<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 41 to 55.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/ijlt-shweta-mohandas-and-anamika-kundu-march-6-2022-nothing-to-kid-about-childrens-data-under-the-new-data-protection-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/medianama-february-18-2021-amber-sinha-data-protection-bill-consent-clause-state-function"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/pallavi-bedi-and-shweta-mohandas-cis-comments-on-data-protection-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hindu-arindrajit-basu-february-8-2022-notes-for-india-as-the-digital-trade-juggernaut-rolls-on"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/submission-to-the-facebook-oversight-board-policy-on-cross-checks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/transference-reimagining-data-systems-beyond-the-gender-binary"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/launching-flagship-cis-report-on-private-crypto-assets"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/launching-cis-flagship-report-on-private-crypto-assets"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/panel-discussion-how-to-avoid-digital-id-systems-that-put-people-at-risk"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/facial-recognition-technology-in-india.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hrbdt-and-cis-august-31-2021-facial-recognition-technology-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/june-july-2021-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/economic-and-political-weekly-july-17-2021-amber-sinha-pallavi-bedi-aman-nair-techno-solutionist-responses-to-covid-19"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/march-may-2021-newsletter"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/ijlt-shweta-mohandas-and-anamika-kundu-march-6-2022-nothing-to-kid-about-childrens-data-under-the-new-data-protection-bill">
    <title>Nothing to Kid About – Children's Data Under the New Data Protection Bill</title>
    <link>https://cis-india.org/internet-governance/blog/ijlt-shweta-mohandas-and-anamika-kundu-march-6-2022-nothing-to-kid-about-childrens-data-under-the-new-data-protection-bill</link>
    <description>
        &lt;b&gt;The pandemic has forced policymakers to adapt their approach to people's changing practices, from looking at contactless ways of payment to the shifting of educational institutions online.&lt;/b&gt;
        &lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 iWv3d b+iTF _78FBa _1FoOD iWv3d _1j-51 mm8Nw" style="text-align: justify; "&gt;The article was originally &lt;a class="external-link" href="https://www.ijlt.in/post/nothing-to-kid-about-children-s-data-under-the-new-data-protection-bill"&gt;published in the Indian Journal of Law and Technology&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 iWv3d b+iTF _78FBa _1FoOD iWv3d _1j-51 mm8Nw" style="text-align: justify; "&gt;For children, the internet has shifted from being a form of entertainment to a medium to connect with friends and seek knowledge and education. However, each time they access the internet, data about them and their choices are inadvertently recorded by companies and unknown third parties. The growth of EdTech apps in India has led to growing concerns regarding children's data privacy. This has led to the creation of a &lt;a class="_1lsz7 _3Bkfb" href="https://economictimes.indiatimes.com/tech/startups/edtech-firms-work-to-get-communication-right-with-the-asci/articleshow/89082308.cms" rel="noopener noreferrer" target="_blank"&gt;self-regulatory&lt;/a&gt; body, the Indian EdTech Consortium. More recently, the &lt;a class="_1lsz7 _3Bkfb" href="https://economictimes.indiatimes.com/tech/startups/edtech-firms-work-to-get-communication-right-with-the-asci/articleshow/89082308.cms" rel="noopener noreferrer" target="_blank"&gt;Advertising Standard Council of India&lt;/a&gt;&lt;span class="_3zM-5"&gt; has &lt;/span&gt;also started looking at passing a draft regulation to keep a check on EdTech advertisements.&lt;/p&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 iWv3d b+iTF _78FBa _1FoOD iWv3d _1j-51 mm8Nw" style="text-align: justify; "&gt;The Joint Parliamentary Committee (JPC), tasked with drafting and revising the Data Protection Bill, had to consider the number of changes that had happened after the release of the 2019 version of the Bill. While the most significant change was the removal of the term “personal data” from the title of the Bill, in a move to create a comprehensive Data Protection Bill that includes both personal and non personal data. Certain other provisions of the Bill also featured additions and removals. The JPC, in its revised version of the Bill has removed an entire class of &lt;a class="_1lsz7 _3Bkfb" href="https://prsindia.org/billtrack/the-personal-data-protection-bill-2019#:~:text=Obligations%20of%20data%20fiduciary%3A%20A,specific%2C%20clear%20and%20lawful%20purpose" rel="noopener noreferrer" target="_blank"&gt;data fiduciaries&lt;/a&gt; – guardian data fiduciary – which was tasked with greater responsibility for managing children's data. While the JPC justified the removal of the guardian data fiduciary stating that consent from the guardian of the child is enough to meet the end for which personal data of children are processed by the data fiduciary. While thought has been given to looking at how consent is given by the guardian on behalf of the child, there was no change in the age of children in the Bill. Keeping the age of consent under the Bill as the same as the age of majority to enter into a contract under the 1872 Indian Contract Act – 18 years – reveals the disconnect the law has with the ground reality of how children interact with the internet.&lt;/p&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 iWv3d b+iTF _78FBa _1FoOD iWv3d _1j-51 mm8Nw" style="text-align: justify; "&gt;In the current state of affairs where Indian children are navigating the digital world on their own there is a need to look deeply at the processing of children’s data as well as ways to ensure that children have information about consent and informational privacy. By placing the onus of granting consent on parents, the PDP Bill fails to look at how consent works in a privacy policy–based consent model and how this, in turn, harms children in the long run.&lt;/p&gt;
&lt;h3 class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 iWv3d aujbK _3M0Fe _1FoOD iWv3d _1j-51 mm8Nw"&gt;1. Age of Consent&lt;/h3&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 iWv3d b+iTF _78FBa _1FoOD iWv3d _1j-51 mm8Nw" style="text-align: justify; "&gt;By setting the age of consent as 18 years under the Data Protection Bill, 2021, it brings all individuals under 18 years of age under one umbrella without making a distinction between the internet usage of a 5-year-old child and a 16-year-old teenager. There is a need to look at the current internet usage habits of children and assess whether requiring parental consent is reasonable or even practical. It is also pertinent to note that the law in the offline world does make the distinction between age and maturity. For example, it has been &lt;a class="_1lsz7 _3Bkfb" href="https://cis-india.org/internet-governance/blog/pallavi-bedi-and-shweta-mohandas-cis-comments-on-data-protection-bill" rel="noopener noreferrer" target="_blank"&gt;highlighted&lt;/a&gt; that Section 82 of the Indian Penal Code, read with Section 83, states that any act by a child under the age of 12 years shall not be considered an offence, while the maturity of those aged between 12–18 years will be decided by the court (individuals between the age of 16–18 years can also be tried as adults for heinous crimes). Similarly, child labour laws in the country allow children above the age of 14 years to work in non-hazardous industries, which would qualify them to fall under Section 13 of the Bill, which deals with employee data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;A 2019 &lt;/span&gt;&lt;a class="_1lsz7 _3Bkfb" href="https://reverieinc.com/wp-content/uploads/2020/09/IAMAI-Digital-in-India-2019-Round-2-Report.pdf" rel="noopener noreferrer" target="_blank"&gt;report&lt;/a&gt;&lt;span&gt; suggests that two-thirds of India’s internet users are in the 12–29 years age group, accounting for about 21.5% of the total internet usage in metro cities. With the emergence of cheaper phones equipped with faster processing and low internet data costs, children are no longer passive consumers of the internet. They have social media accounts and use several applications to interact with others and make purchases. There is a need to examine how children and teenagers interact with the internet as well as the practicality of requiring parental consent for the usage of applications.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Most applications that require age data request users to type in their date of birth; it is not difficult for a child to input a suitable date that would make it appear that they are &lt;/span&gt;&lt;a class="_1lsz7 _3Bkfb" href="https://www.theguardian.com/media/2013/jul/26/children-lie-age-facebook-asa" rel="noopener noreferrer" target="_blank"&gt;over 18&lt;/a&gt;&lt;span&gt;. In this case they are still children but the content that will be presented to them would be those that are meant for adults including content that might be disturbing or those involving use of &lt;/span&gt;&lt;a class="_1lsz7 _3Bkfb" href="https://www.theguardian.com/media/2013/jul/26/children-lie-age-facebook-asa" rel="noopener noreferrer" target="_blank"&gt;alcohol and gambling. &lt;/a&gt;&lt;span&gt;Additionally, in their privacy policies, applications sometimes state that they are not suited for and restricted from users under 18. Here, data fiduciaries avoid liability by placing the onus on the user to declare their age and properly read and understand the privacy policy.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Reservations about the age of consent under the Bill have also been highlighted by some members of the JPC through their dissenting opinions. &lt;/span&gt;&lt;a class="_1lsz7 _3Bkfb" href="http://164.100.47.193/lsscommittee/Joint%20Committee%20on%20the%20Personal%20Data%20Protection%20Bill,%202019/17_Joint_Committee_on_the_Personal_Data_Protection_Bill_2019_1.pdf#page=221" rel="noopener noreferrer" target="_blank"&gt;MP Ritesh Pandey &lt;/a&gt;&lt;span&gt;suggested that the age of consent should be reduced to 14 years keeping the best interest of the children in mind as well as to support children in benefiting from technological advances. Similarly, &lt;/span&gt;&lt;a class="_1lsz7 _3Bkfb" href="http://164.100.47.193/lsscommittee/Joint%20Committee%20on%20the%20Personal%20Data%20Protection%20Bill,%202019/17_Joint_Committee_on_the_Personal_Data_Protection_Bill_2019_1.pdf#page=221" rel="noopener noreferrer" target="_blank"&gt;MP Manish Tiwari &lt;/a&gt;&lt;span&gt;in his dissenting opinion suggested regulating data fiduciaries based on the type of content they provide or data they collect.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;2. How is the 2021 Bill Different from the 2019 Bill?&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The &lt;/span&gt;&lt;a class="_1lsz7 _3Bkfb" href="http://164.100.47.4/BillsTexts/LSBillTexts/Asintroduced/373_2019_LS_Eng.pdf" rel="noopener noreferrer" target="_blank"&gt;2019 &lt;/a&gt;&lt;span&gt;draft of the Bill consisted of a class of data fiduciaries called guardian data fiduciaries – entities that operate commercial websites or online services directed at children or which process large volumes of children’s personal data. This class of fiduciaries was barred from profiling, tracking, behavioural monitoring, and running targeted advertising directed at children and undertaking any other processing of personal data that can cause significant harm to the child. In the previous draft, such data fiduciaries were not allowed to engage in ‘profiling, tracking, behavioural monitoring of children, or direct targeted advertising at children’. There was also a prohibition on conducting any activities that might significantly harm the child. As per Chapter IV, any violation could attract a penalty of up to INR 15 crore of the worldwide turnover of the data fiduciary for the preceding financial year, whichever is higher. However, this separate class of data fiduciaries do not have any additional responsibilities. It is also unclear as to whether a data fiduciary that does not by definition fall within such a category would be allowed to engage in activities that could cause ‘significant harm’ to children.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The new Bill also does not provide any mechanisms for age verification and only lays down considerations that verification processes should be undertaken. Furthermore, the JPC has suggested that consent options available to the child when they attain the age of majority i.e. 18 years should be included within the rule frame by the Data Protection Authority instead of being an amendment in the Bill.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;3. In the Absence of a Guardian Data Fiduciary&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The 2018 and 2019 drafts of the PDP Bill consider a child to be any person below the age of 18 years. For a child to access online services, the data fiduciary must first verify the age of the child and obtain consent from their guardian. The Bill does not provide an explicit process for age verification apart from stating that regulations shall be drafted in this regard. The 2019 Bill states that the Data Protection Authority shall specify codes of practice in this matter. Taking best practices into account, there is a need for ‘&lt;/span&gt;&lt;a class="_1lsz7 _3Bkfb" href="https://cuts-ccier.org/pdf/project-brief-highlighting-inclusive-and-practical-mechanisms-to-protect-childrens-data.pdf" rel="noopener noreferrer" target="_blank"&gt;user-friendly and privacy-protecting age verification techniques&lt;/a&gt;&lt;span&gt;’ to encourage safe navigation across the internet. This will require &lt;/span&gt;&lt;a class="_1lsz7 _3Bkfb" href="https://cuts-ccier.org/pdf/bp-global-technological-developments-in-age-verification-and-age-estimation.pdf" rel="noopener noreferrer" target="_blank"&gt;looking at &lt;/a&gt;&lt;span&gt;technological developments and different standards worldwide. There is a need to hold companies &lt;/span&gt;&lt;a class="_1lsz7 _3Bkfb" href="https://www.livemint.com/opinion/columns/theres-a-better-way-to-protect-the-online-privacy-of-kids-11615306723478.html" rel="noopener noreferrer" target="_blank"&gt;accountable&lt;/a&gt;&lt;span&gt; for the protection of children’s online privacy and the harm that their algorithms cause children and to make sure that they are not continued.&lt;/span&gt;&lt;/p&gt;
&lt;p class="public-DraftStyleDefault-text-ltr fixed-tab-size public-DraftStyleDefault-block-depth0 iWv3d b+iTF _78FBa _1FoOD iWv3d _1j-51 mm8Nw" style="text-align: justify; "&gt;The JPC in the 2021 version of the Bill removed provisions about guardian data fiduciaries, stating that there was no advantage in creating a different class of data fiduciary. As per the JPC, even those data fiduciaries that did not fall within the said classification would also need to comply with rules pertaining to the personal data of children i.e. with Section 16 of the Bill. Section 16 of the Bill requires the data fiduciary to verify the child’s age and obtain consent from the parent/guardian. The manner of age verification has also een spelt out.  Furthermore, since ‘significant data fiduciaries’ is an existing class, there is still a need to comply with rules related to data processing. The JPC also removed the phrase “in the best interests of, the child” and “is in the best interests of, the child” under sub-clause 16(1), implying that the entire Bill concerned the rights of the data principal and the use of such terms dilutes the purpose of the legislation and could give way to manipulation by the data fiduciary.&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Conclusion&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Over the past two years, there has been a significant increase in applications that are targeted at children. There has been a proliferation of EduTech apps, which ideally should have more responsibility as they are processing children's data. We recommend that instead of creating a separate category, such fiduciaries collecting children's data or providing services to children be seen as ‘significant data fiduciaries’ that need to take up additional compliance measures.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Furthermore, any blanket prohibition on tracking children may obstruct safety measures that could be implemented by data fiduciaries. These fears are also increasing in other jurisdictions as there is a likelihood to restrict data fiduciaries from using software that looks out for such as &lt;/span&gt;&lt;a class="_1lsz7 _3Bkfb" href="https://www.unodc.org/e4j/en/cybercrime/module-12/key-issues/online-child-sexual-exploitation-and-abuse.html" rel="noopener noreferrer" target="_blank"&gt;Child Sexual Abuse Material&lt;/a&gt;&lt;span&gt; as well as  online predatory behaviour. Additionally, concerning the age of consent under the Bill, the JPC could look at international best practices and come up with ways to make sure that children can use the internet and have rights over their data, which would enable them to grow up with more awareness about data protection and privacy. One such example to look at could be the Children's Online Privacy Protection Rule (COPPA) in the US, where the rules apply to operators of websites and online services that collect personal information from kids &lt;/span&gt;&lt;a class="_1lsz7 _3Bkfb" href="https://www.ftc.gov/tips-advice/business-center/guidance/childrens-online-privacy-protection-rule-six-step-compliance" rel="noopener noreferrer" target="_blank"&gt;under 13 &lt;/a&gt;&lt;span&gt;or provide services to children that are directed at a general audience, but have actual knowledge that they collect personal information from such children. A form of combination of this system and the significant data fiduciary classification could be one possible way to ensure that children’s data and privacy are preserved online.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The authors are researchers at the Centre for Internet and Society and thank their colleague Arindrajit Basu for his inputs.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/ijlt-shweta-mohandas-and-anamika-kundu-march-6-2022-nothing-to-kid-about-childrens-data-under-the-new-data-protection-bill'&gt;https://cis-india.org/internet-governance/blog/ijlt-shweta-mohandas-and-anamika-kundu-march-6-2022-nothing-to-kid-about-childrens-data-under-the-new-data-protection-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas and Anamika Kundu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digitalisation</dc:subject>
    
    
        <dc:subject>Digital Knowledge</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Data Management</dc:subject>
    

   <dc:date>2022-03-10T13:19:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study">
    <title>Clause 12 Of The Data Protection Bill And Digital Healthcare: A Case Study</title>
    <link>https://cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study</link>
    <description>
        &lt;b&gt;In light of the state’s emerging digital healthcare apparatus, how does Clause 12 alter the consent and purpose limitation model?&lt;/b&gt;
        &lt;p&gt;The blog post was &lt;a class="external-link" href="https://www.medianama.com/2022/02/223-data-protection-bill-digital-healthcare-case-study/"&gt;published in Medianama&lt;/a&gt; on February 21, 2022. This is the second in a two-part series by Amber Sinha.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the &lt;a href="https://www.medianama.com/2022/02/223-data-protection-bill-consent-clause-state-function/"&gt;previous post&lt;/a&gt;, I looked at provisions on non-consensual data processing for state functions under the most recent version of recommendations by the Joint Parliamentary Committee on India’s Data Protection Bill (DPB). The true impact of these provisions can only be appreciated in light of ongoing policy developments and real-life implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To appreciate the significance of the dilutions in Clause 12, let us consider the Indian state’s range of schemes promoting digital healthcare. In July 2018, NITI Aayog, a central government policy think tank in India released a strategy and approach paper (Strategy Paper) on the formulation of the National Health Stack which envisions the creation of a federated application programming interface (API)-enabled health information ecosystem. While the Ministry of Health and Family Welfare has focused on the creation of Electronic Health Records (EHR) Standards for India during the last few years and also identified a contractor for the creation of a centralised health information platform (IHIP), this Strategy Paper advocates a completely different approach, which is described as a Personal Health Records (PHR) framework. In 2021, the National Digital Health Mission (NDHM) was launched under which a citizen shall have the option to obtain a digital health ID. A digital health ID is a unique ID and will carry all health records of a person.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;A Stack Model for Big Data Ecosystem in Healthcare&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A stack model as envisaged in the Strategy Paper, consists of several layers of open APIs connected to each other, often tied together by a unique health identifier. The open nature of APIs has the advantage that it allows public and private actors to build solutions on top of it, which are interoperable with all parts of the stack. It is however worth considering both the ‘openness’ and the role that the state plays in it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even though the APIs are themselves open, they are a part of a pre-decided technological paradigm, built by private actors and blessed by the state. Even though innovators can build on it, the options available to them are limited by the information architecture created by the stack model. When such a technological paradigm is created for healthcare reform and health data, the stack model poses additional challenges. By tying the stack model to the unique identity, without appropriate processes in place for access control, siloed information, and encrypted communication, the stack model poses tremendous privacy and security concerns. The broad language under Clause 12 of the DPB needs to be looked at in this context.&lt;/p&gt;
&lt;p&gt;Clause 12 allows non-consensual processing of personal data where it is necessary “for the performance of any function of the state authorised by law” in order to provide a service or benefit from the State. In the previous post, I had highlighted the import of the use of only ‘necessity’ to the exclusion of ‘proportionality’. Now, we need to consider its significance in light of the emerging digital healthcare apparatus being created by the state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The National Health Stack and National Digital Health Mission together envision an intricate system of data collection and exchange which in a regulatory vacuum would ensure unfettered access to sensitive healthcare data for both the state and private actors registered with the platforms. The Stack framework relies on repositories where data may be accessed from multiple nodes within the system. Importantly, the Strategy Paper also envisions health data fiduciaries to facilitate consent-driven interaction between entities that generate the health data and entities that want to consume the health records for delivering services to the individual. The cast of characters involve the National Health Authority, health care providers and insurers who access the National Health Electronic Registries, unified data from different programmes such as National Health Resource Repository (NHRR), NIN database, NIC and the Registry of Hospitals in Network of Insurance (ROHINI), private actors such as Swasth, iSpirt who assist the Mission as volunteers. The currency that government and private actors are interested in is data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The promised benefits of healthcare data in an anonymised and aggregate form range from Disease Surveillance to Pharmacovigilance as well as Health Schemes Management Systems and Nutrition Management, benefits which have only been more acutely emphasised during the pandemic. However, the pandemic has also normalised the sharing of sensitive healthcare data with a variety of actors, without much thinking on much-needed data minimisation practises.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The potential misuses of healthcare data include greater state surveillance and control, predatory and discriminatory practices by private actors which rely on Clause 12 to do away with even the pretense of informed consent so long as the processing of data is deemed necessary by the state and its private sector partners to provide any service or benefit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Subclause (e) in Clause 12, which was added in the last version of the Bill drafted by MeitY and has been retained by the JPC, allows processing wherever it is necessary for ‘any measures’ to provide medical treatment or health services during an epidemic, outbreak or threat to public health. Yet again, the overly-broad language used here is designed to ensure that any annoyances of informed consent can be easily brushed aside wherever the state intends to take any measures under any scheme related to public health.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Effectively, how does the framework under Clause 12 alter the consent and purpose limitation model? Data protection laws introduce an element of control by tying purpose limitation to consent. Individuals provide consent to specified purposes, and data processors are required to respect that choice. Where there is no consent, the purposes of data processing are sought to be limited by the necessity principle in Clause 12. The state (or authorised parties) must be able to demonstrate necessity to the exercise of state function, and data must only be processed for those purposes which flow out of this necessity. However, unlike the consent model, this provides an opportunity to keep reinventing purposes for different state functions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the absence of a data protection law, data collected by one agency is shared indiscriminately with other agencies and used for multiple purposes beyond the purpose for which it was collected. The consent and purpose limitation model would have addressed this issue. But, by having a low threshold for non-consensual processing under Clause 12, this form of data processing is effectively being legitimised.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study'&gt;https://cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2022-03-01T15:07:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/medianama-february-18-2021-amber-sinha-data-protection-bill-consent-clause-state-function">
    <title>How Function Of State May Limit Informed Consent: Examining Clause 12 Of The Data Protection Bill</title>
    <link>https://cis-india.org/internet-governance/blog/medianama-february-18-2021-amber-sinha-data-protection-bill-consent-clause-state-function</link>
    <description>
        &lt;b&gt;The collective implication of leaving out ‘proportionality’ from Clause 12 is to provide very wide discretionary powers to the state.&lt;/b&gt;
        &lt;p&gt;The blog post was &lt;a class="external-link" href="https://www.medianama.com/2022/02/223-data-protection-bill-consent-clause-state-function/"&gt;published in Medianama&lt;/a&gt; on February 18, 2022. This is the first of a two-part series by Amber Sinha.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In 2018, hours after the Committee of Experts led by Justice Srikrishna Committee released their report and draft bill, I wrote &lt;a href="https://www.livemint.com/Opinion/zY8NPWoWWZw8AfI5JQhjmL/Draft-privacy-bill-and-its-loopholes.html"&gt;an opinion piece&lt;/a&gt; providing my quick take on what was good and bad about the bill. A section of my analysis focused on Clause 12 (then Clause 13) which provides for non-consensual processing of personal data for state functions. I called this provision a ‘carte-blanche’ which effectively allowed the state to process a citizen’s data for practically all interactions between them without having to deal with the inconvenience of seeking consent. My former colleague, Pranesh Prakash &lt;a href="https://twitter.com/pranesh/status/1023116679440621568"&gt;pointed out&lt;/a&gt; that this was not a correct interpretation of the provision as I had missed the significance of the word ‘necessary’ which was inserted to act as a check on the powers of the state. He also pointed out, correctly, that in its construction, this provision is equivalent to the position in European General Data Protection Regulation (Article 6 (i) (e)), and is perhaps even more restrictive.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While I agree with what Pranesh says above (his claims are largely factual, and there can be no basis for disagreement), my view of Clause 12 has not changed. While Clause 35 has been a focus of considerable discourse and analysis, for good reason, I continue to believe that Clause 12 remains among the most dangerous provisions of this bill, and I will try to unpack here, why.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Data Protection Bill 2021 has a chapter on the grounds for processing personal data, and one of those grounds is consent by the individual. The rest of the grounds deal with various situations in which personal data can be processed without seeking consent from the individual. Clause 12 lays down one of the grounds. It allows the state to process data without the consent of the individual in the following cases —&lt;/p&gt;
&lt;p&gt;a)  where it is necessary to respond to a medical emergency&lt;br /&gt;b)  where it is necessary for state to provide a service or benefit to the individual&lt;br /&gt;c)  where it is necessary for the state to issue any certification, licence or permit&lt;br /&gt;d)  where it is necessary under any central or state legislation, or to comply with a judicial order&lt;br /&gt;e)  where it is necessary for any measures during an epidemic, outbreak or public health&lt;br /&gt;f)  where it is necessary for safety procedures during disaster or breakdown of public order&lt;/p&gt;
&lt;p&gt;In order to carry out (b) and (c), there is also the added requirement that the state function must be authorised by law.&lt;/p&gt;
&lt;h2&gt;Twin restrictions in Clause 12&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The use of the words ‘necessary’ and ‘authorised by law’ is intended to pose checks on the powers of the state. The first restriction seeks to limit actions to only those cases where the processing of personal data would be necessary for the exercise of the state function. This should mean that if the state function can be exercised without non-consensual processing of personal data, then it must be done so. Therefore, while acting under this provision, the state should only process my data if it needs to do so, to provide me with the service or benefit. The second restriction means that this would apply to only those state functions which are authorised by law, meaning only those functions which are supported by validly enacted legislation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What we need to keep in mind regarding Clause 12 is that the requirement of ‘authorised by law’ does not mean that legislation must provide for that specific kind of data processing. It simply means that the larger state function must have legal backing. The danger is how these provisions may be used with broad mandates. If the activity in question is non-consensual collection and processing of, say, demographic data of citizens to create state resident hubs which will assist in the provision of services such as healthcare, housing, and other welfare functions; all that may be required is that the welfare functions are authorised by law.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Scope of privacy under Puttaswamy&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It would be worthwhile, at this point, to delve into the nature of restrictions that the landmark Puttaswamy judgement discussed that the state can impose on privacy. The judgement clearly identifies the principles of informed consent and purpose limitation as central to informational privacy. As discussed repeatedly during the course of the hearings and in the judgement, privacy, like any other fundamental right, is not absolute. However, restrictions on the right must be reasonable in nature. In the case of Clause 12, the restrictions on privacy in the form of denial of informed consent need to be tested against a constitutional standard. In Puttaswamy, the bench ​was ​not ​required ​to ​provide ​a ​legal ​test ​to ​determine ​the ​extent ​and ​scope ​of the ​right ​to ​privacy, but they do provide sufficient ​guidance ​for ​us ​to ​contemplate ​how ​the ​limits ​and ​scope ​of ​the ​constitutional ​right ​to ​privacy ​could ​be ​determined ​in ​future ​cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Puttaswamy judgement clearly states that “the right to privacy is protected as an intrinsic part of the right to life and personal liberty under Article 21 and as a part of the freedoms guaranteed by Part III of the Constitution.” By locating the right not just in Article 21 but also in the entirety of Part III, the bench clearly requires that “the drill of various Articles to which the right relates must be scrupulously followed.” This means that where transgressions on privacy relate to different provisions in Part III, the different tests under those provisions will apply along with those in Article 21. For instance, where the restrictions relate to personal freedoms, the tests under both Article 19 (right to freedoms) and Article 21 (right to life and liberty) will apply.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case of Clause 12, the three tests laid down by Justice Chandrachud are most operative —&lt;br /&gt;a) the existence of a “law”&lt;br /&gt;b) a “legitimate State interest”&lt;br /&gt;c) the requirement of “proportionality”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first test is already reflected in the use of the phrase ‘authorised by law’ in Clause 12. The test under Article 21 would imply that the function of the state should not merely be authorised by law, but that the law, in both its substance and procedure, must be ‘fair, just and reasonable.’ The next test is that of ‘legitimate state interest’. In its report, the Joint Parliamentary Committee places emphasis on Justice Chandrachud’s use of “allocation of resources for human development” in an illustrative list of legitimate state interests. The report claims that the ground, functions of the state, thus satisfies the legitimate state interest. We do not dispute this claim.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Proportionality and Clause 12&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It is the final test of ‘proportionality’ articulated by the Puttaswamy judgement, which is most operative in this context. Unlike Clauses 42 and 43 which include the twin tests of necessity and proportionality, the committee has chosen to only employ one ground in Clause 12. Proportionality is a commonly employed ground in European jurisprudence and common law countries such as Canada and South Africa, and it is also an integral part of Indian jurisprudence. As commonly understood, the proportionality test consists of three parts —&lt;/p&gt;
&lt;p&gt;a)  the limiting measures must be carefully designed, or rationally connected, to the objective&lt;br /&gt;b)  they must impair the right as little as possible&lt;br /&gt;c)  the effects of the limiting measures must not be so severe on individual or group rights that the legitimate state interest, albeit important, is outweighed by the abridgement of rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first test is similar to the test of proximity under Article 19. The test of ‘necessity’ in Clause 12 must be viewed in this context. It must be remembered that the test of necessity is not limited to only situations where it may not be possible to obtain consent while providing benefits. My reservations with the sufficiency of this standard stem from observations made in the report, as well as the relatively small amount of jurisprudence on this term in Indian law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Srikrishna Report interestingly mentions three kinds of scenarios where consent should not be required — where it is not appropriate, necessary, or relevant for processing. The report goes on to give an example of inappropriateness. In cases where data is being gathered to provide welfare services, there is an imbalance in power between the citizen and the state. Having made that observation, the committee inexplicably arrives at a conclusion that the response to this problem is to further erode the power available to citizens by removing the need for consent altogether under Clause 12. There is limited jurisprudence on the standard of ‘necessity’ under Indian law. The Supreme Court has articulated this test as ‘having reasonable relation to the object the legislation has in view.’ If we look elsewhere for guidance on how to read ‘necessity’, the ECHR in Handyside v United Kingdom held it to be neither “synonymous with indispensable” nor does it have the “flexibility of such expressions as admissible, ordinary, useful, reasonable or desirable.” In short, there must be a pressing social need to satisfy this ground.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the other two tests of proportionality do not find a mention in Clause 12 at all. There is no requirement of ‘narrow tailoring’, that the scope of non-consensual processing must impair the right as little as possible. It is doubly unfortunate that this test does not find a place, as unlike necessity, ‘narrow tailoring’ is a test well understood in Indian law. This means that while there is a requirement to show that processing personal data was necessary to provide a service or benefit, there is no requirement to process data in a way that there is minimal non-consensual processing. The fear is that as long as there is a reasonable relation between processing data and the object of the function of state, state authorities and other bodies authorised by it, do not need to bother with obtaining consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the third test of proportionality is also not represented in this provision. It provides a test between the abridgement of individual rights and legitimate state interest in question, and it requires that the first must not outweigh the second. The absence of the proportionality test leaves Clause 12 devoid of any such consideration. Therefore, as long as the test of necessity is met under this law, it need not evaluate the denial of consent against the service or benefit that is being provided.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The collective implication of leaving out ‘proportionality’ from Clause 12 is to provide very wide discretionary powers to the state, by setting the threshold to circumvent informed consent extremely low. In the next post, I will demonstrate the ease with which Clause 12 can allow indiscriminate data sharing by focusing on the Indian government’s digital healthcare schemes.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/medianama-february-18-2021-amber-sinha-data-protection-bill-consent-clause-state-function'&gt;https://cis-india.org/internet-governance/blog/medianama-february-18-2021-amber-sinha-data-protection-bill-consent-clause-state-function&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2022-03-01T14:56:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/pallavi-bedi-and-shweta-mohandas-cis-comments-on-data-protection-bill">
    <title>CIS Comments and Recommendations on the Data Protection Bill, 2021</title>
    <link>https://cis-india.org/internet-governance/blog/pallavi-bedi-and-shweta-mohandas-cis-comments-on-data-protection-bill</link>
    <description>
        &lt;b&gt;This document is a revised version of the comments we provided on the 2019 Bill on 20 February 2020, with updates based on the amendments in the 2021 Bill.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;After nearly two years of deliberations and a few changes in its composition, the Joint Parliamentary Committee (JPC), on 17 December 2021, submitted its report on the Personal Data Protection Bill, 2019  (2019 Bill). The report also contains a new version of the law titled the Data Protection Bill, 2021 (2021 Bill). Although there were no major revisions from the previous version other than the inclusion of all data under the ambit of the bill, some provisions were amended.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This document is a revised version of the&lt;a href="https://cis-india.org/accessibility/blog/cis-comments-pdp-bill-2019"&gt; comments&lt;/a&gt; we provided on the 2019 Bill on 20 February 2020, with updates based on the amendments in the 2021 Bill. Through this document we aim to shed light on the issues that we highlighted in our previous comments that have not yet been addressed, along with additional comments on sections that have become more relevant since the pandemic began. In several instances our previous comments have either not been addressed or only partially been addressed; in such instances, we reiterate them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These general comments should be read in conjunction with our previous recommendations for the reader to get a comprehensive overview of what has changed from the previous version and what has remained the same. This document can also be read while referencing the new Data Protection Bill 2021 and the JPC’s report to understand some of the significant provisions of the bill.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;a href="https://cis-india.org/internet-governance/general-comments-data-protection-bill.pdf" class="internal-link"&gt;Read on to access the comments&lt;/a&gt; | &lt;/strong&gt;&lt;span&gt;Review and editing by Arindrajit Basu. Copy editing: The Clean Copy; Shared under Creative Commons Attribution 4.0 International license&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/pallavi-bedi-and-shweta-mohandas-cis-comments-on-data-protection-bill'&gt;https://cis-india.org/internet-governance/blog/pallavi-bedi-and-shweta-mohandas-cis-comments-on-data-protection-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pallavi Bedi and Shweta Mohandas</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2022-02-14T16:07:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hindu-arindrajit-basu-february-8-2022-notes-for-india-as-the-digital-trade-juggernaut-rolls-on">
    <title>Notes for India as the digital trade juggernaut rolls on</title>
    <link>https://cis-india.org/internet-governance/blog/the-hindu-arindrajit-basu-february-8-2022-notes-for-india-as-the-digital-trade-juggernaut-rolls-on</link>
    <description>
        &lt;b&gt;Sitting out trade negotiations could result in the country losing out on opportunities to shape the rules.&lt;/b&gt;
        &lt;p&gt;The article by Arindrajit Basu was &lt;a class="external-link" href="https://www.thehindu.com/opinion/op-ed/notes-for-india-as-the-digital-trade-juggernaut-rolls-on/article38393921.ece"&gt;published in the Hindu&lt;/a&gt; on February 8, 2022&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Despite the cancellation of the Twelfth Ministerial Conference (MC12) of the World Trade Organization (WTO) late last year (scheduled date, November 30, 2021-December 3, 2021) due to COVID-19, digital trade negotiations continue their ambitious march forward. On December 14, Australia, Japan, and Singapore, co-convenors of the plurilateral Joint Statement Initiative (JSI) on e-commerce, welcomed the ‘substantial progress’ made at the talks over the past three years and stated that they expected a convergence on more issues by the end of 2022.&lt;/p&gt;
&lt;h3&gt;Holding out&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;But  therein lies the rub: even though JSI members account for over 90% of  global trade, and the initiative welcomes newer entrants, over half of  WTO members (largely from the developing world) continue to opt out of  these negotiations. They fear being arm-twisted into accepting global  rules that could etiolate domestic policymaking and economic growth.  India and South Africa have led the resistance and been the JSI’s most  vocal critics. India has thus far resisted pressures from the developed  world to jump onto the JSI bandwagon, largely through coherent legal  argumentation against the JSI and a long-term developmental vision. Yet,  given the increasingly fragmented global trading landscape and the  rising importance of the global digital economy, can India tailor its  engagement with the WTO to better accommodate its economic and  geopolitical interests?&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Global rules on digital trade&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  WTO emerged in a largely analogue world in 1994. It was only at the  Second Ministerial Conference (1998) that members agreed on core rules  for e-commerce regulation. A temporary moratorium was imposed on customs  duties relating to the electronic transmission of goods and services.  This moratorium has been renewed continuously, to consistent opposition  from India and South Africa. They argue that the moratorium imposes  significant costs on developing countries as they are unable to benefit  from the revenue customs duties would bring.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  members also agreed to set up a work programme on e-commerce across  four issue areas at the General Council: goods, services, intellectual  property, and development. Frustrated by a lack of progress in the two  decades that followed, 70 members brokered the JSI in December 2017 to  initiate exploratory work on the trade-related aspects of e-commerce.  Several countries, including developing countries, signed up in 2019  despite holding contrary views to most JSI members on key issues.  Surprise entrants, China and Indonesia, argued that they sought to shape  the rules from within the initiative rather than sitting on the  sidelines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India  and South Africa have rightly pointed out that the JSI contravenes the  WTO’s consensus-based framework, where every member has a voice and vote  regardless of economic standing. Unlike the General Council Work  Programme, which India and South Africa have attempted to revitalise in  the past year, the JSI does not include all WTO members. For the process  to be legally valid, the initiative must either build consensus or  negotiate a plurilateral agreement outside the aegis of the WTO.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India  and South Africa’s positioning strikes a chord at the heart of the  global trading regime: how to balance the sovereign right of states to  shape domestic policy with international obligations that would enable  them to reap the benefits of a global trading system.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;A contested regime&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There  are several issues upon which the developed and developing worlds  disagree. One such issue concerns international rules relating to the  free flow of data across borders. Several countries, both within and  outside the JSI, have imposed data localisation mandates that compel  corporations to store and process data within territorial borders. This  is a key policy priority for India. Several payment card companies,  including Mastercard and American Express, were prohibited from issuing  new cards for failure to comply with a 2018 financial data localisation  directive from the Reserve Bank of India. The Joint Parliamentary  Committee (JPC) on data protection has recommended stringent  localisation measures for sensitive personal data and critical personal  data in India’s data protection legislation. However, for nations and  industries in the developed world looking to access new digital markets,  these restrictions impose unnecessary compliance costs, thus arguably  hampering innovation and supposedly amounting to unfair protectionism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There  is a similar disagreement regarding domestic laws that mandate the  disclosure of source codes. Developed countries believe that this  hampers innovation, whereas developing countries believe it is essential  for algorithmic transparency and fairness — which was another key  recommendation of the JPC report in December 2021.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;India’s choices&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India’s  global position is reinforced through narrative building by political  and industrial leaders alike. Data sovereignty is championed as a means  of resisting ‘data colonialism’, the exploitative economic practices and  intensive lobbying of Silicon Valley companies. Policymaking for  India’s digital economy is at a critical juncture. Surveillance reform,  personal data protection, algorithmic governance, and non-personal data  regulation must be galvanised through evidenced insights,and work for  individuals, communities, and aspiring local businesses — not just  established larger players.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hastily  signing trading obligations could reduce the space available to frame  appropriate policy. But sitting out trade negotiations will mean that  the digital trade juggernaut will continue unchecked, through  mega-regional trading agreements such as the Regional Comprehensive  Economic Partnership (RCEP) and the Comprehensive and Progressive  Agreement for Trans-Pacific Partnership (CPTPP). India could risk  becoming an unwitting standard-taker in an already fragmented trading  regime and lose out on opportunities to shape these rules instead.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Alternatives  exist; negotiations need not mean compromise. For example, exceptions  to digital trade rules, such as ‘legitimate public policy objective’ or  ‘essential security interests’, could be negotiated to preserve  policymaking where needed while still acquiescing to the larger  agreement. Further, any outcome need not be an all-or-nothing  arrangement. Taking a cue from the Digital Economy Partnership Agreement  (DEPA) between Singapore, Chile, and New Zealand, India can push for a  framework where countries can pick and choose modules with which they  wish to comply. These combinations can be amassed incrementally as  emerging economies such as India work through domestic regulations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite  its failings, the WTO plays a critical role in global governance and is  vital to India’s strategic interests. Negotiating without surrendering  domestic policy-making holds the key to India’s digital future.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Arindrajit Basu is Research Lead at the Centre for Internet and Society, India. The views expressed are personal. The author would like to thank The Clean Copy for edits on a draft of this article.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hindu-arindrajit-basu-february-8-2022-notes-for-india-as-the-digital-trade-juggernaut-rolls-on'&gt;https://cis-india.org/internet-governance/blog/the-hindu-arindrajit-basu-february-8-2022-notes-for-india-as-the-digital-trade-juggernaut-rolls-on&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>basu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digitalisation</dc:subject>
    
    
        <dc:subject>Digital Knowledge</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>E-Commerce</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    

   <dc:date>2022-02-09T15:04:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/submission-to-the-facebook-oversight-board-policy-on-cross-checks">
    <title>Submission to the Facebook Oversight Board: Policy on Cross-checks</title>
    <link>https://cis-india.org/internet-governance/blog/submission-to-the-facebook-oversight-board-policy-on-cross-checks</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) submitted public comments to the Facebook Oversight Board on a policy consultation.&lt;/b&gt;
        
&lt;h2&gt;Whether a cross-check system is needed?&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Recommendation for the Board&lt;/strong&gt;: The Board should investigate the cross-check system as part of Meta’s larger problems with algorithmically amplified speech, and how such speech gets moderated.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Explanation&lt;/strong&gt;: The issues surrounding Meta’s cross-check system are not an isolated phenomena, but rather a reflection of the problems of algorithmically amplified speech, as well the lack of transparency in the company’s content moderation processes at large. At the outset, it must be stated that the majority of information on the cross-check system only became available after the media &lt;a href="https://www.wsj.com/articles/facebook-files-xcheck-zuckerberg-elite-rules-11631541353?mod=article_inline"&gt;reports&lt;/a&gt; published by the Wall Street Journal. While these reports have been extensive in documenting various aspects of the system, there is no guarantee that the disclosures obtained by them provides the complete picture regarding the system. Further, given that Meta has been found to purposely mislead the Board and the public on how the cross-check system operates, it is worth investigating the incentives that necessitate the cross-check system in the first place.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Meta claims that the cross-check system works as a check for false positives: they “employ additional reviews for high-visibility content that may violate our policies.” Essentially they want to make sure that content that stays up on the platform and reaches a large audience, is following their content guidelines. However, previous disclosures have &lt;a href="https://www.wsj.com/articles/facebook-hate-speech-india-politics-muslim-hindu-modi-zuckerberg-11597423346"&gt;proven&lt;/a&gt; policy executives have prioritized the company’s ‘business interests’ over removing content that violates their policies; and have &lt;a href="https://www.theguardian.com/technology/2021/apr/12/facebook-fake-engagement-whistleblower-sophie-zhang"&gt;waited to act on known problematic content&lt;/a&gt; until significant external pressure was built up, including in India. In this context, the cross-check system seems less like a measure designed to protect users who might be exposed to problematic content, and more as a measure for managing public perception of the company.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Thus the Board should investigate both how content gains an audience on the platform, and how it gets moderated. Previous &lt;a href="https://www.theguardian.com/technology/2021/apr/12/facebook-fake-engagement-whistleblower-sophie-zhang"&gt;whistleblower disclosures&lt;/a&gt; have shown that the mechanics of algorithmically amplified speech, which prioritizes &lt;a href="https://www.technologyreview.com/2021/03/11/1020600/facebook-responsible-ai-misinformation/"&gt;engagement and growth over safety&lt;/a&gt;, are easily taken advantage of by bad actors to promote their viewpoints through artificially induced virality. The cross-check system and other measures of content moderation at scale would not be needed if it was harder to spread problematic content on the platform in the first place. Instead of focusing only on one specific system, the Board needs to urge Meta to re-evaluate the incentives that drive content sharing on the platform and come up with ways that make the platform safer.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Meta’s Obligations under Human Rights Law&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Recommendation for the Board: &lt;/strong&gt;The Board must consider the cross-check system to be violative of Meta’s obligations under the International Covenant of Civil and Political Rights (ICCPR). Additionally, the cross-check ranker must be incorporated with Meta’s commitments towards human rights, as outlined in its Corporate Human Rights Policy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Explanation: Meta’s content moderation, and by extension, its cross-check system, is bound by both international human rights law as well as the Board’s past decisions. At the outset, The system fails the three-pronged test of legality, legitimacy and necessity and proportionality, as delineated under Article 19(3) of the International Covenant of Civil and Political Rights (ICCPR). Firstly, this system has been “&lt;a href="https://www.wsj.com/articles/facebook-files-xcheck-zuckerberg-elite-rules-11631541353?mod=article_inline"&gt;scattered throughout the company, without clear governance or ownership&lt;/a&gt;”, which violates the legality principle, since there is no clear guidance on what sort of speech, or which classes of users, would deserve the treatment of this system. Secondly, there is no understanding about the legitimacy of aims with which this system had been set up in the first place, beyond Meta’s own assertions, which have been &lt;a href="https://www.oversightboard.com/news/215139350722703-oversight-board-demands-more-transparency-from-facebook/"&gt;countered&lt;/a&gt; by evidence to the contrary. Thirdly, the necessity and proportionality of the restriction has to be &lt;a href="https://www.oversightboard.com/decision/FB-691QAMHJ"&gt;read along&lt;/a&gt; with the &lt;a href="https://www.ohchr.org/en/issues/freedomopinion/articles19-20/pages/index.aspx"&gt;Rabat Plan of Action&lt;/a&gt;, which requires that for a statement to become a criminal offense, a six-pronged test of threshold is to be applied: a) the social and political context, b) the speaker’s position or status in the society, c) intent to incite the audience against a target group, d) content and form of the speech, e) extent of its dissemination and f) likelihood of harm. As news reports have indicated, Meta has been utilizing the cross-check system to privilege speech from influential users, and in the process, have shielded inflammatory, inciting speech that would have otherwise qualified the Rabat threshold. As such, the third requirement is not fulfilled either.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Additionally, Meta’s own &lt;a href="https://about.fb.com/wp-content/uploads/2021/03/Facebooks-Corporate-Human-Rights-Policy.pdf"&gt;Corporate Human Rights Policy&lt;/a&gt; commits to respecting human rights in line with the UN Guiding Principles on Business and Human Rights (UNGPs). Therefore, the cross-check ranker must incorporate these existing commitments to human rights, including:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;The right to freedom of expression:, UN Special Rapporteur on freedom of opinion and expression report &lt;a href="https://ap.ohchr.org/documents/dpage_e.aspx?si=A/HRC/38/35"&gt;A/HRC/38/35&lt;/a&gt; (2018); &lt;a href="https://www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=25729&amp;amp;LangID=E"&gt;Joint Statement of international freedom of expression monitors on COVID-19 (March, 2020)&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;The Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression addresses the regulation of user-generated online content.&lt;/p&gt;
&lt;p&gt;The Joint Statement issued regarding Governmental promotion and protection of access to and free flow of information during the pandemic.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The right to non-discrimination: International Convention on the Elimination of All Forms of Racial Discrimination (&lt;a href="https://www.ohchr.org/EN/ProfessionalInterest/Pages/CERD.aspx"&gt;ICERD&lt;/a&gt;), Articles 1 and 4.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Article 1 of the ICERD defines racial discrimination.&lt;/p&gt;
&lt;p&gt;Article 4 of the ICERD condemns propaganda and organisations that attempt to justify discrimination or are based on the idea of racial supremacism.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Participation in public affairs and the right to vote: ICCPR Article 25.&lt;/li&gt;
&lt;li&gt;The right to remedy: General Comment No. 31, Human Rights Committee (2004) (&lt;a href="https://tbinternet.ohchr.org/_layouts/15/treatybodyexternal/Download.aspx?symbolno=CCPR%2fC%2f21%2fRev.1%2fAdd.13&amp;amp;Lang=en"&gt;General Comment 31&lt;/a&gt;); UNGPs, Principle 22.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The General Comment discusses the nature of the general legal obligation imposed on State Parties to the Covenant.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Guiding Principle 22 states that where business enterprises identify that they have caused or contributed to adverse impacts, they should provide for or cooperate in their remediation through legitimate processes.&lt;/p&gt;
&lt;h2&gt;Meta’s obligations to avoid political bias and false positives in its cross-check system&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Recommendation for the Board: &lt;/strong&gt;The Board must urge Meta to adopt and implement the Santa Clara Principles on Transparency and Accountability to ensure that it is open about risks to user rights when there is involvement from the State in content moderation. Additionally, the Board must ask Meta to undertake a diversity and human rights audit of its existing policy teams, and commit to regular cultural training for its staff. Finally, the Board must investigate the potential conflicts of interest that arise when Meta’s policy team has any sort of nexus with political parties, and how that might impact content moderation.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Explanation: For the cross-check system to be free from biases, it is important for Meta to come clear to the Board regarding the rationale, standards and processes of the cross check review, and report on the relative error rates of determinations made through cross check compared with ordinary enforcement procedures. It also needs to disclose to the Board in which particular situations it uses the system and in which it does not. Principle 4 under the Foundational Principles of the &lt;a href="https://santaclaraprinciples.org/"&gt;Santa Clara Principles on Transparency and Accountability in Content Moderation&lt;/a&gt; encourage companies to realize the risk to user rights when there is involvement from the State in processes of content moderation and asks companies to makes users aware that: a) a state actor has requested/participated in an action on their content/account, and b) the company believes that the action was needed as per the relevant law. Users should be allowed access to any rules or policies, formal or informal work relationships that the company holds with state actors in terms of content regulation, the process of flagging accounts/content and state requests to action.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Board must consider that erroneous lack of action (false positives) might not always be a system's flaw, but a larger, structural issue regarding how policy teams at Meta functions. As previous disclosures have &lt;a href="https://www.wsj.com/articles/facebook-hate-speech-india-politics-muslim-hindu-modi-zuckerberg-11597423346"&gt;proven&lt;/a&gt;, the contours of what sort of violating content gets to stay up on the platform has been ideologically and politically coloured, as policy executives have prioritized the company’s ‘business interests’ over social harmony. In such light, it is not sufficient to simply propose better transparency and accountability measures for Meta to adopt within its content moderation processes to avoid political bias. Rather, the Board’s recommendations must focus on the structural aspect of the human moderator and policy team that is behind these processes. The Board must ask Meta to a) urgently undertake a diversity and human rights audit of its existing team and its hiring processes, b) commit to regular training to ensure that their policy staffs are culturally literate in the socio-political regions they work in. Further, the Board must seriously investigate the potential &lt;a href="https://time.com/5883993/india-facebook-hate-speech-bjp/"&gt;conflicts of interest&lt;/a&gt; that happen when regional policy teams of Meta, with nexus to political parties, are also tasked with regulating content from representatives of these parties, and how that impacts the moderation processes at large.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Finally, in case decision &lt;a href="https://www.oversightboard.com/decision/FB-691QAMHJ"&gt;2021-001-FB-FBR&lt;/a&gt;, the Board made a number of recommendations to Meta which must be implemented in the current situation, including: a) considering the political context while looking at potential risks, b) employment of specialized staff in content moderation while evaluating political speech from influential users, c) familiarity with the political and linguistic context&amp;nbsp; d) absence of any interference and undue influence, e) public explanation regarding the rules Meta uses when imposing sanctions against influential users and f) the sanctions being time-bound.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Transparency of the cross-check system&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Recommendation for the Board: &lt;/strong&gt;The Board must urge Meta to adopt and implement the Santa Clara Principles on Transparency and Accountability to increase the transparency of its cross-check system.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Explanation: &lt;/strong&gt;There are ways in which Meta can increase the transparency of not only the cross-check system, but the content moderation process in general. The following recommendations draw from &lt;a href="https://santaclaraprinciples.org/"&gt;The Santa Clara Principles&lt;/a&gt; and the Board’s own previous decisions:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Considering Principle 2 of the Santa Clara Principles: Understandable Rules and Policies, Meta should ensure that the policies and rules governing moderation of content and user behaviors on Facebook are&lt;strong&gt; clear, easily understandable, and available in the languages&lt;/strong&gt; in which the user operates.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Drawing from Principle 5 on Integrity and Explainability and from the Board’s recommendations in case decision &lt;a href="https://www.oversightboard.com/decision/FB-691QAMHJ"&gt;2021-001-FB-FBR&lt;/a&gt; which advises Meta to“&lt;em&gt;Provide users with accessible information on how many violations, strikes and penalties have been assessed against them, and the consequences that will follow future violations&lt;/em&gt;”, Meta should be able to &lt;strong&gt;explain the content moderation decisions to users in all cases&lt;/strong&gt;: when under review, when the decision has been made to leave the content up, or take it down. We recommend that Meta keeps a publicly accessible running tally of the number of moderation decisions made on a piece of content till date with their explanations. This would allow third parties (like journalists, activists, researchers and the OSB) to keep Facebook accountable when it does not follow its own policies, as has previously been the case.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the same case decision, the Board has also previously recommended that Meta “&lt;em&gt;Produce more information to help users understand and evaluate the process and criteria for applying the newsworthiness allowance, including how it applies to influential accounts. The company should also clearly explain the rationale, standards and processes of the cross-check review, and report on the relative error rates of determinations made through cross-checking compared with ordinary enforcement procedures.&lt;/em&gt;” Thus, Meta should &lt;strong&gt;publicly explain the cross check system &lt;/strong&gt;in detail with examples, and make public the list of attributes that qualify a piece of content for secondary review.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Operational Principles further provide actionable steps that Meta can take to improve the transparency of their content moderation systems. Drawing from Principle 2: Notice and Principle 3: Appeals, Meta should make a satisfactory &lt;strong&gt;appeals process available &lt;/strong&gt;to users - whether they be decisions to leave up or takedown content. The appeals process should be handled by context aware teams. Meta should then &lt;strong&gt;publish the results&lt;/strong&gt; of the cross check system and the appeals processes as part of their transparency reports including data like total content actioned, rate of success in appeals and cross check process, decisions overturned and preserved etc, which would also satisfy the first Operational Principle: Numbers.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Resources needed to improve the system for users and entities who do not post in English&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Recommendations for the Board: &lt;/strong&gt;The Board must urge Meta to urgently invest in resources to expand Meta’s content moderation services into the local contexts in which the company operates and invest in training data for local languages.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Explanation: &lt;/strong&gt;The cross-check system is not a fundamentally different problem than content moderation. It has been shown time and time again that Meta’s handling of content from non-Western, non-English language contexts is severely lacking. It has been shown how content hosted on the platform has been used to&lt;a href="https://www.theguardian.com/technology/2021/apr/12/facebook-fake-engagement-whistleblower-sophie-zhang"&gt; inflame existing tensions in developing countries&lt;/a&gt;, &lt;a href="https://www.wsj.com/articles/facebook-services-are-used-to-spread-religious-hatred-in-india-internal-documents-show-11635016354?mod=article_inline"&gt;promote religious hatred in India&lt;/a&gt;, &lt;a href="https://www.wsj.com/articles/burn-the-houses-rohingya-survivors-recount-the-day-soldiers-killed-hundreds-1526048545?mod=article_inline"&gt;genocide in Mynmar&lt;/a&gt;, and continue to support &lt;a href="https://www.wsj.com/articles/facebook-drug-cartels-human-traffickers-response-is-weak-documents-11631812953?mod=article_inline"&gt;human traffickers and drug cartels&lt;/a&gt; on the platform even when these issues have been identified.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;There is an urgent need to invest resources to expand Meta’s content moderation services into the local contexts in which the company operates. The company should make all policies and rule documents available in the languages of its users; invest in creating automated tools that are capable of flagging content that is not posted in English; and add people familiar with the local contexts to provide context aware second level reviews. The Facebook Files show that even according to company engineering, &lt;a href="https://www.wsj.com/articles/facebook-ai-enforce-rules-engineers-doubtful-artificial-intelligence-11634338184?mod=article_inline"&gt;automated content moderation&lt;/a&gt; is still not very effective in identifying hate speech and other harmful content. Meta should focus on hiring, training and retaining human moderators who have knowledge of local contexts. Bias training of all content moderators, but especially those who will participate in the second level reviews in the cross check system is also extremely important to ensure acceptable decisions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Additionally, in keeping with Meta’s human rights commitments, the company should develop and publish a policy for responding to human rights violations when they are pointed out by activists, researchers, journalists and employees as a matter of due process. It should not wait for a negative news cycle to stir them into action &lt;a href="https://www.theguardian.com/technology/2021/apr/12/facebook-fake-engagement-whistleblower-sophie-zhang"&gt;as it seems to have done in previous cases&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Benefits and limitations of automated technologies&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Meta &lt;a href="https://www.theverge.com/2020/11/13/21562596/facebook-ai-moderation%5C"&gt;recently changed&lt;/a&gt; its moderation practice wherein it uses technology to prioritize content for human reviewers based on their severity index. Facebook &lt;a href="https://transparency.fb.com/policies/improving/prioritizing-content-review/"&gt;has not specified&lt;/a&gt; the technology it uses to prioritize high-severity content but its research record shows that it &lt;a href="https://ai.facebook.com/blog/the-shift-to-generalized-ai-to-better-identify-violating-content"&gt;uses&lt;/a&gt; a host of automated &lt;a href="https://ai.facebook.com/tools#frameworks-and-tools"&gt;frameworks and tools&lt;/a&gt; to detect violating content, including image recognition tools, object detection tools, natural language processing models, speech models and reasoning models. One such model is the &lt;a href="https://ai.facebook.com/blog/community-standards-report/"&gt;Whole Post Integrity Embeddings&lt;/a&gt; (“WPIE”) which can judge various elements in a given post (caption, comments, OCR, image etc.) to work out the context and the content of the post. Facebook also uses image matching models (SimSearchNet++) that are trained to match variations of an image with a high degree of precision and improved recall; multi-lingual masked language models on cross-lingual understanding such as &lt;a href="https://ai.facebook.com/blog/-xlm-r-state-of-the-art-cross-lingual-understanding-through-self-supervision/"&gt;XLM-R&lt;/a&gt; that can accurately identify hate-speech and other policy-violating content across a wide range of languages. More recently, Facebook introduced its machine translation model called the &lt;a href="https://analyticsindiamag.com/facebooks-new-machine-translation-model-works-without-help-of-english-data/"&gt;M2M-100&lt;/a&gt; whose goal is to perform bidirectional translation between 7000 languages.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Despite the advances in this field, there are inherent &lt;a href="https://www.ofcom.org.uk/__data/assets/pdf_file/0028/157249/cambridge-consultants-ai-content-moderation.pdf"&gt;limitations&lt;/a&gt; of such automated tools. &lt;a href="https://www.theverge.com/2019/2/27/18242724/facebook-moderation-ai-artificial-intelligence-platforms"&gt;Experts&lt;/a&gt; have repeatedly maintained that AI will get better at understanding context but it will not replace human moderators for the foreseeable future. One such instance where these limitations were &lt;a href="https://www.politico.eu/article/facebook-content-moderation-automation/"&gt;exposed&lt;/a&gt; was during the COVID-19 pandemic, when Facebook sent its human moderators home - the number of removals flagged as hate speech on its platform more than doubled to 22.5 million in the second quarter of 2020 but the number of successful content appeals was dropped to 12,600 from the 2.3 million figure for the first three months of 2020.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a href="https://www.wsj.com/articles/facebook-ai-enforce-rules-engineers-doubtful-artificial-intelligence-11634338184?mod=article_inline"&gt;The Facebook Files&lt;/a&gt; show that Meta’s AI cannot consistently identify first-person shooting videos, racist rants and even the difference between cockfighting and car crashes. Its automated systems are only capable of removing posts that generate just 3% to 5% of the views of hate speech on the platform and 0.6% of all content that violates Meta’s policies against violence and incitement. As such, it is difficult to accept the company’s claim that nearly all of the hate speech it takes down was discovered by AI before it was reported by users.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, the benefits of such technology cannot be discounted, especially when one considers automated technology as a way of reducing &lt;a href="https://www.theverge.com/2019/2/25/18229714/cognizant-facebook-content-moderator-interviews-trauma-working-conditions-arizona"&gt;trauma&lt;/a&gt; for human moderators. Using AI for prioritizing content for review can turn out to be effective for human moderators as it can increase their efficiency and reduce harmful effects of content moderation on them. Additionally, it can also limit the exposure of harmful content to internet users. Moreover, AI can also reduce the impact of harmful content on human moderators by allocating content to moderators on the basis of their exposure history. Theoretically, if the company’s claims are to be believed, using automated technology for prioritizing content for review can help to improve the mental health of Facebook’s human moderators.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Click to download the file &lt;a class="external-link" href="https://cis-india.org/internet-governance/policy-on-cross-checks"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/submission-to-the-facebook-oversight-board-policy-on-cross-checks'&gt;https://cis-india.org/internet-governance/blog/submission-to-the-facebook-oversight-board-policy-on-cross-checks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>[in alphabetical order] Anamika Kundu, Digvijay Singh, Divyansha Sehgal and Torsha Sarkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Freedom</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2022-02-09T05:31:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/transference-reimagining-data-systems-beyond-the-gender-binary">
    <title>Transference: Reimagining Data Systems: Beyond the Gender Binary</title>
    <link>https://cis-india.org/internet-governance/events/transference-reimagining-data-systems-beyond-the-gender-binary</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) invites you to participate in a day-long convening on the rights of transgender persons, specifically right to privacy and digital rights. Through this convening, we hope to highlight the concerns of transgender persons in accessing digital data systems and the privacy challenges faced by the community. These challenges include access to their rights — their right to self-identify their gender and welfare services offered by the State and the privacy challenges faced by transgender and intersex persons in revealing their identity.&lt;/b&gt;
        &lt;p dir="ltr" style="text-align: justify; "&gt;As the meaning of the word ‘Transference’ goes, through this convening, as a learning, we hope to capture and transfer the realities of transgender persons with engaging and being a part of digital data systems in India. Given the rapid digitisation of different public and private data systems in India, we hope to initiate a conversation that understands their struggles and challenges to realistically initiate the re-imagination of data systems — digital and otherwise — one that is mindful about their everyday struggles with privacy and access.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Owing to the history of systemic exclusions faced by transgender persons, it is important to highlight their difficulties in accessing technological systems and the impact on their privacy, as central issues that require serious consideration. Presently, their realities seem to be ignored by the State while designing most technology laws and policies governing digital systems.&lt;/p&gt;
&lt;h3 dir="ltr" style="text-align: justify; "&gt;Background&lt;/h3&gt;
&lt;p&gt;&lt;span id="docs-internal-guid-491cb7c5-7fff-049a-e44a-d55b71b690d7"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;In the landmark verdict in 2014, NALSA Vs Union of India, the Supreme Court of India for the first time recognised the right of an individual to self-identify their gender as male, female or transgender. This verdict detailed nine directives to be implemented by the central and state governments in India for the inclusion of transgender persons.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Similarly, 2017 was a watershed moment in India’s constitutional history when the Supreme Court held the right to privacy to be a fundamental right. More importantly, the Court expounded on this right and held that the protection of an individual’s gender identity is an essential component of the right to privacy and that privacy at its core includes the preservation of personal intimacies, autonomy, the sanctity of family life, marriage, procreation, the home and sexual orientation.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;The 2017 privacy judgement led to the Supreme Court pronouncing the &lt;/span&gt;&lt;span&gt;Navtej Johar v Union of India in 2018&lt;/span&gt;&lt;span&gt;, striking down the &lt;/span&gt;&lt;span&gt;Koushal &lt;/span&gt;&lt;span&gt;judgement and decriminalising acts of consensual non-hetrosexual acts of intimacy. In 2019, the Personal Data Protection Bill, 2019 was introduced in Parliament for the regulation and protection of personal data. The PDP Bill classifies data into two categories as (i) personal data; and (ii) sensitive personal data. As per the PDP Bill, data identifying the transgender status and intersex status falls within the ambit of sensitive personal data. Around the time of the PDP Bill being tabled in Parliament, the Transgender Persons (Protection of Rights) Act 2019 was passed by the Parliament despite &lt;/span&gt;&lt;a href="https://scroll.in/article/944943/explainer-despite-criticism-the-transgender-persons-bill-was-just-passed-whats-next"&gt;&lt;span&gt;severe opposition&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to the Bill from civil society members as well as members of Parliament.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;There is a lack of clarity on the interplay between the PDP Bill and the Transgender Act and the challenges the PDP Bill may pose to the transgender community. Moving beyond mere mentions in the definition of the law through a cisgendered heteronormative lens, it is important for the discourse on data and privacy to broaden its scope to realistically include people of different sexual orientations, gender and sexual identities, gender expressions and sex characteristics.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;About the Event&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Through these panel discussions, we propose to highlight the concerns of transgender persons with accessing digital data systems and the privacy challenges faced by them . These challenges include access  to their rights — their right to self-identify their gender and access welfare services offered by the State and the privacy challenges faced by transgender persons in revealing their identity.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The objective of these discussions is to initiate more conversations about the technological and data exclusions faced by this historically marginalised community in India. The intent is to better understand the realities of transgender persons and contribute to the larger advocacy on privacy, intersectionality and (digital) systems design.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Click to register for the event &lt;a class="external-link" href="https://us06web.zoom.us/meeting/register/tZUpcOiqrD8uG9X_4L6EIzXI-QFCipmFqqDV"&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/transference-reimagining-data-systems-beyond-the-gender-binary'&gt;https://cis-india.org/internet-governance/events/transference-reimagining-data-systems-beyond-the-gender-binary&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>torsha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender, Welfare, and Privacy</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2021-12-15T12:58:31Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/launching-flagship-cis-report-on-private-crypto-assets">
    <title>Launching CIS’s Flagship Report on Private Crypto-Assets</title>
    <link>https://cis-india.org/internet-governance/blog/launching-flagship-cis-report-on-private-crypto-assets</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society is launching its flagship report on regulating private crypto-assets in India, as part of its newly formed Financial Technology (or Fintech) research agenda. The event will be held on Zoom, at 17:30 IST on Wednesday, 15th December, 2021
&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This event will serve as a venue to bring together the various stakeholders involved in the crypto-asset space to discuss the state of crypto-asset regulation in India from a multitude of perspectives.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This event will serve as a venue to bring together the various stakeholders involved in the crypto-asset space to discuss the state of crypto-asset regulation in India from a multitude of perspectives.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;About the private crypto-assets report&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The first output under this agenda is our report on regulating private cryptocurrencies in India. This report aims to act as an introductory resource for policymakers who are looking to implement a regulatory framework for private crypto-assets. The report covers the technical elements of crypto-assets, their history, proposed use cases as well as its benefits and limitations. It also examines how crypto-assets fit within India’s current regulatory and legislative frameworks and makes clear recommendations for the same.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;About the Event&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The launch event will feature an initial presentation by researchers at CIS on the various findings and recommendations of its flagship report. This will be followed by a moderated discussion with 5 panelists who represent the space in policy, academia and industry. The discussion will be centered around the current status of crypto-assets in India, the government’s new proposed regulations and what the future holds for the Indian crypto market.&lt;/p&gt;
&lt;p dir="ltr"&gt;The confirmed panelists are as follows:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Tanvi Ratna - Founder, Policy 4.0 and expert on blockchain and cryptocurrencies&lt;/li&gt;
&lt;li&gt;Shehnaz Ahmed - Senior Resident Fellow and Fintech Lead at Vidhi Centre for Legal Policy&lt;/li&gt;
&lt;li&gt;Nithya R. - Chief Executive Officer, Unos.Finace&lt;/li&gt;
&lt;li&gt;Prashanth Irudayaraj - Head of R&amp;amp;D, Zebpay&lt;/li&gt;
&lt;li&gt;Vipul Kharbanda - Non resident Fellow specialising in Fintech at CIS&lt;/li&gt;
&lt;li&gt;Aman Nair - Policy Offer, CIS (Moderator)&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;Registration link: &lt;a class="external-link" href="https://us06web.zoom.us/webinar/register/WN_TdY-EPLoRvGY2rfsq4CENw"&gt;https://us06web.zoom.us/webinar/register/WN_TdY-EPLoRvGY2rfsq4CENw&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Agenda&lt;/h3&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;17.30 - 17.35&lt;/td&gt;
&lt;td&gt;Welcome Note&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.35 - 18.35&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The status of private crypto assets in India&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Presentation on CIS’ flagship Report on regulating private crypto-assets in India&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Moderated discussion with panelists across industry, government, journalism and academia providing their insight as to the current and future state of private crypto-assets, and their regulation, in India.&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18.35 - 19.00&lt;/td&gt;
&lt;td&gt;Audience questions and discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/launching-flagship-cis-report-on-private-crypto-assets'&gt;https://cis-india.org/internet-governance/blog/launching-flagship-cis-report-on-private-crypto-assets&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aman Nair</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cryptocurrencies</dc:subject>
    

   <dc:date>2021-12-13T09:11:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/launching-cis-flagship-report-on-private-crypto-assets">
    <title>Launching CIS’s Flagship Report on Private Crypto-Assets</title>
    <link>https://cis-india.org/internet-governance/events/launching-cis-flagship-report-on-private-crypto-assets</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society is launching its flagship report on regulating private crypto-assets in India, as part of its newly formed Financial Technology (or Fintech) research agenda. This event will serve as a venue to bring together the various stakeholders involved in the crypto-asset space to discuss the state of crypto-asset regulation in India from a multitude of perspectives.&lt;/b&gt;
        &lt;h3&gt;About the private crypto-assets report&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The first output under this agenda is our report on regulating private cryptocurrencies in India. This report aims to act as an introductory resource for policymakers who are looking to implement a regulatory framework for private crypto-assets. The report covers the technical elements of crypto-assets, their history, proposed use cases as well as its benefits and limitations. It also examines how crypto-assets fit within India’s current regulatory and legislative frameworks and makes clear recommendations for the same.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;About the Event&lt;/h3&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The launch event will feature an initial presentation by researchers at CIS on the various findings and recommendations of its flagship report. This will be followed by a moderated discussion with 5 panelists who represent the space in policy, academia and industry. The discussion will be centered around the current status of crypto-assets in India, the government’s new proposed regulations and what the future holds for the Indian crypto market.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The confirmed panelists are as follows:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Tanvi Ratna - Founder, Policy 4.0 and expert on blockchain and cryptocurrencies &lt;/li&gt;
&lt;li&gt;Shehnaz Ahmed - Senior Resident Fellow and Fintech Lead at Vidhi Centre for Legal Policy &lt;/li&gt;
&lt;li&gt;Nithya R. - Chief Executive Officer, Unos.Finace &lt;/li&gt;
&lt;li&gt;Prashanth Irudayaraj - Head of R&amp;amp;D, Zebpay &lt;/li&gt;
&lt;li&gt;Vipul Kharbanda - Non resident Fellow specialising in Fintech at CIS &lt;/li&gt;
&lt;li&gt;Aman Nair - Policy Offer, CIS (Moderator) &lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Registration link: &lt;a class="external-link" href="https://us06web.zoom.us/webinar/register/WN_TdY-EPLoRvGY2rfsq4CENw"&gt;https://us06web.zoom.us/webinar/register/WN_TdY-EPLoRvGY2rfsq4CENw&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Agenda&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;17.30 - 17.35&lt;/td&gt;
&lt;td&gt;Welcome Note&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.35 - 18.35&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The status of private crypto-assets in India&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Presentation on CIS’ flagship Report on regulating private crypto-assets in India&lt;/li&gt;
&lt;li&gt;Moderated discussion with panelists across industry, government, journalism and academia providing their insight as to the current and future state of private crypto-assets, and their regulation, in India.&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18.35 - 19.00&lt;/td&gt;
&lt;td&gt;Audience questions and discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/launching-cis-flagship-report-on-private-crypto-assets'&gt;https://cis-india.org/internet-governance/events/launching-cis-flagship-report-on-private-crypto-assets&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Cryptocurrencies</dc:subject>
    
    
        <dc:subject>Webinar</dc:subject>
    

   <dc:date>2021-12-03T15:16:27Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/panel-discussion-how-to-avoid-digital-id-systems-that-put-people-at-risk">
    <title>Panel discussion on 'How to Avoid Digital ID Systems That Put People at Risk: Lessons from Afghanistan' at Freedom Online Conference</title>
    <link>https://cis-india.org/internet-governance/news/panel-discussion-how-to-avoid-digital-id-systems-that-put-people-at-risk</link>
    <description>
        &lt;b&gt;Amber Sinha participated as a panelist in a panel discussion on How to Avoid Digital ID Systems That Put People at Risk: Lessons from Afghanistan at the Freedom Online Conference yesterday.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Freedom Online Coalition (FOC) was established in 2011 in response to the growing recognition of the importance of the Internet for the enjoyment of human rights. Periodically, the FOC holds a multistakeholder Conference that aims to deepen the discussion on how online freedoms are helping to promote social, cultural and economic development. The ownership of the Conference program and outputs lies with the host country, most often the Chair of the Coalition during that year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The aim of the panel was to use the lessons learned from the Afghanistan case to take a critical and realistic look at the implementation of digital identification programs around the world. A video of the panel can be &lt;a class="external-link" href="https://www.freedomonlineconference.com/session/how-to-avoid-digital-id-systems-that-put-people-at-risk-lessons-from-afghanistan"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/panel-discussion-how-to-avoid-digital-id-systems-that-put-people-at-risk'&gt;https://cis-india.org/internet-governance/news/panel-discussion-how-to-avoid-digital-id-systems-that-put-people-at-risk&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2021-12-03T14:52:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/facial-recognition-technology-in-india.pdf">
    <title>Facial Recognition Technology in India</title>
    <link>https://cis-india.org/internet-governance/facial-recognition-technology-in-india.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/facial-recognition-technology-in-india.pdf'&gt;https://cis-india.org/internet-governance/facial-recognition-technology-in-india.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok, Pallavi Bedi, Aman Nair and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Facial Recognition</dc:subject>
    

   <dc:date>2021-09-02T16:17:44Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hrbdt-and-cis-august-31-2021-facial-recognition-technology-in-india">
    <title>Facial Recognition Technology in India </title>
    <link>https://cis-india.org/internet-governance/blog/hrbdt-and-cis-august-31-2021-facial-recognition-technology-in-india</link>
    <description>
        &lt;b&gt;The Human Rights, Big Data and Technology Project, University of Essex, UK and the Centre for Internet &amp; Society (CIS) have jointly published a research paper on facial recognition technology. Authors, Elonnai Hickok, Pallavi Bedi, Aman Nair and Amber Sinha, examine technological tools such as CCTV and FRT which are increasingly being deployed by the government.&lt;/b&gt;
        &lt;h3&gt;Executive Summary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Over the past two decades there has been a sustained effort at digitising India’s governance structure in order to foster development and innovation. The field of law enforcement and safety has seen significant change in that direction, with technological tools such as Closed Circuit Television (CCTV) and Facial Recognition Technology (FRT) increasingly being deployed by the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yet for all its increased use, there is still a lack of a coherent legal and regulatory framework governing FRT in India. Towards informing such a framework, this paper seeks to document present uses of FRT in India, specifically by  law enforcement agencies and central and state governments, understand the applicability of existing legal frameworks to the use of FRT, and define key areas that need to be addressed when using the technology in India. We also briefly look at how the coverage of FRT has increased beyond law enforcement; it now covers educational institutions, employment purposes, and it is now being used for providing Covid-19 vaccines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We begin by examining use cases of FRT systems by various divisions of central and state governments. In doing so, it becomes apparent that there is a lack of uniform standards or guidelines at either the state or central level - leading to different FRT systems having differing standards of applicability and scope of use.  And while the use of such systems seems to be growing at a rapid rate, questions around their legality persist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is unclear whether the use of FRT is compliant with the fundamental right to privacy as affirmed by the Supreme Court in 2017 in &lt;i&gt;Puttaswamy&lt;/i&gt;. While the right to privacy is not an absolute right, for the state to curtail this right, the restrictions will have to comply with a three-fold requirement— first, being the need for explicit legislative mandate in instances where the government looks to curtail the right. However, the FRT systems we have analysed do not have such a mandate and are often the result of administrative or executive decisions with no legislative blessing or judicial oversight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We further locate the use of FRT technology within the country’s wider legislative, judicial and constitutional frameworks governing surveillance. We also briefly articulate comparative perspectives on the use of  FRT in other jurisdictions. We further analyse the impact of the proposed Personal Data Protection Bill on the deployment of FRT. Finally, we propose a set of recommendations to develop a path forward for the technology’s use which include the need for a comprehensive legal and regulatory framework that governs the use of FRT. Such a framework must take into consideration the necessity of use, proportionality, consent, security, retention, redressal mechanisms, purpose limitation, and other such principles. Since the use of FRT in India is also at a nascent stage, it is imperative that there is greater public research and dialogue into its development and use to ensure that any harms that may arise in the field are mitigated.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Click to download the entire &lt;a href="https://cis-india.org/internet-governance/facial-recognition-technology-in-india.pdf" class="external-link"&gt;research paper here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hrbdt-and-cis-august-31-2021-facial-recognition-technology-in-india'&gt;https://cis-india.org/internet-governance/blog/hrbdt-and-cis-august-31-2021-facial-recognition-technology-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok, Pallavi Bedi, Aman Nair and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Facial Recognition</dc:subject>
    

   <dc:date>2021-09-02T16:21:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/june-july-2021-newsletter">
    <title>June and July Newsletter</title>
    <link>https://cis-india.org/about/newsletters/june-july-2021-newsletter</link>
    <description>
        &lt;b&gt;The newsletter presents the work done in the months of June and July 2021.&lt;/b&gt;
        &lt;h3&gt;Announcements&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We are pleased to announce the launch of a &lt;strong&gt;seminar series&lt;/strong&gt; to showcase research around digital rights and technology policy, with a focus on the Global South. The CIS seminar series will be a venue for researchers to share works-in-progress, exchange ideas, identify avenues for collaboration, and curate research. It will also seek to mitigate the impact of Covid-19 on research exchange, and foster collaborations among researchers and academics from diverse geographies. For more details on the first session, &lt;strong&gt;on Information Disorders&lt;/strong&gt;, and to register, click here: [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/5rYRQ0U6yOrzlX_5e9iqnD_UB7xRMkmO8EVgecX5S9vDUhOLzn5WpJ0OxgmH2vkh7APoOqCGaRVN7fbP4hfGnUPT63lb2O87rMGdk4RE4xpKcYzABQ2MhfjmOr_3FkIJtbxITjKFXrZRVlI-An9WPxyiN-QtsOJjpxV0baaFxLqDmy_TnlrW_FLKnXYXkTNBbxlIifakqN_m9fPpBaaaMJF_KetoeIUtNQIoHYTtcIQhNoelJ8-I28gyVM1-9w61Ew"&gt;link&lt;/a&gt;]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We are also hiring for two full time remote positions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Research Associate: Access to Knowledge Programme: Apply by &lt;strong&gt;August 13&lt;/strong&gt; [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/tn9z7DynIuxWFSSRGmZ50s_HYg65AwLX75HcYf9qBiEJsrkj6teE0WzDGHWCezRU7S0d4Li9WxClerez9wuhwJFHRpki4ynQYqrFoAh7dKnqJKulAW_7VyZIrgxsBri_sYFlGanbqT0IW-9HdYDbVbqyjvgAUl06_OlaHwOMDzO833kR5cT3BwaLUSDOhZqfFvwVNZav-DBH1q9Kr9bWXdtPe_g_wDm-PW3lMxudyF7SKkCLrGceKAec1QiU"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Communication Designer: Apply by &lt;strong&gt;August 20&lt;/strong&gt; [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/lskNSP_MjDCNYOT2PmiuZiGB29gga3crwxuXyJYEF8rdPYDDerNnNYnnCV-GG8rdnyqkxU4eJofgQXU1-iS2IPRRGRRtBXXEaUSVB3mioQNSRwwIecWmm2TIFkfi2fAL7grkxRKKKAX2PG87TiWk8hdmOUqcqtEX9dqbsudTQ3xgmZOio5BOC4GL6mxMzN_9Q5_YzOzZxSZzpT7SMm1J_HASTKNuUktcaESwbMV7PO5sPic41ymaDT8"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Cybersecurity, Privacy, and Emerging Technology&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Following the MCA notification &lt;strong&gt;mandating disclosures of crypto currency&lt;/strong&gt; holdings by companies, Aryan Gupta, in an issue brief, discusses the policy landscape in the United States of America, United Kingdom, and Japan with particular emphasis upon &lt;strong&gt;definition, accounting practices, and taxation, with respect to crypto currencies.&lt;/strong&gt; [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/IapPj_hXCzk7v6Hf21yy36-Sz8hRKHv8zkjWHYoTB7Tu5pnKDAw25QMx5zjerDAadU3BAHF2npDH_q9m81nhsGEbEBQqfWIksFuU7FqAIoREOxap2dkrtGy-X49B1okL_K-zz4zOgG1nyg6ct03r-xSZw_C94Cc8MzubQ2tzmsZjEYGRlxHywlK8a7988SepnX7wbWd2aDt6rhgDNxSBU6AJh3DeygvFctc-wWW9F-Q5e81ADlC9Xei9IoYdHlJrbvOMikdM2WlvJLzb0vnVlDJqd_7x4B7_XdshOYFQ4YRljV4O"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;We submitted comments in response to the Supreme Court E-committee’s draft vision document of &lt;strong&gt;phase III of the E-courts project&lt;/strong&gt;. Aman Nair, Arinjay Vyas, Pallavi Bedi and Garima Saxena submitted their general comments and recommendations, and comparatively analysed the &lt;strong&gt;integration of digital technology into the judiciary in both South Asia and Africa&lt;/strong&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/a-ADiN4WA0-BN9-GzZs_TH-rDZ6m1ii-4HzEzLfXdwVXmGyrIYBcuU7EMPd865oDaqEYSihJoqjxTyuC4usIwryJorATCH47YWEUlUAXce8b2TudJcdAsWryfDvls0WhJFQ9TTw4Bt5ZPfdDmToylNX9ECLuOvO851uSycsDHetWiQhQXaDELUcbQKXBZEbhxtFos2ugg4PHwLXNhwM9iKMb1Q-4OuONy6YcnpFcB3fVUeLvWVp4aBEngQVUnvfLfeVdMvGWNoDk"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Google’s new Privacy Sandbox platform promises to &lt;strong&gt;preserve anonymity when serving tailored advertising&lt;/strong&gt;. But does this new framework help users in any way? Maria Jawed’s analysis reveals that Google’s gambit to &lt;strong&gt;reorient the ad-tech ecosystem under the garb of privacy&lt;/strong&gt;, ultimately ends up undermining it. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/pwRhJ3bFqQSxSMBZ-qNYKO59aoQ95F8ro9x-8vBy2QDQiBpNFb-qLH4I8Ph-o65OT_bJnNcMoJzFBig6nxqFFcT7qtvR0b6bakvkH4pQRJalgbpLCylKEblBaFkiAudZPamJaz7XIeQ3mMQNQcnk9jxhjGW4yu6YFB8-h_G4nYcZg9lJCj35EZMG-bdl79YR6VEUb9jVxmNFoDXuTiUBCHjeSqP8yqPgHS40nzZgSqD7JMoGiSPT6G7K1xwQUBQLKzlCjKGGoaioxOOWS7qw8BrAQtuKIc4xxRvos-IkyJUA0g1W8wUqjNK7NvYR"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Pandemic technology is taking a toll on data privacy, especially in the absence of any legal framework; these tools are being used for purposes beyond managing the pandemic. In an article published in the &lt;i&gt;Deccan Herald&lt;/i&gt;, Aman Nair and Pallavi Bedi argue that &lt;strong&gt;India’s digital response to the pandemic&lt;/strong&gt; has stoked concerns that surveillance could pose threats to the privacy of the personal data collected. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/Aye_SwuSiE165Jg5KCM8Xlu9VfO971hqjgMyX4Gv278-mjdbOrJ-pT_WYUbbFG0344IvZPu_ZqcvDp0hcVjfGVaWGAhKvBZDinhfhGSD7VvAE53bWwBah-W8vKt_3F0VP70pUKqESr5WztG-fPEOtB94MghogG528WknuMCtyA29jFZg7JvA2Qy1mR4MHAwQq2tJjvzyA_woJHqaQ2zW9at0DVmsSszAoApTe76XUE-ZoPMUtpNXT464bp-CYx1vY0jeFHyECbR6gHkoBNl-h4pwjkz2i9yOaOntXmNuf1kTX2ARhZpiMNjSmnYMf_5K_vEoGzQK0w1N6CuYG9dHLX2l"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In a piece for &lt;i&gt;The Wire&lt;/i&gt;, Aman Nair analyses &lt;strong&gt;Tether, a lesser known crypto currency&lt;/strong&gt; that is at the heart of a $3 trillion market. Issued by Tether Limited, Tether forms the foundation for modern day crypto trading and could potentially be one of the &lt;strong&gt;biggest schemes in financial history&lt;/strong&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/YKCj-XnMRae1xKW-I5Vc2QZ531_WbOyKyzDAaHwXjqatVsRL9KTiy0LW50cP7Thc5zIV1vTZpRlnJuXzfYGNyOH92MtVSacioSMhehA-8TpG62qt1HMjOndXVcukp5TrJ_Z4jhyr_B0qg7hItuk5fJ9-Kw1Hh-SiRjvYGdVX_ZD2dY8NxTfKn4f7GnqP2bzHT3HWNO9yPzA6KfVPSawYFVLyyIf46leO7oJ5SIKyT4MawaPTtu9FDH5nfhMMgdm9YIFYIkuc12ZF8vargG4gMd608s5mt8kg1hpub4d3pi3o"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;India has 500 million internet users — over a third of its total population — making it the country with the &lt;strong&gt;second largest number of internet users&lt;/strong&gt; after China. With this comes several kinds of digital threats that an average digital consumer in India must regularly contend with. Pranav M.B. attempts to identify the &lt;strong&gt;existing state of digital safety in India&lt;/strong&gt;, with a report that maps digital threats in the country. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/7DnN6eodtvhnJdNwrTh3BU4_wJCm2_Ct9eG7-nmis2QkS4qgiiX4--Qa0TTqxqJqUNHmn3xnedwSoNGVRd0smQAgaFGQ1PLpfwVhmYPO4vaXGiF0dkcRjZTHk1W5mCRTZ4CpIx2zKt4yn1WKAy3dIBxa-xnoEQMUY4YrZRqeQr1M_JwHV3KmHWG2J1CgmXUdY13h6bQ9QEDL16a5G-eN6zH8ttyLM2kXF30BnXgkAL11Sl_vZs9AdeR_UoDQJKObf3BEoq8"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Since last year, there have been regular questions around the &lt;strong&gt;anti-competitive practices&lt;/strong&gt; of digital platforms. After 46 US states filed an antitrust case against Facebook along with the Federal Trade Commission (FTC) in December 2020, Kamesh Shekar analyzed these developments in a blog post. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/svyv1CoITzbqrsIl54oOKHsVb5xbZsOjr-IIfJndIFs4FbasMTa8xPr308vsVz_owTEDCl52kc-B-8gqND7dedFPmINs25UkG8kwkeYNcktOKUUty9Zms5UqyAXnyBUFkrbccLYTL8X7DtYXy9UCoLj6i9kGiUgJyNR_ePM-32LsWT2dzMRvY3MLjtyTTeWzqv1kPYcud-kpCxX9zMid4KJZIY7fJSLCsCPiXvrcc5RjQ6wO8SxOlNzRwDLztrG9MlWjBAOom4m32Hc3Az86wUcL5h_dTnpcqiHVCjudMiD2Wz9hKAcXbBF-mMlrTS61GXYC3B9PEMLilqy1XdCSLA"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Recently, the Indian government mandated &lt;strong&gt;online messaging providers to enable identification of originators of messages on their platforms&lt;/strong&gt;. In an academic paper for the &lt;i&gt;NUJS Law Review&lt;/i&gt;, Gurshabad Grover, Tanaya Rajwade and Divyank Katira conduct a legal and constitutional analysis of this ‘traceability’ requirement, how it can be implemented, and how these methods come with serious costs to usability, security, and privacy. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/7VVDI4qoefdH1M0wYht5ypELl3sgVp1Sbz2TM_DsnX0l0o2wb-2Jq0wob7as43ltZn6ZssVx21Kb6WNIz16SwxuNYxLMwFaVL7Yqu-8eX3FzktAgtzePud71Rw38aDqYPUcb7aIzIkcrEgohiTTqr4KBZglu-g5Vc21w3pwXDKyjSXh_jk_8EIqLlZ2GF5ItEZspJwQGD9VzftHVEmz5AdqcK0Zcar_OOU9nGP8JrckN9xehbcAxzJ9V7lbKaLa6fVq_xbwLO2UqdClq7XIpCoUf9EgkKQ"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The National Digital Health Mission: Health Data Management Policy seeks to establish a digital health ecosystem by creating a &lt;strong&gt;unique health identity&lt;/strong&gt; (UHID) for every Indian citizen. Pallavi Bedi points out that hasty implementation of the policy without adequate safeguards not only risks the &lt;strong&gt;privacy and security of medical data&lt;/strong&gt;, but also undermines trust in the system leading to low uptake. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/I2XtCVqE0YUtaHHNBuG2SqhPciFDA8vAFssL8OFfrAIIw4IF4i0pC5aKw-bZofPUZI2o59tp6OVhScUGULq-yqLWvlZRi8AvmUhsS6gOvkWJJnC3Jpjyu5u2I2wysy-Q4Kt4TAOMgvcyr49ledwzRKHEo0lsRhQdFZ4VJMq10oyuB5bMF0vIWCJ3VqXUrb41hRJI5OUhxzXiGZmznPSy0p-gua0i5SvyeIn-uZTQjOFvdP5He9mT3HSsaw"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In our comments to the proposed amendments to the &lt;strong&gt;Consumer Protection (E-Commerce) Rules, 2020&lt;/strong&gt;, our analysis focuses on eight points: Definitions and Registration, Compliance, Data Protection and Surveillance, Flash Sales, Unfair Trade Practices, Jurisdictional Issues with Competition Law, Compliance with International Trade Law and Liabilities of Marketplace E-commerce Entities. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/KsxrVD9CtofFFSJKNnNl4rbZSQJxomJbHYtB6gaF-CJrz6NTc3iLI__BZ3Af7DRwDzklM6bD3o3OU8Z9g2llAOWtrNsQdWfxmaky4BZfyHArp59Ciryun36-inqvCvTtCz4MfM_SxYe7DWZQjbigMwPTuyM1nTjfuZZESbCU0kHL5uxK09aQvMmYUfBPfBjrUuCPSnz1q_SHSOh38kHHRw6JdIuOl-FX_Fu_pSAFCPpBCjmoqiyRpWbgQQw3C8dbSnJ9sMWXbopXwWS99f4vPqMGK6Tn7w6tWJqmQa8hA3wAQsH8wJgl315nOQ"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Freedom of Expression, Intermediary Liability and Information Disorders&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The recent “Infodemic” clearly shows that &lt;strong&gt;disinformation costs people’s lives&lt;/strong&gt;. CIS, and the Global Disinformation Index have published a report that examines &lt;strong&gt;the risk of disinformation on digital news platforms in India&lt;/strong&gt;, creating an index that is intended to serve donors and stakeholders with a neutral assessment of news sites that they can utilise to defund disinformation. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/oAbyvMS6qTJApmJnnokcclFKfhiXT90qwxve7vAzjNgoVJE7zL3znp9z-jVBaY_A_UghvzrqrbzPyQ8MWgNOqFX_zmz-LXX_QXxpTHcJCq0iQbudFAskKA4MQbW9ipPMHHkvCZ4sjD9YJ-f76ZHCOVs8aTp09SRza6UxxFqz2Lf-wyXOBkjjnSojLEnIzg_6Xyg-MV80GnR0MyptpLT6Ox44jMpuKSDNkziRqXdVFv2UiHFPUq5_kQFItEunUPazzjbXiO6aT6InqGhlHTpBpFR1ojSmP1YOtTCl7efQ-b_jHIbk-BBXDoDE4JF-TskvA8NvEln98dD-0ADQRopsvLp9XWDGiQ"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Torsha Sarkar, Gurshabad Grover, Raghav Ahooja, Pallavi Bedi and Divyank Katira examine the legality and constitutionality of the &lt;strong&gt;Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021&lt;/strong&gt;, highlighting potential benefits and harms that may arise from the rules, and making recommendations to retain the rules within constitutional bounds, and retain consistency with human rights based approaches to content regulation. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/xeCVOWx8opFVXsJsk8tGp7BqtYUkK2zovJDarS6GLbKTR6VL0JLLSA-ap81tloriYQLLg6Cv1HxAws110HUv2UUabdK0aCbOvdeL2AtTWGD4zL7LEsC1gAIHyvP5DCYWo8flbZwKL0UNrMa-Bp8mmAOPTNTaHHyHjt6SyvidPNrc2nvjuwWNDsgPITp_PBAYDBmfwu02GfVr14URroyiEeqExwha0b0RlSPhrunshSDIXND6-AaBkVuGJ8VdnE-bMD7FHdAa559EsTcyhmnPiIYanR9fmV6UQHb7Q65yD7jENV3-lbzRCkAjki09Qvia1nxacxBIWHb-w3_PlbB7GkJXbl8_qVZHEWhyzTnAxVoGA-je-7W-x-eFOetThpo"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The passage of the &lt;strong&gt;Intermediary Liability Rules, 2021&lt;/strong&gt;, has also formalized the legal requirement for the utilization of automated tools in content moderation. In a blog-post for the &lt;i&gt;KU Leuven’s Centre for IT and IP (CITIP) Blog&lt;/i&gt;, Shweta Mohandas and Torsha Sarkar analyze the requirement in light of concerns of freedom of expression of Internet users. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/kfCCqzfLNuv79Hdeo_EA2wt5o0LRgortN3TKK_wup26r0wlpxdBW0C-m_IDPDssS9Ie8vuBmq3TrK6Bo0jfGRs1qD89TEU2wzVysBv9kAjUiosw2pXQiNir2ylQAnNBxnwyCe_qibQIf9UOGjlvP8d8iB1XZ1QPqQUl_yHKFDrPUme0OS2EUpis_rSoVy1ZOfH-GGHo7iNYRMcqqjbmCKtfZjmLvWY86v2Zk2EjLPXr8OA"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Our comments to the &lt;strong&gt;Cinematograph (Amendment) Bill, 2021&lt;/strong&gt;, authored by Tanvi Apte, Anubha Sinha, and Torsha Sarkar, examine the &lt;strong&gt;constitutionality and legality of the Bill&lt;/strong&gt; and whether the proposed amendments are compatible with established constitutional principles, precedents, previous policy positions and existing law. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/Ao1Sghs95JSFnpzMq8bTUYQ0z1F6uZOfg6M2Stt2ceVvCf4b0iB_3f-Yx7uywoASrATvOSS6uPYTVbP8x_JLqoD9QfvjD5soYvlNJBd87FuNyxqAb4wQ8cjOuN7B44pRo65xvX9K29eBGFp7fgv-AD_ok80j4SXnAZ6LrYClxPiHC48fiisVOW7McLfsFpLtUsns1u6MIG_7FMAKNY0GHFxa5xs3lM21mrhkEcC6I7sbimtF0jmOkid5nzYbcOrtQ5ZsvrdxSRllmmOy"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Tanvi Apte and Torsha Sarkar, in a submission to the &lt;strong&gt;Facebook Oversight Board&lt;/strong&gt; in Case 2021-008-FB-FBR: Brazil, Health Misinformation and Lockdowns, answer questions set out by the Board which concerned a post made by a Brazilian sub-national health official, and raised questions on &lt;strong&gt;health misinformation and enforcement of Facebook's community standards&lt;/strong&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/h-QObkDu8td1bmkfzIEHJlAmS10MohQnXiyqHQKNEnQkEpvkdTxLkKV3yJO7CcTJGDcS0kRQVTDEE8KNbb-551uGYLiaV3wFoxJ9tGnvMBaqvtPgYgxZbnAMOowSxN7gQJTqSOZwzMVQtSbr449f6KC0Bb208ApIh2a8OX_HCRwn2BYpoTvqUfeyFZyp2qoyW5LbeAe9P-JTlFrDaB7oFBXvTHvlJfTRrT6ZeLlkQqA_RqMOga71-sxDIxBo0vvn-9r28DcTePg3p659lJ0CWQMCXiz4tY1p3cLrJgKl3K3fjignnvexZpNwk91paBQ_Bia2DDUxc1Vxmvci1p3AASg3FtYqL5l1"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In an essay for the &lt;i&gt;Indian Journal of Law and Technology (IJLT)&lt;/i&gt;, Torsha Sarkar analyzes issues rising out of the recent &lt;strong&gt;litigation between Trump and Twitter&lt;/strong&gt;. Torsha examines intermediary liability issues under American law, and draws parallel for India, in light of the ongoing litigation around the suspension of advocate Sanjay Hegde’s Twitter account. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/JxA_S2DzStQUHeEVzf9_Df15_QnK0WHgMEjaaCqNjLmfXPAS4teU_fvrDtG9R4OwwOzWYiAXWPE3QFaxOZvJ5VCHuwincnLyGpYpWME0K5x8CJwyW0vUhC-stExhsSV_5pLmEtfaVyzcGRaXsJ4jGnLWnrADSdYzpPjUTPAb6hKDDL5BBjLjzvRt14_y3_9RNos99UKlpOCv9UFR6gC6cmOQmqte1UICPRw54oI7TUMC8TfPow-JZGmeA8lmMtODPi5dPN91euSX0g"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Copyright &amp;amp; Access to Knowledge&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The Indian Parliamentary Standing Committee on Commerce’s report weighs on several aspects of the &lt;strong&gt;Indian IPR system and issues of protection and enforcement&lt;/strong&gt;. In a blog post, Anubha Sinha summarily notes the observations and recommendations of the Committee on the Copyright Act, 1957 which stand to impact &lt;strong&gt;access to knowledge&lt;/strong&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/20Alo2_Tse_JJBXG7sp9tp3Jf_qIUy2ksAvhoVH4heonMxDYRQK4nweCNF8LP29mpKvznQC8vljEX7TCv-Wb6SQREV5ph4uYOVIgz4wf36MaGTw8T5dkCxjqttA5V1tzNxdpfKi1WqQJKSFJ3o9Eog0uVFhHd3wXaYwiukkD3WHoDeYkOSZR_DYTGlm6nebmtCjaRRhTqwGMPYkZsKxM2td9xO2GBfP-J5R8llhxsrl1MvaUyiRBLIASh1l_KNpvCtlix-3Hot2VozymMTWyPG15W6s"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The 41st edition of the Standing Committee on Copyright and Related Rights (SCCR) organized by the World Intellectual Property Organization (WIPO) was held from 28 June to 1 July. Anubha Sinha participated in the event as a speaker and delivered statements on the &lt;strong&gt;Protection of Broadcasting Organisations&lt;/strong&gt; [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/VysBbmMrMfJH2U5C8TeeVWtBq8wqBadivgBYyh26sNYegYdfaR4Tg_G6v1FqMgyVD6KAm3Z1tKWm256qR0VlPwGircBtmecePp2_-24cYoFWCoDH5v_5MuytzvKUIHkSlZ4cXN9CtUZ9t-92oeqAe5qm_CDhT0Xu7G5OZKn1_9s56JlL7E9FiWa0U5l2PYeonXi9H026DNWNaOPHQ8nvvYlmvIcTkwvKWQ"&gt;link&lt;/a&gt;], and on &lt;strong&gt;Limitations and Exceptions&lt;/strong&gt; [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/TBrEeBXDldm7nDPpsENoKMft-G03I54LhjmedXzSkg1RPImWfwqhCZ7bwXpwsXbIuVvOLd7G0RtA7PgCDKqHKcYjWzHr1K8Dd8oSUYIasd8N_tlEiMedkl8eTmoz5Cm_cLV8NlYLzIbsrHCxZhhPUApqXJprQ39qHf89pyRS2Zcw1HUYW8d-rVWobmlbW4MVr0EvBz0gbWpz3NLbh9W71pVK1VN9j-ge--ine3yx-uSoyel8qUGs0mPqw0NXp0nEUnIP32r3qHvdjzEbz4Ynagm2ww"&gt;link&lt;/a&gt;]. Readers can access the notes from Day 1 [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/W_H8QjZ4FUv92dhzAdWKRTS508l6DEy7YOb8mnsf-ZzcQeMZe8TCW3XG5Fs7j1BO678zXMJn5jZiXL2eI4ZVNjrE6Sz8XcQs5fJ4z1EZSQTr-vMsaJsroyckdwmtQnOepz5KMLPZl4OnPm6ERcnJGBCVp6v7PZgpxVBGp5PR9Fo4e_TncX2qm_q_aB_e9s3I2vp8PReJJVYoEl53xIqWKkBqXlWk2RbqOQ"&gt;link&lt;/a&gt;], Day 2 [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/DRaLcVvuB-VfY7fjrVtjA5hPHTFt2KwIt2hsH4mjuuYlzJLCv5r9O3R5-4Rg72Bhvw3kMYaowZuZorJN8DXJjhf5NABvf519ig4SyCsIUri4mXWjDA1lmCHY_Oe1WfTq_VLVxwOb4XYp8VVnKIIcgAg1kseXVSENaugyRZI3otS_IUn_zNwEkw2PdFEojqryYcf5kiEADKQ5sRuVH8WB9pncRKgCvpOfFA"&gt;link&lt;/a&gt;], and Days 3 &amp;amp; 4 [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/dTkOebRyoXNDfdFetpwM6-mmRSpH7gwM1RL-SJmGMrbF25H9Y4-lo-nQ8HINcrM1eUmX9nqvpmoL26wsIsbAhOJ3MQygMDJpTQc-RNGk07WOUyH4GFUuejBJzsRBkQn44CEDxkcSQBzyLQHGjKakTPDRFszrjnLqD3e9jXfs77ie7wKRazrFjyssNPscxSg8xmrcfv89klVCo-Ts6ApD6nuRi3t0nndX2DAQ_hw_WlYLCgfmyw"&gt;link&lt;/a&gt;].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The CIS Access to Knowledge team published a comparative analysis of two prominent Wikimedia initiatives, &lt;strong&gt;Wikipedia Asian Month&lt;/strong&gt; and &lt;strong&gt;Project Tiger&lt;/strong&gt;, to understand prevailing challenges and opportunities, and strategies to address the same. Nitesh Gill in a two-part report outlines the research questions and methods of this study [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/HZI5YNgRhNViR9DS-ewrTbGX-5PkynXGEMDr5kfCauCk2OYuygd2I3Da7Tp1kyhG1Oboc0MxIelbvOqpVQHHq0JVRgbyEVMPZiTWPhQENwnv_pfOR8KYHZzzLKv7Tc-iFk6qBgCCDSbnwjmA7sfiC3FDHFvqzbEGlMMUIg1XvcRNu6fFBWe2S1W5lsdZD00dY0r-w8o3IkzCSbKwHqJMld7CQvl48lpzGHtKFreKT_MiB33iis0Fehz-nrz7DlT-k2GLTpwScqX4DcHrLjWb7A"&gt;link&lt;/a&gt;], and then presents some of the observations and learnings [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/bdLNf3_CCDaXpSzzhYF_2ThcU-LuTFb6k6HDcZ_4myjIWm-GlwXcDVQweGpaYjKKt4NmMol-HxoPucMx6w3-HC4QUmPULVJ882x8AMHaRehpgFh9t8cYPB6VPyjXNgcbzjSfOQXE6GpUDhrGYYg6KTmuH6t7F1qlOcoc_qlglL4vz5yCBL8Ri03yfZZVcfheY5Ly5lUb3WSZMpsO1u6n6KaRC_YFemwGu0sWsWgjW-XPRSNAyxHKeGLlUS7eN7wNvx-iLCLb2-VhEtN64QZHaxUd724J8Fg5"&gt;link&lt;/a&gt;].&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Labour and Social Justice&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;In a flagship report on &lt;strong&gt;domestic and care workers on digital platforms&lt;/strong&gt;, Aayush Rathi and Ambika Tandon argue that digital platforms are complicit in discriminating against workers on the basis of their identities, and that domestic workers continue to remain in precarious positions without any legal recognition or support. This work was jointly authored between the Centre for Internet and Society and the Domestic Workers’ Rights Union. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/sm3NIXtD7ClOE3mjbw6fg2ZvZB0TI3dh6rnb4vb6Hv0Ev_VwikRY-XOESwuw3-Gfglvi7OHT5l-PthXPf2rn3UDbiRRE3jaRzidnzl5uPs6ZqdtktRRVINgR3CCtZ-grN_QKqZN9KefjfMYgB7klWARTLAkZbSsKmoyrLiIZ0XMVXkYWu_F1do2eH73g_cTDDyKJiQiq9wWsbLzwjsEWoZ1uR0H2wqUp1ZOfkEyfkTbU0YojEnLVenrB-X7HDp812pjRMqHbw1qAskYpol6w_Tca"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ongoing pandemic has raised very valid questions of &lt;strong&gt;access and infrastructure in India&lt;/strong&gt;, especially during a time when the Internet and digital technologies are essential, and in many ways the ‘new normal’. P.P. Sneha and Anasuya Sengupta write in &lt;i&gt;Seminar Magazine&lt;/i&gt;, outlining some key &lt;strong&gt;challenges in digitalisation and representation of non-dominant/marginalised languages&lt;/strong&gt; on the Internet, through reflections on two recent projects related to languages and the Internet. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/iWhSEkwBqINHVVX-zy-cEtFRkWyCSoGeumeW2KNYU8gylOUgjNWiIceMev9vAcoTdrNvCoBtuZKcHSmrG3oEZ5Wypr7VRmrecPMNbuxUDoIF4FJGIlzAPeQ8dpdyeeHeQqANiU3oUN2xKTpRQ5Tin8PUoWRfMm5YXh_iougUbkun-Tq6NSjRkmvbiWXeZyphO9R44QWTrxDm2wWOdlCh2reGxocxbpNMzDPlGmxnA18sMsFi73SksnR9lQh76ylSM2iIYr3ptZk61DznsmUdfr0BK-GQL7HcD4M"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;With the onset of the national lockdown on 24th March 2020 in response to the outbreak of COVID-19, the fate of millions of migrant workers was left uncertain. In addition, lack of enumeration and registration of migrant workers became a major obstacle for all state governments and the Central Government to channelize relief and welfare measures. Ankan Barman compiled a report to &lt;strong&gt;qualitatively assess health conditions of migrant workers and access to welfare&lt;/strong&gt; during the first COVID-19 lockdown, in three host-states, Tamil Nadu, Maharashtra and Haryana. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/hU5-1FD3nbo69KurjQmXES36QSFtRZSHr4FuCzsscEMQOUOZD523Cc-iKliMQQWvm7AFZQ2JJtrcPhNeqoAS7ASS2X0_c9D3D_yvS9IuqLpt_xHpSUdVxnh85ZSVlSr07zj4mucQogJy6c2ZHw6zgQAmLQGkcl4xr__txUaycSpVKrqmHcBb3RBw2YkBTvxRfFnll2FcPmmfFYhGf1_SGM1baLyoZscYZ96h-AB1tHzg4Lao2KfFIhJ-RxHtC67r1nytTWNCRy8pY4QWmx2g-kBw0EAD4vl94LmPX10tdqmvBreDz3xxfN4o9h0OHfEzZARXb2dQFnHltqvRjPq5msyzW69oXuZZsDs0pcS6yYA"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Between July to November 2019, Indian Federation of App-based Transport Workers (IFAT) and International Transport Workers’ Federation (ITF) conducted 2,128 surveys across six major cities: Bengaluru, Chennai, Delhi NCR, Hyderabad, Jaipur, and Lucknow, to determine the occupational health and safety of app-based transport workers. Findings from the survey have been compiled as a report which &lt;strong&gt;reveals the complete absence of social security and protection of workers in a digital platform economy.&lt;/strong&gt; [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/J4FjrBD647MV8lneM-mPFxr7IWwYeETEgk17OI3lDkqNVRmfoRqhmAs1CqZXDQx-MyEntGeO7vOMUu6lslvGQbMg4Pp6Gvpz7GaUrXiOXti7YGBNPHMzLCP3BsDeYstDOYNs6Rry3eMUvPI-mV1kh6aNGWf_WlBXjwoevFZdwmt660vTJbRaUGuI1Cc45TFmp3ur5qDJNg3vaTXElkuEvo7Dz9rPcEHOTDNy-k2LW3cX9mOB_QNC5yt4sy0CCWvf-2yHAYa_2j6pVmVx2PwbbSrfMfSdK0-WL1PSZpcAHlqcRVU05C5Js__byzmLjmWUKO-kMbw"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/june-july-2021-newsletter'&gt;https://cis-india.org/about/newsletters/june-july-2021-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2021-08-10T15:57:16Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/economic-and-political-weekly-july-17-2021-amber-sinha-pallavi-bedi-aman-nair-techno-solutionist-responses-to-covid-19">
    <title>Techno-solutionist Responses to COVID-19</title>
    <link>https://cis-india.org/internet-governance/blog/economic-and-political-weekly-july-17-2021-amber-sinha-pallavi-bedi-aman-nair-techno-solutionist-responses-to-covid-19</link>
    <description>
        &lt;b&gt;The Indian state has increasingly adopted a digital approach to service delivery over the past decade, with vaccination being the latest area to be subsumed by this strategy. In the context of the need for universal vaccination, the limitations of the government’s vaccination platform Co-WIN need to be analysed.&lt;/b&gt;
        &lt;p&gt;&lt;span style="text-align: justify; "&gt;The article by Amber Sinha, Pallavi Bedi, and Aman Nair was published in the &lt;/span&gt;&lt;a class="external-link" href="https://www.epw.in/journal/2021/29/commentary/techno-solutionist-responses-covid-19.html" style="text-align: justify; "&gt;Economic &amp;amp; Political Weekly&lt;/a&gt;&lt;span style="text-align: justify; "&gt;, Vol. 56, Issue No. 29, 17 Jul, 2021.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Over the last two decades, slowly but steadily, the governance agenda of the Indian state has moved to the digital realm. In 2006, the National e-Governance Plan (NeGP) was approved by the Indian state wherein a massive infrastructure was developed to reach the remotest corners and facilitate easy access of government services efficiently at affordable costs. The first set of NeGP projects focused on digitalising governance schemes that dealt with taxation, regulation of corporate entities, issuance of passports, and pensions. Over a period of time, they have come to include most interactions between the state and citizens from healthcare to education, transportation to employment, and policing to housing. Upon the launch of the Digital India Mission by the union government, the NeGP was subsumed under the e-Gov and e-Kranti components of the project. The original press release by the central government reporting the approval by the cabinet of ministers of the Digital India programme speaks of “cradle to grave” digital identity as one of its vision areas. This identity was always intended to be “unique, lifelong, online and authenticable.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the inception of the Digital India campaign by the current government, there have been various concerns raised about the privacy issues posed by this project. The initiative includes over 50 “mission mode projects” in various stages of implementation. All of these projects entail collection of vast quantities of personally identifiable information of the citizens. However, most of these initiatives do not have clearly laid down privacy policies. There is also a lack of properly articulated access control mech­anism and doubts exist over important issues such as data ownership owing to most projects involving public–private partnership which involves a private org­anisation collecting, processing and retaining large amounts of data. Most importantly, they have continued to exist and prosper in a state of regulatory vacuum with no data protection legislation to govern them. Further, the state of digital divide and digital literacy in India should automatically underscore the need to not rely solely on digital solutions.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;span&gt;Click to &lt;/span&gt;&lt;a class="external-link" href="https://www.epw.in/journal/2021/29/commentary/techno-solutionist-responses-covid-19.html"&gt;read the full article here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/economic-and-political-weekly-july-17-2021-amber-sinha-pallavi-bedi-aman-nair-techno-solutionist-responses-to-covid-19'&gt;https://cis-india.org/internet-governance/blog/economic-and-political-weekly-july-17-2021-amber-sinha-pallavi-bedi-aman-nair-techno-solutionist-responses-to-covid-19&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha, Pallavi Bedi and Aman Nair</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Digitalisation</dc:subject>
    
    
        <dc:subject>Co-WIN</dc:subject>
    
    
        <dc:subject>Covid19</dc:subject>
    
    
        <dc:subject>Digital Technologies</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Technology</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    

   <dc:date>2021-08-10T15:34:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/march-may-2021-newsletter">
    <title>March - May Newsletter</title>
    <link>https://cis-india.org/about/newsletters/march-may-2021-newsletter</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;h3&gt;Cybersecurity, and Emerging Technology&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Doctrinal clarity&lt;/strong&gt; and &lt;strong&gt;institutional coherence&lt;/strong&gt; are essential for a robust cybersecurity posture. Arindrajit Basu and Pranesh Prakash analyze this in an opinion piece in &lt;em&gt;The Hindu&lt;/em&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/mkAIQo7C4IZmt9JYL5DoADKYnQqxm9fka-gdBSvoA81rsg6GEgy07tjzn0qNQvz4PxT4dYB5ZeNQ1Bbi1ubYUR0z6z8dy3e5FK9grxNzzgZSO0IUwVPm8behwp6dBjhS3_xc9_d4Bz234TH-U0qMpqF9sJzKUGtQ7MZi0hnzsUaVhsA2VGsqoSC3xrrr1cD9ZX8AlcPmIR3uj5moIhV9EfHcU2EHOQqhu6OCGcfuUBS-tgGe1iBvbOikAjEWMJin4Q61Rd8p31vaLtqTwVe2uw"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;U.S. and Indian decisions about &lt;strong&gt;Huawei&lt;/strong&gt; have implications not just for their separate relations with China, but the &lt;strong&gt;U.S.-India bilateral&lt;/strong&gt; as well. Arindrajit Basu and Justin Sherman co-authored an article in &lt;em&gt;The Diplomat&lt;/em&gt; examining Huawei’s role in India [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/M0GGHsg5EtZWdtPNqwbeCiMiN7elnvi6aLYTpAVn0gw7se-z20XDgj6jfb79INZxyFmGtDXDcD0pf_RfRo3K_RyXEav9HKy_gV1G8nDVPhoN8Kp2G9-NLUeUCXxW6WYbiyyWDZdKwxzd4PsyoxybVKoJ9XH7JhsVFDPhN0ySqc8Mi6MD0zq8q_CRT9dDkdCC2queRjZdcOr4eoC8YPjU-LVpaxJGge0rOaPrYmM3oe__OoIjvA"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;In an article for &lt;em&gt;The Wire&lt;/em&gt;, Aman Nair points out that India might miss out on &lt;strong&gt;NFT (non-fungible tokens)&lt;/strong&gt; which is set to become a mainstay in the modern digital zeitgeist. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/wKv_Gt32QSHdLE3-ykqX_8DMhA2QohVdjXJn-C65rBN_0nsI9LCIhp3WrANkb-8cDzw1rSkKGrJ0gyPwV_p9aqBIOu3ioMRLjQmVdwMwcVH6nVHELvDJiebOfI5HgW0DS2jvjYUGiFNuBE4y5k7D6hcdEnmRXZ0cGaM-VT0qPJcw28gDhe7eJcg_rmvGhHbJBm_h0VnZfNJyjqZ8CFoiIU0z3QaGDqk16_gOlCYYR98VTEehLBYUs8ymz6Fggw"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Andre Barrinha co-wrote for the &lt;em&gt;EU Cyber Direct&lt;/em&gt;, &lt;strong&gt;on outer space diplomacy in the 1960s&lt;/strong&gt; and why cyber (security) diplomacy isn’t quite progressing as well or as fast. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/Ud7YZJn5YKOmIROHOUMyLVB-69aNwlb-FParRXYStS_vdQ3SDwErMwxNQlu8iFNnUlSI5lejtsIHgERXyVY3xzTjRGyNP9_sR-uAyfxusTZlSMU3qNs5OPlSJfRErWBEkj_TiT2y1QQwZH8brbn6P8H4S1rDBX1QFICDOe5HjYF2GOdrgzwA1vaeJB6YrFcn2BUNmpsDD4f0mKwcYkCVVFCYgOtbj1-59CoswRfSqgA"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Arindrajit Basu, Irene Poetranto and Justin Lau co-wrote an article for &lt;em&gt;Carnegie Endowment for International Peace&lt;/em&gt; which captures some &lt;strong&gt;concerns with the United Nations OEWG process&lt;/strong&gt; dealing with cyber norms and the absence of discussion at the forum on key issues. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/G-0Ok05_UomEqWTkmsuUXGq9V-i2zMa0ul5zzkfLKC8Rj5rCGsl12lrJl7tfGzORBxTOYoVPoLUlHF_KaD2z05TyeW3cQDqaxvlhUDxfr2Z9n64Lbe1_p8FYKFvLXrsNVAoEbxsCbOncqzkKgVebcxHe_HF5Murx9aVk6Ps9ik34I4Sj3y26-_Nj98iLwMPZO0rs8hYNZbvsjcUbyGxm6G5xlfjakhy-UsjioXEGdz7zQdV6O_FCG1BoP1Rvm8fPxvdK1JEbGkedHgwk9ENn9na2J6I"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In an article for the &lt;em&gt;Observer Research Foundation&lt;/em&gt;, Arindrajit Basu writes about how India must avoid getting its &lt;strong&gt;data policy&lt;/strong&gt; caught up in tired existing machinations and instead forge &lt;strong&gt;a new path that prioritizes Indian strategic interests&lt;/strong&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/eZHdtXVJIePupyeXaX8RUlkusvtOgHe4VHCDeiVpkTS0P4ji1lGib5cqvQX0nGf5iIx6vb52mwWtd9Z5G5z71_dGvd89c5xn2JyZ-f9cdOWTAsHKRwxo_Tk2Kp7Dfb4JEi4r2Sd5r3dHPc3YmRMYLseDLnESCpmxnPkbX5y1sMitN5OUu4x1ydiYZxfB3FKVZjnnXSCAmB2yPWS7pL4cGcVWpJ1PqBoqPAvvs_Ofqyg58K7inxfax-5tIPk5wyLsEARP92qYgPo"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Aman Nair, Arinjay Vyas, Pallavi Bedi, and Garima Saxena authored a &lt;strong&gt;response to the Supreme Court E-committee’s draft vision document of phase III of the E-courts project&lt;/strong&gt;.  This response recommends consideration be given to the digital and  gender divide, and lack of clarity in the document on several  data-related aspects. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/eLr3hXFonL5hfAUH5ux5zoQcTrY2PxRDO9kflkNqtcUObBbYWm-vqp7v4Ex0g_o7YtCokB315adj-1k_QwDebJ1k9G626m1MGuTYmlfKdwSVl7mYsfna4Dy96z8Eb7iJ7gtcZZF8s5JQCGN1ux3PiYvgDrxbs3MeXeZizpIZsm9OsPvCGzvC5HbxkhfdFG2B6853ajax3xofJRcucZ2Jc1AFEg5iAVrwiopY0SFIb99XHRESaUFEP9KYNs2bC1nAXaAW4AU7OPG_"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Privacy&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The proposed &lt;i&gt;Personal Data Protection Bill, 2019&lt;/i&gt; is being deliberated by the Joint Parliamentary Committee and is expected to be tabled in the Monsoon Session of Parliament. Pallavi Bedi and Amber Sinha co-authored a white paper to examine the &lt;strong&gt;personal data implications on welfare delivery models in India&lt;/strong&gt; and to suggest ways to operationalise key provisions. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/_Gjo4q_RVbTa0sA8X1FOhYiB4McMtr_8JgcG33Uf9nXIX9VsXvDxzVvYABfOz-DyVN14iCoyotGqfkjezyNjJFt4RsiYkw6m0UFNhGd9NYLj3fkrn8IfKwI3YJtO9-FrkgMxcCOTc1PdedlPXPGO2cafHCYUaLhHNMXIepnX2L2KC-mG_-l0Fjx5m-GvmP6GcXg1eyOyNZjrCL8eFWzyCT9XVDv8afLm2D3F0l-28tz-MwSJRRqc4vIjV0PCykM6NXQ"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shweta Mohandas authored an article for &lt;i&gt;Rajiv Gandhi National University of Law Student Research Review (RSRR)&lt;/i&gt;&lt;span&gt;. In this article, which forms a part of RSRR’s ‘&lt;/span&gt;&lt;i&gt;Excerpts from Experts Blog Series&lt;/i&gt;&lt;span&gt;,’ Shweta examines whether &lt;/span&gt;&lt;strong&gt;Indian data protection legislation can act as a check on growing workplace surveillance&lt;/strong&gt;&lt;span&gt;. [&lt;/span&gt;&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/5X-z4Ay91QvhUYmdHomWwzdgLp7eCubPpwLyaH1H0MWiyiQfU9PIIQSg2Nshk2mfLJYrb65hiGIj3xyuffXiDnOu9lbwfFsrQCL6D5DnQ9HkvOoZHcq3_Kgf9NVKSAX7tv-aqy00L3jjJtbWbvfaqwnagmdUVSLEP9E7S6s-UTBvO-KCO82DhWELF0Od6dhVrbr0WvVi980IX67IkCiSNaKwpuNwSXuYS9bgD0s"&gt;link&lt;/a&gt;&lt;span&gt;]&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Aman Nair and Arindrajit Basu examine the changes in the context of &lt;strong&gt;data sharing between WhatsApp and Facebook as being an anticompetitive action in violation of the Indian Competition Act, 2002&lt;/strong&gt;&lt;span&gt;. Having previously &lt;/span&gt;&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/u35U0gu1I7Y81i6OYu20wN7zgiA4FxKWowVPgk7Gmafn69IJLoZapqrfCSWui33Sh0ntbkPajjtW_p35C3qMoCP5xcrC2dHSO3DX9MZ7uFNbJZ-p_NRBv5bOZ_1jKeH2KYBYohqWlZ83VVG3CDvNl1AK_4xmNrr9L578OragYyJQo2U93bxHbLw1fnLc1CPWqkfZvcmydFo1HGyNBeFpRqiTVn6ytQjyAiUw2Gisx7itlxVHmb_QCuSd0T8nD47U4UBH_i_dg6PN5R4PcjU"&gt;examined&lt;/a&gt;&lt;span&gt; the implications of WhatsApp’s changes to its privacy policy in 2021, this issue brief is the second output of the series examining the effects of the changes. [&lt;/span&gt;&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/jOUH-SfgRCjdp9DORlyEL16nnyJ_ogGha0d2DdYJGcRnBOiZt6F3SuhZzZYX8t1umpAtId1_80WNiW3Y6CgGDA-TYQ2hORCBWeOvvoPphGzr0DfCy_6tD8QQMzgb3mCm1GXECkmJM_kTL9kfRrj8GVpe3DHJ7_jX3pKBQx9HHWKqkgftY_8wTG6zCG4J8HZC-1Hv66BsR1didil6DVh-HtetydLcMzlikdBj4bvxTjzFRAoLvsyeBH9PaoDRJuUXTYR5-8BcE8ITu2TyiOyc_ME2kuDJ3DJiE4PDeNHutpTJyuc7lqwp-g"&gt;link&lt;/a&gt;&lt;span&gt;]&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In a blog-post, Pallavi Bedi provides recommendations for the &lt;strong&gt;Covid vaccine intelligence network (Co-Win) platform&lt;/strong&gt;&lt;span&gt;. She says that as a first step it is essential that Co-Win has a separate dedicated privacy policy which conforms to the internationally accepted privacy principles and enumerated in the Personal Data Protection Bill. [&lt;/span&gt;&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/o19mW5Vyy3giilmnC_ef5khZu85qA-A3uDr687psJN0UhAkPY43mYt7Jaw7cXwy0NJK7ky9IvnklXsGPIME4bYH2cCVK_NeXEhZK-N6RRRSSDFUG33BpdaFtUD3cqIxrsEV_-ILCXF4SDN3IBmJFKeJDBFZA4bLuUWEzsAhBQbnFcbGuITTNq74cViuBSO-p09OT9-AtzOUgce0Brhta6YmU5iSmpMGW2XWhWTw3ueesRR_8fjDkF7XoLDGCMmkdjvAeyfbCIee0z-30EbUN5sbLzCCHVUHmuYVPzqtLeV8"&gt;link&lt;/a&gt;&lt;span&gt;]&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Freedom of Expression, and Intermediary Liability&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;In February, the Advertising Standards Council of India (ASCI) had issued draft rules for &lt;strong&gt;regulation of digital influencers&lt;/strong&gt;, with an aim to &lt;em&gt;“understand the peculiarities of [online] advertisements and the way consumers view them,”&lt;/em&gt; as well as to ensure that: &lt;em&gt;“consumers  must be able to distinguish when something is being promoted with an  intention to influence their opinion or behaviour for an immediate or  eventual commercial gain.”&lt;/em&gt; Torsha Sarkar and Shweta Mohandas respond with comments and recommendations to the rules. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/nP6_NZer0OIQv_bMG6p9Vzx-uTdYi17sYHl0xdFjMYzEzv9xmTvSG73K8_7sq4J6NPdQ5sNA5eaQvAwMHBrYkAt2mGFF9SLlrCSfNZ3K6rpRyst36jbtHpdD3_Pc9ukKdBW3_lhiGpISLi7H2TBa0BumRk2JV3PFdUBH6R3kk0ywJuvcHeJJWxAsnyydYY2s2_iRpo5Sc0MvHbC8vlDCoI6mtuL0_PC6B2eL0G8wZqbtwYYM2hNO-DfobKXJV16nfGC8GxASmN2FmH07pif0Cn5xSXoeadfmwb-Fox-B03UAn-0THELMM1beVubJWnOAOrPXoA5JIZ7CQe5x3g"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Copyright, and Access to Knowledge&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt; Anubha Sinha explains what the draft national science, technology and innovation policy means for &lt;strong&gt;open access to scientific literature&lt;/strong&gt; for Indians. This article was published in &lt;em&gt;The Wire Science&lt;/em&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/CJjg4ihUvxLz1chJKcO03n5_Ydr9rvEDH_kFGYPs7_aijAvgsioqcqvZU0n41Ly6CNagHY1Upc0-3eCPsdo3GxXWC6baFyPSXImgs7tRy-Tio7TdRDS1qHU9i5YghNVjsoIunFozlrsutZGnXjXNF6Ce04lDrZ0g0dOdBIDt-InCeubeq35RnbIj3Qb2jdf2vwlkcAeyC925K6WeyzPM7sGUAVmMH1wKu9pmN-bgHJfNRodxOWODiF_o5vmu6g25UP6IdunHwUKorudI_0RopdHXBA"&gt;link&lt;/a&gt;] &lt;/li&gt;
&lt;li&gt; In an article published in &lt;em&gt;Info Justice&lt;/em&gt;, Anubha Sinha provides a summary of the progress of the &lt;strong&gt;copyright infringement suit against Sci-Hub and LibGen&lt;/strong&gt; in India. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/Jg1NJZxuFnR-Srq0Tz1RS3XZZ17cL4JxJFlOY2g12wpoHPIxsc-lW18hjUe7sg309BNiO1i0V_yLGaQsQiAzILlWe2zd3ctx4dTTFvyFbs_Ds1w3W91GNEdoWszaryWzeKs-ZSDZYR1IPZa4ZGXpOrd21RiKK6InuJVXGZRN6WJzmgdBr4ZWre9-NP3AxduZDFnzXrjfCho6iDPhS7CuR8ZW4bFCwkmvCr70-yTDLLkT2DUmkB-caRfvMxukUyr1fjilhp-3vJwEt1gHi0HP-kpyx3wac8mjFxSCbsVg-5AiRMti"&gt;link&lt;/a&gt;] &lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Digital Cultures, and Social Justice&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;In a research paper, Noopur Raval  offers critical historical insights from the fields of international  development, anthropology, and postcolonial history to caution against  both the possible harms of &lt;strong&gt;gender disaggregated datafication&lt;/strong&gt;, as well as the consequences of &lt;strong&gt;non-participatory datafication of women&lt;/strong&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/WmB3X2tO_c8hEDCY-QCDD1tTPBIEB7Gt4bFRLY7mNCB3X5sRuV6npbW4eIX8ta-lGod2fia1v8ZTxZurtXczkJQbBg5ckgKRSG3eYKfG9ntQ5qRKVkq12g9YEmZ1eP1raJjh5p5aHQ-0MhUsQafyvBQpzVEdDK9ZJecvYAq3GyD42aSWkS0iQ17sS9WCDchDhFQn20CS7MAEmZm6rM0yymmNBqTHRR7GuKxP3edQqiMTblOufA4mhx62YuIgqn_mRv5uOPqxevVBmTtlTTyMmZihFccK"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Kaarika Das, a research scholar at  NIEPA and Sravya C, a researcher in the Humanizing Automation project at  IIIT Bangalore published &lt;strong&gt;a study on migrants in India's Gig Economy&lt;/strong&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/H6Jr3Xykf4-nxghqRxErQtEVs4TH-l3S2LVhiXIisAPDyUCm6fiWyLGCI_V9jrofmSaX7B1sFEjjVvhsqbNcHpKz6_ztX9o6ZMp-BRrke6HgLScE3FYxJKKFhtGyp_w_xUwJu1jybdsltHMKm1oNjRgYm4Z_hbpUTmJlK72raCD6jC7VjvTmuJmIGZLFa1J18o0IoImVO8VLqbV_lUigTVBNQWqZsgl_TyjYf3a6H8oLBlG4fo3jIXAsU5S2aySLzNO9u46C1Zv5g-D3wc6jChAhrMcOtcp2NNeEOJRw_n-nzYNrfVNwwLKdIOY"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Sameet Panda and Vipul Kumar wrote a blog for &lt;em&gt;Privacy International&lt;/em&gt; pointing the &lt;strong&gt;failures in the digitisation of India’s food security programme&lt;/strong&gt; in light of the &lt;strong&gt;exclusion of married women of Odisha&lt;/strong&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/czsORnDtqHr4eMfKxD9huAqfK9BfJ_oZWslVsCoG63dJQwSqFhMbQzBgtolMXmsnvl3TuEaSJXOIWWc6z-EcMaMSfZwAZR6Tixu7KVE3u343x0qCePCh6k_Mbyo1ckxpCdq6R4M2f8b-8PdxHsW1OzgIALcgF63n63DmmmP3krIGfTsWj-kO03xSa6lho6qrFDnEQeDW6zuMc8mHf-o34ogIveNxvYoa_gtPEag390DefdFa5not77SmRSLeLd-oAFxkcQ_jrSEiEnyjD9UNdb0COOFbk8KlrD2y7SBM27_5U_oRY1tHFTDIpBT3z4k"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Shreya Ghosh, a research scholar at  the Centre for Political Studies, Jawaharlal Nehru University, New Delhi  authored an article in &lt;em&gt;EPW&lt;/em&gt; on &lt;strong&gt;access to welfare and health for women during the initial phase of the pandemic&lt;/strong&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/WrUVPoWi-5LlI7z8_qy9HVtjyDoIgjSdclz7-wdA1OV2tG7GWSuUQ-F31hf1TpaGumhcxYeQJE9vqj1LRYpoKJfaHyCQHx_Dnt8PcNB2eEvQAbtHEdjAZLIu6Pno55XvtCJ33EBRdNRU-tu0Tt8j_lXT_nSChepY18OpIu69PUGNBI7Lsp6pkOo4LXhtUKdImoitU_-lBg1-paVePznLYRWL7bhk5rm_OrIsJPZuKbEnew8kXTwbDvjUgZbD"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Ambika Tandon and Aayush Rathi in a research paper, &lt;strong&gt;“Fault lines at the Front lines”&lt;/strong&gt; analyze the &lt;strong&gt;changing employment conditions for domestic workers&lt;/strong&gt; in the growing platform economies of South and Southeast Asia. By  analyzing different platform designs and comparing regulations in &lt;strong&gt;India, Indonesia, Pakistan and Vietnam&lt;/strong&gt;, the authors present a thorough picture of the situation for domestic workers in the new economy. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/kPMoaM42DpjpGxHbzGnAXycfRBu9fPzVJ6jQoyePUjDKKV9KMz8HDo8M3h5fDoOFAynoCq8ARyzHdBIkACBBy8eWHRWjcbXslejcnZZIn2LP-BsWh_Sr4FMl2AWDTQktt8tlZAZ2PcTfL_KE1sYJD1d4522v3eLvu_QUX8LCXvuznSIusIe7e_vFu3MNdylOuSIK_-L61Uin8gAEZ-eO4DDwYaE42Uc0"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;In a blog post published by &lt;em&gt;Ethical Source&lt;/em&gt;, Ambika Tandon throws light on &lt;strong&gt;artificial intelligence and allied technologies&lt;/strong&gt; that form part of &lt;strong&gt;Industry 4.0&lt;/strong&gt; in the future of work. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/Hrd-w4fWPa8ThFlmr-Zw_-LR96KsoFTBchzDQ8QwDJALcjcwz1fCn49RAws3-xmNATUZIYUaSQT4nJxodQvSgrzlzKXEOdj64Sx8aRvtkyPaolpAml7hSDcczWdPJPaZISxUxCl9S1DHnfujOulrLkdqgEf1xPsWSQk_TQZJU4dOE7Vnqm_pmCnFVs_WLo4yQ2P00Td3VYd78HikHsyLC3yqju4"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Ambika Tandon and Aayush Rathi authored a chapter titled &lt;strong&gt;“Care in the Platform Economy: Interrogating the Digital Organisation of Domestic Work in India”&lt;/strong&gt; in a book titled &lt;em&gt;“The Gig Economy: Workers and Media in the Age of Convergence.”&lt;/em&gt; [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/-vxAl0-OSphrFabwlh8Ir2yhdE_cYeWryiSavWFOByLbxWzlndVfgl1K0awHZjD1J6LmUbu2OaoCgNKL3Dcozv_hQ9WEi1MeQdSRmT1kKProU_9fJexLKPbw80T69AfzXMtjpfX_6zYPpWohxsh1xxOwK86Vs5S_x73hOG7hhuQxFfy4VF4co0Ls2jX-Wi7-L4pf-SBVBekVFuObAI6dOsUwWyywiSYldGbFbxxPfyVegmZuKMtD4bBycNBw_B__X1IogiPK5fj0851hxFM4eo5Wl2s0dZY37-UhpKL4xS0gLZI9UozMux7JbmzM4jpZT1AAGGCNlYb4DM3_Alf0YHI1KQ"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/march-may-2021-newsletter'&gt;https://cis-india.org/about/newsletters/march-may-2021-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2021-08-08T15:45:45Z</dc:date>
   <dc:type>Page</dc:type>
   </item>




</rdf:RDF>
