<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 11 to 25.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-comments-recommendations-to-digital-data-protection-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/economic-and-political-weekly-july-17-2021-amber-sinha-pallavi-bedi-aman-nair-techno-solutionist-responses-to-covid-19"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/state-of-consumer-digital-security-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/post1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/primer-it-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/opening-government-best-practice-guide"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/dcos-workshop-09"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/washington-post-january-14-2017-rama-lakshmi-millions-of-indians-move-from-cash-to-digital-payments"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/research/conferences/conference-blogs/workshop"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/letter-to-icann-on-ncsg"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/it-act-and-commerce"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/directions-cyber-digital-europe-arindrajit-basu-september-16-2022-getting-the-digital-indo-pacific-economic-framework-right"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/research/grants/digital-natives-with-a-cause/dntweet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/indian-express-december-2-2016-fake-narendra-modi-apps-aplenty-but-it-is-up-to-users-to-protect-themselves"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-comments-recommendations-to-digital-data-protection-bill">
    <title>The Centre for Internet and Society’s comments and recommendations to the: The Digital Data Protection Bill 2022</title>
    <link>https://cis-india.org/internet-governance/blog/cis-comments-recommendations-to-digital-data-protection-bill</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) published its comments and recommendations to the Digital Personal Data Protection Bill, 2022, on December 17, 2022.&lt;/b&gt;
        &lt;div class="WordSection1" style="text-align: justify; "&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p align="center" class="MsoNormal" style="text-align:center; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p align="right" class="MsoNormal" style="text-align:right; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h1&gt;&lt;span&gt;High Level Comments&lt;/span&gt;&lt;/h1&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;1.&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span&gt;Rationale for removing the distinction between personal data and sensitive personal data is unclear.&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;All the earlier iterations of the Bill as well as the rules made under Section 43A of the Information Technology Act, 2000&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[1]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; had classified data into two categories; (i) personal data; and (ii) sensitive personal data. The 2022 version of the Bill has removed this distinction and clubbed all personal data under one umbrella heading of personal data. The rationale for this is unclear, as sensitive personal data means such data which could reveal or be related to eminently private data such as financial data, health data, sexual orientations and biometric data. Considering the sensitive nature of the data, the data classified as sensitive personal data is accorded higher protection and safeguards from processing, therefore by clubbing all data as personal data, the higher protection such as the need for explicit consent to the processing of sensitive personal data, the bar on processing of sensitive personal data for employment purposes has also been removed. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;2.&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span&gt;No clear roadmap for the implementation of the Bill&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;The 2018 Bill had specified a roadmap for the different provisions of the Bill to come into effect from the date of the Act being notified.&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[2]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It specifically stated the time period within which the Authority had to be established and the subsequent rules and regulations notified. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;The present Bill does not specify any such blueprint; it does not provide any details on either when the Bill will be notified or the time period within which the Board shall be established and specific Rules and regulations notified. Considering that certain provisions have been deferred to Rules that have to be framed by the Central government, the absence and/or delayed notification of such rules and regulations will impact the effective functioning of the Bill. Provisions such as Section 10(1) which deals with verifiable parental consent for data of children,  Section 13 (1) which states the manner in which a Data Principal can initiate a right to correction, the process of selection and functioning of consent manager under &lt;/span&gt;&lt;span&gt;3(7)&lt;/span&gt;&lt;span&gt; are few such examples, that when the Act becomes applicable, the data principal will have to wait for the Rules to Act of these provisions, or to get clarity on entities created by the Act. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;The absence of any sunrise or sunset provision may disincentivise political or industrial will to support or enforce the provisions of the Bill. An example of such a lack of political will was the establishment of the Cyber Appellate Tribunal. The tribunal was established in 2006 to redress cyber fraud. However, it was virtually a defunct body from 2011 onwards when the last chairperson retired. It was eventually merged with the Telecom Dispute Settlement and Appellate Tribunal in 2017. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;We recommend that Bill clearly lays out a time period for the implementation of the different provisions of the Bill, especially a time frame for the establishment of the Board. This is important to give full and effective effect to the right of privacy of the individual. It is also important to ensure that individuals have an effective mechanism to enforce the right and seek recourse in case of any breach of obligations by the data fiduciaries. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;The Board must ensure that Data Principals and Fiduciaries have sufficient awareness of the provisions of this Bill before bringing the provisions for punishment into force. This will allow the Data Fiduciaries to align their practices with the provisions of this new legislation and the Board will also have time to define and determine certain provisions that the Bill has left the Board to define. Additionally enforcing penalties for offenses initially must be in a staggered process, combined with provisions such as warnings, in order to allow first time and mistaken offenders which now could include data principals as well, from paying a high price. This will relieve the fear of smaller companies and startups and individuals who might fear processing data for the fear of paying penalties for offenses.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;a name="_kn12ecl3pdrp"&gt;&lt;/a&gt;&lt;span&gt;3.&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;span&gt;Independence of  Data Protection Board of India.&lt;/span&gt;&lt;/h3&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;The Bill proposes the creation of the Data Protection Board of India (Board) in place of the Data Protection Authority. In comparison with the powers of the Board with the 2018 and 2019 version of Personal Data Protection Bill, we witness an abrogation of powers of the Board  to be created, in this Bill. Under Clause 19(2), the strength and composition of the Board, the process of selection, the terms and conditions of appointment and service, and the removal of its Chairperson and other Members shall be such as may be prescribed by the Union Government at a later stage. Further as per Clause 19(3), the Chief Executive of the Board will be appointed by the Union Government and the terms and conditions of her service will also be determined by the Union Government. The functions of the Board have also not been specified under the Bill, the Central Government may assign the functions to be performed by the Board.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;In order to govern data protection effectively, there is a need for a responsive market regulator with a strong mandate, ability to act swiftly, and resources. The political nature of  personal data also requires that the governance of data, particularly the rule-making and adjudicatory functions performed by the Board are independent of the Executive. &lt;/span&gt;&lt;/p&gt;
&lt;h1&gt;&lt;a name="_n9jzjnvile8f"&gt;&lt;/a&gt;&lt;span&gt;Chapter Wise Comments and Recommendations &lt;/span&gt;&lt;/h1&gt;
&lt;h2&gt;&lt;a name="_chp7y0vgrjqa"&gt;&lt;/a&gt;&lt;span&gt;CHAPTER I- PRELIMINARY&lt;/span&gt;&lt;/h2&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;●&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;Definition:&lt;/span&gt;&lt;/b&gt;&lt;span&gt; While the Bill has added a few new definitions to the Bill including terms such as gains, loss, consent manager etc. there are a few key definitions that have been removed from the earlier versions of the Bill. The removal of certain definitions in the Bill, eg. sensitive personal data, health data, biometric data, transgender status, creating a legal uncertainty about the application of the Bill. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;With respect to the existing definitions as well the definition of the term ‘harm’ has been significantly reduced to remove harms such as surveillance from the ambit of harms. In addition, with respect of the definition of the term of harms also, the 2019 version of the Bill under Clause 2 (20) the definition provides a non exhaustive list of harms, by using the phrase “harms include”, however in the new definition the phrase has been altered to “harm”, in relation to a Data Principal, means”, thereby removing the possibility of more harms that are not apparent currently from being within the purview of the Act. We recommend that the definition of harms be made into a non-exhaustive list.&lt;br /&gt; &lt;br /&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;a name="_nhwnuzprx0ir"&gt;&lt;/a&gt;&lt;span&gt;CHAPTER II - OBLIGATIONS OF DATA FIDUCIARY&lt;/span&gt;&lt;/h2&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;Notice: &lt;/span&gt;&lt;/b&gt;&lt;span&gt;The revised Clause on notice does away with the comprehensive requirements which were laid out under Clause 7 of the PDP Bill 2019. The current clause does not mention in detail what the notice should contain, while stating that that the notice should be itemised. While it can be reasoned that the Data Fiduciary can find the contents of the notice throughout the bill, such as with the rights of the Data Principal, the removal of a detailed list could create uncertainty for Data Fiduciaries. By leaving the finer details of what a notice should contain, it could cause Data Fiduciaries from missing out key information from the list, which in turn provide incomplete information to the Data Principal. Even in terms of Data Fiduciaries they might not know if they are complying with the provisions of the bill, and could result in them invariably being penalised. In addition to this by requiring less work by the Data Fiduciary and processor, the burden falls on the Data Principal to make sure they know how their data is processed and collected. The purpose of this legislation is to create further rights for individuals and consumers, hence the Bill should strive to put the individual at the forefront.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;In addition to this Clause 6(3) of the Bill states &lt;i&gt;“The Data Fiduciary shall give the Data Principal the option to access the information referred to in sub-sections (1) and (2) in English or any language specified in the Eighth Schedule to the Constitution of India.”&lt;/i&gt; While the inclusion of regional language notices is a welcome step, we suggest that the text be revised as follows &lt;i&gt;“The Data Fiduciary shall give the Data Principal the option to access the information referred to in sub-sections (1) and (2) in English&lt;b&gt; and in&lt;/b&gt; any language specified in the Eighth Schedule to the Constitution of India.” &lt;/i&gt;While the main crux of notice is to let the person know before giving consent, notice in a language that a person cannot read would not lead to meaningful consent.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;Consent &lt;br /&gt; &lt;br /&gt; &lt;/span&gt;&lt;/b&gt;&lt;span&gt;Clause 3 of the Bill states &lt;i&gt;“request for consent would have the contact details of a Data Protection Officer, where applicable, or of any other person authorised by the Data Fiduciary to respond to any communication from the Data Principal for the purpose of exercise of her rights under the provisions of this Act.” &lt;/i&gt;Ideally this provision should be a part of the notice and should be mentioned in the above section. This is similar to Clause 7(1)(c) of the draft Personal Data Protetion Bill 2019 which requires the notice to state &lt;i&gt;“the identity and contact details of the data fiduciary and the contact details of the data protection officer, if applicable;”. &lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;Deemed Consent&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;The Bill  introduces a new type of consent that was absent in the earlier versions of the Bill. We are of the understanding that deemed consent is used to redefine non consensual processing of personal data. The use of the term deemed consent and the provisions under the section while more concise than the earlier versions could create more confusion for Data Principals and Fiduciaries alike. The definition and the examples do not shed light on one of the key issues with voluntary consent - the absence of notice. In addition to this the Bill is also silent on whether deemed consent can be withdrawn or if the data principal has the same rights as those that come from processing of data they have consented to. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;Personal Data Protection of Children &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;The age to determine whether a person has the ability to legally consent in the online world has been intertwined with the age of consent under the Indian Contract Act; i.e. 18 years. The Bill makes no distinction between a 5 year old and a 17 year old- both are treated in the same manner. It assumes the same level of maturity for all persons under the age of 18. It is pertinent to note that the law in the offline world does recognise that distinction and also acknowledges the changes in the level of maturity. As per Section 82 of the Indian Penal Code read with Section 83, any act by a child under the age of 12 shall not be considered as an offence. While the maturity of those aged between 12–18 years will be decided by court (individuals between the age of 16–18 years can also be tried as adults for heinous crimes). Similarly, child labour laws in the country allow children above the age of 14 years to work in non-hazardous industry&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;There is  a need to evaluate and rethink the idea that children are passive consumers of the internet and hence the consent of the parent is enough. Additionally, the bracketing of all individuals under the age of 18 as children fails to look at how teenages and young people use the internet. This is more important looking at the 2019 data which suggests that two-thirds of India’s internet users are in the 12–29 years age group, with those in the 12–19 age group accounting for about 21.5% of the total internet usage in metro cities. Given that the pandemic has compelled students and schools to adopt and adapt to virtual schools, the reliance on the internet has become ubiquitous with education. Out of an estimated 504 million internet users, nearly one-third are aged under 19. As per the Annual Status on Education Report (ASER) 2020, more than one-third of all schoolchildren are pursuing digital education, either through online classes or recorded videos.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;Instead of setting a blanket age for determining valid consent, we could look at alternative means to determine the appropriate age for children at different levels of maturity, similar to what had been developed by the U.K. Information Commissioner’s Office. The Age Appropriate Code prescribes 15 standards that online services need to follow. It broadly applies to online services "provided for remuneration"—including those supported by online advertising—that process the personal data of and are "likely to be accessed" by children under 18 years of age, even if those services are not targeted at children. This includes apps, search engines, social media platforms, online games and marketplaces, news or educational websites, content streaming services, online messaging services. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;The reservation to definition of child under the Bill has also been expressed by some members of the JPC through their dissenting opinion. MP Ritesh Pandey stated that keeping in mind the best interest of the child the Bill should consider a child to be a person who is less than 14 years of age. This would ensure that young people could benefit from the advances in technology without parental consent and reduce the social barriers that young women face in accessing the internet. Similarly Manish Tiwari in his dissenting note also observed that the regulation of the processing of data of children should be based on the type of content or data. The JPC Report observed that the Bill does not require the data fiduciary to take fresh consent of the child, once the child has attained the age of majority, and it also does not give the child the option to withdraw their consent upon reaching the majority age. It therefore, made the following recommendations:&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;Registration of data fiduciaries, exclusively dealing with children’s data. Application of the Majority Act to a contract with a child. Obligation of Data fiduciary to inform a child to provide their consent, three months before such child attains majority  Continuation of the services until the child opts out or gives a fresh consent, upon achieving majority. However, these recommendations have not been incorporated into the provisions of the Bill. In addition to this the Bill is silent on the status of non consensual processing and deemed consent with respect to the data of children.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;We recommend that fiduciaries who have services targeted at children should be considered as significant Data Fiduciaries. In addition to this the Bill should also state that the guardians could approach the Data Protection Board on behalf of the child. With these obligations in place, the age of mandatory consent could be reduced and the data fiduciary could have an added responsibility of informing the children in the simplest manner how their data will be used. Such an approach places a responsibility on Data Fiduciaires when implementing services that will be used by children and allows the children to be aware of data processing, when they are interacting with technology.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;Chapter III-RIGHTS AND DUTIES OF DATA PRINCIPAL&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;Rights of Data Principal&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;Clause 12(3) of the Bill while providing the Data Principal the right to be informed of the identities of all the Data Fiduciaries with whom the personal data has been shared, also states that the data principal has the right to be informed of the categories of personal data shared. However the current version of the Bill provides only one category of data that is personal data. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;Clause 14 of the Bill talks about the Right of Grievance Redressal, and  states that the Data Principal has the right to readily available means of registering a grievance, however the Bill does not provide in the Notice provisions the need to mention details of a grievance officer or a grievance redressal mechanism. It is only  the additional obligations on significant data fiduciary that mentions the need for a Data Protection officer to be the contact for the grievance redressal mechanism under the provisions of this Bill. The Bill could ideally re-use the provisions of the IT Act SPDI Rules 2011 in which Section 5(7) states &lt;i&gt;“Body corporate shall address any discrepancies and grievances of their provider of the information with respect to processing of information in a time bound manner. For this purpose, the body corporate shall designate a Grievance Officer and publish his name and contact details on its website. The Grievance Officer shall redress the grievances or provider of information expeditiously but within one month ' from the date of receipt of grievance.”&lt;br /&gt; &lt;/i&gt;&lt;br /&gt; The above framing would not only bring clarity to the data fiduciaries on what process to follow for a grievance redressal, it also would reduce the significant burden of theBoard. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;Duties of Data Principals&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;The Bill while entisting duties of the Data Principal states that the “Data Principal shall not register a false or frivolous grievance or complaint with a Data Fiduciary or the Board”, however it is very difficult for a Data Principal to and even for the Board to determine what constitutes a “frivolous grievance”. In addition to this the absence of a defined notice provision and the inclusion of deemed consent would mean that the Data Fiduciary could have more information about the matter than the Data Principal. This could mean that the fiduciary could prove that a claim was false or frivolous. Clause 21(12) states that “&lt;i&gt;At any stage after receipt of a complaint, if the Board determines that the complaint is devoid of merit, it may issue a warning or impose costs on the complainant.” &lt;/i&gt;In addition to this Clause 25(1) states that “ &lt;i&gt;If the Board determines on conclusion of an inquiry that non- compliance by &lt;b&gt;a person &lt;/b&gt;is significant, it may, after giving the person a reasonable opportunity of being heard, impose such financial penalty as specified in Schedule 1, not exceeding rupees five hundred crore in each instance.” &lt;/i&gt;The use of the term “person” in this case includes data which could mean that they could be penalised under the provisions of the Bill, which could also include not complying with the duties.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;CHAPTER IV- SPECIAL PROVISIONS&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;Transfer of Personal Data outside India&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;Clause 17 of the Bill has removed the requirement of data localisation which the 2018 and 2019 Bill required. Personal data can be transferred to countries that will be notified by the central government. There is no need for a copy of the data to be stored locally and no prohibition on transferring sensitive personal data and critical data. Though it is a welcome change that personal data can be transferred outside of India, we would highlight the concerns in permitting unrestricted access to and transfer of all types of data. Certain data such as defence and health data do require sectoral regulation and ringfencing of the transfer of data. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;Exemptions&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;Clause 18 of the Bill has widened the scope of government exemptions. Blanket exemption has been given to the State under Clause 18(4) from deleting the personal data even when the purpose for which the data was collected is no longer served or when retention is no longer necessary. The requirement of &lt;i&gt;proportionality, reasonableness and fairness&lt;/i&gt; have been removed for the Central Government to exempt any department or instrumentality from the ambit of the Bill.&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;By doing away with the four pronged test, this provision is not in consonance with test laid down by the Supreme Court and are also incompatible with an effective privacy regulation. There is also no provision for either a prior judicial review  of the order by a district judge as envisaged by the Justice Srikrishna Committee Report or post facto review by an oversight committee of the order as laid down under the Indian Telegraph Rules, 1951&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[3]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and the rules framed under Information Technology Act&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[4]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. The provision states that such processing of personal data shall be subject to the procedure, safeguard and oversight mechanisms that may be prescribed.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;br clear="all" /&gt; 
&lt;hr align="left" size="1" width="100%" /&gt;
&lt;div id="ftn1"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;span&gt;&lt;sup&gt;&lt;span&gt;[1]&lt;/span&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;span&gt;&lt;sup&gt;&lt;span&gt;[2]&lt;/span&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Clause 97 of the 2018 Bill states&lt;i&gt;“(1) For the purposes of this Chapter, the term ‘notified date’ refers to the date notified by the Central Government under sub-section (3) of section 1. (2)The notified date shall be any date within twelve months from the date of enactment of this Act. (3)The following provisions shall come into force on the notified date-(a) Chapter X; (b) Section 107; and (c) Section 108. (4)The Central Government shall, no later than three months from the notified date establish the Authority. (5)The Authority shall, no later than twelve months from the notified date notify the grounds of processing of personal data in respect of the activities listed in sub-section (2) of section 17. (6) The Authority shall no, later than twelve months from the date notified date issue codes of practice  on the following matters-(a) notice under section 8; (b) data quality under section 9; (c) storage limitation under section 10; (d) processing of personal data under Chapter III; (e) processing of sensitive personal data under Chapter IV; (f) security safeguards under section 31; (g) research purposes under section 45;(h) exercise of data principal rights under Chapter VI; (i) methods of de-identification and anonymisation; (j) transparency and accountability measures under Chapter VII. (7)Section 40 shall come into force on such date as is notified by the Central Government for the purpose of that section.(8)The remaining provision of the Act shall come into force eighteen months from the notified date.”&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;span&gt;&lt;sup&gt;&lt;span&gt;[3]&lt;/span&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Rule 419A (16): The Central Government or the State Government shall constitute a Review Committee. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;Rule 419 A(17): The Review Committee shall meet at least once in two months and record its findings whether the directions issued under sub-rule (1) are in accordance with the provisions of sub-section (2) of Section 5 of the said Act. When the Review Committee is of the opinion that the directions are not in accordance with the provisions referred to above it may set aside the directions and orders for destruction of the copies of the intercepted message or class of messages.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;span&gt;&lt;sup&gt;&lt;span&gt;[4]&lt;/span&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Rule 22 of Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009: The Review Committee shall meet at least once in two months and record its findings whether the directions issued under rule 3 are in accordance with the provisions of sub-section (2) of section 69 of the Act and where the Review Committee is of the opinion that the directions are not in accordance with the provisions referred to above, it may set aside the directions and issue an order for destruction of the copies, including corresponding electronic record of the intercepted or monitored or decrypted information.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-comments-recommendations-to-digital-data-protection-bill'&gt;https://cis-india.org/internet-governance/blog/cis-comments-recommendations-to-digital-data-protection-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas and Pallavi Bedi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2023-01-20T02:35:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/economic-and-political-weekly-july-17-2021-amber-sinha-pallavi-bedi-aman-nair-techno-solutionist-responses-to-covid-19">
    <title>Techno-solutionist Responses to COVID-19</title>
    <link>https://cis-india.org/internet-governance/blog/economic-and-political-weekly-july-17-2021-amber-sinha-pallavi-bedi-aman-nair-techno-solutionist-responses-to-covid-19</link>
    <description>
        &lt;b&gt;The Indian state has increasingly adopted a digital approach to service delivery over the past decade, with vaccination being the latest area to be subsumed by this strategy. In the context of the need for universal vaccination, the limitations of the government’s vaccination platform Co-WIN need to be analysed.&lt;/b&gt;
        &lt;p&gt;&lt;span style="text-align: justify; "&gt;The article by Amber Sinha, Pallavi Bedi, and Aman Nair was published in the &lt;/span&gt;&lt;a class="external-link" href="https://www.epw.in/journal/2021/29/commentary/techno-solutionist-responses-covid-19.html" style="text-align: justify; "&gt;Economic &amp;amp; Political Weekly&lt;/a&gt;&lt;span style="text-align: justify; "&gt;, Vol. 56, Issue No. 29, 17 Jul, 2021.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Over the last two decades, slowly but steadily, the governance agenda of the Indian state has moved to the digital realm. In 2006, the National e-Governance Plan (NeGP) was approved by the Indian state wherein a massive infrastructure was developed to reach the remotest corners and facilitate easy access of government services efficiently at affordable costs. The first set of NeGP projects focused on digitalising governance schemes that dealt with taxation, regulation of corporate entities, issuance of passports, and pensions. Over a period of time, they have come to include most interactions between the state and citizens from healthcare to education, transportation to employment, and policing to housing. Upon the launch of the Digital India Mission by the union government, the NeGP was subsumed under the e-Gov and e-Kranti components of the project. The original press release by the central government reporting the approval by the cabinet of ministers of the Digital India programme speaks of “cradle to grave” digital identity as one of its vision areas. This identity was always intended to be “unique, lifelong, online and authenticable.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the inception of the Digital India campaign by the current government, there have been various concerns raised about the privacy issues posed by this project. The initiative includes over 50 “mission mode projects” in various stages of implementation. All of these projects entail collection of vast quantities of personally identifiable information of the citizens. However, most of these initiatives do not have clearly laid down privacy policies. There is also a lack of properly articulated access control mech­anism and doubts exist over important issues such as data ownership owing to most projects involving public–private partnership which involves a private org­anisation collecting, processing and retaining large amounts of data. Most importantly, they have continued to exist and prosper in a state of regulatory vacuum with no data protection legislation to govern them. Further, the state of digital divide and digital literacy in India should automatically underscore the need to not rely solely on digital solutions.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;span&gt;Click to &lt;/span&gt;&lt;a class="external-link" href="https://www.epw.in/journal/2021/29/commentary/techno-solutionist-responses-covid-19.html"&gt;read the full article here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/economic-and-political-weekly-july-17-2021-amber-sinha-pallavi-bedi-aman-nair-techno-solutionist-responses-to-covid-19'&gt;https://cis-india.org/internet-governance/blog/economic-and-political-weekly-july-17-2021-amber-sinha-pallavi-bedi-aman-nair-techno-solutionist-responses-to-covid-19&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha, Pallavi Bedi and Aman Nair</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Digitalisation</dc:subject>
    
    
        <dc:subject>Co-WIN</dc:subject>
    
    
        <dc:subject>Covid19</dc:subject>
    
    
        <dc:subject>Digital Technologies</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Technology</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    

   <dc:date>2021-08-10T15:34:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015">
    <title>Summary Report Internet Governance Forum 2015 </title>
    <link>https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015</link>
    <description>
        &lt;b&gt;Centre for Internet and Society (CIS), India participated in the Internet Governance Forum (IGF) held at Poeta Ronaldo Cunha Lima Conference Center, Joao Pessoa in Brazil from 10 November 2015 to 13 November 2015. The theme of IGF 2015 was ‘Evolution of Internet Governance: Empowering Sustainable Development’. Sunil Abraham, Pranesh Prakash &amp; Jyoti Panday from CIS actively engaged and made substantive contributions to several key issues affecting internet governance at the IGF 2015. The issue-wise detail of their engagement is set out below. &lt;/b&gt;
        
&lt;p align="center" style="text-align: left;"&gt;&lt;strong&gt;INTERNET
GOVERNANCE&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
I. The
Multi-stakeholder Advisory Group to the IGF organised a discussion on
&lt;em&gt;&lt;strong&gt;Sustainable
Development Goals (SDGs) and Internet Economy&lt;/strong&gt;&lt;/em&gt;&lt;em&gt;
&lt;/em&gt;at
the Main Meeting Hall from 9:00 am to 12:30 pm on 11 November, 2015.
The
discussions at this session focused on the importance of Internet
Economy enabling policies and eco-system for the fulfilment of
different SDGs. Several concerns relating to internet
entrepreneurship, effective ICT capacity building, protection of
intellectual property within and across borders were availability of
local applications and content were addressed. The panel also
discussed the need to identify SDGs where internet based technologies
could make the most effective contribution.  Sunil
Abraham contributed to the panel discussions by addressing the issue
of development and promotion of local content and applications. List
of speakers included:&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Lenni
	Montiel, Assistant-Secretary-General for Development, United Nations&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Helani
	Galpaya, CEO LIRNEasia&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sergio
	Quiroga da Cunha, Head of Latin America, Ericsson&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Raúl
	L. Katz, Adjunct Professor, Division of Finance and Economics,
	Columbia Institute of Tele-information&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Jimson
	Olufuye, Chairman, Africa ICT Alliance (AfICTA)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Lydia
	Brito, Director of the Office in Montevideo, UNESCO&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	H.E.
	Rudiantara, Minister of Communication &amp;amp; Information Technology,
	Indonesia&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Daniel
	Sepulveda, Deputy Assistant Secretary, U.S. Coordinator for
	International and Communications Policy at the U.S. Department of
	State &amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Deputy
	Minister Department of Telecommunications and Postal Services for
	the republic of South Africa&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sunil
	Abraham, Executive Director, Centre for Internet and Society, India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	H.E.
	Junaid Ahmed Palak, Information and Communication Technology
	Minister of Bangladesh&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Jari
	Arkko, Chairman, IETF&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Silvia
	Rabello, President, Rio Film Trade Association&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Gary
	Fowlie, Head of Member State Relations &amp;amp; Intergovernmental
	Organizations, ITU&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;http&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;://&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;www&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;intgovforum&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;org&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;cms&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;igf&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;2015-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;main&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;sessions&lt;/a&gt;&lt;u&gt;
&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;u&gt;&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2327-2015-11-11-internet-economy-and-sustainable-development-main-meeting-room"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2327-2015-11-11-internet-economy-and-sustainable-development-main-meeting-room&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video
link Internet
economy and Sustainable Development here
&lt;a href="https://www.youtube.com/watch?v=D6obkLehVE8"&gt;https://www.youtube.com/watch?v=D6obkLehVE8&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;II.
Public
Knowledge organised a workshop on &lt;em&gt;&lt;strong&gt;The
Benefits and Challenges of the Free Flow of Data &lt;/strong&gt;&lt;/em&gt;at
Workshop Room
5 from 11:00 am to 12:00 pm on 12 November, 2015. The discussions in
the workshop focused on the benefits and challenges of the free flow
of data and also the concerns relating to data flow restrictions
including ways to address
them. Sunil
Abraham contributed to the panel discussions by addressing the issue
of jurisdiction of data on the internet. The
panel for the workshop included the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Vint
	Cerf, Google&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Lawrence
	Strickling, U.S. Department of Commerce, NTIA&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Richard
	Leaning, European Cyber Crime Centre (EC3), Europol&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Marietje
	Schaake, European Parliament&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Nasser
	Kettani, Microsoft&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sunil
	Abraham, CIS
	India&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;http&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;://&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;www&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;intgovforum&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;org&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;cms&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;workshops&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;list&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;of&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;published&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;workshop&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;proposals&lt;/a&gt;&lt;u&gt;
&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2467-2015-11-12-ws65-the-benefits-and-challenges-of-the-free-flow-of-data-workshop-room-5"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2467-2015-11-12-ws65-the-benefits-and-challenges-of-the-free-flow-of-data-workshop-room-5&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video link https://www.youtube.com/watch?v=KtjnHkOn7EQ&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;III.
Article
19 and
Privacy International organised a workshop on &lt;em&gt;&lt;strong&gt;Encryption
and Anonymity: Rights and Risks&lt;/strong&gt;&lt;/em&gt;
at Workshop Room 1 from 11:00 am to 12:30 pm on 12 November, 2015.
The
workshop fostered a discussion about the latest challenges to
protection of anonymity and encryption and ways in which law
enforcement demands could be met while ensuring that individuals
still enjoyed strong encryption and unfettered access to anonymity
tools. Pranesh
Prakash contributed to the panel discussions by addressing concerns
about existing south Asian regulatory framework on encryption and
anonymity and emphasizing the need for pervasive encryption. The
panel for this workshop included the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	David
	Kaye, UN Special Rapporteur on Freedom of Expression&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Juan
	Diego Castañeda, Fundación Karisma, Colombia&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Edison
	Lanza, Organisation of American States Special Rapporteur&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Pranesh
	Prakash, CIS India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Ted
	Hardie, Google&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Elvana
	Thaci, Council of Europe&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Professor
	Chris Marsden, Oxford Internet Institute&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Alexandrine
	Pirlot de Corbion, Privacy International&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;&lt;a name="_Hlt435412531"&gt;&lt;/a&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;http&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;://&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;www&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;intgovforum&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;org&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;cms&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;worksh&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;o&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;ps&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;list&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;of&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;published&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;workshop&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;proposals&lt;/a&gt;&lt;u&gt;
&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2407-2015-11-12-ws-155-encryption-and-anonymity-rights-and-risks-workshop-room-1"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2407-2015-11-12-ws-155-encryption-and-anonymity-rights-and-risks-workshop-room-1&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video link available here https://www.youtube.com/watch?v=hUrBP4PsfJo&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;IV.
Chalmers
&amp;amp; Associates organised a session on &lt;em&gt;&lt;strong&gt;A
Dialogue on Zero Rating and Network Neutrality&lt;/strong&gt;&lt;/em&gt;
at the Main Meeting Hall from 2:00 pm to 4:00 pm on 12 November,
2015. The Dialogue provided access to expert insight on zero-rating
and a full spectrum of diverse
views on this issue. The Dialogue also explored alternative
approaches to zero rating such as use of community networks. Pranesh
Prakash provided
a
detailed explanation of harms and benefits related to different
approaches to zero-rating. The
panellists for this session were the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Jochai
	Ben-Avie, Senior Global Policy Manager, Mozilla, USA&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Igor
	Vilas Boas de Freitas, Commissioner, ANATEL, Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Dušan
	Caf, Chairman, Electronic Communications Council, Republic of
	Slovenia&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Silvia
	Elaluf-Calderwood, Research Fellow, London School of Economics,
	UK/Peru&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Belinda
	Exelby, Director, Institutional Relations, GSMA, UK&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Helani
	Galpaya, CEO, LIRNEasia, Sri Lanka&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Anka
	Kovacs, Director, Internet Democracy Project, India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Kevin
	Martin, VP, Mobile and Global Access Policy, Facebook, USA&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Pranesh
	Prakash, Policy Director, CIS India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Steve
	Song, Founder, Village Telco, South Africa/Canada&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Dhanaraj
	Thakur, Research Manager, Alliance for Affordable Internet, USA/West
	Indies&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Christopher
	Yoo, Professor of Law, Communication, and Computer &amp;amp; Information
	Science, University of Pennsylvania, USA&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;http://www.intgovforum.org/cms/igf2015-main-sessions&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2457-2015-11-12-a-dialogue-on-zero-rating-and-network-neutrality-main-meeting-hall-2"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2457-2015-11-12-a-dialogue-on-zero-rating-and-network-neutrality-main-meeting-hall-2&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;V.
The
Internet &amp;amp; Jurisdiction Project organised a workshop on
&lt;em&gt;&lt;strong&gt;Transnational
Due Process: A Case Study in MS Cooperation&lt;/strong&gt;&lt;/em&gt;
at Workshop Room
4 from 11:00 am to 12:00 pm on 13 November, 2015. The
workshop discussion focused on the challenges in developing an
enforcement framework for the internet that guarantees transnational
due process and legal interoperability. The discussion also focused
on innovative approaches to multi-stakeholder cooperation such as
issue-based networks, inter-sessional work methods and transnational
policy standards.  The panellists for this discussion were the
following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Anne
	Carblanc  Head of Division, Directorate for Science, Technology and
	Industry, OECD&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Eileen
	Donahoe Director Global Affairs, Human Rights Watch&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Byron
	Holland President and CEO, CIRA (Canadian ccTLD)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Christopher
	Painter Coordinator for Cyber Issues, US Department of State&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sunil
	Abraham Executive Director, CIS India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Alice
	Munyua Lead dotAfrica Initiative and GAC representative, African
	Union Commission&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Will
	Hudsen Senior Advisor for International Policy, Google&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Dunja
	Mijatovic Representative on Freedom of the Media, OSCE&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Thomas
	Fitschen Director for the United Nations, for International
	Cooperation against Terrorism and for Cyber Foreign Policy, German
	Federal Foreign Office&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Hartmut
	Glaser Executive Secretary, Brazilian Internet Steering Committee&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Matt
	Perault, Head of Policy Development Facebook&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals"&gt;http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2475-2015-11-13-ws-132-transnational-due-process-a-case-study-in-ms-cooperation-workshop-room-4"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2475-2015-11-13-ws-132-transnational-due-process-a-case-study-in-ms-cooperation-workshop-room-4&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video
link Transnational
Due Process: A Case Study in MS Cooperation available here&amp;nbsp;&lt;a href="https://www.youtube.com/watch?v=M9jVovhQhd0"&gt;https://www.youtube.com/watch?v=M9jVovhQhd0&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;VI.
The Internet Governance Project organised a meeting of the
&lt;em&gt;&lt;strong&gt;Dynamic
Coalition on Accountability of Internet Governance Venues&lt;/strong&gt;&lt;/em&gt;
at Workshop Room 2 from 14:00
– 15:30 on
12 November, 2015. The coalition
brought together panelists to highlight the
challenges in developing an accountability
framework
for internet governance
venues that include setting up standards and developing a set of
concrete criteria. Jyoti Panday provided the perspective of civil
society on why acountability is necessary in internet governance
processes and organizations. The panelists for this workshop included
the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p&gt;
	Robin
	Gross, IP Justice&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Jeanette
	Hofmann, Director
	&lt;a href="http://www.internetundgesellschaft.de/"&gt;Alexander
	von Humboldt Institute for Internet and Society&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	 Farzaneh
	Badiei, 
	Internet Governance Project&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Erika
	Mann,
	Managing
	Director Public PolicyPolicy Facebook and Board of Directors
	ICANN&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Paul
	Wilson, APNIC&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Izumi
	Okutani, Japan
	Network Information Center (JPNIC)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Keith
	Drazek , Verisign&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Jyoti
	Panday,
	CIS&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Jorge
	Cancio,
	GAC representative&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;
Detailed
description of the workshop is available here
&lt;a href="http://igf2015.sched.org/event/4c23/dynamic-coalition-on-accountability-of-internet-governance-venues?iframe=no&amp;amp;w=&amp;amp;sidebar=yes&amp;amp;bg=no"&gt;http://igf2015.sched.org/event/4c23/dynamic-coalition-on-accountability-of-internet-governance-venues?iframe=no&amp;amp;w=&amp;amp;sidebar=yes&amp;amp;bg=no&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
Video
link https://www.youtube.com/watch?v=UIxyGhnch7w&lt;/p&gt;
&lt;p&gt;&amp;nbsp;VII.
Digital
Infrastructure
Netherlands Foundation organized an open forum at
Workshop Room 3
from 11:00
– 12:00
on
10
November, 2015. The open
forum discussed the increase
in government engagement with “the internet” to protect their
citizens against crime and abuse and to protect economic interests
and critical infrastructures. It
brought
together panelists topresent
ideas about an agenda for the international protection of ‘the
public core of the internet’ and to collect and discuss ideas for
the formulation of norms and principles and for the identification of
practical steps towards that goal.
Pranesh Prakash participated in the e open forum. Other speakers
included&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p&gt;
	Bastiaan
	Goslings AMS-IX, NL&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Pranesh
	Prakash CIS, India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Marilia
	Maciel (FGV, Brasil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Dennis
	Broeders (NL Scientific Council for Government Policy)&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;
Detailed
description of the open
forum is available here
&lt;a href="http://schd.ws/hosted_files/igf2015/3d/DINL_IGF_Open%20Forum_The_public_core_of_the_internet.pdf"&gt;http://schd.ws/hosted_files/igf2015/3d/DINL_IGF_Open%20Forum_The_public_core_of_the_internet.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
Video
link available here &lt;a href="https://www.youtube.com/watch?v=joPQaMQasDQ"&gt;https://www.youtube.com/watch?v=joPQaMQasDQ&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
VIII.
UNESCO, Council of Europe, Oxford University, Office of the High
Commissioner on Human Rights, Google, Internet Society organised a
workshop  on hate speech and youth radicalisation at Room 9 on
Thursday, November 12. UNESCO shared the initial outcome from its
commissioned research on online hate speech including practical
recommendations on combating against online hate speech through
understanding the challenges, mobilizing civil society, lobbying
private sectors and intermediaries and educating individuals with
media and information literacy. The workshop also discussed how to
help empower youth to address online radicalization and extremism,
and realize their aspirations to contribute to a more peaceful and
sustainable world. Sunil Abraham provided his inputs. Other speakers
include&lt;/p&gt;
&lt;p&gt;
	1.
Chaired by Ms Lidia Brito, Director for UNESCO Office in Montevideo&lt;/p&gt;
&lt;p&gt;
	2.Frank
La Rue, Former Special Rapporteur on Freedom of Expression&lt;/p&gt;
&lt;p&gt;
	3.
Lillian Nalwoga, President ISOC Uganda and rep CIPESA, Technical
community&lt;/p&gt;
&lt;p&gt;
	4.
Bridget O’Loughlin, CoE, IGO&lt;/p&gt;
&lt;p&gt;
	5.
Gabrielle Guillemin, Article 19&lt;/p&gt;
&lt;p&gt;
	6.
Iyad Kallas, Radio Souriali&lt;/p&gt;
&lt;p&gt;
	7.
Sunil Abraham executive director of Center for Internet and Society,
Bangalore, India&lt;/p&gt;
&lt;p&gt;
	8.
Eve Salomon, global Chairman of the Regulatory Board of RICS&lt;/p&gt;
&lt;p&gt;
	9.
Javier Lesaca Esquiroz, University of Navarra&lt;/p&gt;
&lt;p&gt;
	10.
Representative GNI&lt;/p&gt;
&lt;p&gt;
	11.
Remote Moderator: Xianhong Hu, UNESCO&lt;/p&gt;
&lt;p&gt;
	12.
Rapporteur: Guilherme Canela De Souza Godoi, UNESCO&lt;/p&gt;
&lt;p&gt;
Detailed
description of the workshop
is available here
&lt;a href="http://igf2015.sched.org/event/4c1X/ws-128-mitigate-online-hate-speech-and-youth-radicalisation?iframe=no&amp;amp;w=&amp;amp;sidebar=yes&amp;amp;bg=no"&gt;http://igf2015.sched.org/event/4c1X/ws-128-mitigate-online-hate-speech-and-youth-radicalisation?iframe=no&amp;amp;w=&amp;amp;sidebar=yes&amp;amp;bg=no&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
Video
link to the panel is available here
&lt;a href="https://www.youtube.com/watch?v=eIO1z4EjRG0"&gt;https://www.youtube.com/watch?v=eIO1z4EjRG0&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;INTERMEDIARY
LIABILITY&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
IX.
Electronic
Frontier Foundation, Centre for Internet Society India, Open Net
Korea and Article 19 collaborated to organize
a workshop on the &lt;em&gt;&lt;strong&gt;Manila
Principles on Intermediary Liability&lt;/strong&gt;&lt;/em&gt;
at Workshop Room 9 from 11:00 am to 12:00 pm on 13 November 2015. The
workshop elaborated on the Manila
Principles, a high level principle framework of best practices and
safeguards for content restriction practices and addressing liability
for intermediaries for third party content. The
workshop
saw particpants engaged in over lapping projects considering
restriction practices coming togetehr to give feedback and highlight
recent developments across liability regimes. Jyoti
Panday laid down the key details of the Manila Principles framework
in this session. The panelists for this workshop included the
following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Kelly
	Kim Open Net Korea,&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Jyoti
	Panday, CIS India,&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Gabrielle
	Guillemin, Article 19,&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Rebecca
	McKinnon on behalf of UNESCO&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Giancarlo
	Frosio, Center for Internet and Society, Stanford Law School&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Nicolo
	Zingales, Tilburg University&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Will
	Hudson, Google&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2423-2015-11-13-ws-242-the-manila-principles-on-intermediary-liability-workshop-room-9"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2423-2015-11-13-ws-242-the-manila-principles-on-intermediary-liability-workshop-room-9&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video link available here &lt;a href="https://www.youtube.com/watch?v=kFLmzxXodjs"&gt;https://www.youtube.com/watch?v=kFLmzxXodjs&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;strong&gt;ACCESSIBILITY&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
X.
Dynamic
Coalition
on Accessibility and Disability and Global Initiative for Inclusive
ICTs organised a workshop on &lt;em&gt;&lt;strong&gt;Empowering
the Next Billion by Improving Accessibility&lt;/strong&gt;&lt;/em&gt;&lt;em&gt;
&lt;/em&gt;at
Workshop Room 6 from 9:00 am to 10:30 am on 13 November, 2015. The
discussion focused on
the need and ways to remove accessibility barriers which prevent over
one billion potential users to benefit from the Internet, including
for essential services. Sunil
Abraham specifically spoke about the lack of compliance of existing
ICT infrastructure with well established accessibility standards
specifically relating to accessibility barriers in the disaster
management process. He discussed the barriers faced by persons with
physical or psychosocial disabilities.  The
panelists for this discussion were the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Francesca
	Cesa Bianchi, G3ICT&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Cid
	Torquato, Government of Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Carlos
	Lauria, Microsoft Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sunil
	Abraham, CIS India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Derrick
	L. Cogburn, Institute on Disability and Public Policy (IDPP) for the
	ASEAN(Association of Southeast Asian Nations) Region&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Fernando
	H. F. Botelho, F123 Consulting&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Gunela
	Astbrink, GSA InfoComm&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;u&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;u&gt;&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2438-2015-11-13-ws-253-empowering-the-next-billion-by-improving-accessibility-workshop-room-3"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2438-2015-11-13-ws-253-empowering-the-next-billion-by-improving-accessibility-workshop-room-3&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video
Link Empowering
the next billion by improving accessibility&amp;nbsp;&lt;a href="https://www.youtube.com/watch?v=7RZlWvJAXxs"&gt;https://www.youtube.com/watch?v=7RZlWvJAXxs&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;strong&gt;OPENNESS&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
XI.
A
workshop on &lt;em&gt;&lt;strong&gt;FOSS
&amp;amp; a Free, Open Internet: Synergies for Development&lt;/strong&gt;&lt;/em&gt;
was organized at Workshop Room 7 from 2:00 pm to 3:30 pm on 13
November, 2015. The discussion was focused on the increasing risk to
openness of the internet and the ability of present &amp;amp; future
generations to use technology to improve their lives. The panel shred
different perspectives about the future co-development
of FOSS and a free, open Internet; the threats that are emerging; and
ways for communities to surmount these. Sunil
Abraham emphasised the importance of free software, open standards,
open access and access to knowledge and the lack of this mandate in
the draft outcome document for upcoming WSIS+10 review and called for
inclusion of the same. Pranesh Prakash further contributed to the
discussion by emphasizing the need for free open source software with
end‑to‑end encryption and traffic level encryption based
on open standards which are decentralized and work through federated
networks. The
panellists for this discussion were the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Satish
	Babu, Technical Community, Chair, ISOC-TRV, Kerala, India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Judy
	Okite, Civil Society, FOSS Foundation for Africa&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Mishi
	Choudhary, Private Sector, Software Freedom Law Centre, New York&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Fernando
	Botelho, Private Sector, heads F123 Systems, Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sunil
	Abraham, CIS
	India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Pranesh
	Prakash, CIS
	India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Nnenna
	Nwakanma- WWW.Foundation&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Yves
	MIEZAN EZO, Open Source strategy consultant&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Corinto
	Meffe, Advisor to the President and Directors, SERPRO, Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Frank
	Coelho de Alcantara, Professor, Universidade Positivo, Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Caroline
	Burle, Institutional and International Relations, W3C Brazil Office
	and Center of Studies on Web Technologies&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;u&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;u&gt;&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2468-2015-11-13-ws10-foss-and-a-free-open-internet-synergies-for-development-workshop-room-7" target="_top"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2468-2015-11-13-ws10-foss-and-a-free-open-internet-synergies-for-development-workshop-room-7&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video
link available here &lt;a href="https://www.youtube.com/watch?v=lwUq0LTLnDs"&gt;https://www.youtube.com/watch?v=lwUq0LTLnDs&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015'&gt;https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Encryption</dc:subject>
    
    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Anonymity</dc:subject>
    
    
        <dc:subject>Civil Society</dc:subject>
    
    
        <dc:subject>Blocking</dc:subject>
    

   <dc:date>2015-11-30T10:47:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/state-of-consumer-digital-security-in-india">
    <title>State of Consumer Digital Security in India</title>
    <link>https://cis-india.org/internet-governance/blog/state-of-consumer-digital-security-in-india</link>
    <description>
        &lt;b&gt;This report attempts to identify the existing state of digital safety in India, with a mapping of digital threats, which will aid stakeholders in identifying and addressing digital security problems in the country. This project was funded by the Asia Foundation.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Since 2006, successive Union governments in India have shown increased focus on digital governance. The National e-Governance Plan was launched by the UPA government in2006, and several digital projects led by the state such as digitisation of the filing of taxes, appointment process for passports, corporate governance, and the Aadhaar programme(India’s unique digital identity system that utilises biometric and demographic data) arose under it, in the form of mission mode projects (projects that are part of a broader National e-governance initiative, each focusing on specific e-Governance aspects, like banking, land records, or commercial taxes). In 2014, when the NDA government came to power, the National e-Governance Plan was subsumed under the government’s flagship project of Digital India, and several mission mode projects were added. In the meantime, the internet connectivity, first in the form of wire connectivity, and later in the form of mobile connectivity has increased greatly. In the same period, use of digital services, first in new services native to the Internet such as email, social networking, instant messaging, and later the platformization and disruption of traditional business models in transportation, healthcare, finance and virtually every sector, has led to a deluge of digital private service providers in India.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Currently, India has 500 million internet users — over a third of its total population — making it the country with the second largest number of Internet users after China. The uptake of these technological services has also been accompanied by several kinds of digital threats that an average digital consumer in India must regularly contend with. This report is a mapping of consumer-facing digital threats in India and is intended to aid stakeholders in identifying and addressing digital security problems. The first part of the report categorises digital threats into four kinds, Personal Data Threats, Online Content Related Threats, Financial Threats, and Online Sexual Harassment Threats. Threats under each category are then defined, with detailed consumer-facing consequences, and past instances where harm has been caused because of these threats.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Read the full report &lt;a href="https://cis-india.org/internet-governance/report-state-of-consumer-digital-security-in-india" class="internal-link" title="Report - State of Consumer Digital Security in India"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/state-of-consumer-digital-security-in-india'&gt;https://cis-india.org/internet-governance/blog/state-of-consumer-digital-security-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Digital Knowledge</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Media</dc:subject>
    

   <dc:date>2021-07-05T11:07:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/post1">
    <title>Rethinking the last mile Problem: A cultural argument</title>
    <link>https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/post1</link>
    <description>
        &lt;b&gt;This research project, by Ashish Rajadhyaksha from the Centre for the Study of Culture and Society, is mainly a conceptual-archival investigation into India’s history for what has in recent years come to be known as the ‘last mile’ problem. The term itself comes from communication theory, with in turn an ancestry in social anthropology, and concerns itself with (1) identifying the eventual recipient/beneficiary of any communication message, (2) discovering new ways by which messages can be delivered intact, i.e. without either distortion of decay. Exploring the intersection of government policy, technology intervention and the users' expectations, with a specific focus on Internet Technologies and their space in the good governance protocols in India, the project aims at revisiting the last mile problem as one of cultural practices and political contexts in India.&lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;THE CULTURAL
LAST MILE&lt;/p&gt;
&lt;p&gt;Ashish
Rajadhyaksha&lt;/p&gt;
&lt;p&gt;&lt;u&gt;The Argument&lt;/u&gt;:&lt;/p&gt;
&lt;p&gt;Mapped onto
developmental-democratic language since at least Independence, this concept,
further mapping concrete benefits with the delivery of the message, has come to
define the classic model by which the Indian state attempts to ensure that &lt;em&gt;policy&lt;/em&gt; designed for &lt;em&gt;local implementation&lt;/em&gt; actually reaches its &lt;em&gt;intended beneficiaries&lt;/em&gt; without &lt;em&gt;distortion&lt;/em&gt;.
The immense link between communication theory and democracy thereby defines not
only the Indian state’s historic dependence on &lt;em&gt;technologies&lt;/em&gt; of communication – radio, terrestrial and satellite.
It goes further, as the technological apparatus – and its variants of the
classic ‘broadcast’ model of single sender-multiple receiver – comes to
underpin the very definition of democratic development.&lt;/p&gt;
&lt;p&gt;One consequence
is an &lt;em&gt;evolutionary&lt;/em&gt; definition of
technology, with the last mile defined as a means of eternal purification of
the message, combining content ‘corruption’ with socio-economic corruption, as
newer generations of technology tirelessly eliminate distortion in both. This
could well be the history of Indian state policy, from radio broadcasts
representing the ‘voice of the State’ to the era of e-Governance. &amp;nbsp;Such an authority is somewhat graphically in evidence in
recent years in the deployment of ‘neutral’ technology such as computers within
e-governance initiatives, which have, when successful , seen
computer-illiterate farmers make wide use of ICT services where they ‘do not
feel that there is a barrier to their obtaining information’, a ‘tribute to the
grassroots staff and their training’, but also to ‘faith in the technology’
(Shaik, Jhamtani and Rao 2004: 9). The attribution of such ‘neutrality’ to
modern ‘scientific’ technology has been in evidence from late
nineteenth-century still photography to the use of technologies such as ‘First
In–First Out (FIFO)’, a way that prevents queue-jumping, biometrics and double
screens for users to view typed in matter, including touch screens
(Parthasarathy 2005, VIII: 9).&lt;/p&gt;
&lt;p&gt;&lt;u&gt;The Research
Project&lt;/u&gt;&lt;/p&gt;
&lt;p&gt;This project
assumes that, given the chronic historic failure in bridging the last mile,
whether in communication theory or in the standard functioning of development
projects (a key component of the relatively new discipline of disaster
management) – a failure stemming from difficulties in both naming and accessing
intended beneficiaries – it becomes necessary to reinvestigate the model
itself, along with its historic failures.&lt;/p&gt;
&lt;p&gt;The project is
split into three parts: &lt;br /&gt;
(1) The conceptual argument: a historical trace of the theoretical origins of
the concept ‘Last mile’ (even if not named as such), and key technical
locations of its deployment: the telegraph, the ‘film trains’ in the 1920s, the
radio (extended to transistorization in the 1960s), and the first experiments
with terrestrial and satellite technology. &lt;br /&gt;
(2) It will then take three specific examples (perhaps but may be
changed),(a)&amp;nbsp; the SITE experiment of the
1970s with specific new field work on the well known Kheda experiment; (b) the
Cable Television movements in India in the 1980s, and (c) Experiments with WLL
in IIT Chennai in the 1990s. &lt;br /&gt;
(3) The concluding section will address locations where the last mile has in
fact been bridged successfully, in the review’s estimation, and will inquire
into how it came to be functional. It is at this point speculated that it
worked mainly because (a) the original model was either tampered with or used
contrary to stated intentions, and (b) when it worked, this happened with the
connivance of the state. The project will therefore perhaps conclude with the
following investigations: that historically significant occasions when
alternative definitions were thrown up for the last mile worked mainly because
they were dependent on error and accident (rather than seeing these as
interruptions or distortions to the signal), and that they functioned more on
both peer-to-peer and reverse broadcasting than on the
single-sender-multiple-recipients model.&lt;/p&gt;
&lt;p&gt;&lt;u&gt;References&lt;/u&gt;:&lt;/p&gt;
&lt;p&gt;Ashish Rajadhyaksha
(1990), ‘Beaming Messages to the Nation’, &lt;em&gt;Journal of Arts &amp;amp;
Ideas&lt;/em&gt;, No. 19 (May): 33–52.&lt;/p&gt;
&lt;p&gt;Ashish Rajadhyaksha
(1999), ‘The Judgement: Re-Forming the Public’, &lt;em&gt;Journal of Arts &amp;amp;
Ideas&lt;/em&gt;, Nos. 32–33 (April)&lt;/p&gt;
&lt;p&gt;N. Meera Shaik, Anita
Jhamtani and D.U.M. Rao, ‘Information and Communication Technology in
Agricultural Development: A Comparative Analysis of Three Projects from India’,
Agricultural Research and Extension Network (AGREN), 2004.&lt;/p&gt;
&lt;p&gt;Balaji Parthasarathy et
al (ed), ‘Information and Communications Technologies for Development: A
Comparative Analysis of Impacts and Costs from India’, Bangalore: International
Institute of Information Technology, 2005.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/post1'&gt;https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/post1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Histories of Internet</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Histories</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    

   <dc:date>2015-04-03T10:54:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/primer-it-act">
    <title>Primer on the New IT Act</title>
    <link>https://cis-india.org/internet-governance/blog/primer-it-act</link>
    <description>
        &lt;b&gt;With this draft information bulletin, we briefly discuss some of the problems with the Information Technology Act, and invite your comments.&lt;/b&gt;
        
&lt;p align="justify"&gt;The latest amendments to
the Information Technology Act 2000, passed in December 2008 by the
Lok Sabha, and the draft rules framed under it contain several provisions
that can be abused and misused to infringe seriously on citizens'
fundamental rights and basic civil liberties. We have already &lt;a href="https://cis-india.org/internet-governance/it-act/short-note-on-amendment-act-2008" class="internal-link" title="Short note on IT Amendment Act, 2008"&gt;written about some of the problems&lt;/a&gt; with this Act earlier.&amp;nbsp; With this information bulletin, drafted by Chennai-based advocate Ananth Padmanabhan, we wish to extend that analysis into the form of a citizens' dialogue highlighting ways in which the Act and the rules under it fail.&amp;nbsp; Thus, we invite your comments, suggestions, and queries, as this is very much a work in progress.&amp;nbsp; We will eventually consolidate this dialogue and follow up with the government on the concerns of its citizens.&lt;/p&gt;
&lt;h3 align="justify"&gt;Intermediaries
beware&lt;/h3&gt;
&lt;p align="justify"&gt;Internet service
providers, webhosting service providers, search engines, online
payment sites, online auction sites, online market places, and cyber
cafes are all examples of “intermediaries” under this Act. The
Government can force any of these intermediaries to cooperate with
any interception, monitoring or decryption of data by stating broad
and ambiguous reasons such as the “interest of the sovereignty or
integrity of India”, “defence of India”, “security of the
State”, “friendly relations with foreign States”, “public
order” or for “preventing incitement to” or “investigating”
the commission of offences related to those. This power can be abused
to infringe on the privacy of intermediaries as well as to hamper
their constitutional right to conduct their business without interference.&lt;/p&gt;
&lt;p align="justify"&gt;If a Google search on
“Osama Bin Laden” throws up an article that claims to have
discovered his place of hiding, the Government of India can issue a
direction authorizing the police to monitor Google’s servers to
find the source of this information. While Google can, of course,
establish that this information cannot be attributed directly to the
organization, making the search unwarranted, that would not help it
much.  While section 69 grants the government these wide-ranging
powers, it does not provide for adequate safeguards in the form of having to show due cause or having an in-built right of appeal against a decision by the government. If Google refused
to cooperate under such circumstances, its directors would be liable
to imprisonment of up to seven years.&lt;/p&gt;
&lt;h3 align="justify"&gt;Pre-censorship&lt;br /&gt;&lt;/h3&gt;
&lt;p align="justify"&gt;The State has been given
unbridled power to block access to websites as long as such blocking
is deemed to be in the interest of sovereignty and integrity of
India, defence of India, security of the State, friendly relations
with foreign States, and other such matters.&lt;/p&gt;
&lt;p align="justify"&gt;Thus, if a web portal or
blog carries or expresses views critical of the Indo-US nuclear deal,
the government can block access to the website and thus muzzle criticism
of its policies.&amp;nbsp;&amp;nbsp; While some may find that suggestion outlandish, it is very much possible under the Act.&amp;nbsp; Since there is no right to be heard before your website is taken down nor is there an in-built mechanism for the website owner to appeal, the decisions made by the government cannot be questioned unless you are prepared to undertake a costly legal battle.&amp;nbsp;&lt;/p&gt;
&lt;p align="justify"&gt;Again, if an intermediary (like Blogspot or an ISP like Airtel) refuses to cooperate, its directors may be personally liable to imprisonment for up to a period of seven years.&amp;nbsp; Thus, being personally liable, the intermediaries are rid of any incentive to stand up for the freedom of speech and expression.&lt;/p&gt;
&lt;h3 align="justify"&gt;We need to monitor your computer: you have a virus&lt;br /&gt;&lt;/h3&gt;
&lt;p align="justify"&gt;The government has been
vested with the power to authorize the monitoring and collection of
traffic data and information generated, transmitted, received or
stored in any computer resource.  This provision is much too
widely-worded.&amp;nbsp;&lt;/p&gt;
&lt;p align="justify"&gt;For instance, if the
government feels that there is a virus on your computer that can
spread to another computer, it can demand access to monitor your
e-mails on the ground that such monitoring enhances “cyber
security” and prevents “the spread of computer contaminants”.&lt;/p&gt;
&lt;h3 align="justify"&gt;Think before you click "Send"&lt;br /&gt;&lt;/h3&gt;
&lt;p align="justify"&gt;If out of anger you send
an e-mail for the purpose of causing “annoyance” or
“inconvenience”, you may be liable for imprisonment up to three
years along with a fine.  While that provision (section 66A(c)) was
meant to combat spam and phishing attacks, it criminalizes much more
than it should.&lt;/p&gt;
&lt;h3 align="justify"&gt;A new brand of "cyber terrorists" &lt;br /&gt;&lt;/h3&gt;
&lt;p align="justify"&gt;The new offence of “cyber
terrorism” has been introduced, which is so badly worded that it
borders on the ludicrous.&amp;nbsp; If a journalist gains
unauthorized access to a computer where information regarding
corruption by certain members of the judiciary is stored, she becomes
a “cyber terrorist” as the information may be used to cause
contempt of court.&amp;nbsp; There is no precedent for any such definition of cyberterrorism.&amp;nbsp; It is unclear what definition of terrorism the government is going by when even unauthorized access to defamatory material is considered cyberterrorism.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/primer-it-act'&gt;https://cis-india.org/internet-governance/blog/primer-it-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2011-08-02T07:41:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/opening-government-best-practice-guide">
    <title>Opening Government: A Guide to Best Practice in Transparency, Accountability and Civic Engagement across the Public Sector</title>
    <link>https://cis-india.org/openness/blog-old/opening-government-best-practice-guide</link>
    <description>
        &lt;b&gt;The Transparency &amp; Accountability Initiative has published a book called “Opening Government: A Guide to Best Practice in Transparency, Accountability and Civic Engagement across the Public Sector”. We at the Centre for Internet &amp; Society contributed the section on Open Government Data.&lt;/b&gt;
        &lt;p&gt;Cross-posted from the &lt;a class="external-link" href="http://www.transparency-initiative.org/reports/opening-government"&gt;Transparency &amp;amp; Accountability Initiative blog&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Download &lt;a class="external-link" href="http://www.transparency-initiative.org/wp-content/uploads/2011/07/Opening-Government3.pdf"&gt;the full report&lt;/a&gt; (PDF, 440 Kb)&lt;/p&gt;
&lt;h3&gt;Open Government Partnership&lt;/h3&gt;
&lt;p&gt;In January 2011, a small group of government and civil society leaders from around the world gathered in Washington, DC to brainstorm on how to build upon growing global momentum around transparency, accountability and civic participation in governance. The result was the creation of the Open Government Partnership (OGP), a new multi-stakeholder coalition of governments, civil society and private sector actors working to advance open government around the world — with the goals of increasing public sector responsiveness to citizens, countering corruption, promoting economic efficiencies, harnessing innovation, and improving the delivery of services.&lt;/p&gt;
&lt;p&gt;In September 2011, these founding OGP governments will gather in New York on the margins of the UN General Assembly to embrace a set of high-level open government principles, announce country-specific commitments for putting these principles into practice and invite civil society to assess their performance going forward. Also in September, a diverse coalition of governments will stand up and announce their intention to join a six-month process culminating in the announcement of their own OGP commitments and signing of the declaration of principles in January 2012.&lt;/p&gt;
&lt;h3&gt;'Opening Government' report&lt;/h3&gt;
&lt;p&gt;To help inform governments, civil society and the private sector in developing their OGP commitments, the Transparency and Accountability Initiative (T/A Initiative) reached out to leading experts across a wide range of open government fields to gather their input on current best practice and the practical steps that OGP participants and other governments can take to achieve it.&lt;/p&gt;
&lt;p&gt;The result is the first document of its kind to compile the state of the art in transparency, accountability and citizen participation across 15 areas of governance, ranging from broad categories such as access to information, service delivery and budgeting to more specific sectors such as forestry, procurement and climate finance.&lt;/p&gt;
&lt;p&gt;Each expert’s contribution is organized according to three tiers of potential commitments around open government for any given sector — minimal steps for countries starting from a relatively low baseline, more substantial steps for countries that have already made moderate progress, and most ambitious steps for countries that are advanced performers on open government.&lt;/p&gt;
&lt;h3&gt;Chapters and Contributing Authors&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Aid – &lt;a href="http://www.publishwhatyoufund.org/" target="_blank" title="Publish What You Fund"&gt;Publish What You Fund&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Asset disclosure - &lt;a href="http://www.globalintegrity.org/" target="_blank" title="Global Integrity"&gt;Global Integrity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Budgets – &lt;a href="http://www.internationalbudget.org/" target="_blank" title="IBP"&gt;The International Budget Project&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Campaign finance – &lt;a href="http://www.transparency-usa.org/" target="_blank" title="TI USA"&gt;Transparency International - USA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Climate finance – &lt;a href="http://www.wri.org/" target="_blank" title="WRI"&gt;World Resources Institute&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Fisheries – &lt;a href="http://transparentsea.co/" target="_blank" title="TransparentSea"&gt;TransparentSea&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Financial sector reform  &lt;a href="http://www.gfip.org/" target="_blank" title="Global Financial Integrity"&gt;Global Financial Integrity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Forestry – &lt;a href="http://www.globalwitness.org/" target="_blank" title="Global Witness"&gt;Global Witness&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Electricity – &lt;a href="http://electricitygovernance.wri.org/" target="_blank" title="Electricity Governance Initiative"&gt;Electricity Governance Initiative&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Environment – &lt;a href="http://www.accessinitiative.org/" target="_blank" title="The Access Initiative"&gt;The Access Initiative&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Extractive industries – &lt;a href="http://www.revenuewatch.org/" target="_blank" title="RWI"&gt;The Revenue Watch Institute&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Open government data – &lt;a href="https://cis-india.org/" target="_blank" title="CIS India"&gt;The Centre for Internet and Society - India&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Procurement – &lt;a href="http://www.transparency-usa.org/" target="_blank" title="TI USA"&gt;Transparency International-USA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Right to information – &lt;a href="http://www.access-info.org/" target="_blank" title="Access Info"&gt;Access Info&lt;/a&gt; and the &lt;a href="http://www.law-democracy.org/" target="_blank" title="Center for Law and Democracy"&gt;Center for Law and Democracy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Service delivery – &lt;a href="http://www.twaweza.org/" target="_blank" title="Twaweza"&gt;Twaweza&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/opening-government-best-practice-guide'&gt;https://cis-india.org/openness/blog-old/opening-government-best-practice-guide&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>e-governance</dc:subject>
    

   <dc:date>2012-12-14T10:26:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/dcos-workshop-09">
    <title>Open Standards Workshop at IGF '09</title>
    <link>https://cis-india.org/openness/blog-old/dcos-workshop-09</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society co-organized a workshop on 'Open Standards: A Rights-Based Framework' at the fourth Internet Governance Forum, at Sharm el-Sheikh.  The panel was chaired by Aslam Raffee of Sun Microsystems and the panellists were Sir Tim Berners-Lee of W3C, Renu Budhiraja of India's DIT, Sunil Abraham of CIS, Steve Mutkoski of Microsoft, and Rishab Ghosh of UNU-MERIT.&lt;/b&gt;
        
&lt;p&gt;Sir Tim Berners-Lee started the session with an address on various rights.&amp;nbsp; Rights, he noted can range from being things like the rights to air and water to the right not to have the data carrier you use determine which movie you watch.&amp;nbsp; Then, there are tensions between rights: the right to anonymity can clash with the right to know who posted information on making a bomb.&amp;nbsp; Berners-Lee stated that for 2009, he has chosen to pursue one particular right: the right to government-held data.&amp;nbsp; This data can include everything from where schools are to emergency services such as locations of hospitals.&amp;nbsp; Today, we are talking about standards.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The World Wide Web Consortium (W3C) is a fifteen-year old body in which all kinds of people come together for purposes of setting standards around the World Wide Web.&amp;nbsp; Thus, everything from HTML, which is used to write Web pages to WCAG, which are guidelines to enable people with disabilities access websites through assistive technologies.&amp;nbsp; W3C conducts its discussions openly: anybody who has a good idea has a right to participate in its discussions -- it does not matter who one works for, who one represents -- what does matter are the ideas one brings to the table.&amp;nbsp; The kinds of standards that W3C deals with are of interest to an immensely wide-ranging group of people.&amp;nbsp; Even ten-year olds have actually expressed their opinions about standards like HTML.&amp;nbsp; All this openness of participation must be guaranteed while ensuring that the processes move forward.&lt;/p&gt;
&lt;p&gt;Next spoke Renu Budhiraja of the Department of Information and Technology, which is a part of the Indian government.&amp;nbsp; She started off by hoping that this workshop would be not only a platform to share knowledge, but also to reach consensus on a few matters.&amp;nbsp; Next, she laid out why open standards are extremely important for the Indian government.&amp;nbsp; What citizens want in their interactions with the government are ease of interaction and efficiency.&amp;nbsp; For them it is immaterial whether a certain service is provided by Department A or Department B.&amp;nbsp; Thus we need to move towards a single-window government service for citizens, enabling them to interact easily with the government's various departments.&amp;nbsp; While such an initiative must be centralized for it to be effective, it is crucial that its implementation be decentralized and suited to each district or localities' needs.&lt;/p&gt;
&lt;p&gt;There is, understandably, a huge institutional mechanism behind ensuring that these systems are based on open standards.&amp;nbsp; We have expert committees, consisting of academics and knowledgeable bureaucrats, and working groups, which include industry groups.&amp;nbsp; Through these, we have evolved a National Policy on Open Standards, which is currently in a draft stage, but shall be notified soon.&amp;nbsp; This policy outlines the principles based on which particular standards required for governmental functioning are to be chosen or evolved.&amp;nbsp; This document will ensure long-term accessibility to public documents and information, and seamless interoperability of various governmental services and departments.&amp;nbsp; It will also reduce the risk of vendor lock-in and reduce costs, and thus ensure long-term, sustainable, scalable and cost-effective solutions.&lt;/p&gt;
&lt;p&gt;Ms. Budhiraja noted that there are a few aspects of the policy that bear discussion in a forum such as the IGF.&amp;nbsp; First is the issue of whether royalty-free is the only choice for innovation.&amp;nbsp; All other things equal, between royalty-free and reasonable and non-discriminatory (RAND) standards, of course royalty-free is to be preferred.&amp;nbsp; But what if a superior technology (JPEG200 vs. JPEG) is RAND?&amp;nbsp; What should the government's position be in such a case?&amp;nbsp; Further, what should the government's position be when in a particular domain a RAND standard is the only option?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Next is the issue of single vs. multiple open standards.&amp;nbsp; When interoperability is what we are aiming at, can multiple standards be recommended as some in the industry are asking us to do?&amp;nbsp; And then is the issue of market maturity.&amp;nbsp; The government sometimes finds itself in a situation where a standard is available, but well-developed products around that standard aren't and there aren't sufficient vendors using that standard.&amp;nbsp; All these issues are of great practical importance when a government works on a policy document on standards.&lt;/p&gt;
&lt;p&gt;Next up was Sunil Abraham, Executive Director of the Centre for Internet and Society.&amp;nbsp; His presentation was on open standards as citizens' and consumers' rights.&amp;nbsp; He started off by citing the example of&amp;nbsp; the Smart Card Operating System for Transport Application (SCOSTA) standard, and the implications that the SCOSTA story has on large-scale projects such as the National Unique ID project currently under way in India.&amp;nbsp; SCOSTA, an open standard, was being written off as unimplementable by all the MNC smart card vendors who wished to push RAND standards.&amp;nbsp; IIT Kanpur helped the government develop a working implementation.&amp;nbsp; Within twenty days, the card manufacturers submitted modified cards for compliance testing by NIC.&amp;nbsp; Because of SCOSTA being an open standard, local companies also joined the tender.&amp;nbsp; The cost went down from Rs. 600 per card to Rs. 30 per card.&amp;nbsp; This shows the benefits of open standards as a means of curbing oligopolistic pricing, and working for the benefit of consumers.&lt;/p&gt;
&lt;p&gt;From a rights-based perspective, access to the state machinery is a primary right.&amp;nbsp; Citizens should not be required to pirate or purchase software to interact with the state.&amp;nbsp; If e-governance solutions are based on proprietary standards, not all citizens would be equal.&amp;nbsp; The South African example or requiring a particular browser to access the election commission's website shows that in a rather drastic fashion.&amp;nbsp; When intellectual property interferes with governmental needs, governments have not been shy of issuing compulsory licences.&amp;nbsp; This was seen when during the Great War the United States government pooled various flight-related patents and compulsorily licensed them, as well as what we are currently seeing with many Aids-related drugs being compulsorily licensed in developing countries.&amp;nbsp; Thus, there are precedents for such licensing, and governments should explore them in the realm of e-governance.&amp;nbsp; Many countries now have statutes that guarantee the right to government-held information.&amp;nbsp; Government Interoperability Frameworks should take these into account, and mandate all government-to-citizen (G2C) information be transacted via open standards.&amp;nbsp; This must be backed up by a strong accessibility policy to ensure that the governments don't discriminate between their citizens.&lt;/p&gt;
&lt;p&gt;Proprietary standards act like pseudo-intellectual property rights, just as DRMs do.&amp;nbsp; They add a layer on top of rights such as copyright, and can prevent the exercise of fair use and fair dealing rights because of an inability to legally negotiate the standards in which the content is encoded in a cost-free manner.&amp;nbsp; In guaranteeing this balance between copyrights and fair dealing rights, free software and alternative IP models play a crucial role.&amp;nbsp; Because of software patents being recognized in a few countries, development of free software which allows citizens to exercise their fair use rights is harmed in all countries.&lt;/p&gt;
&lt;p&gt;Steve Mutkoski of Microsoft spoke next and placed the standards debate in a large context.&amp;nbsp; He noted that standards are a technicality that are only a small part of the large issue which is interoperability in e-governance and delivery to citizens.&amp;nbsp; The real challenges are organizational and semantic interoperability.&amp;nbsp; Frequently interoperability is not harmed by technical issues, but by legal and organizational issues. Governments used to work on paper; during the shift to electronic data, they didn't engage in any organizational changes.&amp;nbsp; Thus they continue to function with electronic data the same way that they did with paper-based data.&amp;nbsp; Governments often lack strong privacy policies regarding the data that each of their departments holds.&amp;nbsp; This harms governmental functioning.&amp;nbsp; Additionally, legacy hardware and software have to be catered to by the standards we are talking about: sometimes an open standard just will not work.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Standards don't guarantee interoperability, and there is significant work done on this by noted academics ("Why Standards Are Not Enough To Guarantee End-to-End Interoperability" Lewis et al.; "Difficulties Implementing Standards" Egyedi &amp;amp; Dahanayake; "Standards Compliant, But Incompatible?" Egyedi et al.).&amp;nbsp; Mandated standards lists will not help address interoperability issues between different implementations of the same standard.&amp;nbsp; What would help?&amp;nbsp; Transparency of implementations; collaboration with community; active participation in maintenance of standards, etc., would help.&amp;nbsp; There is a need for continued public sector reform, with a focus on citizen-centric e-governance, and a need to engage with the question of whether government-mandated standards lists lead the market or follow the market.&lt;/p&gt;
&lt;p&gt;Rishab Aiyer Ghosh, a senior researcher at UN University, Maastricht, spoke next.&amp;nbsp; He started by noting that technical standards are left to technical experts.&amp;nbsp; That needs to change, which is why discussing open standards at the IGF is important.&amp;nbsp; He next set off a hypothetical: imagine you go to the city council office in Sharm el Sheik, and at the parking lot there it says that your car has to be a Ford if you are to park there; or if the Dutch government insists that you have a Philips TV if you are to receive the national broadcaster's signal.&amp;nbsp; While these might seem absurd, situations like this arise all the time when it comes to the realm of software.&amp;nbsp; Thus, the social effects of open standards are of utmost importance, and not just their technical qualities.&amp;nbsp; Analysing the social effects of open standards takes us back to the economics of technology and technological standards.&amp;nbsp; Technological standards exhibit network externalities: their inherent value is less than the value of others using them.&amp;nbsp; Being the only person in the world with a telephone won't be very useful.&amp;nbsp; Technological standards also exhibit path dependence: once you go with one technological format, it is difficult to change over to another even if that other format is superior to the first.&amp;nbsp; Thus, clearly, standards benefit when there is a 'natural monopoly'.&amp;nbsp; The challenge really arises when faced with the question of how to ensure a monopoly in a technology without the supplier of that technology exhibiting monopolistic tendencies.&amp;nbsp; This can only be done when the technology is open and developed openly, of which the web standards and the W3C are excellent examples.&amp;nbsp; If the technology or the process are semi-open, then because of the few intellectual property rights attached to the technology, some would be better off than others.&amp;nbsp; Just as governments cannot insist on driving a particular make of cars as a prerequisite for access to them, they cannot insist on using a particular proprietary standard as a means of accessing them.&lt;/p&gt;
&lt;p&gt;Many interesting questions arose when the floor was thrown open to the audience.&amp;nbsp; "Should governments only mandate a particular standard when it is certain that market maturity exists?"&amp;nbsp; Not really, since governmental decisions also give signals to the market and help direct attention to those standards.&amp;nbsp; It would be best if roadmaps were provided, with particular under-mature standards being designated as "preferred standards", thus helping push industry in a particular direction.&amp;nbsp; Examples where this strategy has borne fruit abound.&amp;nbsp; This is also the strategy found in the Australian GIF.&amp;nbsp; On the issue of multiplicity of standards, Sir Tim was very clear that they have to be avoided at all costs.&amp;nbsp; He gave the example of XSLT and CSS, which are both stylesheet formats.&amp;nbsp; He noted that their domain of operation was very different (with one being for servers and the other for clients), so having two standards with similar functions but different domains of operation does not make them multiple standards.&amp;nbsp; Multiple standards defeat the purpose of the standardization process.&lt;/p&gt;
&lt;p&gt;It was noted that governmental choices are of practical importance to citizens.&amp;nbsp; During the Hurricane Katrina emergency, the federal emergency website only worked properly if Internet Explorer was used. &amp;nbsp; How do we move forward?&amp;nbsp; We must move forward by having policies that strike a balance between allowing for the natural evolution of standards and stability.&amp;nbsp; The Government Interoperability Frameworks must be dynamic documents, allowing for categorization between standards and having clear roadmaps to enable industry to provide solutions to the government in a timely fashion.&amp;nbsp; Governments must be strong in order to push industry towards openness, for the sake of its citizens, and not let industry dictate proprietary standards as the solution.&amp;nbsp; Some opined that since there are dozens of domains that governments function in, maintaining lists of standards is a time-consuming process that is not justified, but others rebutted that by noting that for enterprise architectures to work, governments have to maintain such lists internally.&amp;nbsp; Opening up that list to citizens and service providers would not entail greater overheads.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sunil Abraham talking Open Standards at IGF09&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;(Video added on December 30, 2009)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a title="&amp;lt;OBJECT&amp;gt;, shockwave-flash@http://www.youtube.com/v/woC_6GddD6A&amp;amp;color1=0xb1b1b1&amp;amp;color2=0xcfcfcf&amp;amp;hl=en_US&amp;amp;feature=player_embedded&amp;amp;fs=1" class="__noscriptPlaceholder__" href="http://www.youtube.com/v/woC_6GddD6A&amp;amp;color1=0xb1b1b1&amp;amp;color2=0xcfcfcf&amp;amp;hl=en_US&amp;amp;feature=player_embedded&amp;amp;fs=1"&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;div style="float: none; text-align: start;" class="__noscriptPlaceholder__1"&gt;&lt;a title="&amp;lt;OBJECT&amp;gt;, shockwave-flash@http://www.youtube.com/v/woC_6GddD6A&amp;amp;color1=0xb1b1b1&amp;amp;color2=0xcfcfcf&amp;amp;hl=en_US&amp;amp;feature=player_embedded&amp;amp;fs=1" class="__noscriptPlaceholder__" href="http://www.youtube.com/v/woC_6GddD6A&amp;amp;color1=0xb1b1b1&amp;amp;color2=0xcfcfcf&amp;amp;hl=en_US&amp;amp;feature=player_embedded&amp;amp;fs=1"&gt;
&lt;div class="__noscriptPlaceholder__2"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/a&gt;&lt;/div&gt;
&lt;a title="&amp;lt;OBJECT&amp;gt;, shockwave-flash@http://www.youtube.com/v/woC_6GddD6A&amp;amp;color1=0xb1b1b1&amp;amp;color2=0xcfcfcf&amp;amp;hl=en_US&amp;amp;feature=player_embedded&amp;amp;fs=1" class="__noscriptPlaceholder__" href="http://www.youtube.com/v/woC_6GddD6A&amp;amp;color1=0xb1b1b1&amp;amp;color2=0xcfcfcf&amp;amp;hl=en_US&amp;amp;feature=player_embedded&amp;amp;fs=1"&gt;
&lt;/a&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/dcos-workshop-09'&gt;https://cis-india.org/openness/blog-old/dcos-workshop-09&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Consumer Rights</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Fair Dealings</dc:subject>
    
    
        <dc:subject>FLOSS</dc:subject>
    
    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2011-08-23T02:54:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/washington-post-january-14-2017-rama-lakshmi-millions-of-indians-move-from-cash-to-digital-payments">
    <title>Millions of Indians move from cash to digital payments. But some ask whether it’s safe</title>
    <link>https://cis-india.org/internet-governance/news/washington-post-january-14-2017-rama-lakshmi-millions-of-indians-move-from-cash-to-digital-payments</link>
    <description>
        &lt;b&gt;Minutes after Indian Prime Minister Narendra Modi began an ambitious new mobile-phone-payment application in December, several clones of the app popped up at Android smartphone stores.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Rama Lakshmi was &lt;a class="external-link" href="https://www.washingtonpost.com/world/asia_pacific/millions-of-indians-move-from-cash-to-digital-payments-but-some-ask-whether-its-safe/2017/01/13/e807ebf0-ae9b-488b-9eb1-1dcba80ba984_story.html?utm_term=.fc710ade922b"&gt;published by Washington Post&lt;/a&gt; on 14 January 2017, Sunil Abraham was quoted. Annie Gowen contributed to this report.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;In the first few days, users were flooded with &lt;a href="http://www.livemint.com/Industry/Q1z2di95uWbhcSMUKcx1SK/BHIM-app-users-raise-security-concerns-within-first-week.html"&gt;spam&lt;/a&gt; requests for money.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bhim app sponsored by the government was rushed out after Modi’s abrupt &lt;a href="https://www.washingtonpost.com/world/asia_pacific/india-invalidates-large-bank-notes-in-crackdown-on-crime/2016/11/08/cc705ee2-a5c6-11e6-ba46-53db57f0e351_story.html?tid=a_inl&amp;amp;utm_term=.1e0d0920f753"&gt;withdrawal&lt;/a&gt; of large currency bills two months ago. More than 10 million people  downloaded it in just 10 days, but in a country where awareness and  regulation of &lt;a href="https://www.washingtonpost.com/world/asia_pacific/privacy-concerns-grow-in-india/2012/01/26/gIQAyM0UmQ_story.html"&gt;privacy&lt;/a&gt;, data protection and digital &lt;a href="http://timesofindia.indiatimes.com/business/india-business/None-of-mobile-payment-apps-in-India-fully-secure-warns-Qualcomm/articleshow/55967778.cms"&gt;security&lt;/a&gt; are low, the number of cyberattacks is rising.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We  are rushing toward launching and using these plethora of financial tech  apps without the exhaustive security testing and education that is  needed,” said Sunil Abraham, executive director of the Center for  Internet and Society. “We are operating in a bit of a regulatory  vacuum.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modi’s ambitious move to swap old bills for new was intended to fight the hoarding of &lt;a href="https://www.washingtonpost.com/world/asia_pacific/india-targets-tax-evaders-who-hide-black-money-at-home-and-abroad/2015/09/04/2532b7c2-50c4-11e5-b225-90edbd49f362_story.html?utm_term=.6a8c7baf45d0"&gt;illicit&lt;/a&gt; cash reserves. But it was derailed by shoddy implementation, left citizens in Asia’s third-largest economy without &lt;a href="https://www.washingtonpost.com/world/panic-anger-and-scramble-to-stash-cash-amid-indias-black-money-squeeze/2016/11/10/32cb222a-565a-4c6f-8d40-59257c042109_story.html?utm_term=.6316c5fcb192"&gt;cash&lt;/a&gt; for weeks, slowed &lt;a href="https://www.washingtonpost.com/world/indias-currency-crisis-is-stalling-small-industries-and-sending-workers-home/2016/12/24/5a2d3aea-c7b2-11e6-acda-59924caa2450_story.html?utm_term=.ad60424e45f2"&gt;manufacturing&lt;/a&gt; and sent workers home, and is now likely to significantly affect the  country’s economic growth this year, economists say. It was acutely  painful for a country where 80 percent of transactions were conducted  with cash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modi quickly responded by turning the adversity into a call for Indians to kick their overwhelming dependence on &lt;a href="https://www.washingtonpost.com/world/asia_pacific/indians-like-to-pay-cash-the-government-is-now-forcing-them-to-swipe-cards/2016/12/16/58a5a42c-c0a6-11e6-b527-949c5893595e_story.html"&gt;cash&lt;/a&gt; and opt for digital payments overnight. The Bhim app is just one of  many available. But in this leap, experts say, security concerns are  being overlooked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The new payment apps and e-wallet companies are governed by India’s  outdated information technology law of 2008 and central bank guidelines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“India  urgently needs a new digital payment law that regulates all these  mobile payment apps that have sprung up overnight,” said Pavan Duggal, a  cyber-law expert. “We are right now in a completely uncharted and  unsupervised territory legally. The norms for wallet companies are  undefined. If I lose my money due to a fraud, I can go round and round  in circles with no remedy.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The central bank recently issued  guidelines asking payment banks to carry out security audits, but Duggal  said “there is no penalty or punishment for noncompliance.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  problem is compounded by the fact that education about security risks  online is abysmally sparse, especially in India’s small towns and  villages. Indians are complacent about cyber risks in their online  behavior, according to the Norton Cyber Security Insights &lt;a href="http://indianexpress.com/article/technology/tech-news-technology/indian-users-complacent-when-it-comes-to-cyber-security-norton-report/"&gt;Report&lt;/a&gt;. India does not have a privacy law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India reported more than 39,000 incidents of cyberattacks in the first nine months of 2016, &lt;a href="http://164.100.47.190/loksabhaquestions/annex/10/AS16.pdf"&gt;according&lt;/a&gt; to the government, including phishing, scanning and probing, website  intrusions, defacements, virus and malicious code, and denial-of-service  attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The Pentagon got hacked, right? You haven’t closed  down the Pentagon as yet,” said Piyush Goyal, a minister. “These things  will happen, and we have to be one step ahead of the hackers and the  so-called security breaches and continuously improving and improvising  as they do in America or other developed economies.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In October,  top banks had to fix the security codes of about 3.2 million debit cards  in one of the biggest data breaches in India. Some users complained  that their cards had been used in China.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last month, &lt;a href="https://www.washingtonpost.com/news/worldviews/wp/2016/12/12/the-man-hacking-indias-rich-and-powerful-talks-motives-music-drugs-and-next-targets/?utm_term=.33bc426ae67a"&gt;hackers&lt;/a&gt; attacked Twitter and email accounts of prominent politicians and  journalists and defaced the website of the National Security Guard, an  elite commando force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The focus of global hackers has shifted to  India. The cyber risk is a direct fallout of the growth in the number  of digital users,” said Saket Modi, the chief executive of Lucideus  Tech, the firm that conducted the security audit of the government’s  Bhim app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the cash crunch began, the largest private e-wallet company, Paytm, has experienced a 400 percent jump in new downloads.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But only &lt;a href="http://gadgets.ndtv.com/telecom/news/mobile-internet-subscribers-in-india-reached-34265-million-in-march-sinha-863186" shape="rect"&gt;342 million people&lt;/a&gt; access the Internet on their mobile phones. The government has  introduced dial-in service for those who have basic cellphones to make  digital payments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government is airing radio jingles telling  citizens not to share their personal identification numbers and has a  toll-free helpline to teach people how to make online payments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Officials  understand how security worries can be a big dampener in their campaign  to get people to go digital,” said Vinayak Godse, senior director at  the Data Security Council of India, an industry body that advises the  government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But in a trade-off between convenience and security, the central bank recently &lt;a href="http://tech.economictimes.indiatimes.com/news/internet/payment-firms-applaud-rbis-move-to-relax-2-factor-authentication-for-small-value-transactions/55858515"&gt;waived&lt;/a&gt; the mandatory two-factor authentication for transactions less than $30 online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some cybersecurity experts say that Indians are not ready for this step.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  police recently arrested a gang in the eastern state of Jharkhand;  operators were calling people posing as bank executives and tricking  them into sharing their card details. They used the cards to do online  shopping and transferred money into their e-wallet accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“People  are gullible and can be threatened or lured to part with their bank  details easily. We need as many safeguards as we can have,” said  Surendra Kumar, a senior police officer in New Delhi who busted the  gang.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the biggest problem people face is that police in one  state get very little cooperation from those in another state in  digital-crime complaints, said Rakshit Tandon, a cybersecurity expert  who trains police, military members and school students.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Only in  big-ticket frauds will police departments from different states  coordinate their investigations,” Tandon said. “If a person loses a  relatively smaller amount digitally, the case won’t go far. Even though  that amount may mean a lot in that person’s life.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/washington-post-january-14-2017-rama-lakshmi-millions-of-indians-move-from-cash-to-digital-payments'&gt;https://cis-india.org/internet-governance/news/washington-post-january-14-2017-rama-lakshmi-millions-of-indians-move-from-cash-to-digital-payments&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Money</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    

   <dc:date>2017-01-16T02:52:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/research/conferences/conference-blogs/workshop">
    <title>Locating Internets: Histories of the Internet(s) in India — Research Training and Curriculum Workshop: Call for Participation</title>
    <link>https://cis-india.org/research/conferences/conference-blogs/workshop</link>
    <description>
        &lt;b&gt;Deadline for submission: 26th July 2011-06-08;
When: 19th - 22nd August, 2011;
Where: Centre for Environmental Planning and Technology (CEPT) University, Ahmedabad;
Organised by: Centre for Internet and Society, Bangalore and CEPT University, Ahmedabad.
Please Note: Travel support is only available for domestic travel within India.&lt;/b&gt;
        
&lt;p&gt;LOCATING INTERNETS is an innovative, multi-disciplinary, workshop that engages with some of the most crucial debates around Internet and Society within academic scholarship, discourse and practice in India. It explores Where, When, How and What has changed with the emergence of Internet and Digital Technologies in the country. The Internet is not a singular monolithic entity but is articulated in various forms – sometimes materially, through accessing the web; at others, through our experiences; and yet others through imaginations of policy and law. Internets have become a part of our everyday practice, from museums and archives, to school and university programmes, living rooms and public spaces, relationships and our bodily lived realities. It becomes necessary to reconfigure our existing concepts, frameworks and ideas to make sense of the rapidly digitising world around us. The Internet is no longer contained in niche disciplines or specialised everyday practices. LOCATING INTERNETS invites scholars, teachers, researchers, advanced research students and educationalists from any discipline to learn and discuss how to ask new questions and design innovative curricula in their discipline by introducing concepts and ideas from path-breaking research in India.&lt;/p&gt;
&lt;p&gt;Comprised of training, public lectures, open discussion spaces, and hands-on curriculum building exercises, this workshop will introduce the participants to contemporary debates, help them articulate concerns and problems from their own research and practice, and build knowledge clusters to develop innovative and open curricula which can be implemented in interdisciplinary undergraduate spaces in the country. It showcases the research outputs produced by the Centre for Internet and Society’s Researchers @ Work Programme, and brings together nine researchers to talk about alternative histories, processes, and bodies of the Internets, and how they can be integrated into mainstream pedagogic practices and teaching environments.&lt;/p&gt;
&lt;h3&gt;Knowledge Clusters for the Workshop&lt;/h3&gt;
&lt;p&gt;LOCATING INTERNETS is designed innovatively to accommodate for various intellectual and practice based needs of the participants. While the aim is to introduce the participants to a wide interdisciplinary range of scholarship, we also hope to address particular disciplinary and scholarly concerns of the participants. The workshop is further divided into three knowledge clusters which help the participants to focus their energies and ideas in the course of the four days.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Bridging the Gap&lt;/strong&gt;: This workshop seeks to break away from the utopian public discourse of the Internets as a-historical and completely dis-attached from existing technology ecologies in the country. This knowledge cluster intends to produce frameworks that help us contextualize the contemporary internet policy, discourse and practice within larger geo-political and socio-historical flows and continuities in Modern India. The first cluster chartsdifferent pre-histories of the Internets, mapping the continuities and ruptures through philosophy of techno-science, archiving practices, and electronifcation of governments,to develop new technology-society perspectives.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Paradigms of Practice&lt;/strong&gt;:One of the biggest concerns about Internet studies in India and other similar developed contexts is the object oriented approach that looks largely at specific usages, access, infrastructure, etc. However, it is necessary to understand that the Internet is not merely a tool or a gadget. The growth of Internets produces systemic changes at the level of process and thought. The technologies often get appropriated for governance both by the state and the civil society, producing new processes and dissonances which need to be charted. The second cluster looks at certain contemporary processes that the digital and Internet technologies change drastically in order to recalibrate the relationship between the state, the market and the citizen.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Feet on the Ground&lt;/strong&gt;: The third cluster looks at contemporary practices of the Internet to understand the recent histories of movements, activism and cultural practices online. It offers an innovative way of understanding the physical objects and bodies that undergo dramatic transitions as digital technologies become pervasive, persuasive and ubiquitous. It draws upon historical discourse, everyday practices and cultural performances to form new ways of formulating and articulating the shapes and forms of social and cultural structures.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Workshop Outcomes&lt;/h3&gt;
&lt;p&gt;The participants are expected to engage with issue of Internet and it various systemic processes through their own disciplinary interests. Apart from lectures and orientation sessions, the participants will actively work on their own project ideas during the period in groups and will be guided by experts. The final outcome of the workshops would be curriculum for undergraduate and graduate teaching space of various disciplines in the country.&lt;/p&gt;
&lt;h3&gt;Participation Guidelines&lt;/h3&gt;
&lt;p&gt;LOCATING INTERNETS is now accepting submissions from interested participants in the following format:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Name:&lt;/li&gt;&lt;li&gt;Institutional affiliation and title:&lt;/li&gt;&lt;li&gt;Address:&lt;/li&gt;&lt;li&gt;Email address:&lt;/li&gt;&lt;li&gt;Phone number:&lt;/li&gt;&lt;li&gt;A brief resume of work experience (max. 350 words)&lt;/li&gt;&lt;li&gt;Statement of interest (max. 350 words)&lt;/li&gt;&lt;li&gt;Key concerns you want to address in the Internet and Society field (max. 350 words)&lt;/li&gt;&lt;li&gt;Identification with one Knowledge-cluster of the workshop and a proposal for integrating it in your research/teaching practice (max. 500 words)&lt;/li&gt;&lt;li&gt;Current interface with technologies in your pedagogic practices (max. 350 words)&lt;/li&gt;&lt;li&gt;Additional information or relevant hyperlinks you might want to add (Max. 10 lines)&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;pre&gt;Notes:&lt;/pre&gt;
&lt;ul&gt;&lt;li&gt;Submissions will be accepted only from participants in India, as attachments in .doc, .docx or .odt formats at &lt;a class="external-link" href="mailto:locatinginternets@cis-india.org"&gt;locatingInternets@cis-india.org&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Submissions made beyond 26th July 2011 may not be considered for participation. &lt;br /&gt;&lt;/li&gt;&lt;li&gt;Submissions will be scrutinized by the organisers and selected participants will be informed by the 30th July 2011, about their participation.&lt;/li&gt;&lt;li&gt;Selected participants will be required to make their own travel arrangements to the workshop. A 2nd A.C. train return fare will be reimbursed to the participants.&amp;nbsp; Shared accommodation and selected meals will be provided at the workshop.&lt;/li&gt;&lt;li&gt;A limited number of air-fare reimbursements will be available to participants in extraordinary circumstances. All travel support is only available for domestic travel in the country.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Chairs&lt;/strong&gt;: Nishant Shah, Director-Research, Centre for Internet and Society Bangalore;&lt;/p&gt;
&lt;p&gt;Pratyush Shankar, Associate Professor &amp;amp; Head of Undergraduate Program, Faculty of Architecture, CEPT University&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Supported by&lt;/strong&gt;: Kusuma Foundation, Hyderabad&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Experts&lt;/strong&gt;:Anja Kovacs, Arun Menon, Asha Achuthan, Ashish Rajadhykasha, Aparna Balachandran, Namita Malhotra, Nithin Manayath, Nithya Vasudevan, Pratyush Shankar, Rochelle Pinto and Zainab Bawa&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/research/conferences/conference-blogs/workshop'&gt;https://cis-india.org/research/conferences/conference-blogs/workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Development</dc:subject>
    
    
        <dc:subject>Gaming</dc:subject>
    
    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>archives</dc:subject>
    
    
        <dc:subject>New Pedagogies</dc:subject>
    
    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>IT Cities</dc:subject>
    

   <dc:date>2011-07-21T06:00:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/letter-to-icann-on-ncsg">
    <title>Letter to ICANN on NCSG</title>
    <link>https://cis-india.org/internet-governance/blog/letter-to-icann-on-ncsg</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society sent the following mail to ICANN regarding their attempt to impose their own charter for a Noncommercial Stakeholder Group (NCSG), instead of accepting the one drafted by the Noncommercial Users Constituency (NCUC).&lt;/b&gt;
        
&lt;p&gt;Dear Sir or Madam,&lt;/p&gt;
&lt;p&gt;Greetings from the Centre for Internet and Society - Bangalore. We are a Bangalore based research and advocacy organisation promoting consumer and citizen rights on the Internet. We currently focus on IPR reform, IPR alternatives and electronic accessibility by the disabled. Please see our website &amp;lt;http://cis-india.org&amp;gt; for more information about us and our activities.&lt;/p&gt;
&lt;p&gt;It has come to our attention that ICANN is imposing the ICANN staff-drafted charter for a Noncommercial Stakeholder Group (NCSG) and ignoring the version drafted by civil society. As you know, the civil society version was drafted using a consensus process and more than 80 international noncommercial organizations, including mine, support it.&lt;/p&gt;
&lt;p&gt;This is an unacceptable situation since the governance structures contained within the NCSG charter determine how effectively noncommercial users can influence policy decisions at ICANN in years to come. On behalf of Internet users in India - I would strongly urge you to reject the staff drafted version of the charter and adopt the version drafted and endorsed by civil society.&lt;/p&gt;
&lt;p&gt;Best wishes,&lt;/p&gt;
&lt;p&gt;Sunil Abraham&lt;br /&gt;Executive Director&lt;br /&gt;Centre for Internet and Society&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/letter-to-icann-on-ncsg'&gt;https://cis-india.org/internet-governance/blog/letter-to-icann-on-ncsg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Digital Pluralism</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    

   <dc:date>2011-08-02T07:41:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/it-act-and-commerce">
    <title>IT Act and Commerce</title>
    <link>https://cis-india.org/internet-governance/blog/it-act-and-commerce</link>
    <description>
        &lt;b&gt;This is a guest post by Rahul Matthan, partner in the law firm Trilegal, and widely regarded as one of the leading experts on information technology law in India.  In this post, Mr. Matthan looks at the provisions in the amended Information Technology Act of interest to commerce, namely electronic signatures and data protection.&lt;/b&gt;
        
&lt;p&gt;This post analyses the amendments brought about to the Information Technology Act, 2000 (“IT Act 2000”) through the recent 2008 amendments (“IT Act 2008”).&lt;/p&gt;
&lt;h2&gt;Definitions&lt;/h2&gt;
&lt;p&gt;The IT Act 2008 has introduced a few additional definitions to the list of definitions originally included in the IT Act 2000. These definitions have either amplified the existing provisions or been introduced in order to address new issues required to be defined in the context of the newly introduced provisions in the statute. Some of the significant definitions have been discussed below:&lt;/p&gt;
&lt;h3&gt;Computer Network&lt;/h3&gt;
&lt;p&gt;The definition of “computer network” has been amended to specifically include the wireless interconnection of computers. While wireless technology did fall within the scope of the IT Act under the rather generic head of “other communication media”, the Amendment Act clarifies the scope of the IT Act by expressly including the term “wireless”.&lt;/p&gt;
&lt;h3&gt;Communication Devices&lt;/h3&gt;
&lt;p&gt;The IT Amendment Bill, 2006, had provided an explanation for “communication devices” under Section 66A. This definition has been moved into the definition section and now applies across all sections of the IT Act 2008. “Communication devices” is defined to mean “a cell phone, personal digital assistance (PDA) device or combination of both or any device used to communicate, send or transmit any text, video, audio or image”.&lt;/p&gt;
&lt;p&gt;There has been case law even under the IT Act that has held mobile phones to fall within the ambit of the IT Act, as a result of which all the provisions of the Act that apply to computers are equally applicable to mobile phones. This amendment only makes that position more explicit.&lt;/p&gt;
&lt;h2&gt;Electronic Signatures&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;One of the major criticisms of the IT Act 2000 was the fact that it was not a technology neutral legislation. This was specifically so in relation to the provisions in the IT Act 2000 relating to the use of digital signatures for the purpose of authentication of electronic records. The statute made specific reference to the use of asymmetric cryptosystem technologies in the context of digital signatures, and, in effect, any authentication method that did not use this technology was not recognised under the IT Act 2000.&lt;/p&gt;
&lt;p&gt;The IT Act 2008 has attempted to make this more technology neutral. In doing so, the attempt has been to bring the law in line with the United Nations Commission on International Trade Law Model Law on Electronic Signatures (“Model Law”).&lt;/p&gt;
&lt;h3&gt;Replacement of Digital Signatures&lt;/h3&gt;
&lt;p&gt;The first significant change in the IT Act 2008 is the replacement of the term “digital signatures” with “electronic signatures” in almost all the provisions in the IT Act 2000. In some provisions, reference continues to be made to digital signatures, but the net effect of the amendments is to treat digital signatures as a subset (or an example of one type) of electronic signatures.&lt;/p&gt;
&lt;p&gt;Electronic signatures have been defined as the authentication of an electronic record using the authentication techniques specified in the 2nd Schedule to the Act, provided they are reliable. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;The reliability criterion has been introduced, very much along the lines of the Model Law. However, the contents of the 2nd Schedule are yet to be stipulated, which means that despite the existence of a reliability standard, the only authentication method available at this point in time is the digital signature regime.&lt;/p&gt;
&lt;h3&gt;Dual Requirement&lt;/h3&gt;
&lt;p&gt;One significant implication of this amendment is the introduction of a dual requirement – to meet the reliability standard as well as to be included in the 2nd Schedule. However, structuring the authentication procedures in this manner offsets the objective tests of neutrality borrowed from the Model Law, since an authentication method may meet the reliability test but will not be deemed to be legally enforceable unless it is notified in the 2nd Schedule.&lt;/p&gt;
&lt;p&gt;Additionally, there will be grounds for challenging electronic signatures that are notified to the 2nd Schedule, if it can be shown that the signature so notified is not reliable under the terms of the reliability criteria. This can act as an impediment to the recognition of electronic signatures by notification.&lt;/p&gt;
&lt;h3&gt;Emphasis on Digital Signatures&lt;/h3&gt;
&lt;p&gt;Another concern is the treatment of digital signatures in the post amendment statute. The IT Act 2008 continues to retain all the provisions relating to digital signatures within the main body of the statute. The term “digital signature” has not been uniformly substituted with “electronic signature” throughout the statute. In certain provisions this leads to a certain amount of absurdity, such as in those relating to representations made as to the issuance, suspension or revocation of digital signature certificates; due to the lack of uniformity, these principles now apply only to digital signatures and not to all types of electronic signatures. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;It would have been preferable if the provisions relating to digital signatures had been moved in their entirety to the 2nd Schedule. Then, digital signatures would have become just another class of electronic signatures listed in the Schedule. By omitting to do this, the authors ensure that digital signature-specific provisions remaining in the main body of the statute challenge the technology neutrality of the statute.&lt;/p&gt;
&lt;h3&gt;Certifying Authorities&lt;/h3&gt;
&lt;p&gt;The IT Act 2008 has made the certifying authority the repository of all electronic signatures issued under the statute. Given that there are, at present, multiple certifying authorities, this provision is impractical. Instead, the statute should have either referred to the Controller of Certifying Authorities or should have been worded to state that each certifying authority would be the repository for all electronic signature certificates issued by it.&lt;/p&gt;
&lt;h3&gt;Impact on Other Statutes&lt;/h3&gt;
&lt;p&gt;Since the enactment of the IT Act 2000, amendments have been carried out in other statutes, relying on the concept of digital signatures. For instance, the Negotiable Instruments Act, 1881, makes the use of a digital signature essential for an electronic cheque.1 While the IT Act 2008 has expanded the scope of the available authentication measures, by introducing the technologically neutral concept of electronic signatures, corresponding amendments in other statutes like the Negotiable Instruments Act, 1881, will need to be carried out, so that they are not limited in their application to digital signatures.&lt;/p&gt;
&lt;h2&gt;Data Protection&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;Prior to the passing of the IT Act 2008, the concept of 'data protection' was not recognised in India. The amendments have now introduced some amount of legal protection for data stored in the electronic medium. This chapter analyses the changes sought to be introduced and their impact on data protection law in India.&lt;/p&gt;
&lt;h3&gt;Data under the IT Act 2000&lt;/h3&gt;
&lt;p&gt;The only provision under the IT Act 2000, which dealt with unauthorised access and damage to data, was Section 43. Under that section, penalties were prescribed in respect of any person who downloads copies or extracts data from a computer system, introduces computer contaminants or computer viruses into a computer system or damages any data residing in a computer system.&lt;/p&gt;
&lt;h3&gt;Data under the IT Act 2008&lt;/h3&gt;
&lt;p&gt;Under the IT Act 2008, far-reaching changes have been made in relation to data. Two sections have been inserted specifically for that purpose – Sections 43-A and 72-A, one dealing with the civil and the other with the criminal remedies in relation to the breach of data related obligations.&lt;/p&gt;
&lt;h3&gt;The Civil Remedies for Data Protection&lt;/h3&gt;
&lt;p&gt;The newly introduced Section 43-A reads as follows:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Compensation for failure to protect data - Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation, to the person so affected.&lt;/p&gt;
&lt;p&gt; Explanation - For the purposes of this section:&lt;/p&gt;
&lt;p&gt; (i)&amp;nbsp; “Body Corporate” means any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities;&lt;/p&gt;
&lt;p&gt;(ii) “Reasonable Security Practices and Procedures” means security practices and procedures designed to protect such information from unauthorised access, damage, use, modification, disclosure or impairment, as may be specified in an agreement between the parties or as may be specified in any law for the time being in force and in the absence of such agreement or any law, such reasonable security practices and procedures, as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit; and&lt;/p&gt;
&lt;p&gt;(iii)&amp;nbsp; “Sensitive Personal Data or Information” means such personal information as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;While at first this provision appears to address several long standing concerns relating to data protection in India, there are several insidious flaws that could affect the development of a data protection jurisprudence in the country.&lt;/p&gt;
&lt;h3&gt;Non-Electronic Data&lt;/h3&gt;
&lt;p&gt;In the first instance, there is no mention, under this provision, of non-electronic data. Most international data protection statutes recognise and protect data stored in any electronic medium or a relevant filing system (including, for instance, a salesperson's diary). The newly introduced provisions of the IT Act 2008 do not provide any protection for data stored in a non-electronic medium.&lt;/p&gt;
&lt;p&gt;It could be argued that given the legislative focus of this statute (it has been called the Information Technology Act with a reason), it would be inappropriate to include within this statute protection for forms of data that do not relate to the digital or electronic medium. While that argument is valid to many who look to the new provisions introduced in the IT Act 2008 as the answer to the data protection concerns that the country has been facing all these years, their enthusiasm must be tempered as these new provisions merely provide solutions for electronic data.&lt;/p&gt;
&lt;h3&gt;Classification of Data&lt;/h3&gt;
&lt;p&gt;Most international data protection statutes distinguish between different levels of personal data – specifying difference levels of protection for personal information and sensitive personal information. Depending on whether the data can be classified as one or the other, they have different levels of protection, as loss, unauthorised access or disclosure of sensitive personal information is considered to have a deeper impact on the data subject. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;The new provisions of the IT Act 2008 make no such distinction. Section 43-A applies to all “sensitive personal data or information” but does not specify how personal data not deemed to be sensitive is to be treated. In essence, personal information and sensitive personal information do not appear to be differentially treated in the context of data protection.&lt;/p&gt;
&lt;h3&gt;Consequences&lt;/h3&gt;
&lt;p&gt;Under most international data protection statutes, the person in “control” of the data is liable for the consequences of disclosure, loss or unauthorised access to such information. This ensures that liability is restricted to those who actually have the ability to control the manner in which the data is treated. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;However, under the new provisions of the IT Act 2008, the mere possession of information and its subsequent misuse would render any person who possesses this data liable to damages. While there is likely to be a debate on what constitutes possession and how this differs from control, there can be little doubt that by referring to “possession” in addition to “operation” and “control”, the IT Act 2008 appears to have widened the net considerably.&lt;/p&gt;
&lt;h3&gt;Negligence in Implementing Security Practices&lt;/h3&gt;
&lt;p&gt;Section 43-A specifically places liability on a body corporate only if such body corporate has been negligent in implementing its security practices and procedures in relation to the data possessed, controlled or handled by it. The choice of language here is significant. The statute specifically refers to the term “negligence” in relation to the security practices and procedures as opposed to stipulating a clear, pass-fail type obligation to conform.&lt;/p&gt;
&lt;p&gt;There is a significant difference between the terms “negligence to implement” and “failure to implement”. The former can only result in a breach if the body corporate that was required to follow reasonable security practices with regard to the data in its possession or control does not perform the required action and it can be proved that a reasonable man in the same circumstances would have performed the required action. If a body corporate is to be made liable under the provisions of this Section, it is not enough to demonstrate that security procedures were not followed; it has to be proved in addition that the body corporate was negligent.&lt;/p&gt;
&lt;h3&gt;Wrongful Loss and Gain&lt;/h3&gt;
&lt;p&gt;The Section appears to have been constructed on the basis that a breach has occurred in the event that any “wrongful gain” or “wrongful loss” was suffered. These terms have not been defined either under statutes or through any judicial precedents in the civil context. However, these terms do have a definition under criminal law in India. The Indian Penal Code, 1860 (“IPC”), defines “Wrongful Gain” to mean gain, by unlawful means, of property to which the person gaining is not legally entitled; and “Wrongful Loss” to mean the loss by unlawful means of property to which the person losing it is legally entitled.&lt;/p&gt;
&lt;p&gt;There does not appear to be any greater significance in the use of these terms even though they are typically found in criminal statutes. Therefore, apart from the slight ambiguity as to purpose, their use in the IT Act does not appear to have any great significance.&lt;/p&gt;
&lt;h3&gt;Limitation on Liability&lt;/h3&gt;
&lt;p&gt;The provisions of Section 43 originally had the total liability for a breach capped at Rs. 5,00,00,000 (five crore rupees). The original text of Section 43-A had the same limitation of liability in respect of its data protection provisions. Before the bill was passed into law, this limitation was removed and now a breach of Section 43-A is not subject to any limitation of liabilities.&lt;/p&gt;
&lt;h3&gt;Reasonable Security Practices and Procedures&lt;/h3&gt;
&lt;p&gt;Section 43-A makes a reference to “reasonable security practices and procedures” and stipulates that a breach has been caused only if such practices and procedures have not been followed. There are three methods by which reasonable security practices and procedures can be established:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt; By agreement;&lt;/li&gt;&lt;li&gt;By law; and&lt;/li&gt;&lt;li&gt;By prescription by the Central Government.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;As there is no law in India which sets out an appropriate definition for the term and since it will be some time before which the Central Government comes out with necessary regulations, it would appear that the only option available is for the parties to arrive at an agreement as to how the sensitive personal data and information exchanged under their contract is to be handled.&lt;/p&gt;
&lt;p&gt;As a corollary, till such time as the government establishes the necessary rules in relation to these security practices and procedures, if a body corporate does not enter into an agreement with the person providing the information as to the reasonable security practices and procedures that would apply, the body corporate cannot be brought within the purview of this section for any loss or damage to data.&lt;/p&gt;
&lt;h3&gt;The Criminal Remedies for Unlawful Disclosure of Information&lt;/h3&gt;
&lt;p&gt;In addition to the civil remedies spelled out in such detail in Section 43-A, the newly introduced provisions of Section 72-A of the IT Act 2008 could be used to impose criminal sanctions against any person who discloses information in breach of a contract for services. While not exactly a data protection provision in the same way that Section 43-A is, there are enough similarities in purpose to achieve the same result.&lt;/p&gt;
&lt;p&gt;Section 72-A reads:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt; Punishment for Disclosure of information in breach of lawful contract - Save as otherwise provided in this Act or any other law for the time being in force, any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses, without the consent of the person concerned, or in breach of a lawful contract, such&amp;nbsp; material to any other person shall be punished with imprisonment for a term which may extend to three years, or with a fine which may extend to Rupees five lakh, or with both.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In substance, this provision appears to be focused on providing criminal remedies in the context of breach of confidentiality obligations under service contracts; given that the section specifically refers to the disclosure of personal information obtained under that service contract, it is fair to classify this as a provision that addresses data protection issues.&lt;/p&gt;
&lt;h3&gt;Personal Information&lt;/h3&gt;
&lt;p&gt;The IT Act 2008 does not define “personal information”. Equally, there are no judicial precedents that provide any clarity on the term. The Right to Information Act, 2005 does provide a definition for “personal information”, but that definition is inappropriate in the context of the IT Act 2008. In the absence of a useable definition for the term “personal information”, it becomes difficult to assess the scope and ambit of the provision and in particular to understand the extent to which it is enforceable.&lt;/p&gt;
&lt;h3&gt;"Willful"&lt;/h3&gt;
&lt;p&gt;The section would only apply to persons who willfully disclose personal information and cause wrongful loss or gain. Hence, in order to make a person liable it has to be proved that the person disclosing the personal information did so with an intention to cause wrongful loss or gain. It would be a valid defense to claim that any loss caused was unintentional.&lt;/p&gt;
&lt;h3&gt;Service Contracts&lt;/h3&gt;
&lt;p&gt;The section appears to be particular about the fact that it only applies in the context of personal information obtained under a contract for services. This appears to rule out confidential information (that is not of a personal nature) that has been received under any other form of agreement (including, for example, a technology license agreement). The section is clearly intended to protect against the misuse of personal information and cannot be adapted to provide a wider level of protection against all breaches of confidential information. That said, employers now have a much stronger weapon against employees who leave with the personal records of other fellow employees.&lt;/p&gt;
&lt;h3&gt;Consent&lt;/h3&gt;
&lt;p&gt;This section also clearly applies only to those disclosures of personal information with the intent to cause wrongful loss or gain which have taken place without the consent of the person whose personal information is being disclosed. What remains to be seen is how the law will deal with situations where a general consent for disclosures has been obtained at the time of recruitment.&lt;/p&gt;
&lt;p&gt;Such clauses are made effective around the world by including opt in and opt out clauses, to allow the employee to either expressly agree to the disclosure of his personal information or to specifically exclude himself from the ambit of any such disclosures.&lt;/p&gt;
&lt;h3&gt;Media of Material&lt;/h3&gt;
&lt;p&gt;This section, unlike several other provisions of the IT Act 2008, deals with all manner of materials without requiring them to be digital. However, while disclosure of information stored in the non-electronic medium has been recognised, in the absence of a clear definition of personal information, it is difficult to ascertain the application and enforcement of this section.&lt;/p&gt;
&lt;h3&gt;What’s Missing&lt;/h3&gt;
&lt;p&gt;In order to be a truly effective data protection statute, the IT Act 2008 must include provisions relating to the collection, circumstances of collection, control, utilisation and proper disposal of data. At present the statute is silent about these aspects. In many ways, the statute addresses the particular concerns of companies or corporate entities looking for protection in relation to data outsourced to any other corporate entity for processing. Within these specific parameters the statute works well. However it does little to protect the average citizen of the country from the theft of personal data. Until we have statutory recognition of these issues, we will not be able to say that we have an effective data protection law in India.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/it-act-and-commerce'&gt;https://cis-india.org/internet-governance/blog/it-act-and-commerce&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Authentication</dc:subject>
    
    
        <dc:subject>Security</dc:subject>
    

   <dc:date>2011-08-02T07:41:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/directions-cyber-digital-europe-arindrajit-basu-september-16-2022-getting-the-digital-indo-pacific-economic-framework-right">
    <title>Getting the (Digital) Indo-Pacific Economic Framework Right</title>
    <link>https://cis-india.org/internet-governance/blog/directions-cyber-digital-europe-arindrajit-basu-september-16-2022-getting-the-digital-indo-pacific-economic-framework-right</link>
    <description>
        &lt;b&gt;On the eve of the Tokyo Quad Summit in May 2022, President Biden unveiled the Indo-Pacific Economic Framework (IPEF), visualising cooperation across the Indo-Pacific based on four pillars: trade; supply chains; clean energy, decarbonisation and infrastructure; and tax and anti-corruption. Galvanised by the US, the other 13 founding members of the IPEF are Australia, Brunei Darussalam, India, Indonesia, Japan, Republic of Korea, Malaysia, New Zealand, Philippines, Singapore, Thailand and Vietnam. The first official in-person Ministerial meeting was held in Los Angeles on 9 September 2022.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="https://directionsblog.eu/getting-the-digital-indo-pacific-economic-framework-right/"&gt;originally published in Directions&lt;/a&gt; on 16 September 2022.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;It is still early days. Given the broad and noncommittal scope of the &lt;a href="http://indiamediamonitor.in/ViewImg.aspx?rfW3mQFhdxZsqXnJzK5Xi5+XYlnW6zXnPDF3Ad56Y/KdgI1zvICzrodtLI85MPKdVO1fIh79GUlPfyXY2/bE2g==" rel="noreferrer noopener" target="_blank"&gt;economic arrangement&lt;/a&gt;, it is unlikely that the IPEF will lead to a trade deal among members in the short run. Instead, experts believe that this new arrangement is designed to serve as a ‘&lt;a href="https://indianexpress.com/article/opinion/columns/building-on-common-ground-7963518/" rel="noreferrer noopener" target="_blank"&gt;framework or starting point&lt;/a&gt;’ for members to cooperate on geo-economic issues relevant to the Indo-Pacific, buoyed in no small part by the United States’ desire to make up lost ground and counter Chinese economic influence in the region.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;United States Trade Representative (USTR) Katherine Tai has underscored the relevance of the Indo-Pacific digital economy to the US agenda with the IPEF. She has emphasized the &lt;a href="https://www.whitehouse.gov/briefing-room/press-briefings/2022/05/23/on-the-record-press-call-on-the-launch-of-the-indo-pacific-economic-framework/" rel="noreferrer noopener" target="_blank"&gt;importance of&lt;/a&gt; collaboratively addressing key connectivity and technology challenges, including standards on cross-border data flows, data localisation and online privacy, as well as the discriminatory and unethical use of artificial intelligence. This is an ambitious agenda given the divergence among members in terms of technological advancement, domestic policy preferences and international negotiating stances at digital trade forums. There is a significant risk that imposing external standards or values on this evolving and politically-contested digital economy landscape will not work, and may even undermine the core potential of the IPEF in the Indo-Pacific. This post evaluates the domestic policy preferences and strategic interests of the Framework’s member states, and how the IPEF can navigate key points of divergence in order to achieve meaningful outcomes.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;State of domestic digital policy among IPEF members&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Data localisation is a core point of divergence in global digital policymaking. It continues to dominate discourse and trigger dissent at all &lt;a href="https://www.ikigailaw.com/the-data-localization-debate-in-international-trade-law/#acceptLicense" rel="noreferrer noopener" target="_blank"&gt;international trade forums&lt;/a&gt;, including the World Trade Organization. IPEF members have a range of domestic mandates restricting cross-border flows, which vary in scope, format and rigidity (see table below)&lt;strong&gt;. &lt;/strong&gt;Most countries only have a conditional data localisation requirement, meaning data can only be transferred to countries where it is accorded an equivalent level of protection – unless the individual whose data is being transferred consents to said transfer. &lt;a href="https://www.lexology.com/library/detail.aspx?g=ee977f2e-ecfb-45cf-9f63-186a78a49512#:~:text=Australia%20has%20no%20broad%20data,transferred%20or%20processed%20outside%20Australia." rel="noreferrer noopener" target="_blank"&gt;Australia &lt;/a&gt;and the &lt;a href="https://www.acq.osd.mil/dpap/pdi/docs/FAQs_Network_Penetration_Reporting_and_Contracting_for_Cloud_Services_(01-27-2017).pdf" rel="noreferrer noopener" target="_blank"&gt;United States&lt;/a&gt; have sectoral localisation requirements for health and defence data respectively. India presently has multiple sectoral data localisation requirements. In particular, a 2018 Reserve Bank of India (RBI) &lt;a href="https://www.rbi.org.in/Scripts/NotificationUser.aspx?Id=11244&amp;amp;Mode=0" rel="noreferrer noopener" target="_blank"&gt;directive&lt;/a&gt; imposed strict local storage requirements along with a 24-hour window for foreign processing of payments data generated in India. The RBI imposed a &lt;a href="https://theprint.in/economy/what-is-data-localisation-why-mastercard-amex-diners-club-cant-add-more-customers-in-india/703790/" rel="noreferrer noopener" target="_blank"&gt;moratorium&lt;/a&gt; on the issuance of new cards by several US-based card companies until compliance issues with the data localisation directive were resolved. Furthermore, several iterations of India’s recently &lt;a href="https://www.thehindu.com/sci-tech/technology/internet/explained-why-has-the-government-withdrawn-the-personal-data-protection-bill-2019/article65736155.ece" rel="noreferrer noopener" target="_blank"&gt;withdrawn &lt;/a&gt;Personal Data Protection Bill contained localisation requirements for some categories of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indonesia and Vietnam have &lt;a href="https://thediplomat.com/2020/01/the-retreat-of-the-data-localization-brigade-india-indonesia-and-vietnam/" rel="noreferrer noopener" target="_blank"&gt;diluted&lt;/a&gt; the scopes of their data localisation mandates to apply, respectively, only to companies providing public services and to companies not complying with other local laws. These dilutions may have occurred in response to concerted pushback from foreign technology companies operating in these countries. In addition to sectoral restrictions on the transfer of geospatial data, South Korea&lt;a href="https://carnegieendowment.org/2021/08/17/korean-approach-to-data-localization-pub-85165" rel="noreferrer noopener" target="_blank"&gt; retains &lt;/a&gt;several procedural checks on cross-border flows, including formalities regarding providing notice to individual users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moving onto another issue flagged by USTR Tai, while all IPEF members recognise the right to information privacy at an overarching or constitutional level, the legal and policy contours of data protection are at different stages of evolution in different countries. &lt;a href="https://www.dlapiperdataprotection.com/index.html?t=law&amp;amp;c=JP#:~:text=Personal%20Information%20Protection%20Commission,-Kasumigaseki%20Common%20Gate&amp;amp;text=Japan%20does%20not%20have%20a%20central%20registration%20system.&amp;amp;text=There%20is%20no%20specific%20legal,(eg%20Chief%20Privacy%20Officer)." rel="noreferrer noopener" target="_blank"&gt;Japan&lt;/a&gt;, &lt;a href="https://www.dlapiperdataprotection.com/index.html?t=law&amp;amp;c=KR" rel="noreferrer noopener" target="_blank"&gt;South Korea&lt;/a&gt;, &lt;a href="https://www.pdp.gov.my/jpdpv2/assets/2020/01/Introduction-to-Personal-Data-Protection-in-Malaysia.pdf" rel="noreferrer noopener" target="_blank"&gt;Malaysia&lt;/a&gt;, &lt;a href="https://www.linklaters.com/en/insights/data-protected/data-protected---new-zealand#:~:text=There%20is%20no%20data%20portability%20right%20in%20New%20Zealand.&amp;amp;text=While%20there%20is%20no%20%22right,a%20correction%20to%20that%20information." rel="noreferrer noopener" target="_blank"&gt;New Zealand,&lt;/a&gt; &lt;a href="https://www.privacy.gov.ph/data-privacy-act/#:~:text=%E2%80%93%20(a)%20The%20personal%20information,against%20any%20other%20unlawful%20processing." rel="noreferrer noopener" target="_blank"&gt;Philippines&lt;/a&gt;, &lt;a href="https://www.pdpc.gov.sg/Overview-of-PDPA/The-Legislation/Personal-Data-Protection-Act#:~:text=What%20is%20the%20PDPA%3F,Banking%20Act%20and%20Insurance%20Act." rel="noreferrer noopener" target="_blank"&gt;Singapore&lt;/a&gt; and &lt;a href="https://www.trade.gov/market-intelligence/thailand-personal-data-protection-act#:~:text=The%20legislation%20mandates%20that%20data,1%20million%20in%20criminal%20fines." rel="noreferrer noopener" target="_blank"&gt;Thailand &lt;/a&gt;have data protection frameworks in place. Data protection frameworks in India and Brunei are under consultation. Notably, the US does not have a comprehensive federal framework on data privacy, although there are patchworks of data privacy regulations at both the federal and state levels.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regulation and strategic thinking on artificial intelligence (AI) are also at varying levels of development among IPEF members. India has produced a slew of policy papers on Responsible Artificial Intelligence. The most recent &lt;a href="https://www.niti.gov.in/sites/default/files/2021-08/Part2-Responsible-AI-12082021.pdf" rel="noreferrer noopener" target="_blank"&gt;policy paper&lt;/a&gt; published by NITI AAYOG (the Indian government’s think tank) refers to constitutional values and endorses a risk-based approach to AI regulation, much like that adopted by the EU. The US National Security Commission on Artificial Intelligence (NSCAI), chaired by Google CEO Eric Schmidt, expressed concerns about the US ceding AI leadership ground to China. The NSCAI’s final &lt;a href="https://www.nscai.gov/" rel="noreferrer noopener" target="_blank"&gt;report &lt;/a&gt;emphasised the need for US leadership of a ‘coalition of democracies’ as an alternative to China’s autocratic and control-oriented model. Singapore has also made key strides on trusted AI, launching &lt;a href="https://www.pdpc.gov.sg/news-and-events/announcements/2022/05/launch-of-ai-verify---an-ai-governance-testing-framework-and-toolkit" rel="noreferrer noopener" target="_blank"&gt;A.I. verify&lt;/a&gt; – the world’s first AI Governance Testing Framework for companies that wish to demonstrate their use of responsible AI through a minimum verifiable product.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;IPEF and pipe dreams of digital trade&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some members of the IPEF are signatories to other regional trade agreements. With the exception of Fiji, India and the US, all the IPEF countries are members of the Regional Comprehensive Economic Partnership &lt;a href="https://www.dfat.gov.au/trade/agreements/in-force/rcep#:~:text=RCEP%20entered%20into%20force%20on,Australia%20as%20an%20original%20party." rel="noreferrer noopener" target="_blank"&gt;(RCEP)&lt;/a&gt;, which also includes China. Five IPEF member countries are also members of the &lt;a href="https://www.dfat.gov.au/trade/agreements/in-force/cptpp/comprehensive-and-progressive-agreement-for-trans-pacific-partnership" rel="noreferrer noopener" target="_blank"&gt;Comprehensive and Progressive Trans-Pacific Partnership (CPTPP)&lt;/a&gt; that President Trump backed out of in 2017. Several IPEF members also have bilateral or trilateral trading agreements among themselves, an example being the &lt;a href="https://www.mfat.govt.nz/en/trade/free-trade-agreements/free-trade-agreements-in-force/digital-economy-partnership-agreement-depa/" rel="noreferrer noopener" target="_blank"&gt;Digital Economic Partnership Agreement (DEPA)&lt;/a&gt; between Singapore, New Zealand and Chile.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Pie.png" alt="Pie" class="image-inline" title="Pie" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All these ‘mega-regional’ trading agreements contain provisions on data flows, including prohibitions on domestic legal provisions that mandate local computing facilities or restrict cross-border data transfers. Notably, these agreements also incorporate &lt;a href="https://publications.clpr.org.in/the-philosophy-and-law-of-information-regulation-in-india/chapter/indias-engagement-with-global-trade-regimes-on-cross-border-data-flows/" rel="noreferrer noopener" target="_blank"&gt;exceptions&lt;/a&gt; to these rules. The CPTPP includes within its ambit an exception on the grounds of ‘legitimate public policy objectives’ of the member, while the RCEP incorporates an additional exception for ‘essential security interests’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IPEF members are also spearheading &lt;a href="https://www.hinrichfoundation.com/research/article/wto/can-the-wto-build-consensus-on-digital-trade/" rel="noreferrer noopener" target="_blank"&gt;multilateral efforts &lt;/a&gt;related to the digital economy: Australia, Japan and Singapore are working as convenors of the plurilateral Joint Statement Initiative (JSI) at the World Trade Organization (WTO), which counts 86 WTO members as parties. India (along with South Africa) vehemently &lt;a href="https://docs.wto.org/dol2fe/Pages/SS/directdoc.aspx?filename=q:/WT/GC/W819.pdf&amp;amp;Open=True" rel="noreferrer noopener" target="_blank"&gt;opposes&lt;/a&gt; this plurilateral push on the grounds that the WTO is a multilateral forum functioning on consensus and a plurilateral trade agreement should not be negotiated within the aegis of the WTO. They fear, rightly, that such gambits close out the domestic policy space, especially for evolving digital economy regimes where keen debate and contestation exist among domestic stakeholders. While wary of the implications of the JSI, other IPEF members, such as Indonesia, have cautiously joined the initiative to ensure that they have a voice at the table.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is unlikely that the IPEF will lead to a digital trade arrangement in the short run. Policymaking on issues as complex as the digital economy that must respond to specific social, economic and (geo)political realities cannot be steamrolled through external trade agreements. For instance, after the Los Angeles Ministerial India &lt;a href="https://www.business-standard.com/article/economy-policy/india-opts-out-of-joining-ipef-trade-pillar-to-wait-for-final-contours-122091000344_1.html" rel="noreferrer noopener" target="_blank"&gt;opted out&lt;/a&gt; of the IPEF trade pillar citing both India’s evolving domestic legislative framework on data and privacy as well as a broader lack of consensus among IPEF members on several issues, including digital trade. Commerce Minister Piyush Goyal explained that India would wait for the “&lt;a href="https://pib.gov.in/PressReleasePage.aspx?PRID=1858243" rel="noreferrer noopener" target="_blank"&gt;final contours&lt;/a&gt;” of the digital trade track to emerge before making any commitments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides, brokering a trade agreement through the IPEF runs a risk of redundancy. Already, there exists a ‘&lt;a href="https://www.rieti.go.jp/en/columns/a01_0193.html" rel="noreferrer noopener" target="_blank"&gt;spaghetti bowl’&lt;/a&gt; of regional trading agreements that IPEF members can choose from, in addition to forming bilateral trade ties with each other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is why Washington has been clear about calling the IPEF an ‘&lt;a href="https://theprint.in/diplomacy/india-set-to-join-us-led-indo-pacific-economic-arrangement-next-week-with-aim-to-counter-china/963795/" rel="noreferrer noopener" target="_blank"&gt;economic arrangement&lt;/a&gt;’ and not a trade agreement. Membership does not imply any legal obligations. Rather than duplicating ongoing efforts or setting unrealistic targets, the IPEF is an opportunity for all players to shape conversations, share best practices and reach compromises, which could feed back into ongoing efforts to negotiate trade deals. For example, several members of RCEP have domestic data localisation mandates that do not violate trade deals because the agreement carves out exceptions that legitimise domestic policy decisions. Exchanges on how these exceptions work in future trade agreements could be a part of the IPEF arrangement and nudge states towards framing digital trade negotiations through other channels, including at the WTO. Furthermore, states like Singapore that have launched AI self-governance mechanisms could share best practices on how these mechanisms were developed as well as evaluations of how they have helped policy goals be met. And these exchanges shouldn’t be limited to existing IPEF members. If the forum works well, countries that share strategic interests in the region with IPEF members, including, most notably, the European Union, may also want to get involved and further develop partnerships in the region.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Countering China&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Talking shop on digital trade should certainly not be the only objective of the IPEF. The US has made it clear that they want the message emanating from the IPEF ‘&lt;a href="https://www.business-standard.com/article/international/biden-to-visit-japan-for-quad-summit-to-have-bilateral-meetings-with-modi-122051900128_1.html" rel="noreferrer noopener" target="_blank"&gt;to be heard in Beijing&lt;/a&gt;’. Indeed, the IPEF offers an opportunity for the reassertion of US economic interests in a region where President Trump’s withdrawal from the CPTPP has left a vacuum for China to fill. Accordingly, it is no surprise that the IPEF has representation from several regions of the Indo-Pacific: South Asia, Southeast Asia and the Pacific.&lt;/p&gt;
&lt;p&gt;This should be an urgent policy priority for all IPEF members. Since its initial announcement in 2015, the &lt;a href="https://www.cfr.org/china-digital-silk-road/" rel="noreferrer noopener" target="_blank"&gt;Digital Silk Road (DSR)&lt;/a&gt;, the digital arm of China’s Belt and Road Initiative, has spearheaded &lt;a href="https://www.iiss.org/blogs/research-paper/2021/02/china-digital-silk-road-implications-for-defence-industry" rel="noreferrer noopener" target="_blank"&gt;massive investments&lt;/a&gt; by the Chinese private sector (allegedly under close control of the Chinese state) in e-commerce, fintech, smart cities, data centres, fibre optic cables and telecom networks. This expansion has also happened in the Indo-Pacific, unhampered by China’s aggressive geopolitical posturing in the region through maritime land grabs in the South China Sea. With the exception of &lt;a href="https://www.scmp.com/news/asia/southeast-asia/article/3024479/vietnam-shuns-huawei-it-seeks-build-aseans-first-5g" rel="noreferrer noopener" target="_blank"&gt;Vietnam&lt;/a&gt;, which remains wary of China’s economic expansionism, countries in Southeast Asia welcome Chinese investments, extolling their developmental benefits. Several IPEF members – &lt;a href="https://www.iseas.edu.sg/wp-content/uploads/2022/05/ISEAS_Perspective_2022_57.pdf" rel="noreferrer noopener" target="_blank"&gt;including&lt;/a&gt; Indonesia, Malaysia and Singapore – have associations with Chinese private sector companies, predominantly Huawei and ZTE. A &lt;a href="https://carnegieendowment.org/2022/07/11/localization-and-china-s-tech-success-in-indonesia-pub-87477" rel="noreferrer noopener" target="_blank"&gt;study&lt;/a&gt; evaluating Indonesia’s response to such investments indicates that while they are aware of the risks posed by Chinese infrastructure, their calculus remains unaltered: development and capacity building remain their primary focuses. Furthermore, on the specific question of surveillance, given evidence of other countries such as the US and Australia also using digital infrastructure for surveillance, the threat from China is not perceived as a unique risk.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Setting expectations and approaches&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Still, the risks of excessive dependence on one country for the development of digital infrastructure are well known. While the IPEF cannot realistically expect to displace the DSR, it can be utilised to provide countries with alternatives. This can only be done by issuing carrots rather than sticks. A US narrative extolling ‘digital democracy’ is unlikely to gain traction in a region characterised by a diversity of political systems that is focused on economic and development needs. At the same time, an excessive focus on thorny domestic policy issues – such as data localisation and the pipe dream of yet another mega-regional trade deal – could risk derailing the geo-economic benefits of the IPEF.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead, the IPEF must focus on capacity building, training and private sector investment in infrastructure across the Indo-Pacific. The US must position itself as a geopolitically reliable ally, interested in the overall stability of the digital Indo-Pacific, beyond its own economic or policy preferences. This applies equally to other external actors, like the EU, who may be interested in engaging with or shaping the digital economic landscape in the Indo-Pacific.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Countering Chinese economic influence and complementing security agendas set through other fora – such as the Quadrilateral Security Dialogue – should be the primary objective of the IPEF. It is crucial that unrealistic ambitions seeking convergence on values or domestic policy do not undermine strategic interests and dilute the immense potential of the IPEF in catalysing a more competitive and secure digital Indo-Pacific.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Table: Domestic policy positions on data localisation and data protection&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Table.png/@@images/8e9a5192-5f6c-4666-8d78-e0863111534a.png" alt="Table" class="image-inline" title="Table" /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/directions-cyber-digital-europe-arindrajit-basu-september-16-2022-getting-the-digital-indo-pacific-economic-framework-right'&gt;https://cis-india.org/internet-governance/blog/directions-cyber-digital-europe-arindrajit-basu-september-16-2022-getting-the-digital-indo-pacific-economic-framework-right&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>arindrajit</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    

   <dc:date>2022-10-03T14:56:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/research/grants/digital-natives-with-a-cause/dntweet">
    <title>Fill The Gap: Global Discussion on Digital Natives</title>
    <link>https://cis-india.org/research/grants/digital-natives-with-a-cause/dntweet</link>
    <description>
        &lt;b&gt;More often than not people don't understand the new practices inspired by Internet and digital technologies. As such a series of accusations have been leveled against the Digital Natives.  Educators, policy makers, scholars, and parents have all raised their worries without hearing out from the people they are concerned about. Hivos has initiated an online global discussion about Digital Natives. So, to voice your opinion, start tweeting with us now #DigitalNatives.&lt;/b&gt;
        
&lt;div class="content-view-full"&gt;
&lt;div class="class-event"&gt;
&lt;div class="pagecontent"&gt;
&lt;h2&gt;If you cannot attend Fill The Gap, you can also join us in a global discussion on some of the issues being discussed at #DigitalNatives&lt;br /&gt;&lt;/h2&gt;
&lt;br /&gt;
&lt;p&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Are
you an apolitical consumer, or do you have ambitions?&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.tweetworks.com/groups/view/DigitalNatives" target="_blank"&gt;http://www.tweetworks.com/groups/view/DigitalNatives&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Are
you a little prince or princess, who only wants to talk to like minded people
or are you different?&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.tweetworks.com/groups/view/DigitalNativesPrincess" target="_blank"&gt;http://www.tweetworks.com/groups/view/DigitalNativesPrincess&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;3.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Is
Wikipedia your bible or do you really know something?&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.tweetworks.com/groups/view/DigitalNativesWiki" target="_blank"&gt;http://www.tweetworks.com/groups/view/DigitalNativesWiki&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;4.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Are
you a digital dinosaur? They say you don’t know anything about ICT!&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.tweetworks.com/groups/view/DigitalDinosaur" target="_blank"&gt;http://www.tweetworks.com/groups/view/DigitalDinosaur&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;5.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Why
use the Internet, why don’t you march the streets?&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.tweetworks.com/groups/view/DigitalNativesProtest" target="_blank"&gt;http://www.tweetworks.com/groups/view/DigitalNativesProtest&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;6.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Plans
to change the world? What do you need?&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.tweetworks.com/groups/view/DigitalNativesChanceTheWorld" target="_blank"&gt;http://www.tweetworks.com/groups/view/DigitalNativesChanceTheWorld&lt;/a&gt;&lt;/p&gt;
&lt;br /&gt;If you are in Amsterdam, here is the information you will need to attend the event:&lt;br /&gt;
&lt;h2&gt;Fill the Gap! - 7&lt;/h2&gt;
&lt;h3&gt;
R U Online?&lt;/h3&gt;
&lt;div class="date"&gt;Date: 				15 January 2010 				&amp;nbsp;&lt;/div&gt;
&lt;div class="date"&gt;Time: 									 12.30 											until
					
											17.00 hour&lt;/div&gt;
&lt;div class="date"&gt;Location: Het Sieraad, Postjesweg 1, Amsterdam&lt;/div&gt;
&lt;br /&gt;
			
			&lt;strong&gt;&lt;/strong&gt;The seventh edition of Fill the Gap! is all about the power of youth
and IT in developing countries. How can their skills be strengthened
and put to use for a better world? Hivos, apart from cohosting the
event, will be involving digital natives to hear their stories about
ICT and engagement. 
&lt;br /&gt;
&lt;p&gt;
An Open Space event on the potential of new (mobile) media and youth in
developing countries. For everyone in politics, the profit and the
non-profit sectors who is interested in ICT and international
development cooperation.&lt;/p&gt;
&lt;p&gt;
The use of new (mobile) technology is the most natural thing in the world for the youth of today.&lt;/p&gt;
&lt;p&gt;
Shaped by the digital era and at ease with creativeity, these
innovators use new media to change the world. Just think of the Twitter
revolution in Iran. What can the international development sector learn
from this? How could international development cooperation use the
potential power of youth to tackle development problems?&lt;/p&gt;
&lt;p&gt; The seventh edition of Fill the Gap! is all about the power of
youth and IT in developing countries. How can their skills be
strengthened and put to use for a better world? The kick-off will be
hosted by Jennifer Corriero, co-founder of Taking IT Global: the
international platform for youth and the use of new media for a better
world. Then the floor is open to discuss your own ideas with people
from new media, the business world and the international development
sector during the Open Space sessions. Join in: come to Amsterdam on
Friday January 15th and be inspired during Fill the Gap!&lt;br /&gt;
 &lt;br /&gt; Registration is free. The programme is in English.&lt;/p&gt;
&lt;br /&gt;&lt;a href="http://www.fill-the-gap.nl/Fill_the_gap_7?" target="_blank"&gt;» Fill the Gap&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/research/grants/digital-natives-with-a-cause/dntweet'&gt;https://cis-india.org/research/grants/digital-natives-with-a-cause/dntweet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Agency</dc:subject>
    
    
        <dc:subject>Youth</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>New Pedagogies</dc:subject>
    
    
        <dc:subject>Digital subjectivities</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2010-01-22T10:54:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/indian-express-december-2-2016-fake-narendra-modi-apps-aplenty-but-it-is-up-to-users-to-protect-themselves">
    <title>Fake Narendra Modi apps aplenty, but it’s up to users to protect themselves</title>
    <link>https://cis-india.org/internet-governance/news/indian-express-december-2-2016-fake-narendra-modi-apps-aplenty-but-it-is-up-to-users-to-protect-themselves</link>
    <description>
        &lt;b&gt;The app, hosted on Google Play store, automatically gets excessive permission including full network access and ability to take pictures and videos once downloaded.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/india/this-fake-narendra-modi-app-can-secretly-take-pictures-shoot-videos-using-your-phone-4407400/"&gt;published by Indian Express&lt;/a&gt; on December 2, 2016. Pranesh Prakash was quoted. Also see Nandini Yadav's blog post in &lt;a class="external-link" href="http://www.bgr.in/news/beware-of-the-fake-narendra-modi-app-on-google-play-store/"&gt;BGR&lt;/a&gt; on December 3, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="modi3" class="size-full wp-image-4407413" src="http://images.indianexpress.com/2016/12/modi3.jpeg" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The app, hosted on Google Play store, automatically gets excessive permission including full network access and ability to take pictures and videos once downloaded.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A “&lt;a href="http://indianexpress.com/about/narendra-modi"&gt;Narendra Modi&lt;/a&gt;”  app, purportedly offered by the Government of India, caught the  attention of Internet expert Pranesh Prakash on Thursday as the app  developer was found to be using a Bangladesh-based web host and e-mail  address. Suggesting that this could be the work of a con-artist, Prakash  underlined that granting access to fake apps could lead to security  breach. The app, hosted on &lt;a href="http://indianexpress.com/about/google/"&gt;Google&lt;/a&gt; Play store, automatically gets excessive permission including full  network access and ability to take pictures and videos once downloaded.  The original NaMo, however, only gets access to read, modify and delete  the user’s media files. The “fake” app was downloaded more than 1 lakh  times and has an average rating of 4.4 from over 2,000 reviews. A simple  search on the play store throws up dozens of Narendra Modi apps, some  even calling themselves fake apps. The original app was published by  Narendramodi.in and Government Of India. But there are scores of other  apps trying to imitate the original.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/NMApp.png" alt="Narendra Modi App" class="image-inline" title="Narendra Modi App" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/NMApp.png" alt="Narendra Modi App" class="image-inline" title="Narendra Modi App" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh, who is Policy Director at The Centre for Internet and Society, also questioned how users can differentiate between fake and genuine apps when even the official app was registered using a gmail address. While the Government of India Narendra Modi app has been published using info@narendramodi.press, the one by Narendramodi.in has been published using a simple Gmail app. He also highlighted how the play store was flooded with fake banking apps, with one such “SBI app” gaining full access to the user’s files. Incidentally, the fake Modi Ki Note app which has been in the limelight since the demonetisation on high value notes and issue of new ones itself has many duplicates.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the last two days, the Congress and its vice-president Rahul Gandhi fell victim to hacking as their verified Twitter accounts were compromised. Profane content was shared from both accounts, targeting the Gandhi and his family. This lead to the Congress questioning Prime Minister Narendra Modi’s digital India push as security remains a huge concern.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/indian-express-december-2-2016-fake-narendra-modi-apps-aplenty-but-it-is-up-to-users-to-protect-themselves'&gt;https://cis-india.org/internet-governance/news/indian-express-december-2-2016-fake-narendra-modi-apps-aplenty-but-it-is-up-to-users-to-protect-themselves&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-10T04:24:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
