<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 651 to 665.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/free-speech-and-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-november-20-2016-anita-babu-free-net-advocates-flay-trais-public-wifi-paper"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/fourth-meeting-of-sub-groups-on-privacy-issues"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/fourth-discussion-meeting-of-expert-committee-to-discuss-draft-human-dna-profiling-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-march-17-2016-aloke-tikku-forget-privacy-aadhaar-bill-gives-too-much-power-to-the-executive"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/forecasting-the-implications-of-the-cloud-act-around-the-world"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/foex-live-june-1-7-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/business-standard-sunil-abraham-january-10-fixing-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-surveillance-roundtable-mumbai"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-july-20-2018-rajitha-menon-firms-find-wealth-in-your-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/aayush-rathi-and-shweta-mohandas-april-30-2019-fintech-in-india-a-study-of-privacy-and-security-commitments"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/privacy_uidfinancialinclusion"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring">
    <title>Freedom from Monitoring: India Inc Should Push For Privacy Laws</title>
    <link>https://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring</link>
    <description>
        &lt;b&gt;More surveillance than absolutely necessary actually undermines the security objective.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This article by Sunil Abraham was &lt;a class="external-link" href="http://forbesindia.com/article/recliner/freedom-from-monitoring-india-inc-should-push-for-privacy-laws/35911/1"&gt;published in Forbes India Magazine&lt;/a&gt; on August 21, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;I think I understand why the average Indian IT entrepreneur or enterprise does not have a position on blanket surveillance. This is because the average Indian IT enterprise’s business model depends on labour arbitrage, not intellectual property. And therefore they have no worries about proprietary code or unfiled patent applications being stolen by competitors via rogue government officials within projects such as NATGRID, UID and, now, the CMS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A sub-section of industry, especially the technology industry, will always root for blanket surveillance measures. The surveillance industry has many different players, ranging from those selling biometric and CCTV hardware to those providing solutions for big data analytics and legal interception systems. There are also more controversial players who provide spyware, especially those in the market for zero-day exploits. The cheerleaders for the surveillance industry are techno-determinists who believe you can solve any problem by throwing enough of the latest and most expensive technology at it.&lt;br /&gt;&lt;br /&gt;What is surprising, though, is that other indigenous or foreign enterprises that depend on secrecy and confidentiality—in sectors such a banking, finance, health, law, ecommerce, media, consulting and communications—also don’t seem to have a public position on the growing surveillance ambitions of ‘democracies’ such as India and the United States of America. (Perhaps the only exceptions are a few multinational internet and software companies that have made some show of resistance and disagreement with the blanket surveillance paradigm.)&lt;br /&gt;&lt;br /&gt;Is it because these businesses are patriotic? Do they believe that secrecy, confidentiality and, most importantly, privacy, must be sacrificed for national security? If that were true then it would not be a particularly wise thing to do, as privacy is the precondition for security. Ann Cavoukian, privacy commissioner of Ontario, calls it a false dichotomy. Bruce Schneier, security technologist and writer, calls it a false zero sum game; he goes on to say, “There is no security without privacy. And liberty requires both security and privacy.”&lt;br /&gt;&lt;br /&gt;The reason why the secret recipe of Coca Cola is still secret after over 120 years is the same as the reason why a captured soldier cannot spill the beans on the overall war strategy. Corporations, like militaries, have layers and layers of privacy and secrecy. The ‘need to know’ principle resists all centralising tendencies, such as blanket surveillance. It’s important to note that targeted surveillance to identify a traitor or spy within the military, or someone engaged in espionage within a corporation, is pretty much an essential. However, any more surveillance than absolutely necessary actually undermines the security objective. To summarise, privacy is a pre-condition to the security of the individual, the enterprise, the military and the nation state.&lt;br /&gt;&lt;br /&gt;Most people complaining online about projects like the Central Monitoring System seem to think that India has no privacy laws. This is completely untrue: We have around 50 different laws, rules and regulations that aim to uphold privacy and confidentiality in various domains. Unfortunately, most of those policies are very dated and do not sufficiently take into account the challenges of contemporary information societies. These policy documents need to be updated and harmonised through the enactment of a new horizontal privacy law. A small minority will say that Section 43(A) of the Information Technology Act is the India privacy law. That is not completely untrue, but is a gross exaggeration. Section 43(A) is really only a data security provision and, at that, it does not even comprehensively address data protection, which is only a sub-set of the overall privacy regulation required in a nation. &lt;br /&gt;&lt;br /&gt;What would an ideal privacy law for India look like? For one, it would protect the rights of all persons, regardless of whether they are citizens or residents. Two, it would define privacy principles. Three, it would establish the office of an independent and autonomous privacy commissioner, who would be sufficiently empowered to investigate and take action against both government and private entities. Four, it would define civil and criminal offences, remedies and penalties. And five, it would have an overriding effect on previous legislation that does not comply with all the privacy principles. &lt;br /&gt;&lt;br /&gt;The Justice AP Shah Committee report, released in October 2012, defined the Indian privacy principles as notice, choice and consent, collection limitation, purpose limitation, access and correction, disclosure of information, security, openness and accountability. The report also lists the exemptions and limitations, so that privacy protections do not have a chilling effect on the freedom of expression and transparency enabled by the Right to Information Act.&lt;br /&gt;&lt;br /&gt;The Department of Personnel and Training has been working on a privacy bill for the last three years. Two versions of the bill had leaked before the Justice AP Shah Committee was formed. The next version of the bill, hopefully implementing the recommendations of the Justice AP Shah Committee report, is expected in the near future. In a multi-stakeholder-based parallel process, the Centre for Internet and Society (where I work), along with FICCI and DSCI, is holding seven round tables on a civil society draft of the privacy bill and the industry-led efforts on co-regulation.&lt;br /&gt; &lt;br /&gt;The Indian ITES, KPO and BPO sector should be particularly pleased with this development. As should any other Indian enterprise that holds personal information of EU and US nationals. This is because the EU, after the enactment of the law, will consider data protection in India adequate as per the requirements of its Data Protection Directive. This would mean that these enterprises would not have to spend twice the time and resources ensuring compliance with two different regulatory regimes.&lt;br /&gt;&lt;br /&gt;Is the lack of enthusiasm for privacy in the Indian private sector symptomatic of Indian societal values? Can we blame it on cultural relativism, best exemplified by what Simon Davies calls “the Indian Train Syndrome, in which total strangers will disclose their lives on a train to complete strangers”? But surely, when email addresses are exchanged at the end of that conversation, they are not accompanied by passwords. Privacy is perhaps differently configured in Indian societies but it is definitely not dead. Fortunately for us, calls to protect this important human right are growing every day.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring'&gt;https://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Central Monitoring System</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-21T07:04:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/free-speech-and-surveillance">
    <title>Free Speech and Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/free-speech-and-surveillance</link>
    <description>
        &lt;b&gt;Gautam Bhatia examines the constitutionality of surveillance by the Indian state. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Indian surveillance regime has been the subject of &lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_php=true&amp;amp;_type=blogs&amp;amp;_r=0"&gt;discussion&lt;/a&gt; for quite some time now. Its nature and scope is controversial. The Central Monitoring System, through which the government can obtain direct access to call records, appears to have the potential to be used for bulk surveillance, although official claims emphasise that it will only be implemented in a targeted manner. The &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/Govt-to-launch-internet-spy-system-Netra-soon/articleshow/28456222.cms"&gt;Netra system&lt;/a&gt;, on the other hand, is certainly about dragnet collection, since it detects the communication, via electronic media, of certain “keywords” (such as “attack”, “bomb”, “blast” and “kill”), no matter what context they are used in, and no matter who is using them.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance is quintessentially thought to raise concerns about &lt;i&gt;privacy&lt;/i&gt;. Over a &lt;a href="http://indiankanoon.org/doc/845196/"&gt;series&lt;/a&gt; of &lt;a href="http://news.rediff.com/report/2010/apr/26/phone-tapping-what-1997-supreme-court-verdict-says.htm"&gt;decisions&lt;/a&gt;, the Indian Supreme Court has read in the right to privacy into Article 21’s guarantee of the right to life and personal liberty. Under the Supreme Court’s (somewhat cloudy) precedents, privacy may only be infringed if there is a compelling State interest, and if the restrictive law is narrowly tailored – that is, it does not infringe upon rights to an extent greater than it needs to, in order to fulfill its goal. It is questionable whether bulk surveillance meets these standards.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance, however, does not only involve privacy rights. It also implicated Article 19 – in particular, the Article 19(1)(a) guarantee of the freedom of expression, and the 19(1)(c) guarantee of the freedom of association.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Previously on this blog, we have discussed the “chilling effect” in relation to free speech. The chilling effect evolved in the context of defamation cases, where a combination of exacting standards of proof, and prohibitive damages, contributed to create a culture of self-censorship, where people would refrain from voicing even legitimate criticism for fear of ruinous defamation lawsuits. The chilling effect, however, is not restricted merely to defamation, but arises in free speech cases more generally, where vague and over-broad statutes often leave the border of the permitted and the prohibited unclear.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Indeed, a few years before it decided &lt;/span&gt;&lt;i&gt;New York Times v. Sullivan&lt;/i&gt;&lt;span&gt;, which brought in the chilling effect doctrine into defamation and free speech law, the American Supreme Court applies a very similar principle in a surveillance case. In &lt;/span&gt;&lt;a href="http://supreme.justia.com/cases/federal/us/357/449/case.html"&gt;&lt;i&gt;NAACP v. Alabama&lt;/i&gt;&lt;/a&gt;&lt;span&gt;, the National Association for the Advancement of Coloured People (NAACP), which was heavily engaged in the civil rights movement in the American deep South, was ordered by the State of Alabama to disclose its membership list. NAACP challenged this, and the Court held in its favour. It specifically connected freedom of speech, freedom of association, and the impact of surveillance upon both:&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; “Effective advocacy of both public and private points of view, particularly controversial ones, is undeniably enhanced by group association, as this Court has more than once recognized by remarking upon the close nexus between the freedoms of speech and assembly. It is beyond debate that freedom to engage in association for the advancement of beliefs and ideas is an inseparable aspect of the “liberty” assured by the Due Process Clause of the Fourteenth Amendment, which embraces freedom of speech. Of course, it is immaterial whether the beliefs sought to be advanced by association pertain to political, economic, religious or cultural matters, and state action which may have the&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;effect of curtailing the freedom to associate is subject to the closest scrutiny… it is hardly a novel perception that &lt;span&gt;compelled disclosure&lt;/span&gt; of affiliation with groups engaged in advocacy may constitute&lt;/i&gt; [an]&lt;i&gt; effective a restraint on freedom of association… this Court has recognized the vital relationship between freedom to associate and privacy in one’s associations. &lt;span&gt;Inviolability of privacy in group association may in many circumstances be indispensable to preservation of freedom of association, particularly where a group espouses dissident beliefs&lt;/span&gt;.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;In other words, if persons are not assured of privacy in their association with each other, they will tend to self-censor both who they associate with, and what they say to each other, especially when unpopular groups, who have been historically subject to governmental or social persecution, are involved. Indeed, this was precisely the &lt;a href="https://www.aclu.org/national-security/aclu-v-clapper-challenge-nsa-mass-phone-call-tracking"&gt;argument&lt;/a&gt; that the American Civil Liberties Union (ACLU) made in its constitutional challenge to PRISM, the American bulk surveillance program. In addition to advancing a Fourth Amendment argument from privacy, the ACLU also made a First Amendment freedom of speech and association claim, arguing that the knowledge of bulk surveillance had made – or at least, was likely to have made – politically unpopular groups wary of contacting it for professional purposes (the difficulty, of course, is that any chilling effect argument effectively requires proving a negative).&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If this argument holds, then it is clear that Articles 19(1)(a) and 19(1)(c) are &lt;i&gt;prima facie&lt;/i&gt; infringed in cases of bulk – or even other forms of – surveillance. Two conclusions follow: &lt;i&gt;first&lt;/i&gt;, that any surveillance regime needs statutory backing. Under &lt;a href="http://indiankanoon.org/doc/493243/"&gt;Article 19(2),&lt;/a&gt; reasonable restrictions upon fundamental rights can only be imposed by &lt;i&gt;law&lt;/i&gt;, and not be executive fiat (the same argument applies to Article 21 as well).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Assuming that a statutory framework &lt;i&gt;is&lt;/i&gt; brought into force, the crucial issue then becomes whether the restriction is a reasonable one, in service of one of the stated 19(2) interests. The relevant part of Article 19(2) permits reasonable restrictions upon the freedom of speech and expression “in the interests of… the security of the State [and] public order.” The Constitution does not, however, provide a test for determining when a restriction can be legitimately justified as being “in the interests of” the security of the State, and of public order. There is not much relevant precedent with respect to the first sub-clause, but there happens to be an extensive – although conflicted – jurisprudence dealing with the public order exception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One line of cases – characterised by &lt;a href="http://indiankanoon.org/doc/553290/"&gt;&lt;i&gt;Ramji Lal Modi v. State of UP&lt;/i&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;and &lt;a href="http://indiankanoon.org/doc/1475436/"&gt;&lt;i&gt;Virendra v. State of Punjab&lt;/i&gt;&lt;/a&gt; – has held that the phrase “for the interests of” is of very wide ambit, and that the government has virtually limitless scope to make laws ostensibly for securing public order (this extends to prior restraint as well, something that Blackstone, writing in the 18&lt;sup&gt;th&lt;/sup&gt; century, found to be illegal!). The other line of cases, such as &lt;a href="http://indiankanoon.org/doc/1386353/"&gt;&lt;i&gt;Superintendent v. Ram Manohar Lohia&lt;/i&gt;&lt;/a&gt; and &lt;a href="http://www.indiankanoon.org/doc/341773/"&gt;&lt;i&gt;S. Rangarajan v. P. Jagjivan Ram&lt;/i&gt;&lt;/a&gt;, have required the government to satisfy a stringent burden of proof. In &lt;i&gt;Lohia&lt;/i&gt;, for instance, Ram Manohar Lohia’s conviction for encouraging people to break a tax law was reversed, the Court holding that the relationship between restricting free speech and a public order justification must be “proximate”. In &lt;i&gt;Rangarajan&lt;/i&gt;, the Court used the euphemistic image of a “spark in a powder keg”, to characterise the degree of proximity required. It is evident that under the broad test of &lt;i&gt;Ramji Lal Modi&lt;/i&gt;, a bulk surveillance system is likely to be upheld, whereas under the narrow test of &lt;i&gt;Lohia&lt;/i&gt;, it is almost certain not to be.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, if the constitutionality of surveillance comes to Court, three issues will need to be decided: &lt;i&gt;first&lt;/i&gt;, whether Articles 19(1)(a) and 19(1)(c) have been violated. &lt;i&gt;Secondly&lt;/i&gt; – and if so – whether the “security of the State” exception is subject to the same standards as the “public order” exception (there is no reason why it should not be). And &lt;i&gt;thirdly&lt;/i&gt;, which of the two lines of precedent represent the correct understanding of Article 19(2)?&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;i&gt;Gautam Bhatia — @gautambhatia88 on Twitter — is a graduate of the National Law School of India University (2011), and has just received an LLM from the Yale Law School. He blogs about the Indian Constitution at &lt;a class="moz-txt-link-freetext" href="http://indconlawphil.wordpress.com/"&gt;http://indconlawphil.wordpress.com&lt;/a&gt;. Here at CIS, he blogs on issues of online freedom of speech and expression.&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/free-speech-and-surveillance'&gt;https://cis-india.org/internet-governance/blog/free-speech-and-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Gautam Bhatia</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Netra</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Central Monitoring System</dc:subject>
    
    
        <dc:subject>Article 19(1)(a)</dc:subject>
    

   <dc:date>2014-07-07T04:59:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-november-20-2016-anita-babu-free-net-advocates-flay-trais-public-wifi-paper">
    <title>Free Net advocates flay Trai's public Wi-Fi paper </title>
    <link>https://cis-india.org/internet-governance/news/business-standard-november-20-2016-anita-babu-free-net-advocates-flay-trais-public-wifi-paper</link>
    <description>
        &lt;b&gt;Stakeholders vouching for a cheap and open Internet have flagged concerns over privacy and regulatory hurdles. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The article by Anita Babu was &lt;a class="external-link" href="http://www.business-standard.com/article/companies/free-net-advocates-flay-trai-s-public-wi-fi-paper-116111900644_1.html"&gt;published in the Business Standard&lt;/a&gt; on November 20, 2016. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;With the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Telecom+Regulatory+Authority+Of+India" target="_blank"&gt;Telecom Regulatory Authority of India &lt;/a&gt;releasing its consultation paper on public &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Wi-fi" target="_blank"&gt;Wi-Fi &lt;/a&gt;this week, stakeholders vouching for a cheap and open Internet have flagged concerns over privacy and regulatory hurdles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Internet+Freedom+Foundation" target="_blank"&gt;Internet Freedom Foundation &lt;/a&gt;has  pointed out that the proposed regulations might lead to invasion of  privacy and interfere with the freedom of hotspot providers to operate  freely.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While we welcome Trai’s vision that increasing the number of public &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Wi-fi" target="_blank"&gt;Wi-Fi &lt;/a&gt;hotspots  could be the way to bringing the majority of Indians online, the  proposals turn out to be regressive and poorly thought out,” said  Aravind Ravi Sulekha, co-founder of the Internet Freedom Foundation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The regulator in its consultation paper issued earlier this week  proposed hotspot providers would have to register with the government  and users could access hotspots only after paying using a service tied  to their &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;number. It wants to utilise Aadhaar, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Electronic-know+Your+Customer" target="_blank"&gt;electronic-Know Your Customer &lt;/a&gt;(e-KYC) and the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Unified+Payment+Interface" target="_blank"&gt;Unified Payment Interface &lt;/a&gt;(UPI) to build a standard authentication mechanism for access to public &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Wi-fi" target="_blank"&gt;Wi-Fi &lt;/a&gt;in India. While the aim of &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Trai" target="_blank"&gt;Trai &lt;/a&gt;is to increase the number of &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Wi-fi" target="_blank"&gt;Wi-Fi &lt;/a&gt;hotspots in India, proponents of free Internet fear these proposed rules might have a contrary effect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hotspot providers will have to incur costs on account of hardware  installations for one-time password verification in addition to the  costs of sending out the passwords. This might discourage  entrepreneurs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This system of verification makes it harder for entrepreneurs to set  up hotspots and for people to access them. It is impossible for  broadband to proliferate in any significant way if &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Trai" target="_blank"&gt;Trai &lt;/a&gt;insists on applying ineffective and cumbersome regulations on those who wish to set up their own hotspots,” &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Internet+Freedom+Foundation" target="_blank"&gt;Internet Freedom Foundation &lt;/a&gt;said in its comments to Trai’s consultation paper.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proposals have excluded individuals who do not have an &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;account  from accessing public Wi-Fi. “This not only brings concerns of costs  and exclusion but also privacy, given the constitutionality of the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;project, and its government-mandated use, is pending adjudication in the Supreme Court,” the foundation pointed out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proposals also come at the cost of anonymity. The foundation,  cofounded by the crusaders of last year’s SaveTheInternet campaign,  trashed the argument that imposing eKYC norms would help in countering  terrorism and other crimes. “This prohibition on anonymous communication  is a violation of Indians’ freedom of expression… making a call at a  PCO, sending a telegram and posting a letter have always been possible  without showing ID — even though criminals and terrorists occasionally  abused these services… KYC measures are ineffective in preventing crime  and terrorism, as tools like VPNs, TOR, and proxies can easily mask the  identity of an Internet user,” it stated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The solution proposed by &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Trai" target="_blank"&gt;Trai &lt;/a&gt;is a classic example of centralism and over-regulation. It turns out that &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Trai" target="_blank"&gt;Trai &lt;/a&gt;is  unclear about the problem to be solved,” said Pranesh Prakash, policy  director at the Centre for Internet and Society. He added that the new  proposals had also failed to address the limitations on foreigners or  tourists in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Current regulations prevent foreigners without a local mobile number from accessing public &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Wi-fi" target="_blank"&gt;Wi-Fi &lt;/a&gt;connections. While &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Trai" target="_blank"&gt;Trai &lt;/a&gt;had identified the problem, it failed to come up with a plausible solution.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-november-20-2016-anita-babu-free-net-advocates-flay-trais-public-wifi-paper'&gt;https://cis-india.org/internet-governance/news/business-standard-november-20-2016-anita-babu-free-net-advocates-flay-trais-public-wifi-paper&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-11-20T03:21:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/fourth-meeting-of-sub-groups-on-privacy-issues">
    <title>Fourth Meeting of the two Sub-Groups on Privacy Issues under the Chairmanship of Justice AP Shah</title>
    <link>https://cis-india.org/news/fourth-meeting-of-sub-groups-on-privacy-issues</link>
    <description>
        &lt;b&gt;The next meeting of the two Sub-Groups (4th meeting) on privacy issues under the Chairmanship of Justice A.P. Shah, former Chief Justice of Delhi High Court is scheduled to be held on July 9, 2012 at 11.00 a.m. in Committee Room No. 228, Yojana Bhawan, Planning Commission, New Delhi.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Members of both the Sub-Groups are requested to send their final drafts as decided in the meeting held on June 27, 2012, by July 4, 2012 so that these could be circulated for obtaining feedback and for discussions/deliberations on July 9, 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The above information was communicated by Shri S. Bose, Under Secretary, (CIT &amp;amp; I) to the following individuals:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Justice A.P. Shah, Chairman&lt;/li&gt;
&lt;li&gt;Dr. Kamlesh Bajaj&lt;/li&gt;
&lt;li&gt;Ms. Usha Ramanathan&lt;/li&gt;
&lt;li&gt;Shri Sunil Abraham/Shri Pranesh Prakash&lt;/li&gt;
&lt;li&gt;Prashant Reddy&lt;/li&gt;
&lt;li&gt;Prof. Arghya Sengupta (requested to join the meeting on skype. Exact time for coming online will be communicated separately)&lt;/li&gt;
&lt;li&gt;Shri Som Mittal&lt;/li&gt;
&lt;li&gt;Shri Gulshan Rai&lt;/li&gt;
&lt;li&gt;Ms. Mala Dutt&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;A copy of this information was sent to the following individuals:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Dr. C.M. Kumar, Sr, Adviser (CIT&amp;amp;I)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Shri R.K. Gupta, Adviser (CIT&amp;amp;I)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Shri Ramesh Kumar, Director (CIT&amp;amp;I)&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/fourth-meeting-of-sub-groups-on-privacy-issues'&gt;https://cis-india.org/news/fourth-meeting-of-sub-groups-on-privacy-issues&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-08-07T10:12:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/fourth-discussion-meeting-of-expert-committee-to-discuss-draft-human-dna-profiling-bill">
    <title>Fourth Discussion Meeting of the Expert Committee to Discuss the Draft Human DNA Profiling Bill</title>
    <link>https://cis-india.org/internet-governance/news/fourth-discussion-meeting-of-expert-committee-to-discuss-draft-human-dna-profiling-bill</link>
    <description>
        &lt;b&gt;The fourth expert committee meeting was held on November 10, 2014 at the Department of Biotechnology to discuss the potential privacy concerns of the draft Human DNA Profiling Bill. Sunil Abraham however was unable to participate because of technical problems.&lt;/b&gt;
        &lt;h2&gt;Agenda&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;Welcome and opening remarks by the Secretary, DBT &lt;/li&gt;
&lt;li&gt;Remarks by the Chairman - Dr. T.S. Rao, Senior Adviser, DBT &lt;/li&gt;
&lt;li&gt;A brief overview on deliberations and decisions of Hon’ble Supreme Court - Dr. Alka Sharma, Director, DBT &lt;/li&gt;
&lt;li&gt;Discussion and finalization of the Bill by the members&lt;/li&gt;
&lt;li&gt;Recommendations  of the Expert Committee&lt;/li&gt;
&lt;li&gt;Any other item with the permission of the Chairman.&lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt; &lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Resources&lt;/h3&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/dna-profiling-bill-meeting-documents.zip/view" class="external-link"&gt;Click here&lt;/a&gt; (Zip file, 2698 Kb) to download the following resources from earlier meetings:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Record note of discussions of the Expert Committee Meeting held on January 31, 2013 at DBT, New Delhi, to discuss the potential privacy concerns on draft Human DNA Profiling Bill.&lt;/li&gt;
&lt;li&gt;Annexure 1 to Record note: Draft Human DNA Profiling Bill 2012: The Privacy Issues and Concerns&lt;/li&gt;
&lt;li&gt;Annexure 2 to Record note: Short background note on the draft Human DNA Profiling Bill&lt;/li&gt;
&lt;li&gt;Record note of the 2nd discussion meeting of the Expert Committee held on May 13, 2013 in DBT to discuss the draft Human DNA Profiling Bill&lt;/li&gt;
&lt;li&gt;Minutes of the 3rd meeting of the Expert Committee held on November 25, 2013 in DBT to discuss the draft Human DNA Profiling Bill&lt;/li&gt;
&lt;li&gt;Record note of the discussions of the Experts Sub-committee Meeting on Human DNA Profiling Bill held on September 3, 2013 at CPFD, Hyderabad&lt;/li&gt;
&lt;li&gt;Affidavit on behalf of DBT&lt;/li&gt;
&lt;li&gt;Human Draft DNA Profiling Bill 2012 (Working Draft Version, April 29, 2012)&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/fourth-discussion-meeting-of-expert-committee-to-discuss-draft-human-dna-profiling-bill'&gt;https://cis-india.org/internet-governance/news/fourth-discussion-meeting-of-expert-committee-to-discuss-draft-human-dna-profiling-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-08T16:07:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-march-17-2016-aloke-tikku-forget-privacy-aadhaar-bill-gives-too-much-power-to-the-executive">
    <title>Forget privacy, Aadhaar Bill gives too much power to the executive </title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-march-17-2016-aloke-tikku-forget-privacy-aadhaar-bill-gives-too-much-power-to-the-executive</link>
    <description>
        &lt;b&gt;The government promotes the Aadhaar programme because it believes the 12-digit unique identification number will let them track every penny spent from the exchequer. But money is not all that the Aadhaar number can track.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aloke Tikku was &lt;a class="external-link" href="http://www.hindustantimes.com/india/forget-privacy-aadhaar-bill-gives-too-much-power-to-the-executive/story-ZZjsWwMypqyw7Q5nIFWXcJ.html"&gt;published in the Hindustan Times&lt;/a&gt; on March 17, 2016. Sunil Abraham gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;It can help track people too with amazing efficiency. This is at the centre of the controversy around the programme, and the Aadhaar bill that requires every resident to get the number to access government subsidies and services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finance minister Arun Jaitley put up a spirited defence of the bill in the Rajya Sabha on Wednesday when the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016 came up for passage. And he was right.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As far as privacy is concerned, the NDA government’s version is much more stringent than the creaky draft proposed by the UPA in 2010.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jaitley said there were only two circumstances in which personal data collected by UIDAI could be shared under this bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One, if the Aadhaar number holder consents to his details being shared. Second, if a government agency wants to access this data on grounds of national security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the debate around privacy concerns – that neither the NDA nor the UPA governments addressed – and the new bill is much more fundamental.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar bill gives the executive too much power to decide how to administer the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Every law requires the government to frame rules to specify the nitty-gritty of its implementation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the Aadhaar bill passed by Parliament gives the Unique Identification Authority of India (UIDAI) the power to prescribe regulations for nearly every provision, right down to what biometric or biological attributes need to be captured.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The law leaves too much power in the hands of the executive,” said Sunil Abraham, executive director of the Bengaluru-headquartered research advocacy group, Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, the bill gives the Unique identification Authority of India (UIDAI) powers to determine if it should collect any biological attribute of people too. This means the government could at a later date mandate that DNA of all Aadhaar numbers too be collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The example echoed in the Rajya Sabha on Wednesday as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“No power should be delegated to the UID Authority because then the UID Authority will decide tomorrow that DNA is required, and they will then have the powers to take DNA information as well,” Congress MP Jairam Ramesh said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The minister tried to explain the reliance on regulations issued by UIDAI – the word ‘regulations’ does appear some 50 times through the legislation – as compared to less than 10 in, say, the right to information law or the 2010 version of the bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He said MPs could still review notifications issued by UIDAI when they are placed for parliamentary approval.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-march-17-2016-aloke-tikku-forget-privacy-aadhaar-bill-gives-too-much-power-to-the-executive'&gt;https://cis-india.org/internet-governance/news/hindustan-times-march-17-2016-aloke-tikku-forget-privacy-aadhaar-bill-gives-too-much-power-to-the-executive&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-17T14:44:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/forecasting-the-implications-of-the-cloud-act-around-the-world">
    <title>Forecasting the Implications of the CLOUD Act Around the World</title>
    <link>https://cis-india.org/internet-governance/news/forecasting-the-implications-of-the-cloud-act-around-the-world</link>
    <description>
        &lt;b&gt;Elonnai Hickok participated in the event organized by the Global Network Initiative at the Russell Senate Office Building, Washington D.C. on September 18, 2018 as a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Elonnai spoke on the CLOUD Act from an Indian perspective based on the article that she &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/an-analysis-of-the-cloud-act-and-implications-for-india"&gt;co-authored&lt;/a&gt; with Vipul Kharbanda.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/forecasting-the-implications-of-the-cloud-act-around-the-world'&gt;https://cis-india.org/internet-governance/news/forecasting-the-implications-of-the-cloud-act-around-the-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-09-20T15:51:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/foex-live-june-1-7-2014">
    <title>FOEX Live: June 1-7, 2014</title>
    <link>https://cis-india.org/internet-governance/blog/foex-live-june-1-7-2014</link>
    <description>
        &lt;b&gt;A weekly selection of news on online freedom of expression and digital technology from across India (and some parts of the world). &lt;/b&gt;
        &lt;p&gt;&lt;i&gt;&lt;span&gt;Delhi NCR&lt;/span&gt;&lt;/i&gt;:&lt;/p&gt;
&lt;p&gt;Following a legal notice from Dina Nath Batra, publisher Orient BlackSwan &lt;a href="http://indianexpress.com/article/india/india-others/its-batra-again-book-on-sexual-violence-in-ahmedabad-riots-is-set-aside-by-publisher/"&gt;“set aside… for the present”&lt;/a&gt; &lt;i&gt;Communalism and Sexual Violence: Ahmedabad Since 1969&lt;/i&gt; by Dr. Megha Kumar, citing the need for a “comprehensive assessment”. Dr. Kumar’s book is part of the ‘Critical Thinking on South Asia’ series, and studies communal and sexual violence in the 1969, 1985 and 2002 riots of Ahmedabad. Orient BlackSwan insists this is a pre-release assessment, while Dr. Kumar contests that her book went to print in March 2014 after extensive editing and peer review. Dina Nath Batra’s civil suit &lt;a href="http://www.nybooks.com/articles/archives/2014/may/08/india-censorship-batra-brigade/"&gt;led Penguin India to withdraw&lt;/a&gt; Wendy Doniger’s &lt;i&gt;The Hindus: An Alternative History&lt;/i&gt; earlier this year.&lt;/p&gt;
&lt;p&gt;The Delhi Police’s Facebook page aimed at reaching out to Delhi residents hailing from the North East &lt;a href="http://www.assamtribune.com/scripts/detailsnew.asp?id=jun0114/at044"&gt;proved to be popular&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;Goa&lt;/span&gt;&lt;/i&gt;:&lt;/p&gt;
&lt;p&gt;Shipbuilding engineer Devu Chodankar’s &lt;a href="http://www.ifex.org/india/2014/06/02/anti_modi_comments/"&gt;ordeal continued&lt;/a&gt;. Chodankar, in a statement to the cyber crime cell of the Goa police, &lt;a href="http://timesofindia.indiatimes.com/India/Police-question-Devu-Chodankar-on-Facebook-posts-for-over-5-hours/articleshow/35965869.cms"&gt;clarified&lt;/a&gt; that his allegedly inflammatory statements were directed against the induction of the Sri Ram Sene’s Pramod Muthalik into the BJP. Chodankar’s laptop, hard-disk and mobile Internet dongle were &lt;a href="http://www.thehindu.com/news/national/other-states/goa-police-seizes-chodankars-laptop-dongle/article6075406.ece"&gt;seized&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;Jammu &amp;amp; Kashmir&lt;/span&gt;&lt;/i&gt;:&lt;/p&gt;
&lt;p&gt;Chief Minister Omar Abdullah announced the &lt;a href="http://www.onislam.net/english/news/asia-pacific/473153-youth-cheer-kashmirs-sms-ban-lift.html"&gt;withdrawal of a four-year-old SMS ban&lt;/a&gt; in the state. The ban was instituted in 2010 following widespread protests, and while it was lifted for post-paid subscribers six months later, pre-paid connections were banned from SMSes until now.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;Maharashtra&lt;/span&gt;&lt;/i&gt;:&lt;/p&gt;
&lt;p&gt;&lt;a href="http://timesofindia.indiatimes.com/india/Maharashtra-police-to-crack-whip-on-those-who-like-offensive-Facebook-posts/articleshow/35974198.cms?utm_source=twitter.com&amp;amp;utm_medium=referral&amp;amp;utm_campaign=timesofindia"&gt;In a move to contain public protests&lt;/a&gt; over ‘objectionable posts’ about Chhatrapati Shivaji, Dr. B.R. Ambedkar and the late Bal Thackeray (comments upon whose death &lt;a href="http://www.bbc.com/news/world-asia-india-20490823"&gt;led to the arrests&lt;/a&gt; of Shaheen Dhada and Renu Srinivasan under Section 66A), Maharashtra police will take action against even those who “like” such posts. ‘Likers’ may be charged under the Information Technology Act and the Criminal Procedure Code, say Nanded police.&lt;/p&gt;
&lt;p&gt;A young Muslim man was &lt;a href="http://indianexpress.com/article/india/politics/muslim-techie-beaten-to-death-in-pune-7-men-of-hindu-outfit-held/"&gt;murdered&lt;/a&gt; in Pune, apparently connected to the online publication of ‘derogatory’ pictures of Chhatrapati Shivaji and Bal Thackarey. Members of Hindu extremists groups &lt;a href="http://www.hindustantimes.com/india-news/pune-techie-killed-sms-boasts-of-taking-down-first-wicket/article1-1226023.aspx"&gt;celebrated&lt;/a&gt; his murder, it seems. Pune’s BJP MP, Anil Shirole, &lt;a href="http://timesofindia.indiatimes.com/India/Pune-techie-murder-BJP-MP-says-some-repercussions-to-derogatory-FB-post-natural/articleshow/36112291.cms"&gt;said&lt;/a&gt;, “some repercussions are natural”. Members of the Hindu Rashtra Sena &lt;a href="http://www.thehindu.com/news/national/other-states/seven-rightwing-activists-held-over-techies-killing-in-pune/article6081812.ece"&gt;were held&lt;/a&gt; for the murder, but it seems that the photographs were uploaded from &lt;a href="http://www.deccanchronicle.com/140606/nation-crime/article/pune-techie-murder-fb-pictures-uploaded-foreign-ip-addresses"&gt;foreign IP addresses&lt;/a&gt;. Across Maharashtra, 187 rioting&lt;a href="http://timesofindia.indiatimes.com/city/mumbai/Offensive-FB-posts-187-rioting-cases-filed-710-held/articleshow/36176283.cms"&gt;cases have been registered&lt;/a&gt; against a total of 710 persons, allegedly in connection with the offensive Facebook posts.&lt;/p&gt;
&lt;p&gt;On a lighter note, &lt;a href="http://post.jagran.com/what-bollywood-expects-from-new-ib-minister-1401860268"&gt;Bollywood hopes&lt;/a&gt; for a positive relationship with the new government on matters such as film censorship, tax breaks and piracy.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;News &amp;amp; Opinion&lt;/span&gt;&lt;/i&gt;:&lt;/p&gt;
&lt;p&gt;Shocking the world, Vodafone &lt;a href="http://www.theguardian.com/business/2014/jun/06/vodafone-reveals-secret-wires-allowing-state-surveillance"&gt;reported&lt;/a&gt; the existence of secret, direct-access wires that enable government surveillance on citizens. India is among 29 governments that sought access to its networks, &lt;a href="http://www.dailymail.co.uk/indiahome/indianews/article-2651060/Unprecedented-terrifying-Scale-mobile-phone-snooping-uncovered-Vodaphone-reveals-government-requested-access-network.html"&gt;says Vodafone&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;I&amp;amp;B Minister &lt;a href="http://www.exchange4media.com/55952_theres-no-need-for-the-govt-to-intervene-in-self-regulation-prakash-javadekar.html"&gt;Prakash Javadekar expressed his satisfaction&lt;/a&gt; with media industry self-regulation, and stated that while cross-media ownership is a &lt;a href="http://www.newstrackindia.com/newsdetails/2014/06/05/146--Japan-to-ban-possession-of-child-pornography-except-comics-.html"&gt;matter for debate&lt;/a&gt;, it is the &lt;i&gt;legality&lt;/i&gt; of transactions such as the &lt;a href="http://caravanmagazine.in/vantage/biggest-problem-network18"&gt;Reliance-Network18 acquisition&lt;/a&gt; that is important.&lt;/p&gt;
&lt;p&gt;Nikhil Pahwa of &lt;i&gt;Medianama&lt;/i&gt; wrote of a &lt;a href="http://www.medianama.com/2014/06/223-right-to-be-forgotten-india/"&gt;‘right to be forgotten’ request they received&lt;/a&gt; from a user in light of the recent European Court of Justice &lt;a href="https://cis-india.org/internet-governance/blog/ecj-rules-internet-search-engine-operator-responsible-for-processing-personal-data-published-by-third-parties"&gt;ruling&lt;/a&gt;. The right raises a legal dilemma in India, &lt;i&gt;LiveMint&lt;/i&gt; &lt;a href="http://www.livemint.com/Industry/5jmbcpuHqO7UwX3IBsiGCM/Right-to-be-forgotten-poses-a-legal-dilemma-in-India.html"&gt;reports&lt;/a&gt;. &lt;i&gt;Medianama &lt;/i&gt;also &lt;a href="http://www.medianama.com/2014/06/223-maharashtra-police-warns-against-liking-objectionable-posts-on-facebook/"&gt;comments&lt;/a&gt; on Maharashtra police’s decision to take action against Facebook ‘likes’, noting that at the very least, a like and a comment do not amount to the same thing.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;The Hindu&lt;/i&gt; was scorching in its &lt;a href="http://www.thehindu.com/opinion/editorial/no-tolerance-for-hate-crimes/article6090098.ece"&gt;editorial on the Pune murder&lt;/a&gt;, warning that the new BJP government stands to lose public confidence if it does not clearly demonstrate its opposition to religious violence. The &lt;i&gt;Times of India&lt;/i&gt; &lt;a href="http://timesofindia.indiatimes.com/home/opinion/edit-page/PM-Modi-must-condemn-Sadique-Shaikhs-murder-and-repeal-draconian-Section-66A/articleshow/36114346.cms"&gt;agrees&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Sanjay Hegde &lt;a href="http://articles.economictimes.indiatimes.com/2014-06-01/news/50245814_1_blasphemy-laws-puns-speech"&gt;wrote&lt;/a&gt; of Section 66A of the Information Technology Act, 2000 (as amended in 2008) as a medium-focused criminalization of speech. dnaEdit also &lt;a href="http://www.dnaindia.com/analysis/editorial-dnaedit-netizens-bugbear-1992826"&gt;published&lt;/a&gt; its criticism of Section 66A.&lt;/p&gt;
&lt;p&gt;Ajit Ranade of the &lt;i&gt;Mumbai Mirror&lt;/i&gt; &lt;a href="http://www.mumbaimirror.com/columns/columnists/ajit-ranade/Republic-of-hurt-sentiments/articleshow/36191142.cms"&gt;comments&lt;/a&gt; on India as a ‘republic of hurt sentiments’, criminalizing exercises of free speech from defamation, hate speech, sedition and Section 66A. But in this hurt and screaming republic, &lt;a href="http://www.newindianexpress.com/cities/bangalore/Why-Dissent-Needs-to-Stay-Alive/2014/06/03/article2261386.ece1"&gt;dissent is crucial&lt;/a&gt; and must stay alive.&lt;/p&gt;
&lt;p&gt;A cyber security expert is of the opinion that the police find it &lt;a href="http://www.dnaindia.com/mumbai/report-derogatory-post-difficult-to-block-on-networking-sites-cyber-security-experts-1993093"&gt;difficult to block webpages&lt;/a&gt; with derogatory content, as servers are located outside India. But &lt;a href="http://blogs.wsj.com/indiarealtime/2014/06/05/indias-snooping-and-snowden/"&gt;data localization will not help&lt;/a&gt; India, writes Jayshree Bajoria.&lt;/p&gt;
&lt;p&gt;Dharma Adhikari &lt;a href="http://www.myrepublica.com/portal/index.php?action=news_details&amp;amp;news_id=76335"&gt;tries to analyze&lt;/a&gt; the combined impact of converging media ownership, corporate patronage of politicians and elections, and recent practices of forced and self-censorship and criminalization of speech.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;Elsewhere in the world&lt;/span&gt;&lt;/i&gt;:&lt;/p&gt;
&lt;p&gt;In Pakistan, Facebook &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/Facebook-under-fire-for-blocking-pages-in-Pakistan/articleshow/36194872.cms"&gt;has been criticized&lt;/a&gt; for blocking pages of a Pakistani rock band and several political groups, primarily left-wing. Across the continent in Europe, Google &lt;a href="http://timesofindia.indiatimes.com/Tech/Tech-News/Googles-new-problem-in-Europe-A-negative-image/articleshow/35936971.cms"&gt;is suffering&lt;/a&gt; from a popularity dip.&lt;/p&gt;
&lt;p&gt;The National Council for Peace and Order, the military government in Thailand, has taken over not only the government,&lt;a href="http://www.washingtonpost.com/blogs/monkey-cage/wp/2014/05/27/thailands-cybercoup/"&gt;but also controls the media&lt;/a&gt;. The military &lt;a href="http://www.ibtimes.com/thai-junta-calls-meetings-google-facebook-over-allegedly-anti-coup-content-photo-1593088"&gt;cancelled its meetings&lt;/a&gt; with Google and Facebook. Thai protesters &lt;a href="http://www.nytimes.com/2014/06/03/world/asia/thai-protesters-flash-hunger-games-salute-to-register-quiet-dissent.html"&gt;staged a quiet dissent&lt;/a&gt;. The Asian Human Rights Commission &lt;a href="http://www.humanrights.asia/news/forwarded-news/AHRC-FST-035-2014"&gt;condemned&lt;/a&gt; the coup. For an excellent take on the coup and its dangers, please redirect &lt;a href="http://www.worldpolicy.org/blog/2014/06/02/thailand%E2%80%99s-military-coup-tenuous-democracy"&gt;here&lt;/a&gt;. For a round-up of editorials and op-eds on the coup, redirect &lt;a href="http://asiancorrespondent.com/123345/round-up-of-op-eds-and-editorials-on-the-thai-coup/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;China &lt;a href="http://economictimes.indiatimes.com/tech/internet/china-escalates-attack-on-google/articleshow/35993349.cms"&gt;has cracked down&lt;/a&gt; on Google, affecting Gmail, Translate and Calendar. It is speculated that the move is connected to the 25&lt;sup&gt;th&lt;/sup&gt; anniversary of the Tiananmen Square protests and government reprisal. At the same time, a Tibetan filmmaker who was jailed for six years for his film, &lt;i&gt;Leaving Fear Behind&lt;/i&gt;, &lt;a href="http://chinadigitaltimes.net/2014/06/china-releases-tibetan-filmmaker-jail/"&gt;has been released&lt;/a&gt; by Chinese authorities. &lt;i&gt;Leaving Fear Behind &lt;/i&gt;features a series of interviews with Tibetans of the Qinghai province in the run-up to the controversial Beijing Olympics in 2008.&lt;/p&gt;
&lt;p&gt;Japan looks set to &lt;a href="http://www.newstrackindia.com/newsdetails/2014/06/05/146--Japan-to-ban-possession-of-child-pornography-except-comics-.html"&gt;criminalize&lt;/a&gt; possession of child pornography. According to reports, the proposed law does not extend to comics or animations or digital simulations.&lt;/p&gt;
&lt;p&gt;Egypt’s police is looking to build a &lt;a href="http://www.theguardian.com/world/2014/jun/02/egypt-police-monitor-social-media-dissent-facebook-twitter-protest"&gt;social media monitoring system&lt;/a&gt; to track expressions of dissent, including “&lt;i&gt;profanity, immorality, insults and calls for strikes and protests&lt;/i&gt;”.&lt;/p&gt;
&lt;p&gt;Human rights activists &lt;a href="http://www.theguardian.com/world/2014/jun/02/facebook-bashar-al-assad-campaign-syria-election"&gt;asked Facebook to deny its services&lt;/a&gt; to the election campaign of Syrian President Bashar al-Assad, ahead of elections on June 3.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;Call for inputs&lt;/span&gt;&lt;/i&gt;:&lt;/p&gt;
&lt;p&gt;The Law Commission of India seeks comments from stakeholders and citizens on media law. The consultation paper may be found &lt;a href="http://www.lawcommissionofindia.nic.in/views/Consultation%20paper%20on%20media%20law.doc"&gt;here&lt;/a&gt;. The final date for submission is June 19, 2014.&lt;/p&gt;
&lt;p&gt;____________________________________________________________________________________________________________&lt;/p&gt;
&lt;p&gt;For feedback and comments, Geetha Hariharan is available by email at &lt;span&gt;geetha@cis-india.org or on Twitter, where her handle is @covertlight. &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/foex-live-june-1-7-2014'&gt;https://cis-india.org/internet-governance/blog/foex-live-june-1-7-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>FOEX Live</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2014-06-07T13:33:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process">
    <title>Flaws in the UIDAI Process </title>
    <link>https://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process</link>
    <description>
        &lt;b&gt;The accuracy of biometric identification depends on the chance of a false positive: the probability that the identifiers of two persons will match. Individuals whose identifiers match might be termed duplicands. When very many people are to be identified success can be measured by the (low) proportion of duplicands. The Government of India is engaged upon biometrically identifying the entire population of India. An experiment performed at an early stage of the programme has allowed us to estimate the chance of a false positive: and from that to estimate the proportion of duplicands. For the current population of 1.2 billion the expected proportion of duplicands is 1/121, a ratio which is far too high. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.epw.in/journal/2016/9/special-articles/flaws-uidai-process.html"&gt;Economic &amp;amp; Political Weekly&lt;/a&gt;, Journal » Vol. 51, Issue No. 9, 27 Feb, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A legal challenge is being mounted in the Supreme Court, currently, to the programme of biometric identification that the Unique Identification Authority of India (UIDAI) is engaged upon: an identification preliminary and a requisite to providing citizens with “Aadhaar numbers” that can serve them as “unique identiﬁers” in their transactions with the state. What follows will recount an assessment of their chances of success. We shall be using data that was available to the UIDAI and shall employ only elementary ways of calculation. It should be recorded immediately that an earlier technical paper by the author (Mathews 2013) has been of some use to the plaintiffs, and reference will be made to that in due course.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar numbers themselves may or may not derive, in some way, from the biometrics in question; the question is not material here. For our purposes a biometric is a numerical representation of some organic feature: like the iris or the retina, for instance, or the inside of a ﬁnger, or the hand taken whole even. We shall consider them in some more detail later. The UIDAI is using ﬁngerprints and iris images to generate a combination of biometrics for each individual. This paper bears on the accuracy of the composite biometric identiﬁer. How well those composites will distinguish between individuals can be assessed, actually, using the results of an experiment conducted by the UIDAI itself in the very early stages of its operation; and our contention is that, from those results themselves, the UIDAI should have been able to estimate &lt;i&gt;how many individuals would have their biometric identiﬁers matching those of some other person&lt;/i&gt;, under the best of circumstances even, when any good part of population has been identiﬁed.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/Flaws_in_the_UIDAI_Process_0.pdf"&gt;Read the full article here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The author thanks Nico Temme of the Centrum Wiskunde &amp;amp; Informatica in The Netherlands for the bounds he derived on the chance of a false positive. He is particularly grateful to the anonymous referee of this journal who, through two rounds of comment, has very much improved the presentation of the results. A technical supplement to this paper is placed on the EPW website along with this paper&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process'&gt;https://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>hans</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-03-06T10:40:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/business-standard-sunil-abraham-january-10-fixing-aadhaar">
    <title>Fixing Aadhaar: Security developers' task is to trim chances of data breach</title>
    <link>https://cis-india.org/internet-governance/blog/business-standard-sunil-abraham-january-10-fixing-aadhaar</link>
    <description>
        &lt;b&gt;The task before a security developer is not only to reduce the probability of identity breach but to eliminate certain occurrences.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.business-standard.com/article/opinion/fixing-aadhaar-security-developers-task-is-to-trim-chances-of-data-breach-118010901281_1.html"&gt;Business Standard&lt;/a&gt; on January 10, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;I feel no joy when my prophecies about digital identity systems come true. This is because from a Popperian perspective these are low-risk prophecies. I had said that that all centralised identity databases will be breached in the future. That may or may not happen within my lifetime so I can go to my grave without worries about being proven wrong. Therefore, the task before a security developer is not only to reduce the probability but more importantly to eliminate the possibility of certain occurrences.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The blame for fragility in digital identity systems today can be partially laid on a World Bank document titled “Ten Principles on Identification for Sustainable Development” which has contributed to the harmonisation of approaches across jurisdictions. Principle three says, “Establishing a robust — unique, secure, and accurate — identity”. The keyword here is “a”. Like The Lord of the Rings, the World Bank wants “one digital ID to rule them all”. For Indians, this approach must be epistemologically repugnant as ours is a land which has recognised the multiplicity of truth since ancient times.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In “Identities Research Project: Final Report” funded by Omidyar Network and published by Caribou Digital — the number one finding is “people have always had, and managed, multiple personal identities”. And the fourth finding is “people select and combine identity elements for transactions during the course of everyday life”. As researchers they have employed indirect language, for layman the key takeaway is a single national ID for all persons and all purposes is an ahistorical and unworkable solution.&lt;/span&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/AadhaarBS.png" style="text-align: justify; " title="Aadhaar BS" class="image-inline" alt="Aadhaar BS" /&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;span style="float: left; "&gt;&lt;span style="float: left; "&gt;&lt;i&gt;Revoke all &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;numbers that have been compromised, breached, leaked, illegally published or inadvertently disclosed and regenerate new global identifiers. Photo: Reuters&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span style="float: left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;monoculture can be prevented. The traditional approach is followed in the US - you could have multiple documents that are accepted as valid ID. Or you could have multiple identity providers providing ID artifacts using an interoperable framework as they do in the UK. Another approach is tokenisation. The first time tokenisation was suggested in the Aadhaar context was in an academic paper published in August 2016 by Shweta Agrawal, Subhashis Banerjee and Subodh Sharma from IIT Delhi titled “Privacy and Security of Aadhaar: A Computer Science Perspective”.&lt;/span&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The paper in its fourth key recommendation says “cryptographically embed Aadhaar ID into Authentication User Agency (AUAs) and KYC User Agency (aka KUAs) — specific IDs making correlation impossible”. The paper considers several designs for such local identifier where — 1) no linking is possible, 2) only unidirectional linking is possible, and 3) bidirectional linking is possible referring to a similar scheme in the LSE identity report.&lt;/span&gt;&lt;/p&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;Though I had spoken about tokenisation as a fix for Aadhaar earlier, I wrote about it for the first time on the 31st of March, 2017, in The Hindu. The steps would be required are as follows. First, revoke all Aadhaar numbers that have been compromised, breached, leaked, illegally published or inadvertently disclosed and regenerate new global identifiers aka Aadhaar Numbers. Second, reduce the number of KYC transactions by eliminating all use cases that don’t result in corresponding transparency or security benefits. For example, most developed economies don’t have KYC for mobile phone connections. Three, the UIDAI should issue only tokens to those government entities and private sector service providers that absolutely must have KYC. When the NATGRID wants to combine subsets of 20 different databases for up to 12 different intelligence/law enforcement agencies they will have to approach the UIDAI with the token or Aadhaar number of the suspect. The UIDAI will then be able to release corresponding tokens and/or the Aadhaar number to the NATGRID. Implementing tokenisation introduces both technical and institutional checks and balances in our surveillance systems.&lt;/p&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;On 25th of July 2017, UIDAI published the first document providing implementation details for tokenisation wherein KUAs and AUAs were asked to generate the tokens. But this approach assumed that KYC user agencies could be trusted. This is because the digital identity solution for the nation as conceived by Aadhaar architects is based on the problem statement of digital identity within a firm. Within a firm all internal entities can be trusted. But in a nation state you cannot make this assumption. Airtel, a KUA, diverted 190 crores of LPG subsidy to more than 30 lakh payment bank accounts that were opened without informed consent. Axis Bank Limited, Suvidha Infoserve (a business correspondent) and eMudhra (an e-sign provider or AUA) have been accused of using replay attacks to perform unauthorised transactions. In November last year, the UIDAI indicated to the media that they were working on the next version of tokenisation — this time called dummy numbers or virtual numbers. This work needs to be accelerated to mitigate some of the risks in the current system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The paper in its fourth key recommendation says “cryptographically embed Aadhaar ID into Authentication User Agency (AUAs) and KYC User Agency (aka KUAs) — specific IDs making correlation impossible”. The paper considers several designs for such local identifier where — 1) no linking is possible, 2) only unidirectional linking is possible, and 3) bidirectional linking is possible referring to a similar scheme in the LSE identity report.Though I had spoken about tokenisation as a fix for Aadhaar earlier, I wrote about it for the first time on the 31st of March, 2017, in The Hindu. The steps would be required are as follows. First, revoke all Aadhaar numbers that have been compromised, breached, leaked, illegally published or inadvertently disclosed and regenerate new global identifiers aka Aadhaar Numbers. Second, reduce the number of KYC transactions by eliminating all use cases that don’t result in corresponding transparency or security benefits. For example, most developed economies don’t have KYC for mobile phone connections. Three, the UIDAI should issue only tokens to those government entities and private sector service providers that absolutely must have KYC. When the NATGRID wants to combine subsets of 20 different databases for up to 12 different intelligence/law enforcement agencies they will have to approach the UIDAI with the token or Aadhaar number of the suspect. The UIDAI will then be able to release corresponding tokens and/or the Aadhaar number to the NATGRID. Implementing tokenisation introduces both technical and institutional checks and balances in our surveillance systems.On 25th of July 2017, UIDAI published the first document providing implementation details for tokenisation wherein KUAs and AUAs were asked to generate the tokens. But this approach assumed that KYC user agencies could be trusted. This is because the digital identity solution for the nation as conceived by Aadhaar architects is based on the problem statement of digital identity within a firm. Within a firm all internal entities can be trusted. But in a nation state you cannot make this assumption. Airtel, a KUA, diverted 190 crores of LPG subsidy to more than 30 lakh payment bank accounts that were opened without informed consent. Axis Bank Limited, Suvidha Infoserve (a business correspondent) and eMudhra (an e-sign provider or AUA) have been accused of using replay attacks to perform unauthorised transactions. In November last year, the UIDAI indicated to the media that they were working on the next version of tokenisation — this time called dummy numbers or virtual numbers. This work needs to be accelerated to mitigate some of the risks in the current system.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/business-standard-sunil-abraham-january-10-fixing-aadhaar'&gt;https://cis-india.org/internet-governance/blog/business-standard-sunil-abraham-january-10-fixing-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-10T16:47:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-surveillance-roundtable-mumbai">
    <title>First Privacy and Surveillance Roundtable</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-surveillance-roundtable-mumbai</link>
    <description>
        &lt;b&gt;The Privacy and Surveillance Roundtables are a CIS initiative, in partnership with the Cellular Operators Association of India (COAI), as well as local partners.  From June 2014 – November 2014, CIS and COAI will host seven Privacy and Surveillance Roundtable discussions across multiple cities in India. The Roundtables will be closed-door deliberations involving multiple stakeholders.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Through the course of these discussions we aim to deliberate upon the current legal framework for surveillance in India, and discuss possible frameworks for surveillance in India. The provisions of the draft CIS Privacy Bill 2013, the International Principles on the Application of Human Rights to Communication Surveillance, and the Report of the Group of Experts on Privacy will be used as background material and entry points into the discussion. The recommendations and dialogue from each roundtable will be compiled and submitted to the Department of Personnel and Training.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first of seven proposed roundtable meetings on “Privacy and Surveillance” conducted by the Centre for Internet and Society in collaboration with the Cellular Operators Association of India and the Council for Fair Business Practices was held in Mumbai on the 28th of June, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The roundtable’s discussion centered on the &lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-february-2014.pdf"&gt;Draft Privacy Protection Bill&lt;/a&gt; formed by CIS in 2013, which contains provisions on the regulation of interception and surveillance and its implications on individual privacy. Other background documents to the event included the &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;, and the &lt;a href="https://en.necessaryandproportionate.org/text"&gt;International Principles on the Application of Human Rights to Communications Surveillance.&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Background and Context&lt;/h2&gt;
&lt;p&gt;The Chair of the Roundtable began by giving a brief background of Surveillance regulation in India, focusing its scope to primarily telegraphic, postal and electronic surveillance.&lt;/p&gt;
&lt;h3&gt;Why a surveillance regime now?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A move to review the existing privacy laws in India came in the wake of Indo-EU Fair Trade Agreement negotiations; where a Data Adequacy Assessment conducted by European Commission found India’s data protection policies and practices inadequate for India to be granted EU secure status. The EU’s data protection regime is in contrast, fairly strong, governed by the framework of the EU Data Protection Directive, 1995.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In response to this, the Department of Personnel and Training, which drafted the Right to Information Act of 2005 and the Whistleblower’s Protection Act, 2011 was given the task of forming a Privacy Bill. Although the initial draft of the Bill was made available to the public, as per reports, the Second draft of the Bill has been shared selectively with certain security agencies and not with service providers or the public.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Discussion&lt;/h3&gt;
&lt;p&gt;The Chair began the discussion by posing certain preliminary questions to the Roundtable:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What should a surveillance law contain and how should it function?&lt;/li&gt;
&lt;li&gt;If the system is warrant based, who would be competent to execute it? &lt;/li&gt;
&lt;li&gt;Can any government department be allowed a surveillance request? &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;A larger question posed was whether the concerns and questions posed above would be irrelevant with the possible enforcement of a Central Monitoring System in the near future? As per reports, the Central Monitoring System would allow the government to intercept communications independently without using service providers and thus, in effect, shielding such information from the public entirely.&lt;/p&gt;
&lt;h2&gt;The CIS Privacy Protection Bill’s Regulatory Mechanism&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The discussion then focused on the type of regulatory mechanism that a privacy and surveillance regime in India should have in place. The participants did not find favour in either a quasi-judicial body or a self-regulatory system – instead opting for a strict regulatory regime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIS Draft Privacy Protection Bill proposes a regime that consists of a Data Protection Regulation Authority that is similar to the Telecom Regulatory Authority of India, including the provision for an appellate body. The Bill envisions that the Authority will act as an adjudicating body for all complaints relating to the handling of personal data in addition to forming and reviewing rules on personal data protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although, the Draft Bill dealt with privacy and surveillance under one regulatory authority, the Chair proposes a division between the two frameworks, as the former is governed primarily by civil law, and the latter is regulated by criminal law and procedure. Though in a &lt;a href="https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011"&gt;2014 leaked version of the governments Privacy Bill,&lt;/a&gt; surveillance and privacy are addressed under one regulation, as per reports, the Department of Personnel and Training is also considering creating two separate regulations: one for data protection and one for surveillance.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Authorities in Other Jurisdictions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The discussion then moved to comparing the regulatory authorities within other jurisdictions and the procedures followed by them. The focus was largely on the United States and the United Kingdom, which have marked differences in their privacy and surveillance systems. &lt;br /&gt;&lt;br /&gt;In the United Kingdom, for example, a surveillance order is reviewed by an Independent Commissioner followed by an Appellate Tribunal, which has the power to award compensation. In contrast, the United States follows a far less transparent system which governs foreigners and citizens under separate legislations. A secret court was set up under the FISA, an independent review process, however, exists for such orders within this framework.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;The Authority for Authorizing Surveillance in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The authority for regulating requests for interceptions of communication under the Draft CIS Privacy Protection Bill is a magistrate. As per the procedure, an authorised officer must approach the Magistrate for approval of a warrant for surveillance. Two participants felt that a Magistrate is not the appropriate authority to regulate surveillance requests as it would mean vesting power in a few people, who are not elected via a democratic process.&lt;br /&gt;&lt;br /&gt;In the present regime, the regulation of interception of telecommunications under Indian Law is governed by the Telegraph Act,1885 and the Telegraph Rules,1951. Section 5(2) of the Act and Rule 419A of the Telegraph Rules, permit interception only after an order of approval from the Home Secretary of the Union Government or of the State Governments, which in urgent cases, can be granted by an officer of the Joint Secretary Level or above of the Ministry of Home Affairs of the Union or that State’s Government. &lt;br /&gt;&lt;br /&gt;Although most participants felt confident that a judicial authority rather than an executive authority would serve as the best platform for regulating surveillance, there was debate on what level of a Magistrate Judge would be apt for receiving and authorizing surveillance requests - or whether the judge should be a Magistrate at all. Certain participants felt that even District Magistrates would not have the competence and knowledge to adjudicate on these matters. The possibility of making High Court Judges the authorities responsible for authorizing surveillance requests was also suggested. To this suggestion participants noted that there are not enough High Court judges for such a system as of now. &lt;br /&gt;&lt;br /&gt;The next issue raised was whether the judges of the surveillance system should be independent or not, and if the orders of the Courts are to be kept secret, would this then compromise the independence of such regulators.  As part of this discussion, questions were raised about the procedures under the Foreign Intelligence Surveillance Act, the US regulation governing the surveillance of foreign individuals, and if such secrecy could be afforded in India. During the discussions, certain stakeholders felt that a system of surveillance regulation in India should be kept secret in the interests of national security. Others highlighted that this is the existing practice in India giving the example of the Intelligence Bureau and Research and Analysis Wing orders which are completely private, adding however, that none of these surveillance regulations in India have provisions on disclosure.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;When can interception of communications take place?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The interception of communications under the CIS Privacy Protection Bill is governed by the submission of a report by an authorised officer to a Magistrate who issues a warrant for such surveillance. Under the relevant provision, the threshold for warranting surveillance is suspicious conduct. Several participants felt that the term ‘suspicious conduct’ was too wide and discretionary to justify the interception of communication and suggested a far higher threshold for surveillance. Citing the Amar Singh Case, a participant stated that a good way to ensure ‘raise the bar’ and avoid frivolous interception requests would be to require officers submitting interception request to issue affidavits. A participant suggested that authorising officers could be held responsible for issuing frivolous interception requests. Some participants agreed, but felt that there is a need for a higher and stronger standard for interception before provisions are made for penalising an officer. As part of this discussion, a stakeholder added that the term “person” i.e. the subject of surveillance needed definition within the Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion then moved to comparing other jurisdictions’ thresholds on permitting surveillance. The Chair explained here that the US follows the rule of probable cause, which is where a reasonable suspicion exists, coupled with circumstances that could prove such a suspicion true. The UK follows the standard of ‘reasonable suspicion’, a comparatively lesser degree of strength than probable cause. In India, the standard for telephonic interception under the Telegraph Act 1885 is the “occurrence of any public emergency or in the interest of public safety” on the satisfaction of the Home Secretary/Administrative Officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The participants, while rejecting the standard of ‘suspicious conduct’ and agreeing that a stronger threshold was needed, were unable to offer other possible alternatives.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Multiple warrants, Storing and sharing of Information by Governmental Agencies&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The provision for interception in the CIS Privacy Protection Bill stipulates that a request for surveillance should be accompanied by warrants previously issued with respect to that individual. The recovery of prior warrants suggests the sharing of information of surveillance warrants across multiple governmental agencies which certain participants agree, could prevent the duplication of warrants.&lt;br /&gt;&lt;br /&gt;Participants briefly discussed how the Central Monitoring System will allow for a permanent log of all surveillance activities to be recorded and stored, and the privacy implications of this. It was noted that as per reports, the hardware purported to be used for interception by the CMS is Israeli, and is designed to store a log of all metadata. &lt;br /&gt;&lt;br /&gt;A participant stated that automation component of the Centralized Monitoring System may be positive considering that authentication of requests i.e. tracing the source of the interception may be made easier with such a system.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conditions prior to issuing warrant&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The CIS Privacy Protect Bill states that a Magistrate should be satisfied of either. A reasonable threat to national security, defence or public order; or a  cognisable  offence,  the  prevention,  investigation  or  prosecution  of  which  is necessary in the public interest. When discussing these standards, certain participants felt that the inclusion of ‘cognizable offences’ was too broad, whereas others suggested that the offences would necessarily require an interception to be conducted should be listed.  This led to further discussion on what kind of categorisation should be followed and whether there would be any requirement for disclosure when the list is narrowed down to graver and serious offences.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The chair also posed the question as to whether the term ‘national security’ should elaborated upon, highlighting the lack of a definition in spite of two landmark Supreme Court judgments on national security legislations, Terrorist and Disruptive Activities Act,1985 and the Prevention of Terrorism Act,  i.e. Kartar Singh v Union of India &lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt; and PUCL v Union of India.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Kinds of information and degree of control&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The discussion then focused on the kinds of information that can be intercepted and collected. A crucial distinction was made here, between content data and metadata, the former being the content of the communication itself and the latter being information about the communication.  As per Indian law, only content data is regulated and not meta-data. On whether a warrant should be issued by a Magistrate in his chambers or in camera, most participants agreed that in chambers was the better alternative. However, under the CIS Privacy Protection Bill, in chamber proceedings have been made optional, which stakeholders agreed should be discretionary depending on the case and its sensitivity.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Evidentiary Value&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The foundation of this discussion, the Chair noted, is the evidentiary value given to information collected from interception of communications. For instance, the United States follows the exclusionary rule, also known as the “fruit of the poisonous tree rule”, where evidence collected from an improper investigation discredits the evidence itself as well as further evidence found on the basis of it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian courts however, allow for the admission of evidence collected through improper collection, as does the UK.  In Malkani v State of Maharashtra&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; the Supreme Court stated that an electronically recorded conversation can be admissible as evidence, and stated that evidence collected from an improper investigation can be relied upon for the discovery of further evidence - thereby negating the application of the exclusionary rule.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Emergent Circumstances: who should the authority be?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The next question posed to the participants was who the apt authority would be to allow surveillance in emergent circumstances. The CIS Privacy Protection Bill places this power with the Home Secretary, stating that if the Home Secretary is satisfied of a grave threat to national security, defence or public order, he can permit surveillance. The existing law under the Telegraph Act 1885 uses the term ‘unavoidable circumstance’, though not elaborating on what this amounts to for such situations, where an officer not below the rank of a Joint Secretary evaluates the request. In response to this question, a stakeholder suggested that the issuing authority should be limited to the police and administrative services alone.  In the CIS Privacy Protection Bill - a review committee for such decisions relating to interception is comprised of senior administrative officials both at the Central and State Government level.  A participant suggested that the review committee should also include the Defence secretary and the Home secretary.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Sharing of Information&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The CIS Privacy Protection Bill states that information gathered from surveillance should not be shared be shared amongst persons, with the exception that if the information is sensitive in terms of national security or prejudicing an investigation, an authorised officer can share the information with an authorised officer of any other competent organisation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A participant highlighted that this provision is lacking an authority for determining the sharing of information. Another participant noted that the sharing of information should be limited amongst certain governmental agencies, rather than to ‘any competent organisation.’&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Proposals for Telecommunication Service Providers&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the Indian interception regime, although surveillance orders are passed by the Government, the actual interception of communication is done by the service provider. Certain proposals have been introduced to protect service providers from liability. For example, an execution provision ensures that a warrant is not served on a service provider more than seven days after it is issued. In addition an indemnity provision prevents any action being taken against a service provider in a court of law, and indemnifies them against any losses that arise from the execution of the warrant, but not outside the scope of the warrant. During discussions, stakeholders felt that the standard should be a blanket indemnity without any conditions to assure service providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the Indian interception regime, a service provider must also ensure confidentiality of the content and meta data of the intercepted communications. To this, a participant suggested that in situations of information collection, a service provider may have a policy for obtaining customer consent prior to the interception. The Information Technology (Reasonable security practices and procedures and sensitive personal information) Rules, 2011 are clearer in this respect, which allow for the disclosure of information to governmental agencies without consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another participant mentioned that the inconsistencies between laws on information disclosure and collection, such as the IT Act, the Right to Information Act and the recently enacted Whistleblower’s Protection Act, 2011 need to be harmonised. Other stakeholders agreed with this, though they stated that surveillance regulations should prevail over other laws in case of any inconsistency.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The inputs from the Bombay Roundtable seem to point towards a more regulated approach, with the addition of a review system to enhance accountability. While most stakeholders here agreed that national security is a criterion that takes precedence over concerns of privacy vis-à-vis surveillance, there is a concomitant need to define the limits of permissible interception. The view here is that a judicial model would prove to be a better system than the executive system; however, there is no clear answer as of yet on who would constitute this model. While the procedure for interception was covered in depth, the nature of the information itself was covered briefly and more discussion would be welcome here in forthcoming sessions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/bombay-report.pdf" class="internal-link"&gt;&lt;b&gt;Click to download the Report&lt;/b&gt;&lt;/a&gt; (PDF, 188 Kb)&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. 1994 4 SCC 569.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. (1997) 1 SCC 301.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. [1973] 2 S.C.R. 417.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-surveillance-roundtable-mumbai'&gt;https://cis-india.org/internet-governance/blog/privacy-surveillance-roundtable-mumbai&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>anandini</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-08-09T04:13:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-july-20-2018-rajitha-menon-firms-find-wealth-in-your-data">
    <title>Firms find wealth in your data</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-july-20-2018-rajitha-menon-firms-find-wealth-in-your-data</link>
    <description>
        &lt;b&gt;Data collection and theft is quite prevalent and there is little an individual can do right now.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Data protection and  privacy are the new buzzwords in the corridors of power in India. While a  Ministry of Electronics and Technology committee led by retired Supreme  Court Justice B N Srikrishna is working on a draft Data Protection  Bill, the Telecom Regulatory Authority of  India (TRAI) has come out with its own recommendations regarding  privacy, security, and ownership of data in the telecom sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How is your data  collected? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Every minute you spend online leads  to your data being generated,  collected and collated somewhere. “There  is data that we volunteer. If I  create an account for myself on any  website I will provide my name,  age, banking and so on,” says Amber Sinha, senior programme manager, Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Then there is data which gets collected by telecom companies and companies which provide OTT (Over-The-Top) services, like Google Chrome. Much of this data is collected automatically — my browsing history, what links were open, what ads did I click on in Facebook etc. Most websites use trackers and cookies that continue working in the background. Even when you have closed the link and move on to another website, they still continue to collect data about you,” he adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is the method behind this?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In order to provide a service, there is some data that they need to collect. For example, a cab aggregator has to get my location in order to connect me to nearest cabs. Yet most companies collect data beyond what might be needed. Suppose you are availing an online service which involves a payment aspect. For authentication, an OTP is sent in the form of a text message. The online services will seek permission to read our messages so that they can automatically pull the OTP, saving us the trouble of having to key it in manually. But the system is designed in such a way that the permission they seek is for my entire message box,” explains Amber.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="https://www.deccanherald.com/metrolife/metrolife-your-bond-bengaluru/firms-find-wealth-your-data-682471.html"&gt;Read the complete article by Rajitha Menon in Deccan Herald&lt;/a&gt; published on July 20, 2018. Amber Sinha has been quoted.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-july-20-2018-rajitha-menon-firms-find-wealth-in-your-data'&gt;https://cis-india.org/internet-governance/news/deccan-herald-july-20-2018-rajitha-menon-firms-find-wealth-in-your-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-07-25T16:06:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/aayush-rathi-and-shweta-mohandas-april-30-2019-fintech-in-india-a-study-of-privacy-and-security-commitments">
    <title>FinTech in India: A Study of Privacy and Security Commitments</title>
    <link>https://cis-india.org/internet-governance/blog/aayush-rathi-and-shweta-mohandas-april-30-2019-fintech-in-india-a-study-of-privacy-and-security-commitments</link>
    <description>
        &lt;b&gt;The unprecedented growth of the fintech space in India has concomitantly come with regulatory challenges around inter alia privacy and security concerns. This report studies the privacy policies of 48 fintech companies operating in India to better understand some of these concerns. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Access the full report: &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/Hewlett%20A%20study%20of%20FinTech%20companies%20and%20their%20privacy%20policies.pdf"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;p&gt;The report by Aayush Rathi and Shweta Mohandas was edited by Elonnai Hickok. Privacy policy testing was done by Anupriya Nair and visualisations were done by Saumyaa Naidu. The project is supported by the William and Flora Hewlett Foundation.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;In India, the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (subsequently referred to as SPD/I Rules) framed under the Information Technology Act, 2000 make privacy policies a ubiquitous feature of websites and mobile applications of firms operating in India. Privacy policies are drafted in order to allow consumers to make an informed choice about the privacy commitments being made vis-à-vis their information, and is often the sole document that lays down a companies’ privacy and security practices.In India, the Information Technology (Reasonable Security Practices andProcedures and Sensitive Personal Data or Information) Rules, 2011 (subsequently referred to as SPD/I Rules) framed under the Information Technology Act, 2000 make privacy policies a ubiquitous feature of websites and mobile applications of firms operating in India. Privacy policies are drafted in order to allow consumers to make an informed choice about the privacy commitments being made vis-à-vis their information, and is often the sole document that lays down a companies’ privacy and security practices.&lt;/p&gt;
&lt;p&gt;The objective of this study is to understand privacy commitments undertaken by fintech companies operating in India as documented in their public facing privacy policies. This exercise will be useful to understand what standards of privacy and security protection fintech companies are committing to via their organisational privacy policies. The research will do so by aiming to understand the alignment of the privacy policies with the requirements mandated under the SPD/I Rules. Contingent on the learnings from this exercise, trends observed in fintech companies’ privacy and security commitments will be culled out.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/aayush-rathi-and-shweta-mohandas-april-30-2019-fintech-in-india-a-study-of-privacy-and-security-commitments'&gt;https://cis-india.org/internet-governance/blog/aayush-rathi-and-shweta-mohandas-april-30-2019-fintech-in-india-a-study-of-privacy-and-security-commitments&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi and Shweta Mohandas</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-05-02T11:20:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata">
    <title>FinFisher in India and the Myth of Harmless Metadata</title>
    <link>https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata</link>
    <description>
        &lt;b&gt;In this article, Maria Xynou argues that metadata is anything but harmless, especially since FinFisher — one of the world's most controversial types of spyware — uses metadata to target individuals. &lt;/b&gt;
        &lt;p align="JUSTIFY"&gt;In light of PRISM, the Central Monitoring System (CMS) and other such surveillance projects in India and around the world, the question of whether the collection of metadata is “harmless” has arisen.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; In order to examine this question, FinFisher&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; — surveillance spyware — has been chosen as a case study to briefly examine to what extent the collection and surveillance of metadata can potentially violate the right to privacy and other human rights. FinFisher has been selected as a case study not only because its servers have been recently found in India&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; but also because its “remote monitoring solutions” appear to be very pervasive even on the mere grounds of metadata.&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;FinFisher in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;FinFisher is spyware which has the ability to take control of target computers and capture even encrypted data and communications. The software is designed to evade detection by anti-virus software and has versions which work on mobile phones of all major brands.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; In many cases, the surveillance suite is installed after the target accepts installation of a fake update to commonly used software.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; Citizen Lab researchers have found three samples of FinSpy that masquerades as Firefox.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;FinFisher is a line of remote intrusion and surveillance software developed by Munich-based Gamma International. FinFisher products are sold exclusively to law enforcement and intelligence agencies by the UK-based Gamma Group.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; A few months ago, it was reported that command and control servers for FinSpy backdoors, part of Gamma International´s FinFisher “remote monitoring solutions”, were found in a total of 25 countries, including India.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The following map, published by the Citizen Lab, shows the 25 countries in which FinFisher servers have been found.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Map.png" alt="Map" class="image-inline" title="Map" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;The above map shows the results of scanning for characteristics of FinFisher command and control servers&lt;/i&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="JUSTIFY"&gt;FinFisher spyware was not found in the countries coloured blue, while the colour green is used for countries not responding. The countries using FinFisher range from shades of orange to shades of red, with the lightest shade of orange ranging to the darkest shade of red on a scale of 1-6,  and with 1 representing the least active servers and 6 representing the most active servers in regards to the use of FinFisher. On a scale of 1-6, India is marked a 3 in terms of actively using FinFisher.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Research published by the Citizen Lab reveals that FinSpy servers were recently found in India, which indicates that Indian law enforcement agencies may have bought this spyware from Gamma  Group and might be using it to target individuals in India.&lt;a href="#fn11" name="fr11"&gt;[11] &lt;/a&gt;According to the Citizen Lab, FinSpy servers in India have been detected through the HostGator operator and the first digits of the IP address are: 119.18.xxx.xxx. Releasing complete IP addresses in the past has not proven useful, as the servers are quickly shut down and relocated, which is why only the first two octets of the IP address are revealed.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Citizen Lab's research reveals that FinFisher “remote monitoring solutions” were found in India, which, according to Gamma Group's brochures, include the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinSpy: &lt;/b&gt;hardware or software which monitors targets that regularly change location, use encrypted and anonymous communications channels and reside in foreign countries. FinSpy can remotely monitor computers and encrypted communications, regardless of where in the world the target is based. FinSpy is capable of bypassing 40 regularly tested antivirus systems, of monitoring the calls, chats, file transfers, videos and contact lists on Skype, of conducting live surveillance through a webcam and microphone, of silently extracting files from a hard disk, and of conducting a live remote forensics on target systems. FinSpy is hidden from the public through anonymous proxies.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinSpy Mobile:&lt;/b&gt; hardware or software which remotely monitors mobile phones. FinSpy Mobile enables the interception of mobile communications in areas without a network, and offers access to encrypted communications, as well as to data stored on the devices that is not transmitted. Some key features of FinSpy Mobile include the recording of common communications like voice calls, SMS/MMS and emails, the live surveillance through silent calls, the download of files, the country tracing of targets and the full recording of all BlackBerry Messenger communications. FinSpy Mobile is hidden from the public through anonymous proxies.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly USB: &lt;/b&gt;hardware which is inserted into a computer and which can automatically install the configured software with little or no user-interaction and does not require IT-trained agents when being used in operations. The FinFly USB can be used against multiple systems before being returned to the headquarters and its functionality can be concealed by placing regular files like music, video and office documents on the device. As the hardware is a common, non-suspicious USB device, it can also be used to infect a target system even if it is switched off.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly LAN: &lt;/b&gt;software which can deploy a remote monitoring solution on a target system in a local area network (LAN). Some of the major challenges law enforcement faces are mobile targets, as well as targets who do not open any infected files that have been sent via email to their accounts. FinFly LAN is not only able to deploy a remote monitoring solution on a target´s system in local area networks, but it is also able to infect files that are downloaded by the target, by sending fake software updates for popular software or to infect the target by injecting the payload into visited websites. Some key features of the FinFly LAN include: discovering all computer systems connected to LANs, working in both wired and wireless networks, and remotely installing monitoring solutions through websites visited by the target. FinFly LAN has been used in public hotspots, such as coffee shops, and in the hotels of targets.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly Web:&lt;/b&gt; software which can deploy remote monitoring solutions on a target system through websites. FinFly Web is designed to provide remote and covert infection of a target system by using a wide range of web-based attacks. FinFly Web provides a point-and-click interface, enabling the agent to easily create a custom infection code according to selected modules. It provides fully-customizable web modules, it can be covertly installed into every website and it can install the remote monitoring system even if only the email address is known.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly ISP:&lt;/b&gt; hardware or software which deploys a remote monitoring solution on a target system through an ISP network. FinFly ISP can be installed inside the Internet Service Provider Network, it can handle all common protocols and it can select targets based on their IP address or Radius Logon Name. Furthermore, it can hide remote monitoring solutions in downloads by targets, it can inject remote monitoring solutions as software updates and it can remotely install monitoring solutions through websites visited by the target.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;Although FinFisher is supposed to be used for “lawful interception”, it has gained notoriety for targeting human rights activists.&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt; &lt;span&gt;According to &lt;/span&gt;Morgan Marquis-Boire, a security researcher and technical advisor at the Munk School and a security engineer at Google, FinSpy has been used in Ethiopia to target an opposition group called Ginbot.&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; Researchers have argued that FinFisher has been sold to Bahrain's government to target activists, and such allegations were based on an examination of malicious software which was emailed to Bahraini activists.&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; Privacy International has argued that FinFisher has been deployed in Turkmenistan, possibly to target activists and political dissidents.&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Many questions revolving around the use of FinFisher and its “remote monitoring solutions” remain   vague, as there is currently inadquate proof of whether this spyware is being used to target individuals by law enforcement agencies in the countries where command and control servers have been found, such as India.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt; However, FinFisher's brochures which were circulated in the ISS world trade shows and leaked by WikiLeaks do reveal some confirmed facts: Gamma International claims that its FinFisher products are capable of taking control of target computers, of capturing encrypted data  and of evading mainstream anti-virus software.&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt; Such products are exhibited in the world's largest surveillance trade show and probably sold to law enforcement agencies around the world.&lt;a href="#fn25" name="fr25"&gt;[25] &lt;/a&gt;This alone unveils a concerning fact: spyware which is so sofisticated that it even evades encryption and anti-virus software is currently in the market and law enforcement agencies can potentially use it to target activists and anyone who does not comply with social conventions.&lt;a href="#fn26" name="fr26"&gt;[26] &lt;/a&gt;A few months ago, two Indian women were arrested after having questioned the shutdown of Mumbai for Shiv Sena patriarch Bal Thackeray's funeral.&lt;a href="#fn27" name="fr27"&gt;[27] &lt;/a&gt;Thus, it remains unclear what type of behaviour is targeted by law enforcement agencies and whether spyware, such as FinFisher, would be used in India to track individuals without a legally specified purpose.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, India lacks privacy legislation which could safeguard individuals from potential abuse, while sections 66A and 69 of the Information Technology (Amendment) Act, 2008, empower Indian authorities with extensive surveillance capabilites.&lt;a href="#fn28" name="fr28"&gt;[28] &lt;/a&gt;While it remains unclear if Indian law enforcement agencies are using FinFisher spy products to unlawfully target individuals, it is a fact that FinFisher control and command servers have been found in India and that, if used, they could potentially have severe consequences on individuals' right to privacy and other human rights.&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;The Myth of Harmless Metadata&lt;/h2&gt;
&lt;p align="JUSTIFY"&gt;Over the last months, it has been reported that the Central Monitoring System (CMS) is being implemented in India, through which all telecommunications and Internet communications in the country are being centrally intercepted by Indian authorities. This mass surveillance of communications in India is enabled by the omission of privacy legislation and Indian authorities are currently capturing the metadata of communications.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Last month, Edward Snowden leaked confidential U.S documents on PRISM, the top-secret  National Security Agency (NSA) surveillance programme that collects metadata through telecommunications and Intenet communications. It has been reported that through PRISM, the NSA has tapped into the servers of nine leading Internet companies: Microsoft, Google, Yahoo, Skype, Facebook, YouTube, PalTalk, AOL and Apple.&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; While the extent to which the NSA is actually tapping into these servers remains unclear, it is certain that the NSA has collected metadata on a global level.&lt;a href="#fn32" name="fr32"&gt;[32]&lt;/a&gt; Yet, the question of whether the collection of metadata is “harmful” remains ambiguous.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;According to the National Information Standards Organization (NISO), the term “metadata” is defined as “structured information that describes, explains, locates or otherwise makes it easier to retrieve, use or manage an information resource”. NISO claims that metadata is “data about data” or “information about information”.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt; Furthermore, metadata is considered valuable due to its following functions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Resource discovery&lt;/li&gt;
&lt;li&gt;Organizing electronic resources&lt;/li&gt;
&lt;li&gt;Interoperability&lt;/li&gt;
&lt;li&gt;Digital Identification&lt;/li&gt;
&lt;li&gt;Archiving and preservation&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;Metadata can be used to find resources by relevant criteria, to identify resources, to bring similar resources together, to distinguish dissimilar resources and to give location information. Electronic resources can be organized through the use of various software tools which can automatically extract and reformat information for Web applications. Interoperability is promoted through metadata, as describing a resource with metadata allows it to be understood by both humans and machines, which means that data can automatically be processed more effectively. Digital identification is enabled through metadata, as most metadata schemes include standard numbers for unique identification. Moreover, metadata enables the archival and preservation of large volumes of digital data.&lt;a href="#fn34" name="fr34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Surveillance projects, such as PRISM and India's CMS, collect large volumes of metadata, which include the numbers of both parties on a call, location data, call duration, unique identifiers, the International Mobile Subscriber Identity (IMSI) number, email addresses, IP addresses and browsed webpages.&lt;a href="#fn35" name="fr35"&gt;[35]&lt;/a&gt; However, the fact that such surveillance projects may not have access to content data might potentially create a false sense of security.&lt;a href="#fn36" name="fr36"&gt;[36]&lt;/a&gt; When Microsoft released its report on data requests by law enforcement agencies around the world in March 2013, it revealed that most of the  disclosed data was metadata, while relatively very little content data was allegedly disclosed.&lt;a href="#fn37" name="fr37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;imilarily, Google's transparency report reveals that the company disclosed large volumes of metadata to law enforcement agencies, while restricting its disclosure of content data.&lt;a href="#fn38" name="fr38"&gt;[38]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Such reports may potentially provide a sense of security to the public, as they reassure that the content of  personal emails, for example, has not been shared with the government, but merely email addresses – which might be publicly available online anyway. However, is content data actually more “harmful” than metadata? Is metadata “harmless”? How much data does metadata actually reveal?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Guardian recently published an article which includes an example of how individuals can be tracked through their metadata. In particular, the example explains how an individual is tracked – despite using an anonymous email account – by logging in from various hotels' public Wi-Fi and by leaving trails of metadata that include times and locations. This example illustrates how an individual can be tracked through metadata alone, even when anonymous accounts are being used.&lt;a href="#fn39" name="fr39"&gt;[39]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Wired published an article which states that metadata can potentially be more harmful than content data because “unlike our words, metadata doesn't lie”. In particular, content data shows what an individual says – which may be true or false – whereas metadata includes what an individual does. While the validity of the content within an email may potentially be debateable, it is undeniable that an individual logged into specific websites – if that is what that individuals' IP address shows. Metadata, such as the browsing habits of an individual, may potentially provide a more thorough and accurate profile of an individual than that individuals' email content, which is why metadata can potentially be more harmful than content data.&lt;a href="#fn40" name="fr40"&gt;[40]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, voice content is hard to process and written content in an email or chat communication may not always be valid. Metadata, on the other hand, provides concrete patterns of an individuals' behaviour, interests and interactions. For example, metadata can potentially map out an individuals' political affiliation, interests, economic background, institution, location, habits and the people that individual interacts with. Such data can potentially be more valuable than content data, because while the validity of email content is debateable, metadata usually provides undeniable facts. Not only is metadata more accurate than content data, but it is also ideally suited to automated analysis by a computer. As most metadata includes numeric figures, it can easily be analysed by data mining software, whereas content data is more complicated.&lt;a href="#fn41" name="fr41"&gt;[41]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;FinFisher products, such as FinFly LAN, FinFly Web and FinFly ISP, provide solid proof that the collection of metadata can potentially be “harmful”. In particular, FinFly LAN can be deployed in a target system in a local area network (LAN) by infecting files that are downloaded by the target, by sending fake software updates for popular software or by infecting the payload into visited websites. The fact that FinFly LAN can remotely install monitoring solutions through websites visited by the target indicates that metadata alone can be used to acquire other sensitive data.&lt;a href="#fn42" name="fr42"&gt;[42]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;FinFly Web can deploy remote monitoring solutions on a target system through websites. Additionally, FinFly Web can be covertly installed into every website and it can install the remote monitoring system even if only the email address is known.&lt;a href="#fn43" name="fr43"&gt;[43]&lt;/a&gt; FinFly ISP can select targets based on their IP address or Radius Logon Name. Furthermore, FinFly ISP can remotely install monitoring solutions through websites visited by the target, as well as inject remote monitoring solutions as software updates.&lt;a href="#fn44" name="fr44"&gt;[44]&lt;/a&gt; In other words, FinFisher products, such as FinFly LAN, FinFly Web and FinFly ISP, can target individuals, take control of their computers and their data, and capture even encrypted data and communications with the help of metadata alone.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The example of FinFisher products illustrates that metadata can potentially be as “harmful” as content data, if acquired unlawfully and without individual consent.&lt;a href="#fn45" name="fr45"&gt;[45]&lt;/a&gt; Thus, surveillance schemes, such as PRISM and India's CMS, which capture metadata without individuals' consent can potentially pose a major threat to the right to privacy and other human rights.&lt;a href="#fn46" name="fr46"&gt;[46]&lt;/a&gt; Privacy can be defined as the claim of individuals, groups or institutions to determine when, how and to what extent information about them is communicated to others.&lt;a href="#fn47" name="fr47"&gt;[47]&lt;/a&gt; Furthermore, privacy is at the core of human rights because it protects individuals from abuse by those in power.&lt;a href="#fn48" name="fr48"&gt;[48]&lt;/a&gt; The unlawful collection of metadata exposes individuals to the potential violation of their human rights, as it is not transparent who has access to their data, whether it is being shared with third parties or for how long it is being retained.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;It is not clear if Indian law enforcement agencies are actually using FinFisher products, but the Citizen Lab did find FinFisher command and control servers in the country which indicates that there is a high probability that such spyware is being used.&lt;a href="#fn49" name="fr49"&gt;[49] &lt;/a&gt;This probability is highly concerning not only because the specific spy products have such advanced capabilities that they are even capable of capturing encrypted data, but also because India currently lacks privacy legislation which could safeguard individuals.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Thus, it is recommended that Indian law enforcement agencies are transparent and accountable if they are using spyware which can potentially breach their citizens' human rights and that privacy legislation is enacted into law. Lastly, it is recommended that all surveillance technologies are strictly regulated with regards to the protection of human rights and that Indian authorities adopt the principles on communication surveillance formulated by the Electronic Frontier Foundation and Privacy International.&lt;a href="#fn50" name="fr50"&gt;[50]&lt;/a&gt; The above could provide a decisive first step in ensuring that India is the democracy it claims to be.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Robert Anderson (2013), &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;a class="external-link" href="http://bit.ly/fnkGF3"&gt;http://bit.ly/fnkGF3&lt;/a&gt;&lt;a href="http://www.finfisher.com/FinFisher/en/index.php"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Michael Lewis, &lt;i&gt;“FinFisher Surveillance Spyware Spreads to Smartphones”, &lt;/i&gt;&lt;span&gt;The Star: Business, 30 August 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14sF2IQ"&gt;http://bit.ly/14sF2IQ&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Marcel Rosenbach, &lt;i&gt;“Troublesome Trojans: Firm Sought to Install Spyware Via Faked iTunes Updates”, &lt;/i&gt;&lt;span&gt;Der Spiegel, 22 November 2011, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14sETVV"&gt;http://bit.ly/14sETVV&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Intercept Review, &lt;i&gt;Mozilla to Gamma: stop disguising your FinSpy as Firefox, &lt;/i&gt;&lt;span&gt;02 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/131aakT"&gt;http://bit.ly/131aakT&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Intercept Review, &lt;i&gt;LI Companies Review (3) – Gamma, &lt;/i&gt;&lt;span&gt;05 April 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/Hof9CL"&gt;http://bit.ly/Hof9CL&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/zaknq5"&gt;http://bit.ly/zaknq5&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy Mobile: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19pPObx"&gt;http://bit.ly/19pPObx&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly USB: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cJSu4h"&gt;http://bit.ly/1cJSu4h&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly LAN: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J70Hi"&gt;http://bit.ly/14J70Hi&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly Web: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19fn9m0"&gt;http://bit.ly/19fn9m0&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly ISP: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt;http://bit.ly/13gMblF&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Gerry Smith, &lt;i&gt;“FinSpy Software Used To Surveil Activists Around The World, Reports Says”, &lt;/i&gt;&lt;span&gt;The Huffington Post, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://huff.to/YmmhXI"&gt;http://huff.to/YmmhXI&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Jeremy Kirk, &lt;i&gt;“FinFisher Spyware seen Targeting Victims in Vietnam, Ethiopia”, &lt;/i&gt;&lt;span&gt;Computerworld: IDG News, 14 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J8BwW"&gt;http://bit.ly/14J8BwW&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. Reporters without Borders: For Freedom of Information (2012), &lt;i&gt;The Enemies of the Internet: Special Edition: Surveillance, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/10FoTnq"&gt;http://bit.ly/10FoTnq&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. Privacy International, &lt;i&gt;FinFisher Report, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/QlxYL0"&gt;http://bit.ly/QlxYL0&lt;/a&gt;&lt;span&gt;&lt;a href="https://www.privacyinternational.org/finfisherreport"&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013,&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/zaknq5"&gt;http://bit.ly/zaknq5&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. Adi Robertson, &lt;i&gt;“Paranoia Thrives at the ISS World Cybersurveillance Trade Show”, &lt;/i&gt;&lt;span&gt;The Verge, 28 December 2011, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/tZvFhw"&gt;http://bit.ly/tZvFhw&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. Gerry Smith, &lt;i&gt;“FinSpy Software Used To Surveil Activists Around The World, Reports Says”, &lt;/i&gt;&lt;span&gt;The Huffington Post, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://huff.to/YmmhXI"&gt;http://huff.to/YmmhXI&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. BBC News, &lt;i&gt;“India arrests over Facebook post criticising Mumbai shutdown”, &lt;/i&gt;&lt;span&gt;19 November 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bbc.in/WoSXkA"&gt;http://bbc.in/WoSXkA&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. Indian Ministry of Law, Justice and Company Affairs, &lt;i&gt;The Information Technology (Amendment) Act, 2008, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/19pOO7t"&gt;http://bit.ly/19pOO7t&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. Phil Muncaster, &lt;i&gt;“India introduces Central Monitoring System”, &lt;/i&gt;&lt;span&gt;The Register, 08 May 2013,&lt;a class="external-link" href="http://bit.ly/ZOvxpP"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZOvxpP"&gt;http://bit.ly/ZOvxpP&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. Glenn Greenwald &amp;amp; Ewen MacAskill, &lt;i&gt;“NSA PRISM program taps in to user data of Apple, Google and others”, &lt;/i&gt;&lt;span&gt;The Guardian, 07 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1baaUGj"&gt;http://bit.ly/1baaUGj&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. BBC News, &lt;i&gt;“Google, Facebook and Microsoft seek data request transparency”, &lt;/i&gt;&lt;span&gt;12 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bbc.in/14UZCCm"&gt;http://bbc.in/14UZCCm&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. National Information Standards Organization (2004), &lt;i&gt;Understanding Metadata, &lt;/i&gt;&lt;span&gt;NISO Press, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/LCSbZ"&gt;http://bit.ly/LCSbZ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;]. The Hindu, &lt;i&gt;“In the dark about 'India's PRISM'”, &lt;/i&gt;&lt;span&gt;16 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1bJCXg3"&gt;http://bit.ly/1bJCXg3&lt;/a&gt;&lt;span&gt;&lt;a href="http://www.thehindu.com/sci-tech/technology/in-the-dark-about-indias-prism/article4817903.ece"&gt;&lt;/a&gt; ; Glenn Greenwald, &lt;/span&gt;&lt;i&gt;“NSA collecting phone records of millions of Verizon customers daily”, &lt;/i&gt;&lt;span&gt;The Guardian, 06 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/16L89yo"&gt;http://bit.ly/16L89yo&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr36" name="fn36"&gt;36&lt;/a&gt;]. Robert Anderson, &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, 01 July 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr37" name="fn37"&gt;37&lt;/a&gt;]. Microsoft: Corporate Citizenship, &lt;i&gt;2012 Law Enforcement Requests Report,&lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/Xs2y6D"&gt;http://bit.ly/Xs2y6D&lt;/a&gt;&lt;a href="http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/"&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr38" name="fn38"&gt;38&lt;/a&gt;]. Google, &lt;i&gt;Transparency Report&lt;/i&gt;&lt;span&gt;, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J7hKp"&gt;http://bit.ly/14J7hKp&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr39" name="fn39"&gt;39&lt;/a&gt;]. Guardian US Interactive Team, &lt;i&gt;A Guardian Guide to your Metadata, &lt;/i&gt;&lt;span&gt;The Guardian, 12 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZJLkpy"&gt;http://bit.ly/ZJLkpy&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr40" name="fn40"&gt;40&lt;/a&gt;]. Matt Blaze, &lt;i&gt;“Phew, NSA is Just Collecting Metadata. (You Should Still Worry)”, &lt;/i&gt;&lt;span&gt;Wired, 19 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1bVyTJF"&gt;http://bit.ly/1bVyTJF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr41" name="fn41"&gt;41&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr42" name="fn42"&gt;42&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly LAN: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J70Hi"&gt;http://bit.ly/14J70Hi&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr43" name="fn43"&gt;43&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly Web: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19fn9m0"&gt;http://bit.ly/19fn9m0&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr44" name="fn44"&gt;44&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly ISP: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files,&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt;http://bit.ly/13gMblF&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr45" name="fn45"&gt;45&lt;/a&gt;]. Robert Anderson, &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, 01 July 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr46" name="fn46"&gt;46&lt;/a&gt;]. Shalini Singh, &lt;i&gt;“India's surveillance project may be as lethal as PRISM”, &lt;/i&gt;&lt;span&gt;The Hindu, 21 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/15oa05N"&gt;http://bit.ly/15oa05N&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr47" name="fn47"&gt;47&lt;/a&gt;]. Cyberspace Law and Policy Centre, &lt;i&gt;Privacy, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/14J5u7W"&gt;http://bit.ly/14J5u7W&lt;/a&gt;&lt;span&gt;&lt;a href="http://www.cyberlawcentre.org/genl0231/privacy.htm"&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr48" name="fn48"&gt;48&lt;/a&gt;]. Bruce Schneier, &lt;i&gt;“Privacy and Power”, &lt;/i&gt;&lt;span&gt;Schneier on Security, 11 March 2008, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/i2I6Ez"&gt;http://bit.ly/i2I6Ez&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr49" name="fn49"&gt;49&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr50" name="fn50"&gt;50&lt;/a&gt;]. Elonnai Hickok, &lt;i&gt;“Draft International Principles on Communications Surveillance and Human Rights”, &lt;/i&gt;&lt;span&gt;The Centre for Internet and Society, 16 January 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/XCsk9b"&gt;http://bit.ly/XCsk9b&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata'&gt;https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-13T11:30:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/privacy_uidfinancialinclusion">
    <title>Financial Inclusion and the UID</title>
    <link>https://cis-india.org/internet-governance/privacy_uidfinancialinclusion</link>
    <description>
        &lt;b&gt;Since 2009, when Nandan Nilekani began to envision and implement the Unique Identification Project,
the UID authority has promoted the UID/Aadhaar scheme as a tool of development for India - arguing that an identity will assist in bringing benefits to the poor, promote financial inclusion in India, and allow for economic and social development. In this blog entry I will focus on the challenges and possibilities of the UID number providing the residents of India a viable method of access to financial services across the country.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Why the UID could bring financial inclusion&lt;/h3&gt;
&lt;p&gt;In their strategy document “Exclusion to Inclusion with Micro payments” the UIDAI argues that a few&amp;nbsp;of many challenges to successful financial inclusion in India for the poor have been: lack of identity,&amp;nbsp;lack of accessibility of financial outlets, unreliability of infrastructure, high costs of banking, and the&amp;nbsp;common presence of a middle man. For Indian banks the UID sites challenges such as: the high cost of&amp;nbsp;transactions for banks servicing clients in rural areas, lack of infrastructure, costly processes of cash&amp;nbsp;management, and high costs of IT.(UIDAI, 2010)The UID's solution to these obstacles is a system of&amp;nbsp;financial services and micro payments based off of an individuals UID number, in which an individual&amp;nbsp;with a UID number would be able to: open a bank account, make a payment, withdraw money, deposit&amp;nbsp;money, and send remittances. The hope is that this system will allow banks to scale up their branch&amp;nbsp;less banking, and reach out to larger populations. Residents having a bank account linked to their UID&amp;nbsp;number is also key to the UID's larger scheme for subsidy delivery to the poor. Until all consumers who&amp;nbsp;rely on government subsidies have a bank account linked to their UID number, the UID will not be&amp;nbsp;able to implement a system of direct transfer of cash subsidies.(CNBC-TV18, 2011) For example, the&amp;nbsp;UIDAI has started conducting a pilot disbursement of funds under the Mahatma Gandhi National Rural&amp;nbsp;Employment Guarantee Scheme (MNREGS) to Jharkhand through Union Bank, ICICI Bank and Bank&amp;nbsp;of India branches.(IBN-Live, 2011)&lt;/p&gt;
&lt;h3&gt;How the UID will bring financial inclusion&lt;/h3&gt;
&lt;p&gt;In their vision, the UIDAI has designed a system that involves bank branches enrolling individuals,&amp;nbsp;bank branches establishing relationships with BC organizations, the use of Micro ATM's, and the use of&amp;nbsp;the UID numbers for authentication in all financial transactions. In short the system of financial&amp;nbsp;inclusion would work as follows:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Step 1. Enroll and obtain UID number&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An individual enrolls for a UID number. During enrollment an individual shares his/her KYC&amp;nbsp;information with the UIDAI. The UIDAI verifies the individuals KYC information, along with their&amp;nbsp;other information, and issues the individual a UID number. If an individual already has a bank account&amp;nbsp;at the time of enrollment they have the option to link their UID number to their bank account [1]&lt;/p&gt;
&lt;p&gt;In India every bank must verify and confirm an individuals KYC information. This is to help reduce&amp;nbsp;tax evasion and fraud. In December 2011, India's Ministry of Finance recognized the Aadhaar number&amp;nbsp;has an officially valid identification to satisfy the KYC norms for opening bank accounts. By verifying&amp;nbsp;an individuals KYC information at the enrollment stage the UIDAI is hoping reduce the amount of&amp;nbsp;paperwork and time needed for an individual to open a bank account. In addition to satisfying KYC&amp;nbsp;norms, the Government of India has also recognized the Aadhaar number as an acceptable form of&amp;nbsp;identity for the purpose of obtaining a mobile connection. By having the UID number accepted for&amp;nbsp;establishing both mobile connections and bank accounts, financial inclusion through mobile banking is&amp;nbsp;encouraged as it allows for individuals who previously had no identity, to join the financial system and&amp;nbsp;mobile network – thus allowing bank accounts to be more accessible than before, and aiding banks by&amp;nbsp;simplifying the process of account opening.(Akhand Tiawari, Anurodh Giri, 2011)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Step 2. Open UID Enabled Bank Account&lt;/strong&gt;&lt;br /&gt;Now that the individual has a UID number they can open a bank account by presenting their UID&amp;nbsp;number and thumb print to the bank branch for authentication. Currently the one bank enrolling citizens&amp;nbsp;and issuing UID numbers and UID based ATM cards is the Bank of India.(Aggarwal, 2011) Bank of&amp;nbsp;Maharashtra, State Bank of India and Indian Overseas Bank are currently waiting for approval from the&amp;nbsp;UIDAI.(Chavan, 2011) In this scenario the UID number will be the only form of identification needed&amp;nbsp;to open a bank account.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.Make financial transactions with UID number&lt;/strong&gt;&lt;br /&gt;Once a UID Enabled Bank Account (UEBA) is opened, individuals can begin making financial&amp;nbsp;transactions using their UID number and fingerprint. Individuals can access their UEBA through BC&amp;nbsp;institutions. With a UEBA individuals have the option of using four basic banking services:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Store cash for savings through electronic deposits and withdraw only small amounts of cash&lt;/li&gt;&lt;li&gt;Make payments&lt;/li&gt;&lt;li&gt;Send and receive remittances&lt;/li&gt;&lt;li&gt;Acquire balance and transaction history&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Transactions completed through the UID-enabled bank account work similarly to a prepaid mobile&amp;nbsp;system. BC organizations, or Bank Correspondents, are organizations such as SHGs, kirana stores,&amp;nbsp;dairy agents that larger banks develop a business relationship with. The BC organizations handle all&amp;nbsp;transactions at the local level. Using BC organizations as financial outlets is meant to increase the&amp;nbsp;penetration of financial outlets and make financial services more accessible in rural areas. How the&amp;nbsp;process works is: a BC institution begins by depositing a certain amount of money with a larger&amp;nbsp;banking institution. This ‘ prepaid balance’ paid by the BC institution changes with every transaction&amp;nbsp;the BC institution makes. For example, when an individual makes a deposit it decreases as that money&amp;nbsp;is then transferred into an individuals account, and increases when an individual withdraws money,&amp;nbsp;because of the transaction fee that is charged to the individual. When the individual is making a&amp;nbsp;deposit, he pays physical cash to the BC, who in turn makes an electronic transfer from the BC account&amp;nbsp;to the individual's account. When making a withdrawal, the electronic transfer is made from the&amp;nbsp;individual's account to the BC account, and the BC hands out physical cash to the customer, (UIDAI,&amp;nbsp;2010).&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;The micro ATM that is to be used at BC institutions is a hand held device, in this case a mobile phone,&amp;nbsp;attached to a finger print reader. The micro ATM is meant to replace larger ATM’s and reduce the cost&amp;nbsp;that banks incur when establishing full fledged ATM machines. The hand held device will be remotely&amp;nbsp;accessed to the central server of the bank. Currently Italian tech company Telit Communication SpA, is&amp;nbsp;hoping to provide the GSM wireless M2M modules that will allow the wireless device and the wired&amp;nbsp;server to communicate with each other. (Kanth, 2011) The most significant difference between the&amp;nbsp;micro ATM system and the traditional ATM system is that the BC employee executes the transaction.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Though having BC employees carry out financial transactions might eliminate the possibility of a&amp;nbsp;fraudulent ATM being set up, it opens many possibly corrupt doors. How will it be ensured that the&amp;nbsp;transaction is completed without fraud, and how can it be ensured that the Micro-ATM is not&amp;nbsp;fraudulent, or that the BC organization itself is not fraudulent. Though this scenario might sound&amp;nbsp;unlikely, the UID has already experienced difficulties with fake enrollment centers being set up, such as&amp;nbsp;in Pune. (Gadkari, 2011), fake UID papers being issued, as was done in Patna(Tripathi, 2011) and&amp;nbsp;enrollment centers illegally outsourcing work, as the IT company Tera Software was found doing&amp;nbsp;(Prajakta, 2011). If these scenarios have all been tried, it is not unreasonable to see the same being tried&amp;nbsp;with financial institutions.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Challenges to a system of authentication for financial transactions with the biometric based UID number&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Not withstanding the fact that financial inclusion cannot be achieved only through an identity, focusing&amp;nbsp;on the identity component of financial inclusion - in the report Low Cost Secure Transaction Model for&amp;nbsp;Financial Services, published by Nitin Munjal, Ashish Paliwal, and Rajat Moona, from the Indian&amp;nbsp;Institute of Technology, the authors note that present challenges in India to financial inclusion through&amp;nbsp;access to financial institutions include(Munjal, Nitin Paliwal, Ashish Moona, 2011):&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Currently financial transactions require network connectivity to take place. For financial transactions made in rural areas this has lead to both high costs for each transaction and to high fixed IT costs.&lt;/li&gt;&lt;li&gt;Current financial schemes such as mobile banking depend on network connectivity, making the network indispensable, yet 70% of the Indian population is rurally located with limited or no network connectivity.&lt;/li&gt;&lt;li&gt;Current financial service outlets are densely located in urban areas and not rural areas. Rural populations are financially excluded, as in most cases the completion of financial transaction require the presence of financial outlets.&lt;/li&gt;&lt;li&gt;Currently there are no easy safeguards to protect against fake ATMS or fraud, because the current Financial Service Model is based on blind trust of the service outlet – this allows for high rates of fake ATM’s being installed and fraud.&lt;/li&gt;&lt;li&gt;For an individual to access financial services, an identity is required. In most cases the poor lack an identity.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;Clearly there are many obstacles that the UID identity card must overcome to successfully authenticate&amp;nbsp;individuals in financial transactions and facilitate financial inclusion. For the system to be successful&amp;nbsp;the UID must at the minimum do the following:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Accurately generate unique numbers&lt;/li&gt;&lt;li&gt;Capture accurate personal information&lt;/li&gt;&lt;li&gt;Ensure security of the database&lt;/li&gt;&lt;li&gt;Ensure that the technology is secure and accurate&lt;/li&gt;&lt;li&gt;Ensure that only necessary information is collected&lt;/li&gt;&lt;li&gt;Verify BC centers&lt;/li&gt;&lt;li&gt;Provide a secure network that can handle large numbers of transactions&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Possible ways in which the system can go wrong include:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Inaccurate authentication&lt;/li&gt;&lt;li&gt;Delays in authentication&lt;/li&gt;&lt;li&gt;Fraud at the level of the BC institution&lt;/li&gt;&lt;li&gt;Over collection of personal information by banks&lt;/li&gt;&lt;li&gt;Linking of databases by banks, or other agencies&lt;/li&gt;&lt;li&gt;Network failure&lt;/li&gt;&lt;li&gt;Down time of the database&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Though UID enabled bank accounts have yet to be officially established the UID is already&amp;nbsp;experiencing many of the listed difficulties. For instance, in an Indian Express article published on June&amp;nbsp;15th, it was reported that banks are issuing additional UID forms that ask if individuals have credit&amp;nbsp;cards, operate mobile or internet banking accounts, own a two wheeler or four wheeler, or live in a&amp;nbsp;rented or personally owned accommodation. (Indian Express, 2011) Even more alarming is a recent&amp;nbsp;news item from the Deccan Herald, which details the efforts that have been taken by NATGRID to&amp;nbsp;access banking clients personal information, and NATGRID's proposal to tie banking information to a&amp;nbsp;linked database containing information from bank accounts, railways, airlines, stock exchanges,&amp;nbsp;income tax, credit card, immigration records, and telecom service providers. (Arun, 2011)The banks&lt;br /&gt;have refused to give NATGRID access to clients personal information, but the ease at which NATGRID&amp;nbsp;could track and collect information about individuals with the UID is chilling – especially if the UID is&amp;nbsp;linked to almost every bank account in India. Several news reports have also shared experiences of&amp;nbsp;confusion, inconsistent requirements, and unorganized enrollment centers, which place doubt in the&amp;nbsp;accuracy of the information collected and the accuracy of the UID numbers issued.(Tripathi, 2011).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;Looking at the technology and operational design of the UEBA system, though the scheme relies on&amp;nbsp;mobile networks, it fails to eliminate the need for connectivity to the central server, because&amp;nbsp;authentication of individuals biometric must be done through comparison of one fingerprint to the&amp;nbsp;central server of all fingerprints. This will not only complicate the effectiveness of delivery of services,&amp;nbsp;as it is possible for connectivity to be limited and slow, but it will also incur large network overhead&amp;nbsp;costs for each transaction that is verified. Furthermore, even though the use of BC institutions as&amp;nbsp;financial service outlets is meant to increases the availability of financial outlets, a dependency is&amp;nbsp;created on BC institutions – as they must be present for any financial transaction to take place.&lt;br /&gt;Additionally, individuals have no way of authenticating and verifying BC institutions. As mentioned&amp;nbsp;earlier this allows for possible scenarios of fraud. Additionally, the UID has not provided any&amp;nbsp;alternative method of identification in the case that the network or technology fails, or if an individuals&amp;nbsp;biometrics are incorrectly rejected.&lt;/p&gt;
&lt;h3&gt;Could the SCOSTA standard be an option?&lt;/h3&gt;
&lt;p&gt;Many developing countries, like Kenya and Brazil, that face similar challenges to financial inclusion&amp;nbsp;have looked towards smart cards as secure methods for authenticating individuals. In 2003 India also&amp;nbsp;implemented a smart card approach to identity management. The SCOSTA standard smart card was&amp;nbsp;introduced with the MNIC national identification scheme. Though the scheme was eventually dropped&amp;nbsp;by the Indian Government, the SCOSTA smart card standard is still a valid option for authentication&amp;nbsp;of individuals in financial transactions. A SCOSTA standard based approach for financial inclusion&amp;nbsp;would include:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Authentication of an individuals key, pass-phrase, and pin. This is known as public keyinfrastructure. This will allow a person to protect their password and easily replace it if stolen.&lt;/li&gt;&lt;li&gt;&amp;nbsp;Authentication through public key infrastructure would not depend on connectivity to thenetwork. This would allow for financial inclusion of populations not connected to networks and not be fully dependent on working networks.&lt;/li&gt;&lt;li&gt;&amp;nbsp;Authentication through public key infrastructure establishes mutual trust of user and institution. This would lower the presence of fraudulent institutions and corrupt transactions.&lt;/li&gt;&lt;li&gt;&amp;nbsp;Connection to a central server is not required for the authentication of an individual in a financial transaction. This will lower the cost of transactions and lower IT overhead costs (ibid Munjal, Nitin Paliwal, Ashish Moona, 2011)&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;Though it is hard to say that a fool proof system of authentication can easily be made, and that system&amp;nbsp;will indeed promote financial inclusion, when comparing the biometric UID number with the SCOSTA&amp;nbsp;standard smart card, there are many benefits to the SCOSTA standard such as ability of individuals to&amp;nbsp;verify banking institutions, no need for connectivity to the central server, and the ability to easily&amp;nbsp;replace lost or stolen pins and passwords. No matter what standard is implemented though, it is&amp;nbsp;important to clearly look at the current implementation, technological, and operational challenges that&amp;nbsp;identification schemes face and the possible ramifications of such challenges before adapting it as a&amp;nbsp;ubiquitous system.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/privacy_uidfinancialinclusion'&gt;https://cis-india.org/internet-governance/privacy_uidfinancialinclusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-08-23T10:36:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
