<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 101 to 115.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/data-privacy-and-citizens-rights-symposium-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/medianama-march-18-2019-zaheer-merchant-proposed-intermediary-liability-rules-threat-privacy-and-free-speech"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/seminar-on-201cevolution-of-communication-social-media-beyond201d"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/nullcon-security-conference"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/participation-in-the-meeting-of-bis-litd-17"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/data-infrastructures-inequities-reproductive-health-surveillance-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/dscis-bangalore-chapter-meet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-tushar-kaushik-january-30-2019-conmen-seed-fake-phone-numbers-in-google-to-trap-people-looking-for-customer-care-details"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-co-operation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cyber-policy-centres-meeting-in-sri-lanka"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/scroll-in-january-18-2019-devarsi-ghosh-is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/tini-sara-anien-deccan-herald-january-17-2019-they-know-where-you-are"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/data-privacy-and-citizens-rights-symposium-report">
    <title>Data Privacy and Citizen's Rights' Symposium Report</title>
    <link>https://cis-india.org/internet-governance/news/data-privacy-and-citizens-rights-symposium-report</link>
    <description>
        &lt;b&gt;The Technology Law Forum at the National Academy of Legal Studies and Research (NALSAR) has published the Report on Data Privacy and Citizen's Rights' Symposium. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This report is a compilation of all the speakers' speeches during the  panel discussion. Shweta Mohandas &lt;span&gt;was one of the eight speakers at the panel and the excerpts from her presentation has also been covered in this report. Click to &lt;a class="external-link" href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3356776"&gt;read more&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/data-privacy-and-citizens-rights-symposium-report'&gt;https://cis-india.org/internet-governance/news/data-privacy-and-citizens-rights-symposium-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-04-05T02:24:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/medianama-march-18-2019-zaheer-merchant-proposed-intermediary-liability-rules-threat-privacy-and-free-speech">
    <title>Proposed Intermediary Liability Rules threat to privacy and free speech, global coalition tells MeitY</title>
    <link>https://cis-india.org/internet-governance/news/medianama-march-18-2019-zaheer-merchant-proposed-intermediary-liability-rules-threat-privacy-and-free-speech</link>
    <description>
        &lt;b&gt;“We respectfully call on you to withdraw the draft amendments proposed to the Information Technology (Intermediary Guidelines) Rules in December. As published, the draft amendments would erode digital security and undermine the exercise of human rights globally.”&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Zaheer Merchant was published by &lt;a class="external-link" href="https://www.medianama.com/2019/03/223-proposed-intermediary-liability-rules-threat-to-privacy-and-free-speech-global-coalition-tells-meity/"&gt;Medianama &lt;/a&gt;on March 18, 2019.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;A global coalition of 31 civil society organizations and technology  experts has called on MeitY to reconsider the proposed amendments to the  Intermediary Liability Rules, terming them a threat to privacy and free  speech. In a letter to the ministry dated March 15, the coalition said  that the proposed amendments “would harm fundamental rights and the  space for a free internet, without necessarily addressing the problems  that the ministry aims to resolve.” Some of the signatories are Centre  for Internet and Society, SFLC.in, Internet Freedom Foundation,  Government Accountability Project and Human Rights Watch, among others  (A copy of the letter is attached at the bottom). The letter breaks down  its reasons for opposing the proposed amendments:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. Traceability would undermine security, lead to surveillance&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the proposed guidelines, intermediaries would have to ensure  ‘traceability’ of messages by providing information related to its  originator and receivers. This, the letter argues, would force  intermediaries to undermine the security of of their platforms and  create a surveillance regime. “Undermining security features to ensure  traceability would affect all users of that platform, not just those  that are the subjects of the information request,” the letter reads. “…  such wide and ambiguous powers… on interception of communications would  directly harm the fundamental right to privacy of Indians and facilitate  unchecked surveillance.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. Data retention antithetical to privacy, must go&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The letter also states that the data retention mandate included in  the draft guidelines is antithetical to privacy. The guidelines state  that intermediaries must preserve content requested by law enforcement  for 180 days or longer. This open-ended data retention, the letter  argues, contradicts the principle of ‘Storage Limitation’ recommended by  the Srikrishna Committee. “Provisions regarding storage limitation and  data retention must not be included within the fold of the Intermediary  Guidelines, and should be subject to parliamentary law-making,” the  letter reads.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. Proactive monitoring contradicts SC’s Shreya Singhal judgment, would result in censorship&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The letter also criticizes the requirement that intermediaries  proactively monitor and automatically delete ‘unlawful content’. “[This]  would directly conflict with the legal standard laid down by the  Supreme Court of India in the Shreya Singhal judgment, which holds that  intermediaries should only be legally compelled to take down content on  the basis of court orders or legally empowered government agencies,” the  letter reads. It could also cause intermediaries to err in favor of  takedowns, resulting in unnecessary censorship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“With the upcoming General Elections in India and the imposition of  the Model Code of Conduct on new policy decisions in place, we urge the  government to not push through these amended regulations given their  impact on fundamental rights and secure communications,” the letter  concludes.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;The proposed amendments to Intermediary Liability Rules &lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Released at the end of December 2018, the proposed amendments to the  Intermediary Guidelines would modify guidelines under the Information  Technology Act concerning intermediaries, ostensibly to prevent misuse  of social media platforms and check the spread of fake news. Under  India’s Information Technology Act, any entity, person or platform that  receives, stores, processes, or transmits electronic information on  behalf of another is considered an intermediary. These include social  media platforms, cloud services, internet service providers, email  service providers and more. For an intermediary to avoid liability for  its users’ actions, it must comply with the proposed guidelines which  are being amended to the following:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Traceability, and information within 72 hours:&lt;/b&gt; The  new rules require platforms to introduce traceability to find where a  piece of information originated. For this, platforms may have to break  end-to-end encryption. The rules require the intermediary to hand over  information or assistance to government bodies in 72 hours, including in  matters of security or cybersecurity, and for investigative purposes.  [Rule 3(5)]&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Platforms with more than 50 lakh users are required to be registered&lt;/b&gt; under the Companies Act, have a physical address in the country, have a  nodal officer who will cooperate with law enforcement agencies, etc.  [Rule 3(7)]&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Platforms have to pull down unlawful content&lt;/b&gt; within  a shorter duration of 24 hours from the earlier 36 hours. They also  have to keep records of the “unlawful activity” for 180 days – double  the period of 90 days in the 2011 rules – as required by the court or  government agencies [Rule 3(8)]&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Platforms have to deploy tools&lt;/b&gt; to proactively identify, remove and disable public access to unlawful information or content. [Rule 3(9)]&lt;/li&gt;
&lt;li&gt;&lt;b&gt;The new rules insert a monthly requirement on platforms&lt;/b&gt; to inform users of the platforms’ right to terminate usage rights and  to remove non-compliant information at their own discretion. [Rule 3(4)]&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/medianama-march-18-2019-zaheer-merchant-proposed-intermediary-liability-rules-threat-privacy-and-free-speech'&gt;https://cis-india.org/internet-governance/news/medianama-march-18-2019-zaheer-merchant-proposed-intermediary-liability-rules-threat-privacy-and-free-speech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Zaheer Merchant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-03-20T15:56:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/seminar-on-201cevolution-of-communication-social-media-beyond201d">
    <title>Seminar on “Evolution of communication: Social Media &amp; Beyond”</title>
    <link>https://cis-india.org/internet-governance/news/seminar-on-201cevolution-of-communication-social-media-beyond201d</link>
    <description>
        &lt;b&gt;Sunil Abraham will be a speaker at this event organized by TRAI on March 15 at Hotel Radisson Blu GRT, Near Airport, Chennai. Sunil will be speaking on How should Internet Giants- Social Media, Search engines and ad tech be Regulated.&lt;/b&gt;
        &lt;p&gt;Click to &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/seminar-on-evolution-of-communication"&gt;view the agenda&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/seminar-on-201cevolution-of-communication-social-media-beyond201d'&gt;https://cis-india.org/internet-governance/news/seminar-on-201cevolution-of-communication-social-media-beyond201d&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-03-07T14:52:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/nullcon-security-conference">
    <title>Nullcon Security Conference</title>
    <link>https://cis-india.org/internet-governance/news/nullcon-security-conference</link>
    <description>
        &lt;b&gt;On March 1 and 2, 2019, Karan Saini attended the Nullcon Security Conference organized by Nullcon at Holiday Inn Resort, Mobor Beach, Cavelossim, Salcette, Goa.&lt;/b&gt;
        &lt;p&gt;The schedule of the event can be &lt;a class="external-link" href="https://nullcon.net/website/goa-2019/schedule.php"&gt;accessed here&lt;/a&gt;. Videos of the talks can be &lt;a class="external-link" href="https://www.youtube.com/user/nullcon/videos"&gt;accessed here&lt;/a&gt;. The event was:attended by:&lt;/p&gt;
&lt;div class="imglist"&gt;
&lt;ul class="list-unstyled"&gt;
&lt;li&gt;Security Practitioners (Analysts, Testers, Developers, Cryptographers, Hackers)&lt;/li&gt;
&lt;li&gt;Security Executives (CISOs, CXOs)&lt;/li&gt;
&lt;li&gt;Business Developers and Venture Capitalists (Presidents, Directors, VPs, Consultants)&lt;/li&gt;
&lt;li&gt;Vendor Companies and Sponsors (Hardware, Software, Services)&lt;/li&gt;
&lt;li&gt;Career Seekers and Recruiters (Seasoned Veterans, Students, Expanding Companies &lt;/li&gt;
&lt;li&gt;Academia (Professors, Students)&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify; "&gt;The nullcon conference is a unique platform for security  companies/evangelists to showcase their research and technology. Nullcon  hosts Prototype, Exhibition, Trainings, Free Workshops, null Job Fair  at the conference. It is an integrated and structured platform which  caters to the needs of IT Security industry at large in a comprehensive  way.&lt;/div&gt;
&lt;ul class="list-unstyled"&gt;
&lt;/ul&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/nullcon-security-conference'&gt;https://cis-india.org/internet-governance/news/nullcon-security-conference&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-03-07T14:40:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/participation-in-the-meeting-of-bis-litd-17">
    <title>Participation in the meeting of BIS LITD 17</title>
    <link>https://cis-india.org/internet-governance/news/participation-in-the-meeting-of-bis-litd-17</link>
    <description>
        &lt;b&gt;Gurshabad Grover participated in the fifteenth meeting of the Information Systems Security and Biometrics Sectional Committee (LITD 17) of the Bureau of Indian Standards (BIS), which was conducted online on February 26.&lt;/b&gt;
        &lt;p&gt;Some of the things we discussed included:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Participation of committee members at the ISO level in SC 27 'IT Security Techniques' working groups.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Update from the last SC 27 working group meetings (I updated the committee with some standards I was tracking and my participation as co-rapporteur in the 'Impact of AI on Privacy' study period).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Participation in the next SC 27 working group meetings, which will be held in April (where I will be participating in WG 1 'Information Security Management Systems' and WG 5 'Identity management and privacy technologies' meetings).&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/participation-in-the-meeting-of-bis-litd-17'&gt;https://cis-india.org/internet-governance/news/participation-in-the-meeting-of-bis-litd-17&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-03-03T06:12:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/data-infrastructures-inequities-reproductive-health-surveillance-india">
    <title>Data Infrastructures and Inequities: Why Does Reproductive Health Surveillance in India Need Our Urgent Attention?</title>
    <link>https://cis-india.org/internet-governance/blog/data-infrastructures-inequities-reproductive-health-surveillance-india</link>
    <description>
        &lt;b&gt;In order to bring out certain conceptual and procedural problems with health monitoring in the Indian context, this article by Aayush Rathi and Ambika Tandon posits health monitoring as surveillance and not merely as a “data problem.” Casting a critical feminist lens, the historicity of surveillance practices unveils the gendered power differentials wedded into taken-for-granted “benign” monitoring processes. The unpacking of the Mother and Child Tracking System and the National Health Stack reveals the neo-liberal aspirations of the Indian state. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The article was first published by &lt;a href="https://www.epw.in/engage/article/data-infrastructures-inequities-why-does-reproductive-health-surveillance-india-need-urgent-attention" target="_blank"&gt;EPW Engage, Vol. 54, Issue No. 6&lt;/a&gt;, on 9 February 2019.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;Framing Reproductive Health as a Surveillance Question&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The approach of the postcolonial Indian state to healthcare has been Malthusian, with the prioritisation of family planning and birth control (Hodges 2004). Supported by the notion of socio-economic development arising out of a “modernisation” paradigm, the target-based approach to achieving reduced fertility rates has shaped India’s reproductive and child health (RCH) programme (Simon-Kumar 2006).&lt;/p&gt;
&lt;p&gt;This is also the context in which India’s abortion law, the Medical Termination of Pregnancy (MTP) Act, was framed in 1971, placing the decisional privacy of women seeking abortions in the hands of registered medical practitioners. The framing of the MTP act invisibilises females seeking abortions for non-medical reasons within the legal framework. The exclusionary provisions only exacerbated existing gaps in health provisioning, as access to safe and legal abortions had already been curtailed by severe geographic inequalities in funding, infrastructure, and human resources. The state has concomitantly been unable to meet contraceptive needs of married couples or reduce maternal and infant mortality rates in large parts of the country, mediating access along the lines of class, social status, education, and age (Sanneving et al 2013).&lt;/p&gt;
&lt;p&gt;While the official narrative around the RCH programme transitioned to focus on universal access to healthcare in the 1990s, the target-based approach continues to shape the reality on the ground. The provision of reproductive healthcare has been deeply unequal and, in some cases, in hospitals. These targets have been known to be met through the practice of forced, and often unsafe, sterilisation, in conditions of absence of adequate provisions or trained professionals, pre-sterilisation counselling, or alternative forms of contraception (Sama and PLD 2018). Further, patients have regularly been provided cash incentives, foreclosing the notion of free consent, especially given that the target population of these camps has been women from marginalised economic classes in rural India.&lt;/p&gt;
&lt;p&gt;Placing surveillance studies within a feminist praxis allows us to frame the reproductive health landscape as more than just an ill-conceived, benign monitoring structure. The critical lens becomes useful for highlighting that taken-for-granted structures of monitoring are wedded with power differentials: genetic screening in fertility clinics, identification documents such as birth certificates, and full-body screeners are just some of the manifestations of this (Adrejevic 2015). Emerging conversations around feminist surveillance studies highlight that these data systems are neither benign nor free of gendered implications (Andrejevic 2015). In continual remaking of the social, corporeal body as a data actor in society, such practices render some bodies normative and obfuscate others, based on categorisations put in place by the surveiller.&lt;/p&gt;
&lt;p&gt;In fact, the history of surveillance can be traced back to the colonial state where it took the form of systematic sexual and gendered violence enacted upon indigenous populations in order to render them compliant (Rifkin 2011; Morgensen 2011). Surveillance, then, manifests as a “scientific” rationalisation of complex social hieroglyphs (such as reproductive health) into formats enabling administrative interventions by the modern state. Lyon (2001) has also emphasised how the body emerged as the site of surveillance in order for the disciplining of the “irrational, sensual body”—essential to the functioning of the modern nation-state—to effectively happen.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Questioning the Information and Communications Technology for Development (ICT4D) and Big Data for Development (BD4D) Rhetoric&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Information and Communications Technology (ICT) and data-driven approaches to the development of a robust health information system, and by extension, welfare, have been offered as solutions to these inequities and exclusions in access to maternal and reproductive healthcare in the country.&lt;/p&gt;
&lt;p&gt;The move towards data-driven development in the country commenced with the introduction of the Health Management Information System in Andhra Pradesh in 2008, and the Mother and Child Tracking System (MCTS) nationally in 2011. These are reproductive health information systems (HIS) that collect granular data about each pregnancy from the antenatal to the post-natal period, at the level of each sub-centre as well as primary and community health centre. The introduction of HIS comprised cross-sectoral digitisation measures that were a part of the larger national push towards e-governance; along with health, thirty other distinct areas of governance, from land records to banking to employment, were identified for this move towards the digitalised provisioning of services (MeitY 2015).&lt;/p&gt;
&lt;p&gt;The HIS have been seen as playing a critical role in the ecosystem of health service provision globally. HIS-based interventions in reproductive health programming have been envisioned as a means of: (i) improving access to services in the context of a healthcare system ridden with inequalities; (ii) improving the quality of services provided, and (iii) producing better quality data to facilitate the objectives of India’s RCH programme, including family planning and population control. Accordingly, starting 2018, the MCTS is being replaced by the RCH portal in a phased manner. The RCH portal, in areas where the ANMOL (ANM Online) application has been introduced, captures data real-time through tablets provided to health workers (MoHFW 2015).&lt;/p&gt;
&lt;p&gt;A proposal to mandatorily link the Aadhaar with data on pregnancies and abortions through the MCTS/RCH has been made by the union minister for Women and Child Development as a deterrent to gender-biased sex selection (Tembhekar 2016). The proposal stems from the prohibition of gender-biased sex selection provided under the Pre-Conception and Pre-Natal Diagnostics Techniques (PCPNDT) Act, 1994. The approach taken so far under the PCPNDT Act, 2014 has been to regulate the use of technologies involved in sex determination. However, the steady decline in the national sex ratio since the passage of the PCPNDT Act provides a clear indication that the regulation of such technology has been largely ineffective. A national policy linking Aadhaar with abortions would be aimed at discouraging gender-biased sex selection through state surveillance, in direct violation of a female’s right to decisional privacy with regards to their own body.&lt;/p&gt;
&lt;p&gt;Linking Aadhaar would also be used as a mechanism to enable direct benefit transfer (DBT) to the beneficiaries of the national maternal benefits scheme. Linking reproductive health services to the Aadhaar ecosystem has been critiqued because it is exclusionary towards women with legitimate claims towards abortions and other reproductive services and benefits, and it heightens the risk of data breaches in a cultural fabric that already stigmatises abortions. The bodies on which this stigma is disproportionately placed, unmarried or disabled females, for instance, experience the harms of visibility through centralised surveillance mechanisms more acutely than others by being penalised for their deviance from cultural expectations.&amp;nbsp; This is in accordance with the theory of "data extremes,” wherein marginalised communities are seen as&amp;nbsp; living on the extremes of&amp;nbsp; data capture, leading to a data regime that either refuses to recognise them as legitimate entities or subjects them to overpolicing in order to discipline deviance (Arora 2016). In both developed and developing contexts, the broader purpose of identity management has largely been to demarcate legitimate and illegitimate actors within a population, either within the framework of security or welfare.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Potential Harms of the Data Model of Reproductive Health Provisioning&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Informational privacy and decisional privacy are critically shaped by data flows and security within the MCTS/RCH. No standards for data sharing and storage, or anonymisation and encryption of data have been implemented despite role-based authentication (NHSRC and Taurus Glocal 2011). The risks of this architectural design are further amplified in the context of the RCH/ANMOL where data is captured real-time. In the absence of adequate safeguards against data leaks, real-time data capture risks the publicising of reproductive health choices in an already stigmatised environment. This opens up avenues for further dilution of autonomy in making future reproductive health choices.&lt;/p&gt;
&lt;p&gt;Several core principles of informational privacy, such as limitations regarding data collection and usage, or informed consent, also need to be reworked within this context.&lt;sup&gt;[1]&lt;/sup&gt; For instance, the centrality of the requirement of “free, informed consent” by an individual would need to be replaced by other models, especially in the context of reproductive health of&amp;nbsp; rape survivors who are vulnerable and therefore unable to exercise full agency. The ability to make a free and informed choice, already dismantled in the context of contemporary data regimes, gets further precluded in such contexts. The constraints on privacy in decisions regarding the body are then replicated in the domain of reproductive data collection.&lt;/p&gt;
&lt;p&gt;What is uniform across these digitisation initiatives is their treatment of maternal and reproductive health as solely a medical event, framed as a data scarcity problem. In doing so, they tend to amplify the understanding of reproductive health through measurable indicators that ignore social determinants of health. For instance, several studies conducted in the rural Indian context have shown that the degree of women’s autonomy influences the degree of usage of pregnancy care, and that the uptake of pregnancy care was associated with village-level indicators such as economic development, provisioning of basic infrastructure and social cohesion. These contextual factors get overridden in pervasive surveillance systems that treat reproductive healthcare as comprising only of measurable indicators and behaviours, that are dependent on individual behaviour of practitioners and women themselves, rather than structural gaps within the system.&lt;/p&gt;
&lt;p&gt;While traditionally associated with state governance, the contemporary surveillance regime is experienced as distinct from its earlier forms due to its reliance on a nexus between surveillance by the state and private institutions and actors, with both legal frameworks and material apparatuses for data collection and sharing (Shepherd 2017). As with historical forms of surveillance, the harms of contemporary data regimes accrue disproportionately among already marginalised and dissenting communities and individuals. Data-driven surveillance has been critiqued for its excesses in multiple contexts globally, including in the domains of predictive policing, health management, and targeted advertising (Mason 2015). In the attempts to achieve these objectives, surveillance systems have been criticised for their reliance on replicating past patterns, reifying proximity to a hetero-patriarchal norm (Haggerty and Ericson 2000). Under data-driven surveillance systems, this proximity informs the preexisting boxes of identity for which algorithmic representations of the individual are formed. The boxes are defined contingent on the distinct objectives of the particular surveillance project, collating disparate pieces of data flows and resulting in the recasting of the singular offline self into various 'data doubles' (Haggerty and Ericson 2000). Refractive, rather than reflective, the data doubles have implications for the physical, embodied life of individual with an increasing number of service provisioning relying on the data doubles (Lyon 2001). Consider, for instance, apps on menstruation, fertility, and health, and wearables such as fitness trackers and pacers, that support corporate agendas around what a woman’s healthy body should look, be or behave like (Lupton 2014). Once viewed through the lens of power relations, the fetishised, apolitical notion of the data “revolution” gives way to what we may better understand as “dataveillance.”&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Towards a Networked State and a Neo-liberal Citizen&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Following in this tradition of ICT being treated as the solution to problems plaguing India’s public health information system, a larger, all-pervasive healthcare ecosystem is now being proposed by the Indian state (NITI Aayog 2018). Termed the National Health Stack, it seeks to create a centralised electronic repository of health records of Indian citizens with the aim of capturing every instance of healthcare service usage. Among other functions, it also envisions a platform for the provisioning of health and wellness-based services that may be dispensed by public or private actors in an attempt to achieve universal health coverage. By allowing private parties to utilise the data collected through pullable open application program interfaces (APIs), it also fits within the larger framework of the National Health Policy 2017 that envisions the private sector playing a significant role in the provision of healthcare in India. It also then fits within the state–private sector nexus that characterises dataveillance. This, in turn, follows broader trends towards market-driven solutions and private financing of health sector reform measures that have already had profound consequences on the political economy of healthcare worldwide (Joe et al 2018).&lt;/p&gt;
&lt;p&gt;These initiatives are, in many ways, emblematic of the growing adoption of network governance reform by the Indian state (Newman 2001). This is a stark shift from its traditional posturing as the hegemonic sovereign nation state. This shift entails the delayering from large, hierarchical and unitary government systems to horizontally arranged, more flexible, relatively dispersed systems.&lt;sup&gt;[2]&lt;/sup&gt; The former govern through the power of rules and law, while the latter take the shape of self-regulating networks such as public–private contractual arrangements (Snellen 2005). ICTs have been posited as an effective tool in enabling the transition to network governance by enhancing local governance and interactive policymaking enabling the co-production of knowledge (Ferlie et al 2011). The development of these capabilities is also critical to addressing “wicked problems” such as healthcare (Rittel and Webber 1973).&lt;sup&gt;[3]&lt;/sup&gt; The application of the techno-deterministic, data-driven model to reproductive healthcare provision, then, resembles a fetishised approach to technological change. The NHSRC describes this as the collection of data without an objective, leading to a disproportional burden on data collection over use (NHSRC and Taurus Glocal 2011).&lt;/p&gt;
&lt;p&gt;The blurring of the functions of state and private actors is reflective of the neo-liberal ethic, which produces new practices of governmentality. Within the neo-liberal framework of reproductive healthcare, the citizen is constructed as an individual actor, with agency over and responsibility for their own health and well-being (Maturo et al 2016).&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;“Quantified Self” of the Neo-liberal Citizen&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Nowhere can the manifestation of this neo-liberal citizen can be seen as clearly as in the “quantified self” movement. The quantified self movement refers to the emergence of a whole range of apps that enable the user to track bodily functions and record data to achieve wellness and health goals, including menstruation, fertility, pregnancies, and health indicators in the mother and baby. Lupton (2015) labels this as the emergence of the “digitised reproductive citizen,” who is expected to be attentive to her fertility and sexual behaviour to achieve better reproductive health goals. The practice of collecting data around reproductive health is not new to the individual or the state, as has been demonstrated by the discussion above. What is new in this regime of datafication under the self-tracking movement is the monetisation of reproductive health data by private actors, the labour for which is performed by the user. Focusing on embodiment draws attention to different kinds of exploitation engendered by reproductive health apps. Not only is data about the body collected and sold, the unpaid labour for collection is extracted from the user. The reproductive body can then be understood as a cyborg, or a woman-machine hybrid, systematically digitising its bodily functions for profit-making within the capitalist (re)production machine (Fotoloulou 2016). Accordingly, all major reproductive health tracking apps have a business model that relies on selling information about users for direct marketing of products around reproductive health and well-being (Felizi and Varon nd).&lt;/p&gt;
&lt;p&gt;As has been pointed out in the case of big data more broadly, reproductive health applications (apps) facilitate the visibility of the female reproductive body in the public domain. Supplying anonymised data sets to medical researchers and universities fills some of the historical gaps in research around the female body and reproductive health. Reproductive and sexual health tracking apps globally provide their users a platform to engage with biomedical information around sexual and reproductive health. Through group chats on the platform, they are also able to engage with experiential knowledge of sexual and reproductive health. This could also help form transnational networks of solidarity around the body and health&amp;nbsp; (Fotopoulou 2016).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This radical potential of network-building around reproductive and sexual health is, however, tempered to a large extent by the reconfiguration of gendered stereotypes through these apps. In a study on reproductive health apps on Google Play Store, Lupton (2014) finds that products targeted towards female users are marketed through the discourse of risk and vulnerability, while those targeted towards male users are framed within that of virility. Apart from reiterating gendered stereotypes around the male and female body, such a discourse assumes that the entire labour of family planning is performed by females. This same is the case with the MCTS/RCH.&lt;/p&gt;
&lt;p&gt;Technological interventions such as reproductive health apps as well as HIS are based on the assumption that females have perfect control over decisions regarding their own bodies and reproductive health, despite this being disproved in India. The Guttmacher Institute (2014) has found that 60% of women in India report not having control over decisions regarding their own healthcare. The failure to account for the husband or the family as stakeholder in decision-making around reproductive health has been a historical failure of the family planning programme in India, and is now being replicated in other modalities. This notion of an autonomous citizen who is able to take responsibility of their own reproductive health and well-being does not hold true in the Indian context. It can even be seen as marginalising females who have already been excluded from the reproductive health system, as they are held responsible for their own inability to access healthcare.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Concluding Remarks&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The interplay that emerges between reproductive health surveillance and data infrastructures is a complex one. It requires the careful positioning of the political nature of data collection and processing as well as its hetero-patriarchal and colonial legacies, within the need for effective utilisation of data for achieving developmental goals. Assessing this discourse through a feminist lens identifies the web of power relations in data regimes. This problematises narratives of technological solutions for welfare provision.&lt;/p&gt;
&lt;p&gt;The reproductive healthcare framework in India then offers up a useful case study to assess these concerns. The growing adoption of ICT-based surveillance tools to equalise access to healthcare needs to be understood in the socio-economic, legal, and cultural context where these tools are being implemented. Increased surveillance has historically been associated with causing the structural gendered violence that it is now being offered as a solution to. This is a function of normative standards being constructed for reproductive behaviour that necessarily leave out broader definitions of reproductive health and welfare when viewed through a feminist lens. Within the larger context of health policymaking in India, moves towards privatisation then demonstrate the peculiarity of dataveillance as it functions through an unaccountable and pervasive overlapping of state and private surveillance practises. It remains to be seen how these trends in ICT-driven health policies affect access to reproductive rights and decisional privacy for millions of females in India and other parts of the global South.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/data-infrastructures-inequities-reproductive-health-surveillance-india'&gt;https://cis-india.org/internet-governance/blog/data-infrastructures-inequities-reproductive-health-surveillance-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi and Ambika Tandon</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>BD4D</dc:subject>
    
    
        <dc:subject>Healthcare</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    

   <dc:date>2019-12-30T16:44:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/dscis-bangalore-chapter-meet">
    <title>DSCI's Bangalore chapter meet</title>
    <link>https://cis-india.org/internet-governance/news/dscis-bangalore-chapter-meet</link>
    <description>
        &lt;b&gt;On January 29, 2019, Karan Saini and Gurshabad Grover participated in the Bangalore chapter meet organized by Data Security Council of India in Bangalore.&lt;/b&gt;
        &lt;p&gt;&lt;img src="https://cis-india.org/home-images/DSCI.png/@@images/5964984e-07ca-4be0-8a63-98b2490b5032.png" alt="DSCI" class="image-inline" title="DSCI" /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/dscis-bangalore-chapter-meet'&gt;https://cis-india.org/internet-governance/news/dscis-bangalore-chapter-meet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-02-02T01:47:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-tushar-kaushik-january-30-2019-conmen-seed-fake-phone-numbers-in-google-to-trap-people-looking-for-customer-care-details">
    <title>Conmen seed fake phone numbers in Google to trap people looking for customer care details</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-tushar-kaushik-january-30-2019-conmen-seed-fake-phone-numbers-in-google-to-trap-people-looking-for-customer-care-details</link>
    <description>
        &lt;b&gt;Googling for anything might seem like a good idea, but searching for contacts of businesses and customer care numbers is landing people in the hands of conmen.&lt;/b&gt;
        &lt;p&gt;The article by Tushar Kaushik was published in &lt;a class="external-link" href="https://economictimes.indiatimes.com/news/politics-and-nation/conmen-seed-fake-phone-numbers-in-google-to-trap-people-looking-for-customer-care-details/articleshow/67751196.cms"&gt;Economic Times&lt;/a&gt; on January 30, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Many use Google or other search engines for specific contact numbers — the customer care numbers of a bank, for instance. The search results do not throw up bona fide numbers, but those of conmen waiting to lure a victim. The conmen, knowing what the caller is seeking, and on the pretext of helping, cunningly makes them part with information such as bank account, debit/credit card and even the OTP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;About 20-odd people have been duped in this manner in the past month in Bengaluru, according to the city’s cybercrime police. About 20-30 victims have fallen prey in Gurugram in the last one-and-a-half months. In Maharashtra and Hyderabad, the trend of fake numbers being seeded on Google Maps and being used to dupe people is being observed since October 2018. The frauds are helped by the fact that any user can edit contact information on Google Maps. The Maharashtra cyber police reportedly notified Google authorities regarding this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Inspector and in-charge of cyber police station at Gurugram, Anand Kumar, said another variant of such cases was on the rise. People searching for contacts to help them return products they bought from e-commerce websites have been led to fake numbers. “In the past one-and-half months, about 20-30 such complaints have been received,” Kumar said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Srinivas Kodali, a Hyderabad-based data security researcher, said similar incidents using fake numbers being uploaded on Google Maps had occurred in Hyderabad 2-3 months ago. He claimed Google had been informed of the incidents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Illustrating another instance of the way Google searches are misused, dairy brand Amul issued a legal notice to Google, alleging that a series of fake B2B campaigns regarding Amul Parlours and Distributors have started through fake websites using Google search ads since September 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bengaluru-based app developer and co-founder of TBG Labs Harsha Halvi said it was fairly easy for any conman to seed his own number and masquerade as a contact number and make it appear in a Google search. He said all it takes is a very good understanding of search engine optimisation (SEO).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gurshabad Grover, senior policy officer at The Centre for Internet and Society, Bengaluru, said, “The problem right now is Google is not making it clear whether something is verified information or is crowdsourced. On Google Maps, businesses can be claimed by legitimate owners. A suggestion is that Google verify the claimed entities,” Grover said. He added that people too should exercise vigilance while accessing information online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additional commissioner of police (crime) at Bengaluru Alok Kumar said Google could not be held responsible for such incidents as individuals seeded the fake numbers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reacting to the incidents, a spokesperson from Google India said, “Overall, allowing users to suggest edits provides comprehensive and up-to-date info, but we recognise there may be occasional inaccuracies or bad edits suggested by users.” The spokesperson said when such issues are reported to Google, the claims are investigated and action is taken in line with the findings.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-tushar-kaushik-january-30-2019-conmen-seed-fake-phone-numbers-in-google-to-trap-people-looking-for-customer-care-details'&gt;https://cis-india.org/internet-governance/news/economic-times-tushar-kaushik-january-30-2019-conmen-seed-fake-phone-numbers-in-google-to-trap-people-looking-for-customer-care-details&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-02-01T15:22:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers">
    <title>India’s largest bank SBI leaked account data on millions of customers</title>
    <link>https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers</link>
    <description>
        &lt;b&gt;India’s largest bank has secured an unprotected server that allowed anyone to access financial information on millions of its customers, like bank balances and recent transactions.&lt;/b&gt;
        &lt;p id="speakable-summary" style="text-align: justify; "&gt;The blog post by Zack Whittaker was &lt;a class="external-link" href="https://techcrunch.com/2019/01/30/state-bank-india-data-leak/"&gt;published Tech Crunch&lt;/a&gt; on January 30, 2019. Karan Saini was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The server, hosted in a regional Mumbai-based data  center, stored two months of data from SBI Quick, a text message and  call-based system used to request basic information about their bank  accounts by customers of &lt;a href="https://www.crunchbase.com/organization/state-bank-of-india#section-overview"&gt;the government-owned State Bank of India&lt;/a&gt; (SBI), the largest bank in the country and a highly ranked company in the Fortune 500.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But  the bank had not protected the server with a password, allowing anyone  who knew where to look to access the data on millions of customers’  information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s not known for how long the server was open, but  long enough for it to be discovered by a security researcher, who told  TechCrunch of the leak, but did not want to be named for the story.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;SBI  Quick allows SBI’s banking customers to text the bank, or make a missed  call, to retrieve information back by text message about their finances  and accounts. It’s ideal for millions of the banking giant’s customers  who don’t use smartphones or have limited data service. By using  predefined keywords, like “BAL” for a customer’s current balance, the  service recognizes the customer’s registered phone number and will send  back the current amount in that customer’s bank account. The system can  also be used to send back the last five transactions, block an ATM card  and make inquiries about home or car loans.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was the back-end text message system that was exposed, TechCrunch can confirm, storing millions of text messages each day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/SBI.png" alt="SBI" class="image-inline" title="SBI" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A redacted example of some of the banking and credit information found in the database (Image: TechCrunch)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The passwordless database allowed us to see all of the text messages  going to customers in real time, including their phone numbers, bank  balances and recent transactions. The database also contained the  customer’s partial bank account number. Some would say when a check had  been cashed, and many of the bank’s sent messages included a link to  download SBI’s YONO app for internet banking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bank sent out close to three million text messages on Monday alone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  database also had daily archives of millions of text messages each,  going back to December, allowing anyone with access a detailed view into  millions of customers’ finances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We verified the data by asking India-based security researcher &lt;a href="https://twitter.com/iasni"&gt;Karan Saini&lt;/a&gt; to send a text message to the system. Within seconds, we found his  phone number in the database, including the text message he received  back.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The data available could potentially be used to profile and  target individuals that are known to have high account balances,” said  Saini in a message to TechCrunch. Saini previously &lt;a href="https://www.zdnet.com/article/another-data-leak-hits-india-aadhaar-biometric-database/"&gt;found a data leak&lt;/a&gt; in India’s Aadhaar, the country’s national identity database, and &lt;a href="https://www.zdnet.com/article/uber-security-flaw-two-factor-login-bypass/"&gt;a two-factor bypass bug&lt;/a&gt; in Uber’s ridesharing app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saini  said that knowing a phone number “could be used to aid social  engineering attacks — which is one of the most common attack vectors in  the country with regard to financial fraud,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;SBI &lt;a href="https://www.sbichicago.com/about-us/about-sbi"&gt;claims more than&lt;/a&gt; 500 million customers across the glob,e with 740 million accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just  days earlier, SBI accused Aadhaar’s authority, UIDAI, of mishandling  citizen data that allowed fake Aadhaar identity cards to be created,  despite &lt;a href="https://www.tribuneindia.com/news/nation/uidai-says-tribune-story-misreporting--read-how-that-is-wrong/523478.html"&gt;numerous security lapses&lt;/a&gt; and misuse of the system. UIDAI denied the report, saying there was “no security breach” of its system. (UIDAI often uses &lt;a href="https://twitter.com/UIDAI/status/1023543590033608705"&gt;the term “fake news”&lt;/a&gt; to describe coverage it doesn’t like.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TechCrunch  reached out to SBI and India’s National Critical Information  Infrastructure Protection Centre, which receives vulnerability reports  for the banking sector. The database was secured overnight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite several emails, SBI did not comment prior to publication.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers'&gt;https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-02-01T15:13:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-co-operation">
    <title>CIS Submission to UN High Level Panel on Digital Co-operation</title>
    <link>https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-co-operation</link>
    <description>
        &lt;b&gt;The High-level Panel on Digital Cooperation was convened by the UN Secretary-General to advance proposals to strengthen cooperation in the digital space among Governments, the private sector, civil society, international organizations, academia, the technical community and other relevant stakeholders. The Panel issued a call for input that called for responses to various questions. CIS responded to the call for inputs.&lt;/b&gt;
        &lt;p&gt;Download the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/submission-to-un-high-level-panel-on-digital-cooperation"&gt;submission here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-co-operation'&gt;https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-co-operation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi, Ambika Tandon, Arindrajit Basu and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2019-02-19T01:41:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india">
    <title>Submitted Your Biometrics for Aadhaar? Here’s How You Can Lock/Unlock That Data</title>
    <link>https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india</link>
    <description>
        &lt;b&gt;Did you know that UIDAI provides a facility that allows users to lock/unlock their Aadhaar biometric data online?&lt;/b&gt;
        &lt;p&gt;The blog post by Vidya Raja was &lt;a class="external-link" href="https://www.thebetterindia.com/170550/aadhaar-biometric-privacy-safety-online-india/"&gt;published in the Better India&lt;/a&gt; on January 24, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Imagine someone hacking into your Netflix account – all you have to do is change the password. However, if there is a security &lt;a href="https://www.thebetterindia.com/99520/aadhaar-card-right-over-our-body-privacy-government/" rel="noopener" target="_blank"&gt;breach&lt;/a&gt; with respect to your biometric details, there is no reversing it.  So think carefully about how and where you submit your details.  While the Supreme Court has said that it is no longer mandatory to  link Aadhaar with your bank accounts or your telecom service provider,  it does not lessen the importance of Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Policy Director, The Centre for Internet &amp;amp; Society, in a report published in &lt;a href="https://www.livemint.com/Money/YD7dqEVRJbrqoAs3h4PuJO/Are-biometrics-hackproof.html" rel="noopener" target="_blank"&gt;The Mint&lt;/a&gt;,  says, “Biometric devices are not hack-proof. It depends on the ease  with which this can be done. In Malaysia, thieves who stole a car with a  fingerprint-based ignition system simply chopped off the owner’s  finger. When a biometric attendance system was introduced at the  Institute of Chemical Technology (ICT) in Mumbai, students continued  giving proxies by using moulds made from Fevicol.”  Over the last year, there has been so much chatter about the Aadhaar number and how one can protect one’s information.&lt;/p&gt;
&lt;p&gt;Did you know that UIDAI provides a facility that allows users to lock/unlock their Aadhaar biometric data online?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;In this article, we explain how you can do that.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Locking biometrics online:&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Visit UIDAI’s &lt;a href="https://uidai.gov.in/" rel="noopener" target="_blank"&gt;online&lt;/a&gt; portal to lock or unlock your biometrics&lt;/li&gt;
&lt;li&gt;Once there, you will need to click on ‘My Aadhaar’ and under the Aadhaar Services tab, click on Lock/Unlock Biometrics&lt;/li&gt;
&lt;li&gt;You will then be redirected to a new page and prompted to enter the 12-digit Aadhaar number and the security code&lt;/li&gt;
&lt;li&gt;Once the details have been entered, click on ‘Send OTP’&lt;/li&gt;
&lt;li&gt;You will receive an OTP on your registered mobile number&lt;/li&gt;
&lt;li&gt;Enter this and click on the Login button&lt;/li&gt;
&lt;li&gt;This feature will allow you to lock your biometrics&lt;/li&gt;
&lt;li&gt;Enter the 4-digit security code mentioned on the screen and click on the ‘Enable’ button&lt;/li&gt;
&lt;li&gt;Your biometrics will be locked, and you will have to unlock it in case you want to access it again&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Unlocking biometrics online:&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;To unlock your biometrics, click on the ‘Login’ button&lt;/li&gt;
&lt;li&gt;Enter your Aadhaar number and the security code in the designated spaces&lt;/li&gt;
&lt;li&gt;Now click on ‘Send OTP’&lt;/li&gt;
&lt;li&gt;An OTP will be sent to your registered mobile number&lt;/li&gt;
&lt;li&gt;Enter it in the space provided and click on ‘Login’&lt;/li&gt;
&lt;li&gt;In case you want to temporarily unlock the biometrics, enter the security code and click on the unlock button&lt;/li&gt;
&lt;li&gt;Your biometrics will be unlocked for 10 minutes&lt;/li&gt;
&lt;li&gt;The locking date and time is mentioned on the screen after which biometrics will be automatically locked&lt;/li&gt;
&lt;li&gt;When you do not want to lock your biometrics, you can disable the lock permanently.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Using mAadhaar to lock/unlock biometrics:&lt;/h2&gt;
&lt;p&gt;mAadhaar is the official mobile application developed by the Unique  Identification Authority of India (UIDAI). Presently, it is available on  the &lt;a href="https://play.google.com/store/apps/details?id=in.gov.uidai.mAadhaarPlus&amp;amp;hl=en_IN" rel="noopener" target="_blank"&gt;Android&lt;/a&gt; platform.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Once the mAadhaar app has been downloaded, the user must use their Aadhaar card registered mobile number to login.&lt;/li&gt;
&lt;li&gt;You will then be sent an OTP that you are required to enter for  authentication. Do remember to change your password once registered.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;On the top right side, tap on ‘Biometric lock’, and enter your  password to lock the biometrics. Once locked, it will show a small lock  icon next to your profile.&lt;/li&gt;
&lt;li&gt;To unlock, tap on the same icon followed by your password. The  information will unlock for 10 minutes. After that, it will be locked  again.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Once you lock this information, it ensures that even the Aadhaar  holder will not be able to use their biometric data (iris scan and  fingerprints) for authentication, until unlocked.&lt;/li&gt;
&lt;li&gt;If you try to use this information without unlocking, it will show you an error code 330.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Remember to lock and unlock your biometrics through a trusted  channel. The fact that there is no fee involved in either exercise will  make this easier. Also, even with the biometric locked, you can continue  to use the OTP-based authentication process for transactions, where you  will receive the OTP on your registered mobile number and e-mail  address.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(Edited by Shruti Singhal)&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india'&gt;https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-02-02T02:09:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cyber-policy-centres-meeting-in-sri-lanka">
    <title>Cyber Policy Centres Meeting in Sri Lanka</title>
    <link>https://cis-india.org/internet-governance/news/cyber-policy-centres-meeting-in-sri-lanka</link>
    <description>
        &lt;b&gt;Elonnai Hickok, Sunil Abraham and Ambika Tandon participated in this event organized by IDRC in Sri Lanka on January 11 - 14, 2019.&lt;/b&gt;
        &lt;ul&gt;
&lt;li&gt;Download the agenda &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cpc-gathering-agenda.pdf"&gt;here&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;See the presentation &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/idrc-privacy-project"&gt;here&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cyber-policy-centres-meeting-in-sri-lanka'&gt;https://cis-india.org/internet-governance/news/cyber-policy-centres-meeting-in-sri-lanka&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-01-21T23:50:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/scroll-in-january-18-2019-devarsi-ghosh-is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data">
    <title>Is the viral #10YearChallenge just another sneaky way for tech firms to gather users’ personal data?</title>
    <link>https://cis-india.org/internet-governance/news/scroll-in-january-18-2019-devarsi-ghosh-is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data</link>
    <description>
        &lt;b&gt;Is it merely an exercise in nostalgia? Or is it providing fodder for facial recognition algorithms on ageing?&lt;/b&gt;
        &lt;p&gt;The blog post by Devarsi Ghosh was published in &lt;a class="external-link" href="https://scroll.in/article/909752/is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data"&gt;Scroll.in&lt;/a&gt; on January 18, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“I like to look back at old memories and smile,” said the  25-year-old Kolkata resident Smitakshi Chowdhury. That’s what prompted  her to upload a decade-old photo of herself alongside a recent one on  Facebook last week without much thought. Chowdhury is among tens of  thousands of people who have participated in the “&lt;a href="https://scroll.in/article/909665/anil-kapoor-doesnt-need-it-twitter-replaces-10yearchallenge-nostalgia-with-jokes"&gt;ten year challenge&lt;/a&gt;”  that has gone viral in recent days as social media users nostalgically  display “then” and “now” images of themselves to the world.&lt;/p&gt;
&lt;p&gt;Among the prominent Indian personalities who showed how they’d changed over the decade were movie stars &lt;a class="link-external" href="https://www.instagram.com/p/BsrDsqwlNuk/?utm_source=ig_embed&amp;amp;utm_campaign=embed_loading_state_script" rel="nofollow" target="_blank"&gt;Sonam Kapoor&lt;/a&gt;, &lt;a class="link-external" href="https://www.instagram.com/p/BspkR1mAr2u/?utm_source=ig_embed&amp;amp;utm_campaign=embed_loading_state_script" rel="nofollow" target="_blank"&gt;Diana Penty&lt;/a&gt; and Shruti Haasan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But is there a darker design to this initiative to get social media  users to  sportlingly show what a difference a decade can make? On  January 15, an article in &lt;i&gt;&lt;a class="link-external" href="https://www.wired.com/story/facebook-10-year-meme-challenge/" rel="nofollow" target="_blank"&gt;Wired&lt;/a&gt;&lt;/i&gt; suggested that the fad could be an ingenious ploy to gather data on a  person’s age or how people age over time. The article by technology  writer Kate O’Neill noted that data obtained in this way could be put to  a variety of purposes, some benign such as targeted advertising, and  some not so harmless.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Age progression could someday factor into insurance  assessment and health care,” O’Neill writes. “For example, if you seem  to be ageing faster than your cohorts, perhaps you’re not a very good  insurance risk. You may pay more or be denied coverage.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This hypothesis set off &lt;a class="link-external" href="https://twitter.com/search?q=facial+recogniton+facebook" rel="nofollow" target="_blank"&gt;a frenzy&lt;/a&gt;, as social media users issued warnings against participating in the challenge. But others noted that Facebook &lt;a class="link-external" href="https://www.theatlantic.com/technology/archive/2019/01/go-ahead-do-10yearschallenge/580624/" rel="nofollow" target="_blank"&gt;already has photographs&lt;/a&gt; of many long-time users from 10 years ago or more. It was also pointed  out that the metadata of images posted online contains information about  the date on which the photo was taken, where it was shot and the unique  identification number of the photo device – even though most people  don’t realise this. With so much information already out there, there  isn’t much the 10-Year Challenge could add.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Facebook has spookily sophisticated face-recognition technology, as  anyone who’s seen Facebook’s automatic tagging software at work will  tell you,” wrote Max Read in &lt;i&gt;&lt;a class="link-external" href="http://nymag.com/intelligencer/2019/01/facebook-doesnt-need-to-fool-you.html" rel="nofollow" target="_blank"&gt;New York Magazine&lt;/a&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The debate has revolved around not only what tech companies know about  social media users but how they share this information. For instance,  Facebook’s facial tagging system identifies people in images to third  parties, making it &lt;a class="link-external" href="http://fortune.com/2019/01/04/google-face-scanning-illinois/" rel="nofollow" target="_blank"&gt; susceptible to misuse&lt;/a&gt;. In fact, Facebook had been storing data obtained through facial recognition software since 2011, &lt;a class="link-external" href="https://www.theverge.com/2018/4/17/17246222/facebook-bipa-fines-penalty-tag-suggestions-facial-recognition" rel="nofollow" target="_blank"&gt;without notifying or obtaining consent&lt;/a&gt; from its users. It was only in February 2018 that it gave users the chance to opt out of the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook, on its part, in an official statement, said that it was not involved with the 10-Year Challenge.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;Possibilities of misuse&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While  personal information uploaded online could potentially be misused in  several ways, that does not mean just about any doomsday scenario is  feasible, said Pranesh Prakash of the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Insurance  companies always try to gather as much information as they can about a  person to weed out bad risks but governments regulate these companies on  the matter of what they can or cannot use,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, in 2018, the Delhi High Court ruled that insurance companies &lt;a href="https://scroll.in/pulse/872035/delhi-on-insurance-for-genetic-disorders-still-allows-many-conditions-to-be-excluded"&gt;could not deny coverage to a person&lt;/a&gt; based on their genetic history, he noted. However, the contradictory  ruling also said that if a disorder was established after genetic  testing, the insurance company could deny coverage or demand higher  premiums.&lt;/p&gt;
&lt;p&gt;Prakash suggested a more dire situation. “Suppose the  data produced from the 10-Year Challenge is used to improve the quality  of deepfakes and that is put into making pornography about you against  your will?” he said. “That business, unlike insurance, is unregulated.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, the prospect of a person’s rate of ageing being  calculated by algorithms could also be beneficial. “If a medical AI  [artificial intelligence] company figures out your health looking at the  data based on your face and detects early skin cancer, would anyone be  complaining about this?” asked Shashank Bijapur, co-founder of  SpotDraft, a Gurgaon-based company that creates and manages legal  contracts using artificial intelligence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He noted that while it is  impractical to expect businesses to ignore the opportunity to use such  data to their advantage, social media users should  make informed  decisions while signing up on platforms. “Every such app online has a  privacy policy which is made available to whoever is using it right at  the beginning,” Bijapur said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/scroll-in-january-18-2019-devarsi-ghosh-is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data'&gt;https://cis-india.org/internet-governance/news/scroll-in-january-18-2019-devarsi-ghosh-is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-02-02T13:57:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears">
    <title>Oyo Hotels’ Real-Time Digital Record Database Sparks Privacy Fears</title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears</link>
    <description>
        &lt;b&gt;Oyo Hotels’ pilot to maintain a real-time digital database of guests and plan to share it with law-enforcement agencies has triggered privacy concerns.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nishant Sharma was &lt;a class="external-link" href="https://www.bloombergquint.com/business/oyos-real-time-digital-record-database-sparks-privacy-fears"&gt;published by Bloomberg Quint&lt;/a&gt; on January 16, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The digital check-in and check-out database of guests will do away with the conventional arrival and departure registers, &lt;a href="https://www.bloombergquint.com/technology/former-indigo-president-aditya-ghosh-roped-in-as-ceo-of-oyo-hotels" target="_blank"&gt;Aditya Ghosh, chief executive India and South Asia at the hotel chain&lt;/a&gt; said at a CII event, according to a &lt;a href="https://www.business-standard.com/article/companies/oyo-s-digital-records-to-give-state-govts-law-enforcers-info-on-guests-119011400888_1.html" target="_blank"&gt;report&lt;/a&gt; in Business Standard. That will make the process efficient and  transparent and the SoftBank-backed startup has received acceptance from  governments of Haryana, Rajasthan and Telangana for the proposed  digitisation of guest entry and departure records, the report said  quoting Ghosh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That triggered an outrage on social media, with users calling it invasion of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Oyo,  in an emailed statement to BloombergQuint, said it will provide  information to the law-enforcement agencies about who is staying only  after an information order is issued by the police. The company said it  will create “stronger data security net”. Oyo, however, didn't clarify  who will maintain the data centres.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Centralisation of data of any  kind isn't good and will make data more fragile, Sunil Abraham, founder  of research think tank Center for Internet and Society, told  BloombergQuint. “If someone manages to break into the police data, or  where the data is stored then they will be able to have the access to  the data. It is always good to store data locally.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just last  year, Marriott International Inc. reported a hack in which passport  numbers, emails and mailing addresses of 327 million of its 500 million  Starwood guests was leaked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To be sure, police always have access  to data of customers staying at hotels, one way or the another. As per  existing regulations, all hotels, bed and breakfasts and guest-houses  have to make an entry of guests checking in and out in a register. This  can be checked by the local police when an information order is  presented.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chances of manipulating information in such a register  is high, and at times police go through the data without having an  information order as well, said an industry executive requesting  anonymity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Srinivas Kodali, a cybersecurity expert, said such a  centralised database makes business sense for Oyo because they will get  access to data not just of people who booked through them but also of  others who checked in without booking online. “Because there is no law,  the entities can do it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, a technology policy  analyst and affiliated fellow at CIS, sees this as an invasion of  privacy in the absence of law. Digitisation of data can be allowed only  after there’s a law on what happens in the case it’s misused. There is  no legal framework about how and where the data will be used, he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears'&gt;https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-01-18T02:26:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/tini-sara-anien-deccan-herald-january-17-2019-they-know-where-you-are">
    <title>They know where you are</title>
    <link>https://cis-india.org/internet-governance/news/tini-sara-anien-deccan-herald-january-17-2019-they-know-where-you-are</link>
    <description>
        &lt;b&gt;With hotel-booking app routinely sharing real-time guest data with police and government, lives of those fleeing persecution is in danger, privacy advocates fear.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Tini Sara Anien was published in &lt;a class="external-link" href="https://www.deccanherald.com/metrolife/they-know-where-you-are-713535.html"&gt;Deccan Herald&lt;/a&gt; on January 17, 2019. Aayush Rathi was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Oyo Rooms, the online hotel room booking service, has been receiving brickbats since it disclosed this week that it was sharing real-time data of guests with the police and the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet and legal experts in Bengaluru say it is a breach of informational privacy, granted as a fundamental right by the Constitution. Couples running away from hostile families and individuals escaping religious and political persecution are at huge risk if their whereabouts are shared, they say.&lt;/p&gt;
&lt;p&gt;Aayush Rathi, policy officer with Centre for Internet and Society, finds the sharing of live guest data disturbing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Hotels have always maintained records. Earlier, when information from hotels was needed, a specific query had to be raised by law enforcement, pursuant to an ongoing case. The registry represents a significant departure by facilitating the collection of this data by law enforcement without cause,” he says.&lt;/p&gt;
&lt;p&gt;He also rues the lack of transparency about what the government will do with such data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The government is already collecting a lot of data and has little direction on what to do with it. There is no clarity on how this information will be used and protected. The government might say it is necessary for security, a very broad umbrella term, but in the absence of regulations, the data can be used for purposes little to do with security,” says Rathi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The service had initially marketed itself as a couple-friendly service, while across the country, unmarried, inter-faith couples face various challenges finding a room. “This targeting could get even more enhanced,” he fears.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, passport details were leaked from a popular hotel chain. The leaked data from hotel bookings can be used for multifarious purposes, ranging from selling to potential advertisers to identity theft,” Rathi says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lawyer-researcher Nayantara Ranganathan, from the Internet Democracy Project, says the argument that sharing data improves privacy is “absolutely disingenuous.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Sharing all guest records in real-time to state governments and law enforcement is shocking and most definitely a breach of privacy,” she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the state getting access to such information with the promise of preventive policing, there is no telling how data is going to be used, she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She finds it bizarre that a private company is proactively sharing data, especially at a time when companies are “waking up to the fact that their consumers value their privacy.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why it endangers lives&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Vinay Sreenivasa, lawyer and member of Alternative Law Forum, says providing access to such information is ‘criminal.’ “A couple could be running away from moral policing after an inter-caste marriage and people might be tracking them, or someone might be going through a divorce and just need some privacy. There could be several reasons why one seeks a room and such data could put lives at risk,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court has clearly stated one’s data is one’s own and consent has to be taken when any personal information is used. The government has no business accessing such information, he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/tini-sara-anien-deccan-herald-january-17-2019-they-know-where-you-are'&gt;https://cis-india.org/internet-governance/news/tini-sara-anien-deccan-herald-january-17-2019-they-know-where-you-are&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-01-18T02:14:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
