<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 131 to 145.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/briefing-on-bbc-news-pan-india-research-on-how-fake-news-digital-misinformation-spreads"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/building-a-community-of-practice-reflections-from-2nd-all-partners"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/participation-in-the-meetings-of-iso-iec-jtc-1-sc-27-it-security-techniques"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/technology-foresight-group-tandem-researchs-ai-policy-lab-on-the-theme-ai-and-environment"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/confidentiality-of-communications-and-privacy-of-data-in-the-digital-age"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/oxford-human-rights-hub-arindrajit-basu-october-23-2018-discrimination-in-the-age-of-artificial-intelligence"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/debating-ethics-dignity-and-respect-in-data-driven-life"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-october-14-2018-sales-of-surveillance-cameras-are-soaring-raising-questions-about-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/bloomberg-quint-pranesh-prakash-october-15-2018-why-data-localisation-might-lead-to-unchecked-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/community-standards-roundtable-conversations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/networked-economies-and-gender-action-learning"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-september-27-2018-after-sc-setback-fintech-firms-await-clarity-on-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cross-border-data-sharing-and-india-a-study-in-processes-content-and-capacity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/takshashilas-online-cogitatum-on-ai-and-ethics-in-india"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/briefing-on-bbc-news-pan-india-research-on-how-fake-news-digital-misinformation-spreads">
    <title>Briefing on BBC News pan-India research on how 'fake news' / digital misinformation spreads </title>
    <link>https://cis-india.org/internet-governance/news/briefing-on-bbc-news-pan-india-research-on-how-fake-news-digital-misinformation-spreads</link>
    <description>
        &lt;b&gt;Amber Sinha participated in a special private briefing on the BBC's pan India research on how misinformation spreads. The briefing was conducted on November 16, 2018 in New Delhi.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The briefing was very useful in understanding both the methodology employed by the researchers, and how they arrived ate certain findings. The report can be &lt;a class="external-link" href="https://downloads.bbc.co.uk/mediacentre/duty-identity-credibility.pdf"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/briefing-on-bbc-news-pan-india-research-on-how-fake-news-digital-misinformation-spreads'&gt;https://cis-india.org/internet-governance/news/briefing-on-bbc-news-pan-india-research-on-how-fake-news-digital-misinformation-spreads&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-05T14:01:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/building-a-community-of-practice-reflections-from-2nd-all-partners">
    <title>Building a Community of Practice: Reflections from 2nd All Partners</title>
    <link>https://cis-india.org/internet-governance/news/building-a-community-of-practice-reflections-from-2nd-all-partners</link>
    <description>
        &lt;b&gt;On Wednesday, November 14th, the Partnership on AI held its 2nd annual All Partners Meeting in San Francisco, California. Representatives from our 80+ member organizations – for-profit companies, civil society organizations, academic institutions, and advocacy groups – traveled from across the globe to reflect on 2018 progress, and to plan for the future.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Elonnai Hickok participated in the event held in San Francisco on November 14 and 15, 2018. The event was organized by Partnership on AI. On November 14, Elonnai spoke on the panel on the PAI working groups and on November 15 she co-lead the AI Labor and Economy working group meeting as co-chair of the group. More details can be &lt;a class="external-link" href="https://www.partnershiponai.org/building-a-community-of-practice-reflections-from-our-2nd-all-partners-meeting/"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/building-a-community-of-practice-reflections-from-2nd-all-partners'&gt;https://cis-india.org/internet-governance/news/building-a-community-of-practice-reflections-from-2nd-all-partners&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-01T04:18:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance">
    <title>Surveillance Stories: Optimizing rights and governance</title>
    <link>https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance</link>
    <description>
        &lt;b&gt;Sunil Abraham gave a talk at the National Centre for Biological Sciences, Tata Institute of Fundamental Research, Bangalore on October 16, 2018. Sunil used a series of stories to explain how surveillance works and fails in the context of theft, murder, insider trading, terrorism, demonetization and encounter killings. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Abraham.jpg/@@images/27cd9d50-b82d-4556-aad2-431d99174b07.jpeg" alt="Surveillance Talk" class="image-inline" title="Surveillance Talk" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These stories were used to explore multiple technical solutions for solving the “surveillance optimization problem”. Policy makers have to simultaneously maximize various rights — the right to privacy, the right to transparency, the right to free speech — and uphold the imperatives of the nation state: national security, law enforcement and effective governance. &lt;br /&gt; &lt;br /&gt;Two decades ago, Lawrence Lessig introduced a socioeconomic theory of regulation called the ‘pathetic dot theory’, which discusses how individuals in a society are regulated by four forces — law, code or technical infrastructure, market and social norms. The talk will explore how these four regulatory options contribute to solving the surveillance optimization problem.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This was published on the website of &lt;a class="external-link" href="https://www.ncbs.res.in/events/apls-20181016-surveillance-abraham"&gt;National Centre for Biological Sciences&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance'&gt;https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-31T01:39:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/participation-in-the-meetings-of-iso-iec-jtc-1-sc-27-it-security-techniques">
    <title>Participation in the meetings of ISO/IEC JTC 1/SC 27 'IT Security techniques'</title>
    <link>https://cis-india.org/internet-governance/news/participation-in-the-meetings-of-iso-iec-jtc-1-sc-27-it-security-techniques</link>
    <description>
        &lt;b&gt;From 30 September 2018 to 4 October 2018, Gurshabad Grover participated in the meetings of the working groups of ISO/IEC JTC 1/SC 27 'IT Security techniques' held in Gjøvik, Norway. The meetings were organized by Standards Norway with support from NTNU, Microsoft, Telenor, et.al.&lt;/b&gt;
        &lt;p&gt;Gurshabad mainly focused on the meetings of Working Group 5 responsible for standards and research in "Identity management and privacy technologies" in SC 27. I attended sessions discussing work related to current ISO/IEC standards and upcoming work in the WG, such as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Establishing a PII deletion concept in organizations&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Privacy guidelines for smart cities&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Additional privacy-enhancing data de-identification standards&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;User-centric framework for PII handling based on user privacy preferences&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;Gurshabad will be a co-rapporteur on a 12-month study period to investigate the 'Impact of Artificial Intelligence on Privacy' which was initiated by the WG in the meeting. Additionally, I was a part of the drafting committee which prepared the final resolutions and liaison statements from the meeting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gurshabad also attended the Norwegian Business Forum on cyber security which was held on October 4th, which featured talks by professionals and academicians working in cyber security in their different sectors. The agenda for the business forum can be &lt;a class="external-link" href="http://www.standard.no/en/kurs-og-arrangementer/arrangement-standard-norge-og-nek/arrangement-fra-standard-norge/business-forum---cyber-security/"&gt;found here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/participation-in-the-meetings-of-iso-iec-jtc-1-sc-27-it-security-techniques'&gt;https://cis-india.org/internet-governance/news/participation-in-the-meetings-of-iso-iec-jtc-1-sc-27-it-security-techniques&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-31T01:28:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/technology-foresight-group-tandem-researchs-ai-policy-lab-on-the-theme-ai-and-environment">
    <title>Technology Foresight Group Tandem Research's AI policy lab on the theme AI and Environment</title>
    <link>https://cis-india.org/internet-governance/news/technology-foresight-group-tandem-researchs-ai-policy-lab-on-the-theme-ai-and-environment</link>
    <description>
        &lt;b&gt;Shweta Mohandas attended a roundtable discussion on artificial intelligence and environment held at Tandem Research's office in Goa on October 5, 2018. She also made the  framing intervention for the first session by addressing the question - What are the likely ethical conundrums, and plausible unintended consequences of the use of AI for sustainability?&lt;/b&gt;
        &lt;dl style="text-align: justify; "&gt;
&lt;p&gt;Conversations at the lab clustered around four main themes:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;AI in the Anthropocene&lt;/b&gt;&lt;br /&gt;What are the most critical sustainability challenges in India – and can AI be useful in addressing them? What are the likely ethical conundrums, and plausible unintended consequences of the use of AI for sustainability?&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Conservation after nature&lt;/b&gt;&lt;br /&gt;What AI interventions are possible to foster better conservation and can AI driven citizen science initiatives improve people’s relationship with the natural world? Can AI help imagine a more dynamic and proximate co-existence with other species, after nature?&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Water ecosystems&lt;/b&gt;&lt;br /&gt;Can AI help us imagine new paradigm of water control and infrastructure that are more dynamic and ‘mirror’ the complexity of natural water systems? Will AI lead to decentralization and empowerment of water users or will it result in centralized models and loss of power and agency of water users?&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Future Cities&lt;/b&gt;&lt;br /&gt;Can AI systems be used to foster sustainability practices around mobility, energy, waste, and help better plan development zones and create early warning systems? What systems can be built to encourage citizen participation for solving sustainability problems and increase transparency and accountability of municipal governments?&lt;/p&gt;
&lt;/dl&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/technology-foresight-group-tandem-researchs-ai-policy-lab-on-the-theme-ai-and-environment'&gt;https://cis-india.org/internet-governance/news/technology-foresight-group-tandem-researchs-ai-policy-lab-on-the-theme-ai-and-environment&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-31T01:10:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/confidentiality-of-communications-and-privacy-of-data-in-the-digital-age">
    <title>Confidentiality of Communications and Privacy of Data in the Digital Age</title>
    <link>https://cis-india.org/internet-governance/news/confidentiality-of-communications-and-privacy-of-data-in-the-digital-age</link>
    <description>
        &lt;b&gt;On September 25, 2018, Elonnai Hickok participated in a side event Confidentiality of Communications and Privacy of Data in the Digital Age organized by INCLO and Privacy International at the Human Rights Council 39th ordinary session. Elonnai spoke on artificial intelligence and privacy.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/confidentiality-of-communications-and-privacy-of-data-in-the-digital-age'&gt;https://cis-india.org/internet-governance/news/confidentiality-of-communications-and-privacy-of-data-in-the-digital-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-28T06:02:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/oxford-human-rights-hub-arindrajit-basu-october-23-2018-discrimination-in-the-age-of-artificial-intelligence">
    <title>Discrimination in the Age of Artificial Intelligence </title>
    <link>https://cis-india.org/internet-governance/blog/oxford-human-rights-hub-arindrajit-basu-october-23-2018-discrimination-in-the-age-of-artificial-intelligence</link>
    <description>
        &lt;b&gt;The dawn of Artificial Intelligence (AI) has been celebrated by both government and industry across the globe. AI offers the potential to augment many existing bureaucratic processes and improve human capacity, if implemented in accordance with principles of the rule of law and international human rights norms. Unfortunately, AI-powered solutions have often been implemented in ways that have resulted  in the automation, rather than mitigation, of existing societal inequalities.&lt;/b&gt;
        &lt;p&gt;This was originally published by &lt;a class="external-link" href="http://ohrh.law.ox.ac.uk/discrimination-in-the-age-of-artificial-intelligence/"&gt;Oxford Human Rights Hub&lt;/a&gt; on October 23, 2018&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/ArtificialIntelligence.jpg/@@images/3b551d39-e419-442c-8c9d-7916a2d39378.jpeg" alt="Artificial Intelligence" class="image-inline" title="Artificial Intelligence" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Image Credit: Sarla Catt via Flickr, used under a Creative Commons license available at https://creativecommons.org/licenses/by/2.0/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the international human rights law context, AI solutions pose a  threat to norms which prohibit discrimination. International Human  Rights Law &lt;a href="https://books.google.co.in/books/about/International_Human_Rights_Law.html?id=YkcXAgAAQBAJ&amp;amp;redir_esc=y"&gt;recognizes that discrimination&lt;/a&gt; may take place in two possible ways, directly or indirectly. Direct  discrimination occurs when an individual is treated less favourably than  someone else similarly situated on one of the grounds prohibited in  international law, which, as per the &lt;a href="http://www.equalrightstrust.org/ertdocumentbank/Human%20Rights%20Committee,%20General%20Comment%2018.pdf"&gt;Human Rights Committee,&lt;/a&gt; includes race, colour, sex, language, religion, political or other  opinion, national or social origin, property, birth or other status.  Indirect discrimination occurs when a policy, rule or requirement is  ‘outwardly neutral’ but has a disproportionate impact on certain groups  that are meant to be protected by one of the prohibited grounds of  discrimination. A clear example of indirect discrimination recognized by  the European Court of Human Rights arose in the case of &lt;a href="http://www.errc.org/cikk.php?cikk=3559"&gt;&lt;i&gt;DH&amp;amp;Ors v Czech Republic&lt;/i&gt;&lt;/a&gt;.  The ECtHR struck down an apparently neutral set of statutory rules,  which implemented a set of tests designed to evaluate the intellectual  capability of children but which resulted in an excessively high  proportion of minority Roma children scoring poorly and consequently  being sent to special schools, possibly because the tests were blind to  cultural and linguistic differences. This case acts as a useful analogy  for the potential disparate impacts of AI and should serve as useful  precedent for future litigation against AI-driven solutions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indirect discrimination by AI may occur &lt;a href="https://cis-india.org/internet-governance/ai-and-governance-case-study-pdf"&gt;at two stages&lt;/a&gt;. First is the &lt;b&gt;usage of incomplete or inaccurate training data&lt;/b&gt; that results in the algorithm processing data that may not accurately reflect reality. Cathy O’Neil explains this &lt;a href="https://weaponsofmathdestructionbook.com/"&gt;using a simple example&lt;/a&gt;.  There are two types of crimes-those that are ‘reported’ and others that  are only ‘found’ if a policeman is patrolling the area. The first  category includes serious crimes such as murder or rape while the second  includes petty crimes such as vandalism or possession of illicit drugs  in small quantities. Increased police surveillance in areas in US cities  where Black or Hispanic people reside lead to more crimes being ‘found’  there. Thus, data is likely to suggest that these communities commit a  higher proportion of crimes than they actually do – indirect  discrimination that has been empirically been shown through research  published by &lt;a href="https://www.propublica.org/article/bias-in-criminal-risk-scores-is-mathematically-inevitable-researchers-say"&gt;Pro Publica&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Discrimination may also occur at the stage of &lt;b&gt;data processing&lt;/b&gt;, which is done through a metaphorical &lt;a href="https://www.sentient.ai/blog/understanding-black-box-artificial-intelligence/"&gt;‘black-box’&lt;/a&gt; that accepts inputs and generates outputs without revealing to the  human developer how the data was processed. This conundrum is compounded  by the fact that the algorithms are often utilised to solve an  amorphous problem-which attempts to break down a complex question into a  simple answer. An example is the development of ‘risk profiles’ of  individuals for the  &lt;a href="http://fortune.com/longform/ai-bias-problem/"&gt;determination of insurance premiums.&lt;/a&gt; Data might show that an accident is more likely to take place in inner  cities due  to more densely packed populations in these areas. Racial  and ethnic minorities tend to reside more in these areas, which means  that algorithms could learn that minorities are more likely to get into  accidents, thereby generating an outcome (‘risk profile’) that  indirectly discriminates on grounds of race or ethnicity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It would be wrong to ignore discrimination, both direct and indirect,  that occurs as a result of human prejudice. The key difference between  that and discrimination by AI lies in the ability of other individuals  to compel the decision-maker to explain the factors that lead to the  outcome in question and testing its validity against principles of human  rights. The increasing amounts of discretion and, consequently, power  being delegated to autonomous systems mean that principles of  accountability which audit and check indirect discrimination need to be  built into the design of these systems. In the absence of these  principles, we risk surrendering core tenets of human rights law to the  whims of an algorithmically crafted reality.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/oxford-human-rights-hub-arindrajit-basu-october-23-2018-discrimination-in-the-age-of-artificial-intelligence'&gt;https://cis-india.org/internet-governance/blog/oxford-human-rights-hub-arindrajit-basu-october-23-2018-discrimination-in-the-age-of-artificial-intelligence&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-26T14:47:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/debating-ethics-dignity-and-respect-in-data-driven-life">
    <title>Debating Ethics: Dignity and Respect in Data Driven Life</title>
    <link>https://cis-india.org/internet-governance/news/debating-ethics-dignity-and-respect-in-data-driven-life</link>
    <description>
        &lt;b&gt;Elonnai Hickok was a speaker in the panel "Move Slower and Fix Things" which was part of the 40th International Conference of Data Protection and Privacy Commissioners. The event was organized by International Conference of Data Protection and Privacy Commissioners (ICDPPC) from October 22 - 26, 2018 in Brussels. Elonnai participated in the event on October 24 and 25, 2018.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="https://www.privacyconference2018.org/en/conference/programme#day5"&gt;Click to read about the Programme here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/debating-ethics-dignity-and-respect-in-data-driven-life'&gt;https://cis-india.org/internet-governance/news/debating-ethics-dignity-and-respect-in-data-driven-life&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-11-07T03:03:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-october-14-2018-sales-of-surveillance-cameras-are-soaring-raising-questions-about-privacy">
    <title>Sales of surveillance cameras are soaring, raising questions about privacy</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-october-14-2018-sales-of-surveillance-cameras-are-soaring-raising-questions-about-privacy</link>
    <description>
        &lt;b&gt;The Telangana government wants more eyes on the streets to upgrade Hyderabad’s safety. It has asked enterprises, public sectors, residential associations and individuals to install closed-circuit television cameras (CCTVs) in and around their premises.&lt;/b&gt;
        &lt;p&gt;The article by Rahul Sachitanand was published in &lt;a class="external-link" href="https://economictimes.indiatimes.com/news/politics-and-nation/sales-of-surveillance-cameras-are-soaring-raising-questions-about-privacy-regulation/articleshow/66195866.cms"&gt;Economic Times&lt;/a&gt; on October 14, 2018. Elonnai Hickok was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;More  than a lakh CCTVs are expected to be installed across the city in  the  next few years. The initiative is part of the Nenu Saitham (Telugu  for  Me Too) project — being promoted by Hyderabad Police, which will  monitor  the feed. To ensure that lowquality CCTVs are not installed and  the  project is sustainable, the police has asked citizens to only buy  from  selected vendors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With this move, launched in November 2017, the Telangana govt joins a growing list of governments, corporations, educational institutes, residential buildings and small businesses across the country that are buying such technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to industry estimates, over a million surveillance units were sold every month a couple of years ago. Now it is two million. The Indian market is growing 20-25% annually, say experts. Frost &amp;amp; Sullivan says the security &amp;amp; surveillance market was worth Rs 8,200 crore in FY2017, reached Rs 11,000 crore in FY2018 and is expected to touch Rs 20,000 crore in FY2020.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rise in CCTV coverage can also be observed anecdotally. There’s a steady uptick in CCTV clips circulating on Whatsapp, capturing crimes or funny events that would otherwise have gone undocumented. Many of the sensational crimes recently, including multiple incidents of murder in Tamil Nadu, were captured on CCTV cameras, distilling the pure horror of those moments on our mobile screens, and also offering valuable proof to nail the culprits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The surveillance and security boom is fed by several companies, ranging from homegrown firms such as CP Plus to joint ventures such as Prama Hikvision to multinationals such as Bosch, Panasonic, Honeywell and Axis. The Telangana project, for example, helped Sweden-based Axis Communications widen its India market. It has already installed 1,500 cameras, and more will be installed soon. Other state governments have or are in the process of placing orders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Swedish company says it recently installed cameras and associated technology across a range of large corporate and government establishments across India. “We are at the beginning of a five-year boom cycle for these devices,” says Sudhindra Holla, sales director (India &amp;amp; Saarc), Axis Communications. “We are catering to a rush of orders ranging from large companies with complex security infrastructure to deals from government agencies in small towns such as Nanded and Kolhapur.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Multiple factors are driving the growth in the CCTV segment, says Manu Tiwari, programme manager (automation and electronics practice), Frost and Sullivan. A strong government push to enhance security; purchases for initiatives such as the Smart City project, which covers 100 cities, and the Rs 2,219 crore allocated under the Nirbhaya Fund for women’s safety, which covers eight cities, are some of the growth drivers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Sanjay Kaushik, managing director of security consultancy Netrika Consulting, there is a push to better use CCTV feeds to improve security across India. “While the focus hitherto has been on post facto scouting of footage to find perpetrators, organisations are now trying to be more proactive with their monitoring to spot suspicious people and packages before crimes occur.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This could involve closely looking at footage to spot suspicious movements at places such as malls or airports or using technology to spot suspicious objects left unattended for long periods. Then, there’s also a focus on making sure the cameras are installed correctly. “Recognisability is key. Organisations are being pushed to ensure simple things like camera feeds are free of obstructions, licence plates are visible in feeds and there is adequate lighting,” adds Kaushik. Advances in technology have ensured that CCTV systems are cheaper and more accessible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While large enterprises had taken to such technology earlier, even smaller commercial establishments and private residents now can afford to install security systems. The prices have practically halved over the last couple of years. An entry-level camera is now available for a little over Rs 2,000. “Even the cost of an integrated solution, which was as much as Rs 40,000 to Rs 50,000 three or four years ago, is today available for as little as Rs 15,000,” says Yogesh Dutta, COO of New Delhi-based CP Plus. “A rapid increase in the number of CCTVs sellers and technicians has also helped widen access.” The devices have become popular as it helps law enforcers to tackle crime, he adds.&lt;br /&gt;&lt;br /&gt;CP Plus’s customers include Vedanta Power and Odisha Police, which has also decided to use e-surveillance to enhance security. Frost and Sullivan says small &amp;amp; medium enterprises and large corporations were together the biggest end-user segments in FY18. This segment had a market share of 33%. Residential had a 28% market share; the industrial segment had 18% and the government 13%, it said. Other major end-user segments are hospitality, education and healthcare.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An increase in such surveillance, however, may be double-edged, say privacy advocates. While a blanket coverage using CCTVs may give citizens a feeling of security, India’s rudimentary legislation around who can access these feeds is a problem. Some countries such as the UK and UAE have stricter guidelines on this. Law-enforcement agencies can access such feeds while following up on their investigations, says Supreme Court lawyer Karnika Seth, without procuring a warrant. “As long as it is for this purpose, it is within the purview of the law. However, with the new judgment on privacy, anything more would be a no-go area.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The use of CCTV can potentially impinge on the rights of an individual, says Elonnai Hickok, who heads privacy research at the Centre for Internet and Society, an advocacy outfit in Bengaluru. “Technically speaking, the feed can reveal personal information about an individual, including identity, location and daily patterns. Because the feed captures individuals in public spaces, it is not possible for people to have an opt-out option. The access and use of the data are often unclear.” Regulations are starting to address the use of CCTV imagery in some places. The European Union’s General Data Protection Regulation, for example, has recognised that imagery that identifies an individual is personal data and thus requires lawful, fair and transparent processing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft data protection bill by the Srikrishna committee also says CCTV imagery would be considered personal data. If CCTV cameras are put in place by a private actor, Hickok contends, they would need to adhere to the principles laid out in chapters II and III of the draft — which covers fair and reasonable processing, purpose limitation, collection limitation, lawful processing, notice, data quality, data storage limitation, accountability and consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For feeds used by the state for reasons such as public safety, the consent clause will not apply. But state actors will still need to adhere to the principles laid out in chapter II. If CCTVs are used for the purpose of prevention, detection, investigation and prosecution of a crime, it will be exempt from adhering to the requirements of the bill. However, this use must be backed by a law passed in Parliament and the data cannot be retained once its purpose has been met.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are more legal restrictions if the CCTV application is integrated with capabilities that capture biometrics. "Clear responsibilities and reasons should be enunciated, the policies should be clearly documented and publicised and, importantly, the cost and benefits should be ascertained," Hickock argues. ¡§It is important to have technical safeguards like encryption and procurement guidelines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Legal and privacy issues aside, the commercial aspect is clearly looking bright. Prama Hikvision, a Chinese-Indian joint venture, has invested Rs 100 crore in a factory in Bhiwandi to make 500,000 cameras a month. A second factory, possibly in Telangana, is expected to go on stream soon, with a monthly capacity of 1,50,000 units. "CCTVs have gone from being used by a sliver of companies, primarily banks and jewellers, to being adopted by a much broader audience," says Ashish Dhakan, MD and CEO, Prama Hikvision. "Our client list includes companies in the sectors of transportation, power, petroleum, oil and gas and retail."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another trend market players have spotted is a shift from analog, which used tapes to record footage, to digital systems, where recording time and storage space are not major constraints. "We see continuous enhancement to megapixel (displays) from lowresolution, improved compression technology. This allows more data, more storage capacity, and overall lowering of cost for storage recording devices," says Sharad Yadav, general manager, Honeywell Building Technologies, India. Frost and Sullivan analyst Tiwari lists emerging offerings - including intelligent video surveillance, wireless systems and higher resolution of visuals - as features that will define the next-generation devices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But digital also comes with some dangers. As CCTV cameras go from standalone devices to being digital and connected ones, experts say there is a risk of hacking. Hackers may also be able to use the network as a gateway. This could give hackers access to much more than just the camera feed. "Cybersecurity is a constant focus for us," says Holla of Axis Communications. "While no camera is hackproof, we believe we have built enough capabilities to react to these hacks and quickly release patches to secure them."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others such as Hickok of CIS say more safeguards are required. "Technical safeguards like encryption and procurement guidelines are also important, as has been highlighted by the UK Information Commissioner's Office," she says. Keeping the cameras safe may be as important as safeguarding the lives these devices monitor.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-october-14-2018-sales-of-surveillance-cameras-are-soaring-raising-questions-about-privacy'&gt;https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-october-14-2018-sales-of-surveillance-cameras-are-soaring-raising-questions-about-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-16T14:22:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/bloomberg-quint-pranesh-prakash-october-15-2018-why-data-localisation-might-lead-to-unchecked-surveillance">
    <title>Why Data Localisation Might Lead To Unchecked Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/bloomberg-quint-pranesh-prakash-october-15-2018-why-data-localisation-might-lead-to-unchecked-surveillance</link>
    <description>
        &lt;b&gt;In recent times, there has been a rash of policies and regulations that propose that the data that Indian entities handle be physically stored on servers in India, in some cases exclusively. In other cases, only a copy needs to be stored.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://www.bloombergquint.com/opinion/why-data-localisation-might-lead-to-unchecked-surveillance"&gt;Bloomberg Quint&lt;/a&gt; on October 15, 2018 and also mirrored in the &lt;a class="external-link" href="https://www.thequint.com/voices/opinion/why-data-localisation-might-lead-to-unchecked-surveillance"&gt;Quint&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;In April 2018, the Reserve Bank of India put out a&lt;a href="https://www.rbi.org.in/scripts/NotificationUser.aspx?Id=11244&amp;amp;Mode=0" target="_blank"&gt; circular &lt;/a&gt;requiring that all “data relating to payment systems operated by them are stored in a system only in India” &lt;a href="https://www.bloombergquint.com/business/rbi-sticks-to-oct-15-deadline-for-data-localisation" target="_blank"&gt;within six months&lt;/a&gt;.  Lesser requirements have been imposed on all Indian companies’  accounting data since 2014 (the back-up of the books of account and  other books that are stored electronically must be stored in India, the  broadcasting sector under the Foreign Direct Investment policy, must  locally store subscriber information, and the telecom sector under the  Unified Access licence, may not transfer their subscriber data outside  India).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft e-commerce policy has a wide-ranging requirement  of exclusive local storage for “community data collected by Internet of  Things devices in public space” and “data generated by users in India  from various sources including e-commerce platforms, social media,  search engines, etc.”, as does the draft e-pharmacy regulations, which  stipulate that “the data generated” by e-pharmacy portals be stored only  locally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While companies such as Airtel, Reliance, PhonePe  (majority-owned by Walmart) and Alibaba, have spoken up in support the  government’s data localisation efforts, others like Facebook, Amazon,  Microsoft, and Mastercard have led the way in opposing it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just this week, two U.S. Senators &lt;a href="https://www.bloombergquint.com/business/us-senators-write-to-pm-modi-seek-soft-stance-on-indias-data-localisation" target="_blank"&gt;wrote to&lt;/a&gt; the Prime Minister’s office arguing that the RBI’s data localisation  regulations along with the proposals in the draft e-commerce and cloud  computing policies are “key trade barriers”. In her dissenting note to  the Srikrishna Committee's report, Rama Vedashree of the Data Security  Council of India notes that, “mandating localisation may potentially  become a trade barrier and the key markets for the industry could  mandate similar barriers on data flow to India, which could disrupt the  IT-BPM (information technology-business process management) industry.”&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Justification For Data Localisation&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;What are the reasons for these moves towards data localisation?&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;Given the opacity of policymaking in India, many of the policies and  regulations provide no justification at all.  Even the ones that do,  don’t provide cogent reasoning.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;The  RBI says it needs “unfettered supervisory access” and hence needs data  to be stored in India. However, it fails to state why such unfettered  access is not possible for data stored outside of India.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;As  long as an entity can be compelled by Indian laws to engage in local  data storage, that same entity can also be compelled by that same law to  provide access to their non-local data, which would be just as  effective.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;What  if they don’t provide such access? Would they be blacklisted from  operating in India, just as they would if they didn’t engage in local  data storage? Is there any investigatory benefit to storing data in  India? As any data forensic expert would note, chain of custody and data  integrity are what are most important components of data handling in  fraud investigation, and not physical access to hard drives. It would be  difficult for the government to say that it will block all Google  services if the company doesn’t provide all the data that Indian law  enforcement agencies request from it. However, it would be facile for  the RBI to bar Google Pay from operating in India if Google doesn’t  provide it “unfettered supervisory access” to data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most exhaustive justification of data localisation in any official Indian policy document is that contained in the &lt;a href="http://meity.gov.in/writereaddata/files/Data_Protection_Committee_Report.pdf" target="_blank"&gt;Srikrishna Committee’s report&lt;/a&gt; on data protection. The report argues that there are several benefits to data localisation:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Effective enforcement,&lt;/li&gt;
&lt;li&gt;Avoiding reliance on undersea cables,&lt;/li&gt;
&lt;li&gt;Avoiding foreign surveillance on data stored outside India,&lt;/li&gt;
&lt;li&gt;Building an “Artificial Intelligence ecosystem”&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Of these, the last three reasons are risible.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Not A Barrier To Surveillance&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Requiring  mirroring of personal data on Indian servers will not magically give  rise to experts skilled in statistics, machine learning, or artificial  intelligence, nor will it somehow lead to the development of the  infrastructure needed for AI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  United States and China are both global leaders in AI, yet no one would  argue that China’s data localisation policies have helped it or that  America’s lack of data localisation polices have hampered it.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;On  the question of foreign surveillance, data mirroring will not have any  impact, since the Srikrishna Committee’s recommendation would not  prevent companies from storing most personal data outside of India.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Even  for “sensitive personal data” and for “critical personal data”, which  may be required to be stored in India alone, such measures are unlikely  to prevent agencies like the U.S. National Security Agency or the United  Kingdom’s Government Communications Headquarters from being able to  indulge in extraterritorial surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2013, slides from an  NSA presentation that were leaked by Edward Snowden showed that the  NSA’s “BOUNDLESSINFORMANT” programme collected 12.6 billion instances of  telephony and Internet metadata (for instance, which websites you  visited and who all you called) from India in just one month, making  India one of the top 5 targets.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This shows that technically, surveillance in India is not a challenge for the NSA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So,  forcing data mirroring enhances Indian domestic intelligence agencies’  abilities to engage in surveillance, without doing much to diminish the  abilities of skilled foreign intelligence agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As I have &lt;a href="https://slides.com/pranesh/digital-security-for-journalists#/5/1" target="_blank"&gt;noted in the past&lt;/a&gt;,  the technological solution to reducing mass surveillance is to use  decentralised and federated services with built-in encryption, using  open standards and open source software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reducing reliance on  undersea cables is, just like reducing foreign surveillance on Indians’  data, a laudable goal. However, a mandate of mirroring personal data in  India, which is what the draft Data Protection Bill proposes for all  non-sensitive personal data, will not help. Data will stay within India  if the processing happens within India. However, if the processing  happens outside of India, as is often the case, then undersea cables  will still need to be relied upon.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  better way to keep data within India is to incentivise the creation of  data centres and working towards reducing the cost of internet  interconnection by encouraging more peering among Internet connectivity  providers.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;While  data mirroring will not help in improving the enforcement of any data  protection or privacy law, it will aid Indian law enforcement agencies  in gaining easier access to personal data.&lt;/blockquote&gt;
&lt;h2 style="text-align: justify; "&gt;The MLAT Route&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Currently,  many forms of law enforcement agency requests for data have to go  through onerous channels called ‘mutual legal assistance treaties’.  These MLAT requests take time and are ill-suited to the needs of modern  criminal investigations. However, the U.S., recognising this, passed a  law called the CLOUD Act in March 2018. While the CLOUD Act compels  companies like Google and Amazon, which have data stored in Indian data  centres, to provide that data upon receiving legal requests from U.S.  law enforcement agencies, it also enables easier access to foreign law  enforcement agencies to data stored in the U.S. as long as they fulfill  certain procedural and rule-of-law checks.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;While  the Srikrishna Committee does acknowledge the CLOUD Act in a footnote,  it doesn’t analyse its impact, doesn’t provide suggestions on how India  can do this, and only outlines the negative consequences of MLATs.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Further,  it is inconceivable that the millions of foreign services that Indians  access and provide their personal data to will suddenly find a data  centre in India and will start keeping such personal data in India.  Instead, a much likelier outcome, one which the Srikrishna Committee  doesn’t even examine, is that many smaller web services may find such  requirements too onerous and opt to block users from India, similar to  the way that Indiatimes and the Los Angeles Times opted to block all  readers from the European Union due to the coming into force of the new  data protection law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government could be spending its  political will on finding solutions to the law enforcement agency data  access question, and negotiating solutions at the international level,  especially with the U.S. government. However it is not doing so.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given  this, the recent spate of data localisation policies and regulation can  only be seen as part of an attempt to increase the scope and ease of  the Indian government’s surveillance activities, while India’s privacy  laws still remain very weak and offer inadequate legal protection  against privacy-violating surveillance. Because of this, we should be  wary of such requirements, as well as of the companies that are vocal in  embracing data localisation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/bloomberg-quint-pranesh-prakash-october-15-2018-why-data-localisation-might-lead-to-unchecked-surveillance'&gt;https://cis-india.org/internet-governance/blog/bloomberg-quint-pranesh-prakash-october-15-2018-why-data-localisation-might-lead-to-unchecked-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-16T14:08:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/community-standards-roundtable-conversations">
    <title>Community Standards Roundtable Conversations</title>
    <link>https://cis-india.org/internet-governance/news/community-standards-roundtable-conversations</link>
    <description>
        &lt;b&gt;Ambika Tandon was a participant in a roundtable organized by Facebook, School of Media &amp; Cultural Studies, and Tata Institute of Social Sciences in Bengaluru on October 7, 2018.&lt;/b&gt;
        &lt;p&gt;The agenda for the roundtable was to discuss their community standards, particularly hate speech and harassment, and receive feedback from a feminist and gendered lens. &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/community-standards-roundtable-conversations"&gt;Click&lt;/a&gt; to read more.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/community-standards-roundtable-conversations'&gt;https://cis-india.org/internet-governance/news/community-standards-roundtable-conversations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Hate Speech</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-16T14:01:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/networked-economies-and-gender-action-learning">
    <title>Networked Economies and Gender Action Learning</title>
    <link>https://cis-india.org/internet-governance/news/networked-economies-and-gender-action-learning</link>
    <description>
        &lt;b&gt;Elonnai Hickok, Sunil Abraham and Ambika Tandon participated in a meeting organized by IDRC for grantees under their networked economies programme to discuss gender-based outputs and development outcomes in their work. The event was held in Ottawa on September 20 - 21, 2018, facilitated by Gender at Work.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sunil Abraham, Swaraj Paul Barooah and Ambika Tandon also attended a workshop on Gender Action Learning on September 24 - 25, 2018, which discussed strategies to work on gender under a grant for Cyber Policy Centres. Other organizations present at the workshop were Research ICT Africa, Lirne Asia, and Centre Latam Digital at CIDE,  Mexico. Gender at Work facilitated this workshop as well, and will be  working with all the grantees over a period of 18 months.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/networked-economies-and-gender-action-learning'&gt;https://cis-india.org/internet-governance/news/networked-economies-and-gender-action-learning&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-02T03:10:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-september-27-2018-after-sc-setback-fintech-firms-await-clarity-on-aadhaar">
    <title>After Supreme Court Setback, Fintech Firms Await Clarity On Aadhaar</title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-september-27-2018-after-sc-setback-fintech-firms-await-clarity-on-aadhaar</link>
    <description>
        &lt;b&gt;The 12-digit Aadhaar number is now out of bounds for fintech companies in India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nishant Sharma was &lt;a class="external-link" href="https://www.bloombergquint.com/aadhaar/after-supreme-court-setback-fintech-firms-await-clarity-on-aadhaar"&gt;published in Bloomberg Quint&lt;/a&gt; on September 27, 2018. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/FiEbZcL3lnY" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;With the Supreme Court on Wednesday terming Aadhaar authentication by private companies as “&lt;a href="https://www.bloombergquint.com/law-and-policy/2018/09/26/aadhaar-a-quick-summary-of-the-supreme-court-majority-order" target="_blank"&gt;unconstitutional&lt;/a&gt;”,  companies such as online wallets and e-tailers, among others, will now  have to make changes to how they onboard and verify customers, in  addition to how they transact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a 567-page majority judgment  authored by Justice Sikri and concurred upon by two other judges—Chief  Justice Dipak Misra and Justice AM Khanwilkar—it said that Section 57 of  the Aadhaar Act, which allows private companies to use Aadhaar for  authentication services based on a contract between the corporate and an  individual, would enable commercial exploitation of private data and  hence is unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“What it essentially means is that the  private bodies, such as lending platforms, wallets, or any private  entity, cannot use Aadhaar for authentication,” said Anirudh Rastogi  founder at Ikigai Law (formerly TRA), a law firm that specialises in  representing businesses on data privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The decision is set to  impact private companies right from Flipkart-owned PhonePe, Paytm,  Reliance Jio and Amazon, among others, which rely on Aadhaar for  e-verification. Amazon recently launched cardless equated monthly  installments on Amazon Pay through the digital finance platform Capital  Float and asked customers to provide Aadhaar numbers or virtual ID and  PAN details on the Amazon app for verification.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;'Aadhaar Is Just Another ID'&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Pranesh  Prakash, fellow, Centre for Internet and Society, said that with this  judgment Aadhaar is no longer an identity infrastructure as its creators  have dreamt of. “It is now just another ID.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For those opposed to  Aadhaar, on privacy and security grounds, this may be a part victory.  But for the Fintech industry it stymies the use of quick Aadhaar-based  e-KYC (know your customer norms) to onboard customers. “The fintech  industry thrives on the instant paperless mantra, and this move will  curb its rapid growth, ” Amrish Rau, co-founder of PayU, said in a text  message.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The verdict is also set to push up costs for the  industry. Rau said: “Conducting physical KYC would be a costly affair,  with every physical KYC costing about Rs 100 per person.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies  like PhonePe await more clarity. “We are waiting to hear from bodies  like the Reserve Bank of India, UIDAI on what KYC that will be required  for wallets moving ahead," Sameer Nigam, cofounder of PhonePe, said.  "Whether we go to no KYC, lower limit environment or go to the physical  KYC environment."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  judgment also stated that the identification number will not be  mandatory for opening bank accounts, mobile-phone connections or for  admissions into educational institutions. However, Aadhaar will continue  to be mandatory for the distribution of state-sponsored welfare schemes  including direct benefit transfers and the public distribution system.  Taxpayers will have to link their Permanent Account Numbers to the  biometric database.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Aadhaar-Based KYC: Allowed With Consent?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  Supreme Court has concluded that the part of section 57 which enables  body corporate and individuals also to seek authentication, that too on  the basis of a contract between the individual and such body corporate  or person, would impinge upon the right to privacy of such individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prasanna  S, a Supreme Court advocate and lawyer for one of the petitioners in  the Aadhaar matter interpreted it to mean that even if a customer  voluntarily wants to use Aadhaar for e-KYC, businesses cannot accept it.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;They  have struck down the part of Section 57 that allows use of Aadhaar  based on a contract. A contract, by nature is voluntary, But since the  court has struck down this part, even voluntary use won’t be permitted.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Prasanna S, Advocate, Supreme Court&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Jaitley Hints At Legal Backing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile,  Finance Minister Arun Jaitley on Wednesday hinted that the Centre is  likely to examine whether separate legal backing is needed for Section  57 of the Aadhaar Act, the newswire PTI reported. “So, let us first read  the judgement. There are two-three prohibited areas. Are they because  they are totally prohibited or are they because they need legal  backing,” Jaitley was quoted as saying.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rastogi of Ikigai Law said  that the court has left open for the government to promulgate a law to  enable private parties to use Aadhaar that can withstand judicial  scrutiny.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rahul  Matthan, a technology partner at law firm Trilegal differed with this  view. He said that since the apex court has ruled that private entities  cannot access the Aadhaar infrastructure, it means that even if the  government brings a specific law to allow for that, it would be  unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prasanna agreed with this interpretation.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;The  court has hinted that commercial exploitation of personal information  will fail the proportionality test laid down by it in the Right to  Privacy judgment. This is one of the grounds for them to conclude that  Section 57 is unconstitutional. So even a law is introduced, private  access will be impermissible.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Prasanna S, Advocate, Supreme Court&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Are Aadhaar-Based KYCs Tainted?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Since  the use of Aadhaar by private entities has been struck down, does it  mean entities who have used it for KYC so far have to re-do that  exercise? And data that was collected as part of Aadhaar-based KYC- does  that need to be deleted?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The majority order hasn’t specifically  addressed these questions, Matthan pointed out. But went on to explain  that his reading of the judgment is that the court wants things to  remain as they are.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;The  Supreme Court has said that collection of data before the Aadhaar Act  was introduced is valid. If you follow that sentiment, may be we can  argue that there’s no requirement to delete the data.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Rahul Matthan, Partner, Trilegal&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;Whatever  has been done without the authority of law has to go, Prasanna said.  But this outcome may not be practical and another hearing before the  Supreme Court may be required to clear these questions, he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Private  entities such as the online cab aggregator Ola have already removed  eKYC from its e-wallet when BloombergQuint last checked. Others may  follow suit.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-september-27-2018-after-sc-setback-fintech-firms-await-clarity-on-aadhaar'&gt;https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-september-27-2018-after-sc-setback-fintech-firms-await-clarity-on-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-01T23:39:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cross-border-data-sharing-and-india-a-study-in-processes-content-and-capacity">
    <title>Cross-Border Data Sharing and India: A study in Processes, Content and Capacity</title>
    <link>https://cis-india.org/internet-governance/blog/cross-border-data-sharing-and-india-a-study-in-processes-content-and-capacity</link>
    <description>
        &lt;b&gt;A majority of criminal investigations in the modern era necessitate law enforcement access to electronic evidence stored extra-territorially. The conventional methods of compelling the presentation of evidence available for investigative agencies often fail when the evidence is not present within the territorial boundaries of the state.

&lt;/b&gt;
        &lt;p&gt;&lt;span&gt;The crux of the issue lies in the age old international law tenet of territorial sovereignty.Investigating crimes is a sovereign act and it cannot be exercised in the territory of another country without that country’s consent or through a permissive principle of extra-territorial jurisdiction. Certain countries have explicit statutory provisions which disallow companies incorporated in their territory from disclosing data to foreign jurisdictions. The United States of America, which houses most of the leading technological firms like Google, Apple, Microsoft, Facebook, and Whatsapp, has this requirement.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;This necessitates a consent based international model for cross border data sharing as a completely ad-hoc system of requests for each investigation would be ineffective. Towards this, Mutual Legal Assistance Treaties (MLATs) are the most widely used method for cross border data sharing, with letters rogatory, emergency requests and informal requests being other methods available to most investigators. While recent gambits towards ring-fencing the data within Indian shores might alter the contours of the debate, a sustainable long-term strategy requires a coherent negotiation strategy that enables co-operation with a range of international partners.&lt;/p&gt;
&lt;p&gt;This negotiation strategy needs to be underscored by domestic safeguards that ensure human rights guarantees in compliance with international standards, robust identification and augmentation of  capacity and clear articulation of how India’s strategy lines up with the existing tenets of International law. This report studies the workings of the Mutual Legal Assistance Treaty (MLAT) between the USA and India and identifies hurdles in its existing form, culls out suggestions for improvement and explores how recent legislative developments, such as the CLOUD Act might alter the landscape.&lt;/p&gt;
&lt;p&gt;The path forward lies in undertaking process based reforms within India with an eye on leveraging these developments to articulate a strategically beneficial when negotiating with external partners.As the nature of policing changes to a model that increasingly relies on electronic evidence, India needs to ensure that it’s technical strides made in accessing this evidence is not held back by the lack of an enabling policy environment. While the data localisation provisions introduced in the draft Personal Data Protection Bill may alter the landscape once it becomes law, this paper retains  its relevance in terms of guiding the processes, content and capacity to adequately manoeuvre the present conflict of laws situation and accessing data not belonging to Indians that may be needed for criminal investigations.As a disclaimer,the report and graphics contained within it have been drafted using publicly available information and may not reflect real world practices.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="moz-quote-pre" style="text-align: justify; "&gt;&lt;strong&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/mlat-report"&gt;Click here to download the report&lt;/a&gt;&lt;/strong&gt; With research assistance from Sarath Mathew and Navya Alam and visualisation by Saumyaa Naidu&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cross-border-data-sharing-and-india-a-study-in-processes-content-and-capacity'&gt;https://cis-india.org/internet-governance/blog/cross-border-data-sharing-and-india-a-study-in-processes-content-and-capacity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha, Elonnai Hickok, Udbhav Tiwari and Arindrajit Basu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-09-29T00:37:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/takshashilas-online-cogitatum-on-ai-and-ethics-in-india">
    <title>Takshashila's online Cogitatum on AI and Ethics in India</title>
    <link>https://cis-india.org/internet-governance/news/takshashilas-online-cogitatum-on-ai-and-ethics-in-india</link>
    <description>
        &lt;b&gt;Elonnai Hickok participated in an event organized by Takhshashila on August 27, 2018 and made a presentation on Ethics and AI in India. The event was held in Takshashila Institution &lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/ethics-and-ai"&gt;Click to view the slides&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/takshashilas-online-cogitatum-on-ai-and-ethics-in-india'&gt;https://cis-india.org/internet-governance/news/takshashilas-online-cogitatum-on-ai-and-ethics-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-09-26T01:46:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
