<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 251 to 265.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/should-aadhaar-be-mandatory"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/masking-personal-data-to-protect-privacy-crucial-for-india-say-experts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deadline-for-linking-bank-accounts-with-aadhaar-to-be-extended-to-31-march"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/artificial-intelligence-literature-review"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-december-3-2017-"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/aadhaar-linking-deadline-approaches-here-are-all-the-myths-and-facts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-december-1-2017-inclusive-co-regulatory-approach-possible-building-indias-data-protection-regime"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/figi-symposium-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/data-protection-and-privacy-in-india-the-fundamental-right-way"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/roundtable-on-data-integrity-and-privacy"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/should-aadhaar-be-mandatory">
    <title>Should Aadhaar be mandatory?</title>
    <link>https://cis-india.org/internet-governance/blog/should-aadhaar-be-mandatory</link>
    <description>
        &lt;b&gt;This week, a constitutional bench of the Supreme Court will adjudicate on limited questions of stay orders in the Aadhaar case. After numerous attempts by the petitioners in the Aadhaar case, the court has agreed to hear this matter, just shy of the looming deadline of December 31 for the linking of Aadhaar numbers to avail government services and benefits. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.deccanherald.com/content/647320/should-aadhaar-mandatory.html"&gt;Deccan Herald&lt;/a&gt; on December 9, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Getting their day in the court to hear interim matters is but a small victory in what has been a long and frustrating fight for the petitioners. In 2012, Justice K S Puttaswamy, a former Karnataka High Court judge, filed a petition before the Supreme Court questioning the validity of the Aadhaar project due its lack of legislative basis (the Aadhaar Act was passed by Parliament in 2016) and its transgressions on our fundamental rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over time, a number of other petitions also made their way to the apex court challenging different aspects of the Aadhaar project. Since then, five different interim orders of the Supreme Court have stated that no person should suffer because they do not have an Aadhaar number.&lt;br /&gt;&lt;br /&gt;Aadhaar, according to the Supreme Court, could not be made mandatory to avail benefits and services from government schemes. Further, the court has limited the use of Aadhaar to only specific schemes, namely LPG, PDS, MNREGA, National Social Assistance Program, the Pradhan Mantri Jan Dhan Yojna and EPFO.&lt;br /&gt;&lt;br /&gt;The then Attorney General, Mukul Rohatgi, in a hearing before the court in July 2015 stated that there is no constitutionally guaranteed right to privacy. But the judgement by the nine-judge bench earlier this year was an emphatic endorsement of the constitutional right to privacy.&lt;br /&gt;&lt;br /&gt;In the course of a 547-page judgement, the bench affirmed the fundamental nature of the right to privacy, reading it into the values of dignity and liberty.&lt;br /&gt;&lt;br /&gt;Yet months after the judgement, the Supreme Court has failed to hear arguments in the Aadhaar matter. The reference to a larger bench and subsequent deferrals have since delayed the entire matter, even as the government has moved to make Aadhaar mandatory for a number of government schemes.&lt;br /&gt;&lt;br /&gt;At this point, up to 140 government services have made linking with Aadhaar mandatory to avail these services. Chief Justice of India Dipak Misra has promised a constitution bench this week, likely to look only into interim matters of stay on the deadline of Aadhaar-linking. It is likely that the hearings for the final arguments are still some months away. The refusal of the court to adjudicate on this issue has been extremely disappointing, and a grave disservice to the court's intended role as the champion of individual rights.&lt;br /&gt;&lt;br /&gt;It is worth noting that the interim orders by the Supreme Court that no person should suffer because they do not have an Aadhaar number, and limiting its use only to specified schemes, still stand.&lt;br /&gt;&lt;br /&gt;However, since the passage of the Aadhaar Act, which allows the use of Aadhaar by both private and public parties, permits making it mandatory for availing any benefits, subsidies and services funded by the Consolidated Fund of India, the spate of services for which Aadhaar has been made mandatory suggests that as per the government, the Aadhaar Act has, in effect, nullified the orders by the Supreme Court.&lt;br /&gt;&lt;br /&gt;This was stated in so many words by Union Law Minister Ravi Shankar Prasad in the Rajya Sabha in April. This view is an erroneous one. While acts of Parliament can supersede previous judicial orders, they must do so either through an express statement in the objects of the Act, or implied when the two are mutually incompatible. In this case, the Aadhaar Act, while permitting the government authorities to make Aadhaar mandatory, does not impose a clear duty to do so.&lt;br /&gt;&lt;br /&gt;Therefore, reading the orders and the legislation together leads one to the conclusion that all instances of Aadhaar being made mandatory under the Aadhaar Act are void.&lt;br /&gt;&lt;br /&gt;The question may be more complicated for cases where Aadhaar has been made mandatory through other legislations, such as Prevention of Money Laundering Act, as they clearly mandate the linking of Aadhaar numbers, rather than merely allowing it. However, despite repeated appeals of the petitioners, the court has so far refused to engage with the question of the legality of such instances.  &lt;br /&gt;&lt;br /&gt;How may the issues finally be resolved? When the court deigns to hear final arguments, the Aadhaar case will be instructive in how the court defines the contours of the right to privacy. The right to privacy judgement, while instructive in its exposition of the different aspects of privacy, does not delve deeply into the question of what may be legitimate limitations on this right.&lt;br /&gt;&lt;br /&gt;In one of the passages of the judgement, "ensuring that scarce public resources are not dissipated by the diversion of resources to persons who do not qualify as recipients" is mentioned as an example of a legitimate incursion into the right to privacy. However, it must be remembered that none of the opinions in the privacy judgement were majority judgements.&lt;br /&gt;&lt;br /&gt;Therefore, in future cases, lawyers and judges must parse through the various opinions to arrive at an understanding of the majority opinion, supported by five or more judges. While the privacy judgement was a landmark one, its actual impact on the rights discourse and on matters like Aadhaar will depend extensively on the how the judges choose to interpret it.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/should-aadhaar-be-mandatory'&gt;https://cis-india.org/internet-governance/blog/should-aadhaar-be-mandatory&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-12-18T15:54:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts">
    <title>Checks and balances needed for mass surveillance of citizens, say experts</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts</link>
    <description>
        &lt;b&gt;A number of measures are required to protect law-abiding citizens from mass surveillance and misuse of their personal data, according to top technology and legal experts. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Peerzada Abrar was &lt;a class="external-link" href="http://www.thehindu.com/business/Industry/checks-and-balances-needed-for-mass-surveillance-of-citizens-say-experts/article21381478.ece"&gt;published in the Hindu&lt;/a&gt; on December 9, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The measures include issuing of tokens by the Unique Identification  Authority of India (UIDAI) instead of Aadhaar numbers and having an  official in the judiciary give permission to vigilance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  experts were participating in a panel discussion on ‘Navigating Big Data  Challenges’ at Carnegie India’s Global Technology Summit here. They  also said there was a need to implement ‘de-identification of data’ or  preventing a person’s identity from being connected with information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  moderator of the discussion was Justice B.N. Srikrishna, a former  Supreme Court judge, who was also heading a government-appointed  committee of experts to identify “key &lt;a href="http://www.thehindu.com/tag/1401-1400-1349/data-protection/?utm=bodytag"&gt;&lt;b&gt;data protection &lt;/b&gt;&lt;/a&gt;issues”  and recommend methods to address them. Justice Srikrishna told the  panellists that Aadhaar or the unique identification number had  empowered the people. But in situations where the State wants all the  information about citizens from different service providers because of  its suspicions related to terrorism or criminal activity, he asked, what  is the method to create a balance?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Surveillance is like salt in  cooking which is essential in tiny quantities, but counterproductive  even if slightly in excess,” responded Sunil Abraham, executive director  of Bengaluru-based think tank, Centre for Internet and Society. He said  there was a need to make a surveillance system which had privacy by  design built into it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Abraham said that his organisation had  proposed to the UIDAI that it used ‘tokenisation,’ which meant that  whenever there was a ‘know your customer’ requirement, the Aadhaar  number was not accessed by organisations like telecom firms or the  banks. Instead, when the citizens used various services via smart cards  or pins, a token got generated, which was controlled by the UIDAI.  Organisations like banks and telecom firms can store those token numbers  in their database. He said this would make it harder for unauthorised  parties to combine databases. But at the same time would enable law  enforcement agencies to combine database using the appropriate  authorizations and infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“UIDAI is considering this,  they call it the dummy Aadhaar numbers. We need technical as well as  institutional checks and balances,” said Mr. Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Countries  like the U.S also have processes like Foreign Intelligence Surveillance  Court (FISA court) which entertains applications made by the U.S  Government for approval of electronic surveillance, physical search, and  certain other forms of investigative actions for foreign intelligence  purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“My concern is that in the current system, surveillance  can be done by the State machinery. I don’t necessarily suggest FISA  court.... but some kind of mechanism where (one can’t) be held at the  mercy of incestuous State machinery,” said Rahul Matthan, a partner at  law firm Trilegal. “But have some second person who is outside the  influence of this system (and) who actually says ‘yes this is a  terrorist which requires us to do mass surveillance,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Artificial Intelligence&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A  large amount of information or Big data ranging from financial, health  to political insights of people is being collected by different  organisations and service providers which is sitting in different silos.  All of this is likely going to be linked through Aadhaar. Mr.  Srikrishna asked what if a situation arises where all of this data is  aggregated and using artificial intelligence and machine learning, one  is able to analyse it and profile individuals. He said “would that be  not a terrifying scenario” where the State can act super-monitor for  citizens. He asked how can citizens be guarded against it?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr.Srikrishna  was referring to the ‘Social Credit System’ proposed by the Chinese  government for creating a national reputation system to rate the  trustworthiness of its citizens including their economic and social  status. It works as a mass surveillance tool and uses big data analysis  technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is a possibility. What stands in the way of it  becoming a reality (in India) is a robust law,” said Mr.Matthan.  “Technology is so powerful that it could equally be used for good as  well as bad.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts'&gt;https://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-december-9-2017-checks-and-balances-needed-to-mass-surveillance-of-citizens-say-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-12-16T14:32:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/masking-personal-data-to-protect-privacy-crucial-for-india-say-experts">
    <title>Masking personal data to protect privacy crucial for India, say experts</title>
    <link>https://cis-india.org/internet-governance/news/masking-personal-data-to-protect-privacy-crucial-for-india-say-experts</link>
    <description>
        &lt;b&gt;Finding a way to protect privacy is critical, with the Supreme Court hearing petitions challenging the mandatory linking of Aadhaar to avail various social and welfare benefits.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Deepti Govind was published in &lt;a class="external-link" href="http://www.livemint.com/Technology/CTcE0FEunaE0aouBIYoqMJ/Masking-personal-data-to-protect-privacy-crucial-for-India.html"&gt;Livemint&lt;/a&gt; on December 11, 2017&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Using  the concept of de-identification to protect an individual’s right to  privacy and creating laws that constantly re-evaluates the difference  between harmful and good use of data is crucial for India, according to  an expert panel on data privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That could mean developing a  token system that lets the Unique Identification Authority of India  (UIDAI) hold a master-list of data through Aadhaar, while generating  token numbers for all other Know Your Customer (KYC) requirements,  suggested the panel at the Global Technology Summit hosted by think-tank  Carnegie India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If we can implement de-identification principles  in government collection and storage of data, even if that data is  displayed on the website it cannot be correlated to an individual. And  if it can’t be correlated to an individual then immediately that data is  not as dangerous as it could be,” said Rahul Matthan, partner at  Trilegal and a &lt;i&gt;Mint&lt;/i&gt; columnist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In theory, de-identification  could include anything from deleting or masking personal identifiers,  like names, to generalizing or suppressing others, like an individual’s  pin code.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finding a way to protect privacy is critical for India,  with the Supreme Court hearing petitions challenging the mandatory  linking of Aadhaar to avail various social and welfare benefits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One  of the grounds for challenge is that the use of biometric information  of an individual encroaches upon the individual’s privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  Centre for Internet and Society, a Bengaluru-based research  organisation, proposed that the UIDAI use tokens for KYC requirements.  Under this method an individual can use a smart card and a personal  identification number (PIN), rather than biometrics, at a  UIDAI-controlled booth and generate a token number. That token number  can be submitted to a telephone operator or a bank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“UIDAI is  currently considering this. They call it the dummy or virtual Aadhaar  numbers. Under this a single agency cannot pull off the surveillance  completely by themselves. So there is both a technical and institutional  check,” said Sunil Abraham, executive director of the Centre for  Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another method could be shifting the emphasis to revoking consent rather than grant of consent to collect and store data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This could be done using the same method that currently exists to  filter unwanted calls and messages on phones via the do-not-disturb  registry. But over and above these, creating the right regulatory  framework is important.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It has become absolutely necessary  to have in place a law which governs the usage of misuse of data,” said  former Supreme Court justice B.N. Srikrishna.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Srikrishna used to  head a 10-member committee of experts constituted by the government to  study various issues related to data protection, make specific  suggestions on the principles to be considered and suggest a draft data  protection bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The data protection law must balance the  interests of all three stakeholders—the common citizens, data collectors  and the state—and not focus on just one or two, Srikrishna said on  Friday. There should also be methods in place to penalize or impose  fines on companies or agencies in case of data breaches or misuses, he  added. But imposing fines is not the ideal solution, according to  experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It’s really critical that we think about building in  incentives to do better. If every violation results in a huge penalty,  for instance, then the posture of companies will be a secretive,  protective, legal defence posture rather than one that strives to  constantly improve practices and technologies,” said Facebook Inc.’s  global deputy chief privacy officer, Stephen Deadman.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/masking-personal-data-to-protect-privacy-crucial-for-india-say-experts'&gt;https://cis-india.org/internet-governance/news/masking-personal-data-to-protect-privacy-crucial-for-india-say-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-12-16T14:27:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deadline-for-linking-bank-accounts-with-aadhaar-to-be-extended-to-31-march">
    <title>Deadline For Linking Bank Accounts With Aadhaar To Be Extended To 31 March </title>
    <link>https://cis-india.org/internet-governance/news/deadline-for-linking-bank-accounts-with-aadhaar-to-be-extended-to-31-march</link>
    <description>
        &lt;b&gt;The government does away with the existing deadline of 31 December for linking of bank accounts with Aadhaar and PAN&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Komal Gupta and Ramya Nair was published in &lt;a class="external-link" href="http://www.livemint.com/Politics/EtNWlheQgO5lhQXF7qVfyH/Deadline-for-linking-bank-accounts-with-Aadhaar-to-be-extend.html"&gt;Livemint&lt;/a&gt; on December 14, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The government on Wednesday extended the deadline for linking  of bank accounts with Aadhaar to 31 March, in line with its submission  to the Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The earlier deadline was 31 December.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bank  account holders will have to furnish their 12-digit unique biometric  identity number and Permanent account number or PAN by 31 March or  within six months of opening the account, whichever is earlier, said a  statement from the finance ministry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This will provide temporary  relief to crores of bank account holders who had not linked their bank  accounts with the 12-digit unique identity number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last week, the  income tax department had extended the deadline for linking of Aadhaar  with the permanent account number to 31 March from 31 December.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  move comes a day before a Constitution bench of the Supreme Court   starts hearing the issue of stay against mandatory linking of Aadhaar  with bank accounts and mobile phone numbers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The statement added  that the bank account will cease to be operational in case of failure to  furnish Aadhaar and PAN as on 31 March or at the end of six months. The  account will become operational again only after the furnishing of  documents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is just a gesture from the government, seeking to  avoid the court granting an interim stay against the mandatory linkage  of Aadhaar with bank accounts. This apparent extension won’t truly help  ordinary people, who will continue being harassed through constant  messages urging them to provide their Aadhaar number to continue  receiving entitlements, services, and for access to one’s own money,”  said Pranesh Prakash, policy director at the Centre for Internet and  Society, a Bengaluru-based think tank.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deadline-for-linking-bank-accounts-with-aadhaar-to-be-extended-to-31-march'&gt;https://cis-india.org/internet-governance/news/deadline-for-linking-bank-accounts-with-aadhaar-to-be-extended-to-31-march&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-12-16T13:24:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/artificial-intelligence-literature-review">
    <title>Artificial Intelligence - Literature Review</title>
    <link>https://cis-india.org/internet-governance/blog/artificial-intelligence-literature-review</link>
    <description>
        &lt;b&gt;With origins dating back to the 1950s Artificial Intelligence (AI) is not necessarily new. However, interest in AI has been rekindled over the last few years, in no small measure due to the rapid advancement of the technology and its applications to real- world scenarios. In order to create policy in the field, understanding the literature regarding existing legal and regulatory parameters is necessary. This Literature Review is the first in a series of reports that seeks to map the development of AI, both generally and in specific sectors, culminating in a stakeholder analysis and contributions to policy-making. This Review analyses literature on the historical development of the technology, its compositional makeup, sector- specific impacts and solutions and finally, overarching regulatory solutions.&lt;/b&gt;
        &lt;p&gt;Edited by Amber Sinha and Udbhav Tiwari; Research Assistance by Sidharth Ray&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;With origins dating back to the 1950s Artificial Intelligence (AI) is not necessarily new. With an increasing number of real-world implications over the last few years, however, interest in AI has been reignited over the last few years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rapid and dynamic pace of development of AI have made it difficult to predict its future path and is enabling it to alter our world in ways we have yet to comprehend. This has resulted in law and policy having stayed one step behind the development of the technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Understanding and analyzing existing literature on AI is a necessary precursor to subsequently recommending policy on the matter. By examining academic articles, policy papers, news articles, and position papers from across the globe, this literature review aims to provide an overview of AI from multiple perspectives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The structure taken by the literature review is as follows:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Overview of historical development&lt;/li&gt;
&lt;li&gt;Definitional and compositional analysis&lt;/li&gt;
&lt;li&gt;Ethical &amp;amp; Social, Legal, Economic and Political impact and sector-specific solutions&lt;/li&gt;
&lt;li&gt;The regulatory way forward&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This literature review is a first step in understanding the existing paradigms and debates around AI before narrowing the focus to more specific applications and subsequently, policy-recommendations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/artificial-intelligence-literature-review"&gt;&lt;b&gt;Download the full literature review&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/artificial-intelligence-literature-review'&gt;https://cis-india.org/internet-governance/blog/artificial-intelligence-literature-review&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shruthi Anand</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-12-18T15:12:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-december-3-2017-">
    <title>Breeding misinformation in virtual space</title>
    <link>https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-december-3-2017-</link>
    <description>
        &lt;b&gt;A well-informed citizenry and institutions that provide good information are fundamental to a functional democracy.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The phenomenon of fake news has rece-ived significant sc-holarly and  media attention over the last few years. In March, Sir Tim Berners Lee,  inventor of the World Wide Web, has called for a crackdown on fake news,  stating in an open letter that “misinformation, or fake news, which is  surprising, shocking, or designed to appeal to our biases, can spread  like wildfire.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gartner, which annually predicts what the next year in technology  will look like, highlighted ‘increased fake news’  as one of its  predictions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report states that by 2022, “majority of individuals in mature  economies will consume more false information than true information. Due  to its wide popularity and reach, social media has come to play a  central role in the fake news debate.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Researchers have suggested that rumours penetrate deeper within a  social network than outside, indicating the susceptibility of this  medium. Social networks such as Facebook and communities on messaging  services such as Whats-App groups provide the perfect environment for  spreading rumours. Information received via friends tends to be trusted,  and online networks allow in-dividuals to transmit information to many  friends at once.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to understand the recent phenomenon of fake news, it is  important to recognise that the problem of misinformation and propaganda  has existed for a long time. The historical examples of fake news go  back centuries where, prior to his coronation as Roman Emperor, Octavian  ran a disinformation campaign against Marcus Antonius to turn the Roman  populace against him.&lt;/p&gt;
&lt;p class="imgCenter" style="text-align: justify; "&gt;&lt;a class="objectNew"&gt;&lt;img alt="aa" src="http://images.asianage.com/images/fdeb4b878fd86fc0af509a2eb0b6927a4c6fdede-tc-img-preview.jpg" title="aa" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The advent of the printing press in the 15th century led to  widespread publication; however, there were no standards of verification  and journalistic ethics. Andrew Pettigrew wri-tes in his The Invention  of News, that news reporting in the 16th and 17th centuries was full of  portents about “comets, celestial apparitions, freaks of nature and  natural disasters.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, the immediate cause for the 1857 War of Indepen-dence was  rumours that the bones of cows and pigs were mixed with flour and used  to grease the cartridges used by the sepoys.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Leading up to the Second World War, the radio emerged as a strong  medium for dissemination of disinformation, used by the Nazis and other  Axis powers. More recently, the milk miracle in the mid-1990s consisting  of stories of the idol of Ganesha drinking milk was a popular fake news  phenomenon. In 2008, rumours about the popular snack, Kurkure, being  made out of plastic became so widespread that Pepsi, its holding  company, had to publicly rebut them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A quick survey by us at the Centre of Internet and Society, for a  forthcoming report, of the different kinds of misinformation being  circulated in India, suggested four different kinds of fake news.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first is a case of manufactured primary content. This includes  instances where the entire premise on which an argument is based is  patently false. In August 2017, a leading TV channel reported that  electricity had been cut to the Jama Masjid in New Delhi for non-payment  of bills. This was based on a false report carried by a news portal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second kind of fake news involves manipulation or editing of  primary content so as to misrepresent it as something else. This form of  fake news is often seen with respect to multimedia content such as  images, pictures, audios and videos. These two forms of fake news tend  to originate outside traditional media such as newspapers and television  channels, and can be often sourced back to social media and WhatsApp  forwards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, we see such unverified stories being picked up by  traditional media. Further, there are instances where genuine content  such as text and pictures are shared with fallacious contexts and  descriptions. Earlier this year, several dailies pointed out that an  image shared by the ministry of home affairs, purportedly of the  floodlit India-Pakistan border, was actually an image of the  Spain-Morocco border. In this case, the image was not doctored but the  accompanying information was false.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Third, more complicated cases of misinformation involve the primary  content itself not being false or manipulated, but the facts when they  are reported may be quoted out of context. Most examples of  misinformation spread by mainstream media, which has more evolved  systems of fact checking and verification, and editorial controls, would  tend to fall under this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, there are instances of lack of diligence in fully  understanding the issues before reporting. Such misrepresentations are  often encountered while reporting in fields that require specialised  knowledge, such as science and technology, law, finance etc. Such forms  of misinformation, while not suggestive of malafide intent can still  prove to be quite dangerous in shaping erroneous opinions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the widespread dissemination of fake news contributes greatly  to its effectiveness, it also has a lot to do with the manner in which  it is designed to pander to our cognitive biases. Directionally  motivated reasoning prompts people confronted with political information  to process it with an intention to reach a certain pre-decided  conclusion, and not with the intention to assess it in a dispassionate  manner. This further results in greater susceptibility to confirmation  bias, disconfirmation bias and prior attitude effect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fake news is also linked to the idea of “naïve realism,” the belief  people have that their perception of reality is the only accurate view,  and those in disagreement are necessarily uninformed, irrational, or  biased. This also explains why so much fake news simply does not engage  with alternative points of view.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A well-informed citizenry and institutions that provide good  information are fundamental to a functional democracy. The use of the  digital medium for fast, unhindered and unchecked spread of information  presents a fertile ground for those seeking to spread misinformation.  How we respond to this issue will be vital for democratic societies in  our immediate future. Fake news presents a complex regulatory challenge  that requires the participation of different stakeholders such as the  content disseminators, platforms, norm guardians which include  institutional fact checkers, trade organisations, and “name-and-shaming”  watchdogs, regulators and consumers.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-december-3-2017-'&gt;https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-december-3-2017-&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-12-08T02:24:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/aadhaar-linking-deadline-approaches-here-are-all-the-myths-and-facts">
    <title>Aadhaar linking deadline approaches: Here are all the myths and facts</title>
    <link>https://cis-india.org/internet-governance/news/aadhaar-linking-deadline-approaches-here-are-all-the-myths-and-facts</link>
    <description>
        &lt;b&gt;Love it or hate it, you just can't escape it. We're talking about Aadhaar, which is a bigger buzzword than usual in the face of the looming end-December deadline for linkages with bank accounts, PPF, insurance policies, ration card and perhaps even PAN. As India rushes to comply, there are a number of myths and half-truth making the rounds. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published by &lt;a class="external-link" href="http://www.businesstoday.in/current/policy/aadhar-linking-deadline-last-day-uidai-bank-account/story/265465.html"&gt;Business Today&lt;/a&gt; on December 7, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The official website of the Unique Identification Authority of India (UIDAI), the body issuing the biometrics-based Aadhaar number, helpfully lists out some of them, while others came to light when activists took up cudgels on behalf of Aadhaar-harassed citizens. But, either ways, you need to know the hard truth behind them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Myth:&lt;/strong&gt; Aadhaar-linkage is not only mandatory for every Indian citizen but also every person residing in the country.&lt;br /&gt;&lt;strong&gt;Fact:&lt;/strong&gt; In a notification dated May 11, 2017, the Central Board of Direct Taxes exempted the following categories from mandatory Aadhaar enrolment: &lt;br /&gt;Those who are not citizens of India, non-resident Indians as per Income Tax Laws, those aged over 80 years at any time during the tax year, and the residents of Assam, Meghalaya and Jammu &amp;amp; Kashmir.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI has also made it clear that NRIs and those holding the Overseas Citizen of India (OCI) card are not eligible to obtain Aadhaar as per the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016. "NRI/OCI need not verify their bank account or SIM or PAN with Aadhaar. If required, they may inform the service provider(s) that they being NRI/OCI are exempted from Aadhaar verification," the UIDAI had said on Twitter way back in October, and followed it up with a circular in mid-November.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the Aadhaar Act, only a "resident" is entitled to obtain Aadhaar, which refers to an individual, irrespective of nationality, who has resided in India for a period aggregating 182 days or more in the year immediately preceding the date of application for enrolment. So, this means that even NRIs and expats fulfilling the above criteria can apply for Aadhaar, but they cannot be forced to link their Indian bank accounts with it.&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;Myth:&lt;/strong&gt; I had to give my fingerprints to get a SIM card and now the telecom company will keep my biometrics for future use&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;Fact:&lt;/strong&gt; According to UIDAI, a telecom company cannot store your biometrics at its end. All the biometrics collected should be encrypted by the service provider and sent to UIDAI at that instant itself. Any storage of biometric by any agency is a serious crime punishable with up to three years of imprisonment under the Aadhaar Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Myth:&lt;/strong&gt; Aadhaar is prone to data breaches and leaks&lt;strong&gt;&lt;br /&gt;Fact: &lt;/strong&gt;Yes, there have been at least two serious leaks reported in the media, but the UIDAI has denied both of them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In May 2017, The Centre for Internet and Society, a Bangalore-based non-profit research organisation, had reportedly investigated  three government portals linked with social welfare schemes that together leaked Aadhaar information of around 1.3 crore people. Then, two months later, came news about over 200 government websites Aadhaar information public. This raised a lot of concerns and detractors cried themselves hoarse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the UIDAI, some agencies of central or state governments had been proactively putting up details of their beneficiaries as required under the RTI Act. While the said information was promptly removed from the offending websites, the authority points out that no biometrics were displaced.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Therefore to say that Aadhaar has been breached, data has been leaked, is completely incorrect and misleading," it says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, the Aadhaar Act and IT Act are now in place, which impose restrictions on publication of Aadhaar numbers, bank account, and other personal details.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Myth:&lt;/strong&gt; Aadhaar has a poorly verified database.&lt;br /&gt;&lt;strong&gt;Fact:&lt;/strong&gt; Several security measures are in place to ensure that Aadhaar enrolment system is secure.  It is done through registrars-credible institutions like state government, banks, Common Service Centres which employ enrolment agencies empanelled by UIDAI. The latter, in turn, employ operators certified by the authority. Aadhaar enrolments are done only through customized software developed and provided by UIDAI. Every day, the operators have to log into the enrolment machine through their Aadhaar number and fingerprints. Once an enrolment is done, the operator is required to sign through his/ her biometrics. Moreover, at the time of enrolment itself, the captured data is encrypted and can't be read by anyone other than the UIDAI server.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Myth:&lt;/strong&gt; People are being denied benefits and rations because they don't have Aadhaar or because of biometrics issues&lt;strong&gt;&lt;br /&gt;Fact:&lt;/strong&gt; UIDAI CEO Ajay Bhushan Pandey has clarified to the media that though Section 7 of the Aadhaar Act stipulates that benefits and subsidies from the Consolidated Fund of India shall be given on the basis of Aadhaar or proof of possession of an Aadhaar number, the lack of it cannot be grounds for denial. "Section 7 specifies that till Aadhaar number is prescribed, the benefits should be given through alternate means of identification," Pandey said to The Hindu.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Act also provides for statutory protection to those who are unable to authenticate because of worn-out fingerprints, medical conditions like leprosy or other reasons such as technical faults. "The field agencies have been accordingly instructed through the notifications issued by the government. In spite of this, if a person is denied because he does not have Aadhaar or he is unable to biometrically authenticate, it is undisputedly a violation of instructions issued by the government and such violators have to be punished," added Pandey.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Myth:&lt;/strong&gt; Publicly sharing the Aadhaar number, to track a lost Amazon package, for instance, makes one susceptible to identity fraud&lt;br /&gt;&lt;strong&gt;Fact:&lt;/strong&gt; Your Aadhaar number, just like your mobile phone number or bank account number, is not a secret though it is certainly sensitive personal information. Just as no one can hack into your bank account using just the account number, identity theft is impossible using the Aadhaar number alone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What you need to assiduously protect are things like passwords, including OTPs, and PINs. A prudent practice would be to never put up any sensitive personal information on websites or social media platforms.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/aadhaar-linking-deadline-approaches-here-are-all-the-myths-and-facts'&gt;https://cis-india.org/internet-governance/news/aadhaar-linking-deadline-approaches-here-are-all-the-myths-and-facts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-01T16:04:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-december-1-2017-inclusive-co-regulatory-approach-possible-building-indias-data-protection-regime">
    <title>India’s Data Protection Regime Must Be Built Through an Inclusive and Truly Co-Regulatory Approach</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-december-1-2017-inclusive-co-regulatory-approach-possible-building-indias-data-protection-regime</link>
    <description>
        &lt;b&gt;We must move India past its existing consultative processes for rule-making, which often prompts stakeholders to take adversarial and extremely one-sided positions.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="https://thewire.in/201123/inclusive-co-regulatory-approach-possible-building-indias-data-protection-regime/"&gt;Wire&lt;/a&gt; on December 1, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Earlier this week, the Ministry of Electronics and Information Technology released &lt;a title="a white paper" href="http://meity.gov.in/white-paper-data-protection-framework-india-public-comments-invited" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;a white paper&lt;/span&gt;&lt;/a&gt; by a “committee of experts” appointed a few months back led by former Supreme Court judge, Justice B.N. Srikrishna, on a data protection framework for India. The other members of the committee are Aruna Sundararajan, Ajay Bhushan Pandey, Ajay Kumar, Rajat Moona, Gulshan Rai, Rishikesha Krishnan, Arghya Sengupta and Rama Vedashree.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the exception of Justice Srikrishna and Krishnan, the rest of the committee members are either part of the government or part of organisations that have worked closely with the government on separate issues relating to technology, with some of them also having taken positions against the fundamental right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Refreshingly, the committee and the ministry has opted for a consultative process outlining the issues they felt relevant to a data protection law, and espousing provisional views on each of the issues and seeking public responses on them. The paper states that on the basis of the response received, the committee will conduct public consultations with citizens and stakeholders. Legitimate concerns &lt;a title="were raised earlier" href="http://indianexpress.com/article/india/citizens-group-questions-data-privacy-panel-composition-aadhaar-4924220/" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;were raised earlier&lt;/span&gt;&lt;/a&gt; about the constitution of the committee and the lack of inclusion of different voices on it. However, if the committee follows an inclusive, transparent and consultative process in the drafting of the data protection legislation, it would go a long way in addressing these concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The paper seeks response to as many as 231 questions covering a broad spectrum of issues relating to data protection – including definitions of terms such as personal data, sensitive personal data, processing, data controller and processor – the purposes for which exemptions should be available, cross border flow of data, data localisation and the right to be forgotten.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While a thorough analysis of all the issues up for discussion would require a more detailed evaluation, at this point, the process of rule-making and the kind of governance model envisaged in this paper are extremely important issues to consider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In part IV of the paper on ‘Regulation and Enforcement’, there is a discussion on a co-regulatory approach for the governance of data protection in India. The paper goes so far as to provisionally take a view that it may be appropriate to pursue a co-regulatory approach which involves “a spectrum of frameworks involving varying levels of government involvement and industry participation”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the discussion on co-regulation in the white paper is limited to the section on regulation and enforcement. A truly inclusive and co-regulatory approach ought to involve active participation from non-governmental stakeholders in the rule-making process itself. In India, unfortunately, we lack a strong tradition of lawmakers engaging in public consultations and participation of other stakeholders in the process of drafting laws and regulation. One notable exception has been the Telecom Regulatory Authority of India (TRAI), which periodically seeks public responses on consultation papers it releases and also holds open houses occasionally. It is heartening to see the committee of experts and the ministry follow a similar process in this case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, these are essentially examples of ‘notice and comment’ rulemaking where the government actors stand as neutral arbiters who must decide on written briefs submitted to it in response to consultation papers or draft regulations that it notifies to the public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This process is, by its very nature, adversarial, and often means that different stakeholders do not reveal their true priorities but must take extreme one-sided positions, as parties tend to at the beginning of a negotiation.This also prevents the stakeholders from sharing an honest assessment of the actual regulatory challenge they may face, lest it undermine their position.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This often pits industry and public interest proponents against each other, sometimes also leading to different kinds of industry actors in adversarial positions. An excellent example of this kind of posturing, also relevant to this paper, is visible in the responses submitted to the TRAI on the its recent consultation paper on ‘Privacy, Security and Ownership of data in Telecom Sector’. One of the more contentious issue raised by the TRAI was about the adequacy of the existing data protection framework under the license agreement with telecom companies, and if there was a need to bring about greater parity in regulation between telecom companies and over-the-top (OTT) service providers. Rather than facilitating an actual discussion on what is a complex regulatory issues, and the real practical challenges it poses for the stakeholders, this form of consultation simply led to the telecom companies and OTT services providers submitting contrasting extreme positions without much scope for engagement between two polar arguments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A truly co-regulatory approach which also extends to rulemaking would involve collaborative processes which are far less adversarial in their design and facilitate joint problem solving through multiple face to face meetings. Such processes are also more likely to lead to better rule making by using the more specialised knowledge of the different stakeholders about technology, domain-specific issues, industry realities and low cost solutions. Further, by bringing the regulated parties into the rulemaking process, the ownership of the policy is shared, often leading to better compliance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within the domain of data protection law itself, we have a few existing models of robust co-regulation which entail the involvement of stakeholders not just at the level of enforcement but also at the level of drafting. The oldest and most developed form of this kind of privacy governance can be seen in the study of the Dutch privacy statute. It involved a central privacy legislations with broad principles, sectoral industry-drafted “codes of conduct”, government evaluations and certifications of these codes; and a legal safe harbour for those companies that follow the approved code for their sector. Over a period of 20 years, the Dutch experience saw the approval of 20 sectoral codes across a variety of sectors such as banking, insurance, pharmaceuticals, recruitment and medical research.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other examples of policies espousing this approach include two documents from the US – first, a draft bill titled ‘Commercial Privacy Bill of Rights Act of 2011’ introduced before the Congress by John McCain and John Kerry, and second, a White House Paper titled ‘Consumer Data Privacy In A Networked World: A Framework For Protecting Privacy And Promoting Innovation In The Global Digital Economy’ released by the Obama administration. Neither of these documents have so far led to a concrete policy. Both of these policies envisioned broadly worded privacy requirements to be passed by the Congress, followed by the detailed rules to be&lt;span&gt; drafted&lt;/span&gt;. The Obama administration white paper is more inclusive in mandating that ‘multi-stakeholder groups’ draft the codes that include not only industry representatives but also privacy advocates, consumer groups, crime victims, academics, international partners, federal and state civil and criminal law enforcement representatives and other relevant groups.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The principles that emerge out this consultative process are likely to guide the data protection law in India for a long time to come. Among democratic regimes with a significant data-driven market, India is extremely late in arriving at a data protection law. The least that it can do at this point is to learn from the international experience and scholarship which has shown that merits of a co-regulatory approach which entails active participation of the government, industry, civil society and academia in the drafting and enforcement of a robust data protection law.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-december-1-2017-inclusive-co-regulatory-approach-possible-building-indias-data-protection-regime'&gt;https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-december-1-2017-inclusive-co-regulatory-approach-possible-building-indias-data-protection-regime&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-01T16:18:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/figi-symposium-2017">
    <title>FIGI Symposium 2017</title>
    <link>https://cis-india.org/internet-governance/news/figi-symposium-2017</link>
    <description>
        &lt;b&gt;Innovative Approaches to Digital Financial Inclusion Challenges. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The        &lt;strong&gt;first edition of the Financial Inclusion Global Initiative (FIGI) Symposium &lt;/strong&gt;was held in Bangalore, India, from 29 November to 1 December 2017. The Symposium was organized jointly by the Telecommunication Standardization Bureau (TSB) of the International Telecommunication Union (ITU), jointly with  the Bill &amp;amp; Melinda Gates Foundation, the World Bank and the Committee on Payments and Market Infrastructure (CPMI) and the kind support of the Government of India. ​​​​​​​​​​​​​​​​​​&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Elonnai Hickok participated in the symposium and spoke in the "Security, Infrastructure, and Trust" working group on big data and privacy in DFS. For more info on the symposium, &lt;a class="external-link" href="https://www.itu.int/en/ITU-T/extcoop/figisymposium/2017/Pages/default.aspx"&gt;see here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/figi-symposium-2017'&gt;https://cis-india.org/internet-governance/news/figi-symposium-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-01T16:29:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/data-protection-and-privacy-in-india-the-fundamental-right-way">
    <title>Data Protection and Privacy in India: The (Fundamental) Right Way</title>
    <link>https://cis-india.org/internet-governance/news/data-protection-and-privacy-in-india-the-fundamental-right-way</link>
    <description>
        &lt;b&gt;Amber Sinha attended a roundtable conference on data protection and privacy on October 30, 2017 at India Habitat Centre in New Delhi. The close-door event was organised by the  Indian Council for Research on International Economic Relations.&lt;/b&gt;
        &lt;p&gt;Participants at the conference discussed:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Role of consent in data protection, how it should be configured in India&lt;/li&gt;
&lt;li&gt;Conflicts between the data minimization principle and big data&lt;/li&gt;
&lt;li&gt;Governance approaches to data protection&lt;/li&gt;
&lt;li&gt;Propertarian view of data&lt;/li&gt;
&lt;li&gt;Need for capacity building in India and institutions who should be involved in the data protection regime, and&lt;/li&gt;
&lt;li&gt;Cross border data flows and data localisation&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/data-protection-and-privacy-in-india-the-fundamental-right-way'&gt;https://cis-india.org/internet-governance/news/data-protection-and-privacy-in-india-the-fundamental-right-way&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-27T14:01:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations">
    <title>Aadhaar verification at airports raises need for stricter data privacy regulations</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations</link>
    <description>
        &lt;b&gt;The absence of legislation is letting companies compile and deploy sensitive personal information without legal oversight.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aman Sethi was published in the &lt;a class="external-link" href="http://www.hindustantimes.com/india-news/aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations/story-pNJYBM7mJkhRrFJElYX2RJ.html"&gt;Hindustan Times&lt;/a&gt; on November 27, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;When Suvodeep Das, a 42-year-old marketing professional, took a Jet airways flight from Hyderabad to Mumbai in September, he said a software bug in the airline’s website wouldn’t let him check in online without first punching in his Aadhaar number.&lt;br /&gt;&lt;br /&gt;“When I got my boarding pass, it had my Aadhaar number printed on it,” Das told HT, wondering, “Why do you need an Aadhaar number to take a flight, and why display it publicly?”&lt;br /&gt;&lt;br /&gt;In October, another passenger found their Aadhaar number on the boarding pass: this time, it was barcoded.&lt;br /&gt;&lt;br /&gt;HT has reviewed both boarding passes. Publishing Aadhaar numbers is an offence under the Aadhaar Act 2016.&lt;br /&gt;&lt;br /&gt;Jet Airways did not respond to repeated requests for comment. Speaking off the record, airline executives said Jet encoded Aadhaar numbers to test the proposed Aadhaar Enabled Entry and Biometric Boarding System (AEEBBS): a complex Aadhaar-seeding project that aims to replace a passenger’s boarding pass with his/her fingerprint.&lt;br /&gt;&lt;br /&gt;Bangalore International Airport (BIAL), which plans to install AEEBBS, says it will improve passenger security and reduce check-in time at the Kempegowda International, India’s third busiest airport.&lt;br /&gt;&lt;br /&gt;Privacy advocates, however, say the system, which stores passenger biometrics and Aadhaar numbers on the servers of a private corporation, is an example of how the absence of a data protection law in India lets companies compile and deploy sensitive personal information without legal oversight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Future uses of the AEEBBS, according to the BIAL website, include  integrating the system with passenger blacklists, typically maintained  by the ministry of home affairs, to determine who can and cannot board a  flight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The unregulated proliferation of Aadhaar uses is  compromising the digital identities of citizens and putting them at  risk,” said Usha Ramanathan, a legal theorist who has written  extensively on Aadhaar. ”There is a misconception that data protection  is about data being at risk. It is actually about the rights of people  being at risk.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pilot Project&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In January, Bangalore  International Airport Ltd (BIAL), the corporation that runs the  Bengaluru terminal, and Jet Airways integrated their flight and  passenger databases as part of a four-month pilot project to test the  AEEBS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The pilot project incorporated the entire airport journey  from entry right through to the boarding gate and included all security  check points,” a BIAL spokesperson said in an email. “The project  allowed for quicker processing time for a passenger from entry to  security gate while simultaneously enabling fewer points of human  interaction.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participation in the project was voluntary. BIAL  said about 15% of passengers opted to use it. In October, BIAL called  for bids for a full roll-out of the AEEBBS by December 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The system, tender documents reveal, works in the following way:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First  passengers enter their Aadhaar numbers when they book their flights.  The airline turns this number into a QR code printed on the flight  ticket. Once at the terminal, passengers bypass the standard practice of  showing their ticket and ID to a security guard, and instead they enter  the terminal by flashing the ticket at a QR code scanner while pressing  their fingers against a biometric reader installed at the entrance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  AEEBBS verifies the passenger’s identity by querying the UIDAI’s  database, and then checks the airport’s flight information system to see  if the passenger is booked to fly that day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thereafter, the  system creates a “passenger dataset” that bundles the passenger’s  biometrics and flight information into a single file unique to each  passenger. This dataset is used to verify the identity of the passenger  at each checkpoint, allowing the airport to track the passenger until  she boards her plane.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The tender document states that the  biometric data should be purged immediately after the passenger’s flight  departs. If flights are rescheduled, the biometrics shall persist until  the passenger finally departs.&lt;/p&gt;
&lt;div class="airport_wrap" style="text-align: justify; "&gt;
&lt;div class="airport_padding"&gt;
&lt;div class="airport_headline"&gt;Concerns over Bengaluru airport’s use of Aadhaar&lt;/div&gt;
The  Aadhaar-Enabled Entry and Biometric Boarding System (AEEBBS) aims to  replace boarding cards with a passenger’s fingerprint. Here is how it  works.&lt;/div&gt;
&lt;img src="http://www.hindustantimes.com/static/ht2017/11/bengaluru_airport_aadhaar.jpg" width="100%&amp;quot;/" /&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Why Biometrics?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bengaluru isn’t the only airport experimenting with systems like the AEEBBS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We  have initiated trials on facial recognition, iris and finger-print  scanning etc., to generate Aadhaar + Biometric enabled passenger  data-sets,” said a spokesperson for the GMR Hyderabad International  Airport. “We hope to complete these trials in the next two months and  deploy them by June 2018 for all domestic passengers.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yet  biometrics isn’t a fool-proof way of verifying someone’s identity.  Biometric experts have maintained that fingerprints can be copied and  printed onto “fake fingers” — a process known as spoofing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At  Michigan State University, biometric expert Anil Jain and his team have  developed so-called fake fingers using 12 different materials, the most  sophisticated of which mimics the physical properties of human skin.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Many  of the commercial systems may not have state-of-the-art spoof detection  facilities,” Jain said, adding that he has advised the UIDAI on  biometrics in the past.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jain said it was important that a secured  space like an airport have biometric readers that include “liveness”  detection, a term that refers to a broad set of techniques that use a  combination of advanced hardware and software to avoid spoof attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However,  it is not mandatory for UIDAI-certified biometric devices to have  liveness detection features. Documents published by Standardisation  Testing and Quality Certification (STQC), the agency tasked with  certifying Aadhaar devices, make clear that “liveness detection” is  “preferable” but not mandatory.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some manufacturers of certified  devices say their devices have liveness detection, but STQC does not  include this specific feature in its testing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prof Jain said  biometrics are harder to forge than the identity cards that are  currently needed to gain access to airport terminals, suggesting that  the AEEBBS could increase security only if the data that undergirds the  system is properly secured.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Storage Concerns&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under  regulations framed by the Unique Identification Authority of India  (UIDAI), it is illegal to store biometric data captured for any  Aadhaar-related transaction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, UIDAI-certified biometric  devices are prohibited from storing biometric data which casts a cloud  over BIAL’s proposal to create passenger datasets to merge passenger  flight data, biometric data and Aadhaar numbers, and store it on a local  BIAL network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While UIDAI did not respond to requests for comment  on if these passenger data sets violated its regulations, BIAL said it  would work around the system by capturing passenger biometric data twice  — once to verify passenger identities in accordance with UIDAI  regulations, and once for the purpose of creating the passenger data  set.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Our intent is to capture data and store a separate set of  biometrics records (delinked from Aadhaar) that include  face/iris/fingerprints for the purpose of authentication of passenger at  various check points inside the airport,” the spokesperson said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some experts believe this may not be enough.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The  Aadhaar Act and Regulations are supposed to ensure that our biometric  records are safe, and entities capturing biometrics for Aadhaar-related  purposes cannot store the biometrics,” said Pranesh Prakash, policy  director at the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If biometrics  collected doesn’t need to follow the Aadhaar regulations because of a  technicality, how strong are the regulations?” Prakash said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last  year, 22.18 million passengers travelled through Bengaluru airport. Once  the AEEBBS is installed, the airport’s servers shall become a temporary  repository of millions of fingerprints, and a lucrative target for  sophisticated hackers who could capture this data by implanting  malicious software in the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such software has become easier  to access since August 2016, when a group calling itself the “Shadow  Brokers” announced it had stolen some of the world’s most advanced  cyber-weapons from the vaults of the Tailored Access Operations unit of  National Security Agency, which manages the cyber-arsenal of the United  States of America.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Designing the system to minimise the use of  biometrics could alleviate these concerns, according to Rahul Matthan, a  partner at law firm Trilegal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If data minimisation is the  principle that we keep on top of mind, Aadhaar should be used to allow  entry,” Matthan said, “Then the airport must devise other methods and  standards to ensure that security and passenger tracking is achieved.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguarding Aadhaar Numbers&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  AEEBBS also raises questions on the manner in which airlines and  airports will store non-biometric data like passenger Aadhaar numbers.  UIDAI regulations published in July 2017 say companies and government  departments must store Aadhaar numbers in secure, isolated, databases  called ‘Aadhaar Data Vaults’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each Aadhaar number in these vaults  must be associated with a “reference key” — which is like a nick-name  for the Aadhaar number. So instead of using a citizen’s Aadhaar number  for a given transaction, businesses must preserve the confidentiality of  the number by using the reference key instead.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jet Airway’s  decision to print Aadhaar numbers, rather than the reference keys, on  the boarding passes, suggests that the airline is not following UIDAI  guidelines — a problem that is likely to multiply as more airlines start  gathering this information to avail of the AEEBBS facility. Jet Airways  did not respond to requests for comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once the AEEBBS is in  place, BIAL also intends to use passenger data, harvested during  check-in and boarding, for commercial purposes, but it is unclear if and  how this data will be anonymised before it is used.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We aim to  make meaning of the abundant data that will be collected,” the BIAL  spokesperson said, insisting that the airport would respect traveller  privacy and the data would not be sold to third parties. “In due course —  and with passenger consent — we intend to use business intelligence to  make the journey more impactful.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For lawyer Matthan, the AEEBBS  is an example of why India needs a comprehensive data protection law to  address issues between citizens and private corporations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There  is a need to ensure that Aadhaar is based on a sound framework of  privacy protection,” he said, noting that the recent Supreme Court  judgment protected citizen privacy against infringement by the  government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data protection legislation, he said, would ensure that private corporations are held to the same standard.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations'&gt;https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-27T13:34:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar">
    <title>India Today Conclave Next 2017: Aadhaar was rushed, says MP Rajeev Chandrashekhar</title>
    <link>https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar</link>
    <description>
        &lt;b&gt;Talking at the ongoing India Today Conclave Next 2017, MP Rajeev Chandrashekhar said that Aadhaar was rushed and foisted on the country by authorities that fail to first create a proper ecosystem. Chandrashekhar gave his comments at a keynote titled Privacy -- The Fundamental Right for the Digital Citizen.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Priya Pathak was published by &lt;a class="external-link" href="http://indiatoday.intoday.in/technology/story/india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar/1/1084396.html"&gt;India Today&lt;/a&gt; on November 8, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chandrashekhar, who has been vocal on  the issues like data protection, privacy and net neutrality, said that  the government should have created a proper ecosystem for Aadhaar by  bringing norms and laws around data protection and privacy before asking  people to sign up for the unique ID.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The MP talked about India's  journey from being a largest unconnected world to becoming the largest  connected world. But Chandrashekhar criticised the "flawed" Aadhaar and  said that it was a classic example of how a government system would push  for technology in governance without addressing key bits of the  ecosystem around the citizen and the consumer.&lt;/p&gt;
&lt;div class="zg-placement-transition   zg-placement" id="zdt_3644892_1_wrapper" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;"If  that (Aadhaar) wasn't enough, the IT act and section 66A and its  language and its vagueness and its potential for misuse was another  example of the faults of a bureaucracy or a political system trying to  legislate or create solutions in the digital world, " he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At  the same time, he lauded the recent Supreme Court order that held all  Indians had fundamental right to privacy. "The latest finding of Supreme  Court of Privacy as fundamental right is a big deal and it will alter  number of things going forward," he said. He added that there should be  more debate and discussion on data privacy as there is an attempt to  characterise data privacy as some of kind of elitist issue in India  which it's not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy, especially for the digital world,  currently is one of the most debated topics in India. The country in the  past few years has seen a number of instances where a government or a  private entity has knowingly or unknowingly compromised the data of its  users. Recently a study published by Centre for Internet and Society, a  Bengaluru-based organisation, revealed that private data of more 130  million Aadhaar card holders were leaked from four government websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  Supreme Court in August this year declared privacy as a fundamental  right. A nine-judge Constitution bench headed by Chief Justice J S  Khehar has declared that "right to privacy is an intrinsic part of Right  to Life and Personal Liberty under Article 21 and entire Part III of  the Constitution".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move has been praised by many including  Rajeev Chadrashekhar who has said that it is a big welcome step. "It is  clear that Aadhaar and all other legislations existing and proposed will  have to meet the test of privacy being a fundamental right," he  recently said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar'&gt;https://cis-india.org/internet-governance/news/india-today-priya-pathak-november-8-2017-india-today-conclave-next-2017-aadhaar-was-rushed-says-mp-rajeev-chandrashekhar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-26T06:41:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar">
    <title>What You Need To Worry About Before Linking Your Mobile Number With Aadhaar</title>
    <link>https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar</link>
    <description>
        &lt;b&gt;As part of the directive issued by the Department of Telecommunications (DoT) dated March 23, 2017, major telecom service providers have issued a deadline of February 6, 2018, for linking mobile numbers with Aadhaar as part of the E-KYC verification.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Roopa Raju and Shekhar Rai was published in &lt;a class="external-link" href="https://www.youthkiawaaz.com/2017/11/linking-aadhar-with-mobile-number-pros-and-cons/"&gt;Youth Ki Awaaz&lt;/a&gt; on November 8, 2017&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The landmark case referenced by the DoT in the circular was the order  issued by the Supreme Court on February 6, 2017, delivered by Justice  JS Khehar (the erstwhile Chief Justice of India) in the case of &lt;a href="https://thewire.in/109330/aadhaar-phone-legal-battle/" rel="noopener" target="_blank"&gt;Lokniti Foundation vs Union of India&lt;/a&gt;.  The petitioner &lt;a href="http://supremecourtofindia.nic.in/jonew/courtnic/rop/2016/23429/rop_885627.pdf" rel="noopener" target="_blank"&gt;contended&lt;/a&gt; that terrorists, criminals and anti-social elements frequently used SIM  cards to commit atrocious, organised and unorganised crimes across the  country. The petition called for &lt;a href="http://supremecourtofindia.nic.in/jonew/courtnic/rop/2016/23429/rop_885627.pdf" rel="noopener" target="_blank"&gt;ensuring 100% verification&lt;/a&gt; on the identity of telecom service subscribers in public interest under &lt;a href="https://indiankanoon.org/doc/981147/" rel="noopener" target="_blank"&gt;Article 32&lt;/a&gt; of the Constitution of India. The PIL added that unverified SIM cards  pose a serious threat to the country’s security as they are routinely  used  in criminal and terrorist activities, thereby affecting a  citizen’s right (as ensured under &lt;a href="https://indiankanoon.org/doc/1199182/" rel="noopener" target="_blank"&gt;Article 21&lt;/a&gt; of the Constitution). As per the CAG report tabled at the Parliament in 2014, the identities of &lt;a href="https://timesofindia.indiatimes.com/india/Identities-of-4-59-crore-mobile-users-still-unverified-CAG/articleshow/39572824.cms" rel="noopener" target="_blank"&gt;4.59 crore mobile users&lt;/a&gt; still remained unverified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 21 of the Constitution of India, 1949, &lt;a href="https://indiankanoon.org/doc/1199182/" rel="noopener" target="_blank"&gt;states&lt;/a&gt; that – &lt;i&gt;“No person shall be deprived of his life or personal liberty except according to procedure established by law.”&lt;/i&gt; While there is a threat to the common public interest through increased  acts of terrorism and atrocities due to unverified SIM cards, the  safety of information provided and linked to Aadhaar are increasingly  being questioned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a study dated May 1, 2017, published by the Centre for Internet  and Society (CIS), a Bangalore-based organisation, it was observed that  data of &lt;a href="http://indiatoday.intoday.in/technology/story/aadhaar-data-of-130-millions-bank-account-details-leaked-from-govt-websites-report/1/943632.html" rel="noopener" target="_blank"&gt;over 130 million&lt;/a&gt; Aadhaar card-holders were leaked from just four government portals  dealing with the National Social Assistance programme, the National  Rural Employment Guarantee Scheme, the Chandranna Bima Scheme and the  Daily Online Payment Reports of NREGA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On October 25, 2017, the chief minister of West Bengal, Mamata Banerjee, also &lt;a href="https://thewire.in/190932/west-bengal-mamata-banerjee-bjp-aadhaar/" rel="noopener" target="_blank"&gt;strongly opposed&lt;/a&gt; the government’s plan to link mobile numbers with Aadhaar cards. She  said that it was a breach of privacy and that the ruling government was  intruding upon the citizen’s right to personal freedom. However, the  Supreme Court &lt;a href="https://www.ndtv.com/india-news/aadhaar-petitions-in-supreme-court-today-including-bengals-10-points-1768703" rel="noopener" target="_blank"&gt;questioned&lt;/a&gt; the state government’s right to challenge the Centre and asked her to file a plea with the court in her individual capacity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the data published by Telecom Regulatory Authority of India  (TRAI) on September 14, 2017, India’s telecom subscriber base &lt;a href="http://indianexpress.com/article/technology/tech-news-technology/telecom-subscriber-base-dips-marginally-to-121-crore/" rel="noopener" target="_blank"&gt;dipped by 1.3 lakh&lt;/a&gt; to 121.07 crore in July 2017. Moreover, only three operators – Reliance  Jio, Bharti Airtel and the state-run BSNL – reported additions to their  subscriber base.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Month&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Telephone subscriber base&lt;br /&gt; (in million)&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Growth rate&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Mar-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1194.58&lt;/td&gt;
&lt;td&gt;–&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Apr-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1198.89&lt;/td&gt;
&lt;td&gt;0.36%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;May-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1204.98&lt;/td&gt;
&lt;td&gt;0.51%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Jun-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1210.84&lt;/td&gt;
&lt;td&gt;0.49%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Jul-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1210.71&lt;/td&gt;
&lt;td&gt;-0.01%&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(Source: &lt;a href="http://www.trai.gov.in/release-publication/reports/telecom-subscriptions-reports" rel="noopener" target="_blank"&gt;TRAI monthly subscription data&lt;/a&gt;)&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dip in the subscriber count for various telecom operators can be  accredited to the phasing of registration of SIM cards through E-KYC for  new mobile numbers. While there is a the possibility of addition of  genuine subscribers in the following months, the direct subscriber  acquisition cost (DSAC) has been significantly reduced owing to the  overall reduction in subscriber addition (assuming exclusion of sunk  cost).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prior to the DoT directive, telecom service providers relied heavily  on the documents provided by the subscribers for SIM registration. The  two-fold impact of this was the delay in SIM activation, owing to the  transfer of documents from the retailer to the distributor to the  company and the possibility of documents not matching with the usage  timeline of usage. Additionally, tracking the ever-changing retailers  was difficult for the service providers – and with the subscriber  documents being collected and stored at one location by the service  providers, verification of dummy subscribers was difficult.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the introduction of Aadhaar linkage for mobile numbers,  subscribers are held accountable for its usage, thereby tagging  responsibility for any acts arising as a result. Savings from the  digitisation of documents and paper should also be considered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, an increased number of job losses is possible, owing to the  ‘optimisation’ of the process by way of document verification, servicing  costs and reliance on third parties (to name just a few). Increased  compliance costs are also an issue of concern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The key question that looms prominently with the approaching deadline  is how secure public data will be, given that it may possibly be linked  with bank account numbers and income tax returns. With retailers using  fingerprints of the subscribers to validate Aadhaar numbers with the  mobile numbers at the time of SIM registration, there is an increased  risk of exposure to identity theft.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the government is increasingly trying to bring in a seamless  process to assimilate data for transparency in analysing consumer  patterns, it is suggested that they also allocate funds for enhancing  the cyber-security of the data consolidated from this directive.  Furthermore, cyber security regulations can be strengthened to avoid  data leakages to third party organisations. Severe penalties should also  be implemented to ensure robust compliance to these measures.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar'&gt;https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-26T05:55:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now">
    <title>OPINION | Data is New Oil and Human Mind the New Battlefield. India Must Wake Up Now</title>
    <link>https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now</link>
    <description>
        &lt;b&gt;In information warfare, the battlespace is the human mind. This is where the privacy of an individual intersects with national security. Fighting this battle will require a new paradigm in thought and action.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Lt. General (Retd.) D. S. Hooda was published by &lt;a class="external-link" href="http://www.news18.com/news/india/opinion-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now-1573747.html"&gt;News18.com&lt;/a&gt; on November 11, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;A few days ago, the Army Headquarters took out a public advisory  warning about a “deliberate misinformation campaign being launched by  vested interests some of which is being initiated from countries  bordering our nation.” This is an acknowledgment of the use of social  media for what is today considered the most dominant form of warfare —  ‘information warfare’. It has been extensively used by our adversaries  in Jammu and Kashmir to show the government and security forces in poor  light.&lt;br /&gt; &lt;br /&gt; Deception, propaganda and misinformation have always been a part of  warfare but what is different today is that the tools of information  warfare have acquired a new dimension. An integration of massive amounts  of data with Artificial Intelligence (AI) has given a significant  weapon in the hands of information warriors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The cost of saving data has been plummeting, with the cost being halved  about every 15 months. Now more and more data about individuals is being  saved, both by corporations and governments. In his book, &lt;i&gt;Data and Goliath&lt;/i&gt;,  Bruce Schneier writes that worldwide, Google has the capacity to store  15 exabytes of data. To put it in context, one exabyte is 500 billion  pages of text. Bruce also quotes the case of Max Schrems, an Austrian  law student, who in 2011 demanded all his personal data from Facebook.  After a two year legal battle, Facebook gave him a CD with 1200 pages of  PDF. This is how much Facebook knows about you, and it does not forget  because it is all saved.&lt;br /&gt; &lt;br /&gt; All this big data would be useless unless it can be utilised for  decision making and this is where advances in AI have provided the  breakthrough. Smart machines mine the data and detect trends, patterns,  habits, ideology and desires. These personal characteristics of  individuals are being used by corporations to send targeted  advertisements to influence commercial decisions.&lt;br /&gt; &lt;br /&gt; The same technique is used in information warfare. On November 1, the US  House Intelligence Committee released Facebook advertisements bought by  Russian operatives to influence the 2016 elections. Washington Post  wrote, “The ads made visceral appeals to voters concerned about illegal  immigration...African American political activism, rising prominence of  Muslims” among other issues. Senator Angus King said, “The strategy is  to take a crack in our society and turn it into a chasm.”&lt;br /&gt; &lt;br /&gt; Data is the new oil and that is exactly how it is being traded and sold.  In the absence of any legal provisions, companies and ‘data brokers’  are sharing and selling personal data. Can this personal data find its  way to a hostile government? Last month, the US Army brought out that  their troops in the Baltic had reported instances of cell phone hacking.  However, more worrisome was the fact the hackers knew personal details  of the soldiers. Direct threats against family members of the military  can have a negative psychological impact during conflict.&lt;br /&gt; &lt;br /&gt; India has its share of political, social and ethnic differences, just as  in many societies. In recent times these differences have been  magnified as nationalism has taken centre stage. It is difficult to  imagine why these fault lines will not be exploited by inimical forces  as India enters the election mode in 2018. Looking at examples from the  US and French elections, Brexit and the cyber battle during the  Catalonia referendum, I think we have no option but to be prepared.&lt;br /&gt; &lt;br /&gt; The preparation for this war (and I do not use this word lightly) lies in three spheres — concepts, practices and structures.&lt;br /&gt; &lt;br /&gt; Conceptually, our current shortcoming is that we are viewing this issue  through a technical prism rather than the broader spectrum of  information warfare. CERT and NTRO can technically protect our critical  infrastructure but they do not have an equal understanding of the human  dimension, which is more strategic than scientific. The Americans, world  leaders in information technology, have not been able to prevent a  perceived subversion of their democratic process.&lt;br /&gt; &lt;br /&gt; Our practices need to improve. The security of personal data is a major  concern. The Supreme Court has declared privacy as a fundamental right,  but there are no privacy laws to back it up. Even data stored in India  is not safe as the owners of our data are the giant technology  companies, mostly based in the US and not under our legal control. In  September 2017, it was reported that Google has quietly stopped  challenging most search warrants from US judges in which the data  requested is stored on overseas servers.&lt;br /&gt; &lt;br /&gt; A May 2017, report by the Centre for Internet and Society estimated that  135 million Aadhaar numbers could have been leaked from official  portals. This was not due to a security breach but due to poor privacy  practices.&lt;br /&gt; &lt;br /&gt; Our continued reliance on foreign hardware and software is extremely  worrisome. There was clear evidence that Cisco systems had been  back-doored by the American National Security Agency but the Indian  military continues to procure hardware from Cisco. There is a similar  story with Chinese equipment in our telecommunication and power sectors.  An attempt to introduce an Indian operating system to replace Windows  in the Army has been mired in controversy.&lt;br /&gt; &lt;br /&gt; In case of a targeted cyber attack on India, there is little we can do  except issue advisories. The solutions will have to come from foreign  manufactures or developers whose equipment we are using. There is an  urgent need to give a fillip to developing indigenous solutions for our  critical infrastructure.&lt;br /&gt; &lt;br /&gt; And finally, structures. An organisation to execute information warfare  would have to be led by the Ministry of Defence, because the threat is  mainly from external players. It would be a combination of military  planners, specialists from the field of intelligence, government  agencies, media and cyber warfare experts. Such an organisation does not  currently exist, though the raising of the Cyber Command could fill  this gap.&lt;br /&gt; &lt;br /&gt; In information warfare, the battlespace is the human mind. This is where  the privacy of an individual intersects with national security.  Fighting this battle will require a new paradigm in thought and action.&lt;br /&gt; &lt;br /&gt; &lt;i&gt;&lt;b&gt;(The author is former Northern Commander, Indian Army, under  whose leadership India carried out surgical strikes against Pakistan in  2016. Views are personal.)&lt;/b&gt;&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now'&gt;https://cis-india.org/internet-governance/news/news-18-lt-general-retd-ds-hooda-data-is-new-oil-and-human-mind-the-new-battlefield-india-must-wake-up-now&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-26T03:28:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/roundtable-on-data-integrity-and-privacy">
    <title>Roundtable on Data Integrity and Privacy</title>
    <link>https://cis-india.org/internet-governance/news/roundtable-on-data-integrity-and-privacy</link>
    <description>
        &lt;b&gt;Amber Sinha attended a roundtable on data integrity and privacy organized by the Observer Research Foundation (ORF) on November 18, 2017 in New Delhi. The round table discussion was chaired by Shri Baijayant Panda, Hon'ble Member of Parliament. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;With the 10-member committee headed by former Justice B.N. Srikrishna being mandated to recommend principles for a new data protection bill, the time is ripe for online platforms, service providers and citizen stakeholders to discuss what the substantive elements of the new data protection law should look like. &lt;br /&gt;&lt;br /&gt;Regulatory principles around data should be informed by the impetus for innovation, the responsibility to deliver social benefits and most importantly the users’ expectation of privacy.  Increasingly, the nature and number of actors collecting and processing user data is becoming unclear. The new data protection framework must clarify the relationship between the user and apps/ mobile platforms that collect her data, but should do so while acknowledging the heterogenous nature of the Indian digital economy, comprising operating systems, platforms and devices of varying security and sophistication.&lt;br /&gt;&lt;br /&gt;To kick-start this project, ORF hosted a roundtable chaired by Shri Baijayant Panda to hear from a diverse set of stakeholders to understand what direction the data privacy regime in India should take. The roundtable took place at the Viceroy, Claridges Hotel, 12, Dr APJ Abdul Kalam Road, New Delhi, Delhi 110011.&lt;br /&gt;&lt;br /&gt;The roundtable broadly covered the following aspects –&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Role of user consent and choice&lt;/li&gt;
&lt;li&gt;Importance of cross border data flows&lt;/li&gt;
&lt;li&gt;Appropriate regulatory authority&lt;/li&gt;
&lt;li&gt;International best practices and relevance to the Indian context&lt;/li&gt;
&lt;li&gt;Reasonable restrictions&lt;/li&gt;
&lt;li&gt;Private-public collaboration&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/roundtable-on-data-integrity-and-privacy'&gt;https://cis-india.org/internet-governance/news/roundtable-on-data-integrity-and-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-25T02:17:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
