, &lt;a href="https://www.ijlt.in/journal/conceptualizing-an-international-framework-for-active-private-cyber-defence"&gt;Conceptualizing an international      framework for active private cyber defence &lt;/a&gt;(Indian Journal of Law and Technology, 2020)&lt;/li&gt;&lt;li&gt;Arindrajit Basu,&lt;a class="external-link" href="http://www.orfonline.org/wp-content/uploads/2021/10/Digital-Debates__CyFy2021.pdf"&gt;Challenging the dogmatic inevitability of extraterritorial state surveillance &lt;/a&gt;in Trisha Ray and Rajeswari Pillai Rajagopalan (eds) Digital Debates: CyFy Journal 2021 (New Delhi:ORF and Global Policy Journal,2021)&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;em&gt;Blog Posts and op-eds&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Arindrajit Basu, “&lt;a href="https://www.medianama.com/2020/08/223-american-law-on-mass-surveillance-post-schrems-ii/"&gt;Unpacking US Law And Practice On Extraterritorial Mass Surveillance In Light Of Schrems II&lt;/a&gt;”, &lt;em&gt;Medianama&lt;/em&gt;, 24th August 2020&lt;/li&gt;
&lt;li&gt;Anubha Sinha, “World Intellectual Property Organisation: Notes from the Standing Committee on Copyright Negotiations (&lt;a href="https://cis-india.org/a2k/blogs/wipo-sccr-41-notes-from-day-1"&gt;Day 1&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blogs/wipo-sccr-41-notes-from-day-2"&gt;Day 2&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blogs/wipo-sccr-41-notes-from-day-3-and-day-4-1"&gt;Day 3 and 4&lt;/a&gt;)”, July 2021&lt;/li&gt;&lt;li&gt;Raghav Ahooja and Torsha Sarkar,&lt;a class="external-link" href="http://www.lawfareblog.com/how-not-regulate-internet-lessons-indian-subcontinent"&gt;How (not) to regulate the internet:Lessons from the Indian Subcontinent&lt;/a&gt;,Lawfare,September 23,2021,&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Bilateral Relationships&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Technology has become a crucial factor in shaping bilateral and plurilateral co-operation and competition. Given the geopolitical fissures and opportunities since 2020, our research has focussed on how technology governance and cybersecurity could impact the larger ecosystem of Indo-China and India-US relations. Going forward, we hope to undertake more research on technology in plurilateral arrangements, including the Quadrilateral Security Dialogue. &lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Arindrajit Basu and Justin Sherman, &lt;a href="https://thediplomat.com/2021/03/the-huawei-factor-in-us-india-relations/"&gt;The Huawei Factor in US-India Relations&lt;/a&gt;,&lt;em&gt;The Diplomat&lt;/em&gt;, 22 March 2021&lt;/li&gt;
&lt;li&gt;Aman Nair, “&lt;a href="https://cis-india.org/internet-governance/blog/tiktok-it2019s-time-for-biden-to-make-a-decision-on-his-digital-policy-with-china"&gt;TIkTok: It’s Time for Biden to Make a Decision on His Digital Policy with China&lt;/a&gt;,” &lt;em&gt;Centre for Internet and Society&lt;/em&gt;, January 22, 2021,&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Gurshabad Grover, &lt;a href="https://thediplomat.com/2020/10/india-needs-a-digital-lawfare-strategy-to-counter-china/"&gt;India Needs a Digital Lawfare Strategy to Counter China&lt;/a&gt;, &lt;em&gt;The Diplomat&lt;/em&gt;, 8th October 2020&lt;/li&gt;
&lt;li&gt;Anam Ajmal, &lt;a href="https://timesofindia.indiatimes.com/blogs/toi-edit-page/the-app-ban-will-have-an-impact-on-the-holding-companies-global-power-projection-begins-at-home/"&gt;The app ban will have an impact on the holding companies...global power projection begins at home&lt;/a&gt;, &lt;em&gt;Times of India&lt;/em&gt;, July 7th, 2020 (Interview with Arindrajit Basu)&lt;/li&gt;
&lt;li&gt;Justin Sherman and Arindrajit Basu, &lt;a href="https://thediplomat.com/2020/03/trump-and-modi-embrace-but-remain-digitally-divided/"&gt;Trump and Modi embrace, but remain digitally divided&lt;/a&gt;, &lt;em&gt;The Diplomat&lt;/em&gt;, March 05th, 2020&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Emerging Technologies&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Governance needs to keep pace with the technological challenges posed by emerging technologies, including 5G and AI. To do so an interdisciplinary approach that evaluates these scientific advances in line with the regimes that govern them is of utmost importance. While each country will need to regulate technology through the lens of their strategic interests and public policy priorities, it is clear that geopolitical tensions on standard-setting and governance models compels a more global outlook.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Long-Form reports&lt;/em&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Anoushka Soni and Elizabeth Dominic,&lt;a href="https://cis-india.org/internet-governance/legal-and-policy-implications-of-autonomous-weapons-systems"&gt; Legal and Policy implications of Autonomous weapons systems&lt;/a&gt; (Centre for Internet and Society, 2020)&lt;/li&gt;
&lt;li&gt;Aayush Rathi, Gurshabad Grover, and Sunil Abraham,&lt;a href="https://cis-india.org/internet-governance/blog/regulating-the-internet-the-government-of-india-standards-development-at-the-ietf"&gt; Regulating the internet: The Government of India &amp;amp; Standards Development at the IETF&lt;/a&gt; (Centre for Internet and Society, 2018)&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;em&gt;Blog posts and op-eds&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Aman Nair, &lt;a href="https://cis-india.org/internet-governance/blog/would-banning-chinese-telecom-companies-make-5g-secure-in-india"&gt;Would banning Chinese telecom companies make India 5G secure in India?&lt;/a&gt; &lt;em&gt;Centre for Internet and Society&lt;/em&gt;, 22nd December 2020&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Justin Sherman&lt;strong&gt;, &lt;/strong&gt;&lt;a href="https://www.lawfareblog.com/two-new-democratic-coalitions-5g-and-ai-technologies"&gt;Two New Democratic Coalitions on 5G and AI Technologies&lt;/a&gt;, &lt;em&gt;Lawfare&lt;/em&gt;, 6th August 2020&lt;/li&gt;
&lt;li&gt;Nikhil Dave, &lt;a href="https://cis-india.org/internet-governance/blog/the-5g-factor."&gt;The 5G Factor: A Primer&lt;/a&gt;, &lt;em&gt;Centre for Internet and Society,&lt;/em&gt; July 20, 2020.&lt;/li&gt;
&lt;li&gt;Gurshabad Grover, &lt;a href="https://indianexpress.com/article/opinion/columns/huawei-ban-india-united-states-china-5755232/"&gt;The Huawei bogey&lt;/a&gt; &lt;em&gt;Indian Express&lt;/em&gt;, May 30th, 2019&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Pranav MB, &lt;a href="https://cis-india.org/internet-governance/blog/what-is-the-problem-with-2018ethical-ai2019-an-indian-perspective"&gt;What is the problem with 'Ethical AI'?:An Indian perspective&lt;/a&gt;, Centre for Internet and Society, July 21, 2019&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt; &lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;(This compendium was drafted by Arindrajit Basu with contributions from Anubha Sinha. Aman Nair, Gurshabad Grover, and&amp;nbsp; Pranav MB reviewed the draft and provided vital insight towards its conceptualization and compilation&lt;/em&gt;. Dishani Mondal and Anand Badola provided important inputs at earlier stages of the process towards creating this compendium)&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/arindrajit-basu-september-24-2021-the-geopolitics-of-cyberspace-compendium-of-cis-research'&gt;https://cis-india.org/internet-governance/blog/arindrajit-basu-september-24-2021-the-geopolitics-of-cyberspace-compendium-of-cis-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>arindrajit</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    

   <dc:date>2021-11-15T14:48:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/rbi-ban-on-cryptocurrencies-not-backed-by-any-data-or-statistics">
    <title>RBI Ban on Cryptocurrencies not backed by any data or statistics</title>
    <link>https://cis-india.org/internet-governance/blog/rbi-ban-on-cryptocurrencies-not-backed-by-any-data-or-statistics</link>
    <description>
        &lt;b&gt;In March 2020, the Supreme Court of India quashed the RBI order passed in 2018 that banned financial services firms from trading in virtual currency or cryptocurrency.
Keeping this policy window in mind, the Centre for Internet &amp; Society will be releasing a series of blog posts and policy briefs on cryptocurrency regulation in India
&lt;/b&gt;
        
&lt;p id="docs-internal-guid-9ddef591-7fff-b8f5-3c20-c4a78d53d066" style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;On April 6, 2018 &lt;a href="https://www.rbi.org.in/Scripts/NotificationUser.aspx?Id=11243&amp;amp;Mode=0"&gt;the RBI issued a circular&lt;/a&gt; preventing all Commercial and Co-operative Banks, Payments Banks, Small Finance Banks, NBFCs, and Payment System Providers not only from dealing in virtual currencies themselves but also directing them to stop providing services to all entities which deal with virtual currencies. The RBI had issued a Press Release cautioning the public against dealing in virtual currencies including Bitcoin in 2013. However, the growing popularity of cryptocurrencies and its adoption by large numbers of Indian users, may have been the reason which forced the RBI to issue another Press Release in February 2017 reiterating its earlier concerns regarding cryptocurrencies raised in its earlier circular of 2013. In December 2017 both the RBI as well as the Ministry of Finance issued Press Releases cautioning the general public about the dangers and risks associated with cryptocurrencies, finally culminating in the circular dated April 6, 2018 banning financial institutions from dealing with cryptocurrency traders. As a result of this circular the operations of cryptocurrency exchanges took a severe hit and the number of transactions on these exchanges reduced substantially. The cryptocurrency market in India all but disappeared with only a few extremely determined enthusiasts still dealing in cryptocurrencies, at the risk of potentially depriving themselves of banking services altogether.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The RBI circular was challenged in the Supreme Court by the Internet and Mobile Association of India; final arguments in the case were concluded only in the last week of January, 2020 with the judgment of the Supreme Court being awaited. Generally speaking, whenever such policy decisions of the executive branch are challenged in the courts, a well accepted defense for the executive authorities, specifically in highly complicated fields such as finance, etc. is that the decision was taken by an expert body using its expertise in the field. The basic rationale underlying this argument is that the authority has relied on verifiable data and used its expertise to analyse the same in order to arrive at its decision.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;However, it appears from the response by the RBI to an RTI query by Centre for Internet and Society, that requested the RBI for a copy of all reports, papers, opinions and advice that was relied upon for issuing the April 6, 2018 circular, that the RBI has not relied upon any such data to come to a conclusion that banking services should be denied to all those entities dealing in cryptocurrencies. It appears from the response to the RTI query that it was the RBI’s own previous circulars and press releases which formed the basis for the April 6, 2018 circular. This response completely undermines the argument that the decision by the RBI was taken after an analysis of all the facts and statistics concerned with cryptocurrency trading.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Not only does the RTI response weaken the commonly accepted defense of an expert body making a well-reasoned decision, but it also strengthens another legal ground for challenging the decision of the RBI, viz. arbitrariness. One of the grounds on which executive decisions can be challenged is that the decision was made without taking into account relevant material and without the application of mind. The admission by the RBI in its RTI response that there is no material relied upon by the RBI, except its own previous Press Releases, only strengthens the argument that the decision was made in an arbitrary manner.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Such an admission by the RBI regarding the process followed before issuing the April 6, 2018 circular reduces the credibility of the decision itself. However it remains to be seen whether the Supreme Court of India agrees with the arguments of the petitioners challenging the April 6, 2018 circular, even though the petitioners may not have been able to produce this RTI response from the RBI to further bolster their case.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/rbi-ban-on-cryptocurrencies-not-backed-by-any-data-or-statistics'&gt;https://cis-india.org/internet-governance/blog/rbi-ban-on-cryptocurrencies-not-backed-by-any-data-or-statistics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Bitcoin</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cryptocurrencies</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    

   <dc:date>2020-03-05T18:35:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cryptocurrency-regulation-in-india-2013-a-brief-history">
    <title>Cryptocurrency Regulation in India – A brief history</title>
    <link>https://cis-india.org/internet-governance/blog/cryptocurrency-regulation-in-india-2013-a-brief-history</link>
    <description>
        &lt;b&gt;In March 2020, the Supreme Court of India quashed the RBI order passed in 2018 that banned financial services firms from trading in virtual currency or cryptocurrency.
Keeping this policy window in mind, the Centre for Internet &amp; Society will be releasing a series of blog posts and policy briefs on cryptocurrency regulation in India
&lt;/b&gt;
        
&lt;p id="docs-internal-guid-18286fb9-7fff-c656-6a5b-a01a2e2b3682" style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The story of cryptocurrencies 
started in 2008 when a paper titled “Bitcoin: A Peer to Peer Electronic 
Cash System” was published by a single or group of pseudonymous 
developer(s) by the name of Satoshi Nakamoto. The actual network took 
some time to start with the first transactions taking place only in 
January 2009. The first actual sale of an item using Bitcoin took place a
 year later with a user swapping 10,000 Bitcoin for two pizzas in 2010, 
which attached a cash value to the cryptocurrency for the first time. By
 2011 other cryptocurrencies began to emerge, with Litecoin, Namecoin 
and Swiftcoin all making their debut. Meanwhile, Bitcoin the 
cryptocurrency that started it all started getting criticised after 
claims emerged that it was being used on the so-called “dark web”, 
particularly on sites such as Silk Road as a means of payment for 
illegal transactions. Over the next five years cryptocurrencies steadily
 gained traction with increased number of transactions and the price of 
Bitcoin, the most popular cryptocurrency shot up from around 5 Dollars 
in the beginning of 2012 to almost 1000 Dollars at the end of 2017.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Riding on the back of this 
wave of popularity, a number of cryptocurrency exchanges started 
operating in India between 2012 and 2017 providing much needed depth and
 volume to the Indian cryptocurrency market. These included popular 
exchanges such as Zebpay, Coinsecure, Unocoin, Koinex, Pocket Bits and 
Bitxoxo. With the price of cryptocurrencies shooting up and because of 
its increased popularity and adoption by users outside of its 
traditional cult following, regulators worldwide began to take notice of
 this new technology; in India the RBI issued a Press Release cautioning
 the public against dealing in virtual currencies including Bitcoin way 
back in 2013. However, the transaction volumes and adoption of 
cryptocurrencies in India really picked up in earnest only after the 
demonetisation of high value currency notes in November of 2016, with 
the government’s emphasis on digital payments leading to alternatives to
 traditional online banking such as cryptocurrencies forcing their way 
into the public consciousness. Indian cryptocurrency exchanges started 
acquiring users at a much higher pace which drove up volume for 
cryptocurrency transactions on all Indian exchanges. The growing 
popularity of cryptocurrencies and its adoption by large numbers of 
Indian users forced the RBI to issue another Press Release in February 
2017 reiterating its concerns regarding cryptocurrencies raised in its 
earlier Press Release of 2013.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In October and November, 2017 
two Public Interest Petitions were filed in the Supreme Court of India, 
one by Siddharth Dalmia and another by Dwaipayan Bhowmick, the former 
asking the Supreme Court to restrict the sale and purchase of 
cryptocurrencies in India, and the latter asking for cryptocurrencies in
 India to be regulated. Both the petitions are currently pending in the 
Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In November, 2017 the 
Government of India constituted a high level Inter-ministerial Committee
 under the chairmanship of Shri Subhash Chandra Garg, Secretary, 
Department of Economic Affairs, Ministry of Finance and comprising of 
Shri Ajay Prakash Sawhney (Secretary, Ministry of Electronics and 
Information Technology), Shri Ajay Tyagi (Chairman, Securities and 
Exchange Board of India) and Shri B.P. Kanungo (Deputy Governor, Reserve
 Bank of India). The mandate of the Committee was to study various 
issues pertaining to Virtual Currencies and to propose specific actions 
that may be taken in relation thereto. This Committee submitted its 
report in July of 2019 recommending a ban on private cryptocurrencies in
 India.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In December 2017 both the RBI 
as well as the Ministry of Finance issued Press releases cautioning the 
general public about the dangers and risks associated with 
cryptocurrencies, with the Ministry of Finance Press Release saying that
 cryptocurrencies are like ponzi schemes and also declaring that they 
are not currencies or coins. It should be mentioned here that till the 
end of March 2018, the RBI and the Finance Ministry had issued various 
Press Releases on cryptocurrencies cautioning people against their 
risks, however none of them ever took any legal action or gave any 
enforceable directions against cryptocurrencies. All of this changed 
with the RBI circular dated April 6, 2018 whereby the RBI prevented 
Commercial and Co-operative Banks, Payments Banks, Small Finance Banks, 
NBFCs, and Payment System Providers not only from dealing in virtual 
currencies themselves but also directing them to stop providing services
 to all entities which deal with virtual currencies.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The effect of the circular was
 that cryptocurrency exchanges, which relied on normal banking channels 
for sending and receiving money to and from their users, could not 
access any banking services within India. This essentially crippled 
their business operations since converting cash to cryptocurrencies and 
vice versa was an essential part of their operations. Even pure 
cryptocurrency exchanges which did not deal in fiat currency, were 
unable to carry out their regular operations such as paying for office 
space, staff salaries, server space, vendor payments, etc. without 
access to banking services.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As a the operations of cryptocurrency exchanges took a severe hit and
 the number of transactions on these exchanges reduced substantially. 
People who had bought cryptocurrencies on these exchanges as an 
investment were forced to sell their crypto assets and cash out before 
they lost access to banking facilities. The cryptocurrency exchanges 
themselves found it hard to sustain operations in the face of the dual 
hit of reduced transaction volumes and loss of access banking services. 
Faced with such an existential threat, a number of exchanges who were 
members of the Internet and Mobile Association of India (IMAI), filed a 
writ petition in the Supreme Court on May 15, 2018 titled Internet and 
Mobile Association of India v. Reserve Bank of India, the final 
arguments in which were heard by the Supreme Court of India in January, 
2020 and the judgment is awaited. If the Supreme Court agrees with the 
arguments of the petitioners, then cryptocurrency exchanges would be 
able to restart operations in India; as a result the cryptocurrency 
ecosystem in India may be revived and cryptocurrencies may become a 
viable investment alternative again.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cryptocurrency-regulation-in-india-2013-a-brief-history'&gt;https://cis-india.org/internet-governance/blog/cryptocurrency-regulation-in-india-2013-a-brief-history&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Bitcoin</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cryptocurrencies</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    

   <dc:date>2020-03-05T18:36:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward">
    <title>Automated Facial Recognition Systems and the Mosaic Theory of Privacy: The Way Forward</title>
    <link>https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward</link>
    <description>
        &lt;b&gt; Arindrajit Basu and Siddharth Sonkar have co-written this blog as the third of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems? &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Mosaic Theory of Privacy&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Whether the data collected by the AFRS should be treated similar to 
face photographs taken for the purposes of ABBA is not clear in the 
absence of judicial opinion. The AFRS would ordinarily collect 
significantly more data than facial photographs during authentication. 
This can be explained with the help of the &lt;em&gt;&lt;a href="https://www.lawfareblog.com/defense-mosaic-theory" rel="noreferrer noopener" target="_blank"&gt;mosaic theory of privacy&lt;/a&gt;&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;The mosaic theory of privacy suggests that data collected for long 
durations of an individual can be qualitatively different from single 
instances of observation. It argues that aggregating data from different
 instances can create a picture of an individual which affects her 
reasonable expectation of privacy. This is because a mere slice of 
information reveals a lot less if the same is contextualised in a broad 
pattern — a mosaic.&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/p&gt;
&lt;p&gt;The mosaic theory of privacy does not find explicit reference in 
Puttaswamy II. The petitioners had argued that seeding of Aadhaar data 
into existing databases would bridge information across silos so as to 
make real time surveillance possible. This is because information when 
integrated from different silos becomes more than the sum of its parts.&lt;/p&gt;
&lt;p&gt;The Court, however, dismissed this argument, accepting UIDAI’s 
submission that the data collected remains in different silos and 
merging is not permitted within the Aadhaar framework. Therefore, the 
Court did not examine whether it is constitutionally permissible to 
integrate data from different silos; it simply rejected the possibility 
of surveillance as a result of Aadhaar authentication.&lt;/p&gt;
&lt;p&gt;Jurisprudence in other jurisdictions is more advanced. In&amp;nbsp;&lt;em&gt;United States v. Jones&lt;/em&gt;,
 the United States Supreme Court&amp;nbsp;had observed that the insertion of a 
global positioning system into Antoine Jones’ Jeep in the absence of a 
warrant and without his consent invaded his privacy, entitling him to 
Fourth Amendment Protection. In this case, the movement of Jones’ 
vehicle was monitored for a period of twenty-eight days. Five concurring
 opinions in Jones acknowledges that aggregated and extensive 
surveillance is capable of violating the reasonable expectation of 
privacy irrespective of whether or not surveillance has taken place in 
public.&lt;/p&gt;
&lt;p&gt;The Court distinguished between prolonged surveillance and short term
 surveillance. Surveillance in the short run does not reveal what a 
person repeatedly does, as opposed to sustained surveillance which can 
reveal significantly more about a person. The Court takes the example of
 how a sequence of trips to a bar, a bookie, a gym or a church can tell a
 lot more about a person than the story of any single visit viewed in 
isolation.&lt;/p&gt;
&lt;p&gt;Most recently, in&lt;a href="https://www.supremecourt.gov/opinions/17pdf/16-402_h315.pdf" rel="noreferrer noopener" target="_blank"&gt; &lt;em&gt;Carpenter v. United States&lt;/em&gt;&lt;/a&gt;,
 the Supreme Court of the United States held that the collection of&amp;nbsp; 
historical cell data by the government&amp;nbsp; exposes the physical movements 
of an individual to potential surveillance, and an individual holds a 
reasonable expectation of privacy against such&amp;nbsp; collection. The Court 
admitted that historical-cell site information allows the government to 
go back in time in order to retract the exact whereabouts of a person.&lt;/p&gt;
&lt;p&gt;Judicial decisions have not addressed specifically whether facial 
recognition through law enforcement constitutes a search under the 
Fourth Amendment or a “mere visual observation”.&lt;/p&gt;
&lt;p&gt;The common thread linking CCTV footages and cellular data is the 
unique ability to track the movement of an individual from one place to 
another, enabling extreme forms of surveillance. It is perhaps this 
crucial link that would make ARFS-enabled CCTVs prejudicial to 
individual privacy.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;The mosaic theory as understood in &lt;em&gt;Carpenter&lt;/em&gt; helps one 
understand the extent to which an AFRS can augment the capacities of law
 enforcement in India. This in turn can help in understanding whether it
 is constitutionally permissible to install such systems&amp;nbsp;across the 
country.&lt;/p&gt;
&lt;p&gt;AFRS enabled-CCTV footages from different CCTVs. if viewed in 
conjunction could reveal a sequence of movements of an individual, 
enabling long-term surveillance of a nature that is qualitatively 
distinct from isolated observances observed across unrelated CCTV 
footages.&lt;/p&gt;
&lt;p&gt;Subsequent to &lt;em&gt;Carpenter&lt;/em&gt;, &lt;a href="https://www.lawfareblog.com/four-months-later-how-are-courts-interpreting-carpenter" rel="noreferrer noopener" target="_blank"&gt;federal district courts&lt;/a&gt;
 in the United States have declined to apply Carpenter to video 
surveillance cases since the judgement did not “call into question 
conventional surveillance techniques and tools, such as security 
cameras.”&lt;/p&gt;
&lt;p&gt;The extent of processing that an AFRS-enabled CCTV exposes an 
individual to would be significantly greater. This is because every time
 an individual is in the zone of a AFRS-enabled CCTV, the facial image 
will be compared to a common database. Snippets from different CCTVs 
capturing the individual’s physical presence in two different locations 
may not be meaningful per se. When observed together, the AFRS will make
 it possible to identify the individual’s movement from one place to 
another.&lt;/p&gt;
&lt;p&gt;For instance, the AFRS will be able to identify the person when they 
are on Street A at a particular time and when they are Street B in the 
immediately subsequent hour recorded by respective CCTV cameras, 
indicating the person’s physical movement from A to B. While a CCTV 
camera only records movement of an individual in video format, AFRS 
translates that digital information into individualised data with the 
help of a comparison of facial features with a pre-existing database.&lt;/p&gt;
&lt;p&gt;Through data aggregation, which appears to be the aim of the Indian 
government&amp;nbsp;in their tender that links three databases, it is apparent 
that the right to privacy is in danger. Yet,&amp;nbsp;at present, there does not 
exist any case law or legislation that can render such&amp;nbsp;efforts illegal 
at this juncture.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Conclusions and The Way Forward&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Despite a lack of judicial recognition of the potential 
unconstitutionality of deploying&amp;nbsp;AFRS, it is clear that the introduction
 of these systems pose a clear and present danger to civil rights and 
human dignity. Algorithmic surveillance alters a human being’s life in 
ways that even the subject of this surveillance cannot fully comprehend.
 As an individual’s data is manipulated and aggregated to derive&amp;nbsp;a 
pattern about that individual’s world, the individual or his data no 
longer exists for itself&lt;sup&gt; &lt;/sup&gt;but are massaged into various categories.&lt;/p&gt;
&lt;p&gt;Louis Amoore terms this a ‘&lt;a href="https://journals.sagepub.com/doi/abs/10.1177/0263276411417430?journalCode=tcsa" rel="noreferrer noopener" target="_blank"&gt;data-derivative&lt;/a&gt;’,
 which is an abstract conglomeration of data that continuously shapes 
our futures without us having a say in their framing. The branding of an
 individual as a criminal and then aggregating their data causes 
emotional distress as individuals move about in fear of the state gaze 
and their association with activities that are branded as potentially 
dangerous — thereby suppressing a right to dissent — as exemplified by 
their use reported use during the recent protests in Hong Kong.&lt;/p&gt;
&lt;p&gt;Case law both in India and abroad has clearly suggested that a right 
to privacy is contextual and is not surrendered merely because an 
individual is in a public place. However, the jurisprudence protecting 
public photography or videography under the umbrella of privacy remains 
less clear globally and non-existent in India.&lt;/p&gt;
&lt;p&gt;The mosaic theory of privacy is useful in this regard as it prevents 
mass ‘data-veillance’ of individual behaviour and accurately identifies 
the unique power that the volume, velocity and variety of Big Data 
provides to the state. Therefore, it is imperative that the judiciary 
recognise safeguards from data aggregation as an essential component of a
 reasonable expectation of privacy. At the same time, legislation could 
also provide the required safeguards.&lt;/p&gt;
&lt;p&gt;In the US, Senators Coons and Lee recently introduced a draft Bill titled ‘&lt;a href="https://www.coons.senate.gov/imo/media/doc/ALB19A70.pdf" rel="noreferrer noopener" target="_blank"&gt;The Facial Recognition Technology Warrant Act of 2019’&lt;/a&gt;.
 The Bill aims to impose reasonable restrictions on the use of facial 
recognition technology by law enforcement. The Bill creates safeguards 
against sustained tracking of physical movements of an individual in 
public spaces. The Bill terms such tracking ‘ongoing surveillance’ when 
it occurs for over a period of 72 hours in real time or through 
application of technology to historical records. The Bill requires that 
ongoing surveillance only be conducted for law enforcement purposes &lt;em&gt;and&lt;/em&gt; in pursuance of a Court Order (unless it is impractical to do so).&lt;/p&gt;
&lt;p&gt;While the Bill has its textual problems, it is definitely worth 
considering as a model going forward and ensure that AFR systems are 
deployed in line with a rights-respecting reading of a reasonable 
expectation of privacy.&amp;nbsp; &lt;a href="http://datagovernance.org/report/adoption-and-regulation-of-facial-recognition-technologies-in-india" rel="noreferrer noopener" target="_blank"&gt;Parsheera&lt;/a&gt;
 suggests that the legislation should narrow tailoring of the objects 
and purposes for deployment of AFRS, restrictions on the person whose 
images may be scanned from the databases, judicial approval for its use 
on a case by case basis and effective mechanisms of oversight, analysis 
and verification.&lt;/p&gt;
&lt;p&gt;Appropriate legal intervention is crucial. A failure to implement 
this effectively jeopardizes the expression of our true selves and the 
core tenets of our democracy.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward'&gt;https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu, Siddharth Sonkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-01-02T14:12:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns">
    <title>Automated Facial Recognition Systems (AFRS): Responding to Related Privacy Concerns</title>
    <link>https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns</link>
    <description>
        &lt;b&gt;Arindrajit Basu and Siddharth Sonkar have co-written this blog as the second of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems? &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Supreme Court of India, in &lt;a href="https://indiankanoon.org/doc/91938676/"&gt;Puttaswamy I&lt;/a&gt;&lt;em&gt; &lt;/em&gt;recognized&lt;em&gt;&amp;nbsp;&lt;/em&gt;that
 the right to privacy is not surrendered merely because the individual 
is in a public place. Privacy is linked to the individual as it is an 
essential facet of human dignity. Justice Chelameswar further clarified 
that privacy is contextual. Even in a public setting, people trying to 
converse in whispers would signal a claim to the right to privacy. 
Speaking on a loudspeaker would naturally not signal the same claim.&lt;/p&gt;
&lt;p&gt;The Supreme Court of Canada has also affirmed the notion of 
contextual privacy. As recently as on 7 March, 2019, the Supreme Court 
of Canada &lt;a href="http://www.thecourt.ca/r-v-jarvis-carving-out-a-contextual-approach-to-privacy/" rel="noreferrer noopener" target="_blank"&gt;in a landmark decision&lt;/a&gt; defined privacy rights in public areas implicitly applying &lt;a href="https://crypto.stanford.edu/portia/papers/RevnissenbaumDTP31.pdf"&gt;Helena Nissenbaum’s theory of contextual integrity&lt;/a&gt;.
 Helena Nissenbaum explains that the extent to which the right to 
privacy is eroded in public spaces with the help of her theory of 
contextual integrity.&lt;/p&gt;
&lt;p&gt;Nissenbaum suggests that labelling information as exclusively public 
or private fails to take into account the context which rationalises the
 desire of the individual to exercise her privacy in public. To explain 
this with an illustration, there exists a reasonable expectation of 
privacy in the restroom of a restaurant, even though it is in a public 
space.&lt;/p&gt;
&lt;p&gt;In &lt;a href="http://www.thecourt.ca/r-v-jarvis-carving-out-a-contextual-approach-to-privacy/"&gt;&lt;em&gt;R v Jarvis&lt;/em&gt;&lt;/a&gt; (Jarvis), the Court overruled a Court of Appeal for Ontario &lt;a href="https://www.canlii.org/en/on/onca/doc/2017/2017onca778/2017onca778.pdf"&gt;decision&lt;/a&gt;
 to hold that people can have a reasonable expectation of privacy even 
in public spaces. In this case, Jarvis was charged with the offence of 
voyeurism for secretly recording his students. The primary issue that 
the&amp;nbsp; Supreme Court of Canada was concerned with was whether the students
 filmed by Mr. Jarvis enjoyed a reasonable expectation of privacy at 
their school.&lt;/p&gt;
&lt;p&gt;The Court in this case unanimously held that students did indeed have
 a reasonable expectation of privacy.&amp;nbsp; The Court concluded nine 
contextual factors relevant in determining whether a person has a 
reasonable expectation to privacy would arise. The listed factors were:&lt;/p&gt;
&lt;p&gt;“1. The location the person was in when he or she was observed or recorded,&lt;/p&gt;
&lt;p&gt;2. The nature of the impugned conduct (whether it consisted of observation or recording),&lt;/p&gt;
&lt;p&gt;3. Awareness of or consent to potential observation or recording,&lt;/p&gt;
&lt;p&gt;4. The manner in which the observation or recording was done,&lt;/p&gt;
&lt;p&gt;5. The subject matter or content of the observation or recording,&lt;/p&gt;
&lt;p&gt;6. Any rules, regulations or policies that governed the observation or recording in question,&lt;/p&gt;
&lt;p&gt;7. The relationship between the person who was observed or recorded and the person who did the observing or recording,&lt;/p&gt;
&lt;p&gt;8. The purpose for which the observation or recording was done, and&lt;/p&gt;
&lt;p&gt;9. The personal attributes of the person who was observed or recorded.” (paragraph 29 of the judgement).&lt;/p&gt;
&lt;p&gt;The Court emphasized that the factors are not an exhaustive list, but
 rather were meant to be a guiding tool in determining whether a 
reasonable expectation of privacy existed in a given context. It is not 
necessary that each of these factors is present in a given situation to 
give rise to an expectation of privacy.&lt;/p&gt;
&lt;p&gt;Compared to the above-mentioned factors in Jarvis, the Indian Supreme Court in &lt;a href="https://indiankanoon.org/doc/127517806/"&gt;Justice K.S Puttaswamy (Retd.) v. Union of India&lt;/a&gt;: Justice Sikri (Puttaswamy II) &lt;strong&gt;—&lt;/strong&gt;
 the case which upheld the constitutionality of the Aadhaar project 
relied on the following factors to determine a reasonable expectation of
 privacy in a given context:&lt;/p&gt;
&lt;p&gt;“(i) What is the context in which a privacy claim is set up?&lt;/p&gt;
&lt;p&gt;(ii) Does the claim relate to private or family life, or a confidential relationship?&lt;/p&gt;
&lt;p&gt;(iii) Is the claim a serious one or is it trivial?&lt;/p&gt;
&lt;p&gt;(iv) Is the disclosure likely to result in any serious or significant injury and the nature and extent of disclosure?&lt;/p&gt;
&lt;p&gt;(v) Is disclosure relates to personal and sensitive information of an identified person?&lt;/p&gt;
&lt;p&gt;(vi) Does disclosure relate to information already disclosed publicly? If so, its implication?”&lt;/p&gt;
&lt;p&gt;These factors (acknowledged in Puttaswamy II in paragraph 292) seem 
to be very similar to the ones laid down in Jarvis, i.e., there is a 
strong reliance on the context in both cases. While there is no explicit
 mention of individual attributes of the individual claiming a 
reasonable expectation, the holding that children should be given an opt
 out indicates that the Court implicitly takes into account personal 
attributes (e.g. age) as well.&lt;/p&gt;
&lt;p&gt;The Court in Jarvis further (in paragraph 39) took the example of a 
woman in a communal change room at a public pool. She may expect other 
users to incidentally observe her undress but she would continue to 
expect only other women in the change room to observe her and reserve 
her rights against the general public. She would also expect not to be 
video recorded or photographed while undressing, both from other users 
of the pool and by the general public.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;If it is later found out that the change room had a one-way glass 
which allowed the pool staff to view the users change — or if there was a
 concealed camera recording persons while they were changing, she could 
claim a breach of her reasonable expectation of privacy under such 
circumstances and it would constitute an invasion of privacy.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;So, in the context of an AFRS, an individual walking down a 
public road may still signal that they wish to avail of their right to 
privacy. In such contexts, a concerted surveillance mechanism may come 
up against constitutional&amp;nbsp; roadblocks.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is the nature of information being collected?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The second big question &lt;strong&gt;—&lt;/strong&gt; the nature of information 
which is being collected plays a role in determining the extent to which
 a person can exercise their reasonable expectation of privacy. 
Puttaswamy II laid down that collection of core biometric information 
such as fingerprints, iris scans in the context of the Aadhaar-Based 
Biometric Authentication (‘ABBA’) is constitutionally permissible. The 
basis of this conclusion is that the Aadhaar Act does not deal with the 
individual’s intimate or private sphere.&lt;/p&gt;
&lt;p&gt;The judgement of the Supreme Court in Puttaswamy II is in a very 
specific context (i.e. the ABBA). It does not explain or identify the 
contextual factors which determine the extent to which privacy may be 
reasonably expected over biometrics generally. In this judgment, the 
Court observed that demographic information and photographs do not raise
 a reasonable expectation of privacy under Article 21 unless there exist
 special circumstances such as the disclosure of juveniles in conflict 
of law or a rape victim’s identity.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Most importantly, the Court held that face photographs for 
the purpose of identification are not covered by a reasonable 
expectation of privacy. The Court distinguished face photographs from 
intimate photographs or those photographs which concern confidential 
situations. &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Face photographs, according to the Court, are shared by 
individuals in the ordinary course of conduct for the purpose of 
obtaining a driving &lt;/strong&gt;l&lt;strong&gt;icense, voter id, passport, 
examination admit cards, employment cards, and so on. Face photographs 
by themselves reveal no information.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Naturally, this&amp;nbsp;pronouncement of the Apex Court is a huge boost for the introduction of AFRS in India.&lt;/p&gt;
&lt;p&gt;Abroad, however, on 4 September 2019, in &lt;a href="https://www.judiciary.uk/wp-content/uploads/2019/09/bridges-swp-judgment-Final03-09-19-1.pdf"&gt;Edward Bridges v. Chief Constable of South Wales Police&lt;/a&gt;, a Division Bench of the High Court in England and Wales heard a challenge against an AFRS introduced by law enforcement (&lt;em&gt;see&lt;/em&gt;
 Endnote 1). The High Court rejected a claim for judicial review holding
 that the AFRS in question does not violate inter alia the right to 
privacy under Article 8 of the European Convention of Human Rights 
(‘ECHR’).&lt;/p&gt;
&lt;p&gt;According to the Court, the AFRS was used for specific and limited 
purposes, i.e., only when the image of the public matched a person on an
 existing watchlist. The use of the AFRS was therefore considered a 
lawful and fair restriction.&lt;/p&gt;
&lt;p&gt;The Court, however, acknowledged that extracting biometric data 
through AFRS is “well beyond the expected and unsurprising”. This seems 
to be a departure from the Indian Supreme Court’s observation in 
Puttaswamy II that there is no reasonable expectation of privacy over 
biometric data in the context of ABBA, and may be a wiser approach for 
the Indian courts to adopt.&lt;/p&gt;
&lt;h6&gt;&lt;strong&gt;Endnote &lt;/strong&gt;&lt;/h6&gt;
&lt;p&gt;1. The challenge was put forth by Edward Bridges, a civil liberties 
campaigner from Cardiff for being caught on camera in two particular 
deployments of the AFRS a) when he was at Queen Street, a busy shopping 
area in Cardiff and b) when he was at the Defence Procurement, Research,
 Technology and Exportability Exhibition held at the Motorpoint Arena.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This was published by &lt;a class="external-link" href="https://aipolicyexchange.org/2019/12/28/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns/"&gt;AI Policy Exchange&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns'&gt;https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu, Siddharth Sonkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-01-02T14:09:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns">
    <title>Decrypting Automated Facial Recognition Systems (AFRS) and Delineating Related Privacy Concerns</title>
    <link>https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns</link>
    <description>
        &lt;b&gt;Arindrajit Basu and Siddharth Sonkar have co-written this blog as the first of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems?&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The use of aggregated Big Data by governments has the potential to 
exacerbate power asymmetries and erode civil liberties like few 
technologies of the past. In order to guard against the aggressive&amp;nbsp; 
aggregation&amp;nbsp;and manipulation of&amp;nbsp;the data generated by individuals&amp;nbsp;who 
are branded&amp;nbsp;as suspect, it is critical that our firmly established 
constitutional rights protect human dignity in the face of this 
potential erosion.&lt;/p&gt;
&lt;p&gt;The increasing ubiquity of Automated Facial Recognition Systems 
(AFRS) serve as a prime example of the rising desire of governments to 
push fundamental rights to the brink. With AFRS, the core fundamental 
right in question is privacy, although questions have been posed 
regarding the potential violation of&amp;nbsp;other related rights, such as the 
Right to Equality and the Right to Free Speech and Expression, as well.&lt;/p&gt;
&lt;p&gt;There is a rich corpus of literature, (see &lt;a href="https://indianexpress.com/article/opinion/columns/digital-identification-facial-recognition-system-ncrb-5859072/" rel="noreferrer noopener" target="_blank"&gt;here&lt;/a&gt;, &lt;a href="http://www.unswlawjournal.unsw.edu.au/wp-content/uploads/2017/09/40-1-11.pdf" rel="noreferrer noopener" target="_blank"&gt;here&lt;/a&gt; and an excellent recent paper by Smriti Parsheera &lt;a href="http://datagovernance.org/report/adoption-and-regulation-of-facial-recognition-technologies-in-india" rel="noreferrer noopener" target="_blank"&gt;here)&lt;/a&gt;
 from a diverse coterie of scholars that call out the challenges posed 
by AFRS, particularly with respect to its proportionality as a 
restriction over the right to privacy. Our contribution to this 
discourse focuses on a very specific question around a ‘reasonable 
expectation of privacy’ — the standard identified for the protection of 
privacy in public spaces across jurisdictions, including in India. This 
is because at this juncture, the precise nature of the AFRS which will 
eventually be used and the regulations it will be subject to are not 
clear.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In &lt;a href="https://indiankanoon.org/doc/91938676/'"&gt;Retd. K.S &lt;/a&gt;&lt;a href="https://indiankanoon.org/doc/91938676/" rel="noreferrer noopener" target="_blank"&gt;Puttaswamy (Retd.) v. Union of India&lt;/a&gt;:
 Justice Chandrachud (Puttaswamy I), the Indian Supreme Court was 
concerned with the question whether there exists a fundamental right to 
privacy under the Indian Constitution. A nine-judge bench of the Court 
recognized that the right to privacy is a fundamental right implicit 
inter alia in the right to life within Article 21 of the Constitution.&lt;/p&gt;
&lt;p&gt;The right to privacy protects people and not places. Every person is 
entitled, however, to a reasonable expectation of privacy. The 
expectation of privacy must be twofold. First, the person must prove 
that the alleged act could inflict some harm. Such harm must be real and
 not be speculative or imaginary. Second, society must recognize this 
expectation as reasonable. The test of reasonable expectations is 
contextual, i.e., the extent to which it safeguards privacy depends on 
the place at which the individual is.&lt;/p&gt;
&lt;p&gt;In order to pass any constitutional test, therefore, AFRS must 
satisfy the ‘reasonable expectation’ test articulated in Puttaswamy. 
However, in this context, the test itself has multiple contours. Do we 
have a right to privacy in a public place? Is AFRS collecting any data 
that specifically violates a right to privacy? Is the aggregation of 
that data a potential violation?&lt;/p&gt;
&lt;p&gt;After providing a brief introduction to the use cases of AFRS in 
India and across the world, we embark upon answering all these 
questions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Primer on Automated Facial Recognition Systems (AFRS)&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Facial recognition is a biometric technology that utilises cameras to
 match stored or live footage of individuals (including both stills and 
moving footage) with images or video&amp;nbsp;from an existing database. Some 
systems might also be used to analyze broader demographic trends or 
conduct sentiment analysis through crowd scanning.&lt;/p&gt;
&lt;p&gt;While the use of photographs and video footage have been core 
components of police investigation, the use of algorithms to process 
vast tracts of Big Data (characterized by ‘Volume, Velocity, and 
Variety), and compare disparate and discrete data points allows for the 
derivation of hitherto unfeasible insights on the subjects of Big Data.&lt;/p&gt;
&lt;p&gt;The utilisation of AFRS for law enforcement is rapidly spreading around the world. &lt;a href="https://carnegieendowment.org/2019/09/17/global-expansion-of-ai-surveillance-pub-79847" rel="noreferrer noopener" target="_blank"&gt;A Global AI Surveillance Index&lt;/a&gt;
 compiled by the Carnegie Endowment for International Peace found that 
at least sixty-four countries are incorporating facial recognition 
systems into their AI surveillance programs.&lt;/p&gt;
&lt;p&gt;Chinese technology company Yitu has entered into a partnership with 
security forces in Malaysia to equip police officers with facial 
recognition body cameras that, powered by enabling technologies, would 
allow a comparison of images caught by the live body cameras with images
 from several central databases.&lt;/p&gt;
&lt;p&gt;In &lt;a href="https://news.sky.com/story/met-polices-facial-recognition-tech-has-81-error-rate-independent-report-says-11755941" rel="noreferrer noopener" target="_blank"&gt;England and Wales&lt;/a&gt;,
 London Metropolitan Police, South Wales Police, and Leicestershire 
Police are all in the process of developing technologies that allow for 
the identification and comparison of live images with those stored in a 
database.&lt;/p&gt;
&lt;p&gt;The technology is being developed by Japanese firm NEC and the police
 force has limited ability to oversee or modify the software, given its 
proprietary nature. The Deputy Chief of South Wales Police stated that 
“the tech is given to [them] as a sealed box… [and the police force 
themselves] have no input – whatever it does, it does what it does.”&lt;/p&gt;
&lt;p&gt;In the US, &lt;a href="https://www.americanbar.org/groups/criminal_justice/publications/criminal-justice-magazine/2019/spring/facial-recognition-technology/" rel="noreferrer noopener" target="_blank"&gt;Baltimore’s police&lt;/a&gt;
 set up facial recognition cameras to track and arrest protestors — a 
system that reached its zenith during the 2018 riots in the city.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It is suspected that authorities in &lt;a href="https://www.japantimes.co.jp/news/2019/10/23/asia-pacific/hong-kong-protests-ai-facial-recognition-tech/#.Xf1Fs_zhVPY" rel="noreferrer noopener" target="_blank"&gt;Hong Kong&lt;/a&gt; are also using AFRS to clamp down on the ongoing pro-democracy protests.&lt;/p&gt;
&lt;p&gt;In India, the Ministry of Home Affairs, through the National Crime Records Bureau put out a &lt;a href="http://ncrb.gov.in/TENDERS/AFRS/RFP_NAFRS.pdf" rel="noreferrer noopener" target="_blank"&gt;tender for a new AFRS&lt;/a&gt;,
 whose stated objective is to “act as a foundation for national level 
searchable platform of facial images.” The AFRS will pull facial image 
data from CCTV feeds and compare these with existing records across 
databases including the Crime and Criminal Tracking Networks and Systems
 (CCTNS), Inter-operable Criminal Justice System (or ICJS), Immigration 
Visa Foreigner Registration Tracking (IVFRT), Passport, Prisons and 
state police records.&lt;/p&gt;
&lt;p&gt;Plans are also afoot to integrate this with the yet to be deployed 
National Automated Fingerprint Identification System (NAFIS), thereby 
creating a multi-faceted surveillance system.&lt;/p&gt;
&lt;p&gt;Despite raising eyeballs due to its potential all-pervasive scope, 
this tender is not the first instance of AFRS being used by Indian 
authorities. Punjab Police, &lt;a href="https://www.livemint.com/AI/DIh6fmR6croUJps6x7JW5K/Meet-Staqu-a-startup-helping-Indian-law-enforcement-agencie.html" rel="noreferrer noopener" target="_blank"&gt;in partnership with Gurugram-based start-up Staqu&lt;/a&gt;
 has launched and commenced implementation of&amp;nbsp; the Punjab Artificial 
Intelligence System (PAIS) which uses digitised criminal records and 
automated facial recognition to retrieve information on a suspected 
criminal and essentially tracks their public whereabouts, which poses 
potential constitutional questions.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This was published by &lt;a class="external-link" href="https://aipolicyexchange.org/2019/12/26/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns/"&gt;AI Policy Exchange&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns'&gt;https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu, Siddharth Sonkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-01-02T14:01:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/extra-territorial-surveillance-and-the-incapacitation-of-human-rights">
    <title>Extra-Territorial Surveillance and the Incapacitation of Human Rights</title>
    <link>https://cis-india.org/internet-governance/extra-territorial-surveillance-and-the-incapacitation-of-human-rights</link>
    <description>
        &lt;b&gt;This paper was published in Volume 12 (2) of the NUJS Law Review. &lt;/b&gt;
        
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Our 
networked data trails dictate, define, and modulate societies in hitherto
 inconceivable ways. The ability to access and manipulate that data is a
 product of stark power asymmetry in geo-politics, leading to a dynamic 
that privileges the interests of a few over the right to privacy and 
dignity of the many. I argue that the persistent de facto violation of 
human rights norms through extraterritorial surveillance conducted by 
western intelligence agencies, compounded by the failure of judicial 
intervention in the West has lead to the incapacitation of international
 human rights law. Despite robust jurisprudence including case law, 
comments by the United Nations, and widespread state practice on the 
right to privacy and the application of human rights obligations to 
extraterritorial stakeholders, extraterritorial surveillance continues 
with aplomb. Procedural safeguards and proportionality tests regularly 
sway towards a ‘ritual incantation’ of national security even in 
scenarios where a less intrusive option is available. The vulnerable 
citizen abroad is unable to challenge these processes and becomes an 
unwitting victim of nefarious surveillance practices that further widens
 global power asymmetry and entrenches geo-political fissures.&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;The full article can be found &lt;a href="https://cis-india.org/internet-governance/extraterritorial-algorithmic-surveillance-and-the-incapacitation-of-international-human-rights-law" class="internal-link" title="EXTRATERRITORIAL ALGORITHMIC SURVEILLANCE AND THE INCAPACITATION OF INTERNATIONAL HUMAN RIGHTS LAW"&gt;here&lt;/a&gt;.&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/extra-territorial-surveillance-and-the-incapacitation-of-human-rights'&gt;https://cis-india.org/internet-governance/extra-territorial-surveillance-and-the-incapacitation-of-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-01-02T11:02:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/call-for-comments-model-security-standards-for-the-indian-fintech-industry">
    <title>Call for Comments: Model Security Standards for the Indian Fintech Industry</title>
    <link>https://cis-india.org/internet-governance/call-for-comments-model-security-standards-for-the-indian-fintech-industry</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;The Centre for Internet and Society is pleased to make available the Draft document of Model Security Standards for the Indian Fintech Industry, for feedback and comments from all stakeholders. The objective of this document which was first published in November 2019, is to ensure that the data of users is dealt with in a secure and safe manner by the Fintech Industry, and that smaller businesses in the Fintech industry have a specific standard to look at in order to limit their liabilities for any future breaches. &lt;br /&gt;&lt;br /&gt;We invite any parties interested in the field of technology policy, including but not limited to lawyers, policy researchers, and engineers, to send in your feedback/comments on the draft document by the 16th of January 2020. We intend to publish our final draft by the end of January 2020. We look forward to receiving your contributions to make this document more comprehensive and effective. Please find a copy of the draft document &lt;a href="https://cis-india.org/internet-governance/resources/security-standards-for-the-financial-technology-sector-in-india" class="internal-link" title="Security Standards for the Financial Technology Sector in India"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/call-for-comments-model-security-standards-for-the-indian-fintech-industry'&gt;https://cis-india.org/internet-governance/call-for-comments-model-security-standards-for-the-indian-fintech-industry&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Financial Technology</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    

   <dc:date>2019-12-16T13:16:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cybersecurity-visuals-media-handbook-launch-event">
    <title>Cybersecurity Visuals Media Handbook: Launch Event</title>
    <link>https://cis-india.org/internet-governance/blog/cybersecurity-visuals-media-handbook-launch-event</link>
    <description>
        &lt;b&gt;6th December | 6 pm | Centre for Internet and Society, Bangalore&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The existing cybersecurity imagery in media publications has been observed to be limited in its communication of the discourse prevailing in cybersecurity policy circles, relying heavily on stereotypes such as hooded men, padlocks, and binary codes.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;In order to enable a clearer, more nuanced representation of cybersecurity concepts, we, at CIS, along with &lt;a class="external-link" href="http://designbeku.in/"&gt;Design Beku&lt;/a&gt; are launching the Cybersecurity Visuals Media Handbook. This handbook has been conceived to be a concise guide for media publications to understand the specific concepts within cybersecurity and use it as a reference to create visuals that are more informative, relevant, and look beyond stereotypes.&lt;/p&gt;
&lt;p&gt;We will be launching the interactive digital handbook on 6th December, 2019, at the Centre for Internet and Society, Bangalore, at 6 pm. The event would include a discussion on the purpose, process, and concepts behind this illustrated guide by CIS researchers and Design Beku.&lt;/p&gt;
&lt;p&gt;The launch will be followed by a panel discussion on  Digital Media Illustrations &amp;amp; the Politics of Technology. We will be joined by Padmini Ray Murray, Paulanthony George, and Kruthika N S in the panel. It will be moderated by Saumyaa Naidu.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Padmini Ray Murray&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Padmini founded the Design Beku collective in 2018 to help not-for-profit organisations explore their potential through research-led design and digital development. Trained as an academic researcher, Padmini currently as the head of communications at Obvious, a design studio. She regularly gives talks and publishes on the necessity of technology and design to be decolonial, local, and ethical. &lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Paulanthony George&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Paulanthony hates writing bios in the third person.&lt;br /&gt;My research focuses on the relationships between made objects, the maker and the behaviour of making, in the context of spreadable digital media (and behaviours stemming from it). I study internet memes inside and outside of India and phenomenon such as dissent, satire, free expression and ambivalent behaviour fostered by them. The research is at the intersection of digital ethnography, culture studies, human-computer interaction, humour studies and critical theory. I spend my time watching people. I draw them, the way they are, the way some people want to be and sometimes I have interesting conversations with them.&lt;/p&gt;
&lt;p&gt;&lt;span id="gmail-docs-internal-guid-5cb9e515-7fff-777e-6b99-8a216379ee39"&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Kruthika N S&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Kruthika NS is a lawyer at LawNK and researcher at the Sports Law &amp;amp; Policy Centre, Bengaluru. She uses art as a medium to explore the intersections of the law and society, with gender justice featuring as the central theme of her work. Her art has included subjects such as the #MeToo movement in India, and the feminist principles of the internet, among several other doodles.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Saumyaa Naidu&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Saumyaa is a designer and researcher at the Centre for Internet and Society.&amp;nbsp;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Agenda&lt;/strong&gt;&lt;br /&gt;6:00 - 6:15 pm - Introduction &lt;br /&gt;6:15 - 6:45 pm - Presentation on the Media Handbook by Paulanthony George&lt;br /&gt;6:45 - 7:00 pm - Tea/ Coffee &lt;br /&gt;7:00 - 8:00 pm - Panel discussion on Digital Media Illustrations &amp;amp; the Politics of Technology&lt;br /&gt;8:00 - 8:30 pm - Tea/ Coffee and Snacks&lt;/p&gt;
&lt;p&gt;The interactive version of handbook can be accessed &lt;a class="external-link" href="http://cis-india.github.io/cybersecurityvisuals/index"&gt;here&lt;/a&gt;. The print versions of the handbook can be accessed at: &lt;a class="external-link" href="https://drive.google.com/file/d/13Llq1vD5Eb-yo2YE3X6dRPaZ_WsMYhfa/view?usp=sharing"&gt;Single Scroll Printing&lt;/a&gt;, &lt;a class="external-link" href="https://drive.google.com/file/d/1mK_lxA0Eeb7GWxqZk4IM3cBxKdWakKS9/view?usp=sharing"&gt;Tiled-Paste Printing&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cybersecurity-visuals-media-handbook-launch-event'&gt;https://cis-india.org/internet-governance/blog/cybersecurity-visuals-media-handbook-launch-event&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>saumyaa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-12-06T09:27:37Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/draft-security-standards-for-the-financial-technology-sector-in-india">
    <title>Draft Security Standards for The Financial Technology Sector in India</title>
    <link>https://cis-india.org/internet-governance/blog/draft-security-standards-for-the-financial-technology-sector-in-india</link>
    <description>
        &lt;b&gt;Information security standards provide a framework for the secure development, implementation and maintenance of information systems and technology architecture. This document includes draft information security standards, which seek to ensure that not only the data of users is dealt with in a secure and safe manner but also that the smaller businesses in the fintech industry have a specific standard to look at in order to limit their liabilities for any future breaches.
&lt;/b&gt;
        
&lt;p id="docs-internal-guid-d14bad43-7fff-1d2b-c873-9850851b223a" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;By: &lt;strong&gt;Vipul Kharbanda&lt;/strong&gt;&lt;/p&gt;
with inputs from: &lt;strong&gt;Prem Sylvester
&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr /&gt;
&lt;p id="docs-internal-guid-47476e0d-7fff-b341-0372-b39d8cd99bcb" style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Information security standards provide a framework for the secure development, implementation and maintenance of information systems and technology architecture. Regulatory policies often cite several information security standards as a baseline that is to be complied with in order to ensure the adequate protection of information systems as well as associated architecture. Information security standards for the financial industry provide consideration to the specific risks and threats that financial institutions may face, making them an integral part of the process of ensuring business and operational sanctity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;There is an urgent economic interest in ensuring robust security of the financial technology sector within the country. This interest is amplified considerably due to the policy push seeking to shift India towards the realisation of a ‘cashless society’. This recent policy push has in part led to the ubiquitous adoption of technology-centric financial services such as PayTM, PhonePe, Mobikwik and others. The current landscape with respect to security standards for financial institutions in India appears to be multi-pronged; with multiple standards in place for companies to implement.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;The report can be accessed in full &lt;a href="https://cis-india.org/internet-governance/resources/security-standards-for-the-financial-technology-sector-in-india"&gt;here.&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/draft-security-standards-for-the-financial-technology-sector-in-india'&gt;https://cis-india.org/internet-governance/blog/draft-security-standards-for-the-financial-technology-sector-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Security Standards</dc:subject>
    
    
        <dc:subject>Financial Technology</dc:subject>
    

   <dc:date>2019-11-18T09:51:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/cultivating-india2019s-cyber-defense-strategy">
    <title>Cultivating India’s Cyber Defense Strategy</title>
    <link>https://cis-india.org/internet-governance/files/cultivating-india2019s-cyber-defense-strategy</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/cultivating-india2019s-cyber-defense-strategy'&gt;https://cis-india.org/internet-governance/files/cultivating-india2019s-cyber-defense-strategy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-11-13T14:39:19Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/lawfare-arindrajit-basu-november-7-2019-indias-role-in-global-cyber-policy-formulation">
    <title>India’s Role in Global Cyber Policy Formulation</title>
    <link>https://cis-india.org/internet-governance/blog/lawfare-arindrajit-basu-november-7-2019-indias-role-in-global-cyber-policy-formulation</link>
    <description>
        &lt;b&gt;The past year has seen vigorous activity on the domestic cyber policy front in India. On key issues—including intermediary liability, data localization and e-commerce—the government has rolled out a patchwork of regulatory policies, resulting in battle lines being drawn by governments, industry and civil society actors both in India and across the globe.&lt;/b&gt;
        &lt;p&gt;The article by Arindrajit Basu was &lt;a class="external-link" href="https://www.lawfareblog.com/indias-role-global-cyber-policy-formulation"&gt;published in Lawfare&lt;/a&gt; on November 7, 2019. The article was reviewed and edited by Elonnai Hickok and Justin Sherman.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The onslaught of recent developments demonstrates how India can shape cyber policy debates. Among emerging economies, India is uniquely positioned to exercise leverage over multinational tech companies due to its sheer population size, combined with a rapid surge in users coming online and the country’s large gross domestic product. India occupies a key seat at the &lt;a href="https://www.theatlantic.com/international/archive/2019/06/g20-data/592606/"&gt;data governance table&lt;/a&gt; alongside other players like the EU, China, Russia and the United States — a position the country should use to promote its interests and those of other similarly placed emerging economies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For many years, the Indian population has served as an economic resource for foreign, largely U.S.-based tech giants. Now, however, India is moving toward a regulatory strategy that reduces the autonomy of these companies in order to pivot away from a system that recently has been termed “&lt;a href="https://swarajyamag.com/magazine/colonialism-20-truly"&gt;data colonialism&lt;/a&gt;”—in which Western technologies use data-driven revenue bolstered by information extracted from consumers in the Global South to consolidate their global market power. The policy thinking underpinning India’s new grand vision still has some gaps, however.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Localization&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Starting with a circular from the Reserve Bank of India in April 2018, the Indian government has &lt;a href="https://twitter.com/cis_india/status/1143096429298085889"&gt;introduced a range of policy instruments&lt;/a&gt; mandating “&lt;a href="https://cis-india.org/internet-governance/resources/the-localisation-gambit.pdf"&gt;data localization&lt;/a&gt;”—that is, requiring that certain kinds of data must be stored in servers located physically within India. A snapshot of these policies is summarized in the table below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/IndianLaws.jpg" alt="Indian Laws" class="image-inline" title="Indian Laws" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: -webkit-center; "&gt;(&lt;/span&gt;&lt;em&gt;Source &lt;/em&gt;&lt;a href="https://cis-india.org/internet-governance/resources/the-localisation-gambit.pdf" style="text-align: -webkit-center; "&gt;&lt;em&gt;here&lt;/em&gt;&lt;/a&gt;&lt;em&gt;. Design credit: Saumyaa Naidu&lt;/em&gt;&lt;span style="text-align: -webkit-center; "&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: -webkit-center; "&gt;While there are &lt;a href="https://cis-india.org/internet-governance/resources/the-localisation-gambit.pdf"&gt;a number of&lt;/a&gt; reasons for this maneuver, two in particular are in line with India’s broader vision of data sovereignty—broadly defined as the sovereign right of nations to govern data within their territory and/or jurisdiction in order to support their national interest for the welfare of their citizens. First, there is an incentive to keep data within India’s jurisdiction because of the cumbersome process through which Indian law enforcement agencies must go during criminal investigations in order to access data stored in the U.S. Second, data localization undercuts the &lt;a href="https://theprint.in/tech/digital-colonialism-why-countries-like-india-want-to-take-control-of-data-from-big-tech/298217/"&gt;extractive economic models&lt;/a&gt; used by U.S. companies operating in India by which the data generated by Indian citizens is collected in India, stored in data centers located largely in the U.S., and processed and analyzed to derive commercially valuable insights.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both foreign players and smaller Indian private-sector actors were against this move. A &lt;a href="https://cis-india.org/internet-governance/resources/the-localisation-gambit.pdf"&gt;study&lt;/a&gt; on the issue that I co-authored earlier this year with Elonnai Hickok and Aditya Chawla found that one of the reasons for this resistance involved the high costs of setting up the data centers that are needed to comply with the requirement. President Trump &lt;a href="https://www.whitehouse.gov/briefings-statements/remarks-president-trump-g20-leaders-special-event-digital-economy-osaka-japan/"&gt;echoed&lt;/a&gt; this sentiment when he explicitly opposed data localization during a meeting with Prime Minister Narendra Modi on the sidelines of the G-20 in June 2019.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, large Indian players such as Reliance and Paytm and Chinese companies like AliBaba and Xilink were in favor of localization—possibly because these companies could absorb the costs of setting up storage facilities while benefiting from the fixed costs imposed on foreign competition. In fact, some companies, such as AliBaba, &lt;a href="https://economictimes.indiatimes.com/small-biz/startups/newsbuzz/alibaba-cloud-opens-second-data-centre-in-india/articleshow/65995570.cms"&gt;have already set up storage facilities in India.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As my co-authors and I noted, data localization comes with various risks, both diplomatically and politically. So far, the issue has caused friction in U.S.-India trade relations. For example, before Secretary of State Mike Pompeo's trip to New Delhi in June, the Trump administration &lt;a href="https://thewire.in/diplomacy/us-india-h1b-visa-data-localisation"&gt;reportedly&lt;/a&gt; contemplated limiting H-1B visas for any country that implements a localization requirement. Further, on his trips to New Delhi, Commerce Secretary Wilbur Ross has &lt;a href="https://www.medianama.com/2019/05/223-us-trade-secretary-wilbur-ross-highlights-data-localisation-high-tariffs-on-electronics-telecom-products-in-india-as-trade-issues/"&gt;regularly argued&lt;/a&gt; that data localization restrictions are a barrier to U.S. companies and stressed the need to eliminate such barriers. Further, data localization poses several &lt;a href="https://www.lawfareblog.com/where-your-data-really-technical-case-against-data-localization"&gt;technical challenges&lt;/a&gt; as well as security risks. Mirroring data across multiple locations, as India’s &lt;a href="https://meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf"&gt;Draft Personal Data Protection Bill&lt;/a&gt; mandates, increases the number of physical data centers that need to be protected and thereby the number of vulnerable points that malicious actors can attack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, the Indian media have reported &lt;a href="https://economictimes.indiatimes.com/news/economy/policy/policymakers-a-divided-lot-on-personal-data-bill-provisions/articleshow/70404637.cms?from=mdr&amp;amp;utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;disagreements&lt;/a&gt; between policymakers over data localization, along with speculation that the data storage requirement in the Draft Personal Data Protection Bill could be limited only to critical data—a term not defined in the bill itself—or be left to sectoral regulators, officials from individual government departments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our paper &lt;a href="https://cis-india.org/internet-governance/resources/the-localisation-gambit.pdf"&gt;recommended a dual approach&lt;/a&gt;. In our view, data localization policy should include mandatory localization for critical sectors such as defense or payments data, while also adopting “conditional” localization for all other data. Under conditional localization, data should only be transferred to countries that (a) agree to share the personal data of Indian citizens with law enforcement authorities based on Indian criminal procedure laws (examples of such a mechanism may be an executive data-sharing agreement under the &lt;a href="https://epic.org/privacy/cloud-act/"&gt;CLOUD Act&lt;/a&gt;) and (b) have equivalent privacy and security safeguards. This approach would be in line with India’s overarching vision of data sovereignty and the goal of standing up to the hegemony of big tech and of U.S. internet regulations, while avoiding undue collateral damage to India’s global alliances.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Intermediary Liability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In line with the goal of ensuring that big tech is answerable to the rule of law, the Indian government has also sought to regulate the adverse social impacts of some speech hosted by platforms. Rule 3(9) of the &lt;a href="https://meity.gov.in/writereaddata/files/Draft_Intermediary_Amendment_24122018.pdf"&gt;Draft of the Information Technology Intermediaries Guidelines (Amendment) Rules, 2018,&lt;/a&gt; released by the Ministry of Electronics and Information Technology in December 2019, takes up the interventionist mission of laws like the &lt;a href="https://www.lawfareblog.com/germanys-bold-gambit-prevent-online-hate-crimes-and-fake-news-takes-effect"&gt;NetzDg&lt;/a&gt; in Germany. The regulation would mandate that platforms use “automated tools or appropriate mechanisms, with appropriate controls, for proactively identifying and removing or disabling public access to unlawful information or content.” These regulations have prompted concerns from both the private sector and civil society groups that claim the proposal fails to address &lt;a href="https://cis-india.org/internet-governance/resources/Intermediary%20Liability%20Rules%202018.pdf"&gt;constitutional concerns&lt;/a&gt; about algorithmic discrimination, excessive censorship and inappropriate delegation of legislative powers under Indian law. Further, some observers object that the guidelines adopt a “one-size-fits-all” approach to classifying intermediaries that does not differentiate between platforms that thrive on end-to-end encryption like WhatsApp and public platforms like Facebook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In many ways, these guidelines—likely to be &lt;a href="https://www.medianama.com/2019/10/223-intermediary-guidelines-to-be-notified-by-jan-15-2020-meity-tells-supreme-court/"&gt;notified&lt;/a&gt;&lt;a href="https://www.medianama.com/2019/10/223-intermediary-guidelines-to-be-notified-by-jan-15-2020-meity-tells-supreme-court/"&gt; (as an amendment to the Information Technology Act) as early as January 2020&lt;/a&gt;—put the cart before the horse. Before devising regulatory models appropriate for India’s geographic scale and population, it is first necessary to conduct empirical research about the vectors through which misinformation spreads in India and how misinformation impacts different social, economic and linguistic communities, along with pilot programs for potential solutions to the misinformation problem. And it is imperative that these measures be brought in line with constitutional requirements.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Community Data and “Data as a Public Good”&lt;/h3&gt;
&lt;p&gt;Another important question involves the precise meaning of “data” itself—an issue on which various policy documents have failed to deliver a consistent stance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first conceptualization of “community data” appears in both the &lt;a href="https://meity.gov.in/writereaddata/files/Data_Protection_Committee_Report.pdf"&gt;Srikrishna Committee Report&lt;/a&gt; that accompanied the &lt;a href="https://meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf"&gt;Draft Personal Data Protection Bill&lt;/a&gt; in 2018 and the draft e-commerce policy. However, neither policy provides clarity on the concept of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When defining community data, the Srikrishna Report endorses a collective protection of privacy as protecting an identifiable community that has contributed to community data. According to the Srikrishna Report, receiving collective protection requires the fulfillment of three key aspects. First, the data belong to an identifiable community. Second, the individuals in the community consent to being a part of the community. And third, the community as a whole consents to its data being treated as community data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="https://dipp.gov.in/sites/default/files/DraftNational_e-commerce_Policy_23February2019.pdf"&gt;draft e-commerce policy&lt;/a&gt; reconceptualizes the notion of community data as “societal commons” or a “national resource,” where the undefined ‘community” has rights to access data but the government has overriding control to utilize the data for welfare purposes. Unlike the Srikrishna Report, the draft e-commerce policy does not outline the key aspects of community data. This approach fails to demarcate a clear line between personal and nonpersonal data or to specify any practical guidelines or restrictions on how the government can use community data. For this reason, implementation of this policy could pose a threat to the right to privacy that the Indian Supreme Court recognized as a &lt;a href="https://thewire.in/law/supreme-court-aadhaar-right-to-privacy"&gt;fundamental right&lt;/a&gt; in 2017.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second idea is that of “data as a public good.” This is described in Chapter 4 of the &lt;a href="https://www.indiabudget.gov.in/economicsurvey/doc/vol1chapter/echap04_vol1.pdf"&gt;2019 Economic Survey Report&lt;/a&gt;—a document published by the Ministry of Finance along with the Annual Financial Budget. The report explicitly states that any data governance framework needs to be deferential to privacy norms and the soon-to-be-enacted privacy law. The report further states that “personal data” of an individual in the custody of a government is a “public good” once the datasets are anonymized.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the report’s recommendation of setting up a government database that links several individual databases together leads to the &lt;a href="https://thewire.in/government/india-vision-data-republic-dangers-privacy"&gt;“triangulation” problem&lt;/a&gt;, in which individuals can be identified by matching different datasets together. The report further suggests that the same data can be sold to private firms (though it is unclear whether this includes foreign or domestic firms). This directly contradicts the characterization of a “public good”—which, by definition, must be &lt;a href="https://www.britannica.com/topic/public-good-economics"&gt;n&lt;/a&gt;&lt;a href="https://www.britannica.com/topic/public-good-economics"&gt;onexcludable and nonrivalrous&lt;/a&gt;—and is also at odds with the government’s vision of reining in big tech. The government has set up an expert committee to look into the scope of nonpersonal data, and the results of the committee’s deliberations &lt;a href="https://www.medianama.com/2019/09/223-meity-non-personal-data-committee/"&gt;are likely to&lt;/a&gt; influence the shape that India’s data governance framework takes across multiple policy instruments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is obviously a need to reassess and reevaluate the range of governance efforts and gambits that have emerged in the past year. With domestic cyber policy formulation pivots reaching a crescendo, we must consider how domestic cyber policy efforts can influence India’s approach to global debates in this space.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;India’s Contribution to Global Cyber Policy Debates&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As the largest democracy in the world, India is undoubtedly a key &lt;a href="https://www.newamerica.org/cybersecurity-initiative/reports/digital-deciders/"&gt;“digital decider”&lt;/a&gt; in shaping the future of the internet. Multilateral cyber policy formulation efforts remain &lt;a href="https://cis-india.org/internet-governance/blog/the-potential-for-the-normative-regulation-of-cyberspace-implications-for-india"&gt;polarized&lt;/a&gt;. The U.S. and its European allies continue to advocate for a free, rules-based conception of cyberspace with limited governmental interference. China and Russia, along with their Shanghai Cooperation Organisation allies, are pushing for a tightly regulated internet in which each state has the right to manage and define its “network frontiers” through domestic regulation free from external interference. To some degree, India is already influencing debate over the internet through its various domestic cyber policy movements. However, its participation in international debates has been lacking the vigor or coherence needed to clearly articulate India’s national interests and take up a global leadership role.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In shaping its contributions to global cyber policy formulation, India should focus its efforts on three key places: (a) internet governance forums that deliberate the governance of the technical architecture of the internet such as domain names, (b) cyber norms formulation processes that seek to establish norms to foster responsible behavior in cyberspace by states and nonstate actors in cyberspace, and (3) global debates on trade and cross-border data flows that seek to conceptualize the future of global digital trade relationships. As I discuss below, there are key divisions in Indian policy in each of these forums. To realize its grand vision in the digital sphere, India needs to do much more to make its presence felt.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Internet Governance Forums&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s stance on a variety of issues at internet governance forums has been inconsistent, switching repeatedly between &lt;a href="https://www.cigionline.org/sites/default/files/documents/GCIG%20Volume%202%20WEB.pdf"&gt;multilateral and multistakeholder visions for internet governance.&lt;/a&gt; A core reason for this uncertainty &lt;a href="https://cis-india.org/internet-governance/files/indias-contribution-to-internet-governance-debates"&gt;is the participation of multiple Indian government&lt;/a&gt; ministries, which often disagree with each other. At global internet governance forums, India has been represented either by the Department of Electronics and Information Technology (now renamed to Ministry of Electronics and Information Technoloft or the Department of Telecommunications (under the Ministry of Communications and Information Technology) or by the Ministry of External Affairs (MEA).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As my colleagues have documented &lt;a href="https://cis-india.org/internet-governance/files/indias-contribution-to-internet-governance-debates"&gt;in a detailed paper,&lt;/a&gt; India has been vocal in global internet governance debates at forums including the International Telecommunications Union, the Internet Governance Forum and the U.N. General Assembly. However, the Indian stance on &lt;a href="https://www.diplomacy.edu/IGFLanguage/multistakeholderism"&gt;multistakeholderism&lt;/a&gt; has been complex, with the MEA advocating for a multilateral stance while the other departments switched between multistakeholderism and “nuanced multilateralism”—which calls for multistakeholder participation in policy formulation but multilateral implementation. The paper also argues that there has been a decline recently in the vigor of Indian participation at forums such as the 2018 meeting of the Working Group on Enhanced Co-operation (WGEC 2.0), due to key personnel changes. For &lt;a href="https://cis-india.org/internet-governance/files/indias-contribution-to-internet-governance-debates"&gt;example&lt;/a&gt;, B.N. Reddy, who was a skilled and experienced negotiator for the MEA in previous forums, was transferred to another position before WGEC 2.0, and the delegation that attended the meeting did not make its presence felt as strongly or skillfully.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Cyber Norms for Responsible State Behavior in Cyberspace&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the exception of two broad and unoriginal statements at the &lt;a href="https://unoda-web.s3-accelerate.amazonaws.com/wp-content/uploads/2016/10/India.pdf"&gt;70th&lt;/a&gt; and &lt;a href="https://undocs.org/A/71/172"&gt;71st&lt;/a&gt; sessions of the U.N. General Assembly, India has yet to make public its position on the multilateral debate on the proliferation of norms for responsible state behavior in cyberspace. During the &lt;a href="https://dig.watch/events/open-ended-working-group-oewg-first-substantive-session"&gt;substantive session&lt;/a&gt; of the Open-Ended Working Group held in September, India largely reaffirmed points made by other states, rather than carving out a new or original approach. The silence and ambiguity is surprising, as India has been represented on four of the five Groups of Governmental Experts (GGEs) set up thus far and has also been inducted into the 2019-2021 GGE that is set to revamp the global cyber norms process. (Due to the GGE’s rotational membership policy, India was not a member of the fourth GGE that submitted its report in 2015.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, before becoming an evangelist of any particular norms, India has some homework to do domestically. It has yet to advance a clear, coherent and detailed public stance outlining its views on the application of international law to cyberspace. This public stance is necessary for two reasons. First, a well-reasoned statement that explains India’s stance on core security issues—such as the applicability of self-defense, countermeasures and international humanitarian law—would show India’s appetite for offensive and defensive strategies for external adversaries and allies alike. This would serve as the edifice of a potentially credible cyber deterrence strategy. Second, developing a public stance would help India to take advantage of the economic, demographic and political leverage that it holds and to assume a leadership role in discussions. The &lt;a href="https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century"&gt;U.K.&lt;/a&gt;, &lt;a href="https://www.lawfareblog.com/frances-cyberdefense-strategic-review-and-international-law"&gt;France,&lt;/a&gt; &lt;a href="https://www.lawfareblog.com/germanys-position-international-law-cyberspace"&gt;Germany&lt;/a&gt;, &lt;a href="https://www.justsecurity.org/64490/estonia-speaks-out-on-key-rules-for-cyberspace/"&gt;Estonia&lt;/a&gt;, &lt;a href="https://www.justsecurity.org/wp-content/uploads/2017/06/Cuban-Expert-Declaration.pdf"&gt;Cuba&lt;/a&gt; (backed by China and Russia) and the &lt;a href="https://www.justsecurity.org/wp-content/uploads/2016/11/Brian-J.-Egan-International-Law-and-Stability-in-Cyberspace-Berkeley-Nov-2016.pdf"&gt;U.S.&lt;/a&gt; have all made their positions publicly known with varying degrees of detail.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Data Transfers&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike in other forums, Indian policy has been clearer in the cross-border data transfer debate. This is a foreign policy extension of India’s emphasis on localization and data sovereignty in domestic policy instruments. At the G-20 Summit in Osaka, India and the rest of the BRICS group (Brazil, Russia, China and South Africa) stressed the role that data play in economic development for emerging economies and reemphasized the need for &lt;a href="https://www.youtube.com/watch?v=0a8YsZQ0F6k&amp;amp;feature=youtu.be"&gt;data sovereignty&lt;/a&gt;. India did not sign the &lt;a href="https://www.international.gc.ca/world-monde/international_relations-relations_internationales/g20/2019-06-29-g20_declaration-declaration_g20.aspx?lang=eng"&gt;Osaka Declaration on the Digital Economy&lt;/a&gt; that kickstarted the “Osaka Track”—a process whereby the 78 signatories agreed to participate in global policy discussions on international rule-making for e-commerce at the World Trade Organization (WTO). This was a continuation of India’s sustained efforts opposing the e-commerce moratorium at the WTO.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The importance of cross-border data flows in spurring the global economy found its way into the &lt;a href="https://g20.org/pdf/documents/en/FINAL_G20_Osaka_Leaders_Declaration.pdf"&gt;Final G-20 Leaders Declaration&lt;/a&gt;—which India signed. Foreign Secretary Vijay Gokhale &lt;a href="https://www.youtube.com/watch?v=0a8YsZQ0F6k&amp;amp;feature=youtu.be"&gt;argued&lt;/a&gt; that international rule-making on data transfers should not take place in plurilateral forums outside the WTO. Gokhale claimed that limiting the debate to the WTO would ensure that emerging economies have a say in the framing of the rules. The clarity expressed by the Indian delegation at the G-20 should be a model for more confident Indian leadership in this global cyber policy development space.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Looking Forward&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India is no newcomer to the idea of normative leadership. To overcome material shortcomings in the nation’s early years, Jawaharlal Nehru, the first Indian prime minister, engineered a &lt;a href="https://www.livemint.com/Opinion/h13WRfZP09BWA3Eg68TuVL/What-Narendra-Modi-has-Jawaharlal-Nehru-to-thank-for.html"&gt;normative pivot in world affairs&lt;/a&gt; by championing the sovereignty of countries that had gained independence from colonial rule. In the years immediately after independence, the Indian foreign policy establishment sought to break the hegemony of the United States and the Soviet Union by advancing a foreign policy rooted in what came to be known as &lt;a href="https://www.foreignaffairs.com/articles/india/2016-09-19/india-after-nonalignment"&gt;“nonalignment.”&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Making sound contributions to foreign policy in cyberspace requires a variety of experts—international lawyers, computer scientists, geopolitical strategists and human rights advocates. Indian civil society and academia are brimming with tech policy enthusiasts from a variety of backgrounds who could add in-depth substance to the government’s cyber vision. Such engagement has begun to some extent at the domestic level: Most government policies are now opened up to consultation with stakeholders Yet there is still room for greater transparency in this process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India's cyber vision is worth fighting for. The continued monetization of data dividends by foreign big tech at the expense of India’s socioeconomic development needs to be countered. This can be accomplished by predictable and coherent policymaking that balances economic growth and innovation with the fundamental rights and values enshrined in the Indian Constitution, including the right to equality, freedom of speech and expression, and the right to life. But inherent contradictions in the conceptualization of personal data, delays in tabling the Personal Data Protection Bill, and uncertain or rushed approaches in several other regulatory policies are all fettering the realization of this vision. On core geopolitical issues, there exists an opportunity to set the rule-shaping agenda to favor India’s sovereign interests. With global cyber policy formulation in a state of flux, India has the economic, demographic and intellectual leverage to have a substantial impact on the debate and recraft the narrative in favor of the rapidly emerging Global South.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/lawfare-arindrajit-basu-november-7-2019-indias-role-in-global-cyber-policy-formulation'&gt;https://cis-india.org/internet-governance/blog/lawfare-arindrajit-basu-november-7-2019-indias-role-in-global-cyber-policy-formulation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>basu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-11-13T14:13:33Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/discussion-at-cyfy-on-technology-policy-and-national-security-building-21st-century-curricula-in-india2019s-law-schools">
    <title>Discussion at CyFy on Technology, Policy and National Security: Building 21st Century Curricula in India’s Law Schools </title>
    <link>https://cis-india.org/internet-governance/news/discussion-at-cyfy-on-technology-policy-and-national-security-building-21st-century-curricula-in-india2019s-law-schools</link>
    <description>
        &lt;b&gt;Arindrajit Basu attended the session and gave comments on the course outline which included thoughts on:&lt;/b&gt;
        &lt;ol&gt;
&lt;li&gt;Threshold of technical knowledge-comparison with WTO law&lt;/li&gt;
&lt;li&gt;Need for India-centric approaches both in domestic and foreign policy&lt;/li&gt;
&lt;li&gt;Possibility of executive training of senior diplomats&lt;/li&gt;
&lt;li&gt;Need to include fintech security in the syllabus&lt;/li&gt;
&lt;li&gt;Necessity of international law as a tool of conflict 6. Sustained collaboration between think-tanks and universities&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The event was organized by Centre for Communication Governance at National Law University Delhi and Observer Research Foundation at Villa Medici, Taja Mahal Hotel, Man Singh Road, New Delhi.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/discussion-at-cyfy-on-technology-policy-and-national-security-building-21st-century-curricula-in-india2019s-law-schools'&gt;https://cis-india.org/internet-governance/news/discussion-at-cyfy-on-technology-policy-and-national-security-building-21st-century-curricula-in-india2019s-law-schools&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Financial Technology</dc:subject>
    

   <dc:date>2019-10-20T07:23:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cyber-policy-2.0">
    <title>Cyber Policy 2.0</title>
    <link>https://cis-india.org/internet-governance/news/cyber-policy-2.0</link>
    <description>
        &lt;b&gt;National Law University organized an executive education program in Bangalore on August 17, 2019.  Arindrajit Basu was a speaker. He spoke on Deconstructing the India regulatory approach to data governance and cyber security.&lt;/b&gt;
        &lt;p&gt;For more details about the program, &lt;a class="external-link" href="http://policyandgovernance.in/cyber-policy-2/"&gt;click here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cyber-policy-2.0'&gt;https://cis-india.org/internet-governance/news/cyber-policy-2.0&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    

   <dc:date>2019-08-19T14:18:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/nextrends-india-arindrajit-basu-august-5-2019-private-sector-and-the-cultivation-of-cyber-norms-in-india">
    <title>Private Sector and the cultivation of cyber norms in India</title>
    <link>https://cis-india.org/internet-governance/blog/nextrends-india-arindrajit-basu-august-5-2019-private-sector-and-the-cultivation-of-cyber-norms-in-india</link>
    <description>
        &lt;b&gt;Information Communication Technologies (ICTs) have become a regular facet of modern existence. The growth of cyberspace has challenged traditional notions of global order and uprooted the notion of governance itself. All over the world, the private sector has become a critical player, both in framing cyber regulations and in implementing them.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Arindrajit Basu was published by &lt;a class="external-link" href="http://nextrendsindia.org/private-sector-and-the-cultivation-of-cyber-norms-in-india/"&gt;Nextrends India&lt;/a&gt; on August 5, 2019.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;While the United Nations ‘Group of Governmental experts’ (GGE), tried and failed to establish a common law for governing the behavior of states in cyberspace, it is Big Tech who led the discussions on cyberspace regulations. Microsoft’s &lt;a class="addbackground" href="https://www.microsoft.com/en-us/cybersecurity/content-hub/a-digital-geneva-convention-to-protect-cyberspace"&gt;Digital Geneva Convention&lt;/a&gt; which devised a set of rules to protect civilian use of the internet was a notable initiative on that front. Microsoft was also a major driver of the &lt;a class="addbackground" href="https://cybertechaccord.org/"&gt;Tech Accords&lt;/a&gt; — a public commitment made by over 100 companies “agreeing to defend all customers everywhere from malicious attacks by cyber-criminal enterprises and nation-states.” The &lt;a class="addbackground" href="https://www.diplomatie.gouv.fr/en/french-foreign-policy/digital-diplomacy/france-and-cyber-security/article/cybersecurity-paris-call-of-12-november-2018-for-trust-and-security-in"&gt;Paris Call for Trust and Security in Cyberspace&lt;/a&gt; was a joint effort between the French government and Microsoft that brought in (as of today) 66 states, 347 private sector entities, including Indian business guilds such as FICCI and the Mobile Association of India and 139 organisations from civil society and academia from all over the globe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the entry of Big tech into the business of framing regulation has raised eyeballs across jurisdictions. In India, the government has attempted to push back on the global private sector due to arguably extractive economic policies adopted by them, alongside the threats they pose to India’s democratic fabric. The Indian government has taken various steps to constrain Big Tech, although some of these policies have been hastily rolled out and fail to address the root of the problem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I have identified two regulatory interventions that illustrate this trend. First, on &lt;a class="addbackground" href="https://www.thehindubusinessline.com/opinion/resurrecting-the-marketplace-of-ideas/article26313605.ece"&gt;intermediary liability&lt;/a&gt;, Rule 3(9) of the Draft of the Information Technology 2018 released by the Ministry of Electronics and Information Technology (MeiTy) last December. The rule follows the footsteps of countries like Germany and France by mandating that platforms use “automated tools or appropriate mechanisms, with appropriate controls, for proactively identifying and removing or disabling public access to unlawful information or content.” These regulations have resulted in criticism from both the private sector and civil society as they fail to address concerns around algorithmic discrimination, excessive censorship and gives the government undue power. Further, the regulations paint all the intermediaries with the same brush, thus not differentiating between platforms such as Whatsapp who thrive on end-to-end encryption and public platforms like Facebook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another source of discord between the government and the private sector has been the government’s localisation mandate, featuring in a slew of policies. Over the past year, the Indian government has &lt;a class="addbackground" href="https://twitter.com/cis_india/status/1143096429298085889"&gt;introduced a range of policy instruments&lt;/a&gt; which&lt;br /&gt;demand that certain kinds of data must be stored in servers located physically within India — termed “&lt;a class="addbackground" href="https://cis-india.org/internet-governance/resources/the-localisation-gambit.pdf"&gt;data localization&lt;/a&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this serves &lt;a class="addbackground" href="https://cis-india.org/internet-governance/resources/the-localisation-gambit.pdf"&gt;a number of policy objectives&lt;/a&gt;, the two which stand out are (1) the presently complex process for Indian law enforcement agencies to access data stored in the U.S. during criminal investigations, and (2) extractive economic models used by U.S. companies operating in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A &lt;a class="addbackground" href="https://cis-india.org/internet-governance/resources/the-localisation-gambit.pdf"&gt;study&lt;/a&gt; I co-authored earlier this year on the issue found that foreign players and smaller Indian private sector players were against this move due to the high compliance costs in setting up data centres.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On this question, we &lt;a class="addbackground" href="https://cis-india.org/internet-governance/resources/the-localisation-gambit.pdf"&gt;recommended a dual approach&lt;/a&gt; that involves mandatory sectoral localisation for critical sectors such as defense or payments data while adopting ‘conditional’ localisation for all other data. Under ‘conditional localisation,’&lt;br /&gt;data should only be transferred to countries that (1)Agree to share the personal data of Indian citizens with law enforcement authorities based on Indian criminal procedure laws and (2) Have equivalent privacy and security safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These two instances demonstrate that it is important for the Indian government to engage with both the domestic and foreign private sector to carve out optimal regulatory interventions that benefit the Indian consumer and the private sector as a whole rather than a few select big players. At the same time, it is important for the private sector to be a responsible stakeholder and comply both with existing laws and accepted norms of ‘good behaviour.’&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Going forward, there is no denying the role of the private sector in the development of emerging technologies. However, a balance must be struck through continued engagement and mutual respect to create a regulatory ecosystem that fosters innovation while respecting the rule of law with every stakeholder – government, private sector and civil society. India’s position could set the trend for other emerging economies coming online and foster a strategic digital ecosystem that works for all&lt;br /&gt;stakeholders.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/nextrends-india-arindrajit-basu-august-5-2019-private-sector-and-the-cultivation-of-cyber-norms-in-india'&gt;https://cis-india.org/internet-governance/blog/nextrends-india-arindrajit-basu-august-5-2019-private-sector-and-the-cultivation-of-cyber-norms-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>basu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-08-07T15:18:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
