<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 41 to 55.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/survey-on-data-protection-regime"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/indian-newspapers-digital-transition"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/technology-behind-big-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/irc17-selection"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/internets-core-resources-are-a-global-public-good"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/cisxscholars-delhi-william-f-stafford-thursday-nov-03"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/irc17-call"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-submission-trai-consultation-free-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/survey-on-data-protection-regime">
    <title>Survey on Data Protection Regime</title>
    <link>https://cis-india.org/internet-governance/blog/survey-on-data-protection-regime</link>
    <description>
        &lt;b&gt;We request you to take part in this survey aimed at understanding how various organisations view the changes in the Data Protection Regime in the European Union. Recently the General Data Protection Regulation (EU) 2016/679 was passed, which shall replace the present Data Protection Directive DPD 95/46/EC. This step is likely to impact the way of working for many organisations. We are grateful for your voluntary contribution to our research, and all information shared by you will be used for the purpose of research only. Questions that personally identify you are not mandatory and will be kept strictly confidential. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;The survey form below can also be accessed &lt;a href="https://goo.gl/forms/61d4W0kPQ8SqNaMO2" target="_blank"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;iframe src="https://docs.google.com/forms/d/e/1FAIpQLSepvhTUkkc7s3jFDfJZ90wFJAIuVexrbVSO5icV4kW0-1uyNA/viewform?embedded=true" frameborder="0" marginwidth="0" marginheight="0" height="800" width="600"&gt;Loading...&lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/survey-on-data-protection-regime'&gt;https://cis-india.org/internet-governance/blog/survey-on-data-protection-regime&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aditi Chaturvedi and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>General Data Protection Regulation</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2017-02-10T10:47:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016">
    <title>Comments on  the Report of the Committee on Digital Payments (December 2016)</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016</link>
    <description>
        &lt;b&gt;The Committee on Digital Payments constituted by the Ministry of Finance and chaired by Ratan P. Watal, Principal Advisor, NITI Aayog, submitted its report on the "Medium Term Recommendations to Strengthen Digital Payments Ecosystem" on December 09, 2016. The report was made public on December 27, and comments were sought from the general public. Here are the comments submitted by the Centre for Internet and Society.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;1. Preliminary&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;1.1.&lt;/strong&gt; This submission presents comments by the Centre for Internet and Society (“CIS”) &lt;strong&gt;[1]&lt;/strong&gt; in response to the report of the Committee on Digital Payments, chaired by Mr. Ratan P. Watal, Principal Advisor, NITI Aayog, and constituted by the Ministry of Finance, Government of India (“the report”) &lt;strong&gt;[2]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;2. The Centre for Internet and Society&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;2.1.&lt;/strong&gt; The Centre for Internet and Society, CIS, is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, and open access), internet governance, telecommunication reform, digital privacy, and cyber-security.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.2.&lt;/strong&gt; CIS is not an expert organisation in the domain of banking in general and payments in particular. Our expertise is in matters of internet and communication governance, data privacy and security, and technology regulation. We deeply appreciate and are most inspired by the Ministry of Finance’s decision to invite entities from both the sectors of finance and information technology. This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved, especially the citizens and the users. CIS is thankful to the Ministry of Finance for this opportunity to provide a general response on the report.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;3. Comments&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.1.&lt;/strong&gt; CIS observes that the decision by the Government of India to withdraw the legal tender character of the old high denomination banknotes (that is, Rs. 500 Rs. 1,000 notes), declared on November 08, 2016 &lt;strong&gt;[3]&lt;/strong&gt;, have generated &lt;strong&gt;unprecedented data about the user base and transaction patterns of digital payments systems in India, when pushed to its extreme use due to the circumstances&lt;/strong&gt;. The majority of this data is available with the National Payments Corporation of India and the Reserve Bank of India. CIS requests the authorities concerned to consider &lt;strong&gt;opening up this data for analysis and discussion by public at large and experts in particular, before any specific policy and regulatory decisions are taken&lt;/strong&gt; towards advancing digital payments proliferation in India. This is a crucial opportunity for the Ministry of Finance to embrace (open) data-driven regulation and policy-making.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.&lt;/strong&gt; While the report makes a reference to the European General Data Protection Directive, it does not make a reference to any substantive provisions in the Directive which may be relevant to digital payments. Aside from the recommendation that privacy protections around the purpose limitation principle be relaxed to ensure that payment service providers be allowed to process data to improve fraud monitoring and anti-money laundering services, the report is silent on significant privacy and data protection concerns posed by digital payments services. &lt;strong&gt;CIS strongly warns that the existing data protection and security regulations under Information Technology (Reasonable security practices and procedures and sensitive personal data or information), Rules are woefully inadequate in their scope and application to effectively deal with potential privacy concerns posed by digital payments applications and services.&lt;/strong&gt; Some key privacy issues that must be addressed either under a comprehensive data protection legislation or a sector specific financial regulation are listed below. The process of obtaining consent must be specific, informed and unambiguous and through a clear affirmative action by the data subject based upon a genuine choice provided along with an option to opt out at any stage. The data subjects should have clear and easily enforceable right to access and correct their data. Further, data subjects should have the right to restrict the usage of their data in circumstances such as inaccuracy of data, unlawful purpose and data no longer required in order to fulfill the original purpose.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.&lt;/strong&gt; The initial recommendation of the report is to “[m]ake regulation of payments independent from the function of central banking” (page 22). This involves a fundamental transformation of the payment and settlement system in India and its regulation. &lt;strong&gt;We submit that a decision regarding transformation of such scale and implications is taken after a more comprehensive policy discussion, especially involving a wider range of stakeholders&lt;/strong&gt;. The report itself notes that “[d]igital payments also have the potential of becoming a gateway to other financial services such as credit facilities for small businesses and low-income households” (page 32). Thus, a clear functional, and hence regulatory, separation between the (digital) payments industry and the lending/borrowing industry may be either effective or desirable. Global experience tells us that digital transactions data, along with other alternative data, are fast becoming the basis of provision of financial and other services, by both banking and non-banking (payments) companies. We appeal to the Ministry of Finance to adopt a comprehensive and concerted approach to regulating, enabling competition, and upholding consumers’ rights in the banking sector at large.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.&lt;/strong&gt; The report recognises “banking as an activity is separate from payments, which is more of a technology business” (page 154). Contemporary banking and payment businesses are both are primarily technology businesses where information technology particularly is deployed intimately to extract, process, and drive asset management decisions using financial transaction data. Further, with payment businesses (such as, pre-paid instruments) offering return on deposited money via other means (such as, cashbacks), and potentially competing and/or collaborating with established banks to use financial transaction data to drive lending decisions, including but not limited to micro-loans, it appears unproductive to create a separation between banking as an activity and payments as an activity merely in terms of the respective technology intensity of these sectors. &lt;strong&gt;CIS firmly recommends that regulation of these financial services and activities be undertaken in a technology-agnostic manner, and similar regulatory regimes be deployed on those entities offering similar services irrespective of their technology intensity or choice&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.&lt;/strong&gt; The report highlights two major shortcomings of the current regulatory regime for payments. Firstly “the law does not impose any obligation on the regulator to promote competition and innovation in the payments market” (page 153). It appears to us that the regulator’s role should not be to promote market expansion and innovation but to ensure and oversee competition. &lt;strong&gt;We believe that the current regulator should focus on regulating the existing market, and the work of the expansion of the digital payments market in particular and the digital financial services market in general be carried out by another government agency, as it creates conflict of interest for the regulator otherwise.&lt;/strong&gt; Secondly, the report mentions that Payment and Settlement Systems Act does not “focus the regulatory attention on the need for consumer protection in digital payments” and then it notes that a “provision was inserted to protect funds collected from customers” in 2015 (page 153). &lt;strong&gt;This indicates that the regulator already has the responsibility to ensure consumer protection in digital payments. The purview and modalities of how this function of course needs discussion and changes with the growth in digital payments&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.6.&lt;/strong&gt; The report identifies the high cost of cash as a key reason for the government’s policy push towards digital payments. Further, it mentions that a “sample survey conducted in 2014 across urban and rural neighbourhoods in Delhi and Meerut, shows that despite being keenly aware of the costs associated with transacting in cash, most consumers see three main benefits of cash, viz. freedom of negotiations, faster settlements, and ensuring exact payments” (page 30). It further notes that “[d]igital payments have significant dependencies upon power and telecommunications infrastructure. Therefore, the roll out of robust and user friendly digital payments solutions to unelectrified areas/areas without telecommunications network coverage, remains a challenge.” &lt;strong&gt;CIS much appreciates the discussion of the barriers to universal adoption and rollout of digital payments in the report, and appeals to the Ministry of Finance to undertake a more comprehensive study of the key investments required by the Government of India to ensure that digital payments become ubiquitously viable as well as satisfy the demands of a vast range of consumers that India has&lt;/strong&gt;. The estimates about investment required to create a robust digital payment infrastructure, cited in the report, provide a great basis for undertaking studies such as these.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.7.&lt;/strong&gt; CIS is very encouraged to see the report highlighting that “[w]ith the rising number of users of digital payment services, it is absolutely necessary to develop consumer confidence on digital payments. Therefore, it is essential to have legislative safeguards to protect such consumers in-built into the primary law.” &lt;strong&gt;We second this recommendation and would like to add further that financial transaction data is governed under a common data protection and privacy regime, without making any differences between data collected by banking and non-banking entities&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.8.&lt;/strong&gt; We are, however, very discouraged to see the overtly incorrect use of the word “Open Access” in this report in the context of a payment system disallowing service when the client wants to transact money with a specific entity &lt;strong&gt;[4]&lt;/strong&gt;. This is not an uncommon anti-competitive measure adopted by various platform players and services providers so as to disallow users from using competing products (such as, not allowing competing apps in the app store controlled by one software company). &lt;strong&gt;The term “Open Access” is not only the appropriate word to describe the negation of such anti-competitive behaviour, its usage in this context undermines its accepted meaning and creates confusion regarding the recommendation being proposed by the report.&lt;/strong&gt; The closest analogy to the recommendation of the report would perhaps be with the principle of “network neutrality” that stands for the network provider not discriminating between data packets being processed by them, either in terms of price or speed.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.9.&lt;/strong&gt; A major recommendation by the report involves creation of “a fund from savings generated from cash-less transactions … by the Central Government,” which will use “the trinity of JAM (Jan Dhan, Adhaar, Mobile) [to] link financial inclusion with social protection, contributing to improved Social and Financial Security and Inclusion of vulnerable groups/ communities” (page 160-161). &lt;strong&gt;This amounts to making Aadhaar a mandatory ID for financial inclusion of citizens, especially the marginal and vulnerable ones, and is in direct contradiction to the government’s statements regarding the optional nature of the Aadhaar ID, as well as the orders by the Supreme Court on this topic&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.10.&lt;/strong&gt; The report recommends that “Aadhaar should be made the primary identification for KYC with the option of using other IDs for people who have not yet obtained Aadhaar” (page 163) and further that “Aadhaar eKYC and eSign should be a replacement for paper based, costly, and shared central KYC registries” (page 162). &lt;strong&gt;Not only these measures would imply making Aadhaar a mandatory ID for undertaking any legal activity in the country, they assume that the UIDAI has verified and audited the personal documents submitted by Aadhaar number holders during enrollment.&lt;/strong&gt; A mandate for &lt;em&gt;replacement&lt;/em&gt; of the paper-based central KYC agencies will only remove a much needed redundancy in the the identity verification infrastructure of the government.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.11.&lt;/strong&gt; The report suggests that “[t]ransactions which are permitted in cash without KYC should also be permitted on prepaid wallets without KYC” (page 164-165). This seems to negate the reality that physical verification of a person remains one of the most authoritative identity verification process for a natural person, apart from DNA testing perhaps. &lt;strong&gt;Thus, establishing full equivalency of procedure between a presence-less transaction and one involving a physically present person making the payment will only amount to removal of relatively greater security precautions for the former, and will lead to possibilities of fraud&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.12.&lt;/strong&gt; In continuation with the previous point, the report recommends promotion of “Aadhaar based KYC where PAN has not been obtained” and making of “quoting Aadhaar compulsory in income tax return for natural persons” (page 163). Both these measures imply a replacement of the PAN by Aadhaar in the long term, and a sharp reduction in growth of new PAN holders in the short term. &lt;strong&gt;We appeal for this recommendation to be reconsidered as integration of all functionally separate national critical information infrastructures (such as PAN and Aadhaar) into a single unified and centralised system (such as Aadhaar) engenders massive  national and personal security threats&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.13.&lt;/strong&gt; The report suggest the establishment of “a ranking and reward framework” to recognise and encourage for the best performing state/district/agency in the proliferation of digital payments. &lt;strong&gt;It appears to us that creation of such a framework will only lead to making of an environment of competition among these entities concerned, which apart from its benefits may also have its costs. For example, the incentivisation of quick rollout of digital payment avenues by state government and various government agencies may lead to implementation without sufficient planning, coordination with stakeholders, and precautions regarding data security and privacy&lt;/strong&gt;. The provision of central support for digital payments should be carried out in an environment of cooperation and not competition.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.14.&lt;/strong&gt; CIS welcomes the recommendation by the report to generate greater awareness about cost of cash, including by ensuring that “large merchants including government agencies should account and disclose the cost of cash collection and cash payments incurred by them periodically” (page 164). It, however, is not clear to whom such periodic disclosures should be made. &lt;strong&gt;We would like to add here that the awareness building must simultaneously focus on making public how different entities shoulder these costs. Further, for reasons of comparison and evidence-driven policy making, it is necessary that data for equivalent variables are also made open for digital payments - the total and disaggregate cost, and what proportion of these costs are shouldered by which entities&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.15.&lt;/strong&gt; The report acknowledges that “[t]oday, most merchants do not accept digital payments” and it goes on to recommend “that the Government should seize the initiative and require all government agencies and merchants where contracts are awarded by the government to provide at-least one suitable digital payment option to its consumers and vendors” (page 165). This requirement for offering digital payment option will only introduce an additional economic barrier for merchants bidding for government contracts. &lt;strong&gt;We appeal to the Ministry of Finance to reconsider this approach of raising the costs of non-digital payments to incentivise proliferation of digital payments, and instead lower the existing economic and other barriers to digital payments that keep the merchants away&lt;/strong&gt;. The adoption of digital payments must not lead to increasing costs for merchants and end-users, but must decrease the same instead.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.16.&lt;/strong&gt; As the report was submitted on December 09, 2016, and was made public only on December 27, 2016, &lt;strong&gt;it would have been much appreciated if at least a month-long window was provided to study and comment on the report, instead of fifteen days&lt;/strong&gt;. This is especially crucial as the recently implemented demonetisation and the subsequent banking and fiscal policy decisions taken by the government have rapidly transformed the state and dynamics of the payments system landscape in India in general, and digital payments in particular.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Endnotes&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://finmin.nic.in/reports/Note-watal-report.pdf"&gt;http://finmin.nic.in/reports/Note-watal-report.pdf&lt;/a&gt; and &lt;a href="http://finmin.nic.in/reports/watal_report271216.pdf"&gt;http://finmin.nic.in/reports/watal_report271216.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="http://finmin.nic.in/cancellation_high_denomination_notes.pdf"&gt;http://finmin.nic.in/cancellation_high_denomination_notes.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; Open Access refers to “free and unrestricted online availability” of scientific and non-scientific literature. See: &lt;a href="http://www.budapestopenaccessinitiative.org/read"&gt;http://www.budapestopenaccessinitiative.org/read&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sumandro Chattapadhyay and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Digital Access</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Digital Security</dc:subject>
    
    
        <dc:subject>Data Revolution</dc:subject>
    
    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2017-01-12T12:32:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi">
    <title>CIS Submission to TRAI Consultation Note on Model for Nation-wide Interoperable and Scalable Public Wi-Fi Networks</title>
    <link>https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi</link>
    <description>
        &lt;b&gt;​This submission presents responses by the CIS on the ​Consultation Note on Model for Nation-wide Interoperable and Scalable Public Wi-Fi Networks published by the TRAI on November 15, 2016. Our analysis of the solution proposed in the Note, in brief, is that there is no need of a solution for non-existing interoperability problem for authentication and payment services for accessing public Wi-Fi networks. The proposed solution in this Note only adds to over-regulation in this sector, and does not incentivise new investment in the sector, but only establishes UIDAI and NPCI as the monopoly service providers for authentication and payment services.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The comments were authored by Japreet Grewal, Pranesh Prakash, Sharath Chandra, Sumandro Chattapadhyay, Sunil Abraham, and Udbhav Tiwari, with expert comments from Amelia Andersdotter.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;1. Preliminary&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;1.1.&lt;/strong&gt; This submission presents responses by the Centre for Internet and Society (“CIS”) &lt;strong&gt;[1]&lt;/strong&gt; on the &lt;em&gt;Consultation Note on Model for Nation-wide Interoperable and Scalable Public Wi-Fi Networks&lt;/em&gt; (“the Note”) published by the Telecom Regulatory Authority of India (“TRAI”) on November 15, 2016 &lt;strong&gt;[2]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1.2.&lt;/strong&gt; The CIS welcomes the effort undertaken by TRAI to map regulatory and other barriers to deployment of public Wi-Fi in India. We especially appreciate that TRAI has recognised &lt;strong&gt;[3]&lt;/strong&gt; two key barriers to provision of public Wi-Fi networks identified and highlighted in our earlier response to the &lt;em&gt;Consultation Paper on Proliferation of Broadband through Public Wi­Fi&lt;/em&gt; &lt;strong&gt;[4]&lt;/strong&gt;: 1) over regulation (including, licensing requirements, data retention, and Know Your Customer policy), and 2) paucity of spectrum &lt;strong&gt;[5]&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;2. General Responses&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;2.1.&lt;/strong&gt; Before responding to the specific questions posed by the Note, we would like to make the following observations.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.2.&lt;/strong&gt; There is no need of a solution for non-existing interoperability problem for authentication and payment services for accessing public Wi-Fi networks. The proposed solution in this Note only adds to over-regulation in this sector. The proposed solution does not incentivise new investment in the sector, but only establishes UIDAI and NPCI as the monopoly service providers for authentication and payment services.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.3.&lt;/strong&gt; As the TRAI has consulted widely with industry and other stakeholders before it settled on the list of priority issues contained in Section C.6 of the Note, we are surprised to find that this Note aims to address only the problem of lack of “seamless interoperable payment system for Wi-Fi networks” (Section C.6.d. Of the Note), and does not discuss and propose solutions for any other key barriers identified by the Note.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.4.&lt;/strong&gt; The Note fails to clarify the “interoperability” problem in the payment system for usage of public Wi-Fi networks that it is attempting to solve. The Note identifies that lack of “single standard” for “authentication and  payment  mechanisms” for accessing public Wi-Fi networks as a key impediment to provide scalable and interoperable public Wi-Fi networks across the country &lt;strong&gt;[6]&lt;/strong&gt;. By conceptualising the problem in this manner, TRAI has bundled together two completely different concerns - authentication and payment - into one and this is at the root of the problems emanating from the proposed solution in this Note.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.5.&lt;/strong&gt; Lack of standard process for authentication is created by over-regulation via Know Your Customer (“KYC”) policies, and selection of eKYC service provided by UIDAI as the only acceptable authentication mechanism for all users of public Wi-Fi networks across India, creating further economic and legal challenges for smaller would-be providers of public Wi-Fi networks as they assess their liabilities and start-up costs. Additionally, since this would amount to making UID/Aadhaar enrolment mandatory for any user of public wi-fi networks, it seems to create a contradiction with previously communicated policy from the UIDAI and the Government that no such obligation should arise. Supreme Court has also mandated over successive Orders that enrolment for UID/Aadhaar number should remain optional for the citizens and residents.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.6.&lt;/strong&gt; As was observed by the respondents to the TRAI Consultation concluded earlier this year, there is no interoperability problem that needs to be solved regarding payments for accessing public Wi-Fi networks. Payment services continue to be evolved and payment aggregator services provided by existing companies may be expected to resolve many of the outstanding issues of service proliferation in the upcoming years, at least in the absence of additional mandatory technical measures imposed by the government. Bundling of payment with authentication will only undermine the already existing independent market for payment aggregators, and further enforce mandatoriness of UID/Aadhaar number.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.7.&lt;/strong&gt; Further, the payment mechanism proposed would seem to worsen difficulties for tourists and foreigners in accessing public Wi-Fi in India, as well adds an additional layer of authentication in a system already identified (even in the Note itself) to be overburdened by regulations regarding KYC and data retention. Section C.6.b of the Note highlights the problems faced by foreigners and tourists when the authentication mechanism is premised upon use of One Time Password (OTP) that requires a functioning local mobile phone number. It contradicts itself later by proposing an authentication method that requires the user to not only download an application onto their mobile/desktop device, but also to enrol for UID/Aadhaar number and/or to use their existing UID/Aadhaar number. Instead of reducing the existing barriers to provision of and access to public Wi-Fi, which the Note is supposed to achieve, it creates significant new barriers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.8.&lt;/strong&gt; The technological architecture advanced by the Note upholds support of governance and surveillance projects that, in addition to being costly in their implementation and thereby slowing down the objective of getting India connected, are also of questionable value to the security of the Indian polity. UID, UPI, and related projects risk undermining cyber-security through their reliance on centralised architectures and interfere with healthy competitive market dynamics between commercial and non-commercial actors.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.9.&lt;/strong&gt; The Note continues to only consider and enable commercial models for the provision of public Wi-Fi networks. We have identified this as a problematic assumption in our last submission &lt;strong&gt;[7]&lt;/strong&gt;. It is most crucial that TRAI does not ignore and fail to promote and facilitate the possibility of not-for-profit models that involve grassroot communities, academia, and civil society.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.10.&lt;/strong&gt; Last but not the least, the term “Wi-Fi” refers to a particular technology for establishing wireless local area networks. Further, the term is a trademark of the Wi-Fi Alliance &lt;strong&gt;[8]&lt;/strong&gt;. It is this not a neutral term, and it must not be used as a general and universal synonym for wireless local area networks. We recommend that TRAI may consider using a technology-neutral term, say “public wireless services” or “public networking services”, to describe the sector. Following the terminology used in the Note, we have decided to continue using the term “Wi-Fi” in this response. This does not reflect our agreement about the appropriateness of this term. Important: The recommendation for technology-neutral regulation also comes with the qualification that safeguards like regulations on Listen Before Talk and Cycle Time are required to prevent technologies like LTE-U from squatting on spectrum and interfering with connections based on other standards.&lt;/p&gt;
&lt;h2&gt;3. Specific Responses&lt;/h2&gt;
&lt;h4&gt;Q1. Is the architecture suggested in the consultation note for creating unified authentication and payment infrastructure will enable nationwide standard for authentication and payment interoperability?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.1.&lt;/strong&gt; No. The proposed infrastructure is likely to be costly for a large number of actors to implement and undermine some of the ongoing innovation in the Indian digital payment services industry. Rather than being helpful, it risks introducing additional requirements on an industry that TRAI has already identified as facing a number of large challenges.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.&lt;/strong&gt; There is no need for a unified architecture that provides nationwide standard for authentication and payment interoperability. It does not offer any incentive towards provision of public Wi-Fi networks. Neither is there an interoperability problem at the physical or data link layers that has been pointed out, nor is government mandated interoperability required at the payment or ID layer since there are private entities that provide such interoperability (like, payment aggregators). Additionally, we believe it is inappropriate that the TRAI is trying to predict the most suitable business/technological model for digital payments to be used for accessing commercial Wi-Fi networks. India has a booming online payments industry, and it must be allowed to evolve in an enabling regulatory environment that allow for competition and ensures responsible practices.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.&lt;/strong&gt; The Note identifies several structural impediments to expansion of public Wi-Fi networks in India, namely paucity of backhaul connectivity infrastructure (Section C.6.a), Inadequate associated infrastructure to offer carrier  grade  Wi-Fi network (Section C.6.c), dependency of authentication mechanism on pre-existing (Indian) mobile phone connection (Section C.6.b), and limited availability of spectrum to be used for public Wi-Fi networks (Section C.6.e). All these are crucial concerns and none of them have been addressed by the architecture suggested in the Note.&lt;/p&gt;
&lt;h4&gt;Q2. Would you like to suggest any alternate model?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.4.&lt;/strong&gt; Yes. The model proposed in the Note is likely to exclude several types of potential users (say, foreigners and tourists), and impose a single authentication and payment service provider for accessing public Wi-Fi networks, which may undermine both competition and security in the market for these services.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.&lt;/strong&gt; Internationally, there are cities and regions (say, the city of Barcelona and the Catalonia region in Spain) where public Wi-Fi networks have been provided in a pervasive and efficient manner by taking a light regulatory approach that enables opportunities for potential providers to set up their own infrastructures and additionally have access to backhaul. Further, reducing legal requirements on authentication should be considered in place of government mandated technical architectures for authentication and payment. In particular, allowing for anonymous access to Public Wi-Fi or wireless connectivity would reduce both the administrative and the technical burden on potential providers at the hyper-local level, especially for providers whose main activity it is not, and cannot be, to provide internet services (say, event venues, malls, and shops).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.6.&lt;/strong&gt; The CIS suggests the following steps towards conceptualising an “alternative model”:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;remove existing regulatory disincentives,&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;urgently explore policies to promote deployment of wired infrastructures in general, and to enable a larger range of actors, including local authorities, to invest in and deploy local infrastructures by reducing licensing requirements in particular,&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;examine spectrum requirements for provision of public Wi-Fi, and&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;provide incentives, such as allowing telecom service providers to share backhaul traffic over public Wi-Fi, and ways for telecom service providers to lower their costs if they also make Internet access available for free.&lt;/li&gt;&lt;/ol&gt;
&lt;h4&gt;Q3. Can Public Wi-Fi access providers resell capacity and bandwidth to retail users? Is “light touch regulation” using methods such as “registration” instead of “licensing” preferred for them?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.7.&lt;/strong&gt; CIS holds that capacity and bandwidth are neither comparable to tangible goods nor to digital currency. They are a utility, and the provider of the utility has to accept that their customers use the utility in the way they see fit, even if that use entails sharing said capacity and bandwidth with downstream private persons or customers. Wi-Fi capabilities are currently a built-in standardised feature of all consumer routers. Any individual, community, or store with access to an internet connection and a consumer router could become a public Wi-Fi access provider at no additional cost to themselves, furthering the goals of the Indian government in its Digital India strategy to ensure public and universal access to the internet.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.8.&lt;/strong&gt; In order to exploit the opportunities awarded by a large amount of entities in the Indian society potentially becoming Public Wi-Fi providers, TRAI should require neither registration nor licensing of these actors. Imposing administrative burdens on potential public Wi-Fi access providers creates legal uncertainty and will cause a lot of actors, who may otherwise contribute to the goals of Digital India, not to do so. This is particularly true for community organisers and citizens, who may not have access to legal assistance and therefore may avoid contributing to the goals of the government.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.9.&lt;/strong&gt; Light touch regulation when it comes to both granting license to  public Wi-Fi access providers as well as authentication of retail users, however, are needed not only as an exceptional practice for such instances but as a general practice in case of entities offering public Wi-Fi services, either commercially or otherwise. Further, additional laxity in administrative responsibilities is needed to incentivise provision of free, that is non-commercial, public Wi-Fi networks.&lt;/p&gt;
&lt;h4&gt;Q4. What should be the regulatory guidelines on “unbundling” Wi-Fi at access and backhaul level?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.10.&lt;/strong&gt; The Note refers to unbundling of activities related to provision of Wi-Fi but it does not define the term. It is neither explained which specific activities at access and backhaul levels must be considered for unbundling.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.11.&lt;/strong&gt; While unbundling should clearly be allowed and any regulatory hurdles to unbundling should be removed, any such decision must be taken with a focus on urgently addressing the stagnated growth in landline and backhaul, as identified in Section C.6.a of the Note. Relying only on spectrum intensive infrastructures, such as mobile base stations, for providing connectivity, creates a heavy regulatory burden for the TRAI, while simultaneously not ensuring optimal connectivity for business and private users. The CIS is concerned that the focus of the Note on standardising a government-mediated authentication and payment mechanism detracts attention from this urgent obstacle to the fulfillment of the Digital India plans of accelerated provision of broadband highways, universal access, and public, especially free, access to internet services.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.12.&lt;/strong&gt; From the example of European telecommunications legislations, implementation of policy measures to ensure that vertical integration between infrastructure (say, cables, switches, and hubs) providers and service (say, providing a subscriber with a household modem or a SIM card) providers in the telecommunications sector does not become a barrier to new market entrants has yielded much success in countries that have pursued it, like Sweden and Great Britain.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.13.&lt;/strong&gt; Further,  there should be no default assumption of bundling by the TRAI. In particular, the TRAI should consider reviewing all regulations that may cause bundling to occur when this is not necessary, and put in place in a monitoring mechanism for ensuring that bundled practises (especially in electronic networks, base station infrastructures, backhaul and similar) do not cause competitive problems or raise market entry barriers &lt;strong&gt;[9]&lt;/strong&gt;. In most EU countries, especially where the corporate structure of incumbent(s) is not highly vertically integrated, interconnection requirements for electronic network providers of wired networks in the backhaul or backbone (effectively price regulated interconnection), and a conscious effort to ensure that new market players can enter the field, have ensured a competitive telecommunications environment. TRAI may consider reviewing the European regulation on local loop unbundling (1999) and discussions on functional separation (especially by the British regulatory authority Ofcom), within an Indian context.&lt;/p&gt;
&lt;h4&gt;Q5. Whether reselling of bandwidth should be allowed to venue owners such as shop keepers through Wi-Fi at premise? In such a scenario please suggest the mechanism for security compliance.&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.14.&lt;/strong&gt; Yes. Venue owners should be allowed to provide public Wi-Fi service both on a commercial and non-commercial basis.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.15.&lt;/strong&gt; It is not clear from the Note and the question what type of security concerns the TRAI is seeking to address. In terms of payment security, the payment industry already has a large range of verification and testing mechanisms. The CIS objects to the mandatory introduction of the proposed payment system so as to ensure greater security for Wi-Fi access providers and the users.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.16.&lt;/strong&gt; As far as hardware-related security issues are concerned, it is again unclear why consumer equipment compliant with existing Wi-Fi standards would not be sufficiently secure in the Indian context. Wi-Fi has proven to be a sturdy technical standard, its adoption is high in multiple jurisdictions around the world, and it also enjoys great technical stability. Similar security assessments could easily be made for alternative wireless technologies, such as WiMaX.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.17.&lt;/strong&gt; The CIS foresees problems is in the allocation of risk and liability by law. The already existing legal obligation to verify the identity of each user, for instance, is likely to introduce a large administrative burden on potential Public Wi-Fi providers, which may lead to such potential providers abstaining from entering the market. Should the identification requirement be removed, however, other concerns pertaining to legal obligations may arise. These include liability for user activities on the web or on the internet (cf. copyright infringement, libel, hate speech). We propose a “safe harbour” mechanism in these cases, limiting the liability of the potential public Wi-Fi provider.&lt;/p&gt;
&lt;h4&gt;Q6. What should be the guidelines regarding sharing of costs and revenue across all entities in the public Wi-Fi value chain? Is regulatory intervention required or it should be left to forbearance and individual contracting?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;3.18.&lt;/strong&gt; The market segments identified by the TRAI in Section F.18 of the Note should normally all be competitive markets themselves, and so do not require regulatory assistance in sharing of costs and revenues. The more elaborate the requirements imposed on each actor of each market segment identified by the TRAI in Section F.18, the more costly the roll-out of public Wi-Fi is going to be for the market actors. Such a cost is not avoided by price regulation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.19.&lt;/strong&gt; The TRAI may instead consider introducing public funding for backhaul roll-out in remote areas, where the market is unlikely to engage in such roll-out on its own. Presently, some Indian states (such as Karnataka) are committing to public funding for wireless access in remote areas. The Union Government can assist such endeavours.&lt;/p&gt;
&lt;h2&gt;Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://trai.gov.in/Content/ConDis/20801_0.aspx"&gt;http://trai.gov.in/Content/ConDis/20801_0.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See Section C.6 of the Note.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://trai.gov.in/Content/ConDis/20782_0.aspx"&gt;http://trai.gov.in/Content/ConDis/20782_0.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks"&gt;http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See Section E.11. of the Note.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks"&gt;http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a href="https://www.wi-fi.org/"&gt;https://www.wi-fi.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See: Monitoring bundled products in the telecommunications sector is also recommended by the OECD: &lt;a href="http://oecdinsights.org/2015/06/22/triple-and-quadruple-play-bundles-of-communication-services-towards-all-in-one-packages/"&gt;http://oecdinsights.org/2015/06/22/triple-and-quadruple-play-bundles-of-communication-services-towards-all-in-one-packages/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi'&gt;https://cis-india.org/telecom/blog/cis-submission-trai-note-on-interoperable-scalable-public-wifi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Japreet Grewal, Pranesh Prakash, Sharath Chandra, Sumandro Chattapadhyay, Sunil Abraham, and Udbhav Tiwari, with expert comments from Amelia Andersdotter</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Public Wireless Network</dc:subject>
    
    
        <dc:subject>TRAI</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    

   <dc:date>2016-12-12T13:59:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/indian-newspapers-digital-transition">
    <title>Indian Newspapers' Digital Transition</title>
    <link>https://cis-india.org/raw/indian-newspapers-digital-transition</link>
    <description>
        &lt;b&gt;This report examines the digital transition underway at three leading newspapers in India, the Dainik Jagran in Hindi, English-language Hindustan Times, and Malayala Manorama in Malayalam. Our focus is on how they are changing their newsroom organisation and journalistic work to expand their digital presence and adapt to a changing media environment. The report comes out of a collaboration between the CIS and the Reuters Institute for the Study of Journalism, University of Oxford, and was supported by the latter. The research was undertaken by Zeenab Aneez, with contributions from Rasmus Kleis Nielsen, Vibodh Parthasarathi, and Sumandro Chattapadhyay.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download: &lt;a href="http://reutersinstitute.politics.ox.ac.uk/sites/default/files/Indian%20Newspapers%27%20Digital%20Transition.pdf"&gt;PDF&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;Cross-posted from the &lt;a href="http://reutersinstitute.politics.ox.ac.uk/publication/indian-newspapers-digital-transition"&gt;Reuters Institute for the Study of Journalism&lt;/a&gt; (December 08, 2016).&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Executive Summary&lt;/h2&gt;
&lt;p&gt;This report examines the digital transition underway at three leading newspapers in India, the &lt;em&gt;Dainik Jagran&lt;/em&gt; in Hindi, English-language &lt;em&gt;Hindustan Times&lt;/em&gt;, and &lt;em&gt;Malayala Manorama&lt;/em&gt; in Malayalam. Our focus is on how they are changing their newsroom organisation and journalistic work to expand their digital presence and adapt to a changing media environment.&lt;/p&gt;
&lt;p&gt;The background for the report is the rapid and continued growth in digital media use in India. Especially since 2010, internet use has grown at an explosive pace, driven by the spread of mobile web access, also outside large urban areas and the more affluent and highly educated English-language minority that have historically represented a large part of India’s internet users. Some analysts estimate more than 30% of Indians had some form of internet access by the end of 2015 (IAMAI-IMRB, 2015). With this growth has come a perceptible shift of audience attention and advertising investment away from legacy media like print and television and towards digital media. This shift has been accompanied by the launch of a number of new digital media start-ups in India and, especially, the growing role of large international technology companies investing in the Indian market.&lt;/p&gt;
&lt;p&gt;These developments present Indian newspapers with new challenges and opportunities. Print circulation and advertising is still growing in India, but more slowly than in the past, and especially the English-language market
seems saturated and ripe for the shift towards digital media that has happened elsewhere. From 2014 to 2015, the Indian advertising market grew by 13%. Print grew 8%, but English-language newspaper advertising only half of that. Digital advertising, in contrast, grew by 38%, and is projected to continue to grow for years to come as digital media become more central to India’s overall media environment (KPMG-FICCI, 2016).&lt;/p&gt;
&lt;p&gt;If they want to secure their long-term future and continued editorial and commercial success, Indian newspapers have to adapt to these changes. The three case studies in this report represent three different examples of how major newspapers are navigating this transition.&lt;/p&gt;
&lt;p&gt;Based on over 30 interviews conducted with senior management, editors, and rank-and-file reporters from three major newspapers, as well as other senior journalists and researchers who have wider experience in the Indian
news industry, plus secondary sources including industry reports and academic research, we show the following.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;All three newspapers are proactively investing in digital media technology and expertise, and adapting their editorial priorities, parts of their daily workflow, distribution strategies, and business model to the
rise of digital media. Tools like Chartbeat are now commonplace; search engine optimisation, social media optimisation, and audience analytics are part of everyday work; and some are experimenting with new
formats (&lt;em&gt;Hindustan Times&lt;/em&gt; was a launch partner for Facebook Instant Articles; &lt;em&gt;Manorama Online&lt;/em&gt; has produced both Virtual Reality and 360 videos, an Apple watch app, and is on Amazon Echo).&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Given that the print newspaper industry is still growing in India, especially in Indian-language markets, these newspapers are innovating from a position of relative strength in comparison to their North American and European counterparts. However, this is done with the awareness that that print is becoming a relatively less important part of the Indian media environment, and digital media more important. Short-term, reach and profits come from print, but longer term, all have to build a strong digital presence to succeed editorially and commercially.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;All three newspapers aim to do this by building on the assets they have as legacy media organisations, and trying to leverage their brand reputation, audience reach, and editorial resources to maintain an edge over digital news start-ups and international news providers. Their legacy, however, offers not only assets, but also liabilities. As successful incumbents, all of them struggle with the inertia that comes from established organisational structures and professional cultures. To change their organisation and culture, and thus more effectively combine new technologies and skills with existing core competences, each newspaper is not only investing in digital media and personnel, but also trying to change at least parts of the existing newspaper to adapt to an increasingly digital media environment.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;They do this in different ways. At &lt;em&gt;Dainik Jagran&lt;/em&gt; and &lt;em&gt;Malayala Manorama&lt;/em&gt;, the focus has been on building up separate digital operations at Jagran.com and Manorama Online, apart from the printed newspaper itself. At the &lt;em&gt;Hindustan Times&lt;/em&gt;, in contrast, the aim has been to integrate print and digital in a joint operation working across platforms and channels. &lt;em&gt;Dainik Jagran&lt;/em&gt; and &lt;em&gt;Malayala Manoroma&lt;/em&gt; have thus focused mostly on building up new digital assets, whereas the &lt;em&gt;Hindustan Times&lt;/em&gt; has been transforming existing assets to work across platforms. At &lt;em&gt;Dainik Jagran&lt;/em&gt; and &lt;em&gt;Malayala Manorama&lt;/em&gt;, much of the push for change has come from management, whereas there has been a stronger editorial involvement at the &lt;em&gt;Hindustan Times&lt;/em&gt;, and a greater attempt to engage rank-and-file reporters through training sessions and other initiative designed to demonstrate not only the commercial importance, but also the editorial potential, of digital media.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;All three newspapers have found that expanding their digital operations requires investment of money in new technologies and in staff with new skills. But it is also clear that this is not enough. Investment in technology has to be accompanied by a change in organisation and culture to effectively leverage existing assets in a digital media environment. In their attempts to do this, the most significant barriers have been a perceived cultural hierarchy, deeply ingrained especially in the newsroom, that print journalism is somehow inherently superior to
digital journalism, and a lack of effective synergy between editorial leaders and managers, often combined with a lack of technical know-how. Money can buy new tools and bring in new expertise, but it cannot on its own change culture, ensure synergy, or align the organisation with new priorities. This requires leadership and broad-based change. Long-term, senior editors, management, and rank-and-file reporters will have to work and change together to secure Indian newspapers’ role in an increasingly digital media environment.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Digital media thus present Indian newspapers with challenges and opportunities similar to those newspapers have faced elsewhere. Only they face these from a position of greater strength, because of the continued growth in their print business, and with the benefit of having seen how things have developed in more technologically developed markets. We hope this report will help them navigate the digital transition ahead.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/indian-newspapers-digital-transition'&gt;https://cis-india.org/raw/indian-newspapers-digital-transition&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>zeenab</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital News</dc:subject>
    
    
        <dc:subject>RAW Publications</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-12-09T07:12:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/technology-behind-big-data">
    <title>The Technology behind Big Data</title>
    <link>https://cis-india.org/internet-governance/blog/technology-behind-big-data</link>
    <description>
        &lt;b&gt;The authors undertakes a high-level literature review of the most commonly used technological tools and processes in the big data life cycle. The big data life cycle is a conceptual construct that can be used to study the various stages that typically occur in collecting, storing and analysing big data, along with the principles that can govern these processes.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/technology-behind-big-data.pdf/view"&gt;Download the Paper&lt;/a&gt; (PDF, 277 kb)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Defining big data is a disputed area in the field of computer science&lt;a name="_ftnref1" href="#_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, there is some consensus on a basic structure to its definition&lt;a name="_ftnref2" href="#_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. Big data is data that is collected in the form of datasets that has three main criteria: size, variety &amp;amp; velocity, all of which operate at an immense scale&lt;a name="_ftnref3" href="#_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. It is ‘big’ in size, often running into petabytes of information, has vast variety within its components, and is created, captured and analysed at an incredibly rapid velocity. All of this also makes big data difficult to handle using traditional technological tools and techniques.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This paper will attempt to perform a high-level literature review of the most commonly used technological tools and processes in the big data life cycle. The big data life cycle is a conceptual construct that can be used to study the various stages that typically occur in collecting, storing and analysing big data, along with the principles that can govern these processes. The big data life cycle consists of four components, which will also be the key structural points of the paper, namely: Data Acquisition, Data Awareness, Data Analytics &amp;amp; Data Governance.&lt;strong&gt;&lt;sup&gt;4&lt;/sup&gt; &lt;/strong&gt;The paper will focus on the aspects that the author believes are relevant for analysing the technological impact of big data on both technology itself and society at large.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Scope: &lt;/strong&gt;The scope of the paper is to study the technology used in big data using the "Life Cycle of Big Data" as model structure to categorise &amp;amp; study the vast range of technologies that are involved in big data. However, the paper will be limited to the study of technology related directly to the big data life cycle. It shall specifically exclude the use/utilisation of big data from its scope since big data is most often being fed into other, unrelated technologies for consumption leading to rather limitless possibilities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Goal:&lt;/strong&gt; Goal of the paper is twofold: a.) to use the available literature on the technological aspects of big data, to perform a brief overview of the technology in the field and b.) to frame the relevant research questions for studying the technology of big data and its possible impact on society.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Acquisition&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Acquiring big data has two main sub components to it, the first being sensing the existence of the data’ itself and the second, the stage of collecting and storing this data. Both of these subcomponents are incredibly diverse fields, with lots of rapid change occurring in the technology utilised to carry out these tasks. The section will provide a brief overview of the subcomponents and then discuss the technology used to fulfil the tasks.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Sensing&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Data does not exist in a vacuum and is always created as a part of a larger process, especially in the aspect of modern technology. Therefore, the source of the data itself plays a vital role in determining how it can be captured and analysed in the larger scheme of things. Entities constantly emit information into the environment that can be utilised for the purposes of big data, leading to two main kinds of data: data that is “born digital” or “born analogue.”&lt;a name="_ftnref4" href="#_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Born Digital Data&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Information that is “born digital,” is created, by a user or by a digital system, specifically for use by a computer or data‐processing system. This is a vast range of information and newer fields are being added to this category on a daily basis. It includes, as a short, indicative list: email and text messaging, any form of digital input, including keyboards, mouse interactions and touch screens, GPS location data, data from daily home appliances (Internet of Things), etc. All of this data can be tracked and tagged to users as well as be aggregated to form a larger picture, massively increasing the scope of what may constitute the ‘data’ in big data.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Some indicative uses of how such born digital data is catalogued by technological solutions on the user side, prior to being sent for collection/storage are:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a.) Cookies - There are small, often just text, files that are left on user devices by websites in order to that visit, task or action (for example, logging into an email account) with a subsequent event.&lt;a name="_ftnref5" href="#_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (for example, revisiting the website)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b.) Website Analytics&lt;a name="_ftnref6" href="#_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; - Various services, such as Google Analytics, Piwik, etc., can use JavaScript and other web development languages to record a very detailed, intimate track of a user's actions on a website, including how long a user hovers above a link, the time spent on the website/application and in some cases, even the time spent specific aspects of the page.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c.) GPS&lt;a name="_ftnref7" href="#_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; - With the almost pervasive usage of smartphones with basic location capabilities, GPS sensors on these devices are used to provide regular, minute driven updates to applications, operating systems and even third parties about the user's location. Modern variations such as A-GPS can be used to provide basic positioning information even without satellite coverage, vastly expanding the indoor capabilities of location collection.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;All of these instances of sensing born digital data are common terms, used in daily parlance by billions of people from all over the world, which is a symbolic of just how deeply they have pervaded into our daily lifestyle. Apart from privacy &amp;amp; security concerns this in turn also leads to an exponential increase in the data available to collect for any interested party.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Sensor Data&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Information is said to be&amp;nbsp; “analogue” when it contains characteristics of the physical world, such as images, video, heartbeats, etc.&amp;nbsp; Such information becomes electronic when processed by a “sensor,” a device that can record physical phenomena and convert it into digital information. Some examples to better illustrate information that is born analogue but collected via digital means are:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a.) Voice and/or video content on devices - Apart from phone calls and other forms communication, video and voice based interactions have started to regularly be captured to provide enhanced services. These include Google Now&lt;a name="_ftnref8" href="#_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Cortana&lt;a name="_ftnref9" href="#_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and other digital assistants as well as voice guided navigation systems in cars, etc.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b.) Personal health data such as heartbeats, blood pressure, respiration, velocity, etc. - This personal, potentially very powerful information is collected by dedicated sensors on devices such as Fitbit&lt;a name="_ftnref10" href="#_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Mi Band&lt;a name="_ftnref11" href="#_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, etc. as well as by increasingly sophisticated smartphone applications such as Google Fit that can do so without any special device.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c.) Camera on Home Appliances - Cameras and sensors on devices such as video game consoles (Kinect&lt;a name="_ftnref12" href="#_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; being a relevant example) can record detailed human interactions, which can be mined for vast amounts of information apart from carrying out the basic interactions with the devices itself.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While not as vast a category as born digital data, the increasingly lower costs of technology and ubiquitous usage of digital, networked devices is leading to information that was traditionally analogue in nature to be captured for use at a rapidly increasing rate.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Collection &amp;amp; Storage&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Traditional data was normally processed using the Extract, Transform, Load (ETL) methodology, which was used to collect the data from outside sources, modify the data to fit needs, and then upload the data into the data storage system for future use.&lt;a name="_ftnref13" href="#_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Technology such as spreadsheets, RDBMS databases, Structured Query Languages (SQL), etc. were all initially used to carry out these tasks, more often than not manually. &lt;a name="_ftnref14" href="#_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, for big data, the methodology traditionally followed is both inefficient and insufficient to meet the demands of modern use. Therefore, the Magnetic, Agile, Deep (MAD) process is used to collect and store data&lt;a name="_ftnref15" href="#_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;a name="_ftnref16" href="#_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. The needs and benefits of such a system are: attracting all the data sources regardless of their quality (magnetic), logical and physical contents of storage systems adapting to the rapid data evolution in big data (agile) and complex algorithmic statistical analysis required of big data on a very short notice&lt;a name="_ftnref17" href="#_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. (deep)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The technology used to perform data storage using the MAD process requires vast amount of processing power, which is very difficult to create in a single, physical space/unit for nonstate or research entities, who cannot afford supercomputers. Therefore, most solutions used in big data rely on two major components to store data: distributed systems and Massive Parallel Processing&lt;a name="_ftnref18" href="#_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (MPP) that run on non-relational (in-memory) database systems. Database performance and reliability is traditionally gauged using pure performance metrics (FLOPS per second, etc.) as well as the Atomicity, consistency, isolation, durability (ACID) criteria.&lt;a name="_ftnref19" href="#_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The most commonly used database systems for big data applications are given below. The specific operational qualities and performance of each of these databases is beyond the scope of this review but the common criteria that makes them well suited for big data storage have been delineated below.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Non-relational databases&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Databases traditionally used to be structured entities that operated solely on the ability to correlate information stored in them using explicitly defined relationships. Even prior to the advent of big data, this outlook was turning out to be a limiting factor in how large amounts of stored information could be leveraged, this led to the evolution of non relational database systems. Before going into them in detail, a basic primer on their data transfer protocols will be helpful in understanding their operation.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A protocol is a model that structures instructions in a particular manner so that it can be reproduced from one system to another&lt;a name="_ftnref20" href="#_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;a name="_ftnref21" href="#_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. The protocols which govern technology in the case of big data have gone through many stages of evolution, starting off with simple HTML based systems&lt;a name="_ftnref22" href="#_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, which then evolved to XML driven SOAP systems&lt;a name="_ftnref23" href="#_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, which led to JavaScript Object Notation, or JSON&lt;a name="_ftnref24" href="#_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, the currently used form for in most big database systems. JSON is an open format used to transfer data objects, using human-readable text and is the basis for most of the commonly used non-relational database management systems. Examples of Non-relational databases also known as NoSQL databases, include MongoDB&lt;a name="_ftnref25" href="#_ftn25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Couchbase&lt;a name="_ftnref26" href="#_ftn26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, etc. They were developed for both managing as well as storing unstructured data. They aim for scaling, flexibility, and simplified development. Such databases rather focus on the high-performance scalable data storage, and allow tasks to be written in the application layer instead of databases specific languages, allowing for greater interoperability.&lt;a name="_ftnref27" href="#_ftn27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;In-Memory Databases&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;In order to overcome performance limitation of traditional database systems, some modern databases now use in-memory databases. These systems manage the data in the RAM memory of the server, thus eliminating storage disk input/output. This allows for almost realtime responses from the database, in comparisons to minutes or hours required on traditional database systems. This improvement in the performance is so massive that, entirely new applications are being developed for using IMDB systems.&lt;a name="_ftnref28" href="#_ftn28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These IMDB systems are also being used for advanced analytics on big data, especially to increase the access speed to data and increase the scoring rate of analytic models for analysis.&lt;a name="_ftnref29" href="#_ftn29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Examples of IMDB include VoltDB&lt;a name="_ftnref30" href="#_ftn30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, NuoDB&lt;a name="_ftnref31" href="#_ftn31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, SolidDB&lt;a name="_ftnref32" href="#_ftn32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and Apache Spark&lt;a name="_ftnref33" href="#_ftn33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Hybrid Systems&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;These are the two major systems used to store data prior to it being processed or analysed in a big data application. However, the divide between data storage and data management is a slim one and most database systems also contain various unique attributes that cater them to specific kinds of analysis. (as can be seen from the IMDB example above) One example of a very commonly used Hybrid system that deals with storage as well as awareness of the data is Apache Hadoop&lt;sup&gt;33&lt;/sup&gt;, which is detailed below.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Apache Hadoop&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Hadoop consists of two main components: the HDFS for the big data storage, and MapReduce for big data analytics, each of which will be detailed in their respective section.&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;The HDFS&lt;a name="_ftnref34" href="#_ftn34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;a name="_ftnref35" href="#_ftn35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; storage function in Hadoop provides a reliable distributed file system, stored across multiple systems for processing &amp;amp; redundancy reasons. The file system is optimized for large files, as single files are split into blocks and spread across systems known as cluster nodes.&lt;a name="_ftnref36" href="#_ftn36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Additionally, the data is protected among the nodes by a replication mechanism, which ensures availability even if any node fails. Further, there are two types of nodes: Data Nodes and Name Nodes.&lt;a name="_ftnref37" href="#_ftn37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Data is stored in the form of file blocks across the multiple Data Nodes while the Name Node acts as an intermediary between the client and the Data Node, where it directs the requesting client to the particular Data Node which contains the requested data.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;This operating structure for storing data also has various variations within Hadoop such as HBase for key/value pair type queries (a NoSQL based system), Hive for relational type queries, etc. Hadoop’s redundancy, speed, ability to run on commodity hardware, industry support and rapid pace of development have led to it being almost co-equivalently associated with big data.&lt;a name="_ftnref38" href="#_ftn38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Awareness&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Data Awareness, in the context of big data, is the task of creating a scheme of relationships within a set of data, to allow different users of the data to determine a fluid yet valid context and utilise it for their desired tasks.&lt;a name="_ftnref39" href="#_ftn39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It is a relatively new field, in which most of the work is currently being done on semantic structures to allow data to gain context in an interoperable format, in contrast to the current system where data is given context using unique, model specific constructs.&lt;a name="_ftnref40" href="#_ftn40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (such as XML Schemes, etc.)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Some of the original work on this field was carried out in the form of utilising the Resource Description Framework (RDF), which was built primarily to allow describing of data in a portable manner, especially being agnostic towards platforms and systems for Semantic Web at the W3C. SPARQL is the language used to implement RDF based designs but both largely remain underutilised in both the public domain as well as big data. Authors such as Kurt&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Cagle&lt;a name="_ftnref41" href="#_ftn41"&gt;&lt;sup&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and Bob DuCharme&lt;a name="_ftnref42" href="#_ftn42"&gt;&lt;sup&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; predict its explosion in the next couple of years. Companies have also started realising the value of interoperable context, with Oracle Spatial&lt;a name="_ftnref43" href="#_ftn43"&gt;&lt;sup&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and IBM’s DB2&lt;a name="_ftnref44" href="#_ftn44"&gt;&lt;sup&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; already including RDF and SPARQL support in the past 3 years.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While underutilised, the rapid developments taking place in the field will make the impact that data awareness may have on big data as big as Hadoop and maybe even SQL. Some aspects of it are already beginning to be used in Artificial Intelligence, Natural Language Processing, etc. with tremendous scope for development.&lt;a name="_ftnref45" href="#_ftn45"&gt;&lt;sup&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Processing &amp;amp; Analytics&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Data Processing largely has three primary goals: a. determines if the data collected is internally consistent; b. make the data meaningful to other systems or users using either metaphors or analogy they can understand; and (what many consider most importantly) provide predictions about future events and behaviours based upon past data and trends.&lt;a name="_ftnref46" href="#_ftn46"&gt;&lt;sup&gt;&lt;sup&gt;[46]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Being a very vast field with rapidly changing technologies governing its operation, this section will largely concentrate on the most commonly used technologies in data analytics.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Data analytics requires four primary conditions to be met in order to carry out effective processing: fast, data loading, fast query processing, efficient utilisation of storage and adaptivity to dynamic workload patterns. The analytical model most commonly associated with meeting this criteria and with big data in general is MapReduce, detailed below. There are other, more niche models and algorithms (such as Project Voldemort&lt;a name="_ftnref47" href="#_ftn47"&gt;&lt;sup&gt;&lt;sup&gt;[47]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; used by LinkedIn), which are used in big data but they are beyond the scope of the review, and more information about them can be read at article linked in the previous citation. (Reference architecture and classification of technologies, products and services for big data system)&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;MapReduce&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;MapReduce is a generic parallel programming concept, derived from the “Map” and “Reduce” of functional programming languages, which makes it particularly suited for big data operations. It is at the core of Hadoop&lt;a name="_ftnref48" href="#_ftn48"&gt;&lt;sup&gt;&lt;sup&gt;[48]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and performs the data processing and analytics functions in other big data systems as well.&lt;a name="_ftnref49" href="#_ftn49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The fundamental premise of MapReduce is scaling out rather than scaling up, i.e., (adding more numerical resources, rather than increasing the power of a single system)&lt;a name="_ftnref50" href="#_ftn50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;MapReduce operates by breaking a task down into steps and executing the steps in parallel, across many systems. This comes with two advantages, a reduction in the time needed to finish the task and also a decrease in the amount of resources one has to expend to perform the task, in both power and energy. This model makes it ideally suited for the large data sets and quick response times required of big data operations generally.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The first step of a MapReduce job is to correlate the input values to a set of keys/value pairs as output. The “Map” function then partitions the processing tasks into smaller tasks, and assigns them to the appropriate key/value pairs.&lt;a name="_ftnref51" href="#_ftn51"&gt;&lt;sup&gt;&lt;sup&gt;[51]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This allows unstructured data, such as plain text, to be mapped to a structured key/value pair. As an example, the key could be the punctuation in a sentence and the value of the pair could be the number of occurrences of the punctuation overall. This output of the Map function is then passed on “Reduce” function.&lt;a name="_ftnref52" href="#_ftn52"&gt;&lt;sup&gt;&lt;sup&gt;[52]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Reduce then collects and combines this output, using identical key/value pairs, to provide the final result of the task.&lt;a name="_ftnref53" href="#_ftn53"&gt;&lt;sup&gt;&lt;sup&gt;[53]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These steps are carried using the Job Tracker &amp;amp; Task Tracker in Hadoop but different systems have different methodologies to carry out similar tasks.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Governance&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Data Governance is the act of managing raw big data as well as the processed information that arises from big data in order to meet legal, regulatory and business imposed requirements. While there is no standardized format for data governance, there have been increasing call with various sectors (especially healthcare) to create such a format to ensure reliable, secure and consistent big data utilisation across the board. The following tactics and techniques have been utilised or suggested for data governance, with varying degrees of success:&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;Zero-knowledge systems&lt;/strong&gt;: This technological proposal maintains secrecy with respect to the low-level data while allowing encrypted data to be examined for certain higherlevel abstractions.&lt;a name="_ftnref54" href="#_ftn54"&gt;&lt;sup&gt;&lt;sup&gt;[54]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For the system to be zero-knowledge, the client’s system will have to encrypt the data and send it to the storage provider. Due to this, the provider stores the data in the encrypted format and cannot decipher the same unless he/she is in possession of the key which will decrypt the data into plaintext. This allows the individual to store his data with a storage provider while also maintaining anonymity of the details contained in such information. However, these are currently just beginning to be used in simple situations. As of now, they are not expandable to unstructured and complex cases and have to be developed marginally before they can be used for research and data mining purposes.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Homomorphic encryption&lt;/strong&gt;: Homomorphic encryption is a privacy preserving technique which performs searches and other computations over data that is encrypted while also protecting the individual’s privacy.&lt;a name="_ftnref55" href="#_ftn55"&gt;&lt;sup&gt;&lt;sup&gt;[55]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This technique has however been considered to be impractical and is deemed to be an unlikely policy alternative for near future purposes in the context of preserving privacy in the age of big data.&lt;a name="_ftnref56" href="#_ftn56"&gt;&lt;sup&gt;&lt;sup&gt;[56]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Multi-party computation&lt;/strong&gt;: In this technique, computation is done on encrypted distributed data stores.&lt;a name="_ftnref57" href="#_ftn57"&gt;&lt;sup&gt;&lt;sup&gt;[57]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This mechanism is closely related to homomorphic encryption where individual data is kept private using encryption algorithms called “collusion-robust” while the same is used to calculate statistics.&lt;a name="_ftnref58" href="#_ftn58"&gt;&lt;sup&gt;&lt;sup&gt;[58]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The parties involved are aware of some private data and each of them use a protocol which produces results based on the information they are aware of and the information they are not aware of, without revealing the data they are not already aware of.&lt;a name="_ftnref59" href="#_ftn59"&gt;&lt;sup&gt;&lt;sup&gt;[59]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Multi-party computations thus help in generating useful data for statistical and research purposes without compromising the privacy of the individuals.&lt;/li&gt;&lt;/ol&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;Differential Privacy&lt;/strong&gt;: Although this technological development is related to encryption, it follows a different technique. Differential privacy aims at maximizing the precision of computations and database queries while reducing the identifiability of the data owners who have records in the database, usually through obfuscation of query results.&lt;a name="_ftnref60" href="#_ftn60"&gt;&lt;sup&gt;&lt;sup&gt;[60]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This is widely applied today in the existence of big data in order to ensure preservation of privacy while trying to reap the benefits of large scale data collection.&lt;a name="_ftnref61" href="#_ftn61"&gt;&lt;sup&gt;&lt;sup&gt;[61]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Searchable encryption&lt;/strong&gt;: Through this mechanism, the data subject can make certain data searchable while minimizing exposure and maximizing privacy.&lt;a name="_ftnref62" href="#_ftn62"&gt;&lt;sup&gt;&lt;sup&gt;[62]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The data owner can make his information available through search engines by providing the data in an encrypted format but by adding tags consisting of certain keywords which can be deciphered by the search engine. This encrypted data shows up in the search results when searched with these particular keywords but can only be read when the person is in possession of the key which is required for decrypting the information.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;This technique of encryption provides maximum security to the individual’s data and preserves privacy to the greatest possible extent.&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;K-anonymity&lt;/strong&gt;: The property of k-anonymity is being applied in the present day in order to preserve privacy and avoid re-identification.&lt;a name="_ftnref63" href="#_ftn63"&gt;&lt;sup&gt;&lt;sup&gt;[63]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; A certain data set is said to possess the property of k-anonymity if individual specific data can be released and used for various purposes without re-identification. The analysis of the data should be carried out without attributing the data to the individual to whom it belongs and should give scientific guarantees for the same.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Identity Management Systems&lt;/strong&gt;: These systems enable the individuals to establish and safeguard their identities, explain those identities with the help of attributes, follow the activity of their identities and also delete their identities if they wish to.&lt;a name="_ftnref64" href="#_ftn64"&gt;&lt;sup&gt;&lt;sup&gt;[64]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It uses cryptographic schemes and protocols to make anonymous or pseudonymous the identities and credentials of the individuals before analysing the data.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Privacy Preserving Data Publishing&lt;/strong&gt;: This is a method in which the analysts are provided with the individual’s personal information with the ability to decipher particular information from the database while preventing the inference of certain other information which might lead to a breach of privacy.&lt;a name="_ftnref65" href="#_ftn65"&gt;&lt;sup&gt;&lt;sup&gt;[65]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Data which is essential for the analysis will be provided for processing while sensitive data will not be disclosed. This tool primarily focuses on microdata.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Privacy Preserving Data Mining&lt;/strong&gt;: This mechanism uses perturbation methods and randomization along with cryptography in order to permit data mining on a filtered version of the data which does not contain any form of sensitive information. PPDM focuses on data mining results unlike PPDP.&lt;a name="_ftnref66" href="#_ftn66"&gt;&lt;sup&gt;&lt;sup&gt;[66]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/li&gt;&lt;/ol&gt;
&lt;h2 style="text-align: justify;"&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Studying the technology surrounding big data has led to two major observations: the rapid pace of development in the industry and the stark lack of industry standards or government regulations directed towards big data technologies. These observations have been the primary motivating factor for framing further research in the field. Understanding how to deal with big data technologically, rather than just the potential regulation of possible harms after the technological processes have been performed might be critical for the human rights dialogue as these processes become even more extensive, opaque and technologically complicated.&lt;/p&gt;
&lt;hr style="text-align: justify;" /&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;[1]&lt;/a&gt; EMC: Data Science and Big Data Analytics. In: EMC Education Services, pp. 1–508 (2012)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;[2]&lt;/a&gt; Bakshi, K.: Considerations for Big Data: Architecture and Approaches. In: Proceedings of the IEEE Aerospace Conference, pp. 1–7 (2012)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn3" href="#_ftnref3"&gt;[3]&lt;/a&gt; Adams, M.N.: Perspectives on Data Mining. International Journal of Market Research 52(1), 11–19 (2010) &lt;sup&gt;4&lt;/sup&gt; Elgendy, N.: Big Data Analytics in Support of the Decision Making Process. MSc Thesis, German University in Cairo, p. 164 (2013)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn4" href="#_ftnref4"&gt;[4]&lt;/a&gt; Big Data and Privacy: A Technological Perspective - President’s &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Council of Advisors on Science and&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Technology (May 2014)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn5" href="#_ftnref5"&gt;[5]&lt;/a&gt; Chen, Hsinchun, Roger HL Chiang, and Veda C. Storey. "Business Intelligence and Analytics: From Big Data to Big Impact." MIS quarterly 36.4 (2012): 1165-1188.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn6" href="#_ftnref6"&gt;[6]&lt;/a&gt; Chandramouli, Badrish, Jonathan Goldstein, and Songyun Duan. "Temporal analytics on big data for web advertising." 2012 IEEE 28th international conference on data engineering. IEEE, 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn7" href="#_ftnref7"&gt;[7]&lt;/a&gt; Laurila, Juha K., et al. "The mobile data challenge: Big data for mobile computing research." Pervasive Computing. No. EPFL-CONF-192489. 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn8" href="#_ftnref8"&gt;[8]&lt;/a&gt; Lazer, David, et al. "The parable of Google flu: traps in big data analysis." &lt;em&gt;Science&lt;/em&gt; 343.6176 (2014): 12031205.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn9" href="#_ftnref9"&gt;[9]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn10" href="#_ftnref10"&gt;[10]&lt;/a&gt; Banaee, Hadi, Mobyen Uddin Ahmed, and Amy Loutfi. "Data mining for wearable sensors in health monitoring systems: a review of recent trends and challenges." &lt;em&gt;Sensors&lt;/em&gt; 13.12 (2013): 17472-17500.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn11" href="#_ftnref11"&gt;[11]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn12" href="#_ftnref12"&gt;[12]&lt;/a&gt; Chung, Eric S., John D. Davis, and Jaewon Lee. "Linqits: Big data on little clients." &lt;em&gt;ACM SIGARCH Computer Architecture News&lt;/em&gt;. Vol. 41. No. 3. ACM, 2013.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn13" href="#_ftnref13"&gt;[13]&lt;/a&gt; Kornelson, Kevin Paul, et al. "Method and system for developing extract transform load systems for data warehouses." U.S. Patent No. 7,139,779. 21 Nov. 2006.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn14" href="#_ftnref14"&gt;[14]&lt;/a&gt; Henry, Scott, et al. "Engineering trade study: extract, transform, load tools for data migration." &lt;em&gt;2005 IEEE Design Symposium, Systems and Information Engineering&lt;/em&gt;. IEEE, 2005.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn15" href="#_ftnref15"&gt;[15]&lt;/a&gt; Cohen, Jeffrey, et al. "MAD skills: new analysis practices for big data." &lt;em&gt;Proceedings of the VLDB Endowment&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn16" href="#_ftnref16"&gt;[16]&lt;/a&gt; .2 (2009): 1481-1492.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn17" href="#_ftnref17"&gt;[17]&lt;/a&gt; Elgendy, Nada, and Ahmed Elragal. "Big data analytics: a literature review paper." &lt;em&gt;Industrial Conference on Data Mining&lt;/em&gt;. Springer International Publishing, 2014.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn18" href="#_ftnref18"&gt;[18]&lt;/a&gt; Wu, Xindong, et al. "Data mining with big data." &lt;em&gt;IEEE transactions on knowledge and data engineering&lt;/em&gt; 26.1 (2014): 97-107.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn19" href="#_ftnref19"&gt;[19]&lt;/a&gt; Supra Note 17&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn20" href="#_ftnref20"&gt;[20]&lt;/a&gt; Hu, Han, et al. "Toward scalable systems for big data analytics: A technology tutorial." &lt;em&gt;IEEE Access&lt;/em&gt; 2 (2014):&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn21" href="#_ftnref21"&gt;[21]&lt;/a&gt; -687.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn22" href="#_ftnref22"&gt;[22]&lt;/a&gt; Kurt Cagle, Understanding the Big Data Lifecycle - LinkedIn Pulse (2015)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn23" href="#_ftnref23"&gt;[23]&lt;/a&gt; Coyle, Frank P. &lt;em&gt;XML, Web services, and the data revolution&lt;/em&gt;. Addison-Wesley Longman Publishing Co., Inc., 2002.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn24" href="#_ftnref24"&gt;[24]&lt;/a&gt; Pautasso, Cesare, Olaf Zimmermann, and Frank Leymann. "Restful web services vs. big'web services: making the right architectural decision." &lt;em&gt;Proceedings of the 17th international conference on World Wide Web&lt;/em&gt;. ACM, 2008.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn25" href="#_ftnref25"&gt;[25]&lt;/a&gt; Banker, Kyle. &lt;em&gt;MongoDB in action&lt;/em&gt;. Manning Publications Co., 2011&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn26" href="#_ftnref26"&gt;[26]&lt;/a&gt; McCreary, Dan, and Ann Kelly. "Making sense of NoSQL." &lt;em&gt;Shelter Island: Manning&lt;/em&gt; (2014): 19-20.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn27" href="#_ftnref27"&gt;[27]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn28" href="#_ftnref28"&gt;[28]&lt;/a&gt; Zhang, Hao, et al. "In-memory big data management and processing: A survey." &lt;em&gt;IEEE Transactions on Knowledge and Data Engineering&lt;/em&gt; 27.7 (2015): 1920-1948.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn29" href="#_ftnref29"&gt;[29]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn30" href="#_ftnref30"&gt;[30]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn31" href="#_ftnref31"&gt;[31]&lt;/a&gt; Supra Note 20&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn32" href="#_ftnref32"&gt;[32]&lt;/a&gt; Ballard, Chuck, et al. &lt;em&gt;IBM solidDB: Delivering Data with Extreme Speed&lt;/em&gt;. IBM Redbooks, 2011.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn33" href="#_ftnref33"&gt;[33]&lt;/a&gt; Shanahan, James G., and Laing Dai. "Large scale distributed data science using apache spark." &lt;em&gt;Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining&lt;/em&gt;. ACM, 2015. &lt;sup&gt;33&lt;/sup&gt; Shvachko, Konstantin, et al. "The hadoop distributed file system." &lt;em&gt;2010 IEEE 26th symposium on mass storage systems and technologies (MSST)&lt;/em&gt;. IEEE, 2010.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn34" href="#_ftnref34"&gt;[34]&lt;/a&gt; Borthakur, Dhruba. "The hadoop distributed file system: Architecture and design." &lt;em&gt;Hadoop Project Website&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn35" href="#_ftnref35"&gt;[35]&lt;/a&gt; .2007 (2007): 21.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn36" href="#_ftnref36"&gt;[36]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn37" href="#_ftnref37"&gt;[37]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn38" href="#_ftnref38"&gt;[38]&lt;/a&gt; Zikopoulos, Paul, and Chris Eaton. &lt;em&gt;Understanding big data: Analytics for enterprise class hadoop and streaming data&lt;/em&gt;. McGraw-Hill Osborne Media, 2011.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn39" href="#_ftnref39"&gt;[39]&lt;/a&gt; Bizer, Christian, et al. "The meaningful use of big data: four perspectives--four challenges." &lt;em&gt;ACM SIGMOD Record&lt;/em&gt; 40.4 (2012): 56-60.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn40" href="#_ftnref40"&gt;[40]&lt;/a&gt; Kaisler, Stephen, et al. "Big data: issues and challenges moving forward." &lt;em&gt;System Sciences (HICSS), 2013 46th Hawaii International Conference on&lt;/em&gt;. IEEE, 2013.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn41" href="#_ftnref41"&gt;[41]&lt;/a&gt; Supra Note 21&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn42" href="#_ftnref42"&gt;[42]&lt;/a&gt; DuCharme, Bob. "What Do RDF and SPARQL bring to Big Data Projects?." &lt;em&gt;Big Data&lt;/em&gt; 1.1 (2013): 38-41.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn43" href="#_ftnref43"&gt;[43]&lt;/a&gt; Zhong, Yunqin, et al. "Towards parallel spatial query processing for big spatial data." &lt;em&gt;Parallel and &lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Distributed Processing Symposium Workshops &amp;amp; PhD Forum (IPDPSW), 2012 IEEE 26th International&lt;/em&gt;. IEEE, 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn44" href="#_ftnref44"&gt;[44]&lt;/a&gt; Ma, Li, et al. "Effective and efficient semantic web data management over DB2." &lt;em&gt;Proceedings of the 2008 ACM SIGMOD international conference on Management of data&lt;/em&gt;. ACM, 2008.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn45" href="#_ftnref45"&gt;[45]&lt;/a&gt; Lohr, Steve. "The age of big data." &lt;em&gt;New York Times&lt;/em&gt; 11 (2012).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn46" href="#_ftnref46"&gt;[46]&lt;/a&gt; Pääkkönen, Pekka, and Daniel Pakkala. "Reference architecture and classification of technologies, products and services for big data systems." &lt;em&gt;Big Data Research&lt;/em&gt; 2.4 (2015): 166-186.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn47" href="#_ftnref47"&gt;[47]&lt;/a&gt; Sumbaly, Roshan, et al. "Serving large-scale batch computed data with project voldemort." &lt;em&gt;Proceedings of the 10th USENIX conference on File and Storage Technologies&lt;/em&gt;. USENIX Association, 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn48" href="#_ftnref48"&gt;[48]&lt;/a&gt; Bar-Sinai, Michael. "Big Data Technology Literature Review." &lt;em&gt;arXiv preprint arXiv:1506.08978&lt;/em&gt; (2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn49" href="#_ftnref49"&gt;[49]&lt;/a&gt; ibid&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn50" href="#_ftnref50"&gt;[50]&lt;/a&gt; Condie, Tyson, et al. "MapReduce Online." &lt;em&gt;Nsdi&lt;/em&gt;. Vol. 10. No. 4. 2010.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn51" href="#_ftnref51"&gt;[51]&lt;/a&gt; Supra Note 47&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn52" href="#_ftnref52"&gt;[52]&lt;/a&gt; Dean, Jeffrey, and Sanjay Ghemawat. "MapReduce: a flexible data processing tool." &lt;em&gt;Communications of the ACM&lt;/em&gt; 53.1 (2010): 72-77.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn53" href="#_ftnref53"&gt;[53]&lt;/a&gt; ibid&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn54" href="#_ftnref54"&gt;[54]&lt;/a&gt; Big Data &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; and &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Privacy: &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A &amp;nbsp;&amp;nbsp; Technological Perspective, &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; White &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; House,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy__may_2014&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn55" href="#_ftnref55"&gt;[55]&lt;/a&gt; Tene, Omer, and Jules Polonetsky. "Big data for all: Privacy and user control in the age of analytics." &lt;em&gt;Nw. J. Tech. &amp;amp; Intell. Prop.&lt;/em&gt; 11 (2012): xxvii.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn56" href="#_ftnref56"&gt;[56]&lt;/a&gt; Big Data &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; and &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Privacy: &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A &amp;nbsp;&amp;nbsp; Technological Perspective, &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; White &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; House,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy__may_2014&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn57" href="#_ftnref57"&gt;[57]&lt;/a&gt; Privacy by design in big data, ENISA&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn58" href="#_ftnref58"&gt;[58]&lt;/a&gt; Big Data &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; and &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Privacy: &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A &amp;nbsp;&amp;nbsp; Technological Perspective, &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; White &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; House,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy__may_2014&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn59" href="#_ftnref59"&gt;[59]&lt;/a&gt; Id&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn60" href="#_ftnref60"&gt;[60]&lt;/a&gt; Id&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn61" href="#_ftnref61"&gt;[61]&lt;/a&gt; Tene, Omer, and Jules Polonetsky. "Privacy in the age of big data: a time for big decisions." &lt;em&gt;Stanford Law Review Online&lt;/em&gt; 64 (2012): 63.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn62" href="#_ftnref62"&gt;[62]&lt;/a&gt; Lane, Julia, et al., eds. &lt;em&gt;Privacy, big data, and the public good: Frameworks for engagement&lt;/em&gt;. Cambridge University Press, 2014.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn63" href="#_ftnref63"&gt;[63]&lt;/a&gt; Crawford, Kate, and Jason Schultz. "Big data and due process: Toward a framework to redress predictive privacy harms." &lt;em&gt;BCL Rev.&lt;/em&gt; 55 (2014): 93.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn64" href="#_ftnref64"&gt;[64]&lt;/a&gt; http://homes.esat.kuleuven.be/~sguerses/papers/DanezisGuersesSurveillancePets2010.pdf&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn65" href="#_ftnref65"&gt;[65]&lt;/a&gt; Seda Gurses and George Danezis, A critical review of 10 years of privacy technology, August 12th 2010, http://homes.esat.kuleuven.be/~sguerses/papers/DanezisGuersesSurveillancePets2010.pdf&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn66" href="#_ftnref66"&gt;[66]&lt;/a&gt; Id&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/technology-behind-big-data'&gt;https://cis-india.org/internet-governance/blog/technology-behind-big-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Geethanjali Jujjavarapu and Udbhav Tiwari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-12-04T09:53:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/irc17-selection">
    <title> Internet Researchers' Conference 2017 (IRC17) - Selection of Sessions</title>
    <link>https://cis-india.org/raw/irc17-selection</link>
    <description>
        &lt;b&gt;We have a wonderful range of session proposals for the second Internet Researchers' Conference (IRC17) to take place in Bengaluru on March 03-05, 2017. From the 23 submitted session proposals, we will now select 10 to be part of the final Conference agenda. The selection will be done through votes casted by the teams that have proposed the sessions. This will take place in December 2016. Before that, we invite the session teams and other contributors to share their comments and suggestions on the submitted sessions. Please share your comments by December 14, either on session pages directly, or via email (sent to raw at cis-india dot org).&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Internet Researchers' Conference 2017 (IRC17) will be organised by the Centre for Internet and Society (CIS) in partnership with the &lt;a href="http://citapp.iiitb.ac.in/"&gt;Centre for Information Technology and Public Policy&lt;/a&gt; at the International Institute of Information Technology Bangalore (IIIT-B).&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;Proposed Sessions&lt;/strong&gt;&lt;/h3&gt;
&lt;h4&gt;01. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/notfewnotweird.html" target="_blank"&gt;#NotFewNotWeird&lt;/a&gt; (Surfatial: Malavika Rajnarayan, Prayas Abhinav, and Satya Gummuluri)&lt;/h4&gt;
&lt;h4&gt;02. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/virtualfringe.html" target="_blank"&gt;#VirtualFringe&lt;/a&gt; (Ritika Pant, Sagorika Singha, and Vibhushan Subba)&lt;/h4&gt;
&lt;h4&gt;03. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/studentindicusageonline.html" target="_blank"&gt;#StudentIndicUsageOnline&lt;/a&gt; (Shruti Nagpal and Sneha Verghese)&lt;/h4&gt;
&lt;h4&gt;04. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/speakmylanguageinternet.html" target="_blank"&gt;#SpeakMyLanguageInternet&lt;/a&gt; (Anubhuti Yadav, Sunetra Sen Narayan, Shalini Narayanan, Anand Pradhan, and Shashwati Goswami)&lt;/h4&gt;
&lt;h4&gt;05. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/archivesforstorytelling.html" target="_blank"&gt;#ArchivesForStorytelling&lt;/a&gt; (V Jayant, Venkat Srinivasan, Chaluvaraju, Bhanu Prakash, and Dinesh)&lt;/h4&gt;
&lt;h4&gt;06. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/selfiesfromthefield.html" target="_blank"&gt;#SelfiesFromTheField&lt;/a&gt; (Kavitha Narayanan, Oindrila Matilal and Onkar Hoysala)&lt;/h4&gt;
&lt;h4&gt;07. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/openaccessscholarlypublishing.html" target="_blank"&gt;#OpenAccessScholarlyPublishing&lt;/a&gt; (Nirmala Menon, Abhishek Shrivastava and Dibyaduti Roy)&lt;/h4&gt;
&lt;h4&gt;08. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/digitalpedagogies.html" target="_blank"&gt;#DigitalPedagogies&lt;/a&gt; (Nidhi Kalra, Ashutosh Potdar, and Ravikant Kisana)&lt;/h4&gt;
&lt;h4&gt;09. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/digitalmusicanddigitalreactions.html" target="_blank"&gt;#DigitalMusicAndDigitalReactions&lt;/a&gt; (Shivangi Narayan and Sarvpriya Raj)&lt;/h4&gt;
&lt;h4&gt;10. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/renarrationweb.html" target="_blank"&gt;#RenarrationWeb&lt;/a&gt; (Dinesh, Venkatesh Choppella, Srinath Srinivasa, and Deepak Prince)&lt;/h4&gt;
&lt;h4&gt;11. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/indiclanguagesandinternetcohabitation.html" target="_blank"&gt;IndicLanguagesAndInternetCoHabitation&lt;/a&gt; (Sreedhar Kallahalla, Ranjeet Kumar, Mohan Rao, and Anjali K. Mohan)&lt;/h4&gt;
&lt;h4&gt;12. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/digitalpedagogy.html" target="_blank"&gt;#DigitalPedagogy&lt;/a&gt; (Padmini Ray Murray and Dibyaduti Roy)&lt;/h4&gt;
&lt;h4&gt;13. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/copyleftrightleft.html" target="_blank"&gt;#CopyLeftRightLeft&lt;/a&gt; (Ravishankar Ayyakkannu and Srikanth Lakshmanan)&lt;/h4&gt;
&lt;h4&gt;14. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/objectsofdigitalgovernance.html" target="_blank"&gt;#ObjectsofDigitalGovernance&lt;/a&gt; (Marine Al Dahdah, Rajiv K. Mishra, Khetrimayum Monish Singh, and Sohan Prasad Sha)&lt;/h4&gt;
&lt;h4&gt;15. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/materializingwriting.html" target="_blank"&gt;#MaterializingWriting&lt;/a&gt; (Sneha Puthiya Purayil, Padmini Ray Murray, Dibyadyuti Roy, and Indrani Roy)&lt;/h4&gt;
&lt;h4&gt;16. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/dotbharatadoption.html" target="_blank"&gt;#DotBharatAdoption&lt;/a&gt; (V. Sridhar and Amit Prakash)&lt;/h4&gt;
&lt;h4&gt;17. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/digitaldesires.html" target="_blank"&gt;#DigitalDesires&lt;/a&gt; (Dhiren Borisa, Akhil Kang, and Dhrubo Jyoti)&lt;/h4&gt;
&lt;h4&gt;18. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/thedigitalcommonplace.html" target="_blank"&gt;#TheDigitalCommonplace&lt;/a&gt; (Ammel Sharon and Sujeet George)&lt;/h4&gt;
&lt;h4&gt;19. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/digitalidentities.html" target="_blank"&gt;#DigitalIdentities&lt;/a&gt; (Janaki Srinivasan, Savita Bailur, Emrys Schoemaker, Jonathan Donner, and Sarita Seshagiri)&lt;/h4&gt;
&lt;h4&gt;20. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/toolstoamultitextuniverse.html" target="_blank"&gt;#ToolsToAMultitextUniverse&lt;/a&gt; (Spandana Bhowmik and Sunanda Bose)&lt;/h4&gt;
&lt;h4&gt;21. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/digitalisingknowledge.html" target="_blank"&gt;#DigitalisingKnowledge&lt;/a&gt; (Sneha Ragavan)&lt;/h4&gt;
&lt;h4&gt;22. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/ICTDethics.html" target="_blank"&gt;#ICTDEthics&lt;/a&gt; (Bidisha Chaudhuri, Andy Dearden, Linus Kendall, Dorothea Kleine, and Janaki Srinivasan)&lt;/h4&gt;
&lt;h4&gt;23. &lt;a href="https://cis-india.github.io/irc/irc17/sessions/representationandpower.html" target="_blank"&gt;#RepresentationAndPower&lt;/a&gt; (Bidisha Chaudhuri, Andy Dearden, Linus Kendall, Dorothea Kleine, and Janaki Srinivasan)&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/irc17-selection'&gt;https://cis-india.org/raw/irc17-selection&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>Internet Researcher's Conference</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Learning</dc:subject>
    
    
        <dc:subject>IRC17</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-12-12T13:37:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/internets-core-resources-are-a-global-public-good">
    <title>Internet's Core Resources are a Global Public Good - They Cannot Remain Subject to One Country's Jurisdiction</title>
    <link>https://cis-india.org/internet-governance/blog/internets-core-resources-are-a-global-public-good</link>
    <description>
        &lt;b&gt;This statement was issued by 8 India civil society organizations, supported by 2 key global networks, involved with internet governance issues, to the meeting of ICANN in Hyderabad, India from 3 to 9 November 2016. The Centre for Internet &amp; Society was one of the 8 organizations that drafted this statement.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;Recently, the US gave up its role of signing entries to the Internet's root zone file, which represents the addressing system for the global Internet. This is about the Internet addresses that end with .com, .net, and so on, and the numbers associated with each of them that help us navigate the Internet. We thank and congratulate the US government for taking this important step in the right direction. However, the organisation that manages this system, ICANN,&lt;a href="#ftn1"&gt;[1]&lt;/a&gt; a US non-profit, continues to be under US jurisdiction, and hence subject to its courts, legislature and executive agencies. Keeping such an important global public infrastructure under US jurisdiction is expected to become a very problematic means of extending US laws and policies across the world.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We the undersigned therefore appeal that urgent steps be taken to transit ICANN from its current US jurisdiction. Only then can ICANN become a truly global organisation.&lt;a href="#ftn2"&gt;[2]&lt;/a&gt; We would like to make it clear that our objection is not directed particularly against the US; we are simply against an important global public infrastructure being subject to a single country's jurisdiction.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Domain name system as a key lever of global control&lt;/strong&gt;&lt;br /&gt;A few new top level domains like .xxx and .africa are already under litigation in the US, whereby there is every chance that its law could interfere with ICANN's (global) policy decisions. Businesses in different parts of the world seeking top level domain names like .Amazon, and, hypothetically, .Ghaniancompany, will have to be mindful of de facto extension of US jurisdiction over them. US agencies can nullify the allocation of such top level domain names, causing damage to a business similar to that of losing a trade name, plus losing all the 'connections', including email based ones, linked to that domain name. For instance, consider the risks that an Indian generic drugs company, say with a top level domain, .genericdrugs, will remain exposed to.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Sector specific top level domain names like .insurance, health, .transport, and so on, are emerging, with clear rules for inclusion-exclusion. These can become de facto global regulatory rules for that sector. .Pharmacy has been allocated to a US pharmaceutical group which decides who gets domain names under it. Public advocacy groups have protested &lt;a href="#ftn3"&gt;[3]&lt;/a&gt; that these rules will be employed to impose drugs-related US intellectual property standards globally. Similar problematic possibilities can be imagined in other sectors; ICANN could set “safety standards”, as per US law, for obtaining .car.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Country domain names like .br and .ph remain subject to US jurisdiction. Iran's .ir was recently sought to be seized by some US private parties because of alleged Iranian support to terrorism. Although the plea was turned down, another court in another case may decide otherwise. With the 'Internet of Things', almost everything, including critical infrastructure, in every country will be on the network. Other countries cannot feel comfortable to have at the core of the Internet’s addressing system an organisation that can be dictated by one government.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;ICANN must become a truly global body&lt;/strong&gt;&lt;br /&gt;Eleven years ago, in 2005, the Civil Society Internet Governance Caucus at the World Summit on the Information Society demanded that ICANN should “negotiate an appropriate host country agreement to replace its California Incorporation”.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A process is currently under-way within ICANN to consider the jurisdiction issue. It is important that this process provides recommendations that will enable ICANN to become a truly global body, for appropriate governance of very important global public goods.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Below are some options, and there could be others, that are available for ICANN to transit from US jurisdiction.&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;ICANN can get incorporated under international law. Any such agreement should make ICANN an international (not intergovernmental) body, fully preserving current ICANN functions and processes. This does not mean instituting intergovernmental oversight over ICANN.&lt;/li&gt;
&lt;li&gt;ICANN can move core internet operators among multiple jurisdictions, i.e. ICANN (policy body for Internet identifiers), PTI &lt;a href="#ftn4"&gt;[4]&lt;/a&gt; (the operational body) and the Root Zone Maintainer must be spread across multiple jurisdictions. With three different jurisdictions over these complementary functions, the possibility of any single one being fruitfully able to interfere in ICANN's global governance role will be minimized.&lt;/li&gt;
&lt;li&gt;ICANN can institute a fundamental bylaw that its global governance processes will brook no interference from US jurisdiction. If any such interference is encountered, parameters of which can be clearly pre-defined, a process of shifting of ICANN to another jurisdiction will automatically set in. A full set-up – with registered HQ, root file maintenance system, etc – will be kept ready as a redundancy in another jurisdiction for this purpose. &lt;a href="#ftn5"&gt;[5]&lt;/a&gt; Chances are overwhelming that given the existence of this bylaw, and a fully workable exit option being kept ready at hand, no US state agency, including its courts, will consider it meaningful to try and enforce its writ. This arrangement could therefore act in perpetuity as a guarantee against jurisdictional interference without actually having ICANN to move out of the US.&lt;/li&gt;
&lt;li&gt;The US government can give ICANN jurisdictional immunity under the United States International Organisations Immunities Act . There is precedent of US giving such immunity to non-profit organisations like ICANN. &lt;a href="#ftn6"&gt;[6]&lt;/a&gt; Such immunity must be designed in such a way that still ensures ICANN's accountability to the global community, protecting the community's enforcement power and mechanisms. Such immunity extends only to application of public law of the US on ICANN decisions and not private law as chosen by any contracting parties. US registries/registrars, with the assent of ICANN, can choose the jurisdiction of any state of the US for adjudicating their contracts with ICANN. Similarly, registries/registrars from other countries should be able to choose their respective jurisdictions for such contracts.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;We do acknowledge that, over the years, there has been an appreciable progress in internationalising participation in ICANN's processes, including participation from governments in the Governmental Advisory Committee. However, positive as this is, it does not address the problem of a single country having overall jurisdiction over its decisions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Issued by the following India based organisation:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Centre for Internet and Society, Bangalore &lt;/li&gt;
&lt;li&gt;IT for Change, Bangalore &lt;/li&gt;
&lt;li&gt;Free Software Movement of India, Hyderabad &lt;/li&gt;
&lt;li&gt;Society for Knowledge Commons, New Delhi&lt;/li&gt;
&lt;li&gt;Digital Empowerment Foundation, New Delhi&lt;/li&gt;
&lt;li&gt;Delhi Science Forum, New Delhi&lt;/li&gt;
&lt;li&gt;Software Freedom Law Centre - India, New Delhi&lt;/li&gt;
&lt;li&gt;Third World Network - India, New Delhi&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Supported by the following global networks:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Association For Progressive Communications&lt;/li&gt;
&lt;li&gt;Just Net Coalition&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;br /&gt;For any clarification or inquiries you may may write to or call:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Parminder Jeet Singh: &lt;a class="mail-link" href="mailto:parminder@itforchange.net"&gt;parminder@itforchange.net&lt;/a&gt; +91 98459 49445, or &lt;/li&gt;
&lt;li&gt;Vidushi Marda: &lt;a class="mail-link" href="mailto:vidushi@cis-india.org"&gt;vidushi@cis-india.org&lt;/a&gt; +91 99860 92252&lt;/li&gt;&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a name="ftn1"&gt;[1]&lt;/a&gt; Internet Corporation for Assigned Names and Numbers&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="ftn2"&gt;[2]&lt;/a&gt; The “NetMundial Multistakeholder Statement” , endorsed by a large number of governments and other stakeholders, including ICANN and US government, called for ICANN to become a  “truly international and global organization”.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="ftn3"&gt;[3]&lt;/a&gt; See, &lt;a class="external-link" href="https://www.techdirt.com/articles/20130515/00145123090/big-pharma-firms-seeking-pharmacy-domain-to-crowd-out-legitimate-foreign-pharmacies.shtml"&gt;https://www.techdirt.com/articles/20130515/00145123090/big-pharma-firms-seeking-pharmacy-domain-to-crowd-out-legitimate-foreign-pharmacies.shtml &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn4"&gt;[4]&lt;/a&gt; Public Technical Identifier, a newly incorporated body to carry out the operational aspects of managing Internet's identifiers.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="ftn5"&gt;[5]&lt;/a&gt; This can be at one of the existing non US global offices of ICANN, or the location of one of the 3 non-US root servers. Section 24.1 of ICANN Bylaws say, “The principal office for the transaction of the business of shall be in the County of Los Angeles, State of California, United States of America. may also have an additional office or offices within or outside the United States of America as it may from time to time establish”.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="ftn6"&gt;[6]&lt;/a&gt; E.g., International Fertilizer and Development Center was designated as a public, nonprofit, international organisation by US Presidential Decree, granting it immunities under United States International Organisations Immunities Act . See &lt;a class="external-link" href="https://archive.icann.org/en/psc/corell-24aug06.html"&gt;https://archive.icann.org/en/psc/corell-24aug06.html&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/internets-core-resources-are-a-global-public-good'&gt;https://cis-india.org/internet-governance/blog/internets-core-resources-are-a-global-public-good&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vidushi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-11-14T06:39:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/cisxscholars-delhi-william-f-stafford-thursday-nov-03">
    <title>CISxScholars Delhi - William F. Stafford (Nov 03, 6:30 pm)</title>
    <link>https://cis-india.org/raw/cisxscholars-delhi-william-f-stafford-thursday-nov-03</link>
    <description>
        &lt;b&gt;We are delighted to have William F. Stafford, PhD candidate in UC Berkeley, present on "Public Measurements, Private Measurements, and the Convergence of Units" at the CIS office in Delhi on Thursday, Nov 03, at 6:30 pm. Please RSVP if you are joining us: &lt;raw@cis-india.org&gt;.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;CISxScholars are informal events organised by CIS for presentation, discussion, and exchange of academic research and policy analysis.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Public Measurements, Private Measurements and the Convergence of Units&lt;/h2&gt;
&lt;p&gt;In this discussion I will focus on a comparison between the standard government prescribed meters for autorickshaws and taxis and the role of ridesharing apps as instruments which take measurements, as the basis for the calculation of fares, and the more general questions which arise for commerce, technology and their regulation. I will organise the paper around the observations of a paratransit operations engineer on the distinction between public and private instruments, and explore the possible implications of new forms of commercialisation of location and proximity and reactions to such developments for understanding questions of fairness and corruption.&lt;/p&gt;
&lt;h2&gt;William F. Stafford&lt;/h2&gt;
&lt;p&gt;William F. Stafford, Jr., is a PhD candidate in the Department of Anthropology, UC Berkeley. William's research focuses on the auto-rickshaw meter in New Delhi, as a way to engage with classical questions concerning the relationship between measurement, quantification and delimitations of domains of labour. William's general interests concern the analytics of labour and the reconfiguration of what are often taken as its axiomatic aspects. Before joining Berkeley, he studied Sociology at Jawaharlal Nehru University and the Delhi School of Economics.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/cisxscholars-delhi-william-f-stafford-thursday-nov-03'&gt;https://cis-india.org/raw/cisxscholars-delhi-william-f-stafford-thursday-nov-03&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>CISxScholars</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Labour</dc:subject>
    
    
        <dc:subject>Network Economies</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2019-03-13T00:30:39Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/irc17-call">
    <title>Internet Researchers' Conference 2017 (IRC17) - Call for Sessions</title>
    <link>https://cis-india.org/raw/irc17-call</link>
    <description>
        &lt;b&gt;It gives us great pleasure to announce that the second Internet Researchers' Conference (IRC17) will take place in Bengaluru on March 03-05, 2017. It will be organised by the Centre for Internet and Society (CIS) in partnership with the Centre for Information Technology and Public Policy at the International Institute of Information Technology Bangalore (IIIT-B). It is a free and open conference. Sessions must be proposed by teams of two or more members on or before Friday, October 28. All submitted session proposals will go though an open review process, followed by each team that has proposed a session being invited to select ten sessions of their choice to be included in the Conference agenda. Final sessions will be chosen through these votes, and be announced on January 09, 2017.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;IRC17 Call for Sessions: &lt;a href="https://github.com/cis-india/irc/raw/master/IRC17_Call-for-Sessions.pdf"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;h4&gt;IRC17 Selection of Sessions: &lt;a href="http://cis-india.org/raw/irc17-selection"&gt;http://cis-india.org/raw/irc17-selection&lt;/a&gt;&lt;/h4&gt;
&lt;h4&gt;&lt;em&gt;Deadline for submission was Friday, October 28.&lt;/em&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;IRC17: Key Provocations&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Two critical questions that emerged from the conversations at the previous edition of the Conference (IRC16) were about the &lt;strong&gt;digital objects of research&lt;/strong&gt;, and the &lt;strong&gt;digital/internet experiences in Indic languages&lt;/strong&gt;. As we discussed various aspects and challenges of 'studying internet in India', it was noted that we have not sufficiently explored how ongoing research methods, assumptions, and analytical frames are being challenged (if at all) by the &lt;strong&gt;becoming-digital&lt;/strong&gt; of the objects of research across disciplines: from various artifacts and traces of human and machinic interactions, to archival entries and sites of ethnography, to practices and necessities of collaboration.&lt;/p&gt;
&lt;p&gt;We found that the analyses of such &lt;strong&gt;digital objects of research&lt;/strong&gt; often tend to assume either an aesthetic and functional &lt;strong&gt;uniqueness&lt;/strong&gt; or &lt;strong&gt;sameness&lt;/strong&gt; vis-à-vis the pre-/proto-digital objects of research, while neither of these positions are discussed in detail. Further, we tend to universalise the English-speaking user's/researcher's experience of working with such digital objects, without sufficiently considering their lives and functions in other (especially, Indic) languages.&lt;/p&gt;
&lt;p&gt;These we take as the key provocations of the 2017 edition of IRC:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How does the &lt;strong&gt;becoming-digital&lt;/strong&gt; of the research objects challenge our current research practices, concerns, and assumptions?&lt;/li&gt;
&lt;li&gt;How do we appreciate, study, and theorise the functioning of and meaning-making by digital objects in &lt;strong&gt;Indic languages&lt;/strong&gt;?&lt;/li&gt;
&lt;li&gt;What &lt;strong&gt;research tools and infrastructures&lt;/strong&gt; are needed to study, document, annotate, analyse, archive, cite, and work with (in general) digital objects, especially those in Indic languages?&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;&lt;strong&gt;Call for Sessions&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;We invite teams of two or more researchers and practitioners to propose sessions for IRC17.  We do understand that finding team members for a session you have in mind might be difficult in certain cases. Please feel free to share initial sessions ideas on the &lt;strong&gt;researchers@cis-india&lt;/strong&gt; mailing list &lt;strong&gt;[1]&lt;/strong&gt;. Also, please keep an eye on the list to see what potential topics are being discussed.&lt;/p&gt;
&lt;p&gt;All sessions will be one and half hours long, and will be fully designed and facilitated by the team concerned, including moderation (if any). The sessions are expected to drive conversations on the topic concerned. They may include presentation of research papers  but this is &lt;strong&gt;not at all&lt;/strong&gt; mandatory.&lt;/p&gt;
&lt;p&gt;If you plan to organise a session structured around presentation of research papers, please note that we are exploring potential publication outlets for a collection of full-length research papers. If your session is selected for IRC17, we will notify you of guidelines to be followed for the submission and review of full-length papers prior to the conference. If you are interested in this publication possibility, &lt;strong&gt;please indicate&lt;/strong&gt; that in your session proposal submission.&lt;/p&gt;
&lt;p&gt;Sessions that involve collaborative work (either in group or otherwise), including discussions, interactions, documentation, learning, and making, are &lt;strong&gt;most welcome&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Further, we look forward to sessions conducted in &lt;strong&gt;Indic languages&lt;/strong&gt;. The proposing team, in such a case, should consider how participants who do not understand the language can participate in it. IRC organisers and other participants will play an active role in making such engagements possible.&lt;/p&gt;
&lt;p&gt;The only &lt;strong&gt;eligibility criteria&lt;/strong&gt; for proposing sessions are that they must be proposed by a &lt;strong&gt;team of at least two members&lt;/strong&gt;, and that they must engage with &lt;strong&gt;one (or more) of the three key provocations&lt;/strong&gt; mentioned above. Further, the teams whose sessions are selected for IRC17 must commit to producing at least &lt;strong&gt;one post-conference essay/documentation&lt;/strong&gt; on the topic of their session.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;deadline&lt;/strong&gt; for submission of sessions proposals for IRC17 is &lt;strong&gt;Friday, October 28&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;To propose a session, please send the following documents (as attached text files) to &lt;strong&gt;raw[at]cis-india[dot]org&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Title and Description of the Session:&lt;/strong&gt; The session should be named in the form of a hashtag (check the IRC16 sessions for reference &lt;strong&gt;[2]&lt;/strong&gt;). The description of the session should clearly state what the key focus of the session is, and which of the three central concerns it will address. The description should be approximately &lt;strong&gt;300 words&lt;/strong&gt; long.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Session plan:&lt;/strong&gt; This should describe how the session will be conducted and moderated. Any specific requirements (technical, language support, etc.) of the session should also be noted here. This should not be more than &lt;strong&gt;200 words&lt;/strong&gt; long. If your session plan involves presentation of research papers, please indicate whether you would be interested in having these papers considered for academic publication.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Documentation plan:&lt;/strong&gt; This should indicate how documentation will be done during the session, and more importantly what form the post-conference essay/documentation will take and what issue(s) it will address. This should not be more than &lt;strong&gt;100 words&lt;/strong&gt; long.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Short Abstracts (Only for Sessions with Paper Presentations):&lt;/strong&gt; If your session involves presentation of research papers, please share a &lt;strong&gt;250 words&lt;/strong&gt; abstract for each paper.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Details of the Team:&lt;/strong&gt; Please share brief biographic notes of each member of the session team, and contact details.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;&lt;strong&gt;Session Selection Process&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;October 28:&lt;/strong&gt; Deadline of submission of session proposals.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;October 31:&lt;/strong&gt; All submitted sessions will be posted on the CIS website, along with the names, biographic brief, and contact details of the members of the session teams.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;November 01 - December 24:&lt;/strong&gt; Open review period. All session teams, as well as other interested contributors, may review the submitted proposals and share comments directly with the session teams, or discuss the session on the researchers@cis-india list. The session teams may fully and continuously edit the proposal during this period, including adding/changing session teams.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;December 25:&lt;/strong&gt; Open review ends and voting begins. All session teams will select 10 sessions to be included in the IRC17 programme. The votes will be anonymous, that is which session team has voted for which set of sessions will not be made public.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;January 05:&lt;/strong&gt; Voting ends.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;January 09:&lt;/strong&gt; Announcement of selected sessions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;February 12:&lt;/strong&gt; Deadline for selected session teams to submit a detailed session plan, information about which will be shared later. If a selected session involves presentation of papers, then the draft papers are to be submitted by this date (no need to submit a detailed session plan in that case).&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Venue, Accommodation, and Travel&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The conference will take place at the International Institute of Information Technology Bangalore (IIIT-B) during March 03-05, 2017 &lt;strong&gt;[3]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The conference does &lt;strong&gt;not&lt;/strong&gt; have any participation fees. The organisers will cover &lt;strong&gt;all&lt;/strong&gt; costs related to accommodation and hospitality during the conference. We look forward to offer a limited number of (domestic) travel fellowships for students and other deserving applicants. We will also confirm this on &lt;strong&gt;January 02, 2017&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;About the IRC Series&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The Researchers at Work (RAW) programme &lt;strong&gt;[4]&lt;/strong&gt; at the Centre for Internet and Society (CIS) initiated the Internet Researchers' Conference (IRC) series to address these concerns, and to create an annual temporary space in India, for internet researchers to gather and share experiences.&lt;/p&gt;
&lt;p&gt;The IRC series is driven by the following interests:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;creating discussion spaces for researchers and practitioners studying internet in India and in other comparable regions,&lt;/li&gt;
&lt;li&gt;foregrounding the multiplicity, hierarchies, tensions, and urgencies of the digital sites and users in India,
accounting for the various layers, conceptual and material, of experiences and usages of internet and networked digital media in India, and&lt;/li&gt;
&lt;li&gt;exploring and practicing new modes of research and documentation necessitated by new (digital) objects of power/knowledge.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The first edition of the Internet Researchers' Conference series was held in February 2016 &lt;strong&gt;[5]&lt;/strong&gt;. It was hosted by the Centre for Political Studies at Jawaharlal Nehru University &lt;strong&gt;[6]&lt;/strong&gt;, and was supported by the CSCS Digital Innovation Fund &lt;strong&gt;[7]&lt;/strong&gt;. The Conference was constituted by eleven discussion sessions (majority of which were organised around presentation of several papers), four workshop sessions (which involved group discussions, activities, and learnings), a book sprint over three sessions to develop an outline of a (re)sourcebook for internet researchers in India, and a concluding round table. The audio recordings and notes from IRC16 are now being compiled into an online Reader. A detailed reflection note on the IRC16 has already been published &lt;strong&gt;[8]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Endnotes&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/raw/irc16"&gt;http://cis-india.org/raw/irc16&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="http://iiitb.ac.in/"&gt;http://iiitb.ac.in/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/raw/"&gt;http://cis-india.org/raw/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/raw/irc16"&gt;http://cis-india.org/raw/irc16&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See: &lt;a href="http://www.jnu.ac.in/SSS/CPS/"&gt;http://www.jnu.ac.in/SSS/CPS/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/raw/cscs-digital-innovation-fund"&gt;http://cis-india.org/raw/cscs-digital-innovation-fund&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/raw/iirc-reflections-on-irc16"&gt;http://cis-india.org/raw/iirc-reflections-on-irc16&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/irc17-call'&gt;https://cis-india.org/raw/irc17-call&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Researcher's Conference</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Learning</dc:subject>
    
    
        <dc:subject>IRC17</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-12-12T13:40:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016">
    <title>Submitted Comments on the Telangana State Open Data Policy 2016</title>
    <link>https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016</link>
    <description>
        &lt;b&gt;Last month, the Information Technology, Electronics &amp; Communications Department of the Government of Telangana released the first public draft of the Telangana State Open Data Policy 2016, and sought comments from various stakeholders in the state and outside. The draft policy not only aims to facilitate and provide a framework for proactive disclosure of data created by the state government agencies, but also identify the need for integrating such a mandate within the information systems operated by these agencies as well. CIS is grateful to be invited to submit its detailed comments on the same. The submission was drafted by Anubha Sinha and Sumandro Chattapadhyay.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Download the submitted document: &lt;a href="http://cis-india.org/openness/files/cis-telangana-state-open-data-policy-v-1-submission/at_download/file"&gt;PDF&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;1. Preliminary&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;1.1.&lt;/strong&gt; This submission presents comments and recommendations by the Centre for Internet and Society (“CIS”) &lt;strong&gt;[1]&lt;/strong&gt; on the proposed draft of the Telangana Open Data Policy 2016 (“the draft policy”). This submission is based on Version 1 of the draft policy shared by the Information Technology, Electronics &amp;amp; Communications Department, Government of Telangana (“the ITE&amp;amp;C Department”).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1.2.&lt;/strong&gt; CIS commends the ITE&amp;amp;C Department for its generous efforts at seeking inputs from various stakeholders to draft an open data policy for the state of Telangana. CIS is thankful for this opportunity to provide a clause-by-clause submission.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;2. The Centre for Internet and Society&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;2.1.&lt;/strong&gt; The Centre for Internet and Society, CIS, is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfiguration of social processes and structures through the internet and digital media technologies, and vice versa.&lt;/p&gt;
&lt;p&gt;2.2. This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved. The comments in this submission aim to further the principle of citizens’ right to information, instituting openness-by-default in governmental activities, and to realise the various kinds of public goods that can emerge from greater availability of open (government) data. The submission is limited to those clauses that most directly have an impact on these principles.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;3. Comments and Recommendations&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;This section presents comments and recommendations directed at the draft policy as a whole, and in certain places, directed at specific clauses of the draft policy.&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;3.1. Defining the Scope of the Policy in the Preamble&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.1.1.&lt;/strong&gt; CIS observes and appreciates that the ITE&amp;amp;C Department has identified the open data policy as a catalyst for, and as dependent upon, a larger transformation of the information systems implemented in the state, to specifically ensure that these information systems.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.2.&lt;/strong&gt; CIS commends the endeavour of the draft policy to share data in open and machine-readable standards. To further this, it will be useful for the preamble to explicitly mandate proactive disclosure in both human-readable and machine-readable formats, using open standards, and under open license(s).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.3.&lt;/strong&gt; CIS recommends that the draft policy state the scope of the policy at the outset, i.e. in the Preamble section of the document. This will provide greater clarity to the stakeholders who are trying to ascertain applicability of the draft policy to their data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.4.&lt;/strong&gt; CIS commends the crucial mandate of creating data inventory within every state government ministry / department. We further recommend that the draft policy also expressly states the need to make these inventories publicly accessible.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.5.&lt;/strong&gt; CIS commends the draft policy’s aim to build a process to engage with data users for better outcomes. We suggest that the draft policy also enumerates the “outcomes” of such engagement, in order to provide more clarity. We recommend that these “outcomes” include greater public supply of open government data in an effective, well-documented, timely, and responsible manner.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.6.&lt;/strong&gt; Further, CIS suggests that the draft policy define “information centric and customer centric data” to provide more clarity to the document, as well as its scope and objectives.&lt;/p&gt;
&lt;h3&gt;3.2. Provide Legal and Policy References&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.2.1.&lt;/strong&gt; Strengthening transparency, predictability, and legal certainty of rules benefits all stakeholders. Thus, as far as possible, terms in the draft policy should use pre-existing legal definitions. In case of ambiguities arising after the implementation of the policy, consistency in definitions will also lead to greater interpretive certainty. It must be noted that good quality public policies which promote legal certainty, lead to better implementation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.2.&lt;/strong&gt; CIS observes that the draft policy re-defines various terms in Section 4 that have already been defined in National Data Sharing and Accessibility Policy (“NDSAP”) 2012 &lt;strong&gt;[2]&lt;/strong&gt;, the Right to Information 2005 (“RTI Act”) &lt;strong&gt;[3]&lt;/strong&gt;, and IT (Reasonable  security  practices  and  procedures  and sensitive personal data or information) Rules 2011 &lt;strong&gt;[4]&lt;/strong&gt;. We strongly recommend that the draft policy uses the pre-existing definitions in these acts, rules, and policies.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.3.&lt;/strong&gt; Further, CIS observes that while certain sections accurately reflect definitions and parts from other acts, rules and policies, such sections are not referenced back to the latter. These sections include, but are not limited to: Sections 3, 7, 8, 4 (definitions of Data set, Data Archive, Negative list, Sensitive Personal data). We strongly recommend that accurate legal references be added to the draft policy after careful study of the language used.&lt;/p&gt;
&lt;h3&gt;3.3. Need for More Focused Objective Statement&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.3.1.&lt;/strong&gt; While the draft policy has a very comprehensive statement of its objectives, including "&lt;em&gt;all issues related to data in terms of the available scope of sharing and accessing spatial and non-spatial data under broad frameworks of standards and interoperability&lt;/em&gt;," it may consider offering a more focused statement of its key objective, which is to provide a policy framework for proactive disclosure of government data by the various agencies of the Government of Telangana.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.2.&lt;/strong&gt; Further, the objective statement must clearly state that the policy enables publication of data created by the agencies of the Government of Telangana, and/or by private agencies working in partnership with public agencies, using public funds as open data (that is, using open standards, and under open license). The present version of the objective statement mentions "&lt;em&gt;sharing&lt;/em&gt;" and "&lt;em&gt;accessing&lt;/em&gt;" the data concerned under "&lt;em&gt;broad frameworks of standards and interoperability&lt;/em&gt;" but does not make it clear if such shared data will be available in open standards, under open licenses, and for royalty-free adaptation and redistribution by the users concerned.&lt;/p&gt;
&lt;h3&gt;3.4. Suggestions related to the Definitions&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.4.1.&lt;/strong&gt; The term “Data” has not been defined in accordance with NDSAP 2012. We suggest that the definition provided in NDSAP is followed so as to ensure legal compatibility.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.2.&lt;/strong&gt; The term “Sensitive Personal Data” seems to have been defined on the basis of the definition provided in the IT (Reasonable  security  practices  and  procedures  and sensitive personal data or information) Rules 2011. Please add direct reference so as to make this clear. We further suggest that the term “Personal Information”, also defined in the same IT Rules, is also included and referred to in the draft policy, so that not only Sensitive Personal Data is barred from disclosure under this policy, but also Personal Information (that is "&lt;em&gt;any information that relates to a natural person, which, either directly or indirectly, in combination with other information available or likely to be available with a body corporate, is capable of identifying such person&lt;/em&gt;") &lt;strong&gt;[5]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.3.&lt;/strong&gt; The term “Negative List” is defined in a manner that allows the state government ministries and agencies to identify which data are to be considered as non-shareable without any reference to an existing policy framework that list acceptable grounds for such identification. The term must be defined more restrictively, as this definition can allow an agency to avoid disclosure of data that may not be legally justifiable as non-shareable or sensitive. Thus, we recommend a more limited definition which may draw upon the RTI Act 2005, and specifically consider the factors mentioned in Sections 8 and 9 of the Act as the (only) set of acceptable reasons for non-disclosure of government data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.4.&lt;/strong&gt; The terms “Shareable Data” and “Sensitive Data” are used in several places in the draft policy but are not defined in Section 4. Both these terms are defined in NDSAP 2012. We suggest that both these terms be listed in Section 4, in accordance with the respective definitions provided in NDSAP 2012.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.5.&lt;/strong&gt; The terms “Data Archive”, “Data Acquisition”, “Raw Data”, “Standards-Compliant Applications”, and “Unique Data” are defined in Section 4, but none of these terms appear elsewhere in the draft policy. We suggest that these terms are either better integrated into the document, or may not be defined at all.&lt;/p&gt;
&lt;h3&gt;3.5. Rename Section 6 to Focus on Implementation of the Policy&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.5.1.&lt;/strong&gt; Though the Section 6 is named as “Shareable Data”, it instead categorically lists down how the policy is to be implemented. This is a very welcome step, but the Section title should reflect this purpose of the Section.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.2.&lt;/strong&gt; The decision proposed in the draft policy to make it mandatory for "&lt;em&gt;each funding organization&lt;/em&gt;" to "&lt;em&gt;highlight data sharing policy as preamble in its RFPs as well as Project proposal formats&lt;/em&gt;" is much appreciated and commendable. For a clearer and wider applicability of this measure, we recommend that this responsibility should apply to all state government agencies, including agencies where the state government enjoys significant stake, and all public-private partnerships entered into by the state government agencies, and not only to "&lt;em&gt;funding organizations&lt;/em&gt;" (a term that has also not been defined in the draft policy).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.3.&lt;/strong&gt; While the Section details out various measures and steps of implementation of the policy, it does not clarify which agency and/or committee would have the authority and responsibility to coordinate, monitor, facilitate, and ensure these measures and steps. Not only governmental representatives but also non-governmental representatives may be considered for such a committee.&lt;/p&gt;
&lt;h3&gt;3.6. Host All Open Government Data in the State Portal&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.6.1.&lt;/strong&gt; We observe that the Section 6 indicates that  , the designated domain for the open government data portal for the state of Telangana, will only store metadata related to the proactive disclosed data sets but not the data sets themselves. This is further clarified in Section 10. We strongly urge the ITE&amp;amp;C Department to reconsider this decision to not to store the actual open data sets in the state open government data portal itself but in the departmental portals. A central archive of the open data assets, hosted by the state open government data portal, will allow for more effective and streamlined management of the open data assets concerned, including their systematic backing-up, better security and integrity, permanent and unique disclosure, and rule-driven updation. This would also reduce the burden upon all the government agencies, especially those that do not have a substantial IT team, to run independent department-specific open data portals.&lt;/p&gt;
&lt;h3&gt;3.7. Reconsider the Section on Data Classification&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.7.1.&lt;/strong&gt; While it is clear that the Section 7 on Data Classification follows the classification of various data sets created, managed, and/or hosted by government agencies offered in the NDSAP 2012, it is not very clear what role this classification plays in functioning and implementation of the draft policy. While Open Access and Registered Access data may both be considered as open government data that is to be proactively disclosed by the state government agencies via the state open government data portal, the Restricted Access data overlaps with the kinds of data already included in the Negative List defined in the draft policy (and elsewhere, like the RTI Act 2005). Further, the final sentence in this Section ensures that all data users provide appropriate attribution of the source(s) of the data set concerned, which (though is an important statement) should not be part of this Section on Data Classification. We suggest reconsideration of inclusion of this Section.&lt;/p&gt;
&lt;h3&gt;3.8. Reconsider the Section on Technology for Sharing and Access&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.8.1.&lt;/strong&gt; While it is clear that the Section 8 on Technology for Sharing and Access is adapted from the Section 9 of the NDSAP 2012, the text in this Section seems to be not fully compatible with other statements in this draft policy. For example, the Section states that "&lt;em&gt;[t]his integrated repository will hold data of current and historical nature and this repository over a period of time will also encompass data generated by various State Government departments&lt;/em&gt;." However, the draft policy states in Section 10 that "&lt;em&gt;data.telangana.gov.in will only have the metadata and data itself will be accessed from the portals of the departments&lt;/em&gt;."&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.8.2.&lt;/strong&gt; We strongly urge the ITE&amp;amp;C Department to revise this Section through close discussion with the NDSAP Project Management Unit, National Informatics Centre, which is the technical team responsible for developing and managing the  portal, since the present version of this Section lists the original feature set of the  portal as envisioned in 2012 but does not reflect the most recent feature set that has been already implemented in the portal concerned.&lt;/p&gt;
&lt;h3&gt;3.9. Current Legal Framework (Section 9) should List to Relevant Acts, Rules, Policies, and Guidelines&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.9.1.&lt;/strong&gt; CIS observes that the draft policy attempts to lay out the applicable legal framework in Section 2 and 9 of the draft policy, and submits that the legal framework is incomplete and recommends that the draft policy lists all the following relevant acts, rules, policies and guidelines:&lt;/p&gt;
&lt;ol type="A"&gt;
&lt;li&gt;National Data Sharing and Accessibility Policy, 2012&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Right to Information Act, 2005&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Information Technology Act, 2002&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011.&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;3.9.2.&lt;/strong&gt; CIS submits that apart from the policies mentioned above, the implementation of the draft policy is intricately linked to concepts of "open standards," "open source software," "open API," and "right to information." These concepts are governed by specific acts and policies, and are applicable to government owned data, as follows:&lt;/p&gt;
&lt;ol type="A"&gt;
&lt;li&gt;&lt;strong&gt;Adoption of Open Standards:&lt;/strong&gt; CIS observes that the draft policy draws on the importance of building information systems for interoperability and greater information accessibility. Interoperability is achieved by appropriate implementation of open standards. Thus, CIS submits that the Policy on Open Standards for e-Governance &lt;strong&gt;[6]&lt;/strong&gt; which establishes the guidelines for usage of open standards to ensure seamless interoperability, and the Implementation Guidelines of the National Data Sharing and Accessibility Policy, 2012 &lt;strong&gt;[7]&lt;/strong&gt; should be mentioned in the draft policy.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Adoption of Open Source Software:&lt;/strong&gt; The Policy on Adoption of Open Source Software for Government of India states that the "&lt;em&gt;Government of India shall endeavour to adopt Open Source Software in all e-Governance systems implemented by various Government organizations, as a preferred option in comparison to Closed Source Software&lt;/em&gt; &lt;strong&gt;[8]&lt;/strong&gt;." As the draft policy proposed to guide the development of information systems to share open data is being developed and implemented both by the Government of Telangana and by other agencies (academic, commercial, and otherwise), it must include an explicit reference and embracing of  this mandate for adoption of Open Source Software, for reasons of reducing expenses, avoiding vendor lock-ins, re-usability of software components, enabling public accountability, and greater security of software systems.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Implementation of Open APIs:&lt;/strong&gt; CIS observes that the draft policy refers to Standard compliant applications in Section 4. CIS suggests that final version of the policy refer to and operationalise the Policy on Open Application Programming Interfaces (APIs) for Government of India &lt;strong&gt;[9]&lt;/strong&gt;. This will ensure that the openly available data is available to the public, as well as  to all the government agencies, in a structured digital format that is easy to consume and use on one hand, and is available for various forms of value addition and innovation on the other. Refer to Official Secrets Act, 1923: The Official Secrets Act penalises a person if he/she "&lt;em&gt;obtains, collects, records or publishes or communicates to other person any secret official code or password, or any sketch, plan, model, article or note or other document or information which is calculated to be or might be or is intended to be, directly or indirectly, useful to an enemy for which relates to a matter the disclosure of which is likely to affect the sovereignty and integrity of India, the security of the State or friendly relations with foreign States&lt;/em&gt; &lt;strong&gt;[10]&lt;/strong&gt;." CIS submits that this Act should be referred to in this context of ensuring non-publication of the aforementioned data.&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;3.10. Mandate a Participatory Process for Developing the Implementation Guidelines&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.10.1.&lt;/strong&gt; We highly appreciate and welcome the fact that the draft policy emphasises rapid operationalisation of the policy by mandating that the ITE&amp;amp;C Department will prepare a detailed implementation guideline within 6 months of the notification of this policy, and all state government departments will publish at least 5 high value datasets within the next three months. Just as an addition to this mandate, we would like to propose that it can be suggested that the ITE&amp;amp;C Department undertakes a participatory process, with contributions from both government agencies and non-government actors, to develop this implementation guideline document. We believe that opening up government data in an effective and sustainable manner, for most government agencies, involves a systematic change in how the agency undertakes day-to-day data management practices. Hence, to develop productive and practical implementation guidelines, the ITE&amp;amp;C Department needs to gather insights from the other state government agencies regarding their existing data (and metadata) management practices &lt;strong&gt;[11]&lt;/strong&gt;. Further, participation of the non-government actors in this process is crucial to ensure that the implementation guidelines appropriately identify the high value data sets, that is data sets that should be published on a priority basis.&lt;/p&gt;
&lt;h3&gt;3.11. Defer the Decision about Roles of Data Owners, Generators, and Controllers&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.11.1.&lt;/strong&gt; As the draft policy does not specifically define the terms “Data Owners”, “Data Generators”, and “Data Controllers”, and the Section 11 only briefly describes some of the roles of these types of actors, we suggest removal of this discussion and the decision regarding the specific roles and functions of the Data Owners / Generators / Controllers from the draft policy itself. It will be perhaps more appropriate and effective to define these terms, as well as their roles and functions, in the implementation guidelines to be prepared by the ITE&amp;amp;C Department after the notification of the open data policy, since these terms relate directly to the final designing of the implementation process.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.12.&lt;/strong&gt; CIS is grateful to the ITE&amp;amp;C Department for this opportunity to provide comments, and would be honoured to provide further assistance on the matter.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Endnotes&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/" target="_blank"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://data.gov.in/sites/default/files/NDSAP.pdf" target="_blank"&gt;http://data.gov.in/sites/default/files/NDSAP.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="http://rti.gov.in/webactrti.htm" target="_blank"&gt;http://rti.gov.in/webactrti.htm&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://meity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf" target="_blank"&gt;http://meity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; See Section 2 (1) (i) of IT (Reasonable security practices and procedures and sensitive personal data or information) Rules 2011.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See: &lt;a href="https://egovstandards.gov.in/sites/default/files/Published%20Documents/Policy_on_Open_Standards_for_e-Governance.pdf" target="_blank"&gt;https://egovstandards.gov.in/sites/default/files/Published%20Documents/Policy_on_Open_Standards_for_e-Governance.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a href="https://data.gov.in/sites/default/files/NDSAP_Implementation_Guidelines_2.2.pdf" target="_blank"&gt;https://data.gov.in/sites/default/files/NDSAP_Implementation_Guidelines_2.2.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/policy_on_adoption_of_oss.pdf" target="_blank"&gt;http://deity.gov.in/sites/upload_files/dit/files/policy_on_adoption_of_oss.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See: &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/Open_APIs_19May2015.pdf" target="_blank"&gt;http://deity.gov.in/sites/upload_files/dit/files/Open_APIs_19May2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; See: &lt;a href="http://www.archive.india.gov.in/allimpfrms/allacts/3314.pdf" target="_blank"&gt;http://www.archive.india.gov.in/allimpfrms/allacts/3314.pdf&lt;/a&gt;, Sections 2 (2) and 3 (1) (c).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; A similar process was undertaken by the IT Department of the Government of Sikkim when developing the implementation guideline document. The ITE&amp;amp;C Department may consider discussing the matter with the said department to exchange relevant learnings.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016'&gt;https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-09-01T05:49:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india">
    <title>Analysis of the Report of the Group of Experts on Developments in the Field of Information and Telecommunications in the Context of International Security and Implications for India</title>
    <link>https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india</link>
    <description>
        &lt;b&gt;This paper analyses the report of the Group of Experts and and India’s compliance with its recommendations based on existing laws and policies. Given the global nature of these challenges and the need for nations to holistically address such challenges from a human rights and security perspective, CIS believes that the Group of Experts and similar international forums are useful and important forums for India to actively engage with.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The United Nations Group of Experts on ICT issued their report on Developments in the Field of Information and Telecommunications in the Context of International Security in June, 2015. This paper analyses the report of the Group of Experts and and India’s compliance with its recommendations based on existing laws and policies. CIS believes that the report of the Group of Experts provides important minimum standards that countries could adhere to in light of challenges to international security posed by ICT developments. Given the global nature of these challenges and the need for nations to holistically address such challenges from a human rights and security perspective, CIS believes that the Group of Experts and similar international forums are useful and important forums for India to actively engage with.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Download: &lt;a href="https://cis-india.org/internet-governance/files/ict-paper.pdf" class="internal-link"&gt;PDF&lt;/a&gt; (627 kb)&lt;/strong&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;1. &lt;a href="#1"&gt;Introduction&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2. &lt;a href="#2"&gt;Analysis of the Recommendations&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2a. &lt;a href="#2a"&gt;Consistent with the purposes of the United Nations, including to maintain international
peace and security, States should cooperate in developing and applying measures to increase stability and security in the use of ICTs and to prevent ICT practices that are acknowledged to be harmful or that may pose threats to international peace and security&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2b. &lt;a href="#2b"&gt;In case of ICT incidents, States should consider all relevant information, including the
larger context of the event, the challenges of attribution in the ICT environment and the nature and extent of the consequences&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2c. &lt;a href="#2c"&gt;States should not knowingly allow their territory to be used for internationally wrongful acts using ICTs; of the Recommendations&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2d. &lt;a href="#2d"&gt;States should consider how best to cooperate to exchange information, assist each other, prosecute terrorist and criminal use of ICTs and implement other cooperative measures to address such threats. States may need to consider whether new measures need to be developed in this respect&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2e. &lt;a href="#2e"&gt;States, in ensuring the secure use of ICTs, should respect Human Rights Council resolutions 20/8 and 26/13 on the promotion, protection and enjoyment of human rights on the Internet, as well as General Assembly resolutions 68/167 and 69/166 on the right to privacy in the digital age, to guarantee full respect for human rights, including the right to freedom of expression&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2f. &lt;a href="#2f"&gt;A State should not conduct or knowingly support ICT activity contrary to its obligations under international law that intentionally damages critical infrastructure or otherwise impairs the use and operation of critical infrastructure to provide services to the public&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2g. &lt;a href="#2g"&gt;States should take appropriate measures to protect their critical infrastructure from ICT threats, taking into account General Assembly resolution 58/199 on the creation of a global culture of cybersecurity and the protection of critical information infrastructures, and other relevant resolutions&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2h. &lt;a href="#2h"&gt;States should respond to appropriate requests for assistance by another State whose critical infrastructure is subject to malicious ICT acts. States should also respond to appropriate requests to mitigate malicious ICT activity aimed at the critical infrastructure of another State emanating from their territory, taking into account due regard for sovereignty&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2i. &lt;a href="#2i"&gt;States should take reasonable steps to ensure the integrity of the supply chain so that end users can have confidence in the security of ICT products. States should seek to prevent the proliferation of malicious ICT tools and techniques and the use of harmful hidden functions&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2j. &lt;a href="#2j"&gt;States should encourage responsible reporting of ICT vulnerabilities and share associated information on available remedies to such vulnerabilities to limit and possibly eliminate potential threats to ICTs and ICT-dependent infrastructure&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2k. &lt;a href="#2k"&gt;States should not conduct or knowingly support activity to harm the information systems of the authorized emergency response teams (sometimes known as computer emergency response teams or cyber security incident response teams) of another State. A State should not use authorized emergency response teams to engage in malicious international activity&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;3. &lt;a href="#3"&gt;Conclusion&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 id="1"&gt;1. Introduction&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Cyberspace&lt;a name="_ftnref1" href="#_ftn1"&gt;[1]&lt;/a&gt; touches every aspect of our lives, has enormous benefits, but is also accompanied by a number of risks. The international community at large has realized that cyberspace can be made stable and secure only through international cooperation. 	Traditionally, though there are a number of bilateral agreements and forms of cooperation the foundation of this cooperation has been the international law and the principles of the Charter of the United Nations.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;To this end, on December 27, 2013 the United Nations General Assembly adopted Resolution No. 68/243 requesting the" &lt;em&gt; Secretary General, with the assistance of a group of governmental experts,…… to continue to study, with a view to promoting common understandings, existing and potential threats in the sphere of information security and possible cooperative measures to address them, including 		norms, rules or principles of responsible behaviour of States and confidence-building measures, the issues of the use of information and communications technologies in conflicts and how international law applies to the use of information and communications technologies by States……. and to submit to the General Assembly at its seventieth session a report on the results of the study.&lt;/em&gt; "In pursuance of this resolution the Secretary General established a Group of Experts on Developments in the Field of Information and Telecommunications in the Context of International Security; the report was agreed upon by the Group of Experts in June, 2015. On 23 December 2015, the UN General Assembly unanimously adopted resolution 70/237&lt;a name="_ftnref2" href="#_ftn2"&gt;[2]&lt;/a&gt; which welcomed the outcome of the Group of Experts and requested the Secretary-General to establish a new GGE that would report to the General Assembly in 2017.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The report developed by governmental experts from 20 States addresses existing and emerging threats from uses of ICTs, by States and non-State actors alike. These threats have the potential to jeopardize international peace and security. The experts gave recommendations which have built on consensus 	reports issued in 2010 and 2013, and offer ideas on norm-setting, confidence-building, capacity-building and the application of international law for the use of ICTs by States. Among other recommendations, the Report lays down recommendations for States for voluntary, non-binding norms, rules or principles of responsible behaviour to promote an open, secure, stable, accessible and peaceful ICT environment.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As larger international dialogues around cross border sharing of information and cooperation for cyber security purposes take place between the US and EU, it is critical that India begin to participate in these discussions.&lt;a name="_ftnref3" href="#_ftn3"&gt;[3]&lt;/a&gt; It is also necessary to take 	cognizance of the importance of implementing internal practices and policies that are recognized and set strong standards at the international level.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This paper marks the beginning of a series of questions we will be asking and processes we will be analysing with the aim of understanding the role of international cooperation for cyber security and the interplay between privacy and security. The report analyses the existing norms in India in the backdrop of the recommendations in the Report of Experts to discover how interoperable Indian law and policy is vis-à-vis the recommendations made in this report as well as making recommendations towards ways India can enhance national policies, practices, and approaches to enable greater collaboration at the international level with respect to issues concerning ICTs and security.&lt;/p&gt;
&lt;h3 id="2"&gt;2. Analysis of the Recommendations&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Group of Experts took into account existing and emerging threats, risks and vulnerabilities, in the field of ICT and offered the following 	recommendations for consideration by States for voluntary, non-binding norms, rules or principles of responsible behaviour.&lt;/p&gt;
&lt;h4 id="2a"&gt;2a. Consistent with the purposes of the United Nations, including to maintain international peace and security, States should cooperate in developing and applying measures to increase stability and security in the use of ICTs and to prevent ICT practices that are acknowledged to be harmful or that may pose threats to international peace and security&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;1. India has been working with a number of countries such as Belarus, Canada, China, Egypt, and France on a number of ICT-related isues thereby increasing international cooperation in the ICT sector, such as:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(i) setting up the India-Belarus Digital Learning Centre (DLC-ICT) to promote&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;development of ICT in Belarus;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(ii) sending an official business delegation to Canada to attend the 2&lt;sup&gt;nd&lt;/sup&gt;Joint Working Group meeting in ICTE;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(iii) holding Joint Working Groups on ICT with China.&lt;a name="_ftnref4" href="#_ftn4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As can be seen from this, most of the cooperation with other countries is currently government to government (or government institution to government 	institution) cooperation. However, it must be noted that the entire digital revolution, including ICT necessarily involves ICT companies, and thus the role 	of the private sector in participating in these negotiations as well as the responsibilities of private sector ICT companies in cross border cooperation. 	Furthermore, the above examples are a few of the many agreements, Memoranda of Understanding (MOU), and negotiations that India has with other countries on 	cross border cooperation. It is important that, to the extent possible, these negotiations and transparent and easily publicly available.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;2. The primary legislation governing ICT in India is the Information Technology Act, 2000 ("IT Act") which was passed to provide legal recognition for the 	transactions carried out by means of electronic data interchange and other means of electronic communication. The IT Act contains a number of provisions 	that declare illegal activities that threatenICT infrastructure, data, and individuals as illegal and provide for penalties for the same. These activities 	are:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 43 - &lt;/strong&gt; &lt;em&gt;Penalty and Compensation for damage to computer, computer system, etc.: &lt;/em&gt; If any person without permission: (i) accesses a computer, computer system or network; (ii) downloads, copies or extracts any data from such computer, 	computer system or network; (iii) introduces any computer contaminant or computer virus into, destroys, deletes or alters any information on, damages or 	disrupts any computer, computer system or network; (iv) denies or causes the denial of access to any computer, computer system or network by any means; (v) 	helps any person to access a computer, computer system or network in contravention of the Act; (vi) charges the services availed of by a person to the 	account of another person through manipulation; or (vii) Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any 	computer source code used for a computer resource with an intention to cause damage, he shall be liable to pay damages by way of compensation to the person 	so affected.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66 &lt;/strong&gt; &lt;em&gt;- Computer Related Offences: &lt;/em&gt; If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend 	to two three years or with fine which may extend to Rs. 5,00,000/- or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66B &lt;/strong&gt; &lt;em&gt;- Punishment for dishonestly receiving stolen computer resource or communication device:&lt;/em&gt; Whoever dishonestly receives or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen 	computer resource or communication device, shall be punished with imprisonment of either description for a term which may extend to three years or with 	fine which may extend to Rs. 1,00,000/- or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66C - &lt;/strong&gt; &lt;em&gt;Punishment for identity theft:&lt;/em&gt; Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall 	be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees 	one lakh.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66D - &lt;/strong&gt; &lt;em&gt;Punishment for cheating by personation by using computer resource:&lt;/em&gt; Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a 	term which may extend to three years and shall also be liable to fine which may extend to Rs. 1,00,000/-.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66E - &lt;/strong&gt; &lt;em&gt;Punishment for violation of privacy:&lt;/em&gt; Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under 	circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding Rs. 	2,00,000 or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66F - &lt;/strong&gt; &lt;em&gt;Punishment for cyber terrorism:&lt;/em&gt; (1) Whoever,- (A) with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the 	people by -&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Denying or cause the denial of access to computer resource; or&lt;/li&gt;
&lt;li&gt;Attempting to penetrate a computer resource; or&lt;/li&gt;
&lt;li&gt;Introducing or causing to introduce any computer contaminant and by means of such conduct causes or is likely to cause death or injuries to persons 	or damage to or destruction of property or disrupts or knowing that it is likely to cause damage or disruption of supplies or services essential to the 	life of the community or adversely affect the critical information infrastructure, or&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;(B) knowingly or intentionally penetrates a computer resource and by by doing so obtains access to information that is restricted for reasons of the 	security of the State or foreign relations; or any restricted information with reasons to believe that such information may be used to cause or likely to 	cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, 	decency or morality, or in relation to contempt of court, defamation or incitement to an offence, or to the advantage of any foreign nation, group of 	individuals or otherwise, commits the offence of cyber terrorism.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(2) Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; Section 67 - &lt;/strong&gt; &lt;em&gt;Publishing of information which is obscene in electronic form:&lt;/em&gt; Whoever publishes or transmits in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to 	tend to deprave and corrupt persons, shall be punished on first conviction with a maximum imprisonment upto 2 years and a maximum fine upto Rs. 5,00,000 	and for a second or subsequent conviction with a maximum imprisonment upto 5 years and also a maximum with fine upto Rs. 10,00,000.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; Section 67A - &lt;/strong&gt; &lt;em&gt;Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form:&lt;/em&gt; Whoever publishes or transmits in the electronic form any material which contains sexually explicit act or conduct shall be punished on 1st conviction with 	a maximum imprisonment for 5 years and a maximum fine of upto Rs. 10,00,000 and for a 2nd or subsequent conviction with a maximum imprisonment of 7 years 	and a maximum fine upto Rs. 10,00,000.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 67B - &lt;/strong&gt; &lt;em&gt;Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form: &lt;/em&gt; Whoever,- (a) publishes or transmits material in any electronic form which depicts children engaged in sexually explicit act or conduct; or (b) creates 	text or digital images, collects, seeks, browses, downloads, advertises, promotes, exchanges or distributes material in any electronic form depicting 	children in obscene or indecent or sexually explicit manner; or (c) cultivates, entices or induces children to online relationship with one or more 	children for and on sexually explicit act or in a manner that may offend a reasonable adult on the computer resource; or (d) facilitates abusing children 	online; or (e) records in any electronic form own abuse or that of others pertaining to sexually explicit act with children, shall be punished on first conviction with a maximum imprisonment upto 5 years and a maximum fine upto Rs. 10,00,000 and in the event of a 2nd or 	subsequent conviction with a maximum imprisonment upto 7 years and also a maximum fine upto Rs. 10,00,000.&lt;a name="_ftnref5" href="#_ftn5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 72 - &lt;/strong&gt; &lt;em&gt;Breach of confidentiality and privacy: &lt;/em&gt; Any person who, in pursuance of any of the powers conferred under this Act, has secured access to any electronic record, book, register, correspondence, 	information, document or other material without the consent of the person concerned discloses the same to any other person shall be punished with 	imprisonment for a term which may extend to two years, or with fine which may extend to Rs. 1,00,000 or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 72-A - &lt;/strong&gt; &lt;em&gt;Punishment for Disclosure of information in breach of lawful contract:&lt;/em&gt; Any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing 	personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses such 	material to any other person shall be punished with imprisonment for a term which may extend to three years, or with a fine which may extend to Rs. 	5,00,000 or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;3. The broad language and wide terminology used IT Act seems to cover most of the cyber crimes faced in India as of now, though the technical abilities to 	prevent the crimes still leave a lot to be desired. The prevention of cyber crime is not the domain of the IT Act and is rather the responsibility of the 	law enforcement authorities (note: there is no specific authority created under the IT Act, the Act is enforced by the police and other law enforcement 	authorities). That said, it may be a useful exercise to briefly compare these provisions with the crimes mentioned in the Convention on Cybercrime, 2001 	(Budapest Convention), an international treaty that seeks to addresses threats in cyber space by promoting the harmonization of national laws and 	cooperation across jurisdictions, to examine if there are any that are not covered by the IT Act. A comparison of the principles in Budapest Convention and 	the IT Act is below:&lt;/p&gt;
&lt;table style="text-align: justify;" class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;S. No.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article of the Budapest Convention&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Provisions of the IT Act which cover the same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 2 - Illegal Access&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 43(a) read with Section 66&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 3 - Illegal Interception&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 69 of the IT Act read with section 45 as well as Section 24 of the Telegraph Act, 1885&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 4 - Data interference&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Sections 43(d) and 43(f) read with section 66&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;4&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 5 - System interference&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Sections 43(d), (e) and (f) read with section 66&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 6 - Misuse of devices&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Not specifically covered&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;6&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 7 - Computer related forgery&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Computer related forgery is not specifically covered, but it is possible that when such a case comes to light, the provisions of Section 43 					read with section 66 as well as provisions of the Indian Penal Code, 1860 would be pressed into service to cover such crimes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 8 - Computer related fraud&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;While not specifically covered by the IT Act, it is possible that when such a case comes to light, the provisions of Section 43 read with 					section 66 as well as provisions of the Indian Penal Code, 1860 would be pressed into service to cover such crimes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 9 - Offences relating to child pornography&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 67B&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;As can be seen from the above discussion, most of the criminal acts elucidated in the Budapest Convention are covered under the IT Act except for the 	provision on misuse of devices, which requires the production, dealing, trading, etc. in devices whose sole objective is to violate the provisions of the 	IT Act, though it is possible that provisions of the Indian Penal Code, 1860 dealing with conspiracy and aiding and abetment may be pressed into service to 	cover such incidents.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;4. Further, there are a number of laws which deal with critical infrastructure in India, however since these are mostly sectoral laws dealing with specific 	infrastructure sectors, the one most relevant to ICT is the Telegraph Act, 1885, which makes it illegal to interfere with or damage critical telegraph 	infrastructure. The specific penal provisions are listed below:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 23 - &lt;/strong&gt; &lt;em&gt;Intrusion into signal-room, trespass in telegraph office or obstruction: &lt;/em&gt; If any person - (a) without permission of competent authority, enters the signal room of a telegraph office of the Government, or of a person licensed 	under this Act, or (b) enters a fenced enclosure round such a telegraph office in contravention of any rule or notice not to do so, or (c) refuses to quit 	such room or enclosure on being requested to do so by any officer or servant employed therein, or (d) wilfully obstructs or impedes any such officer or 	servant in the performance of his duty, he shall be punished with fine which may extend to Rs. 500.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 24&lt;/strong&gt; - &lt;em&gt;Unlawfully attempting to learn the contents of messages:&lt;/em&gt; If any person does any of the acts mentioned in section 23 with the intention of 	unlawfully learning the contents of any message, or of committing any offence punishable under this Act, he may (in addition to the fine with which he is 	punishable under section 23) be punished with imprisonment for a term which may extend to one year.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 25&lt;/strong&gt; - &lt;em&gt;Intentionally damaging or tampering with telegraphs: &lt;/em&gt;If any person, intending - (a) to prevent or obstruct the transmission or delivery of any 	message, or (b) to intercept or to acquaint himself with the contents of any message, or (c) to commit mischief, damages, removes, tampers with or touches 	any battery, machinery, telegraph line, post or other thing whatever, being part of or used in or about any telegraph or in the working thereof, he shall 	be punished with imprisonment for a term which may extend to three years, or with fine or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 25A - &lt;/strong&gt; &lt;em&gt;Injury to or interference with a telegraph line or post: &lt;/em&gt; If, in any case not provided for by section 25, any person deals with any property and thereby wilfully or negligently damages any telegraph line or post 	duly placed on such property in accordance with the provisions of this Act, he shall be liable to pay the telegraph authority such expenses (if any) as may 	be incurred in making good such damage, and shall also, if the telegraphic communication is by reason of the damage so caused interrupted, be punishable 	with a fine which may extend to Rs. 1000:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;5. The telecom service providers in India have to sign a license agreement with the Department of Telecommunications for the right to provide telecom 	services in various parts of India. The telecom regulatory regime in India has gone through a lot of turmoil and evolution and currently any service 	provider wanting to provide telecom services is issued a Unified License (UL) and has to abide by the terms of the UL. Whilst most of the prohibited 	activities under the UL refer to specific terms under the UL itself such as non payment of fees and not fulfilling obligations under the UL, section 38 	provides for certain specific prohibited activities which may be relevant for the ICT sector. These prohibited activities include:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(i) Carrying objectionable, obscene, unauthorized or any other content, messages or communications infringing copyright and intellectual property right 	etc., which may be prohibited by the laws of India;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(ii) Provide tracing facilities to trace nuisance, obnoxious or malicious calls, messages or communications transported through his equipment and network, 	to the authorised government agencies;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(iii) Ensuring that the Telecommunication infrastructure or installation thereof, carried out by it, should not become a safety or health hazard and is not 	in contravention of any statute, rule, regulation or public policy;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(iv) not permit any telecom service provider whose license has been revoked to use its services. Where such services are already provided, i.e. 	connectivity already exists, the license is required to immediately sever connectivity immediately.&lt;/p&gt;
&lt;h4 id="2b"&gt;2b. In case of ICT incidents, States should consider all relevant information, including the larger context of the event, the challenges of attribution in the ICT environment and the nature and extent of the consequences&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;The Department of Electronics and Information Technology (DEITY) has released the XIIth Five Year Plan on the information technology sector and the report of the Sub-Group on Cyber Security in the plan recognizes that cyber security threats emanate from a wide variety of sources and manifest themselves in disruptive activities that target individuals, businesses, national infrastructure and Governments alike.	&lt;a name="_ftnref6" href="#_ftn6"&gt;[6]&lt;/a&gt; The primary objectives of the plan for securing the country's cyber space are preventing cyber attacks, reducing national vulnerability to cyber attacks, and minimizing damage and recovery time from cyber attacks. The plan takes into account a number of focus areas to achieve its stated objectives, which are described briefly below:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;em&gt;Enabling Legal Framework&lt;/em&gt; - Setting up think tanks in Public-Private mode to identify gaps in the existing policy and frameworks and take action to address them including addressing the privacy concerns of online users.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security Policy, Compliance and Assurance&lt;/em&gt; - Enhancement of IT product security assurance mechanism (Common Criteria security 	test/evaluation, ISO 15408 &amp;amp; Crypto Module Validation Program), establishing a mechanism for national cyber security index leading to national risk 	management framework.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security Resarch&amp;amp;Development (R&amp;amp;D)&lt;/em&gt; - Creation of Centres of Excellence in identified areas of advanced Cyber Security R&amp;amp;D and Centre for Technology Transfer to facilitate transition of R&amp;amp;D prototypes to production, supporting R&amp;amp;D projects in thrust areas.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security Incident&lt;/em&gt; - Early Warning and Response - Comprehensive threat assessment and attack mitigation by means of net traffic analysis and deployment of honey pots, development of vulnerability database.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security awareness, skill development and training&lt;/em&gt; - Launching formal security education, skill building and awareness programs.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Collaboration&lt;/em&gt; - Establishing a collaborative platform/ think-tank for cyber security policy inputs, discussion and deliberations, operationalisation of security cooperation arrangements with overseas CERTs and industry, and seeking legal cooperation of international agencies on cyber 	crimes and cyber security.&lt;/li&gt;&lt;/ul&gt;
&lt;h4 id="2c"&gt;2c. States should not knowingly allow their territory to be used for internationally wrongful acts using ICTs&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;As mentioned in response to (a) above, the primary legislation in India that deals with information technology and hence ICT as well is the Information 	Technology Act, 2000. The IT Act contains a number of penal provisions which make it illegal to indulge in a number of practices such as hacking, online fraud, etc. which have been recognised internationally as wrongful acts using ICT (	&lt;em&gt;Please refer to answer under section (a) above for details of the penal provisions&lt;/em&gt;). Further section 1(2) of the IT Act provides that it also 	applies to any offence or contravention hereunder committed outside India by any person. This means that the IT Act also covers internationally wrongful acts using ICTs.&lt;/p&gt;
&lt;h4 id="2d"&gt;2d. States should consider how best to cooperate to exchange information, assist each other, prosecute terrorist and criminal use of ICTs and implement other cooperative measures to address such threats. States may need to consider whether new measures need to be developed in this respect&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;There are a number of ways in which states can share information by using widely accepted formal processes precisely for this purpose. Some of the most 	common methods of international exchange used by India are given below.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;MLATs&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Although the exact process by which intelligence agencies in India share information with other agencies internationally is unclear, India is a member of Interpol and the Central Bureau of Investigation, which is a Federal/Central investigating agency functioning under the Central Government, Department of Personnel &amp;amp; Training and is designated as the National Central Bureau of India. A very useful tool in the effort to establish cross-border cooperation is Mutual Legal Assistance Treaties (MLATs). MLATs are extremely important for law enforcement agencies, governments and the private sector, since they act as formal mechanisms for access to data which falls under different jurisdictions. India currently has MLATs with the following 39 countries &lt;a name="_ftnref7" href="#_ftn7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Although MLATs are considered to be a useful mechanism to ensure international cooperation, there are certain criticisms of the MLAT mechanism, such as:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;The Lack of Clear Time Tables:&lt;/strong&gt; Although MLATs do provide for broad time frames, they do not provide for more specific time tables and usually do not have any provision for an expedited process, for eg. it is believed that for requests to the U.S., processing can take from six weeks (for requests with minimal issues complying with U.S. legal standards) to 10 months.&lt;a name="_ftnref8" href="#_ftn8"&gt;[8]&lt;/a&gt; Such a long time frame is clearly a burden on the investigation process and has been criticised for being ineffectual as they may not provide information fast enough;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Variation in Legal Standards:&lt;/strong&gt; The legal standards for requesting information, for eg. the circumstances under which information can be requested or what information can be requested, differ from jurisdiction to jurisdiction. These differences are often not understood by requesting nations thus causing problems in accessing information;&lt;a name="_ftnref9" href="#_ftn9"&gt;[9]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Inefficient Legal Process:&lt;/strong&gt; The legal process to carry out requests through the MLAT process is often considered too cumbersome and inefficient.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Non-incorporation of Technological Challenges:&lt;/strong&gt; MLATs have not been updated to meet the challenges brought about by technology, especially with the advent of networked infrastructure and ICT which raise issues of attribution and cross-jurisdictional access to information. &lt;a name="_ftnref10" href="#_ftn10"&gt;[10]&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Extradition&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Extradition generally refers to the surrender of an alleged or convicted criminal by one State to another. More precisely, it may be defined as the process 	by which one State upon the request of another surrenders to the latter a person found within its jurisdiction for trial 	&lt;s&gt; and punishment &lt;/s&gt; or, if he has been already convicted, only for punishment, on account of a crime punishable by the laws of the requesting State and committed outside the 	territory of the requested State. Extradition plays an important role in the international battle against crime and owes its existence to the so-called 	principle of territoriality of criminal law, according to which a State will not apply its penal statutes to acts committed outside its own boundaries 	except where the protection of special national interests is at stake. India currently has extradition treaties with 37 countries and extradition 	arrangements with an additional 8 countries.&lt;a name="_ftnref11" href="#_ftn11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Letters Rogatory&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A Letter Rogatory is a formal communication in writing sent by the Court in which an action is pending to a foreign court or Judge requesting that the 	testimony of a witness residing within the jurisdiction of that foreign court be formally taken under its direction and transmitted to the issuing court 	making the request for use in a pending legal contest or action. This request entirely depends upon the comity of courts towards each other and usages of 	the court of another nation.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Apart from the above methods, India also regularly signs Bilateral MoUs with various countries on law enforcement and information sharing specially in 	cases related to terrorism. India also regularly helps and gets helps from Interpol, the International Criminal Police Organisation for purposes of 	investigation, arrests and sharing of information.&lt;a name="_ftnref12" href="#_ftn12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Other than these formal methods states sometimes share information on an informal basis, where the parties help each other purely on the basis of goodwill, 	or sometimes even coercion. A recent example of informal cooperation between the security agencies of India and Nepal, although not in the realm of cyber 	space, was the arrest of YasinBhatkal, leader of the banned organisation Indian Mujahideen (IM) where the Indian security agencies allegedly sought informal help from their Neapaelese counterparts to arrest a person who was wantedhad long been wanted by the Indian security agencies for a long time.	&lt;a name="_ftnref13" href="#_ftn13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the current environment of growing ICT and increased cross-border information sharing between individuals, the role of private companies who carry this 	information has become much more pronounced. This changed dynamic raises new problems, especially because manyin light of thesefact that a number of these 	companies do not have a physical presence in all the countries where they offer services over the internet. This leads to problems for states in terms of 	law enforcement, speciallyespecially if they want information from these companies who do not have an incentive or desire to provide itagainst their will. 	These circumstances lead to a number of prickly situations where states are often frustrated in using legal and formal means and often resort to informal 	pressure to get the companies to agree to data localization requests, encryption/decryption standards and keys, back doors, and other requests. etc., Tthe 	most famous of these in the Indian context being the disagreement/ heated exchange between the Indian government and Canada based Blackberry Limited 	(formerly Research in Motion) for data requests on their Blackberry enterprise platform.&lt;/p&gt;
&lt;h4 id="2e"&gt;2e. States, in ensuring the secure use of ICTs, should respect Human Rights Council resolutions 20/8 and 26/13 on the promotion, protection and enjoyment of human rights on the Internet, as well as General Assembly resolutions 68/167 and 69/166 on the right to privacy in the digital age, to guarantee full respect for human rights, including the right to freedom of expression&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;Right to Privacy&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p style="text-align: justify;"&gt;The right to privacy has been recognised as a constitutionally protected fundamental right in India through judicial interpretation of the right to life which is specifically guaranteed under the Constitution of India. Since the right to privacy was read into the constitution by judicial pronouncements, it could be said that the right to privacy in India is a creature of the courts at least in the Indian context. For this reason it may be useful to list out some of the major cases which deal with the right to privacy in India:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;i. &lt;em&gt;Kharak Singh&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;¸&lt;a name="_ftnref14" href="#_ftn14"&gt;[14]&lt;/a&gt; (1962)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. For the first time, the courts recognized the right to privacy as a fundamental right, although in a minority opinion.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. The decision lLocated the right to privacy under both the right to personal liberty as well as freedom of movement.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;ii. &lt;em&gt;Govind&lt;/em&gt; v. &lt;em&gt;State of M.P.&lt;/em&gt;,&lt;a name="_ftnref15" href="#_ftn15"&gt;[15]&lt;/a&gt; (1975)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Adopted the minority opinion of &lt;em&gt;Kharak Singh &lt;/em&gt;as the opinion of the Supreme Court and held that the right to privacy is a fundamental right.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. An individual deDerivesd the right to privacy from both the right to life and personal liberty as well as freedom of speech and movement.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. The right to privacy was said to encompass and protect the personal intimacies of the home, the family marriage, motherhood, procreation and child 	rearing.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;d. The court established that the rRight to privacy can be violated in the following circumstances (i) important countervailing interest which is superior, 	(ii) compelling state interest test, and (iii) compelling public interest.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;iii. &lt;em&gt;R. Rajagopal&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;,&lt;a name="_ftnref16" href="#_ftn16"&gt;[16]&lt;/a&gt; (1994)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Recognised that the rRight to privacy is a part of the right to personal liberty guaranteed under the constitution.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. Recognizeds that the right to privacy can be both a tort (actionable claim) as well as a fundamental right.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. Established that aA citizen has a right to safeguard the privacy of his own, his family, marriage, procreation, motherhood, child-bearing and education 	among other matters and nobody can publish anything regarding the same unless (i) he consents or voluntarily thrusts himself into controversy, (ii) the 	publication is made using material which is in public records (except for cases of rape, kidnapping and abduction), or (iii) he is a public servant and the matter relates to their discharge of official duties.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;iv. &lt;em&gt;People's Union for Civil Liberties&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;,&lt;a name="_ftnref17" href="#_ftn17"&gt;[17]&lt;/a&gt; (1996)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Extended the right to privacy to include communications privacy..&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. Laid down guidelines which form the backbone for checks and balances in interception provisions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;v. &lt;em&gt;District Registrar and Collector, Hyderabad and another&lt;/em&gt; v. &lt;em&gt;Canara Bank and another&lt;/em&gt;,	&lt;a name="_ftnref18" href="#_ftn18"&gt;[18]&lt;/a&gt; (2004)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Refers to personal liberty, freedom of expression and freedom of movement as the fundamental rights which give rise to the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. The rRight to privacy deals with persons and not places.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. Intrusion into privacy may be by - (1) legislative provisions, (2) administrative/executive orders and (3) judicial orders.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;vi. &lt;em&gt;Selvi and others&lt;/em&gt; v. &lt;em&gt;State of Karnataka and others&lt;/em&gt;,&lt;a name="_ftnref19" href="#_ftn19"&gt;[19]&lt;/a&gt; (2010)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. The Court acknowledged the distinction between bodily/physical privacy and mental privacy&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. Subjecting a person to techniques such as narcoanalysis, polygraph examination and the Brain Electrical Activation Profile (BEAP) test without consent violates the subject's mental privacy&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;Although the judgements in the above cases (except for the case of &lt;em&gt;People's Union for Civil Liberties&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;) were pronounced given in a non telecomnot delivered in a telecommunications context, however the ease with which these principles were applied in the case of	&lt;em&gt;People's Union for Civil Liberties&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;, suggests that these principles, where applicable, would be applied even in the context of ICT and are not limited to only the non-digital world.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;It must however be noted that dueDue to some incongruities in the interpretation of the earlier judgments, the Supreme Court has recently referred the 	matter regarding the existence and scope of the right to privacy in India to a larger bench so as to bring clarity regarding the exact scope of the right 	to privacy in Indian law. The very concept that the Constitution of India guarantees a right to privacy was challenged due to an "unresolved contradiction" in judicial pronouncements. This "unresolved contradiction" arose because in the cases of &lt;em&gt;M.P. Sharma &amp;amp; Others v. Satish Chandra &amp;amp; Others&lt;/em&gt;,&lt;a name="_ftnref20" href="#_ftn20"&gt;[20]&lt;/a&gt; and &lt;em&gt;Kharak Singh v. State of U.P. &amp;amp; Others,&lt;/em&gt; &lt;a name="_ftnref21" href="#_ftn21"&gt;[21]&lt;/a&gt;(decided by&lt;em&gt;Eigh&lt;/em&gt;eight&lt;em&gt;t&lt;/em&gt;andsix&lt;em&gt;Six&lt;/em&gt;Judges respectively) the majority judgment of 	the Supreme Court had categorically denied the existence of a right to privacy under the Indian Constitution.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However somehow the later case of Gobind v. &lt;em&gt;State of M.P. and another&lt;/em&gt;,&lt;a name="_ftnref22" href="#_ftn22"&gt;[22]&lt;/a&gt; (which was decided by a two Judge Bench of the Supreme Court) relied upon the opinion given by the minority of two judges in &lt;em&gt;Kharak Singh &lt;/em&gt;to hold that a right to privacy 	does exist and is guaranteed as a fundamental right under the Constitution of India without addressing the fact that this was a minority opinion and that the majority opinion had denied the existeance of the right to privacy. Thereafter a large number of cases have held the right to privacy to be a fundamental right, the most important of which are &lt;em&gt;R. Rajagopal&amp;amp; Another &lt;/em&gt;v. &lt;em&gt;State of Tamil Nadu &amp;amp; Others&lt;/em&gt;,&lt;a name="_ftnref23" href="#_ftn23"&gt;[23]&lt;/a&gt; (popularly known as &lt;em&gt;Auto Shanker's case&lt;/em&gt;) and	&lt;em&gt;People's Union for Civil Liberties (PUCL) &lt;/em&gt;v. &lt;em&gt;Union of India &amp;amp; Another&lt;/em&gt;.&lt;a name="_ftnref24" href="#_ftn24"&gt;[24]&lt;/a&gt; However, as was noticed by the Supreme Court in its August 11, 2015 order, all these judgments were decided by two or three Judges only which could not have overturned the judgments given by larger benches.&lt;a name="_ftnref25" href="#_ftn25"&gt;[25]&lt;/a&gt; It was to resolve this judicial incongruity that the Supreme Court referred this issue to a larger bench to decide on the existence and scope of the right to privacy in India.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Freedom of Expression&lt;/strong&gt;&lt;/p&gt;
&lt;ol start="4"&gt;&lt;li&gt;
&lt;p style="text-align: justify;"&gt;Freedom of expression is one of the most important fundamental rights guaranteed under the constitution and has been vehemently protected by the judiciary on a number of occasions whenever it has been threatened. With the advent of social media, the entire dynamics of the freedom of speech and expression have changed in that it is now possible for every individual, with an internet connection and a Facebook/Twitter/Whatsapp account to reach millions of people without spending any extra money. This ability to reach a much larger and wider audience also led to greater friction between people holding different opinions. As the ease of the internet removed the otherwise filtering effects of geography and made it easier for people to communicate with each other, the advent of social media made it easier for them to communicate with a larger number of people at the same time. This ability to communicate within a group also gave rise to "debates" which often turngot ugly, highlighting giving way to concerns of how easy it is to harass people on social media.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;This concern over of harassment led a number of people to call for greater censorship of social media and it was perhaps this concern which gave rise to the biggest challenge to the freedom of speech and expression in the online world, in the form of section 66A of the Information Technology Act, 	2000 which made it an offense to send information which was "grossly offensive" (s.66A(a)) or caused "annoyance" or "inconvenience" while being known to be false (s.66A(c)). This section was used widely seen by Oonline activists, including the Centre for Internet and Society, widely considered this section as a tool for the government to silence those who criticised it. In fact, statistics compiled by the National Crime Records Bureau from 2014 revealed that 	2,402 people, including 29 women, were arrested in 4,192 cases under section 66A which accounted for nearly 60% of all arrests under the IT Act, and 40% of arrests for cyber crimes in 2014. &lt;a name="_ftnref26" href="#_ftn26"&gt;[26]&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;The section was finally struck down by the Supreme Court in 2015 in the case of &lt;em&gt;Shreya Singhal&lt;/em&gt;v. &lt;em&gt;Union of India&lt;/em&gt;, &lt;a name="_ftnref27" href="#_ftn27"&gt;[27]&lt;/a&gt; on the ground of being too vague. This decision was seen as a huge victory for the campaign for 	freedom of speech and expression in the virtual world since this section was frequently used by the state (or rather government in power) to muzzle free 	speech against the incumbent government or political leaders. The offending section 66A made it an offence to send any information that was "grossly offensive or has menacing character" or "which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by makinguse of such computer resource or a communication device,". These terms quoted above were held by the Court to be too vague and wide and falling foul of the limited restrictions constitutionally imposed on the freedom of expression. The Supreme Court therefore, and were therefore struck down section 66A by the Supreme Court.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h4 id="2f"&gt;2f. A State should not conduct or knowingly support ICT activity contrary to its obligations under international law that intentionally damages critical infrastructure or otherwise impairs the use and operation of critical infrastructure to provide services to the public&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;The researchers of this report could not locate any norms in India which address this issue. To the best of their knowledge, India does not support any ICT activity that intentionally damages critical infrastructure or impairs the use and operation of critical infrastructure.&lt;/p&gt;
&lt;h4 id="2g"&gt;2g. States should take appropriate measures to protect their critical infrastructure from ICT threats, taking into account General Assembly resolution 58/199 on the creation of a global culture of cybersecurity and the protection of critical information infrastructures, and other relevant resolutions&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;1. Section 70 of the IT Act gives the government the authority to declare any computer system which directly affects any critical information infrastructure to be a protected system. The term "critical information infrastructure" (CII) is defined in the IT Act "the computer resource, the 	incapacitation or destruction of which, shall have debilitating impact on national security, economy, public health or safety." Once the government declares any computer resource as a protected system it gets the authority to prescribe information security practices for such as system as well as 	identify the persons who are authorised to access such systems. Any person who accesses a protected system in contravention of the provision of Section 70 of the IT Act shall be liable to be imprisoned for a maximum period of 10 years and also pay a fine. Further, section 70A of the IT Act gives the government the power to name a national nodal agency in respect of CII and also prescribe the manner for such agency to perform its duties. In pursuance of the powers under sections 70A the government has designated the National Critical Information Infrastructure Protection Centre (NCIIPC) situated in the JNU campus as the nodal agency &lt;a name="_ftnref28" href="#_ftn28"&gt;[28]&lt;/a&gt;. This agency is a part of and under the administrative control of the National Technical Research Organisation (NTRO) &lt;a name="_ftnref29" href="#_ftn29"&gt;[29].&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;2. The functions and manner of performing such functions by the NCIIPC has been prescribed in the Information Technology (National Critical Information 	Infrastructure Protection Centre and Manner of Performing Functions and Duties) Rules, 2013.&lt;a name="_ftnref30" href="#_ftn30"&gt;[30]&lt;/a&gt; According 	to these Rules the functions of the NCIIPC include, inter alia, (i) the protecting and giving advice to reduce the vulnerabilities of CII against cyber 	terrorism, cyber warfare and other threats; (ii) identification of all critical infrastructure elements so that they can be notified by the government; 	(iii) providing strategic leadership and coherence across the government to respond to cyber security threats against CII; (iv) coordinating, sharing, 	monitoring, analysing and forecasting national level threats to CII for policy guidance, expertiese sharing and situational awareness for early warning 	alerts; (v) assisting in the development of appropriate plans, adoption of standards, sharing best practices and refinining procurement processes for CII; 	(vi) undertaking and funding research and development to innovate future technologies and collaborate with PSUs, academia and international partners for 	protection of CII; (vii) organising training and awareness programmes and development of audit and certification agencies for protection of CII; (viii) 	developing and executing national and international cooperation strategies for protection of CII; (ix) issuing guidelines, advisories and vulnerability 	notes relating to CII and practices, procedures, prevention and responses in consultation with CERT-In and other organisations; (x) exchanging information 	with CERT-In, especially in relation to cyber incidents; and (xi) calling for information and giving directions to critical sectors or persons having a 	critical impact on CII, in the event of any threat to CII.&lt;a name="_ftnref31" href="#_ftn31"&gt;[31]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;3. The NCIIPC had in the year 2013 released (non publicly) Guidelines for the Protection of National Critical Information Infrastructure	&lt;a name="_ftnref32" href="#_ftn32"&gt;[32]&lt;/a&gt; (CII Guidelines) which presented 40forty controls and respective guiding principles for the protection 	of CII. It is expected that these controls and guiding principles will help critical sectors to draw a CII protection roadmap to achieve safe, secure and 	resilient CII for India. The 'Guidelines for forty Critical Controls' is considered by the NCIIPC to be a significant milestone in its efforts for the 	protection of nation's critical information assets. These fort controls can be found in Section 6 (Best Practices, Controls and Guidelines) of the CII 	Guidelines. It must be noted that the CII Guidelines were drafted after taking inputs from a number of stakeholders such as the national Stock Exchange, 	the Airports Authority of India, National Thermal Power Corporation, Reserve Bank of India, Indian Railways, Telecom Regulatory Authority of India, Bharat 	Sanchar Nigam Limited, etc. This exercise of taking inputs from different stakeholders as well as developing a standard of as many as 40forty aspects of 	security seems to suggest that the NCIIPC is taking steps in the right direction.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;4. The Recommendations on Telecommunication Infrastructure Policy issued by the Telecom Regulatory Authority of India in April, 2011 are silent on the 	issue of security of critical information infrastructure.s. However, the National Policy on Information Technology, 2012 (NPIT) does address the issue of 	security of cyber space by saying that the government should make efforts to do the following:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;"9.1 To undertake policy, promotion and enabling actions for compliance to international security best practices and conformity assessment (product, 	process, technology &amp;amp; people) and incentives for compliance.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;9.2 To promote indigenous development of suitable security techniques &amp;amp; technology through frontier technology research, solution oriented research, 	proof of concept, pilot development etc. and deployment of secure IT products/processes&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;9.3 To create a culture of cyber security for responsible user behavior &amp;amp; actions including building capacities and awareness campaigns.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;9.4 To create, establish and operate an 'Information Security Assurance Framework'."&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;5. The Department of Information and Technology has formed the Computer Emergency Response Term of India (CERT-In) to enhance the security of India's 	Communications and Information Infrastructure through proactive action and effective collaboration. The Information Security Policy on Protection of 	Critical Infrastructure released by the CERT-In considers information recorded, processed or stored in electronic medium as a valuable asset and is geared 	towards protection of such "valuable asset". The policy recognises the importance of critical information infrastructure network and says that any 	disruption of the operation of such networks is likely to have devastating effects. The policy prescribes that personnel with program delivery 	responsibilities should also recognise the importance of security of information resources and their management. Thus Ddue to this recognition of the 	growing networked nature of government as well as critical organisations and the need to have a proper vulnerability analysis as well as effective 	management of information security risks, the Department of Technology prescribes the following information security policy:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;"In order to reduce the risk of cyber attacks and improve upon the security posture of critical information infrastructure, Government and critical sector 	organizations are required to do the following on priority:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Identify a member of senior management, as Chief Information Security Officer (CISO), knowledgeable in the nature of information security &amp;amp; 	related issues and designate him/her as a 'Point of contact', responsible for coordinating security policy compliance efforts and to regularly interact 	with the Indian Computer Emergency Response Team (CERT-In), Department of Information Technology (DIT), which is the nodal agency for coordinating all 	actions pertaining to cyber security;&lt;/li&gt;
&lt;li&gt;Prepare information security plan and implement the security control measures as per ISI/ISO/IEC 27001: 2005 and other guidelines/standards, as 	appropriate;&lt;/li&gt;
&lt;li&gt;Carry out periodic IT security risk assessments and determine acceptable level of risks, consistent with criticality of business/functional 	requirements, likely impact on business/ functions and achievement of organisational goals/objectives;&lt;/li&gt;
&lt;li&gt;Periodically test and evaluate the adequacy and effectiveness of technical security control measures implemented for IT systems and networks. 	Especially, Test and evaluation may become necessary after each significant change to the IT applications/systems/networks and can include, as appropriate 	the following:&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;➢ Penetration Testing (both announced as well as unannounced)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;➢ Vulnerability Assessment&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;➢ Application Security Testing&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;➢ Web Security Testing&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Carry out Audit of Information infrastructure on an annual basis and when there is major upgradation/change in the Information Technology 	Infrastructure, by an independent IT Security Auditing organization;..........&lt;/li&gt;&lt;/ul&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Report to CERT-In the cyber security incidents, as and when they occur and the status of cyber security, periodically."&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;6. The Department of Electronics and Information Technology (DEITY) released the National Policy on Electronics in 2012 which contained the government's 	take on the electronics industry in India. Section 5 of the said policy talks about cCyber sSecurity and states that to create a complete secure cyber 	eco-system in the country, careful and due attention is required for creation of well-d defined technology and systems, use of appropriate technology and 	more importantly development of appropriate products and&amp;amp; solutions. The priorities for action should be suitable design and development of indigenous 	appropriate products through frontier technology/product oriented research, testing and&amp;amp; validation of security of products meeting the protection 	profile requirements needed to secure the ICT infrastructure and cyber space of the country.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;7. In addition the CERT-In has issued an Information Security Management Implementation Guide for Government Organisations.	&lt;a name="_ftnref33" href="#_ftn33"&gt;[33]&lt;/a&gt; CERT-In has also prescribed progressive steps for implementation of Information Security Management 	System in Government &amp;amp; Critical Sectors as per ISO 27001. The steps prescribed are as follows:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Identification of a Point-of-Contact (POC) / Chief Information Security Officer (CISO) for coordinating information security policy implementation 	efforts and communication with CERT-In&lt;/li&gt;
&lt;li&gt;Information Security Awareness Programme&lt;/li&gt;
&lt;li&gt;Determination of general Risk environment of the organization (low / medium / hHigh) depending on the nature of web and&amp;amp; networking environment, 	criticality of business functions and impact of information security incidents on the organization, business activities, assets / resources and individuals&lt;/li&gt;
&lt;li&gt;Status appraisal and gap analysis against ISO 27001 based best information security practices&lt;/li&gt;
&lt;li&gt;Risk assessment covering evaluation of threat perception and technical and &amp;amp;operational vulnerabilities&lt;/li&gt;
&lt;li&gt;Comprehensive risk mitigation plan including selection of appropriate information security controls as per ISO 27001 based best information security 	practices&lt;/li&gt;
&lt;li&gt;Documentation of agreed information security control measures in the form of information security policy manual, procedure manual and work 	instructions&lt;/li&gt;
&lt;li&gt;Implementation of information security control measures (Managerial, Technical and&amp;amp; operational)&lt;/li&gt;
&lt;li&gt;Testing &amp;amp; evaluation of technical information security control measures for their adequacy &amp;amp; effectiveness and audit of IT 	applications/systems/networks by an independent information security auditing organization (penetration testing, vulnerability assessment, application 	security testing, web security testing, LAN audits, etc)&lt;/li&gt;
&lt;li&gt;Information Security Management assessment and certification against ISO 27001 standard, preferably by an independent &amp;amp; accredited organization&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;8. The Unified License for providing various telecommunication services also discusses contains certain terms which talk about how to engagedeal with 	telecommunication infrastructure in light of national security, which include the following recommendations:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Providing necessary facilities to the Government to counteract espionage, subversive act, sabotage or any other unlawful activity;&lt;/li&gt;
&lt;li&gt;Giving full access to its network and equipment to the authorised persons for technical scrutiny and inspection;&lt;/li&gt;
&lt;li&gt;Obtaininggettting security clearance for all foreign nationals deployed on for installation, operation and maintenance of the network;&lt;/li&gt;
&lt;li&gt;Being completely responsible for the security of its network and having organizational policy on security and security management of its network 	including Network forensics, Network Hardening, Network penetration test, Risk assessment;&lt;/li&gt;
&lt;li&gt;Auditing its network or getting the network audited from security point of view once in a financial year from a network audit and certification 	agency;&lt;/li&gt;
&lt;li&gt;Inducting only those network elements into its telecommunications network, which have been got tested according tos per relevant contemporary Indian 	or International Security Standards;&lt;/li&gt;
&lt;li&gt;Including all contemporary security related features (including communication security) as prescribed under relevant security standards while 	procuring the equipment and implementing all such contemporary features into the network;&lt;/li&gt;
&lt;li&gt;Keeping requisite records of operations in the network;&lt;/li&gt;
&lt;li&gt;Monitoring of all intrusions, attacks and frauds on his technical facilities and provide reports on the same to the Licensor.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Further statutory restrictions on tampering critical infrastructure are already contained in the Telegraph Act and have been discussed above, though the 	penalties provided may need to be increased if they are to act as a deterrent in this age where the stakes are much higher.&lt;/p&gt;
&lt;h4 id="2h"&gt;2h. States should respond to appropriate requests for assistance by another State whose critical infrastructure is subject to malicious ICT acts. States should also respond to appropriate requests to mitigate malicious ICT activity aimed at the critical infrastructure of another State emanating 	from their territory, taking into account due regard for sovereignty&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;There is yet to be a publicly acknowledged request from a foreign government asking the Indian government to take steps to prevent malicious ICT acts originating from its territory.&lt;/p&gt;
&lt;h4 id="2i"&gt;2i. States should take reasonable steps to ensure the integrity of the supply chain so that end users can have confidence in the security of ICT products. States should seek to prevent the proliferation of malicious ICT tools and techniques and the use of harmful hidden functions;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Section 4 of the National Electronics Policy, 2012 talks about "Developing and Mandating Standards" and says that in order to curb the inflow of sub-standard and unsafe electronic products the government should mandate technical and safety standards which conform to international standards and do the following:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Develop Indian standards to meet specific Indian conditions including climatic, power supply, and handling and other conditions etc., by suitably reviewing existing standards.&lt;/li&gt;
&lt;li&gt;Mandate technical standards in the interest of public health and safety.&lt;/li&gt;
&lt;li&gt;Set up an institutional mechanism within Department of Information Technology for mandating compliance to standards for electronics products.&lt;/li&gt;
&lt;li&gt;Develop a National Policy Framework for enforcement and use of Standards and Quality Management Processes.&lt;/li&gt;
&lt;li&gt;Strengthen the lab infrastructure for testing of electronic products and encouraging development of conformity assessment infrastructure by private 	participation.&lt;/li&gt;
&lt;li&gt;Create awareness amongst consumers against sub-standard and spurious electronic products.&lt;/li&gt;
&lt;li&gt;Build capacity within the Government and public sector for developing and mandating standards.&lt;/li&gt;
&lt;li&gt;Actively participate in the international development of standards in the Electronic System Design and Manufacturing sector.&lt;/li&gt;&lt;/ul&gt;
&lt;/h4&gt;
&lt;h4 id="2j"&gt;2j. States should encourage responsible reporting of ICT vulnerabilities and share associated information on available remedies to such vulnerabilities to limit and possibly eliminate potential threats to ICTs and ICT-dependent infrastructure&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;Under section 70B of the IT Act, India has established a Computer Emergency Response Team (CERT-In) to serve as the national agency for incident responses. The functions mandated to be performed by CERT-In as per the IT Act are:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Collection, analysis and dissemination of information on cyber incidents;&lt;/li&gt;
&lt;li&gt;Forecasting and alerts of cyber security incidents;&lt;/li&gt;
&lt;li&gt;Emergency measures for handling cyber security incidents;&lt;/li&gt;
&lt;li&gt;Coordination of cyber incidents response activities;&lt;/li&gt;
&lt;li&gt;Issuing ofe guidelines, advisories, vulnerability notes and white papers relating to information security practices, procedures, prevention, response 	and reporting of cyber incidents;&lt;/li&gt;
&lt;li&gt;Such other functions relating to cyber security as may be prescribed. &lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;CERT-In also publishes information regarding various cyber threats on its websites so as to keep internet users aware of the latest threats in the online world. Such information can be accessed both on the main page of the CERT-In website or under the Advisories section on the website.	&lt;a name="_ftnref34" href="#_ftn34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;h4 id="2k"&gt;2k. States should not conduct or knowingly support activity to harm the information systems of the authorized emergency response teams (sometimes known as computer emergency response teams or cyber security incident response teams) of another State. A State should not use authorized emergency response teams to engage in malicious international activity.&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;There are no official or public reports of India using its CERT-In to harm the information systems of another state, although it is highly unlikely that any state would publicly acknowledge such activities even if it was indulging in them.&lt;/p&gt;
&lt;h3 id="3"&gt;3. Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;As can be seen from the discussion above, the statutory, regulatory and policy regime in India does seem to address most of the cyber security norms in some manner or the other, but these efforts almost always fall short of meeting some of the norms. While the Information Technology Act along with 	the Rules thereunder, as being the umbrella legislation for digital transactions in India, does address some of the issues mentioned above, it does not address some of the problems that arise out of a greater reliance on the internet such as spamming, trolling, and, online harassment, etc. Although some of these acts may be addressed by regular legislation by applying them in the online world however this does not always take into account the unique features and complexities of committing these acts/crimes in the online world.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the area of exchange of information between states, India has entered into a number of MLATs and extradition treaties, and frequently issues Letters of Rogatory. Yet however these mechanisms may not be adequate to address the needs of crime prevention of crimes in the age of ICT, as crime prevention it often requires exchange of information inon r a real time basis which is not possible with the bureaucratic procedures involved in the MLAT process. There 	also needsd to be stronger standards which are applicable to ICT equipment, including imported equipment especially in light of the fact that security 	concerns related to Chinese ICT equipment that from China have been raised quite frequently in the past. There also needs to be a better system of reporting ICT vulnerabilities to CERT-In or other authorized agencies so that mitigation measure can be implemented in time.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It should be noted that the work of the Group of Experts is not complete since the General Assembly has asked the Secretary General to form a new Group of Experts which would report back to the Secretary General in 2017. It is imperative that the Government of India realise the importance of the work being done by the Group of Experts and take measures to ensure that a representative from India is included in or atleast the comments and concerns of India are 	included and addressed by the Group of Experts. Meanwhile, India can begin by strengthening domestic privacy safeguards, improving transparency and efficiency of relevant policies and processes, and looking towards solutions that respect rights and strengthen security. Brutent force solutions such as demands for back doors, unfair and unreasonable encryption regulation, and data localization requirements will not help propel India forward in international discussions, dialogues, or agreements on cross-border sharing of information. Though the recommendations from the Group of Experts are welcome, beyond a preliminary mention of privacy and freedom of expression, the rights of individuals - and the ways in which these can be protected, various components that go into supporting those rights including redress, transparency, and due process measures - was inadequately addressed.&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;[1]&lt;/a&gt; The terms "cyberspace" has been defined in the Oxford English Dictionary as the notional environment in which communication over computer networks 			occurs. Although the scope of this paper is not to discuss the meaning of this term, it was felt that a simple definition of the term would be 			useful to better define the parameters of the discussion.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;[2]&lt;/a&gt; &lt;a href="https://s3.amazonaws.com/unoda-web/wp-content/uploads/2016/01/A-RES-70-237-Information-Security.pdf"&gt; https://s3.amazonaws.com/unoda-web/wp-content/uploads/2016/01/A-RES-70-237-Information-Security.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3" href="#_ftnref3"&gt;[3]&lt;/a&gt; https://www.justsecurity.org/29203/british-searches-america-tremendous-opportunity/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4" href="#_ftnref4"&gt;[4]&lt;/a&gt; &lt;a href="http://deity.gov.in/content/country-wise-status"&gt;http://deity.gov.in/content/country-wise-status&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5" href="#_ftnref5"&gt;[5]&lt;/a&gt; Provided that the provisions of section 67, section 67A and this section does not extend to any book, pamphlet, paper, writing, drawing, painting, 			representation or figure in electronic form-&lt;/p&gt;
&lt;p&gt;(i) The publication of which is proved to be justified as being for the public good on the ground that such book, pamphlet, paper writing, drawing, 			painting, representation or figure is in the interest of science, literature, art or learning or other objects of general concern; or&lt;/p&gt;
&lt;p&gt;(ii) which is kept or used for &lt;em&gt;bona fide&lt;/em&gt; heritage or religious purposes&lt;/p&gt;
&lt;p&gt;Explanation: For the purposes of this section, "children" means a person who has not completed the age of 18 years.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6" href="#_ftnref6"&gt;[6]&lt;/a&gt; &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/Plan_Report_on_Cyber_Security.pdf"&gt; http://deity.gov.in/sites/upload_files/dit/files/Plan_Report_on_Cyber_Security.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7" href="#_ftnref7"&gt;[7]&lt;/a&gt; List of the countries is available at &lt;a href="http://cbi.nic.in/interpol/mlats.php"&gt;http://cbi.nic.in/interpol/mlats.php&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a name="_ftn8" href="#_ftnref8"&gt;[8]&lt;/a&gt; &lt;a href="https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society"&gt; https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a name="_ftn9" href="#_ftnref9"&gt;[9]&lt;/a&gt; Peter Swire&lt;sup&gt; &lt;/sup&gt;&amp;amp; Justin D. Hemmings, "Re-Engineering the Mutual Legal Assistance Treaty Process",			&lt;a href="http://www.heinz.cmu.edu/~acquisti/SHB2015/Swire.docx"&gt;http://www.heinz.cmu.edu/~acquisti/SHB2015/Swire.docx&lt;/a&gt;, &lt;em&gt;cf. &lt;/em&gt; &lt;a href="https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society"&gt; https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a name="_ftn10" href="#_ftnref10"&gt;[10]&lt;/a&gt; MLATS and International Cooperation for Law Enforcement Purposes, available at 			&lt;a href="http://cis-india.org/internet-governance/blog/presentation-on-mlats.pdf"&gt; http://cis-india.org/internet-governance/blog/presentation-on-mlats.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a name="_ftn11" href="#_ftnref11"&gt;[11]&lt;/a&gt; The full list of the countries with which India has agreed an MLAT is available at			&lt;a href="http://cbi.nic.in/interpol/extradition.php"&gt;http://cbi.nic.in/interpol/extradition.php&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a name="_ftn12" href="#_ftnref12"&gt;[12]&lt;/a&gt; &lt;a href="http://cbi.nic.in/interpol/assist.php"&gt;http://cbi.nic.in/interpol/assist.php&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a name="_ftn13" href="#_ftnref13"&gt;[13]&lt;/a&gt; &lt;a href="http://www.firstpost.com/india/how-the-police-tracked-and-arrested-im-founder-yasin-bhatkal-1071755.html"&gt; http://www.firstpost.com/india/how-the-police-tracked-and-arrested-im-founder-yasin-bhatkal-1071755.html &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a name="_ftn14" href="#_ftnref14"&gt;[14]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=3641"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=3641&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a name="_ftn15" href="#_ftnref15"&gt;[15]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=6014"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=6014&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a name="_ftn16" href="#_ftnref16"&gt;[16]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=11212"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=11212&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a name="_ftn17" href="#_ftnref17"&gt;[17]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=14584"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=14584&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a name="_ftn18" href="#_ftnref18"&gt;[18]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=26571"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=26571&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a name="_ftn19" href="#_ftnref19"&gt;[19]&lt;/a&gt; &lt;a href="http://dspace.judis.nic.in/bitstream/123456789/26592/1/36303.pdf"&gt;http://dspace.judis.nic.in/bitstream/123456789/26592/1/36303.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a name="_ftn20" href="#_ftnref20"&gt;[20]&lt;/a&gt; AIR 1954 SC 300. In para 18 of the Judgment it was held: "A power of search and seizure is in any system of jurisprudence an overriding power of 			the State for the protection of social security and that power is necessarily regulated by law. When the Constitution makers have thought fit not 			to subject such regulation to constitutional limitations by recognition of a fundamental right to privacy, analogous to the American Fourth 			Amendment, we have no justification to import it, into a totally different fundamental right, by some process of strained construction."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a name="_ftn21" href="#_ftnref21"&gt;[21]&lt;/a&gt; AIR 1963 SC 1295. In para 20 of the judgment it was held: "… Nor do we consider that Art. 21 has any relevance in the context as was sought 			to be suggested by learned counsel for the petitioner. As already pointed out, the right of privacy is not a guaranteed right under our 			Constitution and therefore the attempt to ascertain the movement of an individual which is merely a manner in which privacy is invaded is not an 			infringement of a fundamental right guaranteed by Part III."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a name="_ftn22" href="#_ftnref22"&gt;[22]&lt;/a&gt; (1975) 2 SCC 148.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a name="_ftn23" href="#_ftnref23"&gt;[23]&lt;/a&gt; (1994) 6 SCC 632.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a name="_ftn24" href="#_ftnref24"&gt;[24]&lt;/a&gt; (1997) 1 SCC 301.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a name="_ftn25" href="#_ftnref25"&gt;[25]&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"&gt; http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a name="_ftn26" href="#_ftnref26"&gt;[26]&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/news/hindustan-times-august-20-2015-aloke-tikku-stats-from-2014-reveal-horror-of-scrapped-section-66-a-of-it-act"&gt; http://cis-india.org/internet-governance/news/hindustan-times-august-20-2015-aloke-tikku-stats-from-2014-reveal-horror-of-scrapped-section-66-a-of-it-act &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a name="_ftn27" href="#_ftnref27"&gt;[27]&lt;/a&gt; &lt;a href="http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf"&gt; http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a name="_ftn28" href="#_ftnref28"&gt;[28]&lt;/a&gt; &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/S_O_18(E).pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/S_O_18(E).pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a name="_ftn29" href="#_ftnref29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a name="_ftn30" href="#_ftnref30"&gt;[30]&lt;/a&gt; &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/GSR_19(E).pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/GSR_19(E).pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a name="_ftn31" href="#_ftnref31"&gt;[31]&lt;/a&gt; Rule 4 of the Information Technology (National Critical Information Infrastructure Protection Centre and Manner of Performing Functions and Duties) 			Rules, 2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a name="_ftn32" href="#_ftnref32"&gt;[32]&lt;/a&gt; Since these Guidelines were not publicly released they are not available on any government website. In this paper we have relied on a version 			available on a private website at 			&lt;a href="http://perry4law.org/cecsrdi/wp-content/uploads/2013/12/Guidelines-For-Protection-Of-National-Critical-Information-Infrastructure.pdf"&gt; http://perry4law.org/cecsrdi/wp-content/uploads/2013/12/Guidelines-For-Protection-Of-National-Critical-Information-Infrastructure.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a name="_ftn33" href="#_ftnref33"&gt;[33]&lt;/a&gt; Available at &lt;a href="http://www.cert-in.org.in/"&gt;http://www.cert-in.org.in/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a name="_ftn34" href="#_ftnref34"&gt;[34]&lt;/a&gt; &lt;a href="http://www.cert-in.org.in/"&gt;http://www.cert-in.org.in/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;hr /&gt;
&lt;h2&gt;List of Acronyms&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;ICTs&lt;/strong&gt; – Information Communication Technologies&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;GGE&lt;/strong&gt; – Group of Experts&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;EU&lt;/strong&gt; – European Union&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;DLC-ICT&lt;/strong&gt; – India-Belarus Digital Learning Center&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;IT Act&lt;/strong&gt; – Information Technology Act, 2000&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;UL&lt;/strong&gt; - Unified License&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;DEITY&lt;/strong&gt; – Department of Electronics and Information Technology&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;IT&lt;/strong&gt; – Information Technology&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;ISO&lt;/strong&gt; – International Organization&amp;nbsp; for Standardisation&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CERT&lt;/strong&gt; – Computer Emergency Response Team&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CERT-In&lt;/strong&gt; - Computer Emergency Response Team, India&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;MLAT&lt;/strong&gt; – Mutual Legal Assistance Treaty&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CII&lt;/strong&gt; – Critical Information Infrastructure&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NCIIPC&lt;/strong&gt; - National Critical Information Infrastructure Protection Centre&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NTRO&lt;/strong&gt; - National Technical Research Organisation&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NPIT&lt;/strong&gt; - National Policy on Information Technology&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CISO&lt;/strong&gt; - Chief Information Security Officer&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india'&gt;https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok and Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-08-11T09:58:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india">
    <title>Submitted Comments on the 'Government Open Data Use License - India'</title>
    <link>https://cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india</link>
    <description>
        &lt;b&gt;The public consultation process of the draft open data license to be used by Government of India has ended yesterday. Here we share the text of the submission by CIS. It was drafted by Anubha Sinha, Pranesh Prakash, and Sumandro Chattapadhyay.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The following comments on the 'Government Open Data Use License - India' was drafted by Anubha Sinha, Pranesh Prakash, and Sumandro Chattapadhyay, and submitted through the &lt;a href="https://www.mygov.in/group-issue/public-consultation-government-open-data-use-license-india/"&gt;MyGov portal&lt;/a&gt; on July 25, 2016. The original submission can be found &lt;a href="https://www.mygov.in/sites/default/files/mygov_146946521043358971.pdfh"&gt;here&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;I. Preliminary&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;This submission presents comments by the Centre for Internet and Society (“&lt;strong&gt;CIS&lt;/strong&gt;”) &lt;strong&gt;[1]&lt;/strong&gt; on the draft Government Open Data Use License - India (“&lt;strong&gt;the draft licence&lt;/strong&gt;”) &lt;strong&gt;[2]&lt;/strong&gt; by the Department of Legal Affairs.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;This submission is based on the draft licence released on the MyGov portal on June 27, 2016 &lt;strong&gt;[3]&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;CIS commends the Department of Ministry of Law and Justice, Government of India for its efforts at seeking inputs from various stakeholders prior to finalising its open data licence. CIS is thankful for the opportunity to have been a part of the discussion during the framing of the licence; and to provide this submission, in furtherance of the feedback process continuing from the draft licence.&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;II. Overview&lt;/h2&gt;
&lt;ol start="4"&gt;
&lt;li&gt;The Centre for Internet and Society is a non-governmental organisation engaged in research and policy work in the areas of, inter alia, access to knowledge and openness. This clause-by-clause submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved. Accordingly, the comments in this submission aim to further these principles and are limited to those clauses that most directly have an impact on them.&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;III. Comments and Recommendations&lt;/h2&gt;
&lt;ol start="5"&gt;
&lt;li&gt;&lt;strong&gt;Name of the Licence:&lt;/strong&gt; CIS recommends naming the licence “Open Data Licence - India” to reflect the nomenclature already established for similar licences in other nations like the UK and Canada. More importantly, the inclusion of the word ‘use’ in the original name “Government Open Data Use License” is misleading, since the licence permits use, sharing, modification and redistribution of open data.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Change Language on Permissible Use of Data:&lt;/strong&gt; The draft licence uses the terms “Access, use, adapt, and redistribute,” which are used in UNESCO’s definition of open educational resources, whereas, under the Indian Copyright Act &lt;strong&gt;[4]&lt;/strong&gt;, it should cover “reproduction, issuing of copies,” etc. To resolve this difference, we suggest the following language be used: “Subject to the provisions of section 7, all users are provided a worldwide, royalty-free, non-exclusive licence to all rights covered by copyright and allied rights, for the duration of existence of such copyright and allied rights over the data or information.”&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Add Section on the Scope of Applicability of the Licence:&lt;/strong&gt; It will be useful to inform the user of the licence on its applicability. The section may be drafted as: “This licence is meant for public use, and especially by all Ministries, Departments, Organizations, Agencies, and autonomous bodies of Government of India, when publicly disclosing, either proactively or reactively, data and information created, generated, collected, and managed using public funds provided by Government of India directly or through authorized agencies.”&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Add Sub-Clause Specifying that the Licence is Agnostic of Mode of Access:&lt;/strong&gt; As part of the section 4 of the draft licence, titled ‘Terms and Conditions of Use of Data,’ a sub-clause should be added that specifies that users may enjoy all the freedom granted under this licence irrespective of their preferred mode of access of the data concerned, say manually downloaded from the website, automatically accessed via an API, collected from a third party involved in re-sharing of this data, accessed in physical/printed form, etc.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Add Sub-Clause on Non-Repudiability and Integrity of the Published Data:&lt;/strong&gt; To complement the sub-clause 6.e. that notes that data published under this licence should be published permanently and with appropriate versioning (in case of the published data being updated and/or modified), another sub-clause should be added that states that non-repudiability and integrity of published data must be ensured through application of real/digital signature, as applicable, and checksum, as applicable. This is to ensure that an user who has obtained the data, either in physical or digital form, can effectively identify and verify the the agency that has published the data, and if any parts of the data have been lost/modified in the process of distribution and/or transmission (through technological corruption of data, or otherwise).&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Combine Section 6 on Exemptions and Section 7 on Termination:&lt;/strong&gt; Given that the licence cannot reasonably proscribe access to data that has already been published online, it is suggested that it would be better to simply terminate the application of the licence to that data or information that ought not to have been published for grounds provided under section 8 of the RTI Act, or have been inadvertently published. It should also be noted that section 8 of the RTI Act cannot be “violated” (as stated in Section 6.g. of the draft licence), since it only provides permission for the public authority to withhold information, and does not impose an obligation on them (or anyone else) to do so. The combined clause can read: “Upon determination by the data provider that specific data or information should not have been publicly disclosed for the grounds provided under Section 8 of the Right to Information Act, 2005, the data provider may terminate the applicability of the licence for that data or information, and this termination will have the effect of revocation of all rights provided under Section 3 of this licence.”&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;It will be our pleasure to discuss these submissions with the Department of Legal Affairs in greater detail, supplement these with further submissions if necessary, and offer any other assistance towards the efforts at developing a national open data licence.&lt;/li&gt;&lt;/ol&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="https://www.mygov.in/sites/default/files/mygov_1466767582190667.pdf"&gt;https://www.mygov.in/sites/default/files/mygov_1466767582190667.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="https://www.mygov.in/group-issue/public-consultation-government-open-data-use-license-india/"&gt;https://www.mygov.in/group-issue/public-consultation-government-open-data-use-license-india/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://www.copyright.gov.in/Documents/CopyrightRules1957.pdf"&gt;http://www.copyright.gov.in/Documents/CopyrightRules1957.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india'&gt;https://cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Open License</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>NDSAP</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-07-26T09:23:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-submission-trai-consultation-free-data">
    <title>CIS Submission to TRAI Consultation on Free Data</title>
    <link>https://cis-india.org/internet-governance/blog/cis-submission-trai-consultation-free-data</link>
    <description>
        &lt;b&gt;The Telecom Regulatory Authority of India (TRAI) held a consultation on Free Data, for which CIS sent in the following comments.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Telecom Regulatory Authority of India (TRAI) asked for &lt;a href="http://trai.gov.in/WriteReadData/ConsultationPaper/Document/CP_07_free_data_consultation.pdf"&gt;public comments on free data&lt;/a&gt;. Below are the comments that CIS submitted to the four questions that it posed.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="question-1"&gt;Question 1
&lt;p&gt;&lt;em&gt;Is there a need to have TSP agnostic platform to provide free data or suitable reimbursement to users, without violating the principles of Differential Pricing for Data laid down in TRAI Regulation? Please suggest the most suitable model to achieve the objective.&lt;/em&gt;&lt;/p&gt;
&lt;/h2&gt;
&lt;h3 id="is-there-a-need-for-free-data"&gt;Is There a Need for Free Data?&lt;/h3&gt;
&lt;p&gt;No, there is no &lt;em&gt;need&lt;/em&gt; for free data, just as there is no &lt;em&gt;need&lt;/em&gt; for telephony or Internet. However, making provisions for free data would increase the amount of innovation in the Internet and telecom sector, and there is a good probability that it would lead to faster adoption of the Internet, and thus be beneficial in terms of commerce, freedom of expression, freedom of association, and many other ways.&lt;/p&gt;
&lt;p&gt;Thus the question that a telecom regulator should ask is not whether there is a &lt;em&gt;need&lt;/em&gt; for TSP agnostic platforms, but whether such platforms are harmful for competition, for consumers, and for innovation. The telecom regulator ought not undertake regulation unless there is evidence to show that harm has been caused or that harm is likely to be caused. In short, TRAI should not follow the precautionary principle, since the telecom and Internet sectors are greatly divergent from environmental protection: the burden of proof for showing that something ought to be prohibited ought to be on those calling for prohibition.&lt;/p&gt;
&lt;h3 id="goal-regulating-gatekeeping"&gt;Goal: Regulating Gatekeeping&lt;/h3&gt;
&lt;p&gt;TRAI wouldn’t need to regulate price discrimination or Net neutrality if ISPs were not “gatekeepers” for last-mile access. “Gatekeeping” occurs when a single entity establishes itself as an exclusive route to reach a large number of people and businesses or, in network terms, nodes. It is not possible for Internet services to reach their end customers without passing through ISPs (generally telecom networks). The situation is very different in the middle-mile and for backhaul. Even though anti-competitive terms may exist in the middle-mile, especially given the opacity of terms in “transit agreements”, a packet is usually able to travel through multiple routes if one route is too expensive (even if that is not the shortest network path, and is thus inefficient in a way). However, this multiplicity of routes is generally not possible in the last mile.&lt;a id="fnref1" class="footnoteRef" href="#fn1"&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt; This leaves last mile telecom operators (ISPs) in a position to unfairly discriminate between different Internet services or destinations or applications, while harming consumer choice.&lt;/p&gt;
&lt;p&gt;However, the aim of regulation by TRAI cannot be to prevent gatekeeping, since that is not possible as long as there are a limited number of ISPs. For instance, even by the very act of charging money for access to the Internet, ISPs are guilty of “gatekeeping” since they are controlling who can and cannot access an Internet service that way. Instead, the aim of regulation by TRAI should be to “regulate gatekeepers to ensure they do not use their gatekeeping power to unjustly discriminate between similarly situated persons, content or traffic”, as we proposed in our submission to TRAI (on OTTs) last year.&lt;/p&gt;
&lt;h3 id="models-for-free-data"&gt;Models for Free Data&lt;/h3&gt;
&lt;p&gt;There are multiple models possible for free data, none of which TRAI should prohibit unless it would enable OTTs to abuse their gatekeeping powers.&lt;/p&gt;
&lt;h4 id="government-incentives-for-non-differentiated-free-data"&gt;Government Incentives For Non-Differentiated Free Data&lt;/h4&gt;
&lt;p&gt;The government may opt to require all ISPs to provide free Internet to all at a minimum QoS in exchange for exemption from paying part of their USO contributions, or the government may pay ISPs for such access using their USO contributions.&lt;/p&gt;
&lt;p&gt;TRAI should recommend to DoT that it set up a committee to study the feasibility of this model.&lt;/p&gt;
&lt;h4 id="isp-subsidies"&gt;ISP subsidies&lt;/h4&gt;
&lt;p&gt;ISP subsidies of Internet access only make economic sense for the ISP under the following ‘Goldilocks’ condition is met: the experience with the subsidised service is ‘good enough’ for the consumers to want to continue to use such services, but ‘bad enough’ for a large number of them to want to move to unsubsidised, paid access.&lt;/p&gt;
&lt;ol style="list-style-type: decimal;"&gt;
&lt;li&gt;Providing free Internet to all at a low speed.
&lt;ol style="list-style-type: lower-alpha;"&gt;
&lt;li&gt;This naturally discriminates against services and applications such as video streaming, but does not technically bar access to them.&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;Providing free access to the Internet with other restrictions on quality that aren’t discriminatory with respect to content, services, or applications.&lt;/li&gt;&lt;/ol&gt;
&lt;h4 id="rewards-model"&gt;Rewards model&lt;/h4&gt;
&lt;p&gt;A TSP-agnostic rewards platform will only come within the scope of TRAI regulation if the platform has some form of agreement with the TSPs, even if it is collectively. If the rewards platform doesn’t have any agreement with any TSP, then TRAI does not have the power to regulate it. However, if the rewards platform has an agreement with any TSP, it is unclear whether it would be allowed under the Differential Data Tariff Regulation, since the clause 3(2) read with paragraph 30 of the Explanatory Memorandum might disallow such an agreement.&lt;/p&gt;
&lt;p&gt;Assuming for the sake of argument that platforms with such agreements are not disallowed, such platforms can engage in either post-purchase credits or pre-purchase credits, or both. In other words, it could be a situation where a person has to purchase a data pack, engage in some activity relating to the platform (answer surveys, use particular apps, etc.) and thereupon get credit of some form transferred to one’s SIM, or it could be a situation where even without purchasing a data pack, a consumer can earn credits and thereupon use those credits towards data.&lt;/p&gt;
&lt;p&gt;The former kind of rewards platform is not as useful when it comes to encouraging people to use the Internet, since only those who already see worth in using in the Internet (and can afford it) will purchase a data pack in the first place. The second form, on the other hand is quite useful, and could be encouraged. However, this second model is not as easily workable, economically, for fixed line connections, since there is a higher initial investment involved.&lt;/p&gt;
&lt;h4 id="recharge-api"&gt;Recharge API&lt;/h4&gt;
&lt;p&gt;A recharge API could be fashioned in one of two ways: (1) via the operating system on the phone, allowing a TSP or third parties (whether OTTs or other intermediaries) to transfer credit to the SIM card on the phone which have been bought wholesale. Another model could be that of all TSPs providing a recharge API for the use of third parties. Only the second model is likely to result in a “toll-free” experience since in the first model, like in the case of a rewards platform that requires up-front purchase of data packs, there has to be a investment made first before that amount is recouped. This is likely to hamper the utility of such a model.&lt;/p&gt;
&lt;p&gt;Further, in the first case, TRAI would probably not have the powers to regulate such transactions, as there would be no need for any involvement by the TSP. If anti-competitive agreements or abuse of dominant position seems to be taking place, it would be up to the Competition Commission of India to investigate.&lt;/p&gt;
&lt;p&gt;However, the second model would have to be overseen by TRAI to ensure that the recharge APIs don’t impose additional costs on OTTs, or unduly harm competition and innovation. For instance, there ought to be an open specification for such an API, which all the TSPs should use in order to reduce the costs on OTTs. Further, there should be no exclusivity, and no preferential treatment provided for the TSPs sister concerns or partners.&lt;/p&gt;
&lt;h4 id="example-sites"&gt;“0.example” sites&lt;/h4&gt;
&lt;p&gt;Other forms of free data, for instance by TSPs choosing not to charge for low-bandwidth traffic should be allowed, as long as it is not discriminatory, nor does it impose increased barriers to entry for OTTs. For instance, if a website self-certifies that it is low-bandwidth and optimized for Internet-enabled feature phones and uses 0.example.tld to signal this (just as wap.* were used in for WAP sites and m.* are used for mobile-optimized versions of many sites), then there is no reason why TSPs should be prohibited from not charging for the data consumed by such websites, as long as the TSP does so uniformly without discrimination. In such cases, the TSP is not harming competition, harming consumers, nor abusing its gatekeeping powers.&lt;/p&gt;
&lt;h4 id="ott-agnostic-free-data"&gt;OTT-agnostic free data&lt;/h4&gt;
&lt;p&gt;If a TSP decides not to charge for specific forms of traffic (for example, video, or for locally-peered traffic) regardless of the Internet service from which that traffic emanates, as as long as it does so with the end customer’s consent, then there is no question of the TSP harming competition, harming consumers, nor abusing its gatekeeping powers. There is no reason such schemes should be prohibited by TRAI unless they distort markets and harm innovation.&lt;/p&gt;
&lt;h4 id="unified-marketplace"&gt;Unified marketplace&lt;/h4&gt;
&lt;p&gt;One other way to do what is proposed as the “recharge API” model is to create a highly-regulated market where the gatekeeping powers of the ISP are diminished, and the ISP’s ability to leverage its exclusive access over its customers are curtailed. A comparison may be drawn here to the rules that are often set by standard-setting bodies where patents are involved: given that these patents are essential inputs, access to them must be allowed through fair, reasonable, and non-discriminatory licences. Access to the Internet and common carriers like telecom networks, being even more important (since alternatives exist to particular standards, but not to the Internet itself), must be placed at an even higher pedestal and thus even stricter regulation to ensure fair competition.&lt;/p&gt;
&lt;p&gt;A marketplace of this sort would impose some regulatory burdens on TRAI and place burdens on innovations by the ISPs, but a regulated marketplace harms ISP innovation less than not allowing a market at all.&lt;/p&gt;
&lt;p&gt;At a minimum, such a marketplace must ensure non-exclusivity, non-discrimination, and transparency. Thus, at a minimum, a telecom provider cannot discriminate between any OTTs who want similar access to zero-rating. Further, a telecom provider cannot prevent any OTT from zero-rating with any other telecom provider. To ensure that telecom providers are actually following this stipulation, transparency is needed, as a minimum.&lt;/p&gt;
&lt;p&gt;Transparency can take one of two forms: transparency to the regulator alone and transparency to the public. Transparency to the regulator alone would enable OTTs and ISPs to keep the terms of their commercial transactions secret from their competitors, but enable the regulator, upon request, to ensure that this doesn’t lead to anti-competitive practices. This model would increase the burden on the regulator, but would be more palatable to OTTs and ISPs, and more comparable to the wholesale data market where the terms of such agreements are strictly-guarded commercial secrets. On the other hand, requiring transparency to the public would reduce the burden on the regulator, despite coming at a cost of secrecy of commercial terms, and is far more preferable.&lt;/p&gt;
&lt;p&gt;Beyond transparency, a regulation could take the form of insisting on standard rates and terms for all OTT players, with differential usage tiers if need be, to ensure that access is truly non-discriminatory. This is how the market is structured on the retail side.&lt;/p&gt;
&lt;p&gt;Since there are transaction costs in individually approaching each telecom provider for such zero-rating, the market would greatly benefit from a single marketplace where OTTs can come and enter into agreements with multiple telecom providers.&lt;/p&gt;
&lt;p&gt;Even in this model, telecom networks will be charging based not only on the fact of the number of customers they have, but on the basis of them having exclusive routing to those customers. Further, even under the standard-rates based single-market model, a particular zero-rated site may be accessible for free from one network, but not across all networks: unlike the situation with a toll-free number in which no such distinction exists.&lt;/p&gt;
&lt;p&gt;To resolve this, the regulator may propose that if an OTT wishes to engage in paid zero-rating, it will need to do so across all networks, since if it doesn’t there is risk of providing an unfair advantage to one network over another and increasing the gatekeeper effect rather than decreasing it.&lt;/p&gt;
&lt;h2 id="question-2"&gt;Question 2&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Whether such platforms need to be regulated by the TRAI or market be allowed to develop these platforms?&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;In many cases, TRAI would have no powers over such platforms, so the question of TRAI regulating does not arise. In all other cases, TRAI can allow the market to develop such platforms, and then see if any of them violates the Discriminatory Data Tariffs Regualation. For government-incentivised schemes that are proposed above, TRAI should take proactive measure in getting their feasibility evaluated.&lt;/p&gt;
&lt;h2 id="question-3"&gt;Question 3&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Whether free data or suitable reimbursement to users should be limited to mobile data users only or could it be extended through technical means to subscribers of fixed line broadband or leased line?&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Spectrum is naturally a scarce resource, though technological advances (as dictated by Cooper’s Law) and more efficient management of spectrum make it less so. However, we have seen that fixed-line broadband has more or less stagnated for the past many years, while mobile access has increased. So the market distortionary power of fixed-line providers is far less than that of mobile providers. However, competition is far less in fixed-line Internet access services, while it is far higher in mobile Internet access. Switching costs in fixed-line Internet access services are also far higher than in mobile services. Given these differences, the regulation with regard to price discrimination might justifiably be different.&lt;/p&gt;
&lt;p&gt;All in all, for this particular issue, it is unclear why different rules should apply to mobile users and fixed line users.&lt;/p&gt;
&lt;h2 id="question-4"&gt;Question 4&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Any other issue related to the matter of Consultation.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;None.&lt;/p&gt;
&lt;div class="footnotes"&gt;
&lt;hr /&gt;
&lt;ol&gt;
&lt;li id="fn1"&gt;
&lt;p&gt;In India’s mobile telecom sector, according to a Nielsen study, an estimated 15% of mobile users are multi-SIM users, meaning the “gatekeeping” effect is significantly reduced in both directions: Internet services can reach them via multiple ISPs, and conversely they can reach Internet services via multiple ISPs. &lt;em&gt;See&lt;/em&gt; Nielsen, ‘Telecom Transitions: Tracking the Multi-SIM Phenomena in India’, http://www.nielsen.com/in/en/insights/reports/2015/telecom-transitions-tracking-the-multi-sim-phenomena-in-india.html&lt;a href="#fnref1"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-submission-trai-consultation-free-data'&gt;https://cis-india.org/internet-governance/blog/cis-submission-trai-consultation-free-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>TRAI</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Submissions</dc:subject>
    

   <dc:date>2016-07-01T16:04:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior">
    <title>Submission by the Centre for Internet and Society on Revisions to ICANN Expected Standards of Behavior</title>
    <link>https://cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior</link>
    <description>
        &lt;b&gt;Prepared by Vidushi Marda, with inputs from Dr. Nirmita Narasimhan and Sunil Abraham.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;We at the Centre for Internet and Society (“CIS”) are grateful for the opportunity to comment on the proposed revisions to ICANN’s Expected Standards of Behavior (“Standards”).&lt;/p&gt;
&lt;p&gt;Before providing specific comments on the proposed revisions, CIS would like to state for the record our extreme disappointment while noting that there is no indication of the intention to draft and adopt a dedicated anti - harassment policy. We are of the firm opinion that harassment, and particularly sexual harassment, is not only a sensitive topic, but also a deeply complex one. Such a policy should consider scope, procedural questions, redressal and remedies in cases of harassment in general and sexual harassment in particular. A mere change in language to these Standards, however well intentioned, cannot go too far in preventing and dealing with cases of harassment in the absence of a framework within which such instances can be addressed.&lt;/p&gt;
&lt;p&gt;Some of the issues that arose at ICANN55 were confusion surrounding the powers and limits of the Ombudsman’s office in dealing with cases of harassment, the exact procedure to be followed for redressal surrounding such incidents, and the appropriate conduct of parties to the matter. There will be no clarity in these respects, even if these proposed changes are to be adopted.&lt;/p&gt;
&lt;p&gt;Specifically, the proposed language is problematic and completely inadequate for the following reasons:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Vague&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Terms like “professional conduct” and “appropriate behavior” mean little in the absence of a definition that entails such conduct. These terms could mean vastly different things to each community member and such language will only encourage a misalignment of expectation of conduct between community members. The “general” definition of harassment is at best, an ineffective placeholder, as it does not encompass exactly what kind of behavior would fall under its definition.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Fails to consider important scenarios&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The proposed language fails to consider situations where some attempts or advances at communication, sexual or otherwise, occur. For example, consider a situation in which one community member stalks another online, and catalogues his/her every move. This is most certainly foreseeable, but will not be adequately covered by the proposed language. Further, terms like “speech or behavior that is sexually aggressive or intimidates” &amp;nbsp;could or could not include types of speech such as art, music, photography etc, depending on who you ask. It also does not explain the use of the word behavior - physical, emotional, professional, online behavior are all possible, but the scope of this term would depend on the interpretation one chooses to apply. In part 4 below, we will demonstrate how ICANN has applied a far more detailed framework for harassment elsewhere.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Ignores complexity&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In discussions surrounding the incident at ICANN55, a number of issues of arose. These included, inter alia, the definition of harassment and sexual harassment, what constituted such conduct, the procedure to be followed in such cases, the appropriate forum to deal with such incidents and the conduct that both parties are expected to maintain. These questions cannot, and have not been answered or addressed in the proposed change to the Standards. CIS emphasizes the need to understand this issue as one that must imbibe differences in culture, expectation, power dynamics, and options for redressal. If ICANN is to truly be a safe space, such issues must be substantively and procedurally fair for both the accused and the victim. This proposed definition is woefully inadequate in this regard.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Superficial understanding of harassment, sexual harassment&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The proposed changes do not define harassment, and sexual harassment in an adequate fashion. The change currently reads, “Generally, harassment is considered unwelcome hostile or intimidating behavior -- in particular, speech or behavior that is sexually aggressive or intimidates based on attributes such as race, gender, ethnicity, religion, age, color, national origin, ancestry, disability or medical condition, sexual orientation, or gender identity.” These are subject to broad interpretation, and we have already highlighted the issues that may arise due to this in 1, above. Here, we would like to point to a far more comprehensive definition.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;ICANN’s own Employment Policy includes within the scope of sexual harassment “verbal, physical and visual conduct that creates an intimidating, offensive or hostile working environment, or interferes with work performance.” The policy also states:&lt;/p&gt;
&lt;blockquote&gt;Harassing conduct can take many forms and includes, but is not limited to, the following:&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;Slurs, jokes, epithets, derogatory comments, statements or gestures;&lt;/li&gt;
&lt;li&gt;Assault, impeding or blocking another’s movement or otherwise physically interfering with normal work;&lt;/li&gt;
&lt;li&gt;Pictures, posters, drawings or cartoons based upon the characteristics mentioned in the first paragraph of this policy.&lt;/li&gt;&lt;/ol&gt;
Sexually harassing conduct includes all of the above prohibited actions, as well as other unwelcome conduct, such as requests for sexual favors, conversation containing sexual comments, and unwelcome sexual advances.”&lt;/blockquote&gt;
&lt;p&gt;This definition is not perfect, it does not comprehensively consider advances or attempts at communication, sexual or otherwise, which are unwelcome by the target. Nonetheless, CIS believes that this is a far more appropriate definition that does not include vague metrics that the proposed changes do. Since it is one ICANN has already adopted, it can act as an important stepping stone towards a comprehensive framework.&lt;/p&gt;
&lt;p&gt;Like ICANN, UNESCO’s organisational approach has been to adopt a comprehensive &lt;a href="http://www.un.org/womenwatch/osagi/UN_system_policies/(UNESCO)Anti-harassment_Policy.pdf"&gt;Anti-Harassment Policy&lt;/a&gt; which lays down details of definition, prevention, complaint procedure, investigations, sanctions, managerial responsibility, etc. Acknowledging the cultural sensitivity of harassment particularly in international situations, the policy also recognizes advances or attempts at communication, sexual or otherwise. Most importantly, it states that for conduct to come within the definition of sexual harassment, it “must be unwelcome, i.e. unsolicited and regarded as offensive or undesirable by the victim.”&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;In conclusion, we would like to reiterate the importance of adopting and drafting a dedicated anti-harassment policy and framework. The benefits of safety, certainty and formal redressal mechanisms in cases of harassment cannot be over emphasized.&lt;/p&gt;
&lt;p&gt;Importantly, such measures have already been taken elsewhere. The IETF has adopted an &lt;a href="http://tools.ietf.org/html/rfc7776"&gt;instrument&lt;/a&gt; to address issues of harassment that occur at meetings, mailing lists and social events. This instrument contemplates in detail, problematic behavior, unacceptable conduct, the scope of the term harassment, etc. It further envisages a framework for redressal of complaints, remediation, and even contemplates issues that may arise with such remediation. It is particularly important to note that while it provides a definition of harassment, it also states that "[a]ny definition of harassment prohibited by an applicable law can be subject to this set of procedures, recognising harassment as a deeply personal and subjective experience, and thus encouraging members to take up issues of harassment as per their cultural norms and national laws, which are then considered as per procedures laid down."&lt;/p&gt;
&lt;p&gt;A similar effort within the ICANN community is critical.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior'&gt;https://cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vidushi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-06-30T06:07:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities">
    <title>Smart City Policies and Standards: Overview of Projects, Data Policies, and Standards across Five International Smart Cities </title>
    <link>https://cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities</link>
    <description>
        &lt;b&gt;This blog post aims to review five Smart Cities across the globe, namely Singapore, Dubai, New York City, London and Seoul, the Data Policies and Standards adopted. Also, the research seeks to point the similarities, differences and best practices in the development of smart cities across jurisdictions.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the brief: &lt;a href="http://cis-india.org/internet-governance/files/SmartCitiesPoliciesStandards-20160608/at_download/file"&gt;PDF&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Smart City as a concept is evolutionary in nature, and the key elements like Information and Communication Technology (ICT), digitization of services, Internet of Things (IoT), open data, big data, social innovation, knowledge, etc., would be intrinsic to defining a Smart City &lt;a href="#_ftn1"&gt;[1]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A Smart City, as a “system of systems”, can potentially generate vast amounts of data, especially as cities install more sensors, gain access to data from sources such as mobile devices, and government and other agencies make more data accessible. Consequently, Big Data techniques and concepts are highly relevant to the future of Smart Cities. It was noted by Kenneth Cukier, Senior Editor of Digital Products at The Economist, that Big Data techniques can be used to enhance a number of processes essential to cities - for example, big data can be used to spot business trends, determine quality of research, prevent diseases, tack legal citations, combat crime, and determine real-time roadway traffic conditions &lt;a href="#_ftn2"&gt;[2]&lt;/a&gt;. Having said this, data is deemed to be the lifeblood of a Smart City and its availability, use, cost, quality, analysis, associated business models and governance are all areas of interest for a range of actors within a smart city &lt;a href="#_ftn3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This blog reviews five Smart Cities namely Singapore, Dubai, New York City, London and Seoul. In doing so, the research seeks to point the similarities, differences and best practices in the development of smart cities across jurisdictions. To achieve this, the research reviews:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;The definition of a Smart City in a given context or project (if any).&lt;/li&gt;
&lt;li&gt;Existing policy/regulations around data or notes the lack thereof.&lt;/li&gt;
&lt;li&gt;The cities adherence to the International standards and providing an update on the current status of the Smart City programme.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Singapore&lt;/h2&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Smart Nation programme in Singapore was launched on 24th November, 2014. The programme is being driven by the Infocomm Development Authority of Singapore, through which Singapore seeks to harness ICT, networks and data to support improved livelihoods, stronger communities and creation of new opportunities for its residents &lt;a href="#_ftn4"&gt;[4]&lt;/a&gt; According to the IDA, a Smart Nation is a city where &lt;em&gt;“people and businesses are empowered through increased access to data, more participatory through the contribution of innovative ideas and solutions, and a more anticipatory government that utilises technology to better serve citizens’ needs”&lt;/em&gt; &lt;a href="#_ftn5"&gt;[5]&lt;/a&gt;. The Smart Nation programme is driven by a designated Office in the Prime Minister’s Office &lt;a href="#_ftn6"&gt;[6]&lt;/a&gt;. As a core component to the Smart Nation Programme, the Smart Nation Platform has been developed as the technical architecture to support the Programme. This Platform enables greater pervasive connectivity, better situational awareness through data collection, and efficient sharing and access to collected sensor data, allowing public bodies to use such data to develop policy and practical interventions &lt;a href="#_ftn7"&gt;[7]&lt;/a&gt; Such access would allow for anticipatory governance - a goal of the Smart Nation Programme as noted by Dr. Yaacob Ibrahim, Minister for Communications and Information stating “Insights gained from this data would enable us to better anticipate citizens’ needs and help in better delivery of services” &lt;a href="#_ftn8"&gt;[8]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Status of the Project&lt;/strong&gt;&lt;/h3&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Smart Nation Programme is an ongoing initiative, being built on the past programme Intelligent Nation 2015 (iN2015 masterplan). The plan involves putting in place the infrastructure, policies, ecosystem and capabilities to enable a Smart Nation, by adopting a people-centric approach &lt;a href="#_ftn9"&gt;[9]&lt;/a&gt;. A number of co-creating solutions adopted by the Government include:&lt;/div&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Development of Mobile Apps to facilitate communication between the public and the providers of public services.&lt;/li&gt;
&lt;li&gt;Organization of Hackathons by government agencies or corporations in collaboration with schools and industry partners to ideate and develop solutions to tackle real-world challenges.&lt;/li&gt;
&lt;li&gt;Adopt measure for smart mobility to create a more seamless transport experience and providing greater access to real-time transport information so that citizens can better plan their journeys.&lt;/li&gt;
&lt;li&gt;Smart technologies are also being introduced to the housing estates &lt;a href="#_ftn10"&gt;[10]&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Policies and Regulations&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Smart Nation plan derives its legitimacy from the constitution of Singapore, holding the Prime Minister responsible to take charge of the subject ‘Smart Nation’ blueprint under the Statutory body of ‘Smart Nation’ Programme Office &lt;a href="#_ftn11"&gt;[11]&lt;/a&gt;. Singapore has a comprehensive data protection law – the Personal Data Protection Act 2012, rules governing the collection, use, disclosure and care of personal data. The Personal Data Protection Commission of Singapore has committed to work closely with the private sector, and also to support the Smart Nation vision on data privacy and cyber security ecosystem &lt;a href="#_ftn12"&gt;[12]&lt;/a&gt; &lt;a href="#_ftn13"&gt;[13]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Towards achieving the Smart Nation vision the government has also promoted the use of open data. In 2015 the Department of Statistics has made a vast amount of data available (across multiple themes say transport, infocomm, population, etc.) for free to the public in order to encourage innovation and facilitate the Smart Nation &lt;a href="#_ftn14"&gt;[14]&lt;/a&gt;. Prior to this initiative, the government had adopted the Open Data Policy in 2011, enabling public data for analysis, research and application development &lt;a href="#_ftn15"&gt;[15]&lt;/a&gt;. The concept of Virtual Singapore, which is a part of the Smart Nation Initiative, has been developed to adopt and simulate solutions on a virtual platform using big data analytics &lt;a href="#_ftn16"&gt;[16]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Adoption of International Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Smart Nation initiative follows the standards laid under the purview of the Singapore Standards Council (SSC). It specifies three types of Internet of Things (IoT) Standards – sensor network standards (TR38 - for public areas &amp;amp; TR40 - for homes), IoT foundational standards (common set of guidelines for IoT requirements and architecture, information and service interoperability, security and data integrity) and domain-specific standards (healthcare, mobility, urban living, etc.) &lt;a href="#_ftn17"&gt;[17]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Singapore is part of ISO/IEC JTC 1/WG7 Sensor Networks and ISO/IEC JTC 1/WG10 Internet of Things (IoT) &lt;a href="#_ftn18"&gt;[18]&lt;/a&gt;. &lt;a href="https://www.itsc.org.sg/standards/singapore-it-standards"&gt;Singapore IT standards&lt;/a&gt; abides to the international standards as defined by ISO, ITU, etc.Singapore is a member of many international standards forums (see &lt;a href="https://www.itsc.org.sg/international-participation/memberships-in-iso-iec-jtc1"&gt;Singapore International Standards Committee&lt;/a&gt;) which includes JTC1/WG9 - Big Data; JTC1/WG10 - Internet of Things; JTC1/WG11 - Smart Cities.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Dubai, United Arab Emirates&lt;/h2&gt;
&lt;h3&gt;&lt;strong&gt; &lt;/strong&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Dubai Smart City strategy was launched as part of the Dubai Plan 2021 vision, in the year 2015 &lt;a href="#_ftn19"&gt;[19]&lt;/a&gt;. Dubai Plan 2021 describes the future of Dubai evolving through holistic and complementary perspectives, starting with the people and the society and places the government as the custodian of the city’s development. Within the Plan, the smart city theme envisions a platform that is fully connected and integrated infrastructure that enables easy mobility for all residents and tourists, and provides easy access to all economic centers and social services, in line with the world’s best cities &lt;a href="#_ftn20"&gt;[20]&lt;/a&gt;. Center to the smart city platform is data and data analytics, particularly cross functional data and big data techniques to give a complete view of the city &lt;a href="#_ftn21"&gt;[21]&lt;/a&gt; As envisioned, the Dubai Data portal would provide a gateway to empower relevant stakeholders to understand the nuances of the city and pursue questions that will result in the greatest impact from the city’s data &lt;a href="#_ftn22"&gt;[22]&lt;/a&gt;. The platform will be based on current data and existing services, initiatives, and networks to identify opportunities for a smart city &lt;a href="#_ftn23"&gt;[23]&lt;/a&gt;. The Smart City Plan also includes a framework for aligning districts of Dubai with the Smart City vision and dimensions &lt;a href="#_ftn24"&gt;[24]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Smart Dubai roadmap 2015 provides a consolidated report and planned smart city services, its status and the stage of its implementation, for e.g. Smart Grid, Mobile Payment, Smart Water, Health applications, Public Wi-Fi, Municipality, E-Traffic solutions, etc &lt;a href="#_ftn25"&gt;[25]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Status of the Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Smart Dubai strategy is envisioned to be completed by the year 2020, and currently it’s ongoing. The first phase of Smart Dubai masterplan is expected to end by 2016. Between 2017 and 2019, the plan aims to deliver new initiatives and services. The second phase of the masterplan is expected to be completed by the year 2020 &lt;a href="#_ftn26"&gt;[26]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Policies and Regulations&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Smart City Plan is being driven by the &lt;strong&gt;Dubai Smart City Office&lt;/strong&gt; – which has been established under Law No. (29) of 2015 on the establishment of Dubai Smart City Office; Law No. (30) of 2015 on the establishment of Dubai Smart City Establishment; Decree No. (37) of 2015 on the formation of the Board of the Dubai Smart City Office; and Decree No (38) of 2015- appointing a Director General for the Office, which will develop overall policies and strategic plans, supervise the smart transformation process and approve joint initiatives, projects and services &lt;a href="#_ftn27"&gt;[27]&lt;/a&gt;. Also, an open data law called &lt;strong&gt;Dubai Open Data Law&lt;/strong&gt; was issued to complete the legislative framework for transforming Dubai into a Smart City &lt;a href="#_ftn28"&gt;[28]&lt;/a&gt;. This law will enable the sharing of non-confidential data between public entities and other stakeholders.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Adoption of International Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;In 2015 the Smart Dubai Executive Committee has collaborated through an agreement with the International Telecommunications Union (ITU) adopt the performance indicators by the ITU Focus Group on Smart Sustainable Cities to evaluate the feasibility of the indicators &lt;a href="#_ftn29"&gt;[29]&lt;/a&gt;. The Focus Group is working towards identifying global best practices for the development of smart cities &lt;a href="#_ftn30"&gt;[30]&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;New York City, United States of America&lt;/h2&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The ‘One New York Plan’ announced in the year 2015 is a comprehensive plan for a sustainable and resilient city. It includes the adoption of digital technology and considers the importance of the role of data in transforming every aspect of the economy, communications, politics, and individual and family life &lt;a href="#_ftn31"&gt;[31]&lt;/a&gt;. Furthermore, through a publication on '&lt;a href="http://www1.nyc.gov/site/forward/innovations/smartnyc.page"&gt;Building a Smart+Equitable City&lt;/a&gt;', the Mayor’s Office of Technology and Innovation (MOTI) describes efforts to leverage new technologies to build Smart city.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Accordingly, the plan seeks to establish better lives through establishing principles and strategic frameworks to guide connected device and Internet of Things (IoT) implementation; MOTI serving as the coordinating entity for new technology and IoT deployments across all City agencies; collaborating with academia and the private sector on innovative pilot projects, and partnering with municipal governments and organizations around the world to share best practices and leverage the impact of technological advancements &lt;a href="#_ftn32"&gt;[32]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Status of the Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;OneNYC represents a unified vision for a sustainable, resilient, and equitable city developed with cross-cutting interagency collaboration, public engagement, and consultation with leading experts in their respective fields. The Mayor’s Office of Sustainability oversees the development of OneNYC and now shares responsibility with the Mayor’s Office of Recovery and Resiliency for ensuring its implementation &lt;a href="#_ftn33"&gt;[33]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Policies and Regulations&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;As per the Local Law 11 of 2012, each City entity must identify and ultimately publish all of its digital public data for citywide aggregation and publication by 2018. In adherence to this law, there exists a NYC Open Data Plan which requires annual data updation &lt;a href="#_ftn34"&gt;[34]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The LinkNYC initiative, one of the key projects to make New York a ‘smart’ city, aims to connect everyone through a city wide wi-fi network. The LinkNYC initiative will retrofit payphones with kiosks to provide high-speed WiFi hotspots and charging stations for increased connectivity &lt;a href="#_ftn35"&gt;[35]&lt;/a&gt;. Data Privacy in the initiative is addressed through the customer first privacy policy, which considers user’s privacy on priority and will not sell any personal information or share with third parties for their own use. LinkNYC will use anonymized, aggregate data to make the system more efficient and to develop insights to improve your Link experience &lt;a href="#_ftn36"&gt;[36]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Adoption of International Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The ANSI Network on Smart and Sustainable Cities (ANSSC) is a forum for information sharing and coordination on voluntary standards, conformity assessment and related activities for smart and sustainable cities in the US &lt;a href="#_ftn37"&gt;[37]&lt;/a&gt;. The US is a signatory of the ISO/ITU defined standards on smart cities &lt;a href="#_ftn38"&gt;[38]&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;London, United Kingdom&lt;/h2&gt;
&lt;h3&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Smart London Plan was unveiled in the year 2013 by the Mayor of London. The plan is being driven through the Greater London Authority, with the advice of the Smart London Board. The Smart London Plan envisions &lt;em&gt;‘Using the creative power of new technologies to serve London and improve Londoner’s lives&lt;/em&gt;’ &lt;a href="#_ftn39"&gt;[39]&lt;/a&gt;. ‘Smart London’ is about harnessing new technology and data so that businesses, Londoners and visitors experience the city in a better way, and do not face bureaucratic hassle and congestion. Smart London seeks to improve the city as a whole and focuses on city macro functions that result from the interplay between city subsystems - such as local labour markets to financial markets, from local government to education, healthcare, transportation and utilities. According to strategy documents, a smarter London recognises and employs data as a service and will leverage data to enable informed decision making and the design of new activities.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Status of the Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;This project is currently ongoing. Since its formation in March 2013, the Smart London Board has been advising the Greater London Authority.The Plan sits within the overarching framework of the Mayor’s Vision 2020 &lt;a href="#_ftn40"&gt;[40]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Policies and Regulations&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Smart London Plan incorporates the existing open data platform called ‘London DataStore’. The rules and guidelines for this platform are defined by the Greater London Authority, which includes working with public and private sector organisations to create, maintain and utilise it, enabling common data standards, identify and prioritise which data are needed to address London’s growth challenges, establish a Smart London Borough Partnership to encourage boroughs to free up London’s local level data. Also, privacy is protected and there is transparent use of data - to ensure data use is managed in the best interests of the public rather than private enterprise.&lt;sup&gt;42&lt;/sup&gt; The Smart London Plan aims to build on this existing datastore to identify and publish data that addresses specific growth challenges, with an emphasis on working with companies and communities to create, maintain, and use this data &lt;a href="#_ftn41"&gt;[41]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Open Data White Paper, issued by the Office of Paymaster General, seeks to build a transparent society by releasing public data through open data platforms and leveraging the potential of emerging technologies &lt;a href="#_ftn42"&gt;[42]&lt;/a&gt;. The Greater London Authority processes personal data in accordance with the Data Protection Act 1998 &lt;a href="#_ftn43"&gt;[43]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Adoption of International Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The British Standards Institution (BSI) has already established Smart City standards and has associated with the ISO Advisory Group on smart city standards. The UK subscribes to the BSI standards for smart cities and has adopted the same &lt;a href="#_ftn44"&gt;[44]&lt;/a&gt;. The following standards and publications help address various issues for a city to become a smart city:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;The development of a standard on &lt;a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-180-smart-cities-terminology/"&gt;Smart city terminology (PAS 180)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The development of a &lt;a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-181-smart-cities-framework/"&gt;Smart city framework standard (PAS 181)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The development of a &lt;a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-182-smart-cities-data-concept-model/"&gt;Data concept model for smart cities (PAS 182)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;A &lt;a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PD-8100-smart-cities-overview/"&gt;Smart city overview document (PD 8100)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;A &lt;a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PD-8101-smart-cities-planning-guidelines/"&gt;Smart city planning guidelines document (PD 8101)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;BS 8904 Guidance for community sustainable development provides a decision-making framework that will help setting objectives in response to the needs and aspirations of city stakeholders&lt;/li&gt;
&lt;li&gt;BS 11000 Collaborative relationship management&lt;/li&gt;
&lt;li&gt;BSI BIP 2228:2013 Inclusive urban design - A guide to creating accessible public spaces.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Further, the Smart London Plan incorporates open data standards in accordance with London DataStore &lt;a href="#_ftn45"&gt;[45]&lt;/a&gt;. Various government reports – Smart Cities background paper, Open Data White Paper, etc., have suggested the use of standards related to Internet of Things (IoT), open data standards, etc &lt;a href="#_ftn46"&gt;[46]&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Seoul, Korea&lt;/h2&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;/strong&gt;Smart Seoul 2015 was announced in June 2011 by the Seoul Metropolitan Government, which envisions integrating IT services into every field, including administration, welfare, industry and living. Through this, the Seoul Metropolitan Government plans to create a Seoul that uses smart technologies by 2015 &lt;a href="#_ftn47"&gt;[47]&lt;/a&gt;. Towards this, the Seoul Metropolitan Government plans to make use of Big Data in policy development, and through scientific analytics, will provide customized administrative services and reduce wasteful spending. Also, the government is utilising Big Data to analyse trends emerging from existing services &lt;a href="#_ftn48"&gt;[48]&lt;/a&gt;. Examples of projects that leverage big data that the government has undertaken include the Taxi Matchmaking Project – analyzes the data related to taxi stands and passengers, the Owl Bus &lt;a href="#_ftn49"&gt;[49]&lt;/a&gt; - maps the bus routes, etc.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Status of the Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;/strong&gt;Building on the Smart Seoul 2015, the Seoul Metropolitan Government plans to establish 'Global Digital Seoul 2020 – New Connections, Different Experiences' vision in next five-years. In this multi-objective plan, it aims to establish a ’Big Data campus’ providing win-win cooperation among public, private, industry and university &lt;a href="#_ftn50"&gt;[50]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Policies and Regulations &lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;/strong&gt;The Smart Seoul 2015 aims to create a ‘Seoul Data Mart’, which will be an open platform that makes public information available for data processing &lt;a href="#_ftn51"&gt;[51]&lt;/a&gt;. Furthermore, Seoul has opened the Seoul Open Data Plaza &lt;a href="#_ftn52"&gt;[52]&lt;/a&gt;, an online channel to share and provide citizens with all of Seoul’s public data, such as real-time bus operation schedules, subway schedules, non-smoking areas, locations of public Wi-Fi services, shoeshine shops, and facilities for disabled people, and the information registered in Seoul Open Data Plaza is provided in the open API format.&lt;sup&gt;45&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;South Korea has a comprehensive law governing data privacy – Personal Information Protection Act, 2011. The law includes data protection rules and principles, including obligations on the data controller and the consent of data subjects, rights to access personal data or object to its collection, and security requirements. It also covers cookies and spam, data processing by third parties and the international transfer of data &lt;a href="#_ftn53"&gt;[53]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;International Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;/strong&gt;The smart city standards are adopted in the development of smart cities in Korea &lt;a href="#_ftn54"&gt;[54]&lt;/a&gt;. Korea has adopted the ISO/TC 268, which is focused on sustainable development in communities. Korea also has one working group developing city indicators and another working group developing metrics for smart community infrastructures &lt;a href="#_ftn55"&gt;[55]&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The smart city projects studied are at different levels of implementation and have both similarities and differences. Below is an analysis of some of the key similarities and differences between smart city projects, a comparison of these points to India’s 100 Smart City Mission, and a summary of best practices around the development of smart city frameworks.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Nodal Agency&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;All cities studied have nodal agencies driving the smart city initiatives and many have policies in place backing these initiatives. For example, while the Smart Nation programme in Singapore is being driven by the Infocomm Development Authority, in London the smart city project is governed by the Great London Authority. The Smart Seoul Project in Korea is governed by the Seoul Metropolitan Government and New York has the Mayor’s Office of Technology and Innovation serving as the coordinating entity for new technology and IoT deployments across all City agencies. In India, the nodal agency driving the 100 Smart Cities Project is the Ministry of Urban Development under the Indian Government. In India, the implementation of the Mission at the City level will be done by a Special Purpose Vehicle (SPV), which will be a limited company and will plan, appraise, approve, release funds, implement, manage, operate, monitor and evaluate the Smart City development projects.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Policies&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Many of the cities had open data policies and data protection policies that pertain to the Smart City initiatives. In Dubai, an open data law called Dubai Open Data Law has been issued to complete the legislative framework for transforming Dubai into a Smart City and the Smart City Establishment will develop policies for the project. New York also has an Open Data Plan in place and LinkNYC will use anonymized, aggregate data to address data privacy of users. In London, the Smart London Plan incorporates the existing open data platform called ‘London DataStore’, the rules for which are defined by the Greater London Authority, which also ensures privacy and transparent use of data by processing personal data in accordance with the Data Protection Act 1998. For regulation of data in Seoul, a ‘Seoul Data Mart’ will be established to make public information available for data processing and the Seoul Open Data Plaza is an existing online channel to share and provide citizens with all of Seoul’s public data. South Korea has a comprehensive law governing data privacy in place as well. In Singapore, the Personal Data Protection Commission has committed to work and support the Smart Nation vision on data privacy and cyber security ecosystem. To achieve the vision of the project, the government has also promoted the use of open data. It can be said the these countries , with clearly laid out policies to support and guide the project, have well planned ecosystem for regulation and governance of systems, technologies and cities. All cities have incorporated open data into smart cities and many have developed guidelines for its use. All cities have similar goals of enhancing the lives of citizens and developing anticipatory regulation, however, there appears to be little discussion on the need to amend existing law or enable new law around privacy and data protection in light of data collection through smart cities. In India, no enabling legislation or policy has been formulated by the Government, apart from releasing “Mission Statement and Guidelines”, which provides details about the Project and vision, excluding a definition of a ‘smart city’ or the relevant applicable laws and policies. No information is publicly available regarding deployment of open data, use of specific technologies like cloud, big data, etc., the relevant policies and applicability of laws. Unlike India, all cities recognize the importance of big data techniques in enabling smart city visions, technology and policies. On the lines of these cities, India must work towards addressing the need for an open data framework in light of the 100 Smart Cities Mission to enable the sharing of non-confidential data between public entities and other stakeholders. This requires co-ordination to incorporate, enable and draw upon open data architecture in the cities by the Government with the existing open data framework in India, like the National Data Sharing and Accessibility Policy, 2012. Use of technology in the form of IoT and Big Data entails access to open data, bringing another policy area in its ambit which needs consideration. Also, identification and development of open standards for IoT must be looked at. Also, as data in smart cities will be generated, collected, used, and shared by both the public and private sector. It is essential that India’s existing data protection standards and regime must be amended to extend the data regulation beyond a body corporate and oversee the collection and use of data by the Government, and its agencies.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;In Singapore, the Smart Nation initiative follows the standards laid under the purview of the Singapore Standards Council (SSC)and the &lt;a href="https://www.itsc.org.sg/standards/singapore-it-standards"&gt;Singapore IT standards&lt;/a&gt; abides to the international standards as defined by ISO, ITU, etc. The Country is also a member of many international standards forums (see &lt;a href="https://www.itsc.org.sg/international-participation/memberships-in-iso-iec-jtc1"&gt;Singapore International Standards Committee&lt;/a&gt;) which includes JTC1/WG9- Big Data; JTC1/WG10 - Internet of Things; JTC1/WG11 - Smart Cities. In Dubai, the Smart Dubai Executive Committee with the International Telecommunications Union (ITU) to adopt the performance indicators by the ITU Focus Group on Smart Sustainable Cities to evaluate the feasibility of the indicators. For the purpose of standards, the ANSI Network on Smart and Sustainable Cities (ANSSC) in New York is a forum smart and sustainable cities, along with US being a signatory of the ISO/ITU defined standards on smart cities. Also, The British Standards Institution (BSI) has already established Smart City standards and has associated with the ISO Advisory Group on smart city standards. The UK subscribes to the BSI standards for smart cities and has adopted the same and the Smart London Plan incorporates open data standards in accordance with London DataStore. For development of smart cities, Korea has adopted the ISO/TC 268, which is focused on sustainable development in communities and also has one working group developing city indicators and another working group developing metrics for smart community infrastructures. However, in India, the Bureau of Indian Standards (BIS) has undertaken the task to formulate standardised guidelines for central and state authorities in planning, design and construction of smart cities by setting up a technical committee under the Civil engineering department of the Bureau. However, adoption of the standards by implementing agencies would be voluntary and intends to complement internationally available documents in this area. Also, The Global Cities Institute (GCI) has undertaken a mission in the year 2015 to align with the Bureau of Indian Standards regarding development of standards of smart cities and also to forge relationships with Indian cities in light of ISO 37120. It can be said that India has currently not yet adopted international standards, but is in the process of developing national standards and adopting key international standards. Unlike other cities,which are adopting standards - national, ISO, or ITU, Indian cities are yet to adopt standards for regulation of the future smart cities.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Notes for India&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;India is in the nascent stages of developing smart cities across the country. Drawing from the practices adopted by cities across the world, smart cities in India should adopt strong regulatory and governance frameworks regarding technical standards, open data and data security and data protection policies. These policies will be essential in ensuring the sustainability and efficiency of smart cities while safeguarding individual rights. Some of these policies are already in place - such as India’s Open Data Policy and India’s data protection standards under section 43A of the ITA. It will be important to see how these policies are adopted and applied to the context of smart cities.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;References&lt;/h2&gt;
&lt;p&gt;&lt;a name="_ftn1"&gt;[1]&lt;/a&gt; Smart Cities and Transparent Evolution, &lt;a href="http://www.posterheroes.org/Posterheroes3/_mat/PH3_eng.pdf"&gt;http://www.posterheroes.org/Posterheroes3/_mat/PH3_eng.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn2"&gt;[2]&lt;/a&gt; "Data, Data Everywhere." The Economist, February 25, 2010. Accessed March 17, 2016, &lt;a href="http://www.economist.com/node/15557443"&gt;http://www.economist.com/node/15557443&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn3"&gt;[3]&lt;/a&gt; "Smart Cities." ISO. 2015. Accessed March 17, 2016, &lt;a href="http://www.iso.org/iso/smart_cities_report-jtc1.pdf"&gt;http://www.iso.org/iso/smart_cities_report-jtc1.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;[4]&lt;/a&gt; Transcript of Prime Minister Lee Hsien Loong's speech at Smart Nation launch on 24 November, &lt;a href="http://www.pmo.gov.sg/mediacentre/transcript-prime-minister-lee-hsien-loongs-speech-smart-nation-launch-24-november"&gt;http://www.pmo.gov.sg/mediacentre/transcript-prime-minister-lee-hsien-loongs-speech-smart-nation-launch-24-november&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn5"&gt;[5]&lt;/a&gt; Smart Nation Vision, &lt;a href="https://www.ida.gov.sg/Tech-Scene-News/Smart-Nation-Vision"&gt;https://www.ida.gov.sg/Tech-Scene-News/Smart-Nation-Vision&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn6"&gt;[6]&lt;/a&gt; Smart Nation, &lt;a href="http://www.pmo.gov.sg/smartnation"&gt;http://www.pmo.gov.sg/smartnation&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn7"&gt;[7]&lt;/a&gt; Smart Nation Platform, &lt;a href="https://www.ida.gov.sg/~/media/Files/About%20Us/Newsroom/Media%20Releases/2014/0617_smartnation/AnnexA_sn.pdf"&gt;https://www.ida.gov.sg/~/media/Files/About%20Us/Newsroom/Media%20Releases/2014/0617_smartnation/AnnexA_sn.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn8"&gt;[8]&lt;/a&gt; Transcript of Prime Minister Lee Hsien Loong's speech at Smart Nation launch on 24 November, &lt;a href="https://www.ida.gov.sg/blog/insg/featured/singapore-lays-groundwork-to-be-worlds-first-smart-nation/"&gt;https://www.ida.gov.sg/blog/insg/featured/singapore-lays-groundwork-to-be-worlds-first-smart-nation/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn9"&gt;[9]&lt;/a&gt; Prime Ministers’ Office Singapore-Smart Nation, &lt;a href="http://www.pmo.gov.sg/smartnation"&gt;http://www.pmo.gov.sg/smartnation&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn10"&gt;[10]&lt;/a&gt; Prime Ministers’ Office Singapore-Smart Nation, &lt;a href="http://www.pmo.gov.sg/smartnation"&gt;http://www.pmo.gov.sg/smartnation&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn11"&gt;[11]&lt;/a&gt; Constitution of the Republic of Singapore (Responsibility of the Prime Minister) Notification 2015, &lt;a href="http://statutes.agc.gov.sg/aol/search/display/view.w3p;page=0;query=Status%3Acurinforce%20Type%3Aact,sl%20Content%3A%22smart%22;rec=4;resUrl=http%3A%2F%2Fstatutes.agc.gov.sg%2Faol%2Fsearch%2Fsummary%2Fresults.w3p%3Bquery%3DStatus%253Acurinforce%2520Type%253Aact,sl%2520Content%253A%2522smart%2522;whole=yes"&gt;http://statutes.agc.gov.sg/aol/search/display/view.w3p;page=0;query=Status%3Acurinforce%20Type%3Aact,sl%20Content%3A%22smart%22;rec=4;resUrl=http%3A%2F%2Fstatutes.agc.gov.sg%2Faol%2Fsearch%2Fsummary%2Fresults.w3p%3Bquery%3DStatus%253Acurinforce%2520Type%253Aact,sl%2520Content%253A%2522smart%2522;whole=yes&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn12"&gt;[12]&lt;/a&gt; Personal Data Protection Singapore-Annual Report 2014-15, &lt;a href="https://www.pdpc.gov.sg/docs/default-source/Reports/pdpc-ar-fy14---online.pdf"&gt;https://www.pdpc.gov.sg/docs/default-source/Reports/pdpc-ar-fy14---online.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn13"&gt;[13]&lt;/a&gt; Balancing Innovation and Personal Data Protection, &lt;a href="https://www.ida.gov.sg/Tech-Scene-News/Tech-News/Digital-Government/2015/9/Balancing-innovation-and-personal-data-protection"&gt;https://www.ida.gov.sg/Tech-Scene-News/Tech-News/Digital-Government/2015/9/Balancing-innovation-and-personal-data-protection&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn14"&gt;[14]&lt;/a&gt; Department of Statistics Singapore- Free Access to More Data on the SingStat Website from 1 March 2015, &lt;a href="http://www.singstat.gov.sg/docs/default-source/default-document-library/news/press_releases/press27022015.pdf"&gt;http://www.singstat.gov.sg/docs/default-source/default-document-library/news/press_releases/press27022015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn15"&gt;[15]&lt;/a&gt; Singapore Marks 50th Birthday With Open Data Contest, &lt;a href="https://blog.hootsuite.com/singapore-open-data/"&gt;https://blog.hootsuite.com/singapore-open-data/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn16"&gt;[16]&lt;/a&gt; Virtual Singapore - a 3D city model platform for knowledge sharing and community collaboration, &lt;a href="http://www.sla.gov.sg/News/tabid/142/articleid/572/category/Press%20Releases/parentId/97/year/2014/Default.aspx"&gt;http://www.sla.gov.sg/News/tabid/142/articleid/572/category/Press%20Releases/parentId/97/year/2014/Default.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn17"&gt;[17]&lt;/a&gt; Internet of Things (IoT) Standards Outline to Support Smart Nation Initiative Unveiled, &lt;a href="http://www.spring.gov.sg/NewsEvents/PR/Pages/Internet-of-Things-(IoT)-Standards-Outline-to-Support-Smart-Nation-Initiative-Unveiled-20150812.aspx"&gt;http://www.spring.gov.sg/NewsEvents/PR/Pages/Internet-of-Things-(IoT)-Standards-Outline-to-Support-Smart-Nation-Initiative-Unveiled-20150812.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn18"&gt;[18]&lt;/a&gt; Information Technology Standards Committee, &lt;a href="https://www.itsc.org.sg/technical-committees/internet-of-things-technical-committee-iottc"&gt;https://www.itsc.org.sg/technical-committees/internet-of-things-technical-committee-iottc&lt;/a&gt; and &lt;a href="https://www.ida.gov.sg/~/media/Files/Infocomm%20Landscape/iN2015/Reports/realisingthevisionin2015.pdf"&gt;https://www.ida.gov.sg/~/media/Files/Infocomm%20Landscape/iN2015/Reports/realisingthevisionin2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn19"&gt;[19]&lt;/a&gt; Government of Dubai-2021 Dubai Plan-Purpose, &lt;a href="http://www.dubaiplan2021.ae/the-purpose/"&gt;http://www.dubaiplan2021.ae/the-purpose/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn20"&gt;[20]&lt;/a&gt; Government of Dubai-2021 Dubai Plan, &lt;a href="http://www.dubaiplan2021.ae/dubai-plan-2021/"&gt;http://www.dubaiplan2021.ae/dubai-plan-2021/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn21"&gt;[21]&lt;/a&gt; Smart Dubai, &lt;a href="http://www.smartdubai.ae/foundation_layers.php"&gt;http://www.smartdubai.ae/foundation_layers.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn22"&gt;[22]&lt;/a&gt; The Internet of Things: Connections for People’s happiness, &lt;a href="http://www.smartdubai.ae/story021002.php"&gt;http://www.smartdubai.ae/story021002.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn23"&gt;[23]&lt;/a&gt; Smart Dubai - Current State, &lt;a href="http://www.smartdubai.ae/current_state.php"&gt;http://www.smartdubai.ae/current_state.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn24"&gt;[24]&lt;/a&gt; Smart Dubai - District Guidelines, &lt;a href="http://smartdubai.ae/districtguidelines/Smart_Dubai_District_Guidelines_Public_Brief.pdf"&gt;http://smartdubai.ae/districtguidelines/Smart_Dubai_District_Guidelines_Public_Brief.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn25"&gt;[25]&lt;/a&gt; See; &lt;a href="http://roadmap.smartdubai.ae/search-services-public.php"&gt;http://roadmap.smartdubai.ae/search-services-public.php&lt;/a&gt; and &lt;a href="http://roadmap.smartdubai.ae/search-initiatives-public.php"&gt;http://roadmap.smartdubai.ae/search-initiatives-public.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn26"&gt;[26]&lt;/a&gt; Smart Dubai-Smart District Guidelines, &lt;a href="http://smartdubai.ae/districtguidelines/Smart_Dubai_District_Guidelines_Public_Brief.pdf"&gt;http://smartdubai.ae/districtguidelines/Smart_Dubai_District_Guidelines_Public_Brief.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn27"&gt;[27]&lt;/a&gt; Dubai Ruler issues new laws to further enhance the organisational structure and legal framework of Dubai Smart City, &lt;a href="https://www.wam.ae/en/news/emirates/1395288828473.html"&gt;https://www.wam.ae/en/news/emirates/1395288828473.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn28"&gt;[28]&lt;/a&gt; See: &lt;a href="http://slc.dubai.gov.ae/en/AboutDepartment/News/Lists/NewsCentre/DispForm.aspx?ID=147&amp;amp;ContentTypeId=0x01001D47EB13C23E544893300E8367A23439"&gt;http://slc.dubai.gov.ae/en/AboutDepartment/News/Lists/NewsCentre/DispForm.aspx?ID=147&amp;amp;ContentTypeId=0x01001D47EB13C23E544893300E8367A23439&lt;/a&gt; and &lt;a href="http://www.smartdubai.ae/dubai_data.php"&gt;http://www.smartdubai.ae/dubai_data.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn29"&gt;[29]&lt;/a&gt; Dubai first city to trial ITU key performance indicators for smart sustainable cities, &lt;a href="http://www.itu.int/net/pressoffice/press_releases/2015/12.aspx#.VtaYtlt97IU"&gt;http://www.itu.int/net/pressoffice/press_releases/2015/12.aspx#.VtaYtlt97IU&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn30"&gt;[30]&lt;/a&gt; Smart Dubai Benchmark Report 2015 Executive Summary, &lt;a href="http://smartdubai.ae/bmr2015/methodology-public.php"&gt;http://smartdubai.ae/bmr2015/methodology-public.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn31"&gt;[31]&lt;/a&gt; Building a Smart + Equitable City, &lt;a href="http://www1.nyc.gov/assets/forward/documents/NYC-Smart-Equitable-City-Final.pdf"&gt;http://www1.nyc.gov/assets/forward/documents/NYC-Smart-Equitable-City-Final.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn32"&gt;[32]&lt;/a&gt; Building a Smart + Equitable City, &lt;a href="http://www1.nyc.gov/site/forward/innovations/smartnyc.page"&gt;http://www1.nyc.gov/site/forward/innovations/smartnyc.page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn33"&gt;[33]&lt;/a&gt; One New York: The Plan for a Strong and Just City, &lt;a href="http://www1.nyc.gov/html/onenyc/about.html"&gt;http://www1.nyc.gov/html/onenyc/about.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn34"&gt;[34]&lt;/a&gt; Open Data for All, &lt;a href="http://www1.nyc.gov/assets/home/downloads/pdf/reports/2015/NYC-Open-Data-Plan-2015.pdf"&gt;http://www1.nyc.gov/assets/home/downloads/pdf/reports/2015/NYC-Open-Data-Plan-2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn35"&gt;[35]&lt;/a&gt; 7 public projects that are turning New York into a “smart city”, &lt;a href="http://www.builtinnyc.com/2015/11/24/7-projects-are-turning-new-york-futuristic-technology-hub"&gt;http://www.builtinnyc.com/2015/11/24/7-projects-are-turning-new-york-futuristic-technology-hub&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn36"&gt;[36]&lt;/a&gt; LinkNYC, &lt;a href="https://www.link.nyc/faq.html#privacy"&gt;https://www.link.nyc/faq.html#privacy&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn37"&gt;[7]&lt;/a&gt; ANSI Network on Smart and Sustainable Cities, &lt;a href="http://www.ansi.org/standards_activities/standards_boards_panels/anssc/overview.aspx?menuid=3"&gt;http://www.ansi.org/standards_activities/standards_boards_panels/anssc/overview.aspx?menuid=3&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn38"&gt;[38]&lt;/a&gt; IoT-Enabled Smart City Framework, &lt;a href="http://publicaa.ansi.org/sites/apdl/Documents/News%20and%20Publications/Links%20Within%20Stories/IoT-EnabledSmartCityFrameworkWP20160213.pdf"&gt;http://publicaa.ansi.org/sites/apdl/Documents/News%20and%20Publications/Links%20Within%20Stories/IoT-EnabledSmartCityFrameworkWP20160213.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn39"&gt;[39]&lt;/a&gt; Smart London (UK) Plan: Digital Technologies, London and Londoners, &lt;a href="http://munkschool.utoronto.ca/ipl/files/2015/03/KleinmanM_Smart-London-UK-v5_30AP2015.pdf"&gt;http://munkschool.utoronto.ca/ipl/files/2015/03/KleinmanM_Smart-London-UK-v5_30AP2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn40"&gt;[40]&lt;/a&gt; Smart London Plan, &lt;a href="http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf"&gt;http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn41"&gt;[41]&lt;/a&gt; Smart London Plan, &lt;a href="http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf"&gt;http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn42"&gt;[42]&lt;/a&gt; Open Data White Paper, &lt;a href="https://data.gov.uk/sites/default/files/Open_data_White_Paper.pdf"&gt;https://data.gov.uk/sites/default/files/Open_data_White_Paper.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn43"&gt;[43]&lt;/a&gt; London Datastore-Privacy, &lt;a href="http://data.london.gov.uk/about/privacy/"&gt;http://data.london.gov.uk/about/privacy/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn44"&gt;[44]&lt;/a&gt; Future Cities Standards Centre in London, &lt;a href="https://eu-smartcities.eu/commitment/5937"&gt;https://eu-smartcities.eu/commitment/5937&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn45"&gt;[45]&lt;/a&gt; Smart London Plan, &lt;a href="http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf"&gt;http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn46"&gt;[46]&lt;/a&gt; Smart Cities background paper, October 2013, &lt;a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/246019/bis-13-1209-smart-cities-background-paper-digital.pdf"&gt;https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/246019/bis-13-1209-smart-cities-background-paper-digital.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn47"&gt;[47]&lt;/a&gt; Presentation of 2015 Blueprint of Seoul as ‘State-of-the-art Smart City’, &lt;a href="http://english.seoul.go.kr/presentation-of-2015-blueprint-of-seoul-as-%E2%80%98state-of-the-art-smart-city%E2%80%99/"&gt;http://english.seoul.go.kr/presentation-of-2015-blueprint-of-seoul-as-%E2%80%98state-of-the-art-smart-city%E2%80%99/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn48"&gt;[48]&lt;/a&gt; “Policy Where There is Demand,” Seoul Utilizes Big Data, &lt;a href="http://english.seoul.go.kr/policy-demand-seoul-utilizes-big-data/"&gt;http://english.seoul.go.kr/policy-demand-seoul-utilizes-big-data/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn49"&gt;[49]&lt;/a&gt; Seoul’s “Owl Bus” Based on Big Data Technology, &lt;a href="http://www.citiesalliance.org/sites/citiesalliance.org/files/Seoul-Owl-Bus-11052014.pdf"&gt;http://www.citiesalliance.org/sites/citiesalliance.org/files/Seoul-Owl-Bus-11052014.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn50"&gt;[50]&lt;/a&gt; Seoul Launches “Global Digital Seoul 2020”, &lt;a href="http://english.seoul.go.kr/seoul-launches-global-digital-seoul-2020/"&gt;http://english.seoul.go.kr/seoul-launches-global-digital-seoul-2020/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn51"&gt;[51]&lt;/a&gt; Smart Seoul 2015, &lt;a href="http://english.seoul.go.kr/wp-content/uploads/2014/02/SMART_SEOUL_2015_41.pdf"&gt;http://english.seoul.go.kr/wp-content/uploads/2014/02/SMART_SEOUL_2015_41.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn52"&gt;[52]&lt;/a&gt; Disclosing public data through the Seoul Open Data Plaza, &lt;a href="http://english.seoul.go.kr/policy-information/key-policies/informatization/seoul-open-data-plaza/"&gt;http://english.seoul.go.kr/policy-information/key-policies/informatization/seoul-open-data-plaza/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn53"&gt;[53]&lt;/a&gt; Data protection in South Korea: overview, &lt;a href="http://uk.practicallaw.com/2-579-7926"&gt;http://uk.practicallaw.com/2-579-7926&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn54"&gt;[54]&lt;/a&gt;Smart Cities Seoul: a case study, &lt;a href="https://www.itu.int/dms_pub/itu-t/oth/23/01/T23010000190001PDFE.pdf"&gt;https://www.itu.int/dms_pub/itu-t/oth/23/01/T23010000190001PDFE.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn55"&gt;[55]&lt;/a&gt; Smart Cities-ISO, &lt;a href="http://www.iso.org/iso/livelinkgetfile-isocs?nodeid=16193764"&gt;http://www.iso.org/iso/livelinkgetfile-isocs?nodeid=16193764&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities'&gt;https://cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Kiran A. B., Elonnai Hickok and Vanya Rakesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Smart Cities</dc:subject>
    
    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-06-11T13:29:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
