<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 571 to 585.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-sci-tech-internet-karthik-subramanian-nov-14-2012-india-second-in-requesting-user-info-google"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-india-times-tech-tech-news-internet-ishan-srivastava-nov-15-2012-india-second-in-keeping-tabs-on-netizens"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/thinkdigit-internet-kul-bhushan-nov-15-2012-india-ranks-second-globally-in-accessing-private-details-of-users"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/india-privacy-meet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-week-anuj-srinivas-july-6-2016-india-no-haven-for-net-freedom-but-did-not-oppose-un-move-on-internet-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/india-needs-an-independent-privacy-law-says-ngo-privacy-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/los-angeles-times-shashank-bengali-may-12-2017-india-is-building-a-biometric-database-for-1.3-billion-people-and-enrollment-is-mandatory"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/al-jazeera-video-november-8-2019-india-facial-recognition"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/indecent-proposals"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/incident-response-requirements-in-indian-law"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/right-circle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/india-times-bobin-abraham-may-3-2017-in-the-biggest-data-leak-info-of-13-crore-aadhaar-card-holders-has-been-compromised-and-is-available-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-shweta-mohandas-july-30-2019-in-india-privacy-policies-of-fintech-companies-pay-lip-service-to-user-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/time-world-anjan-trivedi-june-30-2013-in-india-prison-like-surveillance-slips-under-the-radar"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/the-hindu-sci-tech-internet-karthik-subramanian-nov-14-2012-india-second-in-requesting-user-info-google">
    <title> India second in requesting user info: Google</title>
    <link>https://cis-india.org/news/the-hindu-sci-tech-internet-karthik-subramanian-nov-14-2012-india-second-in-requesting-user-info-google</link>
    <description>
        &lt;b&gt;India is at second place after the US in terms of the government requests for user data from Google&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Karthik Subramanian's article was &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/internet/india-second-in-requesting-user-info-google/article4095170.ece"&gt;published in the Hindu on November 14, 2012&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The  Indian government made the second largest demand for Web user  information — next only to the United States government — to Google in  the six-month period from January to June this year, according to the  ‘Transparency Report’ published by the Web services major on Tuesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During  the six-month period, the Indian government — both by way of court  orders and by way of requests from police— requested Google to disclose  user information 2,319 times over 3,467 users/accounts. Google fully or  partially complied with the request to the tune of 64 per cent. Only the  U.S. government requested more data during the period — 7,969 requests  over 16,281 accounts, compliance rate: 90 per cent.&lt;br /&gt;&lt;br /&gt;It is the  sixth time Google has brought out the bi-annual report detailing its  interactions with the world government agencies. It details two  categories of interactions : requests to divulge user data; and requests  to pull down content. India ranked seventh in the list of requests to  pull down data; experts say that the possible reason could be the  government not having such powers under the Constitution.&lt;br /&gt;&lt;br /&gt;Pranesh  Prakash, policy director with Bangalore-based Centre for Internet and  Society, said that the Google report was a damning indictment of the  country’s government exceeding its constitutional bounds by demanding  removal of material for defamation, government criticism, etc., without a  valid court order. "There are no laws in our country that allows the  executive or the police to remove such material without a court order."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Substantial spike&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In  all, 33 countries figure in the report. There was a substantial spike  when compared to previous reports with respect to the number of requests  from various governments to pull down content.&lt;br /&gt;&lt;br /&gt;"In the first  half of 2012, there were 20,938 inquiries from government entities  around the world. Those requests were for information about 36,614  accounts,” wrote Dorothy Chou, Google’s senior policy analyst, on the  Official Google Blog while presenting the report. “The number of  government requests to remove content from our services was largely flat  from 2009 to 2011. But it’s spiked in this reporting period. In the  first half of 2012, there were 1,791 requests from government officials  around the world to remove 17,746 pieces of content."&lt;br /&gt;&lt;br /&gt;Google is  leading the cause for voluntary disclosure of the interactions it has  with the governments. Other web services that put out similar  transparency reports include micro-blogging site Twitter; cloud storage  service Dropbox; and social networking site Linkedin.&lt;br /&gt;&lt;br /&gt;Mr. Prakash  said it was not enough if just the web services put out such reports.  "The telecom service providers must voluntarily come out with such  information," he added.&lt;br /&gt;&lt;br /&gt;"There is a dearth of public information  about the amount of legal interception and surveillance. This does not  bode well in a democratic polity."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-sci-tech-internet-karthik-subramanian-nov-14-2012-india-second-in-requesting-user-info-google'&gt;https://cis-india.org/news/the-hindu-sci-tech-internet-karthik-subramanian-nov-14-2012-india-second-in-requesting-user-info-google&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-11-15T09:40:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-india-times-tech-tech-news-internet-ishan-srivastava-nov-15-2012-india-second-in-keeping-tabs-on-netizens">
    <title> India second in keeping tabs on netizens</title>
    <link>https://cis-india.org/news/times-of-india-india-times-tech-tech-news-internet-ishan-srivastava-nov-15-2012-india-second-in-keeping-tabs-on-netizens</link>
    <description>
        &lt;b&gt;India ranks second globally in accessing private details of its citizens, next only to the US, if the latest data from Google is to be believed.
&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Ishan Srivastava was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/internet/India-second-in-keeping-tabs-on-netizens/articleshow/17222023.cms"&gt;published in the Times of India on November 15, 2012&lt;/a&gt;, Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The transparency report by the internet search giant lists out requests it received from governments across the world to access information on the users of its various services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the first six months of 2012, India made 2,319 requests involving 3,467 users. In comparison, the US made 7,969 requests in the same period and Brazil, which comes third, sent 1,566 requests. Globally, there were 20,938 requests for user data during the January-June period. The data can include your complete &lt;a href="http://timesofindia.indiatimes.com/topic/Gmail-account"&gt;Gmail account&lt;/a&gt;, chat logs, Orkut profile and search terms among others. These reports are prepared by Google every six months, and were started in July-December 2009.&lt;/p&gt;
&lt;p&gt;The requests for user data from India doubled from 1,061 in July-December 2009 to 2,207 in July-December 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Though India is a large country with a significant number of internet users, this data is nonetheless an indicator of growing surveillance," said Pranesh Prakash, policy director at &lt;a href="http://timesofindia.indiatimes.com/topic/Centre-for-Internet-and-Society"&gt;Centre for Internet and Society&lt;/a&gt; (CIS), a Bangalore-based organization looking at issues of public accountability, internet freedom and openness.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"India lacks a general privacy law that helps set guidelines for such user requests, despite privacy being a constitutional right as part of the right to life," said Prakash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India also actively sends requests to take down content which it deems defamatory and against national security. While the number of court orders for taking down web content has remained almost stagnant over the years, there has been a rise in the number of requests by the executive and police. Between January and June this year, there were 20 court orders and 64 requests from executive/police that resulted in 596 items being taken down from the web. In comparison, there were only eight court orders and 22 executive/police requests in January-June 2010, resulting in 125 items being taken down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The government does not always specify the reason for which they want access. They just want access, what they do with the information is not known to us," said a legal adviser to an MNC. "These requests come with a threat to our continued operation in India."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Falsified court orders are also being employed to seek removal of content. Three such court orders were sent to Google "that demanded the removal of blog posts and entire blogs for alleged defamation." One order was said have been issued by a local court in Andheri, Mumbai while the other two by the Delhi high court. But all the three were found to be fake.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google says a single court order was responsible for removal of 360 items this year as they "contained adult videos that allegedly violated an individual's personal privacy." While such orders have a positive impact like curbing pornography and violent content, governments at every level have also tried to use these requests to take down unfavourable content or criticism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In January-June 2011 period, Google received "requests from state and local law enforcement agencies to remove &lt;a href="http://timesofindia.indiatimes.com/topic/YouTube"&gt;YouTube&lt;/a&gt; videos that displayed protests against social leaders or used offensive language in reference to religious leaders". Google rejected a majority of these requests. It also received a request from a law enforcement agency to remove 236 communities and profiles from Orkut that were critical of a local politician. Google did not remove them either.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Prior to 2009, government had limited powers of interception. However, after 26/11 they gave themselves huge powers to block and monitor content," said Supreme Court lawyer Pavan Duggal. "Data privacy is non-existent in India." He said that the A P Shah Committee, which was formed to recommend principles for a privacy law, has submitted its report to the Planning Commission and now it is up to the government to take it to the next stage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both Prakash and Duggal said that technology companies in India, including telecom players, should come out with similar transparency reports as Google. A report by international watchdog Privacy International says that &lt;a href="http://economictimes.indiatimes.com/bharti-airtel-ltd/stocks/companyid-2718.cms" target="_blank"&gt;Bharti Airtel&lt;/a&gt;, in its 2010-2011 annual report, said it had received 422 appreciation letters from law enforcement agencies for assistance in lawful interceptions. "The Indian IT Act requires electronic audit by firms but the law is silent on how this audit is filed," said Duggal.&lt;/p&gt;
&lt;p&gt;Globally, &lt;a href="http://timesofindia.indiatimes.com/topic/Dropbox"&gt;Dropbox&lt;/a&gt;, LinkedIn, Sonic.net and Twitter release transparency reports apart from Google.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-india-times-tech-tech-news-internet-ishan-srivastava-nov-15-2012-india-second-in-keeping-tabs-on-netizens'&gt;https://cis-india.org/news/times-of-india-india-times-tech-tech-news-internet-ishan-srivastava-nov-15-2012-india-second-in-keeping-tabs-on-netizens&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-11-15T09:04:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/thinkdigit-internet-kul-bhushan-nov-15-2012-india-ranks-second-globally-in-accessing-private-details-of-users">
    <title>India ranks second globally in accessing private details of users</title>
    <link>https://cis-india.org/news/thinkdigit-internet-kul-bhushan-nov-15-2012-india-ranks-second-globally-in-accessing-private-details-of-users</link>
    <description>
        &lt;b&gt;According to the latest transparency report released by Google, India ranks second in the world for accessing private details of its citizens, only after the U.S. The Google report lists out requests it received from governments across the world to access details of users of its various services.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Kul Bhushan's blog post was &lt;a class="external-link" href="http://www.thinkdigit.com/Internet/India-ranks-second-globally-in-accessing-private_11364.html"&gt;published in thinkdigit&lt;/a&gt; on November 15, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.thinkdigit.com/latest/google.html" target="_blank"&gt;Google's&lt;/a&gt; data reveals India had made 2,319 requests involving 3,467 users in the first six months. The U.S. made 7,969 requests, while Brazil, which ranks third, made 1,566 requests during the same period. Worldwide 20,938 requests were made during the January-June period. The report says the information shared included complete Gmail account, chat logs, Orkut profile and search terms among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The requests for accessing user data from India had grown two-fold from 1,061 in July-December 2009 to 2,207 in July-December 2011, the report points out.&lt;br /&gt;&lt;br /&gt;According to the report, India has been consistently sending requests to remove content which it brands as defamatory and against national security. The court orders, however, to take down content has remained almost stagnant over the years; though requests from the executive and police have grown.&lt;br /&gt;&lt;br /&gt;In the first six months this year, there were 20 court orders and 64 requests from executive/police that resulted in 596 items being taken down from the web. During the January-June 2010 period, there were only eight court orders and 22 executive/police requests, resulting in 125 items being taken down. Read about Google's previous transparency report here.&lt;br /&gt;&lt;br /&gt;"Though India is a large country with a significant number of internet users, this data is nonetheless an indicator of growing surveillance," Times of India quotes Pranesh Prakash, policy director at Centre for Internet and Society ( CIS), a Bangalore-based organization looking at issues of public accountability, internet freedom and openness, as saying.&lt;br /&gt;&lt;br /&gt;"India lacks a general privacy law that helps set guidelines for such user requests, despite privacy being a constitutional right as part of the right to life," added Prakash.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/thinkdigit-internet-kul-bhushan-nov-15-2012-india-ranks-second-globally-in-accessing-private-details-of-users'&gt;https://cis-india.org/news/thinkdigit-internet-kul-bhushan-nov-15-2012-india-ranks-second-globally-in-accessing-private-details-of-users&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-11-19T04:49:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/india-privacy-meet">
    <title>India Privacy Meet</title>
    <link>https://cis-india.org/news/india-privacy-meet</link>
    <description>
        &lt;b&gt;Microsoft, DSCI and Greyhead came together to organise India Privacy Meet at Hotel LeMeridien on June 29, 2012 in New Delhi. Sunil Abraham was a panelist in the event.&lt;/b&gt;
        &lt;h2&gt;Agenda&lt;/h2&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;10:00a.m.- &lt;br /&gt;10:10a.m.&lt;/td&gt;
&lt;td&gt;Welcome and Introduction: Rahul Neel Mani, Editor &amp;amp; Co-founder Grey Head Media&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:10a.m.- &lt;br /&gt;10:30a.m.&lt;/td&gt;
&lt;td&gt;Conference Opening Remarks: Dr. Kamlesh Bajaj, CEO Data Security Council of India&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:30a.m.- &lt;br /&gt;10:45a.m.&lt;/td&gt;
&lt;td&gt;Theme Address: Deepak Rout, CSO &amp;amp; Director Privacy, Microsoft India&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:45a.m.- &lt;br /&gt;11:00a.m.&lt;/td&gt;
&lt;td&gt;Tea/Coffee Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00a.m.- &lt;br /&gt;12:00p.m.&lt;/td&gt;
&lt;td&gt;Panel 1: Consumer Privacy – Creating the Right Balance&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Brief&lt;/b&gt;: Data Privacy is perhaps the most concerning issue in the digital age.  Consumer privacy or customer privacy, involves the handling and protection of sensitive personal information that individuals provide in the course of everyday  commercial or professional transactions. This involves exchange or use of data electronically or  by other means, including telephone, fax, writing, and word of mouth. With the advent and evolution of Internet and other electronic methods of mass communications, consumer privacy has become a major concern to deal with. Personal information, when misused or inadequately protected, can result in identity theft, financial fraud, and other problems that collectively cost  individuals, businesses, and governments. In addition, Internet crimes and civil disputes consume  law enforcement and judicial  resources, confound legislators and bureaucracy, and produce untold personal aggravation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Key Discussion Areas:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Handling of Personal Information including Sensitive Personal Information&lt;/li&gt;
&lt;li&gt;Customer education on understanding business models and motives behind collection and use of Personal Information? &lt;/li&gt;
&lt;li&gt;Privacy legislation and striking the right balance between various objectives&lt;/li&gt;
&lt;li&gt;Privacy by design, online tracking, and transparency issues&lt;/li&gt;
&lt;li&gt;Role of Government, Academia and Citizen groups &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Panelists:&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Chair - Dr. Kamlesh Bajaj, CEO, Data Security Council of India (DSCI)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sivarama Krishnan, Executive Director, PwC India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Pankaj Agarwal, Head of IT Governance &amp;amp; CISO Aircel&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Prashant Mali, Advocate &amp;amp; Cyber Law Expert &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Deepak Rout, CSO &amp;amp; Director Privacy, Microsoft India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Vishal Jain, Director, Ernst &amp;amp; Young&lt;/li&gt;
&lt;/ul&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;12:00p.m.- 01:00p.m.&lt;/td&gt;
&lt;td&gt;Panel 2: Citizen Privacy &lt;br /&gt;Transparency, Accountability and Social Progress&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Brief&lt;/b&gt;:  While citizens are  adopting  new technologies  which  are  increasingly  making it easier to share information more freely and thereby track individuals more easily, they are also demanding more accountability and openness. Experience indicates that having a more informed citizenry improves services, and accelerates innovation; thus the era of copious content has the potential to generate a host of new services and businesses. However, there is a need for greater transparency in the handling of citizen data and its legitimate use  in  governance and law enforcement. While new age technologies, if inappropriately used, have a potential impact on citizens’ privacy, they also arm us with the capability to protect citizen data and  provide opportunities for privacy conscious and transparent usage of such data, provided there is an enabling environment created by informed and responsible privacy legislation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Key Discussion Areas:&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Core objectives for privacy legislation&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Role of government in protecting citizen privacy&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Citizen awareness of privacy  concerns in today’s legal, business and technology landscape&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Expectations of government  and  citizens on policies around usage and collection of personal data and ability to build profiles for being used for different purposes&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Model privacy legislation&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Panelists:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Chair - &lt;b&gt;Nirmaljeet Singh Kalsi&lt;/b&gt;, Jt. Secretary, Ministry of Home Affairs&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Na Vijaya Shankar&lt;/b&gt;, E-business Consultant &amp;amp; Cyber Law Specialist (Coordinator)&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Sunil Abraham&lt;/b&gt;, Executive Director, Centre for Internet &amp;amp; Society&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Akhilesh Tuteja&lt;/b&gt;, Executive Director, KPMG India&lt;/li&gt;
&lt;li&gt;&lt;b&gt;A P Singh&lt;/b&gt;, DDG, Unique Identification Authority of India (UIDAI)&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Kailas Karthikeyan&lt;/b&gt;, Regulatory &amp;amp; Pub Policy Manager, Legal and Corp Affairs Microsoft&lt;/li&gt;
&lt;/ul&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;01:00p.m.- &lt;br /&gt;01:10p.m.&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Conference Closing Remarks by Deepak Rout, CSO &amp;amp; Director, Privacy Microsoft India&lt;/p&gt;
&lt;p&gt;Vote of Thanks&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;01:15p.m. onwards&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/india-privacy-meet'&gt;https://cis-india.org/news/india-privacy-meet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-07-02T10:48:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-week-anuj-srinivas-july-6-2016-india-no-haven-for-net-freedom-but-did-not-oppose-un-move-on-internet-rights">
    <title>India No Haven For Net Freedom But It Did Not Oppose UN Move on Internet Rights</title>
    <link>https://cis-india.org/internet-governance/news/the-week-anuj-srinivas-july-6-2016-india-no-haven-for-net-freedom-but-did-not-oppose-un-move-on-internet-rights</link>
    <description>
        &lt;b&gt;India hasn’t had the best record when it comes to Internet rights. The country regularly carries out Internet shutdowns under flimsy pretexts, is still fumbling when it comes to the drafting of a comprehensive privacy bill, and most recently came out with a geospatial information regulation bill that would establish ownership over all forms of location data.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://thewire.in/49131/india-internet-resolution-freedom-rights-vote/"&gt;The article by Anuj Srinivas was published in the Wire on July 6, 2016&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;So, last week, when the United         Nations Human Rights Council (UNHRC)&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="http://www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=20226&amp;amp;LangID=E" rel="external nofollow" target="_blank" title="passed"&gt;passed&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;a resolution on the         “promotion, protection and enjoyment of human rights on the         Internet”, it wasn’t surprising to see the wave of media         criticism of the amendments that were proposed by countries such         as China and Russia – and which were supported by India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;South Africa’s &lt;i&gt;Mail &amp;amp; Guardian&lt;/i&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="http://mg.co.za/article/2016-07-04-sa-votes-against-internet-freedoms-in-un-resolution" rel="external nofollow" target="_blank" title="ran "&gt;ran&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;a story headlined         “South Africa votes with China, Russia and India against         Internet freedoms in UN resolution”. &lt;i&gt;Private Internet           Access’s &lt;/i&gt;&lt;a href="https://www.privateinternetaccess.com/blog/2016/07/these-17-countries-dont-believe-that-freedom-of-expression-on-the-internet-is-a-human-right/" rel="external nofollow" target="_blank" title="headline"&gt;headline&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;was “These 17 Countries         Don’t Believe that Freedom of Expression on the Internet is a         Human Right”. Popular tech website &lt;i&gt;The Verge&lt;/i&gt; &lt;a href="http://www.theverge.com/2016/7/4/12092740/un-resolution-condemns-disrupting-internet-access" rel="external nofollow" target="_blank" title="noted"&gt;noted&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;that the resolution was         opposed “by a minority of authoritarian regimes including         Russia, China and Saudi Arabia, as well as democracies like         South Africa and India. These nations called for the UN to         delete a passage in the resolution that ‘condemns unequivocally         measures to intentionally prevent or disrupt access to our         dissemination of information online’.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The Verge&lt;/i&gt;‘&lt;i&gt;s &lt;/i&gt;report was followed up         by a number of Indian publications including &lt;i&gt;&lt;a href="http://indiatoday.intoday.in/technology/story/un-seeks-to-make-web-access-human-right-india-joins-saudi-arabia-in-opposing-it/1/707353.html" rel="external nofollow" target="_blank" title="IndiaToday"&gt;IndiaToday&lt;/a&gt; &lt;/i&gt;and &lt;i&gt;&lt;a href="http://www.medianama.com/2016/07/223-right-to-internet-un-resolution/" rel="external nofollow" target="_blank" title="Medianama"&gt;Medianama&lt;/a&gt; – &lt;/i&gt;the         latter incorrectly stating that the UNHRC resolution “recognised         Internet usage as a basic human right – as well a host of other&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="https://www.privateinternetaccess.com/blog/2016/07/these-17-countries-dont-believe-that-freedom-of-expression-on-the-internet-is-a-human-right/" rel="external nofollow" target="_blank" title="global           publications"&gt;global publications&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The facts&lt;/b&gt;&lt;br /&gt; There were two fundamental mistakes with some of these reports.         Firstly, the resolution was adopted without vote (with oral         revision) &lt;a href="http://tion%20which%20recognized%20internet%20usage%20as%20a%20basic%20human%20right./" rel="external nofollow" target="_blank" title="as noted"&gt;as noted&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;by the UNHRC. Therefore,         while there were a number of countries which co-sponsored the         resolution and many that didn’t, it is completely wrong to state         that India – as the&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;i&gt;Mail           &amp;amp; Guardian &lt;/i&gt;reported – or any other country, voted         against the resolution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secondly, as&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="https://twitter.com/pranesh/status/750257769844871168" rel="external nofollow" target="_blank" title="noted"&gt;noted&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;by the Centre for         Internet and Society, none of the four amendments supported by         India called for the deletion of a passage that condemned the         prevention or disruption of Internet access and online         information dissemination. Although it may fit neatly within         India’s history of issuing Internet block orders, no country was         opposed to this paragraph at the UNHRC forum (although many         countries including India flout this clause in spirit back at         home). No such amendment was proposed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What then were these four amendments, which &lt;i&gt;Article           19&lt;/i&gt;, an organisation that advocates freedom of expression,&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="https://www.article19.org/resources.php/resource/38428/en/unhrc:-reject-attempts-to-weaken-resolution-on-human-rights-and-the-internet" rel="external nofollow" target="_blank" title="stated "&gt;stated&lt;/a&gt;would         “substantially weaken the resolution”? Out of the four         amendments (referred to as L85-88 in the UNHRC resolution), the         first amendment (L85) – which sought to include a reference to         fighting against the exploitation of children online – was         withdrawn by Russia before it was considered by member states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other three amendments, while not completely         endorsed by the countries that co-sponsored the resolution, do         carry a certain level of nuance. Only one of the amendments         (L86) can truly be described as diluting language regarding         freedom of expression online, although this could have been         potentially a result of procedural politics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;L88: Including Reference to Hate Speech&lt;/b&gt;&lt;br /&gt; This amendment – proposed by Belarus, China, Iran and the         Russian Federation – asks to introduce a new paragraph that         states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Expresses its concern at the use of the         Internet and information and communications technology         to disseminate ideas based on racial superiority or hatred, and         incitement to racial discrimination, xenophobia and related         intolerance.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Article 19&lt;/i&gt; &lt;a href="https://www.article19.org/resources.php/resource/38428/en/unhrc:-reject-attempts-to-weaken-resolution-on-human-rights-and-the-internet" rel="external nofollow" target="_blank" title="says of this           amendment"&gt;says of this           amendment&lt;/a&gt; that it would “undermine the intended focus of         the draft resolution on protecting human rights online, in         particular freedom of expression..” While it is true that a few         paragraphs of the resolution’s preamble include a reference to         hate speech, it is difficult to see what harm this amendment         would have brought in and even more difficult to accept that it         would dilute the focus of the overall resolution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Using the Internet and other online media technologies         for incitement and as&lt;a href="http://www.bbc.com/news/world-asia-india-19292572" rel="external nofollow" target="_blank" title=" a means "&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;a means&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;of propagating         intolerance and xenophobia is a very real problem in India and         other Asian countries, the most notable example of which was the         role that social media played in the exodus of north-east Indian         migrants from Bangalore four years ago. While shutdowns are         obviously not the best way of dealing with this, it is important         to acknowledge the role of the Internet as a medium in this         aspect. In sum, this amendment certainly would not have diluted         the resolution’s aim of promoting freedom of expression online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;L87: Human-Rights Approach&lt;/b&gt;&lt;br /&gt; The second amendment replaces the term “human rights-based         approach” with “comprehensive and integrated approach” in  two         paragraphs on expanding Internet access:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;PP17: &lt;/span&gt;&lt;span&gt;Stressing the importance of applying           a&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;comprehensive           and integrated&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/b&gt;(&lt;span&gt;human rights-based&lt;/span&gt;&lt;span&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;approach)           in providing and expanding access to the Internet and for the           Internet to be open, accessible and nurtured by           multistakeholder participation,&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;OP5: &lt;/span&gt;&lt;span&gt;Affirms also the importance of           applying a&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;comprehensive           and integrated&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/b&gt;(&lt;span&gt;human rights-based&lt;/span&gt;&lt;span&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;approach)           in providing and in expanding access to Internet and requests           all States to make efforts to bridge the many forms of digital           divides..&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This amendment was a little trickier. According to         people involved in the country stakeholder discussions, whom &lt;i&gt;The           Wire&lt;/i&gt;spoke with, the aversion to a ‘human-rights’ approach         towards expanding Internet access came as a result of China and         Russia playing procedural politics. The language that was         proposed in the amendment – “comprehensive and integrated” –         while certainly not the strongest possible language that could         have been used, would not have legally diluted the proposal to         expand Internet access while maintaining an open and         multistakeholder approach towards Internet governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Stepping back, what would a human rights-based         approach in expanding Internet access look like? Would it         include legitimising the act of zero-rating and the approval of         schemes such as Facebook’s Free Basics? Both of which,         incidentally, have been banned in India. While the proposed         amendment certainly does not speak well of the motivations of         China, Russia and India, the term is also vague enough that its         mere removal doesn’t indicate a lack of support towards Internet         freedom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;L88 – Right to privacy and removal of UDHR           reference&lt;/b&gt;&lt;br /&gt; This amendment, proposed by China and the Russian Federation,         was more straightforward. In two paragraphs, it sought to add         the specific term ‘right to privacy’, while in another paragraph         it proposed removing reference to language from, and articles         in, the&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="http://www.un.org/en/universal-declaration-human-rights/" rel="external nofollow" target="_blank" title="Universal           Declaration of Human Rights"&gt;Universal           Declaration of Human Rights&lt;/a&gt;.  Had the amendment been         passed, the changes in the following paragraphs would have been         made:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;PP7: &lt;/span&gt;&lt;i&gt;&lt;span&gt;Noting&lt;/span&gt;&lt;/i&gt;&lt;span&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;that           the exercise of human rights, in particular the right to           freedom of expression&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;and           the right to privacy&lt;/b&gt;&lt;span&gt;, on           the Internet is an issue of increasing interest and importance           as the rapid pace of technological development enables           individuals all over the world to use new information and           communication technologies,&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;OP15: &lt;/span&gt;&lt;i&gt;&lt;span&gt;Decides&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt;to continue its consideration of the           promotion, protection and enjoyment of human rights, including           the right to freedom of expression&lt;/span&gt;&lt;b&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;and the right to           privacy&lt;/b&gt;&lt;span&gt;, on the Internet           and other information and communication technology, as well as           of how the Internet can be an important tool for fostering           citizen and civil society participation, for the realisation           of development in every community and for exercising human           rights, in accordance with its programme of work.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;OP1: &lt;/span&gt;&lt;i&gt;&lt;span&gt;Affirms&lt;/span&gt;&lt;/i&gt;&lt;span&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;that           the same rights that people have offline must also be           protected online, in particular freedom of expression&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;del&gt;which is applicable regardless             of frontiers and through any media of one’s choice&lt;/del&gt;, &lt;/span&gt;&lt;b&gt;and           the right to privacy &lt;/b&gt;&lt;span&gt;in           accordance with articles&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;17           and&lt;/b&gt;&lt;span&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;19 of the&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;del&gt;Universal Declaration of Human             Rights and the&lt;/del&gt; &lt;/span&gt;&lt;span&gt;&lt;a href="http://www.ohchr.org/en/professionalinterest/pages/ccpr.aspx" rel="external nofollow" target="_blank" title="International             Covenant on Civil and Political Rights;"&gt;International Covenant on Civil and             Political Rights;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On one hand, this amendment would have added specific         reference to the right to privacy. That specific term doesn’t         appear in the draft resolution, although there are a few         references to privacy in general in the resolution’s preamble.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the addition of a ‘right to privacy’ is         coupled with a watering down of clear references to the         protection of freedom of expression.   Cynical observers would         rightly note that China and Russia are probably less concerned         with online privacy and more irked with the clear support of         freedom of expression “regardless of frontiers” and “in         accordance with the Universal Declaration of Human Rights”;         which is probably why this particular proposed amendment         combined both issues to improve its chances of passing. While         there is little doubt that this amendment would have diluted the         resolution’s focus on protecting freedom of expression, the         alternative phrasing also doesn’t create legal loopholes that         renders it useless. Moreover, it still contains reference to the         International Covenant on Civil and Political Rights, especially         Article 19, which goes beyond Article 19 of the UDHR .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;India, a guardian?&lt;/b&gt;&lt;br /&gt; It would be naive and wrong to take a strong position either         way. To state that the amendments supported by India are         all antithetical to the spirit of the UNHRC resolution, as some         have done, is simply incorrect. On the other hand, this doesn’t         mean India, and even less, China and Russia, are guardians of         Internet freedom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UNHRC resolution in its entirety&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="http://www.un.org/ga/search/view_doc.asp?symbol=A/HRC/32/L.20" rel="external nofollow" target="_blank" title="is a fine           document"&gt;is a fine document&lt;/a&gt;.         While non-binding, it provides a foundation for claiming that         the same rights people have offline “must also be protected         online”. Other crucial sections state that governments “should         ensure accountability for all human rights violations and abuses         committed against persons for exercising their human rights         online”, while condemning “measures to intentionally prevent or         disrupt access to or dissemination of information online”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the amendments India supported may not wholly         oppose this resolution, it is also true that successive Indian         governments also do not have an admirable track-record         of upholding the resolution’s aims. Freedom for online speech         had to be reclaimed in the form of court judgements, with the         current government&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="http://www.newslaundry.com/2016/03/28/is-section-66a-coming-back/" rel="external nofollow" target="_blank" title="still           supporting regulations"&gt;still           supporting regulations&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;that         would allow it clamp down on online freedom of expression. In         certain states within the country, Internet shutdowns happen         without public explanations or justifiable reasoning. Over the         last four years, for instance, Jammu and Kashmir&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="http://thewire.in/29857/jammu-kashmir-has-lost-18-days-of-mobile-internet-access-over-last-four-years/" target="_blank" title="has lost"&gt;has           lost&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;18 days of         Internet access. While it may not have wholly opposed the UNHRC         resolution, the country still has a ways to go in terms of         Internet freedom.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-week-anuj-srinivas-july-6-2016-india-no-haven-for-net-freedom-but-did-not-oppose-un-move-on-internet-rights'&gt;https://cis-india.org/internet-governance/news/the-week-anuj-srinivas-july-6-2016-india-no-haven-for-net-freedom-but-did-not-oppose-un-move-on-internet-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-07-09T02:25:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/india-needs-an-independent-privacy-law-says-ngo-privacy-india">
    <title>India needs an independent privacy law, says NGO Privacy India</title>
    <link>https://cis-india.org/news/india-needs-an-independent-privacy-law-says-ngo-privacy-india</link>
    <description>
        &lt;b&gt;India needs an independent privacy law though there are a number of provisions in existing legislations that protect a citizen's privacy, according to an NGO that is lobbying for the cause. The story was published in the Economic Times on 2 February 2012. 
&lt;/b&gt;
        
&lt;p&gt;&lt;br /&gt;Privacy India, a conglomerate of the Centre for Internet and Society (CIS) and the Society in Action Group (SAG), with support from Privacy International, conducted a study of the existing laws in India related to privacy over a period of one and a half years in various cities.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;A report, which will be released soon, has documented their findings about privacy laws and issues in India and high-level conclave and a national symposium on privacy will be held in Delhi on February 3 and 4.&lt;br /&gt;&lt;br /&gt;Lawyer-activist Prashant Bhushan and NCPRI head Aruna Roy will take part in the discussions on privacy in transparency, e-governance initiatives, national security, banking and health issues.&lt;br /&gt;&lt;br /&gt;"India doesn't have a privacy law, but there are provisions for it in different laws. During the course of the research, we found that the Indian judiciary has not been very strict in overseeing the implementation of the privacy clauses in various laws," CIS member Prashant Iyengar said, while reporting some of the findings of the study.&lt;br /&gt;&lt;br /&gt;Stricter implementation of the existing laws could go a long way in curbing most privacy issues, Iyengar said.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://economictimes.indiatimes.com/news/news-by-industry/et-cetera/india-needs-an-independent-privacy-law-says-ngo-privacy-india/articleshow/11727558.cms"&gt;Published in the Economic Times on 2 February 2012&lt;/a&gt;. Prashant Iyengar is quoted in this.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/india-needs-an-independent-privacy-law-says-ngo-privacy-india'&gt;https://cis-india.org/news/india-needs-an-independent-privacy-law-says-ngo-privacy-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-02-03T11:46:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/los-angeles-times-shashank-bengali-may-12-2017-india-is-building-a-biometric-database-for-1.3-billion-people-and-enrollment-is-mandatory">
    <title>India is building a biometric database for 1.3 billion people — and enrollment is mandatory</title>
    <link>https://cis-india.org/internet-governance/news/los-angeles-times-shashank-bengali-may-12-2017-india-is-building-a-biometric-database-for-1.3-billion-people-and-enrollment-is-mandatory</link>
    <description>
        &lt;b&gt;Inside the buzzing enrollment agency, young professionals wearing slim-fitting jeans and lanyards around their necks tapped away at keyboards and fiddled with fingerprint scanning devices as they helped build the biggest and most ambitious biometric database ever conceived.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shashank Bengali was published in the &lt;a class="external-link" href="http://www.latimes.com/world/la-fg-india-database-2017-story.html"&gt;Los Angeles Times&lt;/a&gt; on May 12, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Into the office stepped Vimal Gawde, an impoverished 75-year-old widow  dressed in a floral print sari. She had come to secure her ticket to  India’s digital future — to enroll in the identity program, called  Aadhaar, or “foundation,” that aims to record the fingerprints and  irises of all 1.3 billion Indian residents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nearly 9 out of 10 Indians have registered, each assigned a  unique 12-digit number that serves as a digital identity that can be  verified with the scan of a thumb or an eye. But Gawde came to the  enrollment office less out of excitement than desperation: If she didn’t  get a number, she worried that she wouldn’t be able to eat.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Designed  as a showcase of India’s technological prowess — offering identity  proof to the poor and reducing waste in welfare programs — Aadhaar’s  grand promises have been muddied by controversy as the government makes  enrollment mandatory for a growing number of essential services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indians  now need an Aadhaar number to pay taxes, collect pensions and obtain  certain welfare benefits. The rapid expansion of a program that was  originally described as voluntary has sparked criticism that India is  vacuuming up citizens’ personal information with few privacy safeguards  and creating hardship for the very people the initiative was supposed to  help.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Like many Indians living in poverty, Gawde uses a  ration card to purchase her monthly allotment of subsidized rice and  cooking gas. But the shopkeeper told her that starting next month, he  would sell to her only if she produced an Aadhaar number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She  had visited the enrollment agency three times but had yet to be  approved, for reasons she did not understand. (Enrollment agents would  not comment on individual cases.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reaching into her  canvas bag, Gawde pulled out the familiar panoply of documents — ration  card, voter card, electricity bill, income tax ID — that Indians use to  navigate a dizzying bureaucracy. Aadhaar, she was told, would supplant  all these papers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But she had to get the number first.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I’m  nervous,” Gawde said outside the enrollment office on a sweltering  morning. “I first applied three years ago and submitted all my  documents, but didn’t follow up. Now that it’s becoming compulsory, I’m  doing everything I can to get it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian  Prime Minister Narendra Modi, who had criticized Aadhaar as a  “political gimmick” before he took office, has embraced the futuristic  idea of an all-in-one digital identity. His party pushed through a law  last year that paved the way for a dramatic expansion of Aadhaar,  allowing&lt;b&gt; &lt;/b&gt;government entities and private businesses  wide latitude to access the database, which collects not just people’s  names and birth dates but also phone numbers, email addresses and other  information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Soon, as more private companies use the  database, it could become difficult to open a bank account, get a new  cellphone number or buy plane or train tickets without being enrolled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Supporters  say the program, which has cost about $1 billion to implement, will  save multiples of that by curbing tax evasion and ensuring that welfare  subsidies are not stolen by middlemen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Aadhaar was  always meant to be an instrument of inclusion,” Nandan Nilekani, a tech  billionaire and the program’s first chairman, said in an interview. “I’m  really happy that the current government is completely endorsing  Aadhaar and using it for a wide variety of services that will transform  governance.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nilekani calls Aadhaar “hugely empowering” for the poor, but&lt;b&gt; &lt;/b&gt;not long ago even he &lt;a href="http://www.thehindu.com/todays-paper/AADHAR-not-mandatory-says-Nilekani/article16034138.ece"&gt;argued&lt;/a&gt; that enrollment&lt;b&gt; &lt;/b&gt;should  remain optional so that no Indians were prevented from accessing  essential services. India’s Supreme Court agreed, ruling in 2015 that  the government could not require Aadhaar for any benefit to which a  person was otherwise entitled, as long as they could prove their  identity by some other means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yet the court has stayed silent as Aadhaar creeps into every facet of Indian life, even for children.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A  12-year-old girl named Saiba is a case in point. After the girl’s  grandmother passed away in their family’s ancestral village in northern  India, Saiba’s mother moved her and her four siblings to a crowded  neighborhood on the rough fringes of New Delhi, near a car parts market  thick with the smell of grease.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When Saiba’s mother,  Rani, went to the local school in April to register her for the sixth  grade, administrators turned her down, saying every student must have an  Aadhaar number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But to get a number, a child usually  needs a birth certificate — and like one-quarter of children born in  this country, Saiba and her siblings did not have them because their  village did not routinely register births.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sitting with  her mother in the cramped offices of the local advocacy group  Pardarshita, above a noisy street lined with vegetable sellers, the girl  puffed her round cheeks in an expression of helplessness.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I don’t know anything about this,” said Saiba, who, like many Indians, has only one name. “I just want to go to school.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rakesh Thakur, a board member of Pardarshita, is trying to obtain Aadhaar numbers for&lt;b&gt; &lt;/b&gt;dozens  of children barred from Delhi schools. He called the policy “a clear  violation” by the municipal government of both the Supreme Court order  and India’s Right to Education Act, which guarantees every child younger  than 14 free schooling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A Twitter account called  “Rethink Aadhaar” logs new instances almost daily of Indians who have  suffered because scanners couldn’t read their fingerprints or because of  errors in the database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  Jawhar, a forested zone about 60 miles north of Mumbai, administrators  have told local tribal communities that they will soon use Aadhaar to  distribute welfare rations and school lunches. But the area lies outside  cellphone range, leading residents to wonder how scanners will connect  to the Internet to verify their identities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The idea of  Aadhaar and the technology may be good, but do we have the  infrastructure to make it mandatory?” said Vivek Pandit, a former  lawmaker who runs a nonprofit group in the area. “The law is  city-centric, and it would only lead to the social exclusion of rural  India.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This month lawyers opposing Aadhaar argued before  the Supreme Court that the government could not force Indians to share  their biometric data. Atty. Gen. Mukul Rohatgi countered that Indians  had no constitutional right to privacy and could not claim an “absolute  right” over their bodies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Without privacy protections, activists worry that as Aadhaar numbers are linked to more and more services, intelligence agencies could use the database to more easily track Indians’ calls, travels and purchases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It’s become very clear that this is not a project about the  poor,” said Usha Ramanathan, a lawyer and anti-Aadhaar activist. “The  government’s ambitions have gotten greater over time.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This month, the Center for Internet and Society, a New Delhi think tank, &lt;a href="http://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1" target="_blank"&gt;reported&lt;/a&gt; that federal and state agencies had published up to 135 million Aadhaar  numbers — some including sensitive information such as a person’s caste  and religion, or details of pension payments — on unsecured websites  accessible through just a few clicks.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;span class="trb_pullquote_text"&gt;It’s become very clear that this is not a project about the poor.&lt;/span&gt; &lt;span class="trb_pullquote_credit"&gt;— Usha Ramanathan, a lawyer and anti-Aadhaar activist&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, the center’s policy director, said that  when Indian authorities can’t even keep Aadhaar numbers private, as the  law requires, it suggests the entire database is vulnerable —  particularly after sensitive information involving 22 million Americans  was exposed when federal databases were &lt;a href="http://www.latimes.com/nation/la-na-government-personnel-hack-20150709-story.html"&gt;hacked&lt;/a&gt; in 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“When  these kinds of leaks are happening, it’s rather foolhardy to maintain a  database of 1.2 billion people’s biometrics, because once this gets  breached, it becomes completely unusable,” Prakash said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If your PIN number or password leaks, you can change it. You can’t change your fingerprints.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Praveen  Chakravarty, a former investment banker who worked with Nilekani to  launch Aadhaar, believes the lack of safeguards undermines the project’s  ideals of efficiency and empowerment. He said many Indians were right  to worry that Modi’s government, which has cracked down on &lt;a href="http://www.latimes.com/world/asia/la-fg-india-crackdown-greenpeace-20150113-story.html"&gt;political activists&lt;/a&gt; and &lt;a href="http://www.latimes.com/world/la-fg-india-charity-2017-story.html"&gt;nonprofit groups&lt;/a&gt; it opposes, could use Aadhaar to snoop on citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Maybe  Aadhaar didn’t need to be this big,” Chakravarty said, adding that the  government could simply have worked to fix inefficiencies in individual  welfare programs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“People could ask, ‘Did we need this at all?’” he said. “It’s a good question.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For  Gawde, the widow, Aadhaar remained an idea of the future. She left the  enrollment agency that day empty-handed, told by a young employee that  her number had not been assigned. But she retained hope that the new ID  would make life easier.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We are just poor people,” she said. “We have to trust what the government tells us.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/los-angeles-times-shashank-bengali-may-12-2017-india-is-building-a-biometric-database-for-1.3-billion-people-and-enrollment-is-mandatory'&gt;https://cis-india.org/internet-governance/news/los-angeles-times-shashank-bengali-may-12-2017-india-is-building-a-biometric-database-for-1.3-billion-people-and-enrollment-is-mandatory&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-12T16:22:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/al-jazeera-video-november-8-2019-india-facial-recognition">
    <title>India facial recognition: How effective will it be?</title>
    <link>https://cis-india.org/internet-governance/news/al-jazeera-video-november-8-2019-india-facial-recognition</link>
    <description>
        &lt;b&gt;India is trying to build what could be the world's largest facial recognition system.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;New Delhi says the system could help fight crime and find missing children.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The technology has already been launched at a few Indian airports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Police in New Delhi says it has identified nearly 3,000 missing children during a trial period last year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But not everyone is convinced.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet freedom advocates say there is little information about where and what the system will be used for and how data will be stored.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The use of facial recognition software is already common in places like China.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But there are questions about how effective it is, with one British study revealing that the technology could be highly inaccurate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash joins Al Jazeera from Bengaluru in India. He is a fellow at the Centre for Internet and Society but is talking to us in a personal capacity&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/YAsMf9qy3cc" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/al-jazeera-video-november-8-2019-india-facial-recognition'&gt;https://cis-india.org/internet-governance/news/al-jazeera-video-november-8-2019-india-facial-recognition&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-11-15T00:42:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash">
    <title>India encryption policy draft faces backlash</title>
    <link>https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash</link>
    <description>
        &lt;b&gt;The department of information technology is facing a backlash from industry experts, Internet watchers and netizens on its draft of the National Encryption Policy that it recently made public.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Moulishree Srivastava was published in &lt;a class="external-link" href="http://www.livemint.com/Industry/3KK1XWztlnFyR10dffTWMM/India-encryption-policy-draft-faces-backlash.html"&gt;Livemint&lt;/a&gt; on September 22, 2015. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;While the draft policy aims to enable a secure environment for both information and transactions in cyberspace for individuals, businesses and government, experts are concerned over privacy and outdated standards prescribed in the policy, among other things.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy puts the onus to produce encrypted information when demanded by government agencies on Indian citizens as well as on all the online service providers including instant messaging and e-commerce services that use encryption technology (to convert plain information to an unreadable format).&lt;br /&gt;&lt;br /&gt;The department put the policy online late last week and it came on the radar of industry watchers and experts over the weekend. The policy is open for comments from the public till 16 October.&lt;br /&gt;&lt;br /&gt;The policy, in its current form, is poorly drafted and the measures listed in it make Indian information systems vulnerable to cyber attacks, experts say.&lt;br /&gt;&lt;br /&gt;For instance, the policy has mandated the use of specific standards and algorithms for encryption.&lt;br /&gt;&lt;br /&gt;Encryption can be compared to the process of translating information in one language into a foreign language.&lt;br /&gt;&lt;br /&gt;“Specifying certain algorithms to be used for encryption, and restricting the key sizes is same as saying that you are only allowed to communicate using a language from a given set of government-specified languages and no other language can be used,” said Pranesh Prakash, policy director at the Centre for Internet and Society.&lt;br /&gt;&lt;br /&gt;However, the ones mentioned in the draft policy are outdated and unsafe to use, experts say. Another thing that weakens the security considerably is the req-uirement for businesses and citizens to keep the information (that was encrypted and sent over) for 90 days, in case law en-forcement agencies demand it. But that also means that for those 90 days, cyber criminals, too, can access it, warn experts.&lt;br /&gt;&lt;br /&gt;Another big gap in the policy is that it leaves out “sensitive departments/agencies of the government designated for performing sensitive and strategic roles”, said Prakash.&lt;br /&gt;&lt;br /&gt;“When the policy states its mission to be the enhancing of confidentiality of information and of security of critical networks by laying out information security best practices, how does it make any sense to keep sensitive or strategic government department and agencies outside its purview?” he asked. “After all, these are the organizations that most need to be kept secure to enhance national cybersecurity.”&lt;br /&gt;&lt;br /&gt;The draft is also ambiguous on which online services—be it shopping online or accessing email—people can use (in compliance with the law) and which online service providers will have to be registered with the government.&lt;br /&gt;&lt;br /&gt;The policy states that “service providers located within and outside India, using encryption technology for providing any type of services in India, must enter into an agreement with the government for providing such services in India”. Users can only use the services that are registered with the government.&lt;br /&gt;&lt;br /&gt;“This is the first time when users are actually being told what are the things they can and cannot do,” said Prakash.&lt;br /&gt;&lt;br /&gt;“The government must take note that the knowledge and expertise of common citizens may be inadequate to understand the nuances of encryption,” said cyber law expert Na Vijayashankar on his blog. “For example, if a citizen uses a service available on the Internet which uses, say, a higher level of encryption than what is appro-ved, then this policy may make him liable for the violation.”&lt;br /&gt;&lt;br /&gt;The problem is enhanced because all online services use some encryption technology. This means that practically all online activity will fall under this new policy.&lt;br /&gt;&lt;br /&gt;For instance, companies like Apple or Microsoft use encryption technologies at various levels of their operating systems; e-commerce services like Flipkart, Amazon and Snapdeal; web browsers like Mozilla Firefox and Google Chrome and mail services like Gmail, Yahoo and Rediff may be required to register with the government. The only way they may escape this requirement is if there is an exemption for products that are in use at a large scale. Network security service providers like Cisco Inc. will also need to comply. (Cisco declined to respond to a query.) Snapdeal said it is still examining the draft policy, while Amazon, Google, Microsoft did not reply to emails sent by Mint. Yahoo said its spokesperson was unavailable.&lt;br /&gt;&lt;br /&gt;One clause that is drawing a lot of ire from industry veterans and technology enthusiasts requires individual users and businesses to store all information that was sent in an encrypted form for 90 days from the date of transaction. The users would also be required to reproduce the plain text and the encrypted text, if demanded by law enforcement agencies.&lt;br /&gt;&lt;br /&gt;The draft policy also overlooks the privacy concerns of citizens and businesses. “It is clearly a violation of freedom of speech. A large part of the policy states how the government can interfere with users, like, by demanding their private messages. The policy is anti-privacy law,” said Prakash. “Privacy and security go hand in hand. So, as this policy weakens the security of the information, it puts the privacy at greater risk.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash'&gt;https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-09-22T01:59:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/indecent-proposals">
    <title>Indecent Proposals</title>
    <link>https://cis-india.org/news/indecent-proposals</link>
    <description>
        &lt;b&gt;If Kapil Sibal’s attempts to police net content fructify, it may even lead to a reversal of some of the forward-looking provisions of the Information Technology (IT) Act, 2000. The new proposal, for instance, will reverse Section 79 which protects intermediaries (websites and carriers) from being prosecuted or made liable for any objectionable content published. Says Pranesh Prakash, programme manager, Centre for Internet and Society: “Unfortunately, what Sibal says turns this upside down as they would now be held responsible for e-content.” Sibal wants to monitor content prior to publication.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?279281"&gt;The article by Arindam Mukherjee was published in Outlook Magazine on December 19, 2011&lt;/a&gt;. Pranesh Prakash was quoted in it.&lt;/p&gt;
&lt;p&gt;While there are privacy concerns, any attempt to do real-time monitoring could pose serious legal complications. Says cyber law expert Pavan Duggal: “This proposition could be ultra vires of the Constitution which guarantees fundamental rights under Article 19, which is about freedom of speech and expression subject to reasonable restrictions.” And the reasonable restrictions for monitoring, blocking and interception of internet content are already built into the IT Act.&lt;br /&gt;&lt;br /&gt;Says Rajya Sabha MP Rajeev Chandrasekhar: “If Sibal was really serious about protecting people, he should have read the IT Act that has a section which allows a victim to legally pursue his/her claim of defamation. If Sibal has his way, DoT bureaucrats will decide what content is ‘appropriate’ or ‘inappropriate’.”&lt;/p&gt;
&lt;div class="pullquote"&gt;“If Sibal was really serious, he should have read the IT Act...it has a section on how victims can pursue defamation claims.”&lt;/div&gt;
&lt;p&gt;Moreover, the IT Intermediary Guideline Rules, 2011, though still provisional, mandate that once service providers receive instructions, they have to remove objectionable content within 36 hours. The Act also has other specific provisions like Section 69, which provides safeguards for interception, monitoring/decryption of information; Section 69A which gives procedures and safeguards for blocking access of information by the public; Section 69B for monitoring and collecting traffic data or information. There are also provisions for obscenity and defamation, with steep fines prescribed. Following these, the state has blocked 11 websites since ’09&lt;/p&gt;
&lt;p&gt;However, what Sibal and his men would have seen is the Act’s inability to act on the content freely flowing in social media sites. Says Duggal: “The IT Act, 2000, was amended in ’08, but doesn’t talk about social media which came up only around that time. There is a need to bring social media within the ambit of the Act. What Sibal is suggesting doesn’t exist anywhere in the world.” Monitoring social media websites would also be a huge challenge as crores of messages and tweets are generated from India everyday.&lt;br /&gt;&lt;br /&gt;And privacy? Experts say since India does not have dedicated legislation on privacy, the government could escape any attack on that front. Although some privacy elements were added to the IT Act in 2008, its scope is limited and the concept of data privacy is missing. In fact, the law doesn’t even recognise a person’s right to data privacy!.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/indecent-proposals'&gt;https://cis-india.org/news/indecent-proposals&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-02-14T06:13:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/incident-response-requirements-in-indian-law">
    <title>Incident Response Requirements in Indian Law</title>
    <link>https://cis-india.org/internet-governance/blog/incident-response-requirements-in-indian-law</link>
    <description>
        &lt;b&gt;Cyber incidents have serious consequences for societies, nations, and those who are victimised by them. The theft, exploitation, exposure or otherwise damage of private, financial, or other sensitive personal or commercial data and cyber attacks that damage computer systems are capable of causing lasting harm. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;A recent example of such an attack  that we have seen from India is the recent data breach involving an alleged 3.2 million debit cards in India.&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; In the case of this hack the payment processing networks such as National Payments Corporation of India, Visa and Mastercard, informed the banks regarding the leaks, based on which the banks started the process of blocking and then reissuing the compromised cards. It has also been reported that the banks failed to report this incident to the Computer Emergency Response Team of India (CERT-In) even though they are required by law to do so.&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; Such risks are increasingly faced by consumers, businesses, and governments. A person who is a victim of a cyber incident usually looks to receive assistance from the service provider and government agencies, which are prepared to investigate the incident, mitigate its consequences, and help prevent future incidents. It is essential for an effective response to cyber incidents that authorities have as much knowledge regarding the incident as possible and have that knowledge as soon as possible. It is also critical that this information is communicated to the public. This underlines the importance of  reporting  cyber incidents as a tool in making the internet and digital infrastructure   secure.. Like any other crime, an Internet-based crime should be reported to those law enforcement authorities assigned to tackle it at a local, state, national, or international level, depending on the nature and scope of the criminal act. This is the first in a series of blog posts highlighting the importance of incident reporting in the Indian regulatory context with a view to highlight the Indian regulations dealing with incident reporting and the ultimate objective of having a more robust incident reporting environment in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Incident Reporting under CERT Rules&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, section 70-B of the Information Technology Act, 2000 (the “&lt;b&gt;IT Act&lt;/b&gt;”) gives the Central Government the power to appoint an agency of the government to be called the Indian Computer Emergency Response Team. In pursuance of the said provision the Central Government issued the Information Technology (The Indian Computer Emergency Response Team and Manner of Performing Functions and Duties) Rules, 2013 (the “&lt;b&gt;CERT Rules&lt;/b&gt;”) which provide the location and manner of functioning of the Indian Computer Emergency Response Team (CERT-In). Rule 12 of the CERT Rules gives every person, company or organisation the option to report cyber security incidents to the CERT-In. It also places an obligation on them to mandatorily report the following kinds of incidents as early as possible:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Targeted scanning/probing of critical networks/systems;&lt;/li&gt;
&lt;li&gt;Compromise of critical systems/information;&lt;/li&gt;
&lt;li&gt;Unauthorized access of IT systems/data;&lt;/li&gt;
&lt;li&gt;Defacement of website or intrusion into a website and unauthorized changes such as inserting malicious code, links to external websites, etc.;&lt;/li&gt;
&lt;li&gt;Malicious code attacks such as spreading of virus/worm/Trojan/botnets/spyware;&lt;/li&gt;
&lt;li&gt;Attacks on servers such as database, mail, and DNS and network devices such as routers;&lt;/li&gt;
&lt;li&gt;Identity theft, spoofing and phishing attacks;&lt;/li&gt;
&lt;li&gt;Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks;&lt;/li&gt;
&lt;li&gt;Attacks on critical infrastructure, SCADA systems and wireless networks;&lt;/li&gt;
&lt;li&gt;Attacks on applications such as e-governance, e-commerce, etc.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The CERT Rules also impose an obligation on service providers, intermediaries, data centres and body corporates to report cyber incidents within a reasonable time so that CERT-In may have scope for timely action. This mandatory obligation of reporting incidents casts a fairly wide net in terms of private sector entities, however it is notable that prima facie the provision does not impose any obligation on government entities to report cyber incidents unless they come under any of the expressions “service providers”, “data centres”, “intermediaries” or “body corporate”. This would mean that if the data kept with the Registrar General &amp;amp; Census Commissioner of India is hacked in a cyber incident, then there is no statutory obligation under the CERT Rules on it to report the incident. It is pertinent to mention here that although there is no obligation on a government department under law to report such an incident, such an obligation may be contained in its internal rules and guidelines, etc. which are not readily available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is pertinent to note that although the CERT Rules provide for a mandatory obligation to report the cyber incidents listed therein, the Rules themselves do not provide for any penalty for non compliance. However this does not mean that there are no consequences for non compliance, it just means that we have to look to the parent legislation i.e. the IT Act for the appropriate penalties for non compliance. Section 70B(6) gives the CERT-In the power to call for information and give directions for the purpose of carrying out its functions. Section 70B(7) provides that any service provider, intermediary, data center, body corporate or person who fails to provide the information called for or comply with the direction under sub-section (6), shall be liable to imprisonment for a period up to  1 (one) year or fine of up to 1 (one) lakh or both.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is possible to argue here that sub-section (6) only talks about calls for information by CERT-In and the obligation under Rule 12 of the CERT Rules is an obligation placed by the central government and not CERT-In. It can also be argued that sub-section (6) is only meant for specific requests made by CERT-In for information and sub-section (7) only penalises those who do not respond to these specific requests. However, even if these arguments were to be accepted and we were to conclude that a violation of the obligation imposed under Rule 12 would not attract the penalty stipulated under sub-section (7) of section 70B, that does not mean that Rule 12 would be left toothless. Section 44(b) of the IT Act provides that where any person is required under any of the Rules or Regulations under the IT Act to furnish any information within a particular time and such person fails to do so, s/he may be liable to pay a penalty of upto Rs. 5,000/- for every day such failure continues. Further section 45 provides for a further penalty of Rs.25,000/- for any contravention of any of the rules or regulations under the Act for which no other penalty has been provided.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Incident Reporting under Intermediary Guidelines&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 2(1)(w) of the IT Act defined the term “intermediary” in the following manner;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“intermediary” with respect to any particular electronic record, means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecom service providers, network service providers, internet service providers, web hosting service providers, search engines, online payment sites, online-auction sites, online market places and cyber cafes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 3(9) of the Information Technology (Intermediaries Guidelines) Rules, 2011 (the “&lt;b&gt;Intermediary Guidelines&lt;/b&gt;”) also imposes an obligation on any intermediary to report any cyber incident and share information related to cyber security incidents with the CERT-In. Since neither the Intermediary Guidelines not the IT Act specifically provide for any penalty for non conformity with Rule 3(9) therefore any enforcement action against an intermediary failing to report a cyber security incident would have to be taken under section 45 of the IT Act containing a penalty of Rs. 25,000/-.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Incident Reporting under the Unified License&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause 39.10(i) of the Unified License Agreement obliges the telecom company to create facilities for the monitoring of all intrusions, attacks and frauds on its technical facilities and provide reports on the same to the Department of Telecom (DoT). Further clause 39.11(ii) provides that for any breach or inadequate compliance with the terms of the license, the telecom company shall be liable to pay a penalty amount of Rs. 50 crores (Rs. 50,00,00,000) per breach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear from the above discussion that there is a legal obligation service providers to report  cyber incidents to the CERT-In. Presently, the penalty prescribed under Indian law may not be enough to incentivise companies to adopt comprehensive and consistent incident response programmes. , except in cases of telecom companies under the Unified License Agreement. A fine of Rs. 25,000/- appears to be inconsequential  when compared to the possible dangers and damages that may be caused due to a security breach of data containing, for example,  credit card details.. Further, it is also imperative that apart from the obligation to report the cyber incident to the appropriate authorities (CERT-In) there should also be a legal obligation to report it to the data subjects whose data is stolen or is put at risk due to the said breach. A provision requiring notice to the data subjects could go a long way in ensuring that service providers, intermediaries, data centres and body corporates implement the best data security practices since a breach would then be known by general consumers leading to a flurry of bad publicity which could negatively impact the business of the data controller, and for a business entity an economic stimulus may be an effective way  to ensure compliance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As we continue to research incident response, the questions and areas we are exploring include the ecosystem of incidence response including what is reported, how, and when, appropriate incentives to companies and governments to report incidents, various forms of penalties, the role of cross border sharing of information and jurisdiction and best practices for incident reporting and citizen awareness.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Published under Creative Commons License CC BY-SA. Anyone can distribute, remix, tweak, and build upon this document, even for commercial purposes, as long as they credit the creator of this document and license their new creations under the terms identical to the license governing this document&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.huffingtonpost.in/2016/10/21/atm-card-hack-what-banks-are-saying-about-india-s-biggest-data/"&gt;http://www.huffingtonpost.in/2016/10/21/atm-card-hack-what-banks-are-saying-about-india-s-biggest-data/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://tech.economictimes.indiatimes.com/news/internet/cert-in-had-warned-banks-on-oct-7-about-expected-targeted-attacks-from-pakistan/54991025"&gt;http://tech.economictimes.indiatimes.com/news/internet/cert-in-had-warned-banks-on-oct-7-about-expected-targeted-attacks-from-pakistan/54991025&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/incident-response-requirements-in-indian-law'&gt;https://cis-india.org/internet-governance/blog/incident-response-requirements-in-indian-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-28T01:19:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/right-circle">
    <title>In the Right Circle</title>
    <link>https://cis-india.org/news/right-circle</link>
    <description>
        &lt;b&gt;I’ve been on Google Plus for a few weeks now. In the beginning, it felt like showing up early at a much-talked-up party. There was a small scatter of people, poking around, examining the place, making preliminary conversation with the few others they knew. Most of the talk was, unsurprisingly, about Google Plus. &lt;/b&gt;
        
&lt;p&gt;Unlike the crash-bang disaster of Google Buzz, its awkward attempt at social networking that alienated most users by publicly exposing their contact list, and then proceeded from error to error, Google Plus has been a low-key, careful affair.&lt;/p&gt;
&lt;p&gt;In the first two weeks, Google calibrated entry, depending on its capacity — letting early adopters and "power users" examine the platform and tell them what’s missing, and what works.&lt;/p&gt;
&lt;p&gt;Google Plus mimics the real world, where people interact in clusters, and relate outwards in concentric circles of trust, rather than Facebook’s megaphone model. You drag and drop people into different circles, and can either mark individual posts to specific circles and combinations (‘family’ ‘college buddies’, ‘artsy types’), or make them public to everyone. You can catch up on these circles separately, and toggle between your many worlds, or choose to read the great river of updates on your “public" stream. Google Plus shows you a civilised way of arranging your acquaintances, avoiding that playground-level, plaintive, Facebook question: "why am I in your limited profile?"&lt;/p&gt;
&lt;p&gt;In concept, Facebook also lets you slice your social world with friend lists, but it’s a tedious labour that few have undertaken. Design is everything — and Facebook was clearly not built for such fine-grained customisation, because everything about its default settings pointed the other way. In fact, its young CEO Mark Zuckerberg seemed to think an attachment to privacy was some faintly embarrassing, vestigial trait — the sooner we accept its obsolescence, the better.&lt;/p&gt;
&lt;p&gt;Facebook has a remarkably flat view of friendship. If your Facebook friends are too wide and various, it can make you clam up, conscious of what a few people might think. Most people, as social media scholar danah boyd has noted, tend to focus on a part of their network, mentally blocking out the rest.&lt;/p&gt;
&lt;p&gt;"I’d like to have separate interactions with my mother, my friends, my students and my university colleagues without bombarding my colleagues with my vacation pictures or boring my mother with research chatter," says Mallesh Pai, an academic who works on the economics of the internet. "Plus actually lets me do that."&lt;/p&gt;
&lt;p&gt;Facebook works with the fiction that there is a single self you present to the world – while, in fact, you are a posse of selves. You might be the naïve seeker in some contexts, the voice of authority in others. In the real world, you read others by their voice and expression, factor in their situations, and modulate your own speech accordingly. But in Facebookland, you talk at an invisible audience. The problem of “collapsed contexts”, and the anxiety of audience is Facebook’s most obvious flaw, and Google Plus has focused squarely on that aspect. It obviously works best for those who are acutely aware of social role-play and judgment. Many people may claim not to care about finessing their personalities to different audiences, or see the point of migrating to a new platform —but once you wrap your head around the rich, real-world aspect of Google Plus, it’s hard to imagine why you’d want to stay on Facebook.&lt;/p&gt;
&lt;p&gt;But it’s not just Facebook that Plus directly takes on — Twitter could also take a direct hit. The “following” circle lets you add people you don’t know personally, and see all their public posts. “Sometimes, it’s weird to realise you’re being followed by so many people you don’t know, but like on Twitter, it seems like too much effort to edit the list. Thankfully, there aren’t any spambots on Plus yet,” says Pranesh Prakash, a lawyer and policy advocate at the Bangalore-based Centre for Internet and Society. There’s no arbitrary 140-character limit, and there are coherent threads of conversation — in fact, the level of visible engagement on Plus makes Twitter look like “a boring RSS reader”, as someone observed.&lt;/p&gt;
&lt;p&gt;Apart from the Facebook and Twitter-type uses, Google Plus comes with a standout feature that’s all its own: Hangouts, spontaneous video chatting with up to 10 people. You start a hangout, and anyone may drop in to talk for a bit. “It’s trying to replicate the sort of gathering you have in a coffee shop, just drop in and chat about the news or whatever,” says Pai. It’s so obviously useful that Dell is reportedly considering dropping traditional customer service calls and choosing to hang out with Google instead. Yes, Facebook has recently teamed up with Skype in a self-declared "awesome" move — but Skype still makes you pay for multi-way video conferencing, and doesn’t offer the serendipitous pleasures of Hangout yet.&lt;/p&gt;
&lt;p&gt;Then there is Sparks, Google Plus’s attempt to push the right content at you – you pick from a variety of interests, and Google supplies a steady scroll of interesting links. Given how much info the company has on people, Sparks could become eerily spot-on.&lt;/p&gt;
&lt;p&gt;In fact, the chief problem with Google Plus may be that it tries to cram in too much, leaving users overwhelmed. The bewildering array of buttons and options may put off some, and right now, it’s difficult to control the signal-to-noise ratio. “It’s definitely not as over-complicated as Google Wave, which nobody could really figure out” says Pai. “And honestly, it would be difficult to imagine the kind of functionality that Plus provides being delivered in any other way.” Then there are some who are sceptical of Circles — saying that greater granularity isn’t going to take away the dilemmas of talking to a group. They predict that once the novelty wears off and Google Plus expands, you’ll be struggling to edit and divide your circles, and to pitch yourself right.&lt;/p&gt;
&lt;p&gt;So will Google Plus lure 750 million-plus Facebook and Twitter users away? "Don’t underestimate Facebook’s network benefits," says Prakash. “When I first went online in 1996, the first thing to do was to create an email address. Now the first thing that people do to mark an online entry is to create a Facebook account”.&lt;/p&gt;
&lt;p&gt;Besides, Google may not want to supplant Facebook as much as master an arena it has so far sucked at – the social world. As Pranesh Prakash says, “it’s not about competition with Facebook, as much as trying to improve Google’s own services, bring them together into a seamless whole and better understand its users.” Making social life machine-readable would obviously be the next big jackpot for Google, and it appears determined to invest the time, resources and effort to getting it exactly right. As Shimrit Ben-Yair, product manager of the social graph at Google told Wired magazine’s Stephen Levy, Google Plus could be a revolutionary service if it hits the sweet spot between Facebook oversharing and Twitter undersharing.&lt;/p&gt;
&lt;p&gt;Besides, most would agree that a spot of vigorous competition would be good for Facebook, which has played fast and loose with privacy policy — changing its defaults, and then reacting to the outcry that follows. "For too long, it was the only game in town. Facebook has innovated more in the three weeks that Plus has been around, than in a lon time," says Pai.&lt;/p&gt;
&lt;p&gt;So far, Google Plus has been extra-solicitous of privacy, and adjusted on the fly to field testers’ feedback. It has jumped to attend to mistakes – like responding to complaints that a user’s gender should not be publicly available. When someone pointed out that even limited posts could be reshared by others, that technical hole was immediately plugged. "It’s very heartening to see that they’ve learnt from the mistakes of Facebook and Buzz," says Prakash. Unlike Facebook’s possessiveness about your information and pictures, Google’s Data Liberation policy is explicitly committed to letting you erase all personal traces whenever you want, and free yourself from any product.&lt;/p&gt;
&lt;p&gt;But as Prakash cautions, "Google may not have a coherent view of privacy across all its products — for all Google Plus’s delicacy and tact, Google Street View may have different ideas about what is acceptable." There are many who find it unnerving that a revenue-driven, publicly traded company should be the master switch of our information economy. Given Google’s girth and dominance, competitors can’t realistically wrest attention away, after a certain point.&lt;/p&gt;
&lt;p&gt;"Google is bigger because it’s better and better because it’s bigger", writes Siva Vaidyanathan in The Googlization of Everything. Google Plus, then, marks another large advance in the company’s stated mission to organise the world’s information. Even Pai admits that “if a new mail application came along, it would have to offer so much more than Google for me to consider shifting – given how Gmail does everything, syncs my calendar, knows my friends." But then again, he says, “Let’s judge Google not on what we think it is, but what it does. Everything that’s too big in a bad way, even those considered invincible, gets stopped eventually. Right now, I’m reading about Murdoch’s undoing with great glee – a few weeks back, who would have imagined that?"&amp;nbsp;&lt;/p&gt;
&lt;div class="pullquote"&gt;This article by&amp;nbsp;Amulya Gopalakrishnan was published in the Indian Express on July 24, 2011. The original story can be read&lt;a class="external-link" href="http://www.indianexpress.com/story-print/819917/"&gt; here&lt;/a&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/right-circle'&gt;https://cis-india.org/news/right-circle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-08-23T07:40:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/india-times-bobin-abraham-may-3-2017-in-the-biggest-data-leak-info-of-13-crore-aadhaar-card-holders-has-been-compromised-and-is-available-online">
    <title>In The Biggest Data Leak, Info Of 13 Crore Aadhaar Card Holders Has Been Compromised And Is Available Online</title>
    <link>https://cis-india.org/internet-governance/news/india-times-bobin-abraham-may-3-2017-in-the-biggest-data-leak-info-of-13-crore-aadhaar-card-holders-has-been-compromised-and-is-available-online</link>
    <description>
        &lt;b&gt;The Modi government has been trying to make Aadhaar mandatory for everything from Income Tax return, buying a SIM card, bank transaction, train ticket, air travel, mid-day meal government subsidies etc. &lt;/b&gt;
        &lt;p&gt;The blog post by Bobins Abraham was &lt;a class="external-link" href="http://www.indiatimes.com/news/india/in-the-biggest-data-leak-so-far-info-of-13-crore-aadhaar-card-holders-has-been-compromised-276911.html"&gt;published by India Times&lt;/a&gt; on May 3, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;While the government claims that the move will increase security and  ensure that the benefits are reaching to real people and not syphoned  off. But security experts have been pointing out the possibility of &lt;a href="http://www.indiatimes.com/news/india/aadhaar-agency-says-there-is-no-misuse-of-biometrics-or-financial-loss-connected-to-it-272787.html" target="_blank"&gt;security breach in the system&lt;/a&gt; resulting in the sensitive biometric data reaching in the hands of those, who could misuse them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A study by Bengaluru-based think tank, Centre for Internet and Society  has once again cemented these concerns. According to its report titled,  "Information Security Practices of Aadhaar (or lack thereof): A  documentation of the public availability of Aadhaar Numbers with  sensitive personal financial information," Aadhaar data of as many as  13.5 crore card holders have already leaked online.&lt;/p&gt;
&lt;p&gt;The study revealed that the mass data leak happened due to security flaws in four government websites:&lt;/p&gt;
&lt;div class="fb_iframe_widget fb-quote"&gt;&lt;span&gt; &lt;/span&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;National Social Assistance Programme &lt;/li&gt;
&lt;li&gt;National Rural Employment Guarantee Act (NREGA)&lt;/li&gt;
&lt;li&gt;Daily Online Payment Reports under NREGA (Govt. of Andhra Pradesh) &lt;/li&gt;
&lt;li&gt;Chandranna Bima Scheme run by Government of Andhra Pradesh &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;“Based on the numbers available on the websites looked at, estimated  number of Aadhaar numbers leaked through these four portals could be  around 130-135 million and the number of bank account numbers leaked at  around 100 million from the specific portals we looked at,” the report  said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report was published even as the government continue to defend Aadhaar in the Supreme Court saying that the move to &lt;a href="http://www.indiatimes.com/news/india/linking-pan-card-with-aadhaar-is-going-to-be-a-nightmare-if-your-name-has-initials-special-characters-275030.html" target="_blank"&gt;link Aadhaar with PAN cards&lt;/a&gt; was meant to put a stop on the number of individuals in possession of  multiple PAN cards by putting a robust identification system in place.  Attorney General Mukul Rohatgi said that this will help in curbing money  laundering, the flow of black money and controlling the funding of  terror.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/india-times-bobin-abraham-may-3-2017-in-the-biggest-data-leak-info-of-13-crore-aadhaar-card-holders-has-been-compromised-and-is-available-online'&gt;https://cis-india.org/internet-governance/news/india-times-bobin-abraham-may-3-2017-in-the-biggest-data-leak-info-of-13-crore-aadhaar-card-holders-has-been-compromised-and-is-available-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-12T15:59:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-shweta-mohandas-july-30-2019-in-india-privacy-policies-of-fintech-companies-pay-lip-service-to-user-rights">
    <title>In India, Privacy Policies of Fintech Companies Pay Lip Service to User Rights</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-shweta-mohandas-july-30-2019-in-india-privacy-policies-of-fintech-companies-pay-lip-service-to-user-rights</link>
    <description>
        &lt;b&gt;A study of the privacy policies of 48 fintech companies that operate in India shows that none comply with even the basic requirements of the IT Rules, 2011.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shweta Mohandas highlighting the key observations in Fintech study conducted by CIS was &lt;a class="external-link" href="https://thewire.in/tech/india-fintech-data-privacy"&gt;published in the Wire&lt;/a&gt; on July 30, 2019.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Earlier this month, an &lt;a href="https://www.huffingtonpost.in/entry/fintech-apps-privacy-snooping-credit-vidya_in_5d1cbc34e4b082e55373370a"&gt;investigation&lt;/a&gt; revealed that a Hyderabad-based fintech company called CreditVidya was sneakily collecting user data through their devotional and music apps to assess people’s creditworthiness.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This should be unsurprising as the privacy policies of most Indian fintech companies do not specify who they will be sharing the information with. Instead, they employ vague terminology to identify sharing arrangements such as ‘third-party’, ‘affiliates’ etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is one of the many findings that we came across while analysing the &lt;a href="https://cis-india.org/internet-governance/files/Hewlett%20A%20study%20of%20FinTech%20companies%20and%20their%20privacy%20policies.pdf"&gt;privacy policies of 48 fintech companies&lt;/a&gt; that operate in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The study looked at how the privacy policies complied with the requirements of the existing data protection regime in India – the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) &lt;a href="https://www.wipo.int/edocs/lexdocs/laws/en/in/in098en.pdf"&gt;Rules&lt;/a&gt;, 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="https://www.wipo.int/edocs/lexdocs/laws/en/in/in098en.pdf"&gt;IT Rules&lt;/a&gt;, among other things, require that privacy policies specify the type of data being used, the purpose of collection, the third parties the data will be shared with, the option to withdraw consent and the grievance redressal mechanism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rules also require the privacy policy to be easily accessible as well as easy to understand. The problem is that they are not as comprehensive and specific as, say, the draft Personal Data Protection Bill, which is awaiting passage through parliament, and hence require the companies to do much less than privacy and data protection practices emerging globally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nevertheless, despite the limited requirements, none of the companies in our sample of 48 were fully compliant with the parameters set by the IT Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While 95% of the companies did fulfil the basic requirement of actually formulating and having a privacy policy, two major players stood out as defaulters: Airtel Payments Bank and Bhim UPI, for which we were not able to locate a privacy policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though a majority of the privacy policies contained the statement “we take your privacy and security seriously”, 43% of the companies did not provide adequate details of the reasonable security practices and procedures followed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The requirement in which most companies did not provide information for was regarding a grievance redressal mechanism, where only 10% of the companies comply.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While 31% of the companies provided the contact of a grievance redressal officer (some without even mentioning the redressal mechanism), 37% of the companies provided contact details of a representative but did not specify if this person could be contacted in case of any grievance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Throughout the study, it was noted that the wording of the IT Rules allowed companies to use ambiguous terms to ensure compliance without exposing their actual data practices. For example, Rule 5 (7) requires a fintech company to provide an option to withdraw consent. Twenty three percent of the companies allowed the user to opt out or withdraw from certain services such as mailing list, direct marketing and in app public forums but they did not allow the user to withdraw their consent completely. While several of 17 companies did provide the option to withdraw consent, they did not clarify whether the withdrawal also meant that the user’s data was no processed or shared.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, when it came to data retention, most of the 27 companies that provided some degree of  information about the retention policy stated that some data would be stored for perpetuity either for analytics or for complying with law enforcement. The remaining 21 companies say nothing about their data retention policy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;In local languages&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The issue of ambiguity most clearly arises when the user is actually able to cross the first hurdle – reading an app’s privacy policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With fintech often projected as one of the drivers of greater financial inclusion in India, it is telling that only one company (PhonePe) had the option to read the privacy policy in a language other than English. With respect to readability, we noted that the privacy policies were difficult to follow not just because of legalese and length, but also because of fonts and formatting – smaller and lighter texts, no distinction between paragraphs etc. added to the disincentive to read the privacy policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy policies act as a notice to individuals about the terms on which their data will be treated by the entity collecting data. However, they are a monologue in terms of consent where the user only has the option to either agree to it or decline and not avail the services. Moreover, even the notice function is not served when the user is unable to read the privacy policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They, thus, serve as mere symbols of compliance, where they are drafted to ensure bare minimum conformity to legal requirements. However, the responsibility of these companies lies in giving the user the autonomy to provide an informed consent as well as to be notified in case of any change in how the data is being handled (this could be when and whom the data is being shared with, if there has been a breach etc).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the growth of fintech companies and the promise of financial inclusion, it is imperative that the people using these services make informed decisions about their data. The draft Personal Data Protection Bill – in its current form – would encumber companies processing sensitive personal data with greater responsibility and accountability than before. However, the Bill, similar to the IT Rules, endorses the view of &lt;a href="https://www.medianama.com/wp-content/uploads/Centre-for-Internet-and-Society-Submission-India-Draft-Data-Protection-Bill-Privacy-2018.pdf"&gt;blanket consent&lt;/a&gt;, where the requirement for change in data processing is only of periodic notice (Section 30 (2)), a lesson that needs to be learnt from the CreditVidya story.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to blanket consent, the SPD/I Rules and well as the PDP Bill does not require the user to be notified in all cases of a breach. While the information that is provided to data subjects is necessary to be designed keeping the user in mind, neither the SPD/I Rules, nor the PDP Bill take into account the manner in which data flows operate in the context of ‘disruptive’ business models that are a hallmark of the ‘fintech revolution’.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-shweta-mohandas-july-30-2019-in-india-privacy-policies-of-fintech-companies-pay-lip-service-to-user-rights'&gt;https://cis-india.org/internet-governance/blog/the-wire-shweta-mohandas-july-30-2019-in-india-privacy-policies-of-fintech-companies-pay-lip-service-to-user-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>shweta</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-07-31T02:21:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/time-world-anjan-trivedi-june-30-2013-in-india-prison-like-surveillance-slips-under-the-radar">
    <title>In India, Prism-like Surveillance Slips Under the Radar</title>
    <link>https://cis-india.org/news/time-world-anjan-trivedi-june-30-2013-in-india-prison-like-surveillance-slips-under-the-radar</link>
    <description>
        &lt;b&gt;Prism, the contentious U.S. data-collection surveillance program, has captured the world’s attention ever since whistle-blower Edward Snowden leaked details of global spying to the Guardian and Washington Post.

&lt;/b&gt;
        &lt;p&gt;The article by Anjan Trivedi was &lt;a class="external-link" href="http://world.time.com/2013/06/30/in-india-prism-like-surveillance-slips-under-the-radar/#ixzz2XoCbrn00"&gt;published in Time World &lt;/a&gt;on June 30, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;However, it turns out &lt;a href="http://topics.time.com/india/"&gt;India&lt;/a&gt;,  the world’s largest democracy, is building its own version to monitor  internal communications in the name of national security. Yet India’s  Central Monitoring System, or CMS, was not shrouded in secrecy — New  Delhi &lt;a href="http://www.dot.gov.in/sites/default/files/AR%20Englsih%2011-12_0.pdf"&gt;announced&lt;/a&gt; its intentions to watch over its citizens, however mutedly, in &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=70747"&gt;2011&lt;/a&gt;, and rollout is slated for August. And while reports that the American system collected 6.3 billion &lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;intelligence reports&lt;/a&gt; in India led to a &lt;a href="http://m.indianexpress.com/news/supreme-court-agrees-to-hear-pil-on-us-surveillance-of-internet-data/1131011/"&gt;lawsuit&lt;/a&gt; at the nation’s &lt;a href="http://topics.time.com/supreme-court/"&gt;Supreme Court&lt;/a&gt;, comparable indignation has been conspicuously lacking with the domestic equivalent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CMS is an ambitious surveillance system that monitors text messages,  social-media engagement and phone calls on landlines and cell phones,  among other communications. That means 900 million landline and  cell-phone users and 125 million Internet users. The project, which is  being implemented by the government’s &lt;a href="http://www.cdot.in/about_us/berif_history.htm"&gt;Centre for Development of Telematics&lt;/a&gt; (&lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=78145"&gt;C-DOT&lt;/a&gt;),  is meant to help national law-enforcement agencies save time and avoid  manual intervention, according to the Department of Telecommunications’ &lt;a href="http://www.dot.gov.in/sites/default/files/Telecom%20Annual%20Report-2012-13%20%28English%29%20_For%20web%20%281%29.pdf"&gt;annual report&lt;/a&gt;.  This has been in the works since 2008, when C-DOT started working on a  proof-of-concept, according to an older report. The government &lt;a href="http://planningcommission.nic.in/aboutus/committee/wrkgrp12/cit/wgrep_telecom.pdf"&gt;set aside&lt;/a&gt; approximately $150 million for the system as part of its 12th five-year  plan, although the Cabinet ultimately approved a higher amount.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within the internal-security ministry though, the surveillance system  remains a relatively “hush-hush” topic, a project official unauthorized  to speak to the press tells TIME. In April 2011, the Police  Modernisation Division of the Home Affairs Ministry put out a 90-page  tender to solicit bidders for communication-interception systems in  every state and union territory of India. The system requirements  included “live listening, recording, storage, playback, analysis,  postprocessing” and voice recognition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Civil-liberties groups concede that states often need to undertake  targeted-monitoring operations. However, the move toward extensive  “surveillance capabilities enabled by digital communications,” suggests  that governments are now “casting the net wide, enabling intrusions into  private lives,” according to Meenakshi Ganguly, South Asia director for  Human Rights Watch. This extensive communications surveillance through  the likes of Prism and CMS are “out of the realm of judicial  authorization and allow unregulated, secret surveillance, eliminating  any transparency or accountability on the part of the state,” a recent  U.N. &lt;a href="http://www.ohchr.org/Documents/HRBodies/HRCouncil/RegularSession/Session23/A.HRC.23.40_EN.pdf"&gt;report&lt;/a&gt; stated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is no stranger to censorship and monitoring — tweets, blogs,  books or songs are frequently blocked and banned. India ranked second  only to the U.S. on Google’s list of user-data requests with 4,750  queries, up &lt;a href="http://www.google.com/transparencyreport/userdatarequests/IN/"&gt;52% from two years back&lt;/a&gt;, and removal requests from the government &lt;a href="http://www.google.com/transparencyreport/removals/government/IN/?metric=items&amp;amp;p=2012-12"&gt;increased by 90%&lt;/a&gt; over the previous reporting period. While these were largely made  through police or court orders, the new system will not require such a  legal process. In recent times, India’s democratically elected  government has barred access to certain websites and Twitter handles,  restricted the number of outgoing text messages to five per person per  day and arrested citizens for liking Facebook posts and tweeting.  Historically too, censorship has been India’s preferred means of  policing social unrest. “Freedom of expression, while broadly available  in theory,” Ganguly tells TIME, “is endangered by abuse of various India  laws.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is a growing discrepancy and power imbalance between citizens  and the state, says Anja Kovacs of the Internet Democracy Project. And,  in an environment like India where “no checks and balances [are] in  place,” that is troubling. The potential for misuse and  misunderstanding, Kovacs believes, is increasing enormously. Currently,  India’s laws relevant to interception “disempower citizens by relying  heavily on the executive to safeguard individuals’ constitutional  rights,” a recent &lt;a href="http://www.indianexpress.com/news/way-to-watch/1133737/0"&gt;editorial&lt;/a&gt; noted. The power imbalance is often noticeable at public protests, as  in the case of the New Delhi gang-rape incident in December, when the  government shut down public transport near protest grounds and  unlawfully detained demonstrators.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With an already sizeable and growing population of Internet users,  the government’s worries too are on the rise. Netizens in India are set  to triple to 330 million by 2016, &lt;a href="http://startupcatalyst.in/wp-content/uploads/2013/05/From_Buzz_to_Bucks_Apr_2013_tcm80-132875.pdf"&gt;according to a recent report&lt;/a&gt;.  “As [governments] around the world grapple with the power of social  media that can enable spontaneous street protests, there appears to be  increasing surveillance,” Ganguly explains.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s junior minister for telecommunications attempted to explain the benefits of this system during a &lt;a href="http://www.youtube.com/watch?v=rwTsek5WUfE"&gt;recent Google+ Hangout&lt;/a&gt; session. He acknowledged that CMS is something that “most people may  not be aware of” because it’s “slightly technical.” A participant noted  that the idea of such an intrusive system was worrying and he did not  feel safe. The minister, though, insisted that it would “safeguard your  privacy” and national security. Given the high-tech nature of CMS, he  noted that telecom companies would no longer be part of the government’s  surveillance process. India currently does &lt;a href="http://www.hrw.org/news/2013/06/07/india-new-monitoring-system-threatens-rights"&gt;not&lt;/a&gt; have formal privacy legislation to prohibit arbitrary monitoring. The new system comes under the &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=71791"&gt;jurisdiction&lt;/a&gt; of the Indian Telegraph Act of 1885, which allows for monitoring communication in the “interest of public safety.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The surveillance system is not only an “abuse of privacy rights and  security-agency overreach,” critics say, but also counterproductive in  terms of security. In the process of collecting data to monitor criminal  activity, the data itself may become a target for terrorists and  criminals — a “honeypot,” according to Sunil Abraham, executive director  of India’s Centre for Internet and Society. Additionally, the  wide-ranging tapping undermines financial markets, Abraham says, by  compromising confidentiality, trade secrets and intellectual property.  What’s more, vulnerabilities will have to be built into the existing  cyberinfrastructure to make way for such a system. Whether the nation’s  patchy infrastructure will be able to handle a complex web of  surveillance and networks, no one can say. That, Abraham contends, is  what attackers will target.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;National security has widely been cited as the reason for this  system, but no one can say whether it will actually help avert terrorist  activity. India’s own 9/11 is a case in point: the Indian government  was handed intelligence by foreign agencies about the possibility of the  2008 Mumbai terrorist attacks, but did not act. This is a “clear  indication that having access to massive amounts of data is not  necessarily going to make people safer,” Kovacs tells TIME. However,  officers familiar with the new system say it will not increase  surveillance or enhance intrusion beyond current levels; it will only  strengthen the policy framework of privacy and increase &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=80829"&gt;operational efficiency&lt;/a&gt;.  Spokespersons and officials in the internal-security and telecom  departments did not respond to requests or declined to comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has been cagey about details on implementation and &lt;a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=70791"&gt;extent&lt;/a&gt;.  This ability to act however the authorities deems fit “just makes it  really easy to slide into authoritarianism, and that is not acceptable  for any democratic country,” Kovacs says. Indeed, India has seen that  before — almost four decades ago, Indira Gandhi declared a state of  emergency for 19 months, which suspended all civil liberties. Indians  complaining about Prism may want to look a little closer to home.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/time-world-anjan-trivedi-june-30-2013-in-india-prison-like-surveillance-slips-under-the-radar'&gt;https://cis-india.org/news/time-world-anjan-trivedi-june-30-2013-in-india-prison-like-surveillance-slips-under-the-radar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-03T09:31:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
